http.c revision 355b4669e025ff377602b6fc7caaf30dbc218371
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * "$Id: http.c 148 2006-04-25 16:54:17Z njacobs $"
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * HTTP routines for the Common UNIX Printing System (CUPS).
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Copyright 1997-2005 by Easy Software Products, all rights reserved.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * These coded instructions, statements, and computer programs are the
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * property of Easy Software Products and are protected by Federal
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * copyright law. Distribution and use rights are outlined in the file
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * "LICENSE.txt" which should have been included with this file. If this
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * file is missing or damaged please contact Easy Software Products
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Attn: CUPS Licensing Information
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Easy Software Products
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 44141 Airport View Drive, Suite 204
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Hollywood, Maryland 20636 USA
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Voice: (301) 373-9600
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * EMail: cups-info@cups.org
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * This file is subject to the Apple OS-Developed Software exception.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Contents:
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpInitialize() - Initialize the HTTP interface library and set the
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * default HTTP proxy (if any).
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpCheck() - Check to see if there is a pending response from
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpClearCookie() - Clear the cookie value(s).
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpClose() - Close an HTTP connection...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpConnect() - Connect to a HTTP server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpConnectEncrypt() - Connect to a HTTP server using encryption.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpEncryption() - Set the required encryption on the link.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpReconnect() - Reconnect to a HTTP server...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpGetSubField() - Get a sub-field value.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpSetField() - Set the value of an HTTP header.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpDelete() - Send a DELETE request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpGet() - Send a GET request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpHead() - Send a HEAD request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpOptions() - Send an OPTIONS request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpPost() - Send a POST request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpPut() - Send a PUT request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpTrace() - Send an TRACE request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpFlush() - Flush data from a HTTP connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpRead() - Read data from a HTTP connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpSetCookie() - Set the cookie value(s)...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpWait() - Wait for data available on a connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpWrite() - Write data to a HTTP connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpGets() - Get a line of text from a HTTP connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpPrintf() - Print a formatted string to a HTTP connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpGetDateString() - Get a formatted date/time string from a time value.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpGetDateTime() - Get a time value from a formatted date/time string.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpUpdate() - Update the current HTTP state for incoming data.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpDecode64() - Base64-decode a string.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpDecode64_2() - Base64-decode a string.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpEncode64() - Base64-encode a string.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpEncode64_2() - Base64-encode a string.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * httpGetLength() - Get the amount of data remaining from the
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * content-length or transfer-encoding fields.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * http_field() - Return the field index for a field name.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * http_send() - Send a request with all fields and the trailing
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * blank line.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * http_wait() - Wait for data available on a connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * http_upgrade() - Force upgrade to TLS encryption.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * http_setup_ssl() - Set up SSL/TLS on a connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * http_shutdown_ssl() - Shut down SSL/TLS on a connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * http_read_ssl() - Read from a SSL/TLS connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * http_write_ssl() - Write to a SSL/TLS connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * CDSAReadFunc() - Read function for CDSA decryption code.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * CDSAWriteFunc() - Write function for CDSA encryption code.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#pragma ident "%Z%%M% %I% %E% SMI"
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Include necessary headers...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* !WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Some operating systems have done away with the Fxxxx constants for
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * the fcntl() call; this works around that "feature"...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* !FNONBLK */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Local functions...
355b4669e025ff377602b6fc7caaf30dbc218371jacobsstatic int http_send(http_t *http, http_state_t request,
355b4669e025ff377602b6fc7caaf30dbc218371jacobs const char *uri);
355b4669e025ff377602b6fc7caaf30dbc218371jacobsstatic int http_read_ssl(http_t *http, char *buf, int len);
355b4669e025ff377602b6fc7caaf30dbc218371jacobsstatic int http_write_ssl(http_t *http, const char *buf, int len);
355b4669e025ff377602b6fc7caaf30dbc218371jacobsstatic OSStatus CDSAReadFunc(SSLConnectionRef connection, void *data, size_t *dataLength);
355b4669e025ff377602b6fc7caaf30dbc218371jacobsstatic OSStatus CDSAWriteFunc(SSLConnectionRef connection, const void *data, size_t *dataLength);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs# endif /* HAVE_CDSASSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Local globals...
355b4669e025ff377602b6fc7caaf30dbc218371jacobsstatic const char * const http_fields[] =
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Accept-Language",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Accept-Ranges",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Authorization",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Connection",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Content-Encoding",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Content-Language",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Content-Length",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Content-Location",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Content-MD5",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Content-Range",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Content-Type",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Content-Version",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "If-Modified-Since",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "If-Unmodified-since",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Keep-Alive",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Last-Modified",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Location",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Retry-After",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "Transfer-Encoding",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "User-Agent",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "WWW-Authenticate"
355b4669e025ff377602b6fc7caaf30dbc218371jacobshttpDumpData(FILE *fp, char *tag, char *buffer, int bytes)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs int i, j, ch;
355b4669e025ff377602b6fc7caaf30dbc218371jacobs fprintf(fp, "%s %d(0x%x) bytes...\n", tag, bytes, bytes);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs while (j < 16) {
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpInitialize()' - Initialize the HTTP interface library and set the
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * default HTTP proxy (if any).
355b4669e025ff377602b6fc7caaf30dbc218371jacobs struct timeval curtime; /* Current time in microseconds */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs# endif /* !WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs int i; /* Looping var */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_LIBSSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs static int initialized = 0; /* Has WinSock been initialized? */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Ignore SIGPIPE signals...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_GNUTLS */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Using the current time is a dubious random seed, but on some systems
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * it is the best we can do (on others, this seed isn't even used...)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs for (i = 0; i < sizeof(data); i ++)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs data[i] = rand(); /* Yes, this is a poor source of random data... */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_LIBSSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpCheck()' - Check to see if there is a pending response from the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - 0 = no data, 1 = data available */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpClearCookie()' - Clear the cookie value(s).
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpClose()' - Close an HTTP connection...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpConnect()' - Connect to a HTTP server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobshttpConnect(const char *host, /* I - Host to connect to */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs http_encryption_t encrypt; /* Type of encryption to use */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Set the default encryption status...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpConnectEncrypt()' - Connect to a HTTP server using encryption.
355b4669e025ff377602b6fc7caaf30dbc218371jacobshttpConnectEncrypt(const char *host, /* I - Host to connect to */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs /* I - Type of encryption to use */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs int i; /* Looping var */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpConnectEncrypt(host=\"%s\", port=%d, encrypt=%d)\n",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Lookup the host...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * This hack to make users that don't have a localhost entry in
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * their hosts file or DNS happy...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs else if ((hostaddr = httpGetHostByName("127.0.0.1")) == NULL)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Verify that it is an IPv4, IPv6, or domain address...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if ((hostaddr->h_addrtype != AF_INET || hostaddr->h_length != 4)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs && (hostaddr->h_addrtype != AF_INET6 || hostaddr->h_length != 16)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* AF_INET6 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* AF_LOCAL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Allocate memory for the structure...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Set the encryption status...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (port == 443) /* Always use encryption for https */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Loop through the addresses we have until one of them connects...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs strlcpy(http->hostname, host, sizeof(http->hostname));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Load the address...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Connect to the remote system...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Could not connect to any known address - bail out!
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpEncryption()' - Set the required encryption on the link.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - -1 on error, 0 on success */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs http_encryption_t e) /* I - New encryption preference */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpEncryption(http=%p, e=%d)\n", http, e));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if ((http->encryption == HTTP_ENCRYPT_ALWAYS && !http->tls) ||
355b4669e025ff377602b6fc7caaf30dbc218371jacobs (http->encryption == HTTP_ENCRYPT_NEVER && http->tls))
355b4669e025ff377602b6fc7caaf30dbc218371jacobs else if (http->encryption == HTTP_ENCRYPT_REQUIRED && !http->tls)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (e == HTTP_ENCRYPT_ALWAYS || e == HTTP_ENCRYPT_REQUIRED)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpReconnect()' - Reconnect to a HTTP server...
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - 0 on success, non-zero on failure */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Close any previously open socket...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Create the socket and set options to allow reuse.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if ((http->fd = socket(http->hostaddr.addr.sa_family, SOCK_STREAM, 0)) < 0)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs fcntl(http->fd, F_SETFD, FD_CLOEXEC); /* Close this socket when starting *
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * other processes... */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* FD_CLOEXEC */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs setsockopt(http->fd, SOL_SOCKET, SO_REUSEADDR, (char *)&val, sizeof(val));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs setsockopt(http->fd, SOL_SOCKET, SO_REUSEPORT, &val, sizeof(val));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* SO_REUSEPORT */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Using TCP_NODELAY improves responsiveness, especially on systems
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * with a slow loopback interface... Since we write large buffers
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * when sending print files and requests, there shouldn't be any
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * performance penalty for this...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs setsockopt(http->fd, IPPROTO_TCP, TCP_NODELAY, (char *)&val, sizeof(val));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs setsockopt(http->fd, IPPROTO_TCP, TCP_NODELAY, &val, sizeof(val));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Connect to the server...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs status = connect(http->fd, (struct sockaddr *)&(http->hostaddr),
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* AF_INET6 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs status = connect(http->fd, (struct sockaddr *)&(http->hostaddr),
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* AF_LOCAL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs status = connect(http->fd, (struct sockaddr *)&(http->hostaddr),
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Always do encryption via SSL.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpGetSubField()' - Get a sub-field value.
355b4669e025ff377602b6fc7caaf30dbc218371jacobschar * /* O - Value or NULL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs char temp[HTTP_MAX_VALUE], /* Temporary buffer for name */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpGetSubField(http=%p, field=%d, name=\"%s\", value=%p)\n",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Skip leading whitespace...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Get the sub-field name...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs *fptr && *fptr != '=' && !isspace(*fptr & 255) && ptr < (temp + sizeof(temp) - 1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpGetSubField: name=\"%s\"\n", temp));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Skip trailing chars up to the '='...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Skip = and leading whitespace...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Read quoted string...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs *fptr && *fptr != '\"' && ptr < (value + HTTP_MAX_VALUE - 1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Read unquoted string...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs *fptr && !isspace(*fptr & 255) && *fptr != ',' && ptr < (value + HTTP_MAX_VALUE - 1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs while (*fptr && !isspace(*fptr & 255) && *fptr != ',')
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpGetSubField: value=\"%s\"\n", value));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * See if this is the one...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpSetField()' - Set the value of an HTTP header.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpDelete()' - Send a DELETE request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - Status of call (0 = success) */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpGet()' - Send a GET request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - Status of call (0 = success) */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpHead()' - Send a HEAD request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - Status of call (0 = success) */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpOptions()' - Send an OPTIONS request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - Status of call (0 = success) */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpPost()' - Send a POST request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - Status of call (0 = success) */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpPut()' - Send a PUT request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - Status of call (0 = success) */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpTrace()' - Send an TRACE request to the server.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - Status of call (0 = success) */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpFlush()' - Flush data from a HTTP connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpFlush(http=%p), state=%d\n", http, http->state));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpRead()' - Read data from a HTTP connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - Number of bytes read */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpRead(http=%p, buffer=%p, length=%d)\n",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpRead: data_remaining=%d\n", http->data_remaining));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * A zero-length chunk ends a transfer; unless we are reading POST
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * data, go idle...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Prevent future reads for this request...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Buffer small reads for better performance...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpRead: reading %d bytes from socket into buffer...\n",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpRead: read %d bytes from socket into buffer...\n",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs httpDumpData(stdout, "httpRead:", http->buffer, bytes);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs else if (bytes < 0)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpRead: grabbing %d bytes from input buffer...\n", bytes));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs memmove(http->buffer, http->buffer + length, http->used);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpRead: reading %d bytes from socket...\n", length));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs while ((bytes = recv(http->fd, buffer, length, 0)) < 0)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpRead: read %d bytes from socket...\n", bytes));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs else if (bytes < 0)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpSetCookie()' - Set the cookie value(s)...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpWait()' - Wait for data available on a connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - 1 if data is available, 0 otherwise */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * First see if there is data in the buffer...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * If not, check the SSL/TLS buffers and do a select() on the connection...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpWrite()' - Write data to a HTTP connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - Number of bytes written */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * A zero-length chunk ends a transfer; unless we are sending POST
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * or PUT data, go idle...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpWrite: changing states from %d", http->state));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs while (length > 0)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* DEBUG */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs else if (errno != http->error && errno != ECONNRESET)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (http->data_remaining == 0 && http->data_encoding == HTTP_ENCODE_LENGTH)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Finished with the transfer; unless we are sending POST or PUT
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * data, go idle...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpWrite: changing states from %d", http->state));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpGets()' - Get a line of text from a HTTP connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobschar * /* O - Line or NULL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpGets(line=%p, length=%d, http=%p)\n", line, length, http));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Pre-scan the buffer and see if there is a newline in there...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (bufptr >= bufend && http->used < HTTP_MAX_BUFFER)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * No newline; see if there is more data to be read...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs bytes = http_read_ssl(http, bufend, HTTP_MAX_BUFFER - http->used);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs bytes = recv(http->fd, bufend, HTTP_MAX_BUFFER - http->used, 0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpGets: read %d bytes...\n", bytes));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Nope, can't get a line this time...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpGets: recv() error %d!\n", WSAGetLastError()));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpGets: recv() error %d!\n", errno));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs else if (bytes == 0)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Yup, update the amount used and the end pointer...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs while (bufptr >= bufend && http->used < HTTP_MAX_BUFFER);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Read a line from the buffer...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpGets: Returning \"%s\"\n", line));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpPrintf()' - Print a formatted string to a HTTP connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - Number of bytes written */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs const char *format, /* I - printf-style format string */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs ...) /* I - Additional args as needed */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs char buf[HTTP_MAX_BUFFER], /* Buffer for formatted string */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpPrintf: httpPrintf(http=%p, format=\"%s\", ...)\n", http, format));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs for (tbytes = 0, bufptr = buf; tbytes < bytes; tbytes += nbytes, bufptr += nbytes)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs nbytes = http_write_ssl(http, bufptr, bytes - tbytes);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpGetDateString()' - Get a formatted date/time string from a time value.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsconst char * /* O - Date/time string */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs snprintf(datetime, sizeof(datetime), "%s, %02d %s %d %02d:%02d:%02d GMT",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs days[tdate->tm_wday], tdate->tm_mday, months[tdate->tm_mon],
355b4669e025ff377602b6fc7caaf30dbc218371jacobs tdate->tm_year + 1900, tdate->tm_hour, tdate->tm_min, tdate->tm_sec);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpGetDateTime()' - Get a time value from a formatted date/time string.
355b4669e025ff377602b6fc7caaf30dbc218371jacobshttpGetDateTime(const char *s) /* I - Date/time string */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs int i; /* Looping var */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (sscanf(s, "%*s%d%15s%d%d:%d:%d", &day, mon, &year, &hour, &min, &sec) < 6)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs for (i = 0; i < 12; i ++)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (i >= 12)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpUpdate()' - Update the current HTTP state for incoming data.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpUpdate(http=%p), state=%d\n", http, http->state));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * If we haven't issued any commands, then there is nothing to "update"...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Grab all of the lines we can from the connection...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Blank line means the start of the data section (if any). Return
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * the result code, too...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * If we get status 100 (HTTP_CONTINUE), then we *don't* change states.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Instead, we just return HTTP_CONTINUE to the caller and keep on
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * tryin'...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (http->status == HTTP_SWITCHING_PROTOCOLS && !http->tls)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs# endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Got the beginning of a response...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (sscanf(line, "HTTP/%d.%d%d", &major, &minor, &status) != 3)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs http->version = (http_version_t)(major * 100 + minor);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Got a value...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Be tolerants of servers that send unknown attribute fields...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * "Expect: 100-continue" or similar...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * "Cookie: name=value[; name=value ...]" - replaces previous cookies...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs else if ((field = http_field(line)) == HTTP_FIELD_UNKNOWN)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpUpdate: unknown field %s seen!\n", line));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * See if there was an error...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (http->error == EPIPE && http->status > HTTP_CONTINUE)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpUpdate: socket error %d - %s\n", http->error,
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * If we haven't already returned, then there is nothing new...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpDecode64()' - Base64-decode a string.
355b4669e025ff377602b6fc7caaf30dbc218371jacobschar * /* O - Decoded string */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Use the old maximum buffer size for binary compatibility...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpDecode64_2()' - Base64-decode a string.
355b4669e025ff377602b6fc7caaf30dbc218371jacobschar * /* O - Decoded string */
355b4669e025ff377602b6fc7caaf30dbc218371jacobshttpDecode64_2(char *out, /* I - String to write to */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Range check input...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Convert from base-64 to bytes...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs for (outptr = out, outend = out + *outlen - 1, pos = 0; *in != '\0'; in ++)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Decode this character into a number from 0 to 63...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Store the result in the appropriate chars...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Return the decoded string and size...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpEncode64()' - Base64-encode a string.
355b4669e025ff377602b6fc7caaf30dbc218371jacobschar * /* O - Encoded string */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpEncode64_2()' - Base64-encode a string.
355b4669e025ff377602b6fc7caaf30dbc218371jacobschar * /* O - Encoded string */
355b4669e025ff377602b6fc7caaf30dbc218371jacobshttpEncode64_2(char *out, /* I - String to write to */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs static const char base64[] = /* Base64 characters... */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "abcdefghijklmnopqrstuvwxyz"
355b4669e025ff377602b6fc7caaf30dbc218371jacobs "0123456789"
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Range check input...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Convert bytes to base-64...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs for (outptr = out, outend = out + outlen - 1; inlen > 0; in ++, inlen --)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Encode the up to 3 characters as 4 Base64 numbers...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs *outptr ++ = base64[(((in[0] & 255) << 4) | ((in[1] & 255) >> 4)) & 63];
355b4669e025ff377602b6fc7caaf30dbc218371jacobs *outptr ++ = base64[(((in[0] & 255) << 2) | ((in[1] & 255) >> 6)) & 63];
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Return the encoded string...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'httpGetLength()' - Get the amount of data remaining from the
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * content-length or transfer-encoding fields.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsint /* O - Content length */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpGetLength(http=%p), state=%d\n", http, http->state));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (strcasecmp(http->fields[HTTP_FIELD_TRANSFER_ENCODING], "chunked") == 0)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * The following is a hack for HTTP servers that don't send a
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * content-length or transfer-encoding field...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * If there is no content-length then the connection must close
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * after the transfer is complete...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (http->fields[HTTP_FIELD_CONTENT_LENGTH][0] == '\0')
355b4669e025ff377602b6fc7caaf30dbc218371jacobs http->data_remaining = atoi(http->fields[HTTP_FIELD_CONTENT_LENGTH]);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("httpGetLength: content_length=%d\n", http->data_remaining));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'http_field()' - Return the field index for a field name.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs int i; /* Looping var */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs for (i = 0; i < HTTP_FIELD_MAX; i ++)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'http_send()' - Send a request with all fields and the trailing blank line.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsstatic int /* O - 0 on success, non-zero on error */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs int i; /* Looping var */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs static const char * const codes[] =
355b4669e025ff377602b6fc7caaf30dbc218371jacobs { /* Request code strings */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs /* Hex digits */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("http_send(http=%p, request=HTTP_%s, uri=\"%s\")\n",
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Encode the URI as needed...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs for (ptr = buf; *uri != '\0' && ptr < (buf + sizeof(buf) - 1); uri ++)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * See if we had an error the last time around; if so, reconnect...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (http->status == HTTP_ERROR || http->status >= HTTP_BAD_REQUEST)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Send the request header...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (http->encryption == HTTP_ENCRYPT_REQUIRED && !http->tls)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs httpSetField(http, HTTP_FIELD_CONNECTION, "Upgrade");
355b4669e025ff377602b6fc7caaf30dbc218371jacobs httpSetField(http, HTTP_FIELD_UPGRADE, "TLS/1.0,SSL/2.0,SSL/3.0");
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (httpPrintf(http, "%s %s HTTP/1.1\r\n", codes[request], buf) < 1)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs for (i = 0; i < HTTP_FIELD_MAX; i ++)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("%s: %s\n", http_fields[i], http->fields[i]));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (httpPrintf(http, "%s: %s\r\n", http_fields[i], http->fields[i]) < 1)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'http_wait()' - Wait for data available on a connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsstatic int /* O - 1 if data is available, 0 otherwise */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* !WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs DEBUG_printf(("http_wait(http=%p, msec=%d)\n", http, msec));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Check the SSL/TLS buffers for data first...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (gnutls_record_check_pending(((http_tls_t *)(http->tls))->session))
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if (!SSLGetBufferedReadSize((SSLContextRef)http->tls, &bytes) && bytes > 0)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs# endif /* HAVE_LIBSSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Then try doing a select() to poll the socket...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Windows has a fixed-size select() structure, different (surprise,
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * surprise!) from all UNIX implementations. Just allocate this
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * fixed structure...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Allocate the select() input set based upon the max number of file
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * descriptors available for this process...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs nfds = select(http->fd + 1, http->input_set, NULL, NULL, &timeout);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs nfds = select(http->fd + 1, http->input_set, NULL, NULL, NULL);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (nfds > 0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'http_upgrade()' - Force upgrade to TLS encryption.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsstatic int /* O - Status of connection */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Copy the HTTP data to a local variable so we can do the OPTIONS
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * request without interfering with the existing request data...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Send an OPTIONS request to the server, requiring SSL or TLS
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * encryption on the link...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs httpSetField(&myhttp, HTTP_FIELD_CONNECTION, "upgrade");
355b4669e025ff377602b6fc7caaf30dbc218371jacobs httpSetField(&myhttp, HTTP_FIELD_UPGRADE, "TLS/1.0, SSL/2.0, SSL/3.0");
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Wait for the secure connection...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Copy the HTTP data back over, if any...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs memcpy(http->nonce, myhttp.nonce, sizeof(http->nonce));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * See if we actually went secure...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * Server does not support HTTP upgrade...
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'http_setup_ssl()' - Set up SSL/TLS support on a connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsstatic int /* O - Status of connection */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs /* TLS credentials */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs# endif /* HAVE_LIBSSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs SSL_CTX_set_options(context, SSL_OP_NO_SSLv2); /* Only use SSLv3 or TLS */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs printf("http_setup_ssl: %s\n", ERR_error_string(error, NULL));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs# endif /* DEBUG */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs# endif /* WIN32 */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs credentials = (gnutls_certificate_client_credentials *)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs malloc(sizeof(gnutls_certificate_client_credentials));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs gnutls_certificate_allocate_credentials(credentials);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs gnutls_credentials_set(conn->session, GNUTLS_CRD_CERTIFICATE, *credentials);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs if ((gnutls_handshake(conn->session)) != GNUTLS_E_SUCCESS)
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs error = SSLSetIOFuncs(conn, CDSAReadFunc, CDSAWriteFunc);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs error = SSLSetConnection(conn, (SSLConnectionRef)http->fd);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs# endif /* HAVE_CDSASSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'http_shutdown_ssl()' - Shut down SSL/TLS on a connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobs /* TLS credentials */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs credentials = (gnutls_certificate_client_credentials *)(conn->credentials);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs# endif /* HAVE_LIBSSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'http_read_ssl()' - Read from a SSL/TLS connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsstatic int /* O - Bytes read */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (gnutls_record_recv(((http_tls_t *)(http->tls))->session, buf, len));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs error = SSLRead((SSLContextRef)http->tls, buf, len, &processed);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs# endif /* HAVE_LIBSSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'http_write_ssl()' - Write to a SSL/TLS connection.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsstatic int /* O - Bytes written */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (gnutls_record_send(((http_tls_t *)(http->tls))->session, buf, len));
355b4669e025ff377602b6fc7caaf30dbc218371jacobs error = SSLWrite((SSLContextRef)http->tls, buf, len, &processed);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs# endif /* HAVE_LIBSSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'CDSAReadFunc()' - Read function for CDSA decryption code.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsCDSAReadFunc(SSLConnectionRef connection, /* I - SSL/TLS connection */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs httpDumpData(stdout, "CDSAReadFunc:", data, *dataLength);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * 'CDSAWriteFunc()' - Write function for CDSA encryption code.
355b4669e025ff377602b6fc7caaf30dbc218371jacobsCDSAWriteFunc(SSLConnectionRef connection, /* I - SSL/TLS connection */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (0);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs return (-1);
355b4669e025ff377602b6fc7caaf30dbc218371jacobs# endif /* HAVE_CDSASSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs#endif /* HAVE_SSL */
355b4669e025ff377602b6fc7caaf30dbc218371jacobs * End of "$Id: http.c 148 2006-04-25 16:54:17Z njacobs $"