Annotation of libwww/Library/src/HTTP.c, revision 1.179
1.74 frystyk 1: /* HTTP.c
2: ** MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: ** (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: ** Please first read the full copyright statement in the file COPYRIGH.
1.179 ! frystyk 6: ** @(#) $Id: HTTP.c,v 1.178 1999年02月22日 22:10:12 frystyk Exp $
1.74 frystyk 7: **
8: ** This module implments the HTTP protocol as a state machine
1.55 frystyk 9: **
10: ** History:
1.59 frystyk 11: ** < May 24 94 ?? Unknown - but obviously written
1.56 frystyk 12: ** May 24 94 HF Made reentrent and cleaned up a bit. Implemented
13: ** Forward, redirection, error handling and referer field
1.67 duns 14: ** 8 Jul 94 FM Insulate free() from _free structure element.
1.71 frystyk 15: ** Jul 94 HFN Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 16: **
1.1 timbl 17: */
18:
1.78 frystyk 19: /* Library include files */
1.161 frystyk 20: #include "wwwsys.h"
1.123 frystyk 21: #include "WWWUtil.h"
22: #include "WWWCore.h"
1.177 frystyk 23: #include "HTHeader.h"
24: #include "HTMIMERq.h"
1.94 frystyk 25: #include "HTReqMan.h"
1.179 ! frystyk 26: #include "HTNetMan.h"
1.109 frystyk 27: #include "HTTPUtil.h"
1.80 frystyk 28: #include "HTTPReq.h"
1.55 frystyk 29: #include "HTTP.h" /* Implements */
30:
31: /* Macros and other defines */
1.94 frystyk 32: #ifndef HTTP_PORT
33: #define HTTP_PORT 80 /* Allocated to http by Jon Postel/ISI 24-Jan-92 */
34: #endif
35:
1.71 frystyk 36: #define PUTC(c) (*me->target->isa->put_character)(me->target, c)
37: #define PUTS(s) (*me->target->isa->put_string)(me->target, s)
38: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
39: #define FREE_TARGET (*me->target->isa->_free)(me->target)
1.74 frystyk 40: #define ABORT_TARGET (*me->target->isa->abort)(me->target, e)
1.2 timbl 41:
1.178 frystyk 42: #ifdef HTDEBUG
1.177 frystyk 43: #include "WWWStream.h"
1.147 frystyk 44: #define HTTP_OUTPUT "w3chttp.out"
1.162 frystyk 45: PRIVATE FILE * htfp = NULL;
1.140 frystyk 46: #endif
1.139 frystyk 47:
1.59 frystyk 48: /* Type definitions and global variables etc. local to this module */
1.94 frystyk 49:
50: /* Final states have negative value */
1.59 frystyk 51: typedef enum _HTTPState {
1.167 frystyk 52: HTTP_KILL_PIPE = -4,
1.141 frystyk 53: HTTP_RECOVER_PIPE = -3,
1.134 frystyk 54: HTTP_ERROR = -2,
55: HTTP_OK = -1,
1.71 frystyk 56: HTTP_BEGIN = 0,
1.144 frystyk 57: HTTP_NEED_STREAM,
1.141 frystyk 58: HTTP_CONNECTED
1.59 frystyk 59: } HTTPState;
1.55 frystyk 60:
1.94 frystyk 61: /* This is the context structure for the this module */
1.55 frystyk 62: typedef struct _http_info {
1.81 frystyk 63: HTTPState state; /* Current State of the connection */
64: HTTPState next; /* Next state */
1.134 frystyk 65: int result; /* Result to report to the after filter */
1.139 frystyk 66: BOOL lock; /* Block for writing */
1.141 frystyk 67: HTNet * net;
1.157 frystyk 68: HTRequest * request;
69: HTTimer * timer;
1.165 frystyk 70: BOOL usedTimer;
1.55 frystyk 71: } http_info;
72:
1.88 frystyk 73: #define MAX_STATUS_LEN 100 /* Max nb of chars to check StatusLine */
1.55 frystyk 74:
1.71 frystyk 75: struct _HTStream {
1.119 frystyk 76: const HTStreamClass * isa;
1.71 frystyk 77: HTStream * target;
1.157 frystyk 78: HTStream * info_target; /* For 100 codes */
1.71 frystyk 79: HTRequest * request;
80: http_info * http;
1.121 frystyk 81: HTEOLState state;
1.71 frystyk 82: BOOL transparent;
1.150 frystyk 83: BOOL cont;
1.81 frystyk 84: char * version; /* Should we save this? */
1.71 frystyk 85: int status;
1.81 frystyk 86: char * reason;
1.71 frystyk 87: char buffer[MAX_STATUS_LEN+1];
1.80 frystyk 88: int buflen;
1.146 frystyk 89: int startLen;/* buflen when put_block was called */
1.71 frystyk 90: };
1.21 luotonen 91:
1.123 frystyk 92: struct _HTInputStream {
93: const HTInputStreamClass * isa;
94: };
95:
1.169 frystyk 96: /* How long to wait before writing the body in PUT and POST requests */
97: #define DEFAULT_FIRST_WRITE_DELAY 2000
98: #define DEFAULT_SECOND_WRITE_DELAY 3000
99:
100: PRIVATE ms_t HTFirstWriteDelay = DEFAULT_FIRST_WRITE_DELAY;
101: PRIVATE ms_t HTSecondWriteDelay = DEFAULT_SECOND_WRITE_DELAY;
102:
1.147 frystyk 103: #ifdef HT_NO_PIPELINING
1.156 frystyk 104: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_NO_PIPELINING;
1.147 frystyk 105: #else
1.156 frystyk 106: #ifdef HT_MUX
107: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_MUX;
108: #else
109: #ifdef HT_FORCE_10
110: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_FORCE_10;
111: #else
112: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_PIPELINING;
113: #endif
114: #endif
1.147 frystyk 115: #endif
116:
1.71 frystyk 117: /* ------------------------------------------------------------------------- */
118: /* Help Functions */
119: /* ------------------------------------------------------------------------- */
1.21 luotonen 120:
1.94 frystyk 121: /* HTTPCleanup
122: ** -----------
1.55 frystyk 123: ** This function closes the connection and frees memory.
1.94 frystyk 124: ** Returns YES on OK, else NO
1.1 timbl 125: */
1.94 frystyk 126: PRIVATE int HTTPCleanup (HTRequest *req, int status)
1.1 timbl 127: {
1.126 frystyk 128: HTNet * net = HTRequest_net(req);
129: http_info * http = (http_info *) HTNet_context(net);
130: HTStream * input = HTRequest_inputStream(req);
1.80 frystyk 131:
1.178 frystyk 132: HTTRACE(PROT_TRACE, "HTTP Clean.. Called with status %d, net %p\n" _ status _ net);
1.144 frystyk 133:
1.164 frystyk 134: if (status == HT_INTERRUPTED) {
135: HTAlertCallback * cbf = HTAlert_find(HT_PROG_INTERRUPT);
136: if (cbf) (*cbf)(req, HT_PROG_INTERRUPT,
137: HT_MSG_NULL, NULL, NULL, NULL);
1.166 frystyk 138: } else if (status == HT_TIMEOUT) {
139: HTAlertCallback * cbf = HTAlert_find(HT_PROG_TIMEOUT);
140: if (cbf) (*cbf)(req, HT_PROG_TIMEOUT,
141: HT_MSG_NULL, NULL, NULL, NULL);
1.164 frystyk 142: }
1.166 frystyk 143:
1.94 frystyk 144: /* Free stream with data TO network */
1.167 frystyk 145: if (input) {
1.166 frystyk 146: if (status==HT_INTERRUPTED || status==HT_RECOVER_PIPE || status==HT_TIMEOUT)
1.126 frystyk 147: (*input->isa->abort)(input, NULL);
1.94 frystyk 148: else
1.126 frystyk 149: (*input->isa->_free)(input);
150: HTRequest_setInputStream(req, NULL);
1.94 frystyk 151: }
1.88 frystyk 152:
1.144 frystyk 153: /*
1.157 frystyk 154: ** Remove if we have registered an upload function as a callback
155: */
156: if (http->timer) {
157: HTTimer_delete(http->timer);
158: http->timer = NULL;
159: }
160:
161: /*
1.144 frystyk 162: ** Remove the request object and our own context structure for http.
163: */
164: if (status != HT_RECOVER_PIPE) {
1.153 frystyk 165: HTNet_delete(net, status);
1.141 frystyk 166: HT_FREE(http);
167: }
1.94 frystyk 168: return YES;
1.55 frystyk 169: }
170:
1.71 frystyk 171: /*
1.130 frystyk 172: ** Informational 1xx codes are handled separately
1.136 frystyk 173: ** Returns YES if we should continue, NO if we should stop
1.55 frystyk 174: */
1.130 frystyk 175: PRIVATE BOOL HTTPInformation (HTStream * me)
1.55 frystyk 176: {
1.136 frystyk 177: http_info * http = me->http;
1.71 frystyk 178: switch (me->status) {
179:
1.136 frystyk 180: case 100:
1.161 frystyk 181: #if 0
1.136 frystyk 182: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CONTINUE,
183: me->reason, (int) strlen(me->reason),
184: "HTTPInformation");
1.161 frystyk 185: #endif
1.136 frystyk 186: return YES;
187: break;
188:
1.130 frystyk 189: case 101:
1.136 frystyk 190: /*
191: ** We consider 101 Switching as a final state and exit this request
192: */
1.130 frystyk 193: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_SWITCHING,
1.127 frystyk 194: me->reason, (int) strlen(me->reason),
1.130 frystyk 195: "HTTPInformation");
1.136 frystyk 196: http->next = HTTP_OK;
197: http->result = HT_UPGRADE;
1.127 frystyk 198: break;
199:
1.130 frystyk 200: default:
1.136 frystyk 201: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
202: (void *) me->buffer, me->buflen, "HTTPNextState");
203: http->next = HTTP_ERROR;
204: http->result = HT_ERROR;
1.127 frystyk 205: break;
1.130 frystyk 206: }
1.136 frystyk 207: return NO;
1.130 frystyk 208: }
209:
1.158 frystyk 210:
211:
1.130 frystyk 212: /*
213: ** This is a big switch handling all HTTP return codes. It puts in any
214: ** appropiate error message and decides whether we should expect data
215: ** or not.
216: */
217: PRIVATE void HTTPNextState (HTStream * me)
218: {
1.134 frystyk 219: http_info * http = me->http;
1.158 frystyk 220: int error_class = me->status / 100;
221: switch (error_class) {
1.127 frystyk 222:
1.158 frystyk 223: case 0: /* 0.9 response */
224: case 2:
1.112 frystyk 225:
1.158 frystyk 226: switch (me->status) {
1.112 frystyk 227:
1.158 frystyk 228: case 201: /* Created */
229: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CREATED,
230: me->reason, (int) strlen(me->reason),
231: "HTTPNextState");
232: http->next = HTTP_OK;
233: http->result = HT_CREATED;
234: break;
235:
236: case 202: /* Accepted */
237: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_ACCEPTED,
238: me->reason, (int) strlen(me->reason),
239: "HTTPNextState");
240: http->next = HTTP_OK;
241: http->result = HT_ACCEPTED;
242: break;
243:
244: case 203: /* Non-authoritative information */
245: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NON_AUTHORITATIVE,
246: me->reason, (int) strlen(me->reason),
247: "HTTPNextState");
248: http->next = HTTP_OK;
249: http->result = HT_LOADED;
250: break;
251:
252: case 204: /* No Response */
253: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NO_CONTENT,
254: me->reason, (int) strlen(me->reason),
255: "HTTPNextState");
256: http->next = HTTP_OK;
257: http->result = HT_NO_DATA;
258: break;
259:
260: case 205: /* Reset Content */
261: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_RESET,
262: me->reason, (int) strlen(me->reason),
263: "HTTPNextState");
264: http->next = HTTP_OK;
265: http->result = HT_RESET_CONTENT;
266: break;
267:
268: case 206: /* Partial Content */
269: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL,
270: me->reason, (int) strlen(me->reason),
271: "HTTPNextState");
272: http->next = HTTP_OK;
273: http->result = HT_PARTIAL_CONTENT;
274: break;
275:
276: case 207: /* Partial Update OK */
277: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL_OK,
278: me->reason, (int) strlen(me->reason),
279: "HTTPNextState");
280: http->next = HTTP_OK;
281: http->result = HT_PARTIAL_CONTENT;
282: break;
283:
284: default:
285: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_OK,
286: me->reason, (int) strlen(me->reason),
287: "HTTPNextState");
288: http->next = HTTP_OK;
289: http->result = HT_LOADED;
290: break;
291: }
1.134 frystyk 292: break;
293:
1.158 frystyk 294: case 3:
1.134 frystyk 295:
1.158 frystyk 296: switch (me->status) {
1.78 frystyk 297:
1.158 frystyk 298: case 301: /* Moved */
299: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MOVED,
300: me->reason, (int) strlen(me->reason),
301: "HTTPNextState");
302: http->next = HTTP_ERROR;
303: http->result = HT_PERM_REDIRECT;
304: break;
305:
306: case 302: /* Found */
307: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_FOUND,
308: me->reason, (int) strlen(me->reason),
309: "HTTPNextState");
310: http->next = HTTP_ERROR;
311: http->result = HT_FOUND;
312: break;
1.55 frystyk 313:
1.158 frystyk 314: case 303: /* Method */
315: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_METHOD,
316: me->reason, (int) strlen(me->reason),
317: "HTTPNextState");
318: http->next = HTTP_ERROR;
319: http->result = HT_SEE_OTHER;
320: break;
321:
322: case 304: /* Not Modified */
323: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NOT_MODIFIED,
324: me->reason, (int) strlen(me->reason),
325: "HTTPNextState");
326: http->next = HTTP_OK;
327: http->result = HT_NOT_MODIFIED;
328: break;
1.134 frystyk 329:
1.158 frystyk 330: case 305: /* Use proxy */
331: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_USE_PROXY,
332: me->reason, (int) strlen(me->reason),
333: "HTTPNextState");
334: http->next = HTTP_ERROR;
335: http->result = HT_USE_PROXY;
336: break;
1.55 frystyk 337:
1.152 frystyk 338: #if 0
1.158 frystyk 339: case 306: /* Use proxy */
340: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PROXY_REDIRECT,
341: me->reason, (int) strlen(me->reason),
342: "HTTPNextState");
343: http->next = HTTP_ERROR;
344: http->result = HT_USE_PROXY;
345: break;
1.152 frystyk 346: #endif
347:
1.158 frystyk 348: case 307: /* Use proxy */
349: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_TEMP_REDIRECT,
350: me->reason, (int) strlen(me->reason),
351: "HTTPNextState");
352: http->next = HTTP_ERROR;
353: http->result = HT_TEMP_REDIRECT;
354: break;
355:
356: default:
357: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MULTIPLE,
358: me->reason, (int) strlen(me->reason),
359: "HTTPNextState");
360: http->next = HTTP_OK;
361: http->result = HT_LOADED;
362: break;
363: }
364: break;
365:
366: case 4:
367:
368: switch (me->status) {
369: case 401:
370: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
371: me->reason, (int) strlen(me->reason), "HTTPNextState");
372: http->next = HTTP_ERROR;
373: http->result = HT_NO_ACCESS;
374: break;
1.152 frystyk 375:
1.158 frystyk 376: case 402: /* Payment required */
377: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
378: me->reason, (int) strlen(me->reason), "HTTPNextState");
379: http->next = HTTP_ERROR;
380: http->result = -402;
381: break;
1.71 frystyk 382:
1.158 frystyk 383: case 403: /* Forbidden */
384: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
385: me->reason, (int) strlen(me->reason), "HTTPNextState");
386: http->next = HTTP_ERROR;
387: http->result = HT_FORBIDDEN;
388: break;
1.55 frystyk 389:
1.158 frystyk 390: case 404: /* Not Found */
391: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
392: me->reason, (int) strlen(me->reason), "HTTPNextState");
393: http->next = HTTP_ERROR;
394: http->result = -404;
395: break;
1.55 frystyk 396:
1.158 frystyk 397: case 405: /* Not Allowed */
398: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
399: me->reason, (int) strlen(me->reason), "HTTPNextState");
400: http->next = HTTP_ERROR;
401: http->result = -405;
402: break;
403:
404: case 406: /* None Acceptable */
405: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
406: me->reason, (int) strlen(me->reason), "HTTPNextState");
407: http->next = HTTP_ERROR;
408: http->result = HT_NOT_ACCEPTABLE;
409: break;
410:
411: case 407: /* Proxy Authentication Required */
412: HTRequest_addError(me->request, ERR_FATAL, NO,HTERR_PROXY_UNAUTHORIZED,
413: me->reason, (int) strlen(me->reason), "HTTPNextState");
414: http->next = HTTP_ERROR;
415: http->result = HT_NO_PROXY_ACCESS;
416: break;
417:
418: case 408: /* Request Timeout */
419: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
420: me->reason, (int) strlen(me->reason), "HTTPNextState");
421: http->next = HTTP_ERROR;
422: http->result = -408;
423: break;
424:
425: case 409: /* Conflict */
426: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_CONFLICT,
427: me->reason, (int) strlen(me->reason), "HTTPNextState");
428: http->next = HTTP_ERROR;
429: http->result = HT_CONFLICT;
430: break;
431:
432: case 410: /* Gone */
433: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GONE,
434: me->reason, (int) strlen(me->reason), "HTTPNextState");
435: http->next = HTTP_ERROR;
436: http->result = -410;
437: break;
438:
439: case 411: /* Length Required */
440: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_LENGTH_REQUIRED,
441: me->reason, (int) strlen(me->reason), "HTTPNextState");
442: http->next = HTTP_ERROR;
443: http->result = HT_LENGTH_REQUIRED;
444: break;
445:
446: case 412: /* Precondition failed */
447: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PRECON_FAILED,
448: me->reason, (int) strlen(me->reason), "HTTPNextState");
449: http->next = HTTP_ERROR;
450: http->result = -412;
451: break;
452:
453: case 413: /* Request entity too large */
454: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TOO_BIG,
455: me->reason, (int) strlen(me->reason), "HTTPNextState");
456: http->next = HTTP_ERROR;
457: http->result = -413;
458: break;
459:
460: case 414: /* Request-URI too long */
461: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_URI_TOO_BIG,
462: me->reason, (int) strlen(me->reason), "HTTPNextState");
463: http->next = HTTP_ERROR;
464: http->result = -414;
465: break;
466:
467: case 415: /* Unsupported */
468: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNSUPPORTED,
469: me->reason, (int) strlen(me->reason), "HTTPNextState");
470: http->next = HTTP_ERROR;
471: http->result = -415;
472: break;
473:
474: case 416: /* Request Range not satisfiable */
475: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_RANGE,
476: me->reason, (int) strlen(me->reason), "HTTPNextState");
477: http->next = HTTP_ERROR;
478: http->result = -416;
479: break;
480:
481: case 417: /* Expectation Failed */
482: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_EXPECTATION_FAILED,
483: me->reason, (int) strlen(me->reason), "HTTPNextState");
484: http->next = HTTP_ERROR;
485: http->result = -417;
486: break;
487:
488: case 418: /* Reauthentication required */
489: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_REAUTH,
490: me->reason, (int) strlen(me->reason), "HTTPNextState");
491: http->next = HTTP_ERROR;
492: http->result = -418;
493: break;
494:
495: case 419: /* Proxy Reauthentication required */
496: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PROXY_REAUTH,
497: me->reason, (int) strlen(me->reason), "HTTPNextState");
498: http->next = HTTP_ERROR;
499: http->result = -419;
500: break;
501:
502: default:
503: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
504: me->reason, (int) strlen(me->reason), "HTTPNextState");
505: http->next = HTTP_ERROR;
506: http->result = -400;
507: break;
508: }
1.134 frystyk 509: break;
510:
1.158 frystyk 511: case 5:
1.134 frystyk 512:
1.158 frystyk 513: switch (me->status) {
514: case 501:
515: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
516: me->reason, (int) strlen(me->reason), "HTTPNextState");
517: http->next = HTTP_ERROR;
518: http->result = -501;
519: break;
520:
521: case 502:
522: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
523: me->reason, (int) strlen(me->reason), "HTTPNextState");
524: http->next = HTTP_ERROR;
525: http->result = -502;
526: break;
527:
528: case 503:
529: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_DOWN,
530: me->reason, (int) strlen(me->reason), "HTTPNextState");
531: http->next = HTTP_ERROR;
532:
533: /*
534: ** If Retry-After header is found then return HT_RETRY else HT_ERROR.
535: ** The caller may want to reissue the request at a later point in time.
536: */
537: {
538: HTResponse * response = HTRequest_response(me->request);
539: if (HTResponse_retryTime(response))
540: http->result = HT_RETRY;
541: else
542: http->result = -500;
543: }
544: break;
545:
546: case 504:
547: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
548: me->reason, (int) strlen(me->reason), "HTTPNextState");
549: http->next = HTTP_ERROR;
550: http->result = -504;
551: break;
552:
553: case 505: /* Unsupported protocol version */
554: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_VERSION,
555: me->reason, (int) strlen(me->reason), "HTTPNextState");
556: http->next = HTTP_ERROR;
557: http->result = HT_BAD_VERSION;
558: break;
559:
560: case 506: /* Partial update Not Implemented */
561: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NO_PARTIAL_UPDATE,
562: me->reason, (int) strlen(me->reason), "HTTPNextState");
563: http->next = HTTP_ERROR;
564: http->result = HT_BAD_VERSION;
565: break;
566:
567: default: /* bad number */
568: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
569: me->reason, (int) strlen(me->reason), "HTTPNextState");
570: http->next = HTTP_ERROR;
571: http->result = -500;
572: break;
1.140 frystyk 573: }
1.78 frystyk 574: break;
575:
1.158 frystyk 576: default:
1.104 frystyk 577: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.158 frystyk 578: (void *) me->buffer, me->buflen, "HTTPNextState");
1.134 frystyk 579: http->next = HTTP_ERROR;
1.155 frystyk 580: http->result = -(me->status);
1.71 frystyk 581: break;
1.55 frystyk 582: }
583: }
584:
1.71 frystyk 585: /* ------------------------------------------------------------------------- */
586: /* HTTP Status Line Stream */
587: /* ------------------------------------------------------------------------- */
1.55 frystyk 588:
1.71 frystyk 589: /*
1.141 frystyk 590: ** Analyze the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 591: ** then create a MIME-stream, else create a Guess stream to find out
592: ** what the 0.9 server is sending. We need to copy the buffer as we don't
593: ** know if we can modify the contents or not.
1.78 frystyk 594: **
595: ** Stream handling is a function of the status code returned from the
596: ** server:
597: ** 200: Use `output_stream' in HTRequest structure
1.94 frystyk 598: ** else: Use `debug_stream' in HTRequest structure
1.80 frystyk 599: **
600: ** Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 601: */
1.157 frystyk 602: PRIVATE int stream_pipe (HTStream * me, int length)
1.56 frystyk 603: {
1.136 frystyk 604: HTRequest * request = me->request;
605: HTNet * net = HTRequest_net(request);
1.123 frystyk 606: HTHost * host = HTNet_host(net);
1.141 frystyk 607:
1.153 frystyk 608: #if 0
609: {
610: char * uri = HTAnchor_address((HTAnchor *) HTRequest_anchor(request));
611: fprintf(stderr, "HTTP header: %s for '%s'\n", me->buffer, uri);
612: HT_FREE(uri);
613: }
614: #endif
615:
1.132 frystyk 616: /*
617: ** Just check for HTTP and not HTTP/ as NCSA server chokes on 1.1 replies
618: ** Thanks to Markku Savela <msa@msa.tte.vtt.fi>
1.141 frystyk 619:
1.132 frystyk 620: */
621: if (strncasecomp(me->buffer, "http", 4)) {
1.80 frystyk 622: int status;
1.136 frystyk 623: HTRequest_addError(request, ERR_INFO, NO, HTERR_HTTP09,
1.80 frystyk 624: (void *) me->buffer, me->buflen, "HTTPStatusStream");
1.136 frystyk 625: me->target = HTStreamStack(WWW_UNKNOWN,
626: HTRequest_outputFormat(request),
627: HTRequest_outputStream(request),
628: request, NO);
1.134 frystyk 629: me->http->next = HTTP_OK;
1.80 frystyk 630: if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
631: me->transparent = YES;
1.123 frystyk 632: HTHost_setVersion(host, HTTP_09);
1.157 frystyk 633: if (length > 0) HTHost_setConsumed(host, length);
1.178 frystyk 634: HTTRACE(PROT_TRACE, "HTTP Status. `%s\' is probably a broken 1.0 server that doesn't understand HEAD\n" _
1.171 frystyk 635: HTHost_name(host));
636: return HT_ERROR;
1.80 frystyk 637: } else {
1.140 frystyk 638: HTResponse * response = HTRequest_response(request);
1.155 frystyk 639: char * ptr = me->buffer+5; /* Skip the HTTP part */
640: char * vptr = NULL;
641: int major = 0;
642: int minor = 0;
643: me->version = vptr = HTNextField(&ptr);
644: if (vptr) {
645: major = (int) strtol(me->version, &vptr, 10);
646: if (vptr++) minor = strtol(vptr, NULL, 10);
647: }
1.95 frystyk 648:
1.130 frystyk 649: /* Here we want to find out when to use persistent connection */
1.171 frystyk 650: if (major > 1 && major < 100) {
1.178 frystyk 651: HTTRACE(PROT_TRACE, "HTTP Status. Major version number is %d\n" _ major);
1.155 frystyk 652: me->target = HTErrorStream();
1.158 frystyk 653: me->status = 9999;
1.155 frystyk 654: HTTPNextState(me); /* Get next state */
1.158 frystyk 655: return HT_ERROR;
1.155 frystyk 656: } else if (minor <= 0) {
1.171 frystyk 657: if (major > 100) {
1.178 frystyk 658: HTTRACE(PROT_TRACE, "HTTP Status. This is a *BROKEN* HTTP/1.0 server\n");
1.171 frystyk 659: me->status = 200;
660: } else {
1.178 frystyk 661: HTTRACE(PROT_TRACE, "HTTP Status. This is an HTTP/1.0 server\n");
1.171 frystyk 662: me->status = atoi(HTNextField(&ptr));
663: }
1.128 frystyk 664: HTHost_setVersion(host, HTTP_10);
1.155 frystyk 665: } else { /* 1.x, x>0 family */
666: HTHost_setVersion(host, HTTP_11); /* Best we can do */
1.156 frystyk 667: if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 668: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with NO PIPELINING\n");
1.147 frystyk 669: HTNet_setPersistent(net, YES, HT_TP_SINGLE);
1.156 frystyk 670: } else if (ConnectionMode & HTTP_11_MUX) {
1.178 frystyk 671: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with MUXING\n");
1.156 frystyk 672: HTNet_setPersistent(net, YES, HT_TP_INTERLEAVE);
1.147 frystyk 673: } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 674: HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 675: HTHost_setVersion(host, HTTP_10);
676: HTNet_setPersistent(net, NO, HT_TP_SINGLE);
677: } else
678: HTNet_setPersistent(net, YES, HT_TP_PIPELINE);
1.171 frystyk 679: me->status = atoi(HTNextField(&ptr));
1.128 frystyk 680: }
1.95 frystyk 681:
1.81 frystyk 682: me->reason = ptr;
683: if ((ptr = strchr(me->reason, '\r')) != NULL) /* Strip \r and \n */
684: *ptr = '0円';
685: else if ((ptr = strchr(me->reason, '\n')) != NULL)
686: *ptr = '0円';
687:
1.130 frystyk 688: /*
689: ** If it is a 1xx code then find out what to do and return until we
690: ** get the next code. In the case of Upgrade we may not get back here
691: ** at all. If we are uploading an entity then continue doing that
692: */
693: if (me->status/100 == 1) {
1.136 frystyk 694: if (HTTPInformation(me) == YES) {
695: me->buflen = 0;
696: me->state = EOL_BEGIN;
1.157 frystyk 697: if (me->info_target) (*me->info_target->isa->_free)(me->info_target);
698: me->info_target = HTStreamStack(WWW_MIME_CONT,
699: HTRequest_debugFormat(request),
700: HTRequest_debugStream(request),
701: request, NO);
702: if (length > 0) HTHost_setConsumed(host, length);
703: return HT_OK;
1.103 frystyk 704: }
1.56 frystyk 705: }
1.133 frystyk 706:
707: /*
708: ** As we are getting fresh metainformation in the HTTP response,
709: ** we clear the old metainfomation in order not to mix it with the new
710: ** one. This is particularly important for the content-length and the
1.139 frystyk 711: ** like. The TRACE and OPTIONS method just adds to the current
712: ** metainformation so in that case we don't clear the anchor.
1.133 frystyk 713: */
1.136 frystyk 714: if (me->status==200 || me->status==203 || me->status==300) {
1.140 frystyk 715: /*
716: ** 200, 203 and 300 are all fully cacheable responses. No byte
717: ** ranges or anything else make life hard in this case.
718: */
1.148 frystyk 719: HTAnchor_clearHeader(HTRequest_anchor(request));
1.166 frystyk 720: HTResponse_setCachable(response, HT_CACHE_ALL);
1.136 frystyk 721: me->target = HTStreamStack(WWW_MIME,
722: HTRequest_outputFormat(request),
723: HTRequest_outputStream(request),
724: request, NO);
1.176 frystyk 725: } else if (me->status==204) {
726: HTResponse_setCachable(response, HT_CACHE_ALL);
727: me->target = HTStreamStack(WWW_MIME_HEAD,
728: HTRequest_debugFormat(request),
729: HTRequest_debugStream(request),
730: request, NO);
1.140 frystyk 731: } else if (me->status==206) {
732: /*
733: ** We got a partial response and now we must check whether
734: ** we issued a cache If-Range request or it was a new
735: ** partial response which we don't have in cache. In the latter
736: ** case, we don't cache the object and in the former we append
737: ** the result to the already existing cache entry.
738: */
739: HTReload reload = HTRequest_reloadMode(request);
740: if (reload == HT_CACHE_RANGE_VALIDATE) {
1.166 frystyk 741: HTResponse_setCachable(response, HT_CACHE_ALL);
1.140 frystyk 742: me->target = HTStreamStack(WWW_MIME_PART,
743: HTRequest_outputFormat(request),
744: HTRequest_outputStream(request),
745: request, NO);
746: } else {
1.149 frystyk 747: HTAnchor_clearHeader(HTRequest_anchor(request));
1.140 frystyk 748: me->target = HTStreamStack(WWW_MIME,
749: HTRequest_outputFormat(request),
750: HTRequest_outputStream(request),
751: request, NO);
752: }
1.176 frystyk 753: } else if (me->status==304) {
754: HTResponse_setCachable(response, HT_CACHE_NOT_MODIFIED);
1.136 frystyk 755: me->target = HTStreamStack(WWW_MIME_HEAD,
756: HTRequest_debugFormat(request),
757: HTRequest_debugStream(request),
758: request, NO);
759: } else if (HTRequest_debugStream(request)) {
1.175 frystyk 760: HTResponse_setCachable(response,
761: (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 762: me->target = HTStreamStack(WWW_MIME,
763: HTRequest_debugFormat(request),
764: HTRequest_debugStream(request),
765: request, NO);
766: } else {
1.140 frystyk 767: /*
768: ** We still need to parse the MIME part in order to find any
769: ** valuable meta information which is needed from the response.
770: */
1.175 frystyk 771: HTResponse_setCachable(response,
772: (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 773: me->target = HTStreamStack(WWW_MIME,
774: HTRequest_debugFormat(request),
775: HTRequest_debugStream(request),
776: request, NO);
1.133 frystyk 777: }
1.56 frystyk 778: }
1.113 frystyk 779: if (!me->target) me->target = HTErrorStream();
1.81 frystyk 780: HTTPNextState(me); /* Get next state */
1.80 frystyk 781: me->transparent = YES;
1.157 frystyk 782: if (length > 0) HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length);
1.80 frystyk 783: return HT_OK;
1.71 frystyk 784: }
1.56 frystyk 785:
1.80 frystyk 786: /*
787: ** Searches for HTTP header line until buffer fills up or a CRLF or LF
788: ** is found
789: */
1.119 frystyk 790: PRIVATE int HTTPStatus_put_block (HTStream * me, const char * b, int l)
1.71 frystyk 791: {
1.150 frystyk 792: int status = HT_OK;
1.153 frystyk 793: int length = l;
1.146 frystyk 794: me->startLen = me->buflen;
1.80 frystyk 795: while (!me->transparent && l-- > 0) {
1.157 frystyk 796: if (me->info_target) {
797:
798: /* Put data down the 1xx return code parser until we are done. */
799: status = (*me->info_target->isa->put_block)(me->info_target, b, l+1);
800: if (status != HT_CONTINUE) return status;
801:
802: /* Now free the info stream */
803: (*me->info_target->isa->_free)(me->info_target);
804: me->info_target = NULL;
805:
806: /* Update where we are in the stream */
807: l = HTHost_remainingRead(HTNet_host(HTRequest_net(me->request)));
1.163 frystyk 808: b += (length-l);
1.159 frystyk 809: length = l;
1.163 frystyk 810: if (l <= 0) break;
1.157 frystyk 811:
1.80 frystyk 812: } else {
813: *(me->buffer+me->buflen++) = *b;
814: if (me->state == EOL_FCR) {
815: if (*b == LF) { /* Line found */
1.157 frystyk 816: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 817: } else {
818: me->state = EOL_BEGIN;
819: }
820: } else if (*b == CR) {
821: me->state = EOL_FCR;
822: } else if (*b == LF) {
1.157 frystyk 823: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.71 frystyk 824: } else {
1.80 frystyk 825: if (me->buflen >= MAX_STATUS_LEN) {
1.157 frystyk 826: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 827: }
1.71 frystyk 828: }
1.80 frystyk 829: b++;
1.71 frystyk 830: }
1.56 frystyk 831: }
1.153 frystyk 832:
1.159 frystyk 833: if (!me->transparent && length != l)
834: HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length-l);
835:
1.99 frystyk 836: if (l > 0) return PUTBLOCK(b, l);
1.150 frystyk 837: return status;
1.56 frystyk 838: }
839:
1.119 frystyk 840: PRIVATE int HTTPStatus_put_string (HTStream * me, const char * s)
1.71 frystyk 841: {
1.80 frystyk 842: return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 843: }
1.56 frystyk 844:
1.100 frystyk 845: PRIVATE int HTTPStatus_put_character (HTStream * me, char c)
1.71 frystyk 846: {
1.80 frystyk 847: return HTTPStatus_put_block(me, &c, 1);
848: }
849:
1.100 frystyk 850: PRIVATE int HTTPStatus_flush (HTStream * me)
1.80 frystyk 851: {
852: return (*me->target->isa->flush)(me->target);
1.71 frystyk 853: }
854:
1.100 frystyk 855: PRIVATE int HTTPStatus_free (HTStream * me)
1.71 frystyk 856: {
1.87 frystyk 857: int status = HT_OK;
858: if (me->target) {
859: if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
860: return HT_WOULD_BLOCK;
861: }
1.115 frystyk 862: HT_FREE(me);
1.100 frystyk 863: return status;
1.71 frystyk 864: }
865:
1.104 frystyk 866: PRIVATE int HTTPStatus_abort (HTStream * me, HTList * e)
1.71 frystyk 867: {
868: if (me->target)
1.74 frystyk 869: ABORT_TARGET;
1.115 frystyk 870: HT_FREE(me);
1.178 frystyk 871: HTTRACE(PROT_TRACE, "HTTPStatus.. ABORTING...\n");
1.80 frystyk 872: return HT_ERROR;
1.71 frystyk 873: }
874:
875: /* HTTPStatus Stream
876: ** -----------------
877: */
1.119 frystyk 878: PRIVATE const HTStreamClass HTTPStatusClass =
1.71 frystyk 879: {
880: "HTTPStatus",
1.80 frystyk 881: HTTPStatus_flush,
1.71 frystyk 882: HTTPStatus_free,
883: HTTPStatus_abort,
884: HTTPStatus_put_character,
885: HTTPStatus_put_string,
886: HTTPStatus_put_block
887: };
888:
1.113 frystyk 889: PUBLIC HTStream * HTTPStatus_new (HTRequest * request,
890: void * param,
891: HTFormat input_format,
892: HTFormat output_format,
893: HTStream * output_stream)
1.71 frystyk 894: {
1.115 frystyk 895: HTStream * me;
896: if ((me = (HTStream *) HT_CALLOC(1, sizeof(HTStream))) == NULL)
897: HT_OUTOFMEM("HTTPStatus_new");
1.71 frystyk 898: me->isa = &HTTPStatusClass;
1.113 frystyk 899: if (request) {
1.126 frystyk 900: HTNet * net = HTRequest_net(request);
1.125 frystyk 901: /* Get existing copy */
902: http_info * http = (http_info *) HTNet_context(net);
1.113 frystyk 903: me->request = request;
904: me->http = http;
905: http->next = HTTP_ERROR;
906: me->state = EOL_BEGIN;
907: return me;
908: } else
909: return HTErrorStream();
1.71 frystyk 910: }
911:
912: /* ------------------------------------------------------------------------- */
913:
914: /* Load Document from HTTP Server HTLoadHTTP
1.55 frystyk 915: ** ==============================
916: **
917: ** Given a hypertext address, this routine loads a document.
918: **
919: ** On entry,
920: ** request This is the request structure
1.94 frystyk 921: ** returns HT_ERROR Error has occured in call back
922: ** HT_OK Call back was OK
1.55 frystyk 923: */
1.141 frystyk 924: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type);
925:
926: PUBLIC int HTLoadHTTP (SOCKET soc, HTRequest * request)
1.55 frystyk 927: {
928: http_info *http; /* Specific protocol information */
1.112 frystyk 929: HTParentAnchor *anchor = HTRequest_anchor(request);
1.141 frystyk 930: HTNet * net = HTRequest_net(request);
1.112 frystyk 931:
1.94 frystyk 932: /*
933: ** Initiate a new http structure and bind to request structure
934: ** This is actually state HTTP_BEGIN, but it can't be in the state
935: ** machine as we need the structure first.
936: */
1.178 frystyk 937: HTTRACE(PROT_TRACE, "HTTP........ Looking for `%s\'\n" _
1.141 frystyk 938: HTAnchor_physical(anchor));
939: if ((http = (http_info *) HT_CALLOC(1, sizeof(http_info))) == NULL)
940: HT_OUTOFMEM("HTLoadHTTP");
941: http->net = net;
1.157 frystyk 942: http->request = request;
1.141 frystyk 943: HTNet_setContext(net, http);
944: HTNet_setEventCallback(net, HTTPEvent);
945: HTNet_setEventParam(net, http); /* callbacks get http* */
946:
1.157 frystyk 947: return HTTPEvent(soc, http, HTEvent_BEGIN); /* get it started - ops is ignored */
948: }
949:
950: PRIVATE int FlushPutEvent (HTTimer * timer, void * param, HTEventType type)
951: {
952: http_info * http = (http_info *) param;
953: HTStream * input = HTRequest_inputStream(http->request);
954: HTPostCallback * pcbf = HTRequest_postCallback(http->request);
955:
1.165 frystyk 956: http->usedTimer = YES;
1.160 frystyk 957: if (timer != http->timer)
1.178 frystyk 958: HTDEBUGBREAK("HTTP timer %p not in sync\n" _ timer);
959: HTTRACE(PROT_TRACE, "Uploading... Flushing %p with timer %p\n" _ http _ timer);
1.157 frystyk 960:
961: /*
962: ** We ignore the return code here which we shouldn't!!!
963: */
964: if (http && input && pcbf) (*pcbf)(http->request, input);
965:
966: /*
1.172 frystyk 967: ** Delete the timer
1.157 frystyk 968: */
1.172 frystyk 969: HTTimer_delete(http->timer);
1.157 frystyk 970: http->timer = NULL;
1.165 frystyk 971:
1.157 frystyk 972: return HT_OK;
1.141 frystyk 973: }
974:
975: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type)
976: {
977: http_info * http = (http_info *)pVoid;
978: int status = HT_ERROR;
979: HTNet * net = http->net;
980: HTRequest * request = HTNet_request(net);
1.144 frystyk 981: HTParentAnchor * anchor = HTRequest_anchor(request);
982: HTHost * host = HTNet_host(net);
1.141 frystyk 983:
984: /*
1.166 frystyk 985: ** Check whether we have been interrupted or timed out
1.141 frystyk 986: */
987: if (type == HTEvent_BEGIN) {
1.134 frystyk 988: http->next = HTTP_OK;
989: http->result = HT_ERROR;
1.141 frystyk 990: } else if (type == HTEvent_CLOSE) {
1.179 ! frystyk 991: long read_len = HTNet_bytesRead(net);
! 992: long doc_len = HTAnchor_length(anchor);
! 993:
! 994: /*
! 995: ** It is OK to get a close if a) we don't pipeline and b)
! 996: ** we have the expected amount of data. In case we don't
! 997: ** know how much data to expect, we must accept it asis.
! 998: */
! 999: if (HTHost_numberOfOutstandingNetObjects(host) == 1 &&
! 1000: (doc_len<0 || doc_len==read_len)) {
! 1001: HTTPCleanup(request, HT_LOADED);
! 1002: } else {
! 1003: HTRequest_addError(request, ERR_FATAL, NO, HTERR_INTERRUPTED,
! 1004: NULL, 0, "HTLoadHTTP");
! 1005: HTTPCleanup(request, HT_INTERRUPTED);
! 1006: }
1.166 frystyk 1007: return HT_OK;
1008: } else if (type == HTEvent_TIMEOUT) {
1009: HTRequest_addError(request, ERR_FATAL, NO, HTERR_TIME_OUT,
1010: NULL, 0, "HTLoadHTTP");
1011: HTTPCleanup(request, HT_TIMEOUT);
1.94 frystyk 1012: return HT_OK;
1.141 frystyk 1013: } else if (type == HTEvent_END) {
1014: HTTPCleanup(request, http->result);
1015: return HT_OK;
1016: } else if (type == HTEvent_RESET) {
1017: HTTPCleanup(request, HT_RECOVER_PIPE);
1.145 frystyk 1018: http->state = HTTP_BEGIN;
1.141 frystyk 1019: return HT_OK;
1020: }
1021:
1.71 frystyk 1022: /* Now jump into the machine. We know the state from the previous run */
1023: while (1) {
1024: switch (http->state) {
1.134 frystyk 1025: case HTTP_BEGIN:
1.144 frystyk 1026: status = HTHost_connect(host, net, HTAnchor_physical(anchor), HTTP_PORT);
1027: host = HTNet_host(net);
1.153 frystyk 1028: if (status == HT_OK) {
1.140 frystyk 1029:
1.123 frystyk 1030: /*
1.140 frystyk 1031: ** Check the protocol class to see if we have connected to a
1032: ** the right class of server, in this case HTTP. If we don't
1033: ** know the server then assume a HTTP/1.0
1.123 frystyk 1034: */
1035: {
1036: char * s_class = HTHost_class(host);
1.140 frystyk 1037: if (!s_class) {
1.174 frystyk 1038: if (HTRequest_proxy(request) == NULL) {
1039: HTAssocList * alist = HTRequest_connection(request);
1040: if (!(alist && HTAssocList_findObject(alist, "close")))
1041: HTRequest_addConnection(request, "Keep-Alive", "");
1042: }
1.140 frystyk 1043: HTHost_setClass(host, "http");
1044: } else if (strcasecomp(s_class, "http")) {
1.123 frystyk 1045: HTRequest_addError(request, ERR_FATAL, NO, HTERR_CLASS,
1046: NULL, 0, "HTLoadHTTP");
1047: http->state = HTTP_ERROR;
1048: break;
1049: }
1.95 frystyk 1050: }
1.147 frystyk 1051:
1.156 frystyk 1052: if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 1053: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 WITH NO PIPELINING\n");
1.147 frystyk 1054: HTRequest_setFlush(request, YES);
1055: } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 1056: HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 1057: HTHost_setVersion(host, HTTP_10);
1058: }
1059:
1.151 frystyk 1060: if (HTNet_preemptive(net)) {
1.178 frystyk 1061: HTTRACE(PROT_TRACE, "HTTP........ Force flush on preemptive load\n");
1.151 frystyk 1062: HTRequest_setFlush(request, YES);
1063: }
1064:
1.147 frystyk 1065: /* Jump to next state */
1.144 frystyk 1066: http->state = HTTP_NEED_STREAM;
1.159 frystyk 1067: } else if (status == HT_WOULD_BLOCK || status == HT_PENDING) {
1.144 frystyk 1068: return HT_OK;
1.171 frystyk 1069: } else if (status == HT_NO_HOST) {
1070: http->result = HT_NO_HOST;
1071: http->state = HTTP_ERROR;
1.159 frystyk 1072: } else
1.144 frystyk 1073: http->state = HTTP_ERROR; /* Error or interrupt */
1074: break;
1075:
1076: case HTTP_NEED_STREAM:
1.138 frystyk 1077:
1.144 frystyk 1078: /*
1079: ** Create the stream pipe FROM the channel to the application.
1080: ** The target for the input stream pipe is set up using the
1081: ** stream stack.
1082: */
1.167 frystyk 1083: {
1084: /*
1085: ** during a recovery, we might keep the same HTNet object.
1086: ** if so, reuse it's read stream
1087: */
1.176 frystyk 1088: HTStream * me = HTNet_readStream( net );
1.167 frystyk 1089: if ( me == NULL ) {
1.173 frystyk 1090: me = HTStreamStack(WWW_HTTP,
1091: HTRequest_outputFormat(request),
1092: HTRequest_outputStream(request),
1093: request, YES);
1.178 frystyk 1094: #ifdef HTDEBUG
1.173 frystyk 1095: if (PROT_TRACE) {
1096: if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
1097: if (htfp) {
1098: me = HTTee(me, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1099: HTTRACE(PROT_TRACE, "HTTP........ Dumping response to `%s\'\n" _ HTTP_OUTPUT);
1.173 frystyk 1100: }
1101: }
1.178 frystyk 1102: #endif /* HTDEBUG */
1.173 frystyk 1103:
1104: HTNet_setReadStream(net, me);
1.167 frystyk 1105: }
1106: HTRequest_setOutputConnected(request, YES);
1.144 frystyk 1107: }
1.127 frystyk 1108:
1.144 frystyk 1109: /*
1110: ** Create the stream pipe TO the channel from the application
1111: ** and hook it up to the request object
1112: */
1113: {
1114: HTChannel * channel = HTHost_channel(host);
1115: HTOutputStream * output = HTChannel_getChannelOStream(channel);
1116: int version = HTHost_version(host);
1117: HTStream * app = NULL;
1118:
1.178 frystyk 1119: #ifdef HTDEBUG
1.144 frystyk 1120: if (PROT_TRACE) {
1.162 frystyk 1121: if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
1122: if (htfp) {
1.144 frystyk 1123: output = (HTOutputStream *)
1.162 frystyk 1124: HTTee((HTStream *) output, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1125: HTTRACE(PROT_TRACE, "HTTP........ Dumping request to `%s\'\n" _ HTTP_OUTPUT);
1.144 frystyk 1126: }
1127: }
1.178 frystyk 1128: #endif /* HTDEBUG */
1.144 frystyk 1129: app = HTMethod_hasEntity(HTRequest_method(request)) ?
1130: HTMIMERequest_new(request,
1131: HTTPRequest_new(request, (HTStream *) output, NO,
1132: version),
1133: YES) :
1134: HTTPRequest_new(request, (HTStream *) output, YES, version);
1135: HTRequest_setInputStream(request, app);
1136: }
1.88 frystyk 1137:
1.144 frystyk 1138: /*
1139: ** Set up concurrent read/write if this request isn't the
1140: ** source for a PUT or POST. As source we don't start reading
1141: ** before all destinations are ready. If destination then
1142: ** register the input stream and get ready for read
1143: */
1144: if (HTRequest_isDestination(request)) {
1145: HTHost_register(host, net, HTEvent_READ);
1146: HTRequest_linkDestination(request);
1147: }
1148: http->state = HTTP_CONNECTED;
1149: type = HTEvent_WRITE; /* fresh, so try a write */
1.71 frystyk 1150: break;
1151:
1.87 frystyk 1152: /* As we can do simultanous read and write this is now one state */
1.141 frystyk 1153: case HTTP_CONNECTED:
1154: if (type == HTEvent_WRITE) {
1.157 frystyk 1155: HTStream * input = HTRequest_inputStream(request);
1156: HTPostCallback * pcbf = HTRequest_postCallback(request);
1157: status = HTRequest_flush(request) ?
1158: HTHost_forceFlush(host) : (*input->isa->flush)(input);
1159:
1160: /*
1161: ** Check to see if we are uploading something or just a normal
1162: ** GET kind of thing.
1163: */
1164: if (pcbf) {
1165: if (http->lock == NO) {
1166: int retrys = HTRequest_retrys(request);
1.169 frystyk 1167: ms_t delay = retrys > 3 ? HTSecondWriteDelay : HTFirstWriteDelay;
1.165 frystyk 1168: if (!http->timer && !http->usedTimer) {
1.162 frystyk 1169: http->timer = HTTimer_new(NULL, FlushPutEvent,
1170: http, delay, YES, NO);
1.178 frystyk 1171: HTTRACE(PROT_TRACE, "Uploading... Holding %p for %lu ms using time %p\n" _
1172: http _ delay _ http->timer);
1.157 frystyk 1173: HTHost_register(host, net, HTEvent_READ);
1174: }
1175: http->lock = YES;
1176: }
1177: type = HTEvent_READ;
1178: } else {
1179:
1180: /*
1181: ** Check to see if we can start a new request
1182: ** pending in the host object.
1183: */
1184: HTHost_launchPending(host);
1185: type = HTEvent_READ;
1186: }
1187:
1188: /* Now check the status code */
1189: if (status == HT_WOULD_BLOCK)
1190: return HT_OK;
1191: else if (status == HT_PAUSE || status == HT_LOADED) {
1192: type = HTEvent_READ;
1.168 frystyk 1193: } else if (status==HT_ERROR)
1.157 frystyk 1194: http->state = HTTP_RECOVER_PIPE;
1195: } else if (type == HTEvent_FLUSH) {
1196: HTStream * input = HTRequest_inputStream(request);
1197: if (input == NULL)
1198: return HT_ERROR;
1199: return (*input->isa->flush)(input);
1200: } else if (type == HTEvent_READ) {
1201: status = HTHost_read(host, net);
1202: if (status == HT_WOULD_BLOCK)
1203: return HT_OK;
1204: else if (status == HT_CONTINUE) {
1.178 frystyk 1205: HTTRACE(PROT_TRACE, "HTTP........ Continuing\n");
1.157 frystyk 1206: http->lock = NO;
1207: continue;
1208: } else if (status==HT_LOADED)
1209: http->state = http->next; /* Jump to next state (OK or ERROR) */
1210: else if (status==HT_CLOSED)
1211: http->state = HTTP_RECOVER_PIPE;
1.167 frystyk 1212: else if (status == HT_ERROR)
1213: http->state = HTTP_KILL_PIPE;
1.157 frystyk 1214: else
1215: http->state = HTTP_ERROR;
1216: } else {
1217: http->state = HTTP_ERROR; /* don't know how to handle OOB */
1218: }
1219: break;
1.141 frystyk 1220:
1.134 frystyk 1221: case HTTP_OK:
1222: HTTPCleanup(request, http->result);
1.94 frystyk 1223: return HT_OK;
1.71 frystyk 1224: break;
1.141 frystyk 1225:
1226: case HTTP_RECOVER_PIPE:
1227: {
1228: /*
1229: ** If this is a persistent connection and we get a close
1230: ** then it is an error and we should recover from it by
1231: ** restarting the pipe line of requests if any
1232: */
1.151 frystyk 1233: if (HTHost_isPersistent(host) && !HTHost_closeNotification(host)) {
1.143 frystyk 1234: if (host == NULL) return HT_ERROR;
1.144 frystyk 1235: HTRequest_setFlush(request, YES);
1236: HTHost_recoverPipe(host);
1237: return HT_OK;
1.141 frystyk 1238: } else
1239: http->state = HTTP_OK;
1240: }
1.143 frystyk 1241: break;
1.141 frystyk 1242:
1.167 frystyk 1243: case HTTP_KILL_PIPE:
1244: if (host == NULL) return HT_ERROR;
1245: HTHost_killPipe(host);
1246: return HT_OK;
1247: break;
1248:
1.71 frystyk 1249: case HTTP_ERROR:
1.143 frystyk 1250: HTTPCleanup(request, http->result);
1251: return HT_OK;
1252: break;
1253:
1.141 frystyk 1254: default:
1.178 frystyk 1255: HTDEBUGBREAK("Bad http state %d\n" _ http->state);
1.71 frystyk 1256: }
1257: } /* End of while(1) */
1258: }
1.88 frystyk 1259:
1.147 frystyk 1260: PUBLIC void HTTP_setConnectionMode (HTTPConnectionMode mode)
1261: {
1262: ConnectionMode = mode;
1263: }
1264:
1265: PUBLIC HTTPConnectionMode HTTP_connectionMode (void)
1266: {
1267: return ConnectionMode;
1268: }
1.21 luotonen 1269:
1.169 frystyk 1270: PUBLIC BOOL HTTP_setBodyWriteDelay (ms_t first_try, ms_t second_try)
1271: {
1272: if (first_try > 20 && second_try >= first_try) {
1273: HTFirstWriteDelay = first_try;
1274: HTSecondWriteDelay = second_try;
1275: return YES;
1276: }
1277: return NO;
1278: }
1279:
1280: PUBLIC void HTTP_bodyWriteDelay (ms_t * first_try, ms_t * second_try)
1281: {
1282: *first_try = HTFirstWriteDelay;
1283: *second_try = HTSecondWriteDelay;
1.170 frystyk 1284: }
1285:
Webmaster