1999-12-29 15:20:26 +01:00
|
|
|
#ifndef __HTTP_H
|
|
|
|
#define __HTTP_H
|
|
|
|
|
2002-09-03 13:52:59 +02:00
|
|
|
/***************************************************************************
|
2004-06-15 10:45:22 +02:00
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
1999-12-29 15:20:26 +01:00
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2007-01-27 04:43:05 +01:00
|
|
|
* Copyright (C) 1998 - 2007, Daniel Stenberg, <daniel@haxx.se>, et al.
|
1999-12-29 15:20:26 +01:00
|
|
|
*
|
2002-09-03 13:52:59 +02:00
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
|
|
|
* are also available at http://curl.haxx.se/docs/copyright.html.
|
2004-06-15 10:45:22 +02:00
|
|
|
*
|
2001-01-03 10:29:33 +01:00
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
2002-09-03 13:52:59 +02:00
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
1999-12-29 15:20:26 +01:00
|
|
|
*
|
2001-01-03 10:29:33 +01:00
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
1999-12-29 15:20:26 +01:00
|
|
|
*
|
2001-01-03 10:29:33 +01:00
|
|
|
* $Id$
|
2002-09-03 13:52:59 +02:00
|
|
|
***************************************************************************/
|
2002-06-11 13:13:01 +02:00
|
|
|
#ifndef CURL_DISABLE_HTTP
|
2002-11-28 16:48:23 +01:00
|
|
|
bool Curl_compareheader(char *headerline, /* line to check */
|
|
|
|
const char *header, /* header keyword _with_ colon */
|
|
|
|
const char *content); /* content string to find */
|
|
|
|
|
2000-09-14 16:05:01 +02:00
|
|
|
/* ftp can use this as well */
|
2005-07-04 00:25:15 +02:00
|
|
|
CURLcode Curl_proxyCONNECT(struct connectdata *conn,
|
|
|
|
int tunnelsocket,
|
|
|
|
char *hostname, int remote_port);
|
2000-07-25 23:16:51 +02:00
|
|
|
|
2000-09-14 16:05:01 +02:00
|
|
|
/* protocol-specific functions set up to be called by the main engine */
|
2005-02-09 14:06:40 +01:00
|
|
|
CURLcode Curl_http(struct connectdata *conn, bool *done);
|
2007-01-16 23:22:10 +01:00
|
|
|
CURLcode Curl_http_done(struct connectdata *, CURLcode, bool premature);
|
2005-02-09 14:06:40 +01:00
|
|
|
CURLcode Curl_http_connect(struct connectdata *conn, bool *done);
|
2006-03-21 22:54:44 +01:00
|
|
|
CURLcode Curl_https_connecting(struct connectdata *conn, bool *done);
|
2006-04-10 17:00:53 +02:00
|
|
|
int Curl_https_getsock(struct connectdata *conn,
|
|
|
|
curl_socket_t *socks,
|
|
|
|
int numsocks);
|
1999-12-29 15:20:26 +01:00
|
|
|
|
2001-03-08 00:51:41 +01:00
|
|
|
/* The following functions are defined in http_chunks.c */
|
|
|
|
void Curl_httpchunk_init(struct connectdata *conn);
|
|
|
|
CHUNKcode Curl_httpchunk_read(struct connectdata *conn, char *datap,
|
|
|
|
ssize_t length, ssize_t *wrote);
|
2004-03-30 08:40:01 +02:00
|
|
|
|
|
|
|
/* These functions are in http.c */
|
2003-08-11 13:47:45 +02:00
|
|
|
void Curl_http_auth_stage(struct SessionHandle *data, int stage);
|
2004-05-04 09:52:53 +02:00
|
|
|
CURLcode Curl_http_input_auth(struct connectdata *conn,
|
|
|
|
int httpcode, char *header);
|
|
|
|
CURLcode Curl_http_auth_act(struct connectdata *conn);
|
2004-03-30 08:40:01 +02:00
|
|
|
|
|
|
|
int Curl_http_should_fail(struct connectdata *conn);
|
2004-06-15 10:45:22 +02:00
|
|
|
|
|
|
|
/* If only the PICKNONE bit is set, there has been a round-trip and we
|
|
|
|
selected to use no auth at all. Ie, we actively select no auth, as opposed
|
|
|
|
to not having one selected. The other CURLAUTH_* defines are present in the
|
|
|
|
public curl/curl.h header. */
|
|
|
|
#define CURLAUTH_PICKNONE (1<<30) /* don't use auth */
|
|
|
|
|
2004-11-24 17:11:35 +01:00
|
|
|
/* MAX_INITIAL_POST_SIZE indicates the number of bytes that will make the POST
|
|
|
|
data get included in the initial data chunk sent to the server. If the
|
|
|
|
data is larger than this, it will automatically get split up in multiple
|
|
|
|
system calls.
|
|
|
|
|
|
|
|
This value used to be fairly big (100K), but we must take into account that
|
|
|
|
if the server rejects the POST due for authentication reasons, this data
|
|
|
|
will always be uncondtionally sent and thus it may not be larger than can
|
|
|
|
always be afforded to send twice.
|
|
|
|
|
|
|
|
It must not be greater than 64K to work on VMS.
|
|
|
|
*/
|
2004-11-05 15:43:35 +01:00
|
|
|
#ifndef MAX_INITIAL_POST_SIZE
|
2006-08-19 00:54:57 +02:00
|
|
|
#define MAX_INITIAL_POST_SIZE (64*1024)
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef TINY_INITIAL_POST_SIZE
|
|
|
|
#define TINY_INITIAL_POST_SIZE 1024
|
2004-11-05 15:43:35 +01:00
|
|
|
#endif
|
|
|
|
|
2002-06-11 13:13:01 +02:00
|
|
|
#endif
|
1999-12-29 15:20:26 +01:00
|
|
|
#endif
|