577 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			577 lines
		
	
	
		
			17 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/*****************************************************************************
 | 
						|
 *                                  _   _ ____  _     
 | 
						|
 *  Project                     ___| | | |  _ \| |    
 | 
						|
 *                             / __| | | | |_) | |    
 | 
						|
 *                            | (__| |_| |  _ <| |___ 
 | 
						|
 *                             \___|\___/|_| \_\_____|
 | 
						|
 *
 | 
						|
 *  The contents of this file are subject to the Mozilla Public License
 | 
						|
 *  Version 1.0 (the "License"); you may not use this file except in
 | 
						|
 *  compliance with the License. You may obtain a copy of the License at
 | 
						|
 *  http://www.mozilla.org/MPL/
 | 
						|
 *
 | 
						|
 *  Software distributed under the License is distributed on an "AS IS"
 | 
						|
 *  basis, WITHOUT WARRANTY OF ANY KIND, either express or implied. See the
 | 
						|
 *  License for the specific language governing rights and limitations
 | 
						|
 *  under the License.
 | 
						|
 *
 | 
						|
 *  The Original Code is Curl.
 | 
						|
 *
 | 
						|
 *  The Initial Developer of the Original Code is Daniel Stenberg.
 | 
						|
 *
 | 
						|
 *  Portions created by the Initial Developer are Copyright (C) 1998.
 | 
						|
 *  All Rights Reserved.
 | 
						|
 *
 | 
						|
 * ------------------------------------------------------------
 | 
						|
 * Main author:
 | 
						|
 * - Daniel Stenberg <daniel@haxx.se>
 | 
						|
 *
 | 
						|
 * 	http://curl.haxx.se
 | 
						|
 *
 | 
						|
 * $Source$
 | 
						|
 * $Revision$
 | 
						|
 * $Date$
 | 
						|
 * $Author$
 | 
						|
 * $State$
 | 
						|
 * $Locker$
 | 
						|
 *
 | 
						|
 * ------------------------------------------------------------
 | 
						|
 ****************************************************************************/
 | 
						|
 | 
						|
#include "setup.h"
 | 
						|
 | 
						|
/* -- WIN32 approved -- */
 | 
						|
#include <stdio.h>
 | 
						|
#include <string.h>
 | 
						|
#include <stdarg.h>
 | 
						|
#include <stdlib.h>
 | 
						|
#include <ctype.h>
 | 
						|
#include <sys/types.h>
 | 
						|
#include <sys/stat.h>
 | 
						|
 | 
						|
#include <errno.h>
 | 
						|
 | 
						|
 | 
						|
#ifdef NEED_REENTRANT
 | 
						|
#define _REENTRANT /* Necessary to use in Solaris, since the silly guys at Sun
 | 
						|
                      made the localtime_r() prototype dependent on it (or
 | 
						|
                      _POSIX_C_SOURCE or _POSIX_PTHREAD_SEMANTICS). */
 | 
						|
#endif
 | 
						|
 | 
						|
#if defined(WIN32) && !defined(__GNUC__) || defined(__MINGW32__)
 | 
						|
#include <winsock.h>
 | 
						|
#include <time.h>
 | 
						|
#include <io.h>
 | 
						|
#else
 | 
						|
#ifdef HAVE_SYS_SOCKET_H
 | 
						|
#include <sys/socket.h>
 | 
						|
#endif
 | 
						|
#ifdef HAVE_NETINET_IN_H
 | 
						|
#include <netinet/in.h>
 | 
						|
#endif
 | 
						|
#include <sys/time.h>
 | 
						|
 | 
						|
#ifdef HAVE_TIME_H
 | 
						|
#ifdef TIME_WITH_SYS_TIME
 | 
						|
#include <time.h>
 | 
						|
#endif
 | 
						|
#endif
 | 
						|
 | 
						|
#include <sys/resource.h>
 | 
						|
#ifdef HAVE_UNISTD_H
 | 
						|
#include <unistd.h>
 | 
						|
#endif
 | 
						|
#include <netdb.h>
 | 
						|
#ifdef HAVE_ARPA_INET_H
 | 
						|
#include <arpa/inet.h>
 | 
						|
#endif
 | 
						|
#ifdef HAVE_NET_IF_H
 | 
						|
#include <net/if.h>
 | 
						|
#endif
 | 
						|
#include <sys/ioctl.h>
 | 
						|
#include <signal.h>
 | 
						|
 | 
						|
#ifdef HAVE_SYS_PARAM_H
 | 
						|
#include <sys/param.h>
 | 
						|
#endif
 | 
						|
 | 
						|
#ifdef HAVE_SYS_SELECT_H
 | 
						|
#include <sys/select.h>
 | 
						|
#endif
 | 
						|
 | 
						|
 | 
						|
#endif
 | 
						|
 | 
						|
#include "urldata.h"
 | 
						|
#include <curl/curl.h>
 | 
						|
#include "download.h"
 | 
						|
#include "sendf.h"
 | 
						|
#include "formdata.h"
 | 
						|
#include "progress.h"
 | 
						|
#include "base64.h"
 | 
						|
#include "cookie.h"
 | 
						|
#include "strequal.h"
 | 
						|
#include "url.h"
 | 
						|
#include "ssluse.h"
 | 
						|
 | 
						|
#define _MPRINTF_REPLACE /* use our functions only */
 | 
						|
#include <curl/mprintf.h>
 | 
						|
 | 
						|
/* The last #include file should be: */
 | 
						|
#ifdef MALLOCDEBUG
 | 
						|
#include "memdebug.h"
 | 
						|
#endif
 | 
						|
 | 
						|
/*
 | 
						|
 * This function checks the linked list of custom HTTP headers for a particular
 | 
						|
 * header (prefix).
 | 
						|
 */
 | 
						|
bool static checkheaders(struct UrlData *data, char *thisheader)
 | 
						|
{
 | 
						|
  struct curl_slist *head;
 | 
						|
  size_t thislen = strlen(thisheader);
 | 
						|
 | 
						|
  for(head = data->headers; head; head=head->next) {
 | 
						|
    if(strnequal(head->data, thisheader, thislen)) {
 | 
						|
      return TRUE;
 | 
						|
    }
 | 
						|
  }
 | 
						|
  return FALSE;
 | 
						|
}
 | 
						|
 | 
						|
/*
 | 
						|
 * GetHTTPProxyTunnel() requires that we're connected to a HTTP proxy. This
 | 
						|
 * function will issue the necessary commands to get a seamless tunnel through
 | 
						|
 * this proxy. After that, the socket can be used just as a normal socket.
 | 
						|
 */
 | 
						|
 | 
						|
CURLcode GetHTTPProxyTunnel(struct UrlData *data, int tunnelsocket,
 | 
						|
                            char *hostname, int remote_port)
 | 
						|
{
 | 
						|
  int httperror=0;
 | 
						|
  int subversion=0;
 | 
						|
 | 
						|
  infof(data, "Establish HTTP proxy tunnel to %s:%d\n", hostname, remote_port);
 | 
						|
 | 
						|
  /* OK, now send the connect statment */
 | 
						|
  sendf(tunnelsocket, data,
 | 
						|
        "CONNECT %s:%d HTTP/1.0\015\012"
 | 
						|
        "%s"
 | 
						|
        "%s"
 | 
						|
        "\r\n",
 | 
						|
        hostname, remote_port,
 | 
						|
        (data->bits.proxy_user_passwd)?data->ptr_proxyuserpwd:"",
 | 
						|
        (data->useragent?data->ptr_uagent:"")
 | 
						|
        );
 | 
						|
 | 
						|
  /* wait for the proxy to send us a HTTP/1.0 200 OK header */
 | 
						|
  while(GetLine(tunnelsocket, data->buffer, data)) {
 | 
						|
    if('\r' == data->buffer[0])
 | 
						|
      break; /* end of headers */
 | 
						|
    if(2 == sscanf(data->buffer, "HTTP/1.%d %d",
 | 
						|
                   &subversion,
 | 
						|
                   &httperror)) {
 | 
						|
      ;
 | 
						|
    }
 | 
						|
  }
 | 
						|
  if(200 != httperror) {
 | 
						|
    if(407 == httperror)
 | 
						|
      /* Added Nov 6 1998 */
 | 
						|
      failf(data, "Proxy requires authorization!");
 | 
						|
    else 
 | 
						|
      failf(data, "Received error code %d from proxy", httperror);
 | 
						|
    return CURLE_READ_ERROR;
 | 
						|
  }
 | 
						|
 | 
						|
  infof (data, "Proxy replied to CONNECT request\n");
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 | 
						|
CURLcode http_connect(struct connectdata *conn)
 | 
						|
{
 | 
						|
  struct UrlData *data;
 | 
						|
  CURLcode result;
 | 
						|
 | 
						|
  data=conn->data;
 | 
						|
 | 
						|
  /* If we are not using a proxy and we want a secure connection,
 | 
						|
   * perform SSL initialization & connection now.
 | 
						|
   * If using a proxy with https, then we must tell the proxy to CONNECT
 | 
						|
   * us to the host we want to talk to.  Only after the connect
 | 
						|
   * has occured, can we start talking SSL
 | 
						|
   */
 | 
						|
  if (conn->protocol & PROT_HTTPS) {
 | 
						|
    if (data->bits.httpproxy) {
 | 
						|
      /* HTTPS through a proxy can only be done with a tunnel */
 | 
						|
      result = GetHTTPProxyTunnel(data, data->firstsocket,
 | 
						|
                                  data->hostname, data->remote_port);
 | 
						|
      if(CURLE_OK != result)
 | 
						|
        return result;
 | 
						|
    }
 | 
						|
 | 
						|
    /* now, perform the SSL initialization for this socket */
 | 
						|
    if(UrgSSLConnect (data)) {
 | 
						|
      return CURLE_SSL_CONNECT_ERROR;
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  if(data->bits.user_passwd && !data->bits.this_is_a_follow) {
 | 
						|
    /* Authorization: is requested, this is not a followed location, get the
 | 
						|
       original host name */
 | 
						|
    data->auth_host = strdup(data->hostname);
 | 
						|
  }
 | 
						|
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 | 
						|
/* called from curl_close() when this struct is about to get wasted, free
 | 
						|
   protocol-specific resources */
 | 
						|
CURLcode http_close(struct connectdata *conn)
 | 
						|
{
 | 
						|
  if(conn->data->auth_host)
 | 
						|
    free(conn->data->auth_host);
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 | 
						|
CURLcode http_done(struct connectdata *conn)
 | 
						|
{
 | 
						|
  struct UrlData *data;
 | 
						|
  long *bytecount = &conn->bytecount;
 | 
						|
  struct HTTP *http;
 | 
						|
 | 
						|
  data=conn->data;
 | 
						|
  http=data->proto.http;
 | 
						|
 | 
						|
  if(data->bits.http_formpost) {
 | 
						|
    *bytecount = http->readbytecount + http->writebytecount;
 | 
						|
      
 | 
						|
    FormFree(http->sendit); /* Now free that whole lot */
 | 
						|
 | 
						|
    data->fread = http->storefread; /* restore */
 | 
						|
    data->in = http->in; /* restore */
 | 
						|
  }
 | 
						|
  else if(data->bits.http_put) {
 | 
						|
    *bytecount = http->readbytecount + http->writebytecount;
 | 
						|
  }
 | 
						|
 | 
						|
  free(http);
 | 
						|
  data->proto.http=NULL; /* it is gone */
 | 
						|
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 | 
						|
 | 
						|
CURLcode http(struct connectdata *conn)
 | 
						|
{
 | 
						|
  struct UrlData *data=conn->data;
 | 
						|
  char *buf = data->buffer; /* this is a short cut to the buffer */
 | 
						|
  CURLcode result=CURLE_OK;
 | 
						|
  struct HTTP *http;
 | 
						|
  struct Cookie *co=NULL; /* no cookies from start */
 | 
						|
  char *ppath = conn->ppath; /* three previous function arguments */
 | 
						|
  char *host = conn->name;
 | 
						|
  long *bytecount = &conn->bytecount;
 | 
						|
 | 
						|
  http = (struct HTTP *)malloc(sizeof(struct HTTP));
 | 
						|
  if(!http)
 | 
						|
    return CURLE_OUT_OF_MEMORY;
 | 
						|
  memset(http, 0, sizeof(struct HTTP));
 | 
						|
  data->proto.http = http;
 | 
						|
 | 
						|
  if ( (conn->protocol&(PROT_HTTP|PROT_FTP)) &&
 | 
						|
       data->bits.upload) {
 | 
						|
    data->bits.http_put=1;
 | 
						|
  }
 | 
						|
  
 | 
						|
  /* The User-Agent string has been built in url.c already, because it might
 | 
						|
     have been used in the proxy connect, but if we have got a header with
 | 
						|
     the user-agent string specified, we erase the previously made string
 | 
						|
     here. */
 | 
						|
  if(checkheaders(data, "User-Agent:") && data->ptr_uagent) {
 | 
						|
    free(data->ptr_uagent);
 | 
						|
    data->ptr_uagent=NULL;
 | 
						|
  }
 | 
						|
 | 
						|
  if((data->bits.user_passwd) && !checkheaders(data, "Authorization:")) {
 | 
						|
    char *authorization;
 | 
						|
 | 
						|
    /* To prevent the user+password to get sent to other than the original
 | 
						|
       host due to a location-follow, we do some weirdo checks here */
 | 
						|
    if(!data->bits.this_is_a_follow ||
 | 
						|
       !data->auth_host ||
 | 
						|
       strequal(data->auth_host, data->hostname)) {
 | 
						|
      sprintf(data->buffer, "%s:%s", data->user, data->passwd);
 | 
						|
      if(base64_encode(data->buffer, strlen(data->buffer),
 | 
						|
                      &authorization) >= 0) {
 | 
						|
        data->ptr_userpwd = maprintf( "Authorization: Basic %s\015\012",
 | 
						|
                                      authorization);
 | 
						|
        free(authorization);
 | 
						|
      }
 | 
						|
    }
 | 
						|
  }
 | 
						|
  if((data->bits.set_range) && !checkheaders(data, "Range:")) {
 | 
						|
    data->ptr_rangeline = maprintf("Range: bytes=%s\015\012", data->range);
 | 
						|
  }
 | 
						|
  if((data->bits.http_set_referer) && !checkheaders(data, "Referer:")) {
 | 
						|
    data->ptr_ref = maprintf("Referer: %s\015\012", data->referer);
 | 
						|
  }
 | 
						|
  if(data->cookie && !checkheaders(data, "Cookie:")) {
 | 
						|
    data->ptr_cookie = maprintf("Cookie: %s\015\012", data->cookie);
 | 
						|
  }
 | 
						|
 | 
						|
  if(data->cookies) {
 | 
						|
    co = cookie_getlist(data->cookies,
 | 
						|
                        host,
 | 
						|
                        ppath,
 | 
						|
                        conn->protocol&PROT_HTTPS?TRUE:FALSE);
 | 
						|
  }
 | 
						|
  if ((data->bits.httpproxy) && !(conn->protocol&PROT_HTTPS))  {
 | 
						|
    /* The path sent to the proxy is in fact the entire URL */
 | 
						|
    strncpy(ppath, data->url, URL_MAX_LENGTH-1);
 | 
						|
  }
 | 
						|
  if(data->bits.http_formpost) {
 | 
						|
    /* we must build the whole darned post sequence first, so that we have
 | 
						|
       a size of the whole shebang before we start to send it */
 | 
						|
    http->sendit = getFormData(data->httppost, &http->postsize);
 | 
						|
  }
 | 
						|
 | 
						|
  if(!checkheaders(data, "Host:")) {
 | 
						|
    if(((conn->protocol&PROT_HTTPS) && (data->remote_port == PORT_HTTPS)) ||
 | 
						|
       (!(conn->protocol&PROT_HTTPS) && (data->remote_port == PORT_HTTP)) )
 | 
						|
      /* If (HTTPS on port 443) OR (non-HTTPS on port 80) then don't include
 | 
						|
         the port number in the host string */
 | 
						|
      data->ptr_host = maprintf("Host: %s\r\n", host);
 | 
						|
    else
 | 
						|
      data->ptr_host = maprintf("Host: %s:%d\r\n", host, data->remote_port);
 | 
						|
  }
 | 
						|
 | 
						|
  if(!checkheaders(data, "Pragma:"))
 | 
						|
    http->p_pragma = "Pragma: no-cache\r\n";
 | 
						|
 | 
						|
  if(!checkheaders(data, "Accept:"))
 | 
						|
    http->p_accept = "Accept: image/gif, image/x-xbitmap, image/jpeg, image/pjpeg, */*\r\n";
 | 
						|
 | 
						|
  do {
 | 
						|
    send_buffer *req_buffer;
 | 
						|
    struct curl_slist *headers=data->headers;
 | 
						|
 | 
						|
    /* initialize a dynamic send-buffer */
 | 
						|
    req_buffer = add_buffer_init();
 | 
						|
 | 
						|
    /* add the main request stuff */
 | 
						|
    add_bufferf(req_buffer,
 | 
						|
                "%s " /* GET/HEAD/POST/PUT */
 | 
						|
                "%s HTTP/1.0\r\n" /* path */
 | 
						|
                "%s" /* proxyuserpwd */
 | 
						|
                "%s" /* userpwd */
 | 
						|
                "%s" /* range */
 | 
						|
                "%s" /* user agent */
 | 
						|
                "%s" /* cookie */
 | 
						|
                "%s" /* host */
 | 
						|
                "%s" /* pragma */
 | 
						|
                "%s" /* accept */
 | 
						|
                "%s", /* referer */
 | 
						|
 | 
						|
                data->customrequest?data->customrequest:
 | 
						|
                (data->bits.no_body?"HEAD":
 | 
						|
                 (data->bits.http_post || data->bits.http_formpost)?"POST":
 | 
						|
                 (data->bits.http_put)?"PUT":"GET"),
 | 
						|
                ppath,
 | 
						|
                (data->bits.proxy_user_passwd && data->ptr_proxyuserpwd)?data->ptr_proxyuserpwd:"",
 | 
						|
                (data->bits.user_passwd && data->ptr_userpwd)?data->ptr_userpwd:"",
 | 
						|
                (data->bits.set_range && data->ptr_rangeline)?data->ptr_rangeline:"",
 | 
						|
                (data->useragent && *data->useragent && data->ptr_uagent)?data->ptr_uagent:"",
 | 
						|
                (data->ptr_cookie?data->ptr_cookie:""), /* Cookie: <data> */
 | 
						|
                (data->ptr_host?data->ptr_host:""), /* Host: host */
 | 
						|
                http->p_pragma?http->p_pragma:"",
 | 
						|
                http->p_accept?http->p_accept:"",
 | 
						|
                (data->bits.http_set_referer && data->ptr_ref)?data->ptr_ref:"" /* Referer: <data> <CRLF> */
 | 
						|
                );
 | 
						|
 | 
						|
    if(co) {
 | 
						|
      int count=0;
 | 
						|
      /* now loop through all cookies that matched */
 | 
						|
      while(co) {
 | 
						|
        if(co->value && strlen(co->value)) {
 | 
						|
          if(0 == count) {
 | 
						|
            add_bufferf(req_buffer, "Cookie:");
 | 
						|
          }
 | 
						|
          add_bufferf(req_buffer,
 | 
						|
                      "%s%s=%s", count?"; ":"", co->name, co->value);
 | 
						|
          count++;
 | 
						|
        }
 | 
						|
        co = co->next; /* next cookie please */
 | 
						|
      }
 | 
						|
      if(count) {
 | 
						|
        add_buffer(req_buffer, "\r\n", 2);
 | 
						|
      }
 | 
						|
      cookie_freelist(co); /* free the cookie list */
 | 
						|
      co=NULL;
 | 
						|
    }
 | 
						|
 | 
						|
    if(data->timecondition) {
 | 
						|
      struct tm *thistime;
 | 
						|
 | 
						|
#ifdef HAVE_LOCALTIME_R
 | 
						|
      /* thread-safe version */
 | 
						|
      struct tm keeptime;
 | 
						|
      thistime = (struct tm *)localtime_r(&data->timevalue, &keeptime);
 | 
						|
#else
 | 
						|
      thistime = localtime(&data->timevalue);
 | 
						|
#endif
 | 
						|
      if(NULL == thistime) {
 | 
						|
        failf(data, "localtime() failed!");
 | 
						|
        return CURLE_OUT_OF_MEMORY;
 | 
						|
      }
 | 
						|
 | 
						|
#ifdef HAVE_STRFTIME
 | 
						|
      /* format: "Tue, 15 Nov 1994 12:45:26 GMT" */
 | 
						|
      strftime(buf, BUFSIZE-1, "%a, %d %b %Y %H:%M:%S %Z", thistime);
 | 
						|
#else
 | 
						|
      /* TODO: Right, we *could* write a replacement here */
 | 
						|
      strcpy(buf, "no strftime() support");
 | 
						|
#endif
 | 
						|
      switch(data->timecondition) {
 | 
						|
      case TIMECOND_IFMODSINCE:
 | 
						|
      default:
 | 
						|
        add_bufferf(req_buffer,
 | 
						|
                    "If-Modified-Since: %s\r\n", buf);
 | 
						|
        break;
 | 
						|
      case TIMECOND_IFUNMODSINCE:
 | 
						|
        add_bufferf(req_buffer,
 | 
						|
                    "If-Unmodified-Since: %s\r\n", buf);
 | 
						|
        break;
 | 
						|
      case TIMECOND_LASTMOD:
 | 
						|
        add_bufferf(req_buffer,
 | 
						|
                    "Last-Modified: %s\r\n", buf);
 | 
						|
        break;
 | 
						|
      }
 | 
						|
    }
 | 
						|
 | 
						|
    while(headers) {
 | 
						|
      char *ptr = strchr(headers->data, ':');
 | 
						|
      if(ptr) {
 | 
						|
        /* we require a colon for this to be a true header */
 | 
						|
 | 
						|
        ptr++; /* pass the colon */
 | 
						|
        while(*ptr && isspace(*ptr))
 | 
						|
          ptr++;
 | 
						|
 | 
						|
        if(*ptr) {
 | 
						|
          /* only send this if the contents was non-blank */
 | 
						|
 | 
						|
          add_bufferf(req_buffer, "%s\r\n", headers->data);
 | 
						|
        }
 | 
						|
      }
 | 
						|
      headers = headers->next;
 | 
						|
    }
 | 
						|
 | 
						|
    if(data->bits.http_formpost) {
 | 
						|
      if(FormInit(&http->form, http->sendit)) {
 | 
						|
        failf(data, "Internal HTTP POST error!\n");
 | 
						|
        return CURLE_HTTP_POST_ERROR;
 | 
						|
      }
 | 
						|
 | 
						|
      http->storefread = data->fread; /* backup */
 | 
						|
      http->in = data->in; /* backup */
 | 
						|
          
 | 
						|
      data->fread =
 | 
						|
        (size_t (*)(char *, size_t, size_t, FILE *))
 | 
						|
        FormReader; /* set the read function to read from the
 | 
						|
                       generated form data */
 | 
						|
      data->in = (FILE *)&http->form;
 | 
						|
 | 
						|
      add_bufferf(req_buffer,
 | 
						|
                  "Content-Length: %d\r\n", http->postsize-2);
 | 
						|
 | 
						|
      /* set upload size to the progress meter */
 | 
						|
      pgrsSetUploadSize(data, http->postsize);
 | 
						|
 | 
						|
      data->request_size = 
 | 
						|
        add_buffer_send(data->firstsocket, conn, req_buffer);
 | 
						|
      result = Transfer(conn, data->firstsocket, -1, TRUE,
 | 
						|
                        &http->readbytecount,
 | 
						|
                          data->firstsocket,
 | 
						|
                        &http->writebytecount);
 | 
						|
      if(result) {
 | 
						|
        FormFree(http->sendit); /* free that whole lot */
 | 
						|
        return result;
 | 
						|
      }
 | 
						|
    }
 | 
						|
    else if(data->bits.http_put) {
 | 
						|
      /* Let's PUT the data to the server! */
 | 
						|
 | 
						|
      if(data->infilesize>0) {
 | 
						|
        add_bufferf(req_buffer,
 | 
						|
                    "Content-Length: %d\r\n\r\n", /* file size */
 | 
						|
                    data->infilesize );
 | 
						|
      }
 | 
						|
      else
 | 
						|
        add_bufferf(req_buffer, "\015\012");
 | 
						|
 | 
						|
      /* set the upload size to the progress meter */
 | 
						|
      pgrsSetUploadSize(data, data->infilesize);
 | 
						|
 | 
						|
      /* this sends the buffer and frees all the buffer resources */
 | 
						|
      data->request_size = 
 | 
						|
        add_buffer_send(data->firstsocket, conn, req_buffer);
 | 
						|
 | 
						|
      /* prepare for transfer */
 | 
						|
      result = Transfer(conn, data->firstsocket, -1, TRUE,
 | 
						|
                        &http->readbytecount,
 | 
						|
                        data->firstsocket,
 | 
						|
                        &http->writebytecount);
 | 
						|
      if(result)
 | 
						|
        return result;
 | 
						|
      
 | 
						|
    }
 | 
						|
    else {
 | 
						|
      if(data->bits.http_post) {
 | 
						|
        /* this is the simple POST, using x-www-form-urlencoded style */
 | 
						|
 | 
						|
        if(!checkheaders(data, "Content-Length:"))
 | 
						|
          /* we allow replacing this header, although it isn't very wise to
 | 
						|
             actually set your own */
 | 
						|
          add_bufferf(req_buffer,
 | 
						|
                      "Content-Length: %d\r\n",
 | 
						|
                      (data->postfieldsize?data->postfieldsize:
 | 
						|
                       strlen(data->postfields)) );
 | 
						|
 | 
						|
        if(!checkheaders(data, "Content-Type:"))
 | 
						|
          add_bufferf(req_buffer,
 | 
						|
                      "Content-Type: application/x-www-form-urlencoded\r\n");
 | 
						|
 | 
						|
        /* and here comes the actual data */
 | 
						|
        if(data->postfieldsize) {
 | 
						|
          add_buffer(req_buffer, "\r\n", 2);
 | 
						|
          add_buffer(req_buffer, data->postfields,
 | 
						|
                     data->postfieldsize);
 | 
						|
          add_buffer(req_buffer, "\r\n", 2);
 | 
						|
        }
 | 
						|
        else {
 | 
						|
          add_bufferf(req_buffer,
 | 
						|
                      "\r\n"
 | 
						|
                      "%s\r\n",
 | 
						|
                      data->postfields );
 | 
						|
        }
 | 
						|
      }
 | 
						|
      else
 | 
						|
        add_buffer(req_buffer, "\r\n", 2);
 | 
						|
 | 
						|
      /* issue the request */
 | 
						|
      data->request_size = 
 | 
						|
        add_buffer_send(data->firstsocket, conn, req_buffer);
 | 
						|
 | 
						|
      /* HTTP GET/HEAD download: */
 | 
						|
      result = Transfer(conn, data->firstsocket, -1, TRUE, bytecount,
 | 
						|
                        -1, NULL); /* nothing to upload */
 | 
						|
    }
 | 
						|
    if(result)
 | 
						|
      return result;
 | 
						|
  } while (0); /* this is just a left-over from the multiple document download
 | 
						|
                  attempts */
 | 
						|
 | 
						|
  return CURLE_OK;
 | 
						|
}
 | 
						|
 |