[BACK] Return to HTTP.c CVS log [TXT] [DIR] Up to [Public] / libwww / Library / src

Annotation of libwww/Library/src/HTTP.c, revision 1.179

1.74 frystyk 1: /*                                   HTTP.c
 2: **   MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: **   (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: **   Please first read the full copyright statement in the file COPYRIGH.
1.179 ! frystyk 6: **   @(#) $Id: HTTP.c,v 1.178 1999年02月22日 22:10:12 frystyk Exp $
1.74 frystyk 7: **
 8: **   This module implments the HTTP protocol as a state machine
1.55 frystyk 9: **
 10: ** History:
1.59 frystyk 11: **  < May 24 94 ??  Unknown - but obviously written
1.56 frystyk 12: **   May 24 94 HF  Made reentrent and cleaned up a bit. Implemented
 13: **           Forward, redirection, error handling and referer field
1.67 duns 14: **   8 Jul 94 FM  Insulate free() from _free structure element.
1.71 frystyk 15: **   Jul 94 HFN   Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 16: **
1.1 timbl 17: */
 18: 
1.78 frystyk 19: /* Library include files */
1.161 frystyk 20: #include "wwwsys.h"
1.123 frystyk 21: #include "WWWUtil.h"
 22: #include "WWWCore.h"
1.177 frystyk 23: #include "HTHeader.h"
 24: #include "HTMIMERq.h"
1.94 frystyk 25: #include "HTReqMan.h"
1.179 ! frystyk 26: #include "HTNetMan.h"
1.109 frystyk 27: #include "HTTPUtil.h"
1.80 frystyk 28: #include "HTTPReq.h"
1.55 frystyk 29: #include "HTTP.h"                       /* Implements */
 30: 
 31: /* Macros and other defines */
1.94 frystyk 32: #ifndef HTTP_PORT
 33: #define HTTP_PORT 80  /* Allocated to http by Jon Postel/ISI 24-Jan-92 */
 34: #endif
 35: 
1.71 frystyk 36: #define PUTC(c)        (*me->target->isa->put_character)(me->target, c)
 37: #define PUTS(s)        (*me->target->isa->put_string)(me->target, s)
 38: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
 39: #define FREE_TARGET  (*me->target->isa->_free)(me->target)
1.74 frystyk 40: #define ABORT_TARGET  (*me->target->isa->abort)(me->target, e)
1.2 timbl 41: 
1.178 frystyk 42: #ifdef HTDEBUG
1.177 frystyk 43: #include "WWWStream.h"
1.147 frystyk 44: #define HTTP_OUTPUT   "w3chttp.out"
1.162 frystyk 45: PRIVATE FILE * htfp = NULL;
1.140 frystyk 46: #endif
1.139 frystyk 47: 
1.59 frystyk 48: /* Type definitions and global variables etc. local to this module */
1.94 frystyk 49: 
 50: /* Final states have negative value */
1.59 frystyk 51: typedef enum _HTTPState {
1.167 frystyk 52:   HTTP_KILL_PIPE   = -4,
1.141 frystyk 53:   HTTP_RECOVER_PIPE = -3,
1.134 frystyk 54:   HTTP_ERROR     = -2,
 55:   HTTP_OK      = -1,
1.71 frystyk 56:   HTTP_BEGIN     = 0,
1.144 frystyk 57:   HTTP_NEED_STREAM,
1.141 frystyk 58:   HTTP_CONNECTED
1.59 frystyk 59: } HTTPState;
1.55 frystyk 60: 
1.94 frystyk 61: /* This is the context structure for the this module */
1.55 frystyk 62: typedef struct _http_info {
1.81 frystyk 63:   HTTPState     state;      /* Current State of the connection */
 64:   HTTPState     next;                 /* Next state */
1.134 frystyk 65:   int            result;   /* Result to report to the after filter */
1.139 frystyk 66:   BOOL        lock;              /* Block for writing */
1.141 frystyk 67:   HTNet *      net;
1.157 frystyk 68:   HTRequest *        request;
 69:   HTTimer *     timer;
1.165 frystyk 70:   BOOL        usedTimer;
1.55 frystyk 71: } http_info;
 72: 
1.88 frystyk 73: #define MAX_STATUS_LEN     100  /* Max nb of chars to check StatusLine */
1.55 frystyk 74: 
1.71 frystyk 75: struct _HTStream {
1.119 frystyk 76:   const HTStreamClass *   isa;
1.71 frystyk 77:   HTStream *         target;
1.157 frystyk 78:   HTStream *         info_target;  /* For 100 codes */
1.71 frystyk 79:   HTRequest *            request;
 80:   http_info *            http;
1.121 frystyk 81:   HTEOLState         state;
1.71 frystyk 82:   BOOL            transparent;
1.150 frystyk 83:   BOOL            cont;
1.81 frystyk 84:   char *           version;       /* Should we save this? */
1.71 frystyk 85:   int                status;
1.81 frystyk 86:   char *           reason;
1.71 frystyk 87:   char            buffer[MAX_STATUS_LEN+1];
1.80 frystyk 88:   int                buflen;
1.146 frystyk 89:   int                startLen;/* buflen when put_block was called */
1.71 frystyk 90: };
1.21 luotonen 91: 
1.123 frystyk 92: struct _HTInputStream {
 93:   const HTInputStreamClass * isa;
 94: };
 95: 
1.169 frystyk 96: /* How long to wait before writing the body in PUT and POST requests */
 97: #define DEFAULT_FIRST_WRITE_DELAY   2000
 98: #define DEFAULT_SECOND_WRITE_DELAY   3000
 99: 
 100: PRIVATE ms_t HTFirstWriteDelay = DEFAULT_FIRST_WRITE_DELAY;
 101: PRIVATE ms_t HTSecondWriteDelay = DEFAULT_SECOND_WRITE_DELAY;
 102: 
1.147 frystyk 103: #ifdef HT_NO_PIPELINING
1.156 frystyk 104: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_NO_PIPELINING;
1.147 frystyk 105: #else
1.156 frystyk 106: #ifdef HT_MUX
 107: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_MUX;
 108: #else
 109: #ifdef HT_FORCE_10
 110: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_FORCE_10;
 111: #else
 112: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_PIPELINING;
 113: #endif
 114: #endif
1.147 frystyk 115: #endif
 116: 
1.71 frystyk 117: /* ------------------------------------------------------------------------- */
 118: /*                Help Functions               */
 119: /* ------------------------------------------------------------------------- */
1.21 luotonen 120: 
1.94 frystyk 121: /*   HTTPCleanup
 122: **   -----------
1.55 frystyk 123: **   This function closes the connection and frees memory.
1.94 frystyk 124: **   Returns YES on OK, else NO
1.1 timbl 125: */
1.94 frystyk 126: PRIVATE int HTTPCleanup (HTRequest *req, int status)
1.1 timbl 127: {
1.126 frystyk 128:   HTNet * net = HTRequest_net(req);
 129:   http_info * http = (http_info *) HTNet_context(net);
 130:   HTStream * input = HTRequest_inputStream(req);
1.80 frystyk 131: 
1.178 frystyk 132:   HTTRACE(PROT_TRACE, "HTTP Clean.. Called with status %d, net %p\n" _ status _ net);
1.144 frystyk 133: 
1.164 frystyk 134:   if (status == HT_INTERRUPTED) {
 135:    HTAlertCallback * cbf = HTAlert_find(HT_PROG_INTERRUPT);
 136:    if (cbf) (*cbf)(req, HT_PROG_INTERRUPT,
 137:      HT_MSG_NULL, NULL, NULL, NULL);
1.166 frystyk 138:   } else if (status == HT_TIMEOUT) {
 139:    HTAlertCallback * cbf = HTAlert_find(HT_PROG_TIMEOUT);
 140:    if (cbf) (*cbf)(req, HT_PROG_TIMEOUT,
 141:      HT_MSG_NULL, NULL, NULL, NULL);
1.164 frystyk 142:   } 
1.166 frystyk 143: 
1.94 frystyk 144:   /* Free stream with data TO network */
1.167 frystyk 145:   if (input) {
1.166 frystyk 146:    if (status==HT_INTERRUPTED || status==HT_RECOVER_PIPE || status==HT_TIMEOUT)
1.126 frystyk 147:      (*input->isa->abort)(input, NULL);
1.94 frystyk 148:    else
1.126 frystyk 149:      (*input->isa->_free)(input);
 150:    HTRequest_setInputStream(req, NULL);
1.94 frystyk 151:   }
1.88 frystyk 152: 
1.144 frystyk 153:   /*
1.157 frystyk 154:   ** Remove if we have registered an upload function as a callback
 155:   */
 156:   if (http->timer) {
 157:    HTTimer_delete(http->timer);
 158:    http->timer = NULL;
 159:   }
 160: 
 161:   /*
1.144 frystyk 162:   ** Remove the request object and our own context structure for http.
 163:   */
 164:   if (status != HT_RECOVER_PIPE) {
1.153 frystyk 165:     HTNet_delete(net, status);
1.141 frystyk 166:    HT_FREE(http);
 167:   }
1.94 frystyk 168:   return YES;
1.55 frystyk 169: }
 170: 
1.71 frystyk 171: /*
1.130 frystyk 172: **   Informational 1xx codes are handled separately
1.136 frystyk 173: **   Returns YES if we should continue, NO if we should stop
1.55 frystyk 174: */
1.130 frystyk 175: PRIVATE BOOL HTTPInformation (HTStream * me)
1.55 frystyk 176: {
1.136 frystyk 177:   http_info * http = me->http;
1.71 frystyk 178:   switch (me->status) {
 179: 
1.136 frystyk 180:   case 100:
1.161 frystyk 181: #if 0
1.136 frystyk 182:    HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CONTINUE,
 183:              me->reason, (int) strlen(me->reason),
 184:              "HTTPInformation");
1.161 frystyk 185: #endif
1.136 frystyk 186:    return YES;
 187:    break;
 188: 
1.130 frystyk 189:   case 101:
1.136 frystyk 190:    /*
 191:    ** We consider 101 Switching as a final state and exit this request
 192:    */
1.130 frystyk 193:    HTRequest_addError(me->request, ERR_INFO, NO, HTERR_SWITCHING,
1.127 frystyk 194:              me->reason, (int) strlen(me->reason),
1.130 frystyk 195:              "HTTPInformation");
1.136 frystyk 196:    http->next = HTTP_OK;
 197:    http->result = HT_UPGRADE;
1.127 frystyk 198:    break;
 199: 
1.130 frystyk 200:   default:
1.136 frystyk 201:    HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
 202:          (void *) me->buffer, me->buflen, "HTTPNextState");
 203:    http->next = HTTP_ERROR;
 204:    http->result = HT_ERROR;
1.127 frystyk 205:    break;
1.130 frystyk 206:   }
1.136 frystyk 207:   return NO;
1.130 frystyk 208: }
 209: 
1.158 frystyk 210: 
 211: 
1.130 frystyk 212: /*
 213: **   This is a big switch handling all HTTP return codes. It puts in any
 214: **   appropiate error message and decides whether we should expect data
 215: **   or not.
 216: */
 217: PRIVATE void HTTPNextState (HTStream * me)
 218: {
1.134 frystyk 219:   http_info * http = me->http;
1.158 frystyk 220:   int error_class = me->status / 100;
 221:   switch (error_class) {
1.127 frystyk 222: 
1.158 frystyk 223:   case 0:                             /* 0.9 response */
 224:   case 2:
1.112 frystyk 225: 
1.158 frystyk 226:    switch (me->status) {
1.112 frystyk 227: 
1.158 frystyk 228:    case 201:                             /* Created */
 229:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CREATED,
 230:                me->reason, (int) strlen(me->reason),
 231:                "HTTPNextState");
 232:      http->next = HTTP_OK;
 233:      http->result = HT_CREATED;
 234:      break;
 235: 
 236:    case 202:                            /* Accepted */
 237:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_ACCEPTED,
 238:                me->reason, (int) strlen(me->reason),
 239:                "HTTPNextState");
 240:      http->next = HTTP_OK;
 241:      http->result = HT_ACCEPTED;
 242:      break;
 243: 
 244:    case 203:                  /* Non-authoritative information */
 245:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NON_AUTHORITATIVE,
 246:                me->reason, (int) strlen(me->reason),
 247:                "HTTPNextState");
 248:      http->next = HTTP_OK;
 249:      http->result = HT_LOADED;
 250:      break;
 251: 
 252:    case 204:                           /* No Response */
 253:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NO_CONTENT,
 254:                me->reason, (int) strlen(me->reason),
 255:                "HTTPNextState");
 256:      http->next = HTTP_OK;
 257:      http->result = HT_NO_DATA;
 258:      break;
 259: 
 260:    case 205:                          /* Reset Content */
 261:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_RESET,
 262:                me->reason, (int) strlen(me->reason),
 263:                "HTTPNextState");
 264:      http->next = HTTP_OK;
 265:      http->result = HT_RESET_CONTENT;
 266:      break;
 267: 
 268:    case 206:                         /* Partial Content */
 269:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL,
 270:                me->reason, (int) strlen(me->reason),
 271:                "HTTPNextState");
 272:      http->next = HTTP_OK;
 273:      http->result = HT_PARTIAL_CONTENT;
 274:      break;
 275: 
 276:    case 207:                        /* Partial Update OK */
 277:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL_OK,
 278:                me->reason, (int) strlen(me->reason),
 279:                "HTTPNextState");
 280:      http->next = HTTP_OK;
 281:      http->result = HT_PARTIAL_CONTENT;
 282:      break;
 283: 
 284:    default:
 285:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_OK,
 286:                me->reason, (int) strlen(me->reason),
 287:                "HTTPNextState");
 288:      http->next = HTTP_OK;
 289:      http->result = HT_LOADED;
 290:      break;
 291:    }
1.134 frystyk 292:    break;
 293: 
1.158 frystyk 294:   case 3:
1.134 frystyk 295: 
1.158 frystyk 296:    switch (me->status) {
1.78 frystyk 297: 
1.158 frystyk 298:    case 301:                              /* Moved */
 299:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MOVED,
 300:                me->reason, (int) strlen(me->reason),
 301:                "HTTPNextState");
 302:      http->next = HTTP_ERROR;
 303:      http->result = HT_PERM_REDIRECT;
 304:      break;
 305: 
 306:    case 302:                              /* Found */
 307:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_FOUND,
 308:                me->reason, (int) strlen(me->reason),
 309:                "HTTPNextState");
 310:      http->next = HTTP_ERROR;
 311:      http->result = HT_FOUND;
 312:      break;
1.55 frystyk 313:    
1.158 frystyk 314:    case 303:                             /* Method */
 315:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_METHOD,
 316:                me->reason, (int) strlen(me->reason),
 317:                "HTTPNextState");
 318:      http->next = HTTP_ERROR;
 319:      http->result = HT_SEE_OTHER;
 320:      break;
 321: 
 322:    case 304:                          /* Not Modified */
 323:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NOT_MODIFIED,
 324:                me->reason, (int) strlen(me->reason),
 325:                "HTTPNextState");
 326:      http->next = HTTP_OK;
 327:      http->result = HT_NOT_MODIFIED;
 328:      break;
1.134 frystyk 329:    
1.158 frystyk 330:    case 305:                            /* Use proxy */
 331:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_USE_PROXY,
 332:                me->reason, (int) strlen(me->reason),
 333:                "HTTPNextState");
 334:      http->next = HTTP_ERROR;
 335:      http->result = HT_USE_PROXY;
 336:      break;
1.55 frystyk 337:    
1.152 frystyk 338: #if 0
1.158 frystyk 339:    case 306:                            /* Use proxy */
 340:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PROXY_REDIRECT,
 341:                me->reason, (int) strlen(me->reason),
 342:                "HTTPNextState");
 343:      http->next = HTTP_ERROR;
 344:      http->result = HT_USE_PROXY;
 345:      break;
1.152 frystyk 346: #endif
 347: 
1.158 frystyk 348:    case 307:                            /* Use proxy */
 349:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_TEMP_REDIRECT,
 350:                me->reason, (int) strlen(me->reason),
 351:                "HTTPNextState");
 352:      http->next = HTTP_ERROR;
 353:      http->result = HT_TEMP_REDIRECT;
 354:      break;
 355: 
 356:    default:
 357:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MULTIPLE,
 358:                me->reason, (int) strlen(me->reason),
 359:                "HTTPNextState");
 360:      http->next = HTTP_OK;
 361:      http->result = HT_LOADED;
 362:      break;
 363:    }    
 364:    break;
 365: 
 366:   case 4:
 367: 
 368:    switch (me->status) {
 369:    case 401:
 370:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
 371:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 372:      http->next = HTTP_ERROR;
 373:      http->result = HT_NO_ACCESS;
 374:      break;
1.152 frystyk 375:    
1.158 frystyk 376:    case 402:                        /* Payment required */
 377:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
 378:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 379:      http->next = HTTP_ERROR;
 380:      http->result = -402;
 381:      break;
1.71 frystyk 382:    
1.158 frystyk 383:    case 403:                            /* Forbidden */
 384:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
 385:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 386:      http->next = HTTP_ERROR;
 387:      http->result = HT_FORBIDDEN;
 388:      break;
1.55 frystyk 389:    
1.158 frystyk 390:    case 404:                            /* Not Found */
 391:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
 392:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 393:      http->next = HTTP_ERROR;
 394:      http->result = -404;
 395:      break;
1.55 frystyk 396:    
1.158 frystyk 397:    case 405:                           /* Not Allowed */
 398:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
 399:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 400:      http->next = HTTP_ERROR;
 401:      http->result = -405;
 402:      break;
 403: 
 404:    case 406:                         /* None Acceptable */
 405:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
 406:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 407:      http->next = HTTP_ERROR;
 408:      http->result = HT_NOT_ACCEPTABLE;
 409:      break;
 410: 
 411:    case 407:                  /* Proxy Authentication Required */
 412:      HTRequest_addError(me->request, ERR_FATAL, NO,HTERR_PROXY_UNAUTHORIZED,
 413:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 414:      http->next = HTTP_ERROR;
 415:      http->result = HT_NO_PROXY_ACCESS;
 416:      break;
 417: 
 418:    case 408:                         /* Request Timeout */
 419:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
 420:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 421:      http->next = HTTP_ERROR;
 422:      http->result = -408;
 423:      break;
 424: 
 425:    case 409:                            /* Conflict */
 426:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_CONFLICT,
 427:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 428:      http->next = HTTP_ERROR;
 429:      http->result = HT_CONFLICT;
 430:      break;
 431: 
 432:    case 410:                              /* Gone */
 433:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GONE,
 434:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 435:      http->next = HTTP_ERROR;
 436:      http->result = -410;
 437:      break;
 438: 
 439:    case 411:                         /* Length Required */
 440:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_LENGTH_REQUIRED,
 441:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 442:      http->next = HTTP_ERROR;
 443:      http->result = HT_LENGTH_REQUIRED;
 444:      break;
 445: 
 446:    case 412:                       /* Precondition failed */
 447:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PRECON_FAILED,
 448:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 449:      http->next = HTTP_ERROR;
 450:      http->result = -412;
 451:      break;
 452: 
 453:    case 413:                    /* Request entity too large */
 454:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TOO_BIG,
 455:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 456:      http->next = HTTP_ERROR;
 457:      http->result = -413;
 458:      break;
 459: 
 460:    case 414:                      /* Request-URI too long */
 461:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_URI_TOO_BIG,
 462:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 463:      http->next = HTTP_ERROR;
 464:      http->result = -414;
 465:      break;
 466: 
 467:    case 415:                           /* Unsupported */
 468:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNSUPPORTED,
 469:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 470:      http->next = HTTP_ERROR;
 471:      http->result = -415;
 472:      break;
 473: 
 474:    case 416:                  /* Request Range not satisfiable */
 475:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_RANGE,
 476:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 477:      http->next = HTTP_ERROR;
 478:      http->result = -416;
 479:      break;
 480: 
 481:    case 417:                       /* Expectation Failed */
 482:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_EXPECTATION_FAILED,
 483:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 484:      http->next = HTTP_ERROR;
 485:      http->result = -417;
 486:      break;
 487: 
 488:    case 418:                    /* Reauthentication required */
 489:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_REAUTH,
 490:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 491:      http->next = HTTP_ERROR;
 492:      http->result = -418;
 493:      break;
 494: 
 495:    case 419:                 /* Proxy Reauthentication required */
 496:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PROXY_REAUTH,
 497:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 498:      http->next = HTTP_ERROR;
 499:      http->result = -419;
 500:      break;
 501: 
 502:    default:
 503:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
 504:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 505:      http->next = HTTP_ERROR;
 506:      http->result = -400;
 507:      break;
 508:    }
1.134 frystyk 509:    break;
 510: 
1.158 frystyk 511:   case 5:
1.134 frystyk 512: 
1.158 frystyk 513:    switch (me->status) {
 514:    case 501:
 515:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
 516:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 517:      http->next = HTTP_ERROR;
 518:      http->result = -501;
 519:      break;
 520: 
 521:    case 502:
 522:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
 523:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 524:      http->next = HTTP_ERROR;
 525:      http->result = -502;
 526:      break;
 527: 
 528:    case 503:
 529:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_DOWN,
 530:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 531:      http->next = HTTP_ERROR;
 532: 
 533:      /*
 534:      ** If Retry-After header is found then return HT_RETRY else HT_ERROR.
 535:      ** The caller may want to reissue the request at a later point in time.
 536:      */
 537:      {
 538:        HTResponse * response = HTRequest_response(me->request);
 539:        if (HTResponse_retryTime(response))
 540:          http->result = HT_RETRY;
 541:        else
 542:          http->result = -500;
 543:      }
 544:      break;
 545: 
 546:    case 504:
 547:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
 548:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 549:      http->next = HTTP_ERROR;
 550:      http->result = -504;
 551:      break;
 552: 
 553:    case 505:                  /* Unsupported protocol version */
 554:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_VERSION,
 555:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 556:      http->next = HTTP_ERROR;
 557:      http->result = HT_BAD_VERSION;
 558:      break;
 559: 
 560:    case 506:                 /* Partial update Not Implemented */
 561:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NO_PARTIAL_UPDATE,
 562:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 563:      http->next = HTTP_ERROR;
 564:      http->result = HT_BAD_VERSION;
 565:      break;
 566: 
 567:    default:                            /* bad number */
 568:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
 569:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 570:      http->next = HTTP_ERROR;
 571:      http->result = -500;
 572:      break;
1.140 frystyk 573:    }
1.78 frystyk 574:    break;
 575: 
1.158 frystyk 576:   default:
1.104 frystyk 577:    HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.158 frystyk 578:              (void *) me->buffer, me->buflen, "HTTPNextState");
1.134 frystyk 579:    http->next = HTTP_ERROR;
1.155 frystyk 580:    http->result = -(me->status);
1.71 frystyk 581:    break;
1.55 frystyk 582:   }
 583: }
 584: 
1.71 frystyk 585: /* ------------------------------------------------------------------------- */
 586: /*             HTTP Status Line Stream             */
 587: /* ------------------------------------------------------------------------- */
1.55 frystyk 588: 
1.71 frystyk 589: /*
1.141 frystyk 590: **   Analyze the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 591: **   then create a MIME-stream, else create a Guess stream to find out
 592: **   what the 0.9 server is sending. We need to copy the buffer as we don't
 593: **   know if we can modify the contents or not.
1.78 frystyk 594: **
 595: **   Stream handling is a function of the status code returned from the 
 596: **   server:
 597: **       200:   Use `output_stream' in HTRequest structure
1.94 frystyk 598: **       else:  Use `debug_stream' in HTRequest structure
1.80 frystyk 599: **
 600: **   Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 601: */
1.157 frystyk 602: PRIVATE int stream_pipe (HTStream * me, int length)
1.56 frystyk 603: {
1.136 frystyk 604:   HTRequest * request = me->request;
 605:   HTNet * net = HTRequest_net(request);
1.123 frystyk 606:   HTHost * host = HTNet_host(net);
1.141 frystyk 607: 
1.153 frystyk 608: #if 0
 609:   {
 610:    char * uri = HTAnchor_address((HTAnchor *) HTRequest_anchor(request));
 611:    fprintf(stderr, "HTTP header: %s for '%s'\n", me->buffer, uri);
 612:    HT_FREE(uri);
 613:   }
 614: #endif
 615:   
1.132 frystyk 616:   /*
 617:   ** Just check for HTTP and not HTTP/ as NCSA server chokes on 1.1 replies
 618:   ** Thanks to Markku Savela <msa@msa.tte.vtt.fi>
1.141 frystyk 619: 
1.132 frystyk 620:   */
 621:   if (strncasecomp(me->buffer, "http", 4)) {
1.80 frystyk 622:    int status;
1.136 frystyk 623:    HTRequest_addError(request, ERR_INFO, NO, HTERR_HTTP09,
1.80 frystyk 624:          (void *) me->buffer, me->buflen, "HTTPStatusStream");
1.136 frystyk 625:    me->target = HTStreamStack(WWW_UNKNOWN,
 626:                  HTRequest_outputFormat(request),
 627:                  HTRequest_outputStream(request),
 628:                  request, NO);
1.134 frystyk 629:    me->http->next = HTTP_OK;
1.80 frystyk 630:    if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
 631:      me->transparent = YES;
1.123 frystyk 632:    HTHost_setVersion(host, HTTP_09);
1.157 frystyk 633:    if (length > 0) HTHost_setConsumed(host, length);
1.178 frystyk 634:    HTTRACE(PROT_TRACE, "HTTP Status. `%s\' is probably a broken 1.0 server that doesn't understand HEAD\n" _ 
1.171 frystyk 635:          HTHost_name(host));
 636:    return HT_ERROR;
1.80 frystyk 637:   } else {
1.140 frystyk 638:    HTResponse * response = HTRequest_response(request);
1.155 frystyk 639:    char * ptr = me->buffer+5;           /* Skip the HTTP part */
 640:    char * vptr = NULL;
 641:    int major = 0;
 642:    int minor = 0;
 643:    me->version = vptr = HTNextField(&ptr);
 644:    if (vptr) {
 645:      major = (int) strtol(me->version, &vptr, 10);
 646:      if (vptr++) minor = strtol(vptr, NULL, 10);
 647:    }
1.95 frystyk 648: 
1.130 frystyk 649:    /* Here we want to find out when to use persistent connection */
1.171 frystyk 650:    if (major > 1 && major < 100) {
1.178 frystyk 651:      HTTRACE(PROT_TRACE, "HTTP Status. Major version number is %d\n" _ major);
1.155 frystyk 652:      me->target = HTErrorStream();
1.158 frystyk 653:      me->status = 9999;
1.155 frystyk 654:      HTTPNextState(me);                   /* Get next state */
1.158 frystyk 655:      return HT_ERROR;
1.155 frystyk 656:    } else if (minor <= 0) {
1.171 frystyk 657:      if (major > 100) {
1.178 frystyk 658:        HTTRACE(PROT_TRACE, "HTTP Status. This is a *BROKEN* HTTP/1.0 server\n");
1.171 frystyk 659:        me->status = 200;
 660:      } else {
1.178 frystyk 661:        HTTRACE(PROT_TRACE, "HTTP Status. This is an HTTP/1.0 server\n");
1.171 frystyk 662:        me->status = atoi(HTNextField(&ptr));
 663:      }
1.128 frystyk 664:      HTHost_setVersion(host, HTTP_10);
1.155 frystyk 665:    } else {                    /* 1.x, x>0 family */
 666:      HTHost_setVersion(host, HTTP_11);      /* Best we can do */
1.156 frystyk 667:      if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 668:        HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with NO PIPELINING\n");
1.147 frystyk 669:        HTNet_setPersistent(net, YES, HT_TP_SINGLE);
1.156 frystyk 670:      } else if (ConnectionMode & HTTP_11_MUX) {
1.178 frystyk 671:        HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with MUXING\n");
1.156 frystyk 672:        HTNet_setPersistent(net, YES, HT_TP_INTERLEAVE);
1.147 frystyk 673:      } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 674:        HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 675:        HTHost_setVersion(host, HTTP_10);
 676:        HTNet_setPersistent(net, NO, HT_TP_SINGLE);
 677:      } else
 678:        HTNet_setPersistent(net, YES, HT_TP_PIPELINE);
1.171 frystyk 679:      me->status = atoi(HTNextField(&ptr));
1.128 frystyk 680:    }
1.95 frystyk 681: 
1.81 frystyk 682:    me->reason = ptr;
 683:    if ((ptr = strchr(me->reason, '\r')) != NULL)   /* Strip \r and \n */
 684:      *ptr = '0円';
 685:    else if ((ptr = strchr(me->reason, '\n')) != NULL)
 686:      *ptr = '0円';
 687: 
1.130 frystyk 688:    /* 
 689:    ** If it is a 1xx code then find out what to do and return until we
 690:    ** get the next code. In the case of Upgrade we may not get back here
 691:    ** at all. If we are uploading an entity then continue doing that
 692:    */
 693:    if (me->status/100 == 1) {
1.136 frystyk 694:      if (HTTPInformation(me) == YES) {
 695:        me->buflen = 0;
 696:        me->state = EOL_BEGIN;
1.157 frystyk 697:        if (me->info_target) (*me->info_target->isa->_free)(me->info_target);
 698:        me->info_target = HTStreamStack(WWW_MIME_CONT,
 699:                        HTRequest_debugFormat(request),
 700:                        HTRequest_debugStream(request),
 701:                        request, NO);
 702:        if (length > 0) HTHost_setConsumed(host, length);
 703:        return HT_OK;
1.103 frystyk 704:      }
1.56 frystyk 705:    }
1.133 frystyk 706: 
 707:    /*
 708:    ** As we are getting fresh metainformation in the HTTP response,
 709:    ** we clear the old metainfomation in order not to mix it with the new
 710:    ** one. This is particularly important for the content-length and the
1.139 frystyk 711:    ** like. The TRACE and OPTIONS method just adds to the current 
 712:    ** metainformation so in that case we don't clear the anchor.
1.133 frystyk 713:    */
1.136 frystyk 714:    if (me->status==200 || me->status==203 || me->status==300) {
1.140 frystyk 715:      /*
 716:      ** 200, 203 and 300 are all fully cacheable responses. No byte 
 717:      ** ranges or anything else make life hard in this case.
 718:      */
1.148 frystyk 719:      HTAnchor_clearHeader(HTRequest_anchor(request));
1.166 frystyk 720:      HTResponse_setCachable(response, HT_CACHE_ALL);
1.136 frystyk 721:      me->target = HTStreamStack(WWW_MIME,
 722:                    HTRequest_outputFormat(request),
 723:                    HTRequest_outputStream(request),
 724:                    request, NO);
1.176 frystyk 725:    } else if (me->status==204) {
 726:      HTResponse_setCachable(response, HT_CACHE_ALL);
 727:      me->target = HTStreamStack(WWW_MIME_HEAD,
 728:                    HTRequest_debugFormat(request),
 729:                    HTRequest_debugStream(request),
 730:                    request, NO);
1.140 frystyk 731:    } else if (me->status==206) {
 732:      /*
 733:      ** We got a partial response and now we must check whether
 734:      ** we issued a cache If-Range request or it was a new 
 735:      ** partial response which we don't have in cache. In the latter
 736:      ** case, we don't cache the object and in the former we append
 737:      ** the result to the already existing cache entry.
 738:      */
 739:      HTReload reload = HTRequest_reloadMode(request);
 740:      if (reload == HT_CACHE_RANGE_VALIDATE) {
1.166 frystyk 741:        HTResponse_setCachable(response, HT_CACHE_ALL);
1.140 frystyk 742:        me->target = HTStreamStack(WWW_MIME_PART,
 743:                      HTRequest_outputFormat(request),
 744:                      HTRequest_outputStream(request),
 745:                      request, NO);
 746:      } else {
1.149 frystyk 747:        HTAnchor_clearHeader(HTRequest_anchor(request));
1.140 frystyk 748:        me->target = HTStreamStack(WWW_MIME,
 749:                      HTRequest_outputFormat(request),
 750:                      HTRequest_outputStream(request),
 751:                      request, NO);
 752:      }
1.176 frystyk 753:    } else if (me->status==304) {
 754:      HTResponse_setCachable(response, HT_CACHE_NOT_MODIFIED);
1.136 frystyk 755:      me->target = HTStreamStack(WWW_MIME_HEAD,
 756:                    HTRequest_debugFormat(request),
 757:                    HTRequest_debugStream(request),
 758:                    request, NO);
 759:    } else if (HTRequest_debugStream(request)) {
1.175 frystyk 760:      HTResponse_setCachable(response,
 761:                  (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 762:      me->target = HTStreamStack(WWW_MIME,
 763:                    HTRequest_debugFormat(request),
 764:                    HTRequest_debugStream(request),
 765:                    request, NO);
 766:    } else {
1.140 frystyk 767:      /*
 768:      ** We still need to parse the MIME part in order to find any
 769:      ** valuable meta information which is needed from the response.
 770:      */
1.175 frystyk 771:      HTResponse_setCachable(response,
 772:                  (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 773:      me->target = HTStreamStack(WWW_MIME,
 774:                    HTRequest_debugFormat(request),
 775:                    HTRequest_debugStream(request),
 776:                    request, NO);
1.133 frystyk 777:    }
1.56 frystyk 778:   }
1.113 frystyk 779:   if (!me->target) me->target = HTErrorStream();
1.81 frystyk 780:   HTTPNextState(me);                  /* Get next state */
1.80 frystyk 781:   me->transparent = YES;
1.157 frystyk 782:   if (length > 0) HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length);
1.80 frystyk 783:   return HT_OK;
1.71 frystyk 784: }
1.56 frystyk 785: 
1.80 frystyk 786: /*
 787: **   Searches for HTTP header line until buffer fills up or a CRLF or LF
 788: **   is found
 789: */
1.119 frystyk 790: PRIVATE int HTTPStatus_put_block (HTStream * me, const char * b, int l)
1.71 frystyk 791: {
1.150 frystyk 792:   int status = HT_OK;
1.153 frystyk 793:   int length = l;
1.146 frystyk 794:   me->startLen = me->buflen;
1.80 frystyk 795:   while (!me->transparent && l-- > 0) {
1.157 frystyk 796:    if (me->info_target) {
 797: 
 798:      /* Put data down the 1xx return code parser until we are done. */
 799:      status = (*me->info_target->isa->put_block)(me->info_target, b, l+1);
 800:      if (status != HT_CONTINUE) return status;
 801: 
 802:      /* Now free the info stream */
 803:      (*me->info_target->isa->_free)(me->info_target);
 804:      me->info_target = NULL;       
 805: 
 806:      /* Update where we are in the stream */
 807:      l = HTHost_remainingRead(HTNet_host(HTRequest_net(me->request)));
1.163 frystyk 808:      b += (length-l);    
1.159 frystyk 809:      length = l;
1.163 frystyk 810:      if (l <= 0) break;
1.157 frystyk 811: 
1.80 frystyk 812:    } else {
 813:      *(me->buffer+me->buflen++) = *b;
 814:      if (me->state == EOL_FCR) {
 815:        if (*b == LF) { /* Line found */
1.157 frystyk 816:          if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 817:        } else {
 818:          me->state = EOL_BEGIN;
 819:        }
 820:      } else if (*b == CR) {
 821:        me->state = EOL_FCR;
 822:      } else if (*b == LF) {
1.157 frystyk 823:        if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.71 frystyk 824:      } else {
1.80 frystyk 825:        if (me->buflen >= MAX_STATUS_LEN) {
1.157 frystyk 826:          if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 827:        }
1.71 frystyk 828:      }
1.80 frystyk 829:      b++;
1.71 frystyk 830:    }
1.56 frystyk 831:   }
1.153 frystyk 832: 
1.159 frystyk 833:   if (!me->transparent && length != l)
 834:    HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length-l);
 835: 
1.99 frystyk 836:   if (l > 0) return PUTBLOCK(b, l);
1.150 frystyk 837:   return status;
1.56 frystyk 838: }
 839: 
1.119 frystyk 840: PRIVATE int HTTPStatus_put_string (HTStream * me, const char * s)
1.71 frystyk 841: {
1.80 frystyk 842:   return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 843: }
1.56 frystyk 844: 
1.100 frystyk 845: PRIVATE int HTTPStatus_put_character (HTStream * me, char c)
1.71 frystyk 846: {
1.80 frystyk 847:   return HTTPStatus_put_block(me, &c, 1);
 848: }
 849: 
1.100 frystyk 850: PRIVATE int HTTPStatus_flush (HTStream * me)
1.80 frystyk 851: {
 852:   return (*me->target->isa->flush)(me->target);
1.71 frystyk 853: }
 854: 
1.100 frystyk 855: PRIVATE int HTTPStatus_free (HTStream * me)
1.71 frystyk 856: {
1.87 frystyk 857:   int status = HT_OK;
 858:   if (me->target) {
 859:    if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
 860:      return HT_WOULD_BLOCK;
 861:   }
1.115 frystyk 862:   HT_FREE(me);
1.100 frystyk 863:   return status;
1.71 frystyk 864: }
 865: 
1.104 frystyk 866: PRIVATE int HTTPStatus_abort (HTStream * me, HTList * e)
1.71 frystyk 867: {
 868:   if (me->target)
1.74 frystyk 869:    ABORT_TARGET;
1.115 frystyk 870:   HT_FREE(me);
1.178 frystyk 871:   HTTRACE(PROT_TRACE, "HTTPStatus.. ABORTING...\n");
1.80 frystyk 872:   return HT_ERROR;
1.71 frystyk 873: }
 874: 
 875: /*   HTTPStatus Stream
 876: **   -----------------
 877: */
1.119 frystyk 878: PRIVATE const HTStreamClass HTTPStatusClass =
1.71 frystyk 879: {       
 880:   "HTTPStatus",
1.80 frystyk 881:   HTTPStatus_flush,
1.71 frystyk 882:   HTTPStatus_free,
 883:   HTTPStatus_abort,
 884:   HTTPStatus_put_character,
 885:   HTTPStatus_put_string,
 886:   HTTPStatus_put_block
 887: };
 888: 
1.113 frystyk 889: PUBLIC HTStream * HTTPStatus_new (HTRequest * request,
 890:                 void *    param,
 891:                 HTFormat   input_format,
 892:                 HTFormat   output_format,
 893:                 HTStream *  output_stream)
1.71 frystyk 894: {
1.115 frystyk 895:   HTStream * me;
 896:   if ((me = (HTStream *) HT_CALLOC(1, sizeof(HTStream))) == NULL)
 897:     HT_OUTOFMEM("HTTPStatus_new");
1.71 frystyk 898:   me->isa = &HTTPStatusClass;
1.113 frystyk 899:   if (request) {
1.126 frystyk 900:    HTNet * net = HTRequest_net(request);
1.125 frystyk 901:     /* Get existing copy */
 902:    http_info * http = (http_info *) HTNet_context(net);
1.113 frystyk 903:    me->request = request;
 904:    me->http = http;
 905:    http->next = HTTP_ERROR;
 906:    me->state = EOL_BEGIN;
 907:    return me;
 908:   } else
 909:    return HTErrorStream();
1.71 frystyk 910: }
 911: 
 912: /* ------------------------------------------------------------------------- */
 913: 
 914: /*       Load Document from HTTP Server            HTLoadHTTP
1.55 frystyk 915: **       ==============================
 916: **
 917: **   Given a hypertext address, this routine loads a document.
 918: **
 919: ** On entry,
 920: **   request        This is the request structure
1.94 frystyk 921: **   returns     HT_ERROR    Error has occured in call back
 922: **           HT_OK      Call back was OK
1.55 frystyk 923: */
1.141 frystyk 924: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type);
 925: 
 926: PUBLIC int HTLoadHTTP (SOCKET soc, HTRequest * request)
1.55 frystyk 927: {
 928:   http_info *http;            /* Specific protocol information */
1.112 frystyk 929:   HTParentAnchor *anchor = HTRequest_anchor(request);
1.141 frystyk 930:   HTNet * net = HTRequest_net(request);
1.112 frystyk 931: 
1.94 frystyk 932:   /*
 933:   ** Initiate a new http structure and bind to request structure
 934:   ** This is actually state HTTP_BEGIN, but it can't be in the state
 935:   ** machine as we need the structure first.
 936:   */
1.178 frystyk 937:   HTTRACE(PROT_TRACE, "HTTP........ Looking for `%s\'\n" _ 
1.141 frystyk 938:              HTAnchor_physical(anchor));
 939:   if ((http = (http_info *) HT_CALLOC(1, sizeof(http_info))) == NULL)
 940:    HT_OUTOFMEM("HTLoadHTTP");
 941:   http->net = net;
1.157 frystyk 942:   http->request = request;
1.141 frystyk 943:   HTNet_setContext(net, http);
 944:   HTNet_setEventCallback(net, HTTPEvent);
 945:   HTNet_setEventParam(net, http); /* callbacks get http* */
 946: 
1.157 frystyk 947:   return HTTPEvent(soc, http, HTEvent_BEGIN);      /* get it started - ops is ignored */
 948: }
 949: 
 950: PRIVATE int FlushPutEvent (HTTimer * timer, void * param, HTEventType type)
 951: {
 952:   http_info * http = (http_info *) param;
 953:   HTStream * input = HTRequest_inputStream(http->request);
 954:   HTPostCallback * pcbf = HTRequest_postCallback(http->request);
 955: 
1.165 frystyk 956:   http->usedTimer = YES;
1.160 frystyk 957:   if (timer != http->timer)
1.178 frystyk 958:    HTDEBUGBREAK("HTTP timer %p not in sync\n" _ timer);
 959:   HTTRACE(PROT_TRACE, "Uploading... Flushing %p with timer %p\n" _ http _ timer);
1.157 frystyk 960: 
 961:   /*
 962:   ** We ignore the return code here which we shouldn't!!!
 963:   */
 964:   if (http && input && pcbf) (*pcbf)(http->request, input);
 965: 
 966:   /*
1.172 frystyk 967:   ** Delete the timer
1.157 frystyk 968:   */
1.172 frystyk 969:   HTTimer_delete(http->timer);
1.157 frystyk 970:   http->timer = NULL;
1.165 frystyk 971: 
1.157 frystyk 972:   return HT_OK;
1.141 frystyk 973: }
 974: 
 975: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type)
 976: {
 977:   http_info * http = (http_info *)pVoid;
 978:   int status = HT_ERROR;
 979:   HTNet * net = http->net;
 980:   HTRequest * request = HTNet_request(net);
1.144 frystyk 981:   HTParentAnchor * anchor = HTRequest_anchor(request);
 982:   HTHost * host = HTNet_host(net);
1.141 frystyk 983: 
 984:   /*
1.166 frystyk 985:   ** Check whether we have been interrupted or timed out
1.141 frystyk 986:   */
 987:   if (type == HTEvent_BEGIN) {
1.134 frystyk 988:    http->next = HTTP_OK;
 989:    http->result = HT_ERROR;
1.141 frystyk 990:   } else if (type == HTEvent_CLOSE) {
1.179 ! frystyk 991:     long read_len = HTNet_bytesRead(net);
 ! 992:     long doc_len = HTAnchor_length(anchor);
 ! 993: 
 ! 994:     /*
 ! 995:     ** It is OK to get a close if a) we don't pipeline and b)
 ! 996:     ** we have the expected amount of data. In case we don't
 ! 997:     ** know how much data to expect, we must accept it asis.
 ! 998:     */
 ! 999:     if (HTHost_numberOfOutstandingNetObjects(host) == 1 &&
 ! 1000:       (doc_len<0 || doc_len==read_len)) {
 ! 1001:      HTTPCleanup(request, HT_LOADED);
 ! 1002:     } else {
 ! 1003:       HTRequest_addError(request, ERR_FATAL, NO, HTERR_INTERRUPTED,
 ! 1004:                NULL, 0, "HTLoadHTTP");
 ! 1005:      HTTPCleanup(request, HT_INTERRUPTED);
 ! 1006:     }
1.166 frystyk 1007:    return HT_OK;
 1008:   } else if (type == HTEvent_TIMEOUT) {
 1009:    HTRequest_addError(request, ERR_FATAL, NO, HTERR_TIME_OUT,
 1010:              NULL, 0, "HTLoadHTTP");
 1011:    HTTPCleanup(request, HT_TIMEOUT);
1.94 frystyk 1012:    return HT_OK;
1.141 frystyk 1013:   } else if (type == HTEvent_END) {
 1014:    HTTPCleanup(request, http->result);
 1015:    return HT_OK;
 1016:   } else if (type == HTEvent_RESET) {
 1017:    HTTPCleanup(request, HT_RECOVER_PIPE);
1.145 frystyk 1018:    http->state = HTTP_BEGIN;
1.141 frystyk 1019:    return HT_OK;
 1020:   }
 1021: 
1.71 frystyk 1022:   /* Now jump into the machine. We know the state from the previous run */
 1023:   while (1) {
 1024:    switch (http->state) {
1.134 frystyk 1025:    case HTTP_BEGIN:
1.144 frystyk 1026:      status = HTHost_connect(host, net, HTAnchor_physical(anchor), HTTP_PORT);
 1027:      host = HTNet_host(net);
1.153 frystyk 1028:       if (status == HT_OK) {
1.140 frystyk 1029: 
1.123 frystyk 1030:        /*
1.140 frystyk 1031:        ** Check the protocol class to see if we have connected to a
 1032:        ** the right class of server, in this case HTTP. If we don't 
 1033:        ** know the server then assume a HTTP/1.0
1.123 frystyk 1034:        */
 1035:        {
 1036:          char * s_class = HTHost_class(host);
1.140 frystyk 1037:          if (!s_class) {
1.174 frystyk 1038:            if (HTRequest_proxy(request) == NULL) {
 1039:              HTAssocList * alist = HTRequest_connection(request);
 1040:              if (!(alist && HTAssocList_findObject(alist, "close")))
 1041:                HTRequest_addConnection(request, "Keep-Alive", "");
 1042:            }
1.140 frystyk 1043:            HTHost_setClass(host, "http");
 1044:          } else if (strcasecomp(s_class, "http")) {
1.123 frystyk 1045:            HTRequest_addError(request, ERR_FATAL, NO, HTERR_CLASS,
 1046:                      NULL, 0, "HTLoadHTTP");
 1047:            http->state = HTTP_ERROR;
 1048:            break;
 1049:          }
1.95 frystyk 1050:        }
1.147 frystyk 1051: 
1.156 frystyk 1052:        if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 1053:          HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 WITH NO PIPELINING\n");
1.147 frystyk 1054:          HTRequest_setFlush(request, YES);
 1055:        } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 1056:          HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 1057:          HTHost_setVersion(host, HTTP_10);
 1058:        }
 1059: 
1.151 frystyk 1060:        if (HTNet_preemptive(net)) {
1.178 frystyk 1061:          HTTRACE(PROT_TRACE, "HTTP........ Force flush on preemptive load\n");
1.151 frystyk 1062:          HTRequest_setFlush(request, YES);
 1063:        }
 1064: 
1.147 frystyk 1065:        /* Jump to next state */
1.144 frystyk 1066:        http->state = HTTP_NEED_STREAM;
1.159 frystyk 1067:      } else if (status == HT_WOULD_BLOCK || status == HT_PENDING) {
1.144 frystyk 1068:        return HT_OK;
1.171 frystyk 1069:      } else if (status == HT_NO_HOST) {
 1070:        http->result = HT_NO_HOST;
 1071:        http->state = HTTP_ERROR;
1.159 frystyk 1072:      } else   
1.144 frystyk 1073:        http->state = HTTP_ERROR;       /* Error or interrupt */
 1074:      break;
 1075:      
 1076:    case HTTP_NEED_STREAM:
1.138 frystyk 1077: 
1.144 frystyk 1078:      /* 
 1079:      ** Create the stream pipe FROM the channel to the application.
 1080:      ** The target for the input stream pipe is set up using the
 1081:      ** stream stack.
 1082:      */
1.167 frystyk 1083:      {
 1084:       /*
 1085:       ** during a recovery, we might keep the same HTNet object.
 1086:       ** if so, reuse it's read stream 
 1087:       */
1.176 frystyk 1088:      HTStream * me = HTNet_readStream( net );
1.167 frystyk 1089:       if ( me == NULL ) {
1.173 frystyk 1090:         me = HTStreamStack(WWW_HTTP,
 1091:                  HTRequest_outputFormat(request),
 1092:                  HTRequest_outputStream(request),
 1093:                  request, YES);
1.178 frystyk 1094: #ifdef HTDEBUG
1.173 frystyk 1095:        if (PROT_TRACE) {
 1096:          if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
 1097:          if (htfp) {
 1098:            me = HTTee(me, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1099:            HTTRACE(PROT_TRACE, "HTTP........ Dumping response to `%s\'\n" _ HTTP_OUTPUT);
1.173 frystyk 1100:          }
 1101:        }
1.178 frystyk 1102: #endif /* HTDEBUG */
1.173 frystyk 1103: 
 1104:        HTNet_setReadStream(net, me);
1.167 frystyk 1105:       }
 1106:       HTRequest_setOutputConnected(request, YES);
1.144 frystyk 1107:      }
1.127 frystyk 1108: 
1.144 frystyk 1109:      /*
 1110:      ** Create the stream pipe TO the channel from the application
 1111:      ** and hook it up to the request object
 1112:      */
 1113:      {
 1114:        HTChannel * channel = HTHost_channel(host);
 1115:        HTOutputStream * output = HTChannel_getChannelOStream(channel);
 1116:        int version = HTHost_version(host);
 1117:        HTStream * app = NULL;
 1118:        
1.178 frystyk 1119: #ifdef HTDEBUG
1.144 frystyk 1120:        if (PROT_TRACE) {
1.162 frystyk 1121:          if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
 1122:          if (htfp) {
1.144 frystyk 1123:            output = (HTOutputStream *)
1.162 frystyk 1124:              HTTee((HTStream *) output, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1125:            HTTRACE(PROT_TRACE, "HTTP........ Dumping request to `%s\'\n" _ HTTP_OUTPUT);
1.144 frystyk 1126:          }
 1127:        }    
1.178 frystyk 1128: #endif /* HTDEBUG */
1.144 frystyk 1129:        app = HTMethod_hasEntity(HTRequest_method(request)) ?
 1130:          HTMIMERequest_new(request,
 1131:                   HTTPRequest_new(request, (HTStream *) output, NO,
 1132:                           version),
 1133:                   YES) :
 1134:          HTTPRequest_new(request, (HTStream *) output, YES, version);
 1135:        HTRequest_setInputStream(request, app);
 1136:      }
1.88 frystyk 1137: 
1.144 frystyk 1138:      /*
 1139:      ** Set up concurrent read/write if this request isn't the
 1140:      ** source for a PUT or POST. As source we don't start reading
 1141:      ** before all destinations are ready. If destination then
 1142:      ** register the input stream and get ready for read
 1143:      */
 1144:      if (HTRequest_isDestination(request)) {
 1145:        HTHost_register(host, net, HTEvent_READ);
 1146:        HTRequest_linkDestination(request);
 1147:      }
 1148:      http->state = HTTP_CONNECTED;
 1149:      type = HTEvent_WRITE;              /* fresh, so try a write */
1.71 frystyk 1150:      break;
 1151: 
1.87 frystyk 1152:      /* As we can do simultanous read and write this is now one state */
1.141 frystyk 1153:     case HTTP_CONNECTED:
 1154:       if (type == HTEvent_WRITE) {
1.157 frystyk 1155:         HTStream * input = HTRequest_inputStream(request);
 1156:         HTPostCallback * pcbf = HTRequest_postCallback(request);
 1157:         status = HTRequest_flush(request) ?
 1158:           HTHost_forceFlush(host) : (*input->isa->flush)(input);
 1159: 
 1160:         /*
 1161:         ** Check to see if we are uploading something or just a normal
 1162:         ** GET kind of thing.
 1163:         */
 1164:         if (pcbf) {
 1165:           if (http->lock == NO) {
 1166:             int retrys = HTRequest_retrys(request);
1.169 frystyk 1167:             ms_t delay = retrys > 3 ? HTSecondWriteDelay : HTFirstWriteDelay;
1.165 frystyk 1168:             if (!http->timer && !http->usedTimer) {
1.162 frystyk 1169:               http->timer = HTTimer_new(NULL, FlushPutEvent,
 1170:                            http, delay, YES, NO);
1.178 frystyk 1171:               HTTRACE(PROT_TRACE, "Uploading... Holding %p for %lu ms using time %p\n" _ 
 1172:                     http _ delay _ http->timer);
1.157 frystyk 1173:               HTHost_register(host, net, HTEvent_READ);
 1174:             }
 1175:             http->lock = YES;
 1176:           }
 1177:           type = HTEvent_READ;
 1178:         } else {
 1179: 
 1180:           /*
 1181:           ** Check to see if we can start a new request
 1182:           ** pending in the host object.
 1183:           */
 1184:           HTHost_launchPending(host);
 1185:           type = HTEvent_READ;
 1186:         }
 1187: 
 1188:         /* Now check the status code */
 1189:         if (status == HT_WOULD_BLOCK)
 1190:           return HT_OK;
 1191:         else if (status == HT_PAUSE || status == HT_LOADED) {
 1192:           type = HTEvent_READ;
1.168 frystyk 1193:         } else if (status==HT_ERROR)
1.157 frystyk 1194:           http->state = HTTP_RECOVER_PIPE;
 1195:       } else if (type == HTEvent_FLUSH) {
 1196:         HTStream * input = HTRequest_inputStream(request);
 1197:         if (input == NULL)
 1198:           return HT_ERROR;
 1199:         return (*input->isa->flush)(input);
 1200:       } else if (type == HTEvent_READ) {
 1201:         status = HTHost_read(host, net);
 1202:         if (status == HT_WOULD_BLOCK)
 1203:           return HT_OK;
 1204:         else if (status == HT_CONTINUE) {
1.178 frystyk 1205:           HTTRACE(PROT_TRACE, "HTTP........ Continuing\n");
1.157 frystyk 1206:           http->lock = NO;
 1207:           continue;
 1208:         } else if (status==HT_LOADED)
 1209:           http->state = http->next; /* Jump to next state (OK or ERROR) */
 1210:         else if (status==HT_CLOSED)
 1211:           http->state = HTTP_RECOVER_PIPE;
1.167 frystyk 1212:         else if (status == HT_ERROR)
 1213:           http->state = HTTP_KILL_PIPE;
1.157 frystyk 1214:         else
 1215:           http->state = HTTP_ERROR;
 1216:       } else {
 1217:         http->state = HTTP_ERROR;   /* don't know how to handle OOB */
 1218:       }
 1219:       break;
1.141 frystyk 1220: 
1.134 frystyk 1221:     case HTTP_OK:
 1222:      HTTPCleanup(request, http->result);
1.94 frystyk 1223:      return HT_OK;
1.71 frystyk 1224:      break;
1.141 frystyk 1225: 
 1226:      case HTTP_RECOVER_PIPE:
 1227:     {
 1228:       /*
 1229:       ** If this is a persistent connection and we get a close
 1230:       ** then it is an error and we should recover from it by
 1231:       ** restarting the pipe line of requests if any
 1232:       */
1.151 frystyk 1233:       if (HTHost_isPersistent(host) && !HTHost_closeNotification(host)) {
1.143 frystyk 1234:         if (host == NULL) return HT_ERROR;
1.144 frystyk 1235:         HTRequest_setFlush(request, YES);
 1236:         HTHost_recoverPipe(host);
 1237:         return HT_OK;
1.141 frystyk 1238:       } else
 1239:         http->state = HTTP_OK;
 1240:     }
1.143 frystyk 1241:     break;
1.141 frystyk 1242: 
1.167 frystyk 1243:      case HTTP_KILL_PIPE:
 1244:       if (host == NULL) return HT_ERROR;
 1245:       HTHost_killPipe(host);
 1246:       return HT_OK;
 1247:       break;
 1248: 
1.71 frystyk 1249:     case HTTP_ERROR:
1.143 frystyk 1250:       HTTPCleanup(request, http->result);
 1251:       return HT_OK;
 1252:       break;
 1253: 
1.141 frystyk 1254:    default:
1.178 frystyk 1255:      HTDEBUGBREAK("Bad http state %d\n" _ http->state);
1.71 frystyk 1256:    }
 1257:   } /* End of while(1) */
 1258: }  
1.88 frystyk 1259: 
1.147 frystyk 1260: PUBLIC void HTTP_setConnectionMode (HTTPConnectionMode mode)
 1261: {
 1262:   ConnectionMode = mode;
 1263: }
 1264: 
 1265: PUBLIC HTTPConnectionMode HTTP_connectionMode (void)
 1266: {
 1267:   return ConnectionMode;
 1268: }
1.21 luotonen 1269: 
1.169 frystyk 1270: PUBLIC BOOL HTTP_setBodyWriteDelay (ms_t first_try, ms_t second_try)
 1271: {
 1272:    if (first_try > 20 && second_try >= first_try) {
 1273:      HTFirstWriteDelay = first_try;
 1274:        HTSecondWriteDelay = second_try;
 1275:        return YES;
 1276:    }
 1277:    return NO;
 1278: }
 1279: 
 1280: PUBLIC void HTTP_bodyWriteDelay (ms_t * first_try, ms_t * second_try)
 1281: {
 1282:    *first_try = HTFirstWriteDelay;
 1283:    *second_try = HTSecondWriteDelay;
1.170 frystyk 1284: }
 1285: 

Webmaster

AltStyle によって変換されたページ (->オリジナル) /