695 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			695 lines
		
	
	
		
			20 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/***************************************************************************
 | 
						|
 *                                  _   _ ____  _
 | 
						|
 *  Project                     ___| | | |  _ \| |
 | 
						|
 *                             / __| | | | |_) | |
 | 
						|
 *                            | (__| |_| |  _ <| |___
 | 
						|
 *                             \___|\___/|_| \_\_____|
 | 
						|
 *
 | 
						|
 * Copyright (C) 1998 - 2011, Daniel Stenberg, <daniel@haxx.se>, et al.
 | 
						|
 *
 | 
						|
 * This software is licensed as described in the file COPYING, which
 | 
						|
 * you should have received as part of this distribution. The terms
 | 
						|
 * are also available at http://curl.haxx.se/docs/copyright.html.
 | 
						|
 *
 | 
						|
 * You may opt to use, copy, modify, merge, publish, distribute and/or sell
 | 
						|
 * copies of the Software, and permit persons to whom the Software is
 | 
						|
 * furnished to do so, under the terms of the COPYING file.
 | 
						|
 *
 | 
						|
 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
 | 
						|
 * KIND, either express or implied.
 | 
						|
 *
 | 
						|
 ***************************************************************************/
 | 
						|
 | 
						|
#include "setup.h"
 | 
						|
 | 
						|
#ifdef HAVE_SYS_SOCKET_H
 | 
						|
#include <sys/socket.h> /* required for send() & recv() prototypes */
 | 
						|
#endif
 | 
						|
 | 
						|
#ifdef HAVE_UNISTD_H
 | 
						|
#include <unistd.h>
 | 
						|
#endif
 | 
						|
 | 
						|
#include <curl/curl.h>
 | 
						|
#include "urldata.h"
 | 
						|
#include "sendf.h"
 | 
						|
#include "connect.h"
 | 
						|
#include "sslgen.h"
 | 
						|
#include "ssh.h"
 | 
						|
#include "multiif.h"
 | 
						|
#include "non-ascii.h"
 | 
						|
 | 
						|
#define _MPRINTF_REPLACE /* use the internal *printf() functions */
 | 
						|
#include <curl/mprintf.h>
 | 
						|
 | 
						|
/* the krb4 functions only exists for FTP and if krb4 or gssapi is defined */
 | 
						|
#if !defined(CURL_DISABLE_FTP) && (defined(HAVE_KRB4) || defined(HAVE_GSSAPI))
 | 
						|
#include "krb4.h"
 | 
						|
#else
 | 
						|
#define Curl_sec_send(a,b,c,d) -1
 | 
						|
#define Curl_sec_read(a,b,c,d) -1
 | 
						|
#endif
 | 
						|
 | 
						|
#include "curl_memory.h"
 | 
						|
#include "strerror.h"
 | 
						|
 | 
						|
/* The last #include file should be: */
 | 
						|
#include "memdebug.h"
 | 
						|
 | 
						|
#ifdef CURL_DO_LINEEND_CONV
 | 
						|
/*
 | 
						|
 * convert_lineends() changes CRLF (\r\n) end-of-line markers to a single LF
 | 
						|
 * (\n), with special processing for CRLF sequences that are split between two
 | 
						|
 * blocks of data.  Remaining, bare CRs are changed to LFs.  The possibly new
 | 
						|
 * size of the data is returned.
 | 
						|
 */
 | 
						|
static size_t convert_lineends(struct SessionHandle *data,
 | 
						|
                               char *startPtr, size_t size)
 | 
						|
{
 | 
						|
  char *inPtr, *outPtr;
 | 
						|
 | 
						|
  /* sanity check */
 | 
						|
  if((startPtr == NULL) || (size < 1)) {
 | 
						|
    return(size);
 | 
						|
  }
 | 
						|
 | 
						|
  if(data->state.prev_block_had_trailing_cr) {
 | 
						|
    /* The previous block of incoming data
 | 
						|
       had a trailing CR, which was turned into a LF. */
 | 
						|
    if(*startPtr == '\n') {
 | 
						|
      /* This block of incoming data starts with the
 | 
						|
         previous block's LF so get rid of it */
 | 
						|
      memmove(startPtr, startPtr+1, size-1);
 | 
						|
      size--;
 | 
						|
      /* and it wasn't a bare CR but a CRLF conversion instead */
 | 
						|
      data->state.crlf_conversions++;
 | 
						|
    }
 | 
						|
    data->state.prev_block_had_trailing_cr = FALSE; /* reset the flag */
 | 
						|
  }
 | 
						|
 | 
						|
  /* find 1st CR, if any */
 | 
						|
  inPtr = outPtr = memchr(startPtr, '\r', size);
 | 
						|
  if(inPtr) {
 | 
						|
    /* at least one CR, now look for CRLF */
 | 
						|
    while(inPtr < (startPtr+size-1)) {
 | 
						|
      /* note that it's size-1, so we'll never look past the last byte */
 | 
						|
      if(memcmp(inPtr, "\r\n", 2) == 0) {
 | 
						|
        /* CRLF found, bump past the CR and copy the NL */
 | 
						|
        inPtr++;
 | 
						|
        *outPtr = *inPtr;
 | 
						|
        /* keep track of how many CRLFs we converted */
 | 
						|
        data->state.crlf_conversions++;
 | 
						|
      }
 | 
						|
      else {
 | 
						|
        if(*inPtr == '\r') {
 | 
						|
          /* lone CR, move LF instead */
 | 
						|
          *outPtr = '\n';
 | 
						|
        }
 | 
						|
        else {
 | 
						|
          /* not a CRLF nor a CR, just copy whatever it is */
 | 
						|
          *outPtr = *inPtr;
 | 
						|
        }
 | 
						|
      }
 | 
						|
      outPtr++;
 | 
						|
      inPtr++;
 | 
						|
    } /* end of while loop */
 | 
						|
 | 
						|
    if(inPtr < startPtr+size) {
 | 
						|
      /* handle last byte */
 | 
						|
      if(*inPtr == '\r') {
 | 
						|
        /* deal with a CR at the end of the buffer */
 | 
						|
        *outPtr = '\n'; /* copy a NL instead */
 | 
						|
        /* note that a CRLF might be split across two blocks */
 | 
						|
        data->state.prev_block_had_trailing_cr = TRUE;
 | 
						|
      }
 | 
						|
      else {
 | 
						|
        /* copy last byte */
 | 
						|
        *outPtr = *inPtr;
 | 
						|
      }
 | 
						|
      outPtr++;
 | 
						|
    }
 | 
						|
    if(outPtr < startPtr+size)
 | 
						|
      /* tidy up by null terminating the now shorter data */
 | 
						|
      *outPtr = '\0';
 | 
						|
 | 
						|
    return(outPtr - startPtr);
 | 
						|
  }
 | 
						|
  return(size);
 | 
						|
}
 | 
						|
#endif /* CURL_DO_LINEEND_CONV */
 | 
						|
 | 
						|
/* Curl_infof() is for info message along the way */
 | 
						|
 | 
						|
void Curl_infof(struct SessionHandle *data, const char *fmt, ...)
 | 
						|
{
 | 
						|
  if(data && data->set.verbose) {
 | 
						|
    va_list ap;
 | 
						|
    size_t len;
 | 
						|
    char print_buffer[2048 + 1];
 | 
						|
    va_start(ap, fmt);
 | 
						|
    vsnprintf(print_buffer, sizeof(print_buffer), fmt, ap);
 | 
						|
    va_end(ap);
 | 
						|
    len = strlen(print_buffer);
 | 
						|
    Curl_debug(data, CURLINFO_TEXT, print_buffer, len, NULL);
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
/* Curl_failf() is for messages stating why we failed.
 | 
						|
 * The message SHALL NOT include any LF or CR.
 | 
						|
 */
 | 
						|
 | 
						|
void Curl_failf(struct SessionHandle *data, const char *fmt, ...)
 | 
						|
{
 | 
						|
  va_list ap;
 | 
						|
  size_t len;
 | 
						|
  va_start(ap, fmt);
 | 
						|
 | 
						|
  vsnprintf(data->state.buffer, BUFSIZE, fmt, ap);
 | 
						|
 | 
						|
  if(data->set.errorbuffer && !data->state.errorbuf) {
 | 
						|
    snprintf(data->set.errorbuffer, CURL_ERROR_SIZE, "%s", data->state.buffer);
 | 
						|
    data->state.errorbuf = TRUE; /* wrote error string */
 | 
						|
  }
 | 
						|
  if(data->set.verbose) {
 | 
						|
    len = strlen(data->state.buffer);
 | 
						|
    if(len < BUFSIZE - 1) {
 | 
						|
      data->state.buffer[len] = '\n';
 | 
						|
      data->state.buffer[++len] = '\0';
 | 
						|
    }
 | 
						|
    Curl_debug(data, CURLINFO_TEXT, data->state.buffer, len, NULL);
 | 
						|
  }
 | 
						|
 | 
						|
  va_end(ap);
 | 
						|
}
 | 
						|
 | 
						|
/* Curl_sendf() sends formated data to the server */
 | 
						|
CURLcode Curl_sendf(curl_socket_t sockfd, struct connectdata *conn,
 | 
						|
                    const char *fmt, ...)
 | 
						|
{
 | 
						|
  struct SessionHandle *data = conn->data;
 | 
						|
  ssize_t bytes_written;
 | 
						|
  size_t write_len;
 | 
						|
  CURLcode res = CURLE_OK;
 | 
						|
  char *s;
 | 
						|
  char *sptr;
 | 
						|
  va_list ap;
 | 
						|
  va_start(ap, fmt);
 | 
						|
  s = vaprintf(fmt, ap); /* returns an allocated string */
 | 
						|
  va_end(ap);
 | 
						|
  if(!s)
 | 
						|
    return CURLE_OUT_OF_MEMORY; /* failure */
 | 
						|
 | 
						|
  bytes_written=0;
 | 
						|
  write_len = strlen(s);
 | 
						|
  sptr = s;
 | 
						|
 | 
						|
  for(;;) {
 | 
						|
    /* Write the buffer to the socket */
 | 
						|
    res = Curl_write(conn, sockfd, sptr, write_len, &bytes_written);
 | 
						|
 | 
						|
    if(CURLE_OK != res)
 | 
						|
      break;
 | 
						|
 | 
						|
    if(data->set.verbose)
 | 
						|
      Curl_debug(data, CURLINFO_DATA_OUT, sptr, (size_t)bytes_written, conn);
 | 
						|
 | 
						|
    if((size_t)bytes_written != write_len) {
 | 
						|
      /* if not all was written at once, we must advance the pointer, decrease
 | 
						|
         the size left and try again! */
 | 
						|
      write_len -= bytes_written;
 | 
						|
      sptr += bytes_written;
 | 
						|
    }
 | 
						|
    else
 | 
						|
      break;
 | 
						|
  }
 | 
						|
 | 
						|
  free(s); /* free the output string */
 | 
						|
 | 
						|
  return res;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Curl_write() is an internal write function that sends data to the
 | 
						|
 * server. Works with plain sockets, SCP, SSL or kerberos.
 | 
						|
 *
 | 
						|
 * If the write would block (CURLE_AGAIN), we return CURLE_OK and
 | 
						|
 * (*written == 0). Otherwise we return regular CURLcode value.
 | 
						|
 */
 | 
						|
CURLcode Curl_write(struct connectdata *conn,
 | 
						|
                    curl_socket_t sockfd,
 | 
						|
                    const void *mem,
 | 
						|
                    size_t len,
 | 
						|
                    ssize_t *written)
 | 
						|
{
 | 
						|
  ssize_t bytes_written;
 | 
						|
  CURLcode curlcode = CURLE_OK;
 | 
						|
  int num = (sockfd == conn->sock[SECONDARYSOCKET]);
 | 
						|
 | 
						|
  bytes_written = conn->send[num](conn, num, mem, len, &curlcode);
 | 
						|
 | 
						|
  *written = bytes_written;
 | 
						|
  if(bytes_written >= 0)
 | 
						|
    /* we completely ignore the curlcode value when subzero is not returned */
 | 
						|
    return CURLE_OK;
 | 
						|
 | 
						|
  /* handle CURLE_AGAIN or a send failure */
 | 
						|
  switch(curlcode) {
 | 
						|
  case CURLE_AGAIN:
 | 
						|
    *written = 0;
 | 
						|
    return CURLE_OK;
 | 
						|
 | 
						|
  case CURLE_OK:
 | 
						|
    /* general send failure */
 | 
						|
    return CURLE_SEND_ERROR;
 | 
						|
 | 
						|
  default:
 | 
						|
    /* we got a specific curlcode, forward it */
 | 
						|
    return (CURLcode)curlcode;
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
ssize_t Curl_send_plain(struct connectdata *conn, int num,
 | 
						|
                        const void *mem, size_t len, CURLcode *code)
 | 
						|
{
 | 
						|
  curl_socket_t sockfd = conn->sock[num];
 | 
						|
  ssize_t bytes_written = swrite(sockfd, mem, len);
 | 
						|
 | 
						|
  *code = CURLE_OK;
 | 
						|
  if(-1 == bytes_written) {
 | 
						|
    int err = SOCKERRNO;
 | 
						|
 | 
						|
    if(
 | 
						|
#ifdef WSAEWOULDBLOCK
 | 
						|
      /* This is how Windows does it */
 | 
						|
      (WSAEWOULDBLOCK == err)
 | 
						|
#else
 | 
						|
      /* errno may be EWOULDBLOCK or on some systems EAGAIN when it returned
 | 
						|
         due to its inability to send off data without blocking. We therefor
 | 
						|
         treat both error codes the same here */
 | 
						|
      (EWOULDBLOCK == err) || (EAGAIN == err) || (EINTR == err)
 | 
						|
#endif
 | 
						|
      ) {
 | 
						|
      /* this is just a case of EWOULDBLOCK */
 | 
						|
      bytes_written=0;
 | 
						|
      *code = CURLE_AGAIN;
 | 
						|
    }
 | 
						|
    else {
 | 
						|
      failf(conn->data, "Send failure: %s",
 | 
						|
            Curl_strerror(conn, err));
 | 
						|
      conn->data->state.os_errno = err;
 | 
						|
      *code = CURLE_SEND_ERROR;
 | 
						|
    }
 | 
						|
  }
 | 
						|
  return bytes_written;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Curl_write_plain() is an internal write function that sends data to the
 | 
						|
 * server using plain sockets only. Otherwise meant to have the exact same
 | 
						|
 * proto as Curl_write()
 | 
						|
 */
 | 
						|
CURLcode Curl_write_plain(struct connectdata *conn,
 | 
						|
                          curl_socket_t sockfd,
 | 
						|
                          const void *mem,
 | 
						|
                          size_t len,
 | 
						|
                          ssize_t *written)
 | 
						|
{
 | 
						|
  ssize_t bytes_written;
 | 
						|
  CURLcode retcode;
 | 
						|
  int num = (sockfd == conn->sock[SECONDARYSOCKET]);
 | 
						|
 | 
						|
  bytes_written = Curl_send_plain(conn, num, mem, len, &retcode);
 | 
						|
 | 
						|
  *written = bytes_written;
 | 
						|
 | 
						|
  return retcode;
 | 
						|
}
 | 
						|
 | 
						|
ssize_t Curl_recv_plain(struct connectdata *conn, int num, char *buf,
 | 
						|
                        size_t len, CURLcode *code)
 | 
						|
{
 | 
						|
  curl_socket_t sockfd = conn->sock[num];
 | 
						|
  ssize_t nread = sread(sockfd, buf, len);
 | 
						|
 | 
						|
  *code = CURLE_OK;
 | 
						|
  if(-1 == nread) {
 | 
						|
    int err = SOCKERRNO;
 | 
						|
 | 
						|
    if(
 | 
						|
#ifdef WSAEWOULDBLOCK
 | 
						|
      /* This is how Windows does it */
 | 
						|
      (WSAEWOULDBLOCK == err)
 | 
						|
#else
 | 
						|
      /* errno may be EWOULDBLOCK or on some systems EAGAIN when it returned
 | 
						|
         due to its inability to send off data without blocking. We therefor
 | 
						|
         treat both error codes the same here */
 | 
						|
      (EWOULDBLOCK == err) || (EAGAIN == err) || (EINTR == err)
 | 
						|
#endif
 | 
						|
      ) {
 | 
						|
      /* this is just a case of EWOULDBLOCK */
 | 
						|
      *code = CURLE_AGAIN;
 | 
						|
    }
 | 
						|
    else {
 | 
						|
      failf(conn->data, "Recv failure: %s",
 | 
						|
            Curl_strerror(conn, err));
 | 
						|
      conn->data->state.os_errno = err;
 | 
						|
      *code = CURLE_RECV_ERROR;
 | 
						|
    }
 | 
						|
  }
 | 
						|
  return nread;
 | 
						|
}
 | 
						|
 | 
						|
static CURLcode pausewrite(struct SessionHandle *data,
 | 
						|
                           int type, /* what type of data */
 | 
						|
                           const char *ptr,
 | 
						|
                           size_t len)
 | 
						|
{
 | 
						|
  /* signalled to pause sending on this connection, but since we have data
 | 
						|
     we want to send we need to dup it to save a copy for when the sending
 | 
						|
     is again enabled */
 | 
						|
  struct SingleRequest *k = &data->req;
 | 
						|
  char *dupl = malloc(len);
 | 
						|
  if(!dupl)
 | 
						|
    return CURLE_OUT_OF_MEMORY;
 | 
						|
 | 
						|
  memcpy(dupl, ptr, len);
 | 
						|
 | 
						|
  /* store this information in the state struct for later use */
 | 
						|
  data->state.tempwrite = dupl;
 | 
						|
  data->state.tempwritesize = len;
 | 
						|
  data->state.tempwritetype = type;
 | 
						|
 | 
						|
  /* mark the connection as RECV paused */
 | 
						|
  k->keepon |= KEEP_RECV_PAUSE;
 | 
						|
 | 
						|
  DEBUGF(infof(data, "Pausing with %zu bytes in buffer for type %02x\n",
 | 
						|
               len, type));
 | 
						|
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
/* Curl_client_write() sends data to the write callback(s)
 | 
						|
 | 
						|
   The bit pattern defines to what "streams" to write to. Body and/or header.
 | 
						|
   The defines are in sendf.h of course.
 | 
						|
 | 
						|
   If CURL_DO_LINEEND_CONV is enabled, data is converted IN PLACE to the
 | 
						|
   local character encoding.  This is a problem and should be changed in
 | 
						|
   the future to leave the original data alone.
 | 
						|
 */
 | 
						|
CURLcode Curl_client_write(struct connectdata *conn,
 | 
						|
                           int type,
 | 
						|
                           char *ptr,
 | 
						|
                           size_t len)
 | 
						|
{
 | 
						|
  struct SessionHandle *data = conn->data;
 | 
						|
  size_t wrote;
 | 
						|
 | 
						|
  if(0 == len)
 | 
						|
    len = strlen(ptr);
 | 
						|
 | 
						|
  /* If reading is actually paused, we're forced to append this chunk of data
 | 
						|
     to the already held data, but only if it is the same type as otherwise it
 | 
						|
     can't work and it'll return error instead. */
 | 
						|
  if(data->req.keepon & KEEP_RECV_PAUSE) {
 | 
						|
    size_t newlen;
 | 
						|
    char *newptr;
 | 
						|
    if(type != data->state.tempwritetype)
 | 
						|
      /* major internal confusion */
 | 
						|
      return CURLE_RECV_ERROR;
 | 
						|
 | 
						|
    DEBUGASSERT(data->state.tempwrite);
 | 
						|
 | 
						|
    /* figure out the new size of the data to save */
 | 
						|
    newlen = len + data->state.tempwritesize;
 | 
						|
    /* allocate the new memory area */
 | 
						|
    newptr = realloc(data->state.tempwrite, newlen);
 | 
						|
    if(!newptr)
 | 
						|
      return CURLE_OUT_OF_MEMORY;
 | 
						|
    /* copy the new data to the end of the new area */
 | 
						|
    memcpy(newptr + data->state.tempwritesize, ptr, len);
 | 
						|
    /* update the pointer and the size */
 | 
						|
    data->state.tempwrite = newptr;
 | 
						|
    data->state.tempwritesize = newlen;
 | 
						|
 | 
						|
    return CURLE_OK;
 | 
						|
  }
 | 
						|
 | 
						|
  if(type & CLIENTWRITE_BODY) {
 | 
						|
    if((conn->handler->protocol&CURLPROTO_FTP) &&
 | 
						|
       conn->proto.ftpc.transfertype == 'A') {
 | 
						|
      /* convert from the network encoding */
 | 
						|
      CURLcode rc = Curl_convert_from_network(data, ptr, len);
 | 
						|
      /* Curl_convert_from_network calls failf if unsuccessful */
 | 
						|
      if(rc)
 | 
						|
        return rc;
 | 
						|
 | 
						|
#ifdef CURL_DO_LINEEND_CONV
 | 
						|
      /* convert end-of-line markers */
 | 
						|
      len = convert_lineends(data, ptr, len);
 | 
						|
#endif /* CURL_DO_LINEEND_CONV */
 | 
						|
    }
 | 
						|
    /* If the previous block of data ended with CR and this block of data is
 | 
						|
       just a NL, then the length might be zero */
 | 
						|
    if(len) {
 | 
						|
      wrote = data->set.fwrite_func(ptr, 1, len, data->set.out);
 | 
						|
    }
 | 
						|
    else {
 | 
						|
      wrote = len;
 | 
						|
    }
 | 
						|
 | 
						|
    if(CURL_WRITEFUNC_PAUSE == wrote)
 | 
						|
      return pausewrite(data, type, ptr, len);
 | 
						|
 | 
						|
    if(wrote != len) {
 | 
						|
      failf(data, "Failed writing body (%zu != %zu)", wrote, len);
 | 
						|
      return CURLE_WRITE_ERROR;
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  if((type & CLIENTWRITE_HEADER) &&
 | 
						|
     (data->set.fwrite_header || data->set.writeheader) ) {
 | 
						|
    /*
 | 
						|
     * Write headers to the same callback or to the especially setup
 | 
						|
     * header callback function (added after version 7.7.1).
 | 
						|
     */
 | 
						|
    curl_write_callback writeit=
 | 
						|
      data->set.fwrite_header?data->set.fwrite_header:data->set.fwrite_func;
 | 
						|
 | 
						|
    /* Note: The header is in the host encoding
 | 
						|
       regardless of the ftp transfer mode (ASCII/Image) */
 | 
						|
 | 
						|
    wrote = writeit(ptr, 1, len, data->set.writeheader);
 | 
						|
    if(CURL_WRITEFUNC_PAUSE == wrote)
 | 
						|
      /* here we pass in the HEADER bit only since if this was body as well
 | 
						|
         then it was passed already and clearly that didn't trigger the pause,
 | 
						|
         so this is saved for later with the HEADER bit only */
 | 
						|
      return pausewrite(data, CLIENTWRITE_HEADER, ptr, len);
 | 
						|
 | 
						|
    if(wrote != len) {
 | 
						|
      failf (data, "Failed writing header");
 | 
						|
      return CURLE_WRITE_ERROR;
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 | 
						|
CURLcode Curl_read_plain(curl_socket_t sockfd,
 | 
						|
                         char *buf,
 | 
						|
                         size_t bytesfromsocket,
 | 
						|
                         ssize_t *n)
 | 
						|
{
 | 
						|
  ssize_t nread = sread(sockfd, buf, bytesfromsocket);
 | 
						|
 | 
						|
  if(-1 == nread) {
 | 
						|
    int err = SOCKERRNO;
 | 
						|
#ifdef USE_WINSOCK
 | 
						|
    if(WSAEWOULDBLOCK == err)
 | 
						|
#else
 | 
						|
    if((EWOULDBLOCK == err) || (EAGAIN == err) || (EINTR == err))
 | 
						|
#endif
 | 
						|
      return CURLE_AGAIN;
 | 
						|
    else
 | 
						|
      return CURLE_RECV_ERROR;
 | 
						|
  }
 | 
						|
 | 
						|
  /* we only return number of bytes read when we return OK */
 | 
						|
  *n = nread;
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * Internal read-from-socket function. This is meant to deal with plain
 | 
						|
 * sockets, SSL sockets and kerberos sockets.
 | 
						|
 *
 | 
						|
 * Returns a regular CURLcode value.
 | 
						|
 */
 | 
						|
CURLcode Curl_read(struct connectdata *conn, /* connection data */
 | 
						|
                   curl_socket_t sockfd,     /* read from this socket */
 | 
						|
                   char *buf,                /* store read data here */
 | 
						|
                   size_t sizerequested,     /* max amount to read */
 | 
						|
                   ssize_t *n)               /* amount bytes read */
 | 
						|
{
 | 
						|
  CURLcode curlcode = CURLE_RECV_ERROR;
 | 
						|
  ssize_t nread = 0;
 | 
						|
  size_t bytesfromsocket = 0;
 | 
						|
  char *buffertofill = NULL;
 | 
						|
  bool pipelining = (conn->data->multi &&
 | 
						|
                     Curl_multi_canPipeline(conn->data->multi)) ? TRUE : FALSE;
 | 
						|
 | 
						|
  /* Set 'num' to 0 or 1, depending on which socket that has been sent here.
 | 
						|
     If it is the second socket, we set num to 1. Otherwise to 0. This lets
 | 
						|
     us use the correct ssl handle. */
 | 
						|
  int num = (sockfd == conn->sock[SECONDARYSOCKET]);
 | 
						|
 | 
						|
  *n=0; /* reset amount to zero */
 | 
						|
 | 
						|
  /* If session can pipeline, check connection buffer  */
 | 
						|
  if(pipelining) {
 | 
						|
    size_t bytestocopy = CURLMIN(conn->buf_len - conn->read_pos,
 | 
						|
                                 sizerequested);
 | 
						|
 | 
						|
    /* Copy from our master buffer first if we have some unread data there*/
 | 
						|
    if(bytestocopy > 0) {
 | 
						|
      memcpy(buf, conn->master_buffer + conn->read_pos, bytestocopy);
 | 
						|
      conn->read_pos += bytestocopy;
 | 
						|
      conn->bits.stream_was_rewound = FALSE;
 | 
						|
 | 
						|
      *n = (ssize_t)bytestocopy;
 | 
						|
      return CURLE_OK;
 | 
						|
    }
 | 
						|
    /* If we come here, it means that there is no data to read from the buffer,
 | 
						|
     * so we read from the socket */
 | 
						|
    bytesfromsocket = CURLMIN(sizerequested, BUFSIZE * sizeof (char));
 | 
						|
    buffertofill = conn->master_buffer;
 | 
						|
  }
 | 
						|
  else {
 | 
						|
    bytesfromsocket = CURLMIN((long)sizerequested,
 | 
						|
                              conn->data->set.buffer_size ?
 | 
						|
                              conn->data->set.buffer_size : BUFSIZE);
 | 
						|
    buffertofill = buf;
 | 
						|
  }
 | 
						|
 | 
						|
  nread = conn->recv[num](conn, num, buffertofill, bytesfromsocket, &curlcode);
 | 
						|
  if(nread < 0)
 | 
						|
    return curlcode;
 | 
						|
 | 
						|
  if(pipelining) {
 | 
						|
    memcpy(buf, conn->master_buffer, nread);
 | 
						|
    conn->buf_len = nread;
 | 
						|
    conn->read_pos = nread;
 | 
						|
  }
 | 
						|
 | 
						|
  *n += nread;
 | 
						|
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 | 
						|
/* return 0 on success */
 | 
						|
static int showit(struct SessionHandle *data, curl_infotype type,
 | 
						|
                  char *ptr, size_t size)
 | 
						|
{
 | 
						|
  static const char s_infotype[CURLINFO_END][3] = {
 | 
						|
    "* ", "< ", "> ", "{ ", "} ", "{ ", "} " };
 | 
						|
 | 
						|
#ifdef CURL_DOES_CONVERSIONS
 | 
						|
  char buf[BUFSIZE+1];
 | 
						|
  size_t conv_size = 0;
 | 
						|
 | 
						|
  switch(type) {
 | 
						|
  case CURLINFO_HEADER_OUT:
 | 
						|
    /* assume output headers are ASCII */
 | 
						|
    /* copy the data into my buffer so the original is unchanged */
 | 
						|
    if(size > BUFSIZE) {
 | 
						|
      size = BUFSIZE; /* truncate if necessary */
 | 
						|
      buf[BUFSIZE] = '\0';
 | 
						|
    }
 | 
						|
    conv_size = size;
 | 
						|
    memcpy(buf, ptr, size);
 | 
						|
    /* Special processing is needed for this block if it
 | 
						|
     * contains both headers and data (separated by CRLFCRLF).
 | 
						|
     * We want to convert just the headers, leaving the data as-is.
 | 
						|
     */
 | 
						|
    if(size > 4) {
 | 
						|
      size_t i;
 | 
						|
      for(i = 0; i < size-4; i++) {
 | 
						|
        if(memcmp(&buf[i], "\x0d\x0a\x0d\x0a", 4) == 0) {
 | 
						|
          /* convert everything through this CRLFCRLF but no further */
 | 
						|
          conv_size = i + 4;
 | 
						|
          break;
 | 
						|
        }
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    Curl_convert_from_network(data, buf, conv_size);
 | 
						|
    /* Curl_convert_from_network calls failf if unsuccessful */
 | 
						|
    /* we might as well continue even if it fails...   */
 | 
						|
    ptr = buf; /* switch pointer to use my buffer instead */
 | 
						|
    break;
 | 
						|
  default:
 | 
						|
    /* leave everything else as-is */
 | 
						|
    break;
 | 
						|
  }
 | 
						|
#endif /* CURL_DOES_CONVERSIONS */
 | 
						|
 | 
						|
  if(data->set.fdebug)
 | 
						|
    return (*data->set.fdebug)(data, type, ptr, size,
 | 
						|
                               data->set.debugdata);
 | 
						|
 | 
						|
  switch(type) {
 | 
						|
  case CURLINFO_TEXT:
 | 
						|
  case CURLINFO_HEADER_OUT:
 | 
						|
  case CURLINFO_HEADER_IN:
 | 
						|
    fwrite(s_infotype[type], 2, 1, data->set.err);
 | 
						|
    fwrite(ptr, size, 1, data->set.err);
 | 
						|
#ifdef CURL_DOES_CONVERSIONS
 | 
						|
    if(size != conv_size) {
 | 
						|
      /* we had untranslated data so we need an explicit newline */
 | 
						|
      fwrite("\n", 1, 1, data->set.err);
 | 
						|
    }
 | 
						|
#endif
 | 
						|
    break;
 | 
						|
  default: /* nada */
 | 
						|
    break;
 | 
						|
  }
 | 
						|
  return 0;
 | 
						|
}
 | 
						|
 | 
						|
int Curl_debug(struct SessionHandle *data, curl_infotype type,
 | 
						|
               char *ptr, size_t size,
 | 
						|
               struct connectdata *conn)
 | 
						|
{
 | 
						|
  int rc;
 | 
						|
  if(data->set.printhost && conn && conn->host.dispname) {
 | 
						|
    char buffer[160];
 | 
						|
    const char *t=NULL;
 | 
						|
    const char *w="Data";
 | 
						|
    switch (type) {
 | 
						|
    case CURLINFO_HEADER_IN:
 | 
						|
      w = "Header";
 | 
						|
    case CURLINFO_DATA_IN:
 | 
						|
      t = "from";
 | 
						|
      break;
 | 
						|
    case CURLINFO_HEADER_OUT:
 | 
						|
      w = "Header";
 | 
						|
    case CURLINFO_DATA_OUT:
 | 
						|
      t = "to";
 | 
						|
      break;
 | 
						|
    default:
 | 
						|
      break;
 | 
						|
    }
 | 
						|
 | 
						|
    if(t) {
 | 
						|
      snprintf(buffer, sizeof(buffer), "[%s %s %s]", w, t,
 | 
						|
               conn->host.dispname);
 | 
						|
      rc = showit(data, CURLINFO_TEXT, buffer, strlen(buffer));
 | 
						|
      if(rc)
 | 
						|
        return rc;
 | 
						|
    }
 | 
						|
  }
 | 
						|
  rc = showit(data, type, ptr, size);
 | 
						|
  return rc;
 | 
						|
}
 |