[BACK] Return to HTTP.c CVS log [TXT] [DIR] Up to [Public] / libwww / Library / src

Annotation of libwww/Library/src/HTTP.c, revision 1.103

1.74 frystyk 1: /*                                   HTTP.c
 2: **   MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: **   (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: **   Please first read the full copyright statement in the file COPYRIGH.
 6: **
 7: **   This module implments the HTTP protocol as a state machine
1.55 frystyk 8: **
 9: ** History:
1.59 frystyk 10: **  < May 24 94 ??  Unknown - but obviously written
1.56 frystyk 11: **   May 24 94 HF  Made reentrent and cleaned up a bit. Implemented
 12: **           Forward, redirection, error handling and referer field
1.67 duns 13: **   8 Jul 94 FM  Insulate free() from _free structure element.
1.71 frystyk 14: **   Jul 94 HFN   Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 15: **
1.1 timbl 16: */
 17: 
1.78 frystyk 18: /* Library include files */
 19: #include "tcp.h"
1.1 timbl 20: #include "HTUtils.h"
1.78 frystyk 21: #include "HTString.h"
1.71 frystyk 22: #include "HTParse.h"
1.1 timbl 23: #include "HTTCP.h"
 24: #include "HTFormat.h"
1.85 frystyk 25: #include "HTSocket.h"
1.94 frystyk 26: #include "HTReqMan.h"
1.2 timbl 27: #include "HTAlert.h"
1.14 luotonen 28: #include "HTAABrow.h"     /* Access Authorization */
1.20 timbl 29: #include "HTTee.h"       /* Tee off a cache stream */
1.78 frystyk 30: #include "HTFWrite.h"     /* Write to cache file */
1.90 frystyk 31: #include "HTCache.h"
1.80 frystyk 32: #include "HTWriter.h"
1.54 luotonen 33: #include "HTError.h"
1.94 frystyk 34: #include "HTAccess.h"
1.55 frystyk 35: #include "HTChunk.h"
1.71 frystyk 36: #include "HTGuess.h"
1.95 frystyk 37: #include "HTNetMan.h"
1.80 frystyk 38: #include "HTTPReq.h"
1.55 frystyk 39: #include "HTTP.h"                       /* Implements */
 40: 
 41: /* Macros and other defines */
1.94 frystyk 42: #ifndef HTTP_PORT
 43: #define HTTP_PORT 80  /* Allocated to http by Jon Postel/ISI 24-Jan-92 */
 44: #endif
 45: 
1.71 frystyk 46: #define PUTC(c)        (*me->target->isa->put_character)(me->target, c)
 47: #define PUTS(s)        (*me->target->isa->put_string)(me->target, s)
 48: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
 49: #define FREE_TARGET  (*me->target->isa->_free)(me->target)
1.74 frystyk 50: #define ABORT_TARGET  (*me->target->isa->abort)(me->target, e)
1.2 timbl 51: 
1.59 frystyk 52: /* Type definitions and global variables etc. local to this module */
1.94 frystyk 53: 
 54: /* Final states have negative value */
1.59 frystyk 55: typedef enum _HTTPState {
1.81 frystyk 56:   HTTP_RETRY     = -4,
1.71 frystyk 57:   HTTP_ERROR     = -3,
 58:   HTTP_NO_DATA    = -2,
 59:   HTTP_GOT_DATA   = -1,
 60:   HTTP_BEGIN     = 0,
 61:   HTTP_NEED_CONNECTION,
 62:   HTTP_NEED_REQUEST,
 63:   HTTP_REDIRECTION,
1.91 frystyk 64:   HTTP_NOT_MODIFIED,
 65:   HTTP_EXPIRED,
1.71 frystyk 66:   HTTP_AA
1.59 frystyk 67: } HTTPState;
1.55 frystyk 68: 
1.94 frystyk 69: /* This is the context structure for the this module */
1.55 frystyk 70: typedef struct _http_info {
1.81 frystyk 71:   HTTPState     state;      /* Current State of the connection */
 72:   HTTPState     next;                 /* Next state */
1.55 frystyk 73: } http_info;
 74: 
1.88 frystyk 75: #define MAX_STATUS_LEN     100  /* Max nb of chars to check StatusLine */
1.55 frystyk 76: 
1.71 frystyk 77: struct _HTStream {
 78:   CONST HTStreamClass *   isa;
 79:   HTStream *         target;
 80:   HTRequest *            request;
 81:   http_info *            http;
 82:   HTSocketEOL            state;
 83:   BOOL            transparent;
1.81 frystyk 84:   char *           version;       /* Should we save this? */
1.71 frystyk 85:   int                status;
1.81 frystyk 86:   char *           reason;
1.71 frystyk 87:   char            buffer[MAX_STATUS_LEN+1];
1.80 frystyk 88:   int                buflen;
1.71 frystyk 89: };
1.21 luotonen 90: 
1.71 frystyk 91: /* ------------------------------------------------------------------------- */
 92: /*                Help Functions               */
 93: /* ------------------------------------------------------------------------- */
1.21 luotonen 94: 
1.94 frystyk 95: /*   HTTPCleanup
 96: **   -----------
1.55 frystyk 97: **   This function closes the connection and frees memory.
1.94 frystyk 98: **   Returns YES on OK, else NO
1.1 timbl 99: */
1.94 frystyk 100: PRIVATE int HTTPCleanup (HTRequest *req, int status)
1.1 timbl 101: {
1.94 frystyk 102:   HTNet *net = req->net;
 103:   http_info *http = (http_info *) net->context;
1.80 frystyk 104: 
1.94 frystyk 105:   /* Free stream with data TO network */
 106:   if (!HTRequest_isDestination(req) && req->input_stream) {
 107:    if (status == HT_INTERRUPTED)
 108:      (*req->input_stream->isa->abort)(req->input_stream, NULL);
 109:    else
 110:      (*req->input_stream->isa->_free)(req->input_stream);
 111:   }
1.88 frystyk 112: 
1.94 frystyk 113:   /* Remove the request object and our own context structure for http */
 114:   HTNet_delete(net, status);
 115:   FREE(http);
 116:   return YES;
1.55 frystyk 117: }
 118: 
 119: 
1.94 frystyk 120: PRIVATE BOOL HTTPAuthentication (HTRequest * request)
1.71 frystyk 121: {
 122:   HTAAScheme scheme;
 123:   HTList *valid_schemes = HTList_new();
 124:   HTAssocList **scheme_specifics = NULL;
1.76 frystyk 125:   char *tmplate = NULL;
1.71 frystyk 126: 
 127:   if (request->WWWAAScheme) {
 128:    if ((scheme = HTAAScheme_enum(request->WWWAAScheme)) != HTAA_UNKNOWN) {
 129:      HTList_addObject(valid_schemes, (void *) scheme);
 130:      if (!scheme_specifics) {
 131:        int i;
 132:        scheme_specifics = (HTAssocList**)
 133:          malloc(HTAA_MAX_SCHEMES * sizeof(HTAssocList*));
 134:        if (!scheme_specifics)
 135:          outofmem(__FILE__, "HTTPAuthentication");
 136:        for (i=0; i < HTAA_MAX_SCHEMES; i++)
 137:          scheme_specifics[i] = NULL;
 138:      }
 139:      scheme_specifics[scheme] = HTAA_parseArgList(request->WWWAARealm);
 140:    } else if (PROT_TRACE) {
 141:      HTErrorAdd(request, ERR_INFO, NO, HTERR_UNKNOWN_AA,
 142:            (void *) request->WWWAAScheme, 0, "HTTPAuthentication");
 143:      return NO;
 144:    }
 145:   }
 146:   if (request->WWWprotection) {
 147:    if (PROT_TRACE)
1.102 frystyk 148:      TTYPrint(TDEST, "Protection template set to `%s'\n",
1.71 frystyk 149:          request->WWWprotection);
1.76 frystyk 150:    StrAllocCopy(tmplate, request->WWWprotection);
1.71 frystyk 151:   }
 152:   request->valid_schemes = valid_schemes;
 153:   request->scheme_specifics = scheme_specifics;
1.76 frystyk 154:   request->prot_template = tmplate;
1.71 frystyk 155:   return YES;
 156: }
 157: 
 158: 
 159: /*
 160: **   This is a big switch handling all HTTP return codes. It puts in any
 161: **   appropiate error message and decides whether we should expect data
1.78 frystyk 162: **   or not.
1.55 frystyk 163: */
1.100 frystyk 164: PRIVATE void HTTPNextState (HTStream * me)
1.55 frystyk 165: {
1.71 frystyk 166:   switch (me->status) {
 167: 
1.78 frystyk 168:    case 0:                        /* 0.9 response */
 169:    case 200:
 170:    case 201:
 171:    case 202:
 172:    case 203:
1.81 frystyk 173:    me->http->next = HTTP_GOT_DATA;
1.71 frystyk 174:    break;
1.78 frystyk 175: 
 176:    case 204:                           /* No Response */
1.81 frystyk 177:    me->http->next = HTTP_NO_DATA;
1.71 frystyk 178:    break;
1.78 frystyk 179: 
1.71 frystyk 180:    case 301:                              /* Moved */
 181:    case 302:                              /* Found */
1.81 frystyk 182:    me->http->next = HTTP_REDIRECTION;
1.71 frystyk 183:    break;
1.55 frystyk 184:    
1.71 frystyk 185:    case 303:                              /* Method */
1.92 frystyk 186:    HTAlert(me->request,
 187:        "This client doesn't support automatic redirection of type `Method'");
1.81 frystyk 188:    me->http->next = HTTP_ERROR;
1.71 frystyk 189:    break;
1.91 frystyk 190: 
 191:    case 304:                           /* Not Modified */
 192:    me->http->next = HTTP_NOT_MODIFIED;
 193:    break;
1.55 frystyk 194:    
1.78 frystyk 195:    case 400:                           /* Bad Request */
 196:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
1.100 frystyk 197:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 198:    me->http->next = HTTP_ERROR;
1.71 frystyk 199:    break;
1.70 howcome 200: 
1.71 frystyk 201:    case 401:
1.78 frystyk 202:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
1.100 frystyk 203:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 204:    me->http->next = HTTP_AA;
1.71 frystyk 205:    break;
 206:    
 207:    case 402:                         /* Payment required */
1.78 frystyk 208:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
1.100 frystyk 209:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 210:    me->http->next = HTTP_ERROR;
1.71 frystyk 211:    break;
1.55 frystyk 212:    
1.71 frystyk 213:    case 403:                            /* Forbidden */
1.78 frystyk 214:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
1.100 frystyk 215:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 216:    me->http->next = HTTP_ERROR;
1.71 frystyk 217:    break;
1.55 frystyk 218:    
1.71 frystyk 219:    case 404:                            /* Not Found */
1.78 frystyk 220:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
1.100 frystyk 221:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 222:    me->http->next = HTTP_ERROR;
1.71 frystyk 223:    break;
 224:    
1.78 frystyk 225:    case 405:                           /* Not Allowed */
 226:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
1.100 frystyk 227:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 228:    me->http->next = HTTP_ERROR;
1.78 frystyk 229:    break;
 230: 
 231:    case 406:                         /* None Acceptable */
 232:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
1.100 frystyk 233:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 234:    me->http->next = HTTP_ERROR;
1.78 frystyk 235:    break;
 236: 
 237:    case 407:                  /* Proxy Authentication Required */
 238:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_PROXY,
1.100 frystyk 239:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 240:    me->http->next = HTTP_ERROR;
1.78 frystyk 241:    break;
 242: 
 243:    case 408:                         /* Request Timeout */
 244:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
1.100 frystyk 245:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 246:    me->http->next = HTTP_ERROR;
1.78 frystyk 247:    break;
 248: 
1.71 frystyk 249:    case 500:
1.78 frystyk 250:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
1.100 frystyk 251:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 252:    me->http->next = HTTP_ERROR;
1.78 frystyk 253:    break;
 254:    
1.71 frystyk 255:    case 501:
1.78 frystyk 256:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
1.100 frystyk 257:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 258:    me->http->next = HTTP_ERROR;
1.78 frystyk 259:    break;
 260: 
 261:    case 502:
 262:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
1.100 frystyk 263:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 264:    me->http->next = HTTP_ERROR;
1.78 frystyk 265:    break;
 266: 
 267:    case 503:
 268:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_DOWN,
1.100 frystyk 269:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 270: 
 271:    /* If Retry-After header is found then return HT_RETRY else HT_ERROR */
 272:    if (me->request->retry_after)
 273:      me->http->next = HTTP_RETRY;
 274:    else
 275:      me->http->next = HTTP_ERROR;
1.78 frystyk 276:    break;
 277: 
 278:    case 504:
 279:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
1.100 frystyk 280:          me->reason, (int) strlen(me->reason), "HTTPNextState");
1.81 frystyk 281:     me->http->next = HTTP_ERROR;
1.71 frystyk 282:    break;
1.78 frystyk 283: 
1.71 frystyk 284:    default:                        /* bad number */
 285:    HTErrorAdd(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.100 frystyk 286:          (void *) me->buffer, me->buflen, "HTTPNextState");
1.81 frystyk 287:    me->http->next = HTTP_ERROR;
1.71 frystyk 288:    break;
1.55 frystyk 289:   }
 290: }
 291: 
1.71 frystyk 292: /* ------------------------------------------------------------------------- */
 293: /*             HTTP Status Line Stream             */
 294: /* ------------------------------------------------------------------------- */
1.55 frystyk 295: 
1.71 frystyk 296: /*
1.80 frystyk 297: **   Analyse the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 298: **   then create a MIME-stream, else create a Guess stream to find out
 299: **   what the 0.9 server is sending. We need to copy the buffer as we don't
 300: **   know if we can modify the contents or not.
1.78 frystyk 301: **
 302: **   Stream handling is a function of the status code returned from the 
 303: **   server:
 304: **       200:   Use `output_stream' in HTRequest structure
1.94 frystyk 305: **       else:  Use `debug_stream' in HTRequest structure
1.80 frystyk 306: **
 307: **   Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 308: */
1.100 frystyk 309: PRIVATE int stream_pipe (HTStream * me)
1.56 frystyk 310: {
1.71 frystyk 311:   HTRequest *req = me->request;
1.95 frystyk 312:   HTNet *net = req->net;
1.80 frystyk 313:   if (me->target) {
 314:    int status = PUTBLOCK(me->buffer, me->buflen);
 315:    if (status == HT_OK)
 316:      me->transparent = YES;
 317:    return status;
1.88 frystyk 318:   } else if (HTRequest_isSource(req) && !req->output_stream) {
 319:    /*
 320:    ** We need to wait for the destinations to get ready
 321:    */
 322:    return HT_WOULD_BLOCK;
1.80 frystyk 323:   }
1.88 frystyk 324:    
1.81 frystyk 325:   if (strncasecomp(me->buffer, "http/", 5)) {
1.80 frystyk 326:    int status;
 327:    HTErrorAdd(req, ERR_INFO, NO, HTERR_HTTP09,
 328:          (void *) me->buffer, me->buflen, "HTTPStatusStream");
 329:    me->target = HTGuess_new(req, NULL, WWW_UNKNOWN,
 330:                 req->output_format, req->output_stream);
1.88 frystyk 331:    me->http->next = HTTP_GOT_DATA;
1.80 frystyk 332:    if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
 333:      me->transparent = YES;
1.98 frystyk 334:    HTDNS_setServerVersion(net->dns, HTTP_09);
1.80 frystyk 335:    return status;
 336:   } else {
1.81 frystyk 337:    char *ptr = me->buffer+5;           /* Skip the HTTP part */
 338:    me->version = HTNextField(&ptr);
1.95 frystyk 339: 
 340:    /* here we want to find out when to use persistent connection */
1.98 frystyk 341:    HTDNS_setServerVersion(net->dns, HTTP_10);
1.95 frystyk 342: 
1.81 frystyk 343:    me->status = atoi(HTNextField(&ptr));
 344:    me->reason = ptr;
 345:    if ((ptr = strchr(me->reason, '\r')) != NULL)   /* Strip \r and \n */
 346:      *ptr = '0円';
 347:    else if ((ptr = strchr(me->reason, '\n')) != NULL)
 348:      *ptr = '0円';
 349: 
 350:    /* Set up the streams */
 351:    if (me->status==200) {
1.80 frystyk 352:      HTStream *s;
1.103 ! frystyk 353:      me->target = HTStreamStack(WWW_MIME, req->output_format,
 ! 354:                    req->output_stream, req, NO);
1.80 frystyk 355:      
1.103 ! frystyk 356:      /* howcome: test for return value from HTCacheWriter 12/1/95 */
 ! 357:      if (req->method==METHOD_GET && HTCache_isEnabled() &&
 ! 358:        (s = HTCacheWriter(req, NULL, WWW_MIME, req->output_format,
 ! 359:                  req->output_stream))) {
 ! 360:        me->target = HTTee(me->target, s);
 ! 361:      }
1.94 frystyk 362:    } else if (req->debug_stream) {
 363:      me->target = HTStreamStack(WWW_MIME, req->debug_format,
 364:                    req->debug_stream, req, NO);
1.71 frystyk 365:    } else {
1.103 ! frystyk 366:      /* We still need to parser the MIME part */
 ! 367:      me->target = HTStreamStack(WWW_MIME, WWW_PRESENT,
 ! 368:                    HTBlackHole(), req, NO);
1.56 frystyk 369:    }
1.103 ! frystyk 370:    if (!me->target) me->target = HTBlackHole();
1.56 frystyk 371:   }
1.81 frystyk 372:   HTTPNextState(me);                  /* Get next state */
1.80 frystyk 373:   me->transparent = YES;
 374:   return HT_OK;
1.71 frystyk 375: }
1.56 frystyk 376: 
1.80 frystyk 377: /*
 378: **   Searches for HTTP header line until buffer fills up or a CRLF or LF
 379: **   is found
 380: */
1.100 frystyk 381: PRIVATE int HTTPStatus_put_block (HTStream * me, CONST char * b, int l)
1.71 frystyk 382: {
1.80 frystyk 383:   while (!me->transparent && l-- > 0) {
 384:    int status;
 385:    if (me->target) {
 386:      if ((status = stream_pipe(me)) != HT_OK)
 387:        return status;
 388:    } else {
 389:      *(me->buffer+me->buflen++) = *b;
 390:      if (me->state == EOL_FCR) {
 391:        if (*b == LF) { /* Line found */
 392:          if ((status = stream_pipe(me)) != HT_OK)
 393:            return status;
 394:        } else {
 395:          me->state = EOL_BEGIN;
 396:        }
 397:      } else if (*b == CR) {
 398:        me->state = EOL_FCR;
 399:      } else if (*b == LF) {
 400:        if ((status = stream_pipe(me)) != HT_OK)
 401:          return status;
1.71 frystyk 402:      } else {
1.80 frystyk 403:        if (me->buflen >= MAX_STATUS_LEN) {
 404:          if ((status = stream_pipe(me)) != HT_OK)
 405:            return status;
 406:        }
1.71 frystyk 407:      }
1.80 frystyk 408:      b++;
1.71 frystyk 409:    }
1.56 frystyk 410:   }
1.99 frystyk 411:   if (l > 0) return PUTBLOCK(b, l);
 412:   return HT_OK;
1.56 frystyk 413: }
 414: 
1.100 frystyk 415: PRIVATE int HTTPStatus_put_string (HTStream * me, CONST char * s)
1.71 frystyk 416: {
1.80 frystyk 417:   return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 418: }
1.56 frystyk 419: 
1.100 frystyk 420: PRIVATE int HTTPStatus_put_character (HTStream * me, char c)
1.71 frystyk 421: {
1.80 frystyk 422:   return HTTPStatus_put_block(me, &c, 1);
 423: }
 424: 
1.100 frystyk 425: PRIVATE int HTTPStatus_flush (HTStream * me)
1.80 frystyk 426: {
 427:   return (*me->target->isa->flush)(me->target);
1.71 frystyk 428: }
 429: 
1.100 frystyk 430: PRIVATE int HTTPStatus_free (HTStream * me)
1.71 frystyk 431: {
1.87 frystyk 432:   int status = HT_OK;
 433:   if (me->target) {
 434:    if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
 435:      return HT_WOULD_BLOCK;
 436:   }
1.71 frystyk 437:   free(me);
1.100 frystyk 438:   return status;
1.71 frystyk 439: }
 440: 
1.100 frystyk 441: PRIVATE int HTTPStatus_abort (HTStream * me, HTError e)
1.71 frystyk 442: {
 443:   if (me->target)
1.74 frystyk 444:    ABORT_TARGET;
1.71 frystyk 445:   free(me);
1.74 frystyk 446:   if (PROT_TRACE)
1.102 frystyk 447:    TTYPrint(TDEST, "HTTPStatus.. ABORTING...\n");
1.80 frystyk 448:   return HT_ERROR;
1.71 frystyk 449: }
 450: 
 451: /*   HTTPStatus Stream
 452: **   -----------------
 453: */
 454: PRIVATE CONST HTStreamClass HTTPStatusClass =
 455: {       
 456:   "HTTPStatus",
1.80 frystyk 457:   HTTPStatus_flush,
1.71 frystyk 458:   HTTPStatus_free,
 459:   HTTPStatus_abort,
 460:   HTTPStatus_put_character,
 461:   HTTPStatus_put_string,
 462:   HTTPStatus_put_block
 463: };
 464: 
1.100 frystyk 465: PRIVATE HTStream * HTTPStatus_new (HTRequest * request, http_info * http)
1.71 frystyk 466: {
 467:   HTStream * me = (HTStream *) calloc(1, sizeof(HTStream));
 468:   if (!me) outofmem(__FILE__, "HTTPStatus_new");
 469:   me->isa = &HTTPStatusClass;
 470:   me->request = request;
 471:   me->http = http;
 472:   me->state = EOL_BEGIN;
 473:   return me;
 474: }
 475: 
 476: /* ------------------------------------------------------------------------- */
 477: 
 478: /*       Load Document from HTTP Server            HTLoadHTTP
1.55 frystyk 479: **       ==============================
 480: **
 481: **   Given a hypertext address, this routine loads a document.
 482: **
 483: ** On entry,
 484: **   request        This is the request structure
1.94 frystyk 485: **   returns     HT_ERROR    Error has occured in call back
 486: **           HT_OK      Call back was OK
1.55 frystyk 487: */
1.94 frystyk 488: PUBLIC int HTLoadHTTP (SOCKET soc, HTRequest * request, SockOps ops)
1.55 frystyk 489: {
1.71 frystyk 490:   int status = HT_ERROR;
1.94 frystyk 491:   HTNet *net = request->net;       /* Generic protocol information */
1.55 frystyk 492:   http_info *http;            /* Specific protocol information */
1.17 timbl 493:   
1.94 frystyk 494:   /*
 495:   ** Initiate a new http structure and bind to request structure
 496:   ** This is actually state HTTP_BEGIN, but it can't be in the state
 497:   ** machine as we need the structure first.
 498:   */
 499:   if (ops == FD_NONE) {
1.102 frystyk 500:    if (PROT_TRACE) TTYPrint(TDEST, "HTTP........ Looking for `%s\'\n",
1.94 frystyk 501:                HTAnchor_physical(request->anchor));
1.71 frystyk 502:    if ((http = (http_info *) calloc(1, sizeof(http_info))) == NULL)
 503:      outofmem(__FILE__, "HTLoadHTTP");
 504:    http->state = HTTP_BEGIN;
1.85 frystyk 505:    http->next = HTTP_ERROR;
1.94 frystyk 506:    net->context = http;
1.98 frystyk 507:   } else if (ops == FD_CLOSE) {              /* Interrupted */
1.100 frystyk 508: #if 1
 509:    if (HTRequest_isPostWeb(request))
 510: #else
1.94 frystyk 511:    if(HTRequest_isPostWeb(request)&&!HTRequest_isMainDestination(request))
1.100 frystyk 512: #endif
1.94 frystyk 513:      HTTPCleanup(request, HT_IGNORE);
 514:    else
 515:      HTTPCleanup(request, HT_INTERRUPTED);
 516:    return HT_OK;
 517:   } else
 518:    http = (http_info *) net->context;       /* Get existing copy */
1.71 frystyk 519: 
 520:   /* Now jump into the machine. We know the state from the previous run */
 521:   while (1) {
 522:    switch (http->state) {
 523:     case HTTP_BEGIN:
 524:      /*
 525:       ** Compose authorization information (this was moved here
 526:       ** from after the making of the connection so that the connection
 527:       ** wouldn't have to wait while prompting username and password
 528:       ** from the user).             -- AL 13.10.93
 529:       */
 530:      HTAA_composeAuth(request);
 531:      if (PROT_TRACE) {
 532:        if (request->authorization)
1.102 frystyk 533:          TTYPrint(TDEST, "HTTP........ Sending Authorization: %s\n",
1.71 frystyk 534:              request->authorization);
 535:        else
1.102 frystyk 536:          TTYPrint(TDEST,
1.71 frystyk 537:              "HTTP........ Not sending authorization (yet)\n");
 538:      }
 539:      http->state = HTTP_NEED_CONNECTION;
 540:      break;
 541:      
 542:     case HTTP_NEED_CONNECTION:    /* Now let's set up a connection */
1.94 frystyk 543:      status = HTDoConnect(net, HTAnchor_physical(request->anchor),
1.95 frystyk 544:                 HTTP_PORT);
1.80 frystyk 545:      if (status == HT_OK) {
1.95 frystyk 546: 
 547:        /* Check the protocol class */
1.97 frystyk 548:        char *s_class = HTDNS_serverClass(net->dns);
 549:        if (s_class && strcasecomp(s_class, "http")) {
1.95 frystyk 550:          HTErrorAdd(request, ERR_FATAL, NO, HTERR_CLASS,
 551:                NULL, 0, "HTLoadHTTP");
 552:          http->state = HTTP_ERROR;
 553:          break;
 554:        }
 555:        HTDNS_setServerClass(net->dns, "http");
 556: 
1.71 frystyk 557:        if (PROT_TRACE)
1.102 frystyk 558:          TTYPrint(TDEST, "HTTP........ Connected, socket %d\n",
1.94 frystyk 559:              net->sockfd);
1.80 frystyk 560: 
1.88 frystyk 561:        /* Set up stream TO network */
 562:        request->input_stream =
1.100 frystyk 563:          HTTPRequest_new(request, HTBufWriter_new(net, YES, 512));
1.88 frystyk 564: 
 565:        /*
 566:        ** Set up concurrent read/write if this request isn't the
 567:        ** source for a PUT or POST. As source we don't start reading
 568:        ** before all destinations are ready. If destination then
 569:        ** register the input stream and get ready for read
 570:        */
 571:        if (HTRequest_isPostWeb(request)) {
1.94 frystyk 572:          HTEvent_Register(net->sockfd, request, (SockOps) FD_READ,
 573:                   HTLoadHTTP, net->priority);
1.88 frystyk 574:          HTRequest_linkDestination(request);
 575:        }
 576: 
 577:        /* Set up stream FROM network and corresponding read buffer */
1.94 frystyk 578:        net->isoc = HTInputSocket_new(net->sockfd);
 579:        net->target = HTImProxy ?
1.80 frystyk 580:          request->output_stream : HTTPStatus_new(request, http);
1.88 frystyk 581: 
1.71 frystyk 582:        http->state = HTTP_NEED_REQUEST;
1.96 frystyk 583:      } else if (status == HT_WOULD_BLOCK || status == HT_PERSISTENT)
1.94 frystyk 584:        return HT_OK;
1.71 frystyk 585:      else
 586:        http->state = HTTP_ERROR;       /* Error or interrupt */
 587:      break;
 588: 
1.87 frystyk 589:      /* As we can do simultanous read and write this is now one state */
1.80 frystyk 590:     case HTTP_NEED_REQUEST:
1.94 frystyk 591:      if (ops == FD_WRITE || ops == FD_NONE) {
1.88 frystyk 592:        if (HTRequest_isDestination(request)) {
1.94 frystyk 593:          HTNet *srcnet = request->source->net;
 594:          HTEvent_Register(srcnet->sockfd, request->source,
 595:                   (SockOps) FD_READ,
1.100 frystyk 596:                   srcnet->cbf, srcnet->priority);
1.94 frystyk 597:          return HT_OK;
1.80 frystyk 598:        }
1.101 frystyk 599:        status = request->PostCallback ?
 600:          request->PostCallback(request, request->input_stream) :
1.88 frystyk 601:            (*request->input_stream->isa->flush)(request->input_stream);
1.71 frystyk 602:        if (status == HT_WOULD_BLOCK)
1.94 frystyk 603:          return HT_OK;
 604:        else
 605:          ops = FD_READ;    /* Trick to ensure that we do READ */
 606:      } else if (ops == FD_READ) {
1.98 frystyk 607:        status = HTSocketRead(request, net);
1.80 frystyk 608:        if (status == HT_WOULD_BLOCK)
1.94 frystyk 609:          return HT_OK;
 610:        else if (status == HT_LOADED)
 611:          http->state = http->next;     /* Jump to next state */
1.91 frystyk 612:        else if (status == HT_RELOAD)
 613:          http->state = HTTP_EXPIRED;
1.94 frystyk 614:        else
 615:          http->state = HTTP_ERROR;
1.90 frystyk 616:      } else {
1.78 frystyk 617:        http->state = HTTP_ERROR;
1.90 frystyk 618:      }
1.71 frystyk 619:      break;
1.80 frystyk 620:      
1.91 frystyk 621:     case HTTP_NOT_MODIFIED:
 622:      http->state = HTTP_ERROR;
 623:      break;
 624: 
 625:     case HTTP_EXPIRED:
 626:      /* Dirty hack and fall through */
1.102 frystyk 627:      if (PROT_TRACE) TTYPrint(TDEST, "HTTP........ Expired\n");
1.91 frystyk 628:      request->redirect = request->anchor->address;
 629: 
1.80 frystyk 630:     case HTTP_REDIRECTION:
1.88 frystyk 631:      /* Clean up the other connections or just this one */
 632:      if (HTRequest_isPostWeb(request))
 633:        HTRequest_killPostWeb(request);
 634:      else
1.94 frystyk 635:        HTTPCleanup(request, HT_IGNORE);
1.88 frystyk 636: 
 637:      /* If we found a new URL in the response */
1.71 frystyk 638:      if (request->redirect) {
 639:        if (status == 301) {
 640:          HTErrorAdd(request, ERR_INFO, NO, HTERR_MOVED,
 641:                (void *) request->redirect,
 642:                (int) strlen(request->redirect), "HTLoadHTTP");
 643:        } else if (status == 302) {
 644:          HTErrorAdd(request, ERR_INFO, NO, HTERR_FOUND,
 645:                (void *) request->redirect,
 646:                (int) strlen(request->redirect), "HTLoadHTTP");
1.55 frystyk 647:        }
1.88 frystyk 648: 
 649:        /* If we haven't reached the limit for redirection */
1.94 frystyk 650:        if (HTRequest_retry(request)) {
1.87 frystyk 651:          HTAnchor *anchor = HTAnchor_findAddress(request->redirect);
1.88 frystyk 652:          if (HTRequest_isPostWeb(request)) {
 653:            HTRequest *dest = HTRequest_mainDestination(request);
 654:            char *msg=(char*)malloc(strlen(request->redirect)+100);
1.87 frystyk 655:            if (!msg) outofmem(__FILE__, "HTLoadHTTP");
1.88 frystyk 656:            sprintf(msg, "\nLocation of %s has changed to %s for method %s, continue operation?",
 657:                HTRequest_isDestination(request) ?
 658:                "destination" : "source", request->redirect,
 659:                HTMethod_name(request->method));
1.92 frystyk 660:            if (HTConfirm(request, msg)) {
1.87 frystyk 661:              free(msg);
1.88 frystyk 662: 
 663:              /* The new anchor inherits the Post Web */
1.91 frystyk 664:              HTAnchor_moveAllLinks((HTAnchor *) request->anchor,
 665:                         anchor);
1.88 frystyk 666:              if (HTRequest_isSource(request))
 667:                HTRequest_delete(request);
1.94 frystyk 668:              return HTCopyAnchor((HTAnchor *) anchor, dest) ?
 669:                HT_OK : HT_ERROR;
1.87 frystyk 670:            }
 671:            free(msg);
1.94 frystyk 672:            return HT_OK;
1.101 frystyk 673:          } if (request->PostCallback) {
1.87 frystyk 674: #if 0
1.94 frystyk 675:            return HTUploadAnchor((HTAnchor*) anchor, request) ?
 676:              HT_OK : HT_ERROR;
1.87 frystyk 677: #endif
 678:          } else {
1.94 frystyk 679:            return HTLoadAnchor((HTAnchor *) anchor, request) ?
 680:              HT_OK : HT_ERROR;
1.87 frystyk 681:          }
1.71 frystyk 682:        } else {
 683:          HTErrorAdd(request, ERR_FATAL, NO, HTERR_MAX_REDIRECT,
1.58 frystyk 684:                NULL, 0, "HTLoadHTTP");
1.88 frystyk 685:          if (HTRequest_isPostWeb(request)) {
 686:            BOOL main = HTRequest_isMainDestination(request);
1.91 frystyk 687:            if (HTRequest_isDestination(request)) {
 688:              HTLink *link =
 689:                HTAnchor_findLink((HTAnchor *) request->source->anchor,
 690:                         (HTAnchor *) request->anchor);
 691:              HTAnchor_setLinkResult(link, HT_LINK_ERROR);
 692:            }
1.94 frystyk 693:            HTNet_callback(request, main ? HT_ERROR : HT_IGNORE);
1.88 frystyk 694:            HTRequest_removeDestination(request);
 695:          }
1.94 frystyk 696:          return HT_OK;
1.58 frystyk 697:        }
1.71 frystyk 698:      } else {
 699:        HTErrorAdd(request, ERR_FATAL, NO, HTERR_BAD_REPLY,
 700:              NULL, 0, "HTLoadHTTP");
1.94 frystyk 701:        return HT_OK;
1.71 frystyk 702:      }
 703:      break;
1.80 frystyk 704:      
1.71 frystyk 705:     case HTTP_AA:
1.88 frystyk 706:      /* Clean up the other connections or just this one */
 707:      if (HTRequest_isPostWeb(request))
 708:        HTRequest_killPostWeb(request);
 709:      else
1.94 frystyk 710:        HTTPCleanup(request, HT_IGNORE);
1.88 frystyk 711: 
 712:      /* Ask the user for a UserID and a passwd */
 713:      if (HTTPAuthentication(request) && HTAA_retryWithAuth(request)) {
1.94 frystyk 714:        int ret;
1.88 frystyk 715:        if (HTRequest_isPostWeb(request)) {
 716:          HTRequest *dest = HTRequest_mainDestination(request);
 717:          HTAnchor_appendMethods(request->anchor, request->method);
1.94 frystyk 718:          ret=HTCopyAnchor((HTAnchor*)request->source->anchor, dest);
 719:          return ret ? HT_OK : HT_ERROR;
1.101 frystyk 720:        } else if (request->PostCallback) {
1.85 frystyk 721: #if 0
1.94 frystyk 722:          ret = HTUploadAnchor((HTAnchor*) request->anchor,request);
 723:          return ret ? HT_OK : HT_ERROR;
1.85 frystyk 724: #endif
 725:        } else {
1.94 frystyk 726:          ret = HTLoadAnchor((HTAnchor *) request->anchor, request);
 727:          return ret ? HT_OK : HT_ERROR;
1.85 frystyk 728:        }
1.88 frystyk 729:      } else {                /* If the guy said no :-( */
1.71 frystyk 730:        HTErrorAdd(request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
1.94 frystyk 731:              NULL, 0, "HTLoadHTTP");
1.88 frystyk 732:        if (HTRequest_isPostWeb(request)) {
 733:          BOOL main = HTRequest_isMainDestination(request);
1.91 frystyk 734:          if (HTRequest_isDestination(request)) {
 735:            HTLink *link =
 736:              HTAnchor_findLink((HTAnchor *) request->source->anchor,
 737:                       (HTAnchor *) request->anchor);
 738:            HTAnchor_setLinkResult(link, HT_LINK_ERROR);
 739:          }
1.94 frystyk 740:          HTNet_callback(request, main ? HT_ERROR : HT_IGNORE);
1.88 frystyk 741:          HTRequest_removeDestination(request);
 742:        }
1.94 frystyk 743:        return HT_OK;
1.71 frystyk 744:      }
 745:      break;
1.80 frystyk 746:      
1.71 frystyk 747:     case HTTP_GOT_DATA:
1.88 frystyk 748:      if (HTRequest_isPostWeb(request)) {
1.100 frystyk 749:        HTTPCleanup(request, HTRequest_isMainDestination(request) ?
 750:              HT_ERROR : HT_IGNORE);
1.91 frystyk 751:        if (HTRequest_isDestination(request)) {
 752:          HTLink *link =
 753:            HTAnchor_findLink((HTAnchor *) request->source->anchor,
 754:                     (HTAnchor *) request->anchor);
 755:          HTAnchor_setLinkResult(link, HT_LINK_OK);
 756:        }
1.88 frystyk 757:        HTRequest_removeDestination(request);
1.94 frystyk 758:      } else
 759:        HTTPCleanup(request, HT_LOADED);
 760:      return HT_OK;
1.71 frystyk 761:      break;
 762:      
 763:     case HTTP_NO_DATA:
1.88 frystyk 764:      if (HTRequest_isPostWeb(request)) {
1.100 frystyk 765:        HTTPCleanup(request, HTRequest_isMainDestination(request) ?
 766:              HT_ERROR : HT_IGNORE);
1.91 frystyk 767:        if (HTRequest_isDestination(request)) {
 768:          HTLink *link =
 769:            HTAnchor_findLink((HTAnchor *) request->source->anchor,
 770:                     (HTAnchor *) request->anchor);
 771:          HTAnchor_setLinkResult(link, HT_LINK_OK);
 772:        }
1.88 frystyk 773:        HTRequest_removeDestination(request);
1.94 frystyk 774:      } else
 775:        HTTPCleanup(request, HT_NO_DATA);
 776:      return HT_OK;
1.71 frystyk 777:      break;
1.80 frystyk 778:      
1.94 frystyk 779:     case HTTP_RETRY:
1.88 frystyk 780:      if (HTRequest_isPostWeb(request)) {
1.100 frystyk 781:        HTTPCleanup(request, HTRequest_isMainDestination(request) ?
 782:              HT_ERROR : HT_IGNORE);
1.91 frystyk 783:        HTRequest_killPostWeb(request);
 784:        if (HTRequest_isDestination(request)) {
 785:          HTLink *link = 
 786:            HTAnchor_findLink((HTAnchor*) request->source->anchor,
 787:                     (HTAnchor*) request->anchor);
 788:          HTAnchor_setLinkResult(link, HT_LINK_ERROR);
 789:        }
1.88 frystyk 790:        HTRequest_removeDestination(request);
1.91 frystyk 791:      } else
1.94 frystyk 792:        HTTPCleanup(request, HT_RETRY);
 793:      return HT_OK;
1.81 frystyk 794:      break;
 795: 
1.71 frystyk 796:     case HTTP_ERROR:
1.88 frystyk 797:      /* Clean up the other connections or just this one */
 798:      if (HTRequest_isPostWeb(request)) {
1.100 frystyk 799:        HTTPCleanup(request, HTRequest_isMainDestination(request) ?
 800:              HT_ERROR : HT_IGNORE);
1.88 frystyk 801:        HTRequest_killPostWeb(request);
1.91 frystyk 802:        if (HTRequest_isDestination(request)) {
 803:          HTLink *link =
 804:            HTAnchor_findLink((HTAnchor *) request->source->anchor,
 805:                     (HTAnchor *) request->anchor);
 806:          HTAnchor_setLinkResult(link, HT_LINK_ERROR);
 807:        }
 808:        HTRequest_removeDestination(request);
1.88 frystyk 809:      } else
1.94 frystyk 810:        HTTPCleanup(request, HT_ERROR);
 811:      return HT_OK;
1.71 frystyk 812:      break;
 813:    }
 814:   } /* End of while(1) */
 815: }  
1.88 frystyk 816: 
1.21 luotonen 817: 

Webmaster

AltStyle によって変換されたページ (->オリジナル) /