Annotation of libwww/Library/src/HTTP.c, revision 1.180
1.74 frystyk 1: /* HTTP.c
2: ** MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: ** (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: ** Please first read the full copyright statement in the file COPYRIGH.
1.180 ! frystyk 6: ** @(#) $Id: HTTP.c,v 1.179 1999年02月27日 01:13:30 frystyk Exp $
1.74 frystyk 7: **
8: ** This module implments the HTTP protocol as a state machine
1.55 frystyk 9: **
10: ** History:
1.59 frystyk 11: ** < May 24 94 ?? Unknown - but obviously written
1.56 frystyk 12: ** May 24 94 HF Made reentrent and cleaned up a bit. Implemented
13: ** Forward, redirection, error handling and referer field
1.67 duns 14: ** 8 Jul 94 FM Insulate free() from _free structure element.
1.71 frystyk 15: ** Jul 94 HFN Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 16: **
1.1 timbl 17: */
18:
1.78 frystyk 19: /* Library include files */
1.161 frystyk 20: #include "wwwsys.h"
1.123 frystyk 21: #include "WWWUtil.h"
22: #include "WWWCore.h"
1.177 frystyk 23: #include "HTHeader.h"
24: #include "HTMIMERq.h"
1.94 frystyk 25: #include "HTReqMan.h"
1.179 frystyk 26: #include "HTNetMan.h"
1.109 frystyk 27: #include "HTTPUtil.h"
1.80 frystyk 28: #include "HTTPReq.h"
1.55 frystyk 29: #include "HTTP.h" /* Implements */
30:
31: /* Macros and other defines */
1.94 frystyk 32: #ifndef HTTP_PORT
33: #define HTTP_PORT 80 /* Allocated to http by Jon Postel/ISI 24-Jan-92 */
34: #endif
35:
1.71 frystyk 36: #define PUTC(c) (*me->target->isa->put_character)(me->target, c)
37: #define PUTS(s) (*me->target->isa->put_string)(me->target, s)
38: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
39: #define FREE_TARGET (*me->target->isa->_free)(me->target)
1.74 frystyk 40: #define ABORT_TARGET (*me->target->isa->abort)(me->target, e)
1.2 timbl 41:
1.178 frystyk 42: #ifdef HTDEBUG
1.177 frystyk 43: #include "WWWStream.h"
1.147 frystyk 44: #define HTTP_OUTPUT "w3chttp.out"
1.162 frystyk 45: PRIVATE FILE * htfp = NULL;
1.140 frystyk 46: #endif
1.139 frystyk 47:
1.59 frystyk 48: /* Type definitions and global variables etc. local to this module */
1.94 frystyk 49:
50: /* Final states have negative value */
1.59 frystyk 51: typedef enum _HTTPState {
1.167 frystyk 52: HTTP_KILL_PIPE = -4,
1.141 frystyk 53: HTTP_RECOVER_PIPE = -3,
1.134 frystyk 54: HTTP_ERROR = -2,
55: HTTP_OK = -1,
1.71 frystyk 56: HTTP_BEGIN = 0,
1.144 frystyk 57: HTTP_NEED_STREAM,
1.141 frystyk 58: HTTP_CONNECTED
1.59 frystyk 59: } HTTPState;
1.55 frystyk 60:
1.94 frystyk 61: /* This is the context structure for the this module */
1.55 frystyk 62: typedef struct _http_info {
1.81 frystyk 63: HTTPState state; /* Current State of the connection */
64: HTTPState next; /* Next state */
1.134 frystyk 65: int result; /* Result to report to the after filter */
1.139 frystyk 66: BOOL lock; /* Block for writing */
1.141 frystyk 67: HTNet * net;
1.157 frystyk 68: HTRequest * request;
69: HTTimer * timer;
1.165 frystyk 70: BOOL usedTimer;
1.55 frystyk 71: } http_info;
72:
1.88 frystyk 73: #define MAX_STATUS_LEN 100 /* Max nb of chars to check StatusLine */
1.55 frystyk 74:
1.71 frystyk 75: struct _HTStream {
1.119 frystyk 76: const HTStreamClass * isa;
1.71 frystyk 77: HTStream * target;
1.157 frystyk 78: HTStream * info_target; /* For 100 codes */
1.71 frystyk 79: HTRequest * request;
80: http_info * http;
1.121 frystyk 81: HTEOLState state;
1.71 frystyk 82: BOOL transparent;
1.150 frystyk 83: BOOL cont;
1.81 frystyk 84: char * version; /* Should we save this? */
1.71 frystyk 85: int status;
1.81 frystyk 86: char * reason;
1.71 frystyk 87: char buffer[MAX_STATUS_LEN+1];
1.80 frystyk 88: int buflen;
1.146 frystyk 89: int startLen;/* buflen when put_block was called */
1.71 frystyk 90: };
1.21 luotonen 91:
1.123 frystyk 92: struct _HTInputStream {
93: const HTInputStreamClass * isa;
94: };
95:
1.169 frystyk 96: /* How long to wait before writing the body in PUT and POST requests */
97: #define DEFAULT_FIRST_WRITE_DELAY 2000
98: #define DEFAULT_SECOND_WRITE_DELAY 3000
99:
100: PRIVATE ms_t HTFirstWriteDelay = DEFAULT_FIRST_WRITE_DELAY;
101: PRIVATE ms_t HTSecondWriteDelay = DEFAULT_SECOND_WRITE_DELAY;
102:
1.147 frystyk 103: #ifdef HT_NO_PIPELINING
1.156 frystyk 104: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_NO_PIPELINING;
1.147 frystyk 105: #else
1.156 frystyk 106: #ifdef HT_MUX
107: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_MUX;
108: #else
109: #ifdef HT_FORCE_10
110: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_FORCE_10;
111: #else
112: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_PIPELINING;
113: #endif
114: #endif
1.147 frystyk 115: #endif
116:
1.71 frystyk 117: /* ------------------------------------------------------------------------- */
118: /* Help Functions */
119: /* ------------------------------------------------------------------------- */
1.21 luotonen 120:
1.94 frystyk 121: /* HTTPCleanup
122: ** -----------
1.55 frystyk 123: ** This function closes the connection and frees memory.
1.94 frystyk 124: ** Returns YES on OK, else NO
1.1 timbl 125: */
1.94 frystyk 126: PRIVATE int HTTPCleanup (HTRequest *req, int status)
1.1 timbl 127: {
1.126 frystyk 128: HTNet * net = HTRequest_net(req);
129: http_info * http = (http_info *) HTNet_context(net);
130: HTStream * input = HTRequest_inputStream(req);
1.80 frystyk 131:
1.178 frystyk 132: HTTRACE(PROT_TRACE, "HTTP Clean.. Called with status %d, net %p\n" _ status _ net);
1.144 frystyk 133:
1.164 frystyk 134: if (status == HT_INTERRUPTED) {
135: HTAlertCallback * cbf = HTAlert_find(HT_PROG_INTERRUPT);
136: if (cbf) (*cbf)(req, HT_PROG_INTERRUPT,
137: HT_MSG_NULL, NULL, NULL, NULL);
1.166 frystyk 138: } else if (status == HT_TIMEOUT) {
139: HTAlertCallback * cbf = HTAlert_find(HT_PROG_TIMEOUT);
140: if (cbf) (*cbf)(req, HT_PROG_TIMEOUT,
141: HT_MSG_NULL, NULL, NULL, NULL);
1.164 frystyk 142: }
1.166 frystyk 143:
1.94 frystyk 144: /* Free stream with data TO network */
1.167 frystyk 145: if (input) {
1.166 frystyk 146: if (status==HT_INTERRUPTED || status==HT_RECOVER_PIPE || status==HT_TIMEOUT)
1.126 frystyk 147: (*input->isa->abort)(input, NULL);
1.94 frystyk 148: else
1.126 frystyk 149: (*input->isa->_free)(input);
150: HTRequest_setInputStream(req, NULL);
1.94 frystyk 151: }
1.88 frystyk 152:
1.144 frystyk 153: /*
1.157 frystyk 154: ** Remove if we have registered an upload function as a callback
155: */
156: if (http->timer) {
157: HTTimer_delete(http->timer);
158: http->timer = NULL;
159: }
160:
161: /*
1.144 frystyk 162: ** Remove the request object and our own context structure for http.
163: */
164: if (status != HT_RECOVER_PIPE) {
1.153 frystyk 165: HTNet_delete(net, status);
1.141 frystyk 166: HT_FREE(http);
167: }
1.94 frystyk 168: return YES;
1.55 frystyk 169: }
170:
1.71 frystyk 171: /*
1.130 frystyk 172: ** Informational 1xx codes are handled separately
1.136 frystyk 173: ** Returns YES if we should continue, NO if we should stop
1.55 frystyk 174: */
1.130 frystyk 175: PRIVATE BOOL HTTPInformation (HTStream * me)
1.55 frystyk 176: {
1.136 frystyk 177: http_info * http = me->http;
1.71 frystyk 178: switch (me->status) {
179:
1.136 frystyk 180: case 100:
1.161 frystyk 181: #if 0
1.136 frystyk 182: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CONTINUE,
183: me->reason, (int) strlen(me->reason),
184: "HTTPInformation");
1.161 frystyk 185: #endif
1.136 frystyk 186: return YES;
187: break;
188:
1.130 frystyk 189: case 101:
1.136 frystyk 190: /*
191: ** We consider 101 Switching as a final state and exit this request
192: */
1.130 frystyk 193: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_SWITCHING,
1.127 frystyk 194: me->reason, (int) strlen(me->reason),
1.130 frystyk 195: "HTTPInformation");
1.136 frystyk 196: http->next = HTTP_OK;
197: http->result = HT_UPGRADE;
1.180 ! frystyk 198: return YES;
1.127 frystyk 199: break;
200:
1.130 frystyk 201: default:
1.136 frystyk 202: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
203: (void *) me->buffer, me->buflen, "HTTPNextState");
204: http->next = HTTP_ERROR;
205: http->result = HT_ERROR;
1.127 frystyk 206: break;
1.130 frystyk 207: }
1.136 frystyk 208: return NO;
1.130 frystyk 209: }
210:
1.158 frystyk 211:
212:
1.130 frystyk 213: /*
214: ** This is a big switch handling all HTTP return codes. It puts in any
215: ** appropiate error message and decides whether we should expect data
216: ** or not.
217: */
218: PRIVATE void HTTPNextState (HTStream * me)
219: {
1.134 frystyk 220: http_info * http = me->http;
1.158 frystyk 221: int error_class = me->status / 100;
222: switch (error_class) {
1.127 frystyk 223:
1.158 frystyk 224: case 0: /* 0.9 response */
225: case 2:
1.112 frystyk 226:
1.158 frystyk 227: switch (me->status) {
1.112 frystyk 228:
1.158 frystyk 229: case 201: /* Created */
230: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CREATED,
231: me->reason, (int) strlen(me->reason),
232: "HTTPNextState");
233: http->next = HTTP_OK;
234: http->result = HT_CREATED;
235: break;
236:
237: case 202: /* Accepted */
238: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_ACCEPTED,
239: me->reason, (int) strlen(me->reason),
240: "HTTPNextState");
241: http->next = HTTP_OK;
242: http->result = HT_ACCEPTED;
243: break;
244:
245: case 203: /* Non-authoritative information */
246: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NON_AUTHORITATIVE,
247: me->reason, (int) strlen(me->reason),
248: "HTTPNextState");
249: http->next = HTTP_OK;
250: http->result = HT_LOADED;
251: break;
252:
253: case 204: /* No Response */
254: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NO_CONTENT,
255: me->reason, (int) strlen(me->reason),
256: "HTTPNextState");
257: http->next = HTTP_OK;
258: http->result = HT_NO_DATA;
259: break;
260:
261: case 205: /* Reset Content */
262: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_RESET,
263: me->reason, (int) strlen(me->reason),
264: "HTTPNextState");
265: http->next = HTTP_OK;
266: http->result = HT_RESET_CONTENT;
267: break;
268:
269: case 206: /* Partial Content */
270: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL,
271: me->reason, (int) strlen(me->reason),
272: "HTTPNextState");
273: http->next = HTTP_OK;
274: http->result = HT_PARTIAL_CONTENT;
275: break;
276:
277: case 207: /* Partial Update OK */
278: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL_OK,
279: me->reason, (int) strlen(me->reason),
280: "HTTPNextState");
281: http->next = HTTP_OK;
282: http->result = HT_PARTIAL_CONTENT;
283: break;
284:
285: default:
286: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_OK,
287: me->reason, (int) strlen(me->reason),
288: "HTTPNextState");
289: http->next = HTTP_OK;
290: http->result = HT_LOADED;
291: break;
292: }
1.134 frystyk 293: break;
294:
1.158 frystyk 295: case 3:
1.134 frystyk 296:
1.158 frystyk 297: switch (me->status) {
1.78 frystyk 298:
1.158 frystyk 299: case 301: /* Moved */
300: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MOVED,
301: me->reason, (int) strlen(me->reason),
302: "HTTPNextState");
303: http->next = HTTP_ERROR;
304: http->result = HT_PERM_REDIRECT;
305: break;
306:
307: case 302: /* Found */
308: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_FOUND,
309: me->reason, (int) strlen(me->reason),
310: "HTTPNextState");
311: http->next = HTTP_ERROR;
312: http->result = HT_FOUND;
313: break;
1.55 frystyk 314:
1.158 frystyk 315: case 303: /* Method */
316: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_METHOD,
317: me->reason, (int) strlen(me->reason),
318: "HTTPNextState");
319: http->next = HTTP_ERROR;
320: http->result = HT_SEE_OTHER;
321: break;
322:
323: case 304: /* Not Modified */
324: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NOT_MODIFIED,
325: me->reason, (int) strlen(me->reason),
326: "HTTPNextState");
327: http->next = HTTP_OK;
328: http->result = HT_NOT_MODIFIED;
329: break;
1.134 frystyk 330:
1.158 frystyk 331: case 305: /* Use proxy */
332: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_USE_PROXY,
333: me->reason, (int) strlen(me->reason),
334: "HTTPNextState");
335: http->next = HTTP_ERROR;
336: http->result = HT_USE_PROXY;
337: break;
1.55 frystyk 338:
1.152 frystyk 339: #if 0
1.158 frystyk 340: case 306: /* Use proxy */
341: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PROXY_REDIRECT,
342: me->reason, (int) strlen(me->reason),
343: "HTTPNextState");
344: http->next = HTTP_ERROR;
345: http->result = HT_USE_PROXY;
346: break;
1.152 frystyk 347: #endif
348:
1.158 frystyk 349: case 307: /* Use proxy */
350: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_TEMP_REDIRECT,
351: me->reason, (int) strlen(me->reason),
352: "HTTPNextState");
353: http->next = HTTP_ERROR;
354: http->result = HT_TEMP_REDIRECT;
355: break;
356:
357: default:
358: HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MULTIPLE,
359: me->reason, (int) strlen(me->reason),
360: "HTTPNextState");
361: http->next = HTTP_OK;
362: http->result = HT_LOADED;
363: break;
364: }
365: break;
366:
367: case 4:
368:
369: switch (me->status) {
370: case 401:
371: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
372: me->reason, (int) strlen(me->reason), "HTTPNextState");
373: http->next = HTTP_ERROR;
374: http->result = HT_NO_ACCESS;
375: break;
1.152 frystyk 376:
1.158 frystyk 377: case 402: /* Payment required */
378: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
379: me->reason, (int) strlen(me->reason), "HTTPNextState");
380: http->next = HTTP_ERROR;
381: http->result = -402;
382: break;
1.71 frystyk 383:
1.158 frystyk 384: case 403: /* Forbidden */
385: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
386: me->reason, (int) strlen(me->reason), "HTTPNextState");
387: http->next = HTTP_ERROR;
388: http->result = HT_FORBIDDEN;
389: break;
1.55 frystyk 390:
1.158 frystyk 391: case 404: /* Not Found */
392: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
393: me->reason, (int) strlen(me->reason), "HTTPNextState");
394: http->next = HTTP_ERROR;
395: http->result = -404;
396: break;
1.55 frystyk 397:
1.158 frystyk 398: case 405: /* Not Allowed */
399: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
400: me->reason, (int) strlen(me->reason), "HTTPNextState");
401: http->next = HTTP_ERROR;
402: http->result = -405;
403: break;
404:
405: case 406: /* None Acceptable */
406: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
407: me->reason, (int) strlen(me->reason), "HTTPNextState");
408: http->next = HTTP_ERROR;
409: http->result = HT_NOT_ACCEPTABLE;
410: break;
411:
412: case 407: /* Proxy Authentication Required */
413: HTRequest_addError(me->request, ERR_FATAL, NO,HTERR_PROXY_UNAUTHORIZED,
414: me->reason, (int) strlen(me->reason), "HTTPNextState");
415: http->next = HTTP_ERROR;
416: http->result = HT_NO_PROXY_ACCESS;
417: break;
418:
419: case 408: /* Request Timeout */
420: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
421: me->reason, (int) strlen(me->reason), "HTTPNextState");
422: http->next = HTTP_ERROR;
423: http->result = -408;
424: break;
425:
426: case 409: /* Conflict */
427: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_CONFLICT,
428: me->reason, (int) strlen(me->reason), "HTTPNextState");
429: http->next = HTTP_ERROR;
430: http->result = HT_CONFLICT;
431: break;
432:
433: case 410: /* Gone */
434: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GONE,
435: me->reason, (int) strlen(me->reason), "HTTPNextState");
436: http->next = HTTP_ERROR;
437: http->result = -410;
438: break;
439:
440: case 411: /* Length Required */
441: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_LENGTH_REQUIRED,
442: me->reason, (int) strlen(me->reason), "HTTPNextState");
443: http->next = HTTP_ERROR;
444: http->result = HT_LENGTH_REQUIRED;
445: break;
446:
447: case 412: /* Precondition failed */
448: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PRECON_FAILED,
449: me->reason, (int) strlen(me->reason), "HTTPNextState");
450: http->next = HTTP_ERROR;
451: http->result = -412;
452: break;
453:
454: case 413: /* Request entity too large */
455: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TOO_BIG,
456: me->reason, (int) strlen(me->reason), "HTTPNextState");
457: http->next = HTTP_ERROR;
458: http->result = -413;
459: break;
460:
461: case 414: /* Request-URI too long */
462: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_URI_TOO_BIG,
463: me->reason, (int) strlen(me->reason), "HTTPNextState");
464: http->next = HTTP_ERROR;
465: http->result = -414;
466: break;
467:
468: case 415: /* Unsupported */
469: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNSUPPORTED,
470: me->reason, (int) strlen(me->reason), "HTTPNextState");
471: http->next = HTTP_ERROR;
472: http->result = -415;
473: break;
474:
475: case 416: /* Request Range not satisfiable */
476: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_RANGE,
477: me->reason, (int) strlen(me->reason), "HTTPNextState");
478: http->next = HTTP_ERROR;
479: http->result = -416;
480: break;
481:
482: case 417: /* Expectation Failed */
483: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_EXPECTATION_FAILED,
484: me->reason, (int) strlen(me->reason), "HTTPNextState");
485: http->next = HTTP_ERROR;
486: http->result = -417;
487: break;
488:
489: case 418: /* Reauthentication required */
490: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_REAUTH,
491: me->reason, (int) strlen(me->reason), "HTTPNextState");
492: http->next = HTTP_ERROR;
493: http->result = -418;
494: break;
495:
496: case 419: /* Proxy Reauthentication required */
497: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PROXY_REAUTH,
498: me->reason, (int) strlen(me->reason), "HTTPNextState");
499: http->next = HTTP_ERROR;
500: http->result = -419;
501: break;
502:
503: default:
504: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
505: me->reason, (int) strlen(me->reason), "HTTPNextState");
506: http->next = HTTP_ERROR;
507: http->result = -400;
508: break;
509: }
1.134 frystyk 510: break;
511:
1.158 frystyk 512: case 5:
1.134 frystyk 513:
1.158 frystyk 514: switch (me->status) {
515: case 501:
516: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
517: me->reason, (int) strlen(me->reason), "HTTPNextState");
518: http->next = HTTP_ERROR;
519: http->result = -501;
520: break;
521:
522: case 502:
523: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
524: me->reason, (int) strlen(me->reason), "HTTPNextState");
525: http->next = HTTP_ERROR;
526: http->result = -502;
527: break;
528:
529: case 503:
530: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_DOWN,
531: me->reason, (int) strlen(me->reason), "HTTPNextState");
532: http->next = HTTP_ERROR;
533:
534: /*
535: ** If Retry-After header is found then return HT_RETRY else HT_ERROR.
536: ** The caller may want to reissue the request at a later point in time.
537: */
538: {
539: HTResponse * response = HTRequest_response(me->request);
540: if (HTResponse_retryTime(response))
541: http->result = HT_RETRY;
542: else
543: http->result = -500;
544: }
545: break;
546:
547: case 504:
548: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
549: me->reason, (int) strlen(me->reason), "HTTPNextState");
550: http->next = HTTP_ERROR;
551: http->result = -504;
552: break;
553:
554: case 505: /* Unsupported protocol version */
555: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_VERSION,
556: me->reason, (int) strlen(me->reason), "HTTPNextState");
557: http->next = HTTP_ERROR;
558: http->result = HT_BAD_VERSION;
559: break;
560:
561: case 506: /* Partial update Not Implemented */
562: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NO_PARTIAL_UPDATE,
563: me->reason, (int) strlen(me->reason), "HTTPNextState");
564: http->next = HTTP_ERROR;
565: http->result = HT_BAD_VERSION;
566: break;
567:
568: default: /* bad number */
569: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
570: me->reason, (int) strlen(me->reason), "HTTPNextState");
571: http->next = HTTP_ERROR;
572: http->result = -500;
573: break;
1.140 frystyk 574: }
1.78 frystyk 575: break;
576:
1.158 frystyk 577: default:
1.104 frystyk 578: HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.158 frystyk 579: (void *) me->buffer, me->buflen, "HTTPNextState");
1.134 frystyk 580: http->next = HTTP_ERROR;
1.155 frystyk 581: http->result = -(me->status);
1.71 frystyk 582: break;
1.55 frystyk 583: }
584: }
585:
1.71 frystyk 586: /* ------------------------------------------------------------------------- */
587: /* HTTP Status Line Stream */
588: /* ------------------------------------------------------------------------- */
1.55 frystyk 589:
1.71 frystyk 590: /*
1.141 frystyk 591: ** Analyze the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 592: ** then create a MIME-stream, else create a Guess stream to find out
593: ** what the 0.9 server is sending. We need to copy the buffer as we don't
594: ** know if we can modify the contents or not.
1.78 frystyk 595: **
596: ** Stream handling is a function of the status code returned from the
597: ** server:
598: ** 200: Use `output_stream' in HTRequest structure
1.94 frystyk 599: ** else: Use `debug_stream' in HTRequest structure
1.80 frystyk 600: **
601: ** Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 602: */
1.157 frystyk 603: PRIVATE int stream_pipe (HTStream * me, int length)
1.56 frystyk 604: {
1.136 frystyk 605: HTRequest * request = me->request;
606: HTNet * net = HTRequest_net(request);
1.123 frystyk 607: HTHost * host = HTNet_host(net);
1.141 frystyk 608:
1.153 frystyk 609: #if 0
610: {
611: char * uri = HTAnchor_address((HTAnchor *) HTRequest_anchor(request));
612: fprintf(stderr, "HTTP header: %s for '%s'\n", me->buffer, uri);
613: HT_FREE(uri);
614: }
615: #endif
616:
1.132 frystyk 617: /*
618: ** Just check for HTTP and not HTTP/ as NCSA server chokes on 1.1 replies
619: ** Thanks to Markku Savela <msa@msa.tte.vtt.fi>
1.141 frystyk 620:
1.132 frystyk 621: */
622: if (strncasecomp(me->buffer, "http", 4)) {
1.80 frystyk 623: int status;
1.136 frystyk 624: HTRequest_addError(request, ERR_INFO, NO, HTERR_HTTP09,
1.80 frystyk 625: (void *) me->buffer, me->buflen, "HTTPStatusStream");
1.136 frystyk 626: me->target = HTStreamStack(WWW_UNKNOWN,
627: HTRequest_outputFormat(request),
628: HTRequest_outputStream(request),
629: request, NO);
1.134 frystyk 630: me->http->next = HTTP_OK;
1.80 frystyk 631: if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
632: me->transparent = YES;
1.123 frystyk 633: HTHost_setVersion(host, HTTP_09);
1.157 frystyk 634: if (length > 0) HTHost_setConsumed(host, length);
1.178 frystyk 635: HTTRACE(PROT_TRACE, "HTTP Status. `%s\' is probably a broken 1.0 server that doesn't understand HEAD\n" _
1.171 frystyk 636: HTHost_name(host));
637: return HT_ERROR;
1.80 frystyk 638: } else {
1.140 frystyk 639: HTResponse * response = HTRequest_response(request);
1.155 frystyk 640: char * ptr = me->buffer+5; /* Skip the HTTP part */
641: char * vptr = NULL;
642: int major = 0;
643: int minor = 0;
644: me->version = vptr = HTNextField(&ptr);
645: if (vptr) {
646: major = (int) strtol(me->version, &vptr, 10);
647: if (vptr++) minor = strtol(vptr, NULL, 10);
648: }
1.95 frystyk 649:
1.130 frystyk 650: /* Here we want to find out when to use persistent connection */
1.171 frystyk 651: if (major > 1 && major < 100) {
1.178 frystyk 652: HTTRACE(PROT_TRACE, "HTTP Status. Major version number is %d\n" _ major);
1.155 frystyk 653: me->target = HTErrorStream();
1.158 frystyk 654: me->status = 9999;
1.155 frystyk 655: HTTPNextState(me); /* Get next state */
1.158 frystyk 656: return HT_ERROR;
1.155 frystyk 657: } else if (minor <= 0) {
1.171 frystyk 658: if (major > 100) {
1.178 frystyk 659: HTTRACE(PROT_TRACE, "HTTP Status. This is a *BROKEN* HTTP/1.0 server\n");
1.171 frystyk 660: me->status = 200;
661: } else {
1.178 frystyk 662: HTTRACE(PROT_TRACE, "HTTP Status. This is an HTTP/1.0 server\n");
1.171 frystyk 663: me->status = atoi(HTNextField(&ptr));
664: }
1.128 frystyk 665: HTHost_setVersion(host, HTTP_10);
1.155 frystyk 666: } else { /* 1.x, x>0 family */
667: HTHost_setVersion(host, HTTP_11); /* Best we can do */
1.156 frystyk 668: if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 669: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with NO PIPELINING\n");
1.147 frystyk 670: HTNet_setPersistent(net, YES, HT_TP_SINGLE);
1.156 frystyk 671: } else if (ConnectionMode & HTTP_11_MUX) {
1.178 frystyk 672: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with MUXING\n");
1.156 frystyk 673: HTNet_setPersistent(net, YES, HT_TP_INTERLEAVE);
1.147 frystyk 674: } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 675: HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 676: HTHost_setVersion(host, HTTP_10);
677: HTNet_setPersistent(net, NO, HT_TP_SINGLE);
678: } else
679: HTNet_setPersistent(net, YES, HT_TP_PIPELINE);
1.171 frystyk 680: me->status = atoi(HTNextField(&ptr));
1.128 frystyk 681: }
1.95 frystyk 682:
1.81 frystyk 683: me->reason = ptr;
684: if ((ptr = strchr(me->reason, '\r')) != NULL) /* Strip \r and \n */
685: *ptr = '0円';
686: else if ((ptr = strchr(me->reason, '\n')) != NULL)
687: *ptr = '0円';
688:
1.130 frystyk 689: /*
690: ** If it is a 1xx code then find out what to do and return until we
691: ** get the next code. In the case of Upgrade we may not get back here
692: ** at all. If we are uploading an entity then continue doing that
693: */
694: if (me->status/100 == 1) {
1.136 frystyk 695: if (HTTPInformation(me) == YES) {
1.180 ! frystyk 696: if (me->status==100) {
! 697: me->buflen = 0;
! 698: me->state = EOL_BEGIN;
! 699: if (me->info_target) (*me->info_target->isa->_free)(me->info_target);
! 700: me->info_target = HTStreamStack(WWW_MIME_CONT,
! 701: HTRequest_debugFormat(request),
! 702: HTRequest_debugStream(request),
! 703: request, NO);
! 704: if (length > 0) HTHost_setConsumed(host, length);
! 705: return HT_OK;
! 706: } else if (me->status==101) {
! 707: if (me->info_target) (*me->info_target->isa->_free)(me->info_target);
! 708: me->target = HTStreamStack(WWW_MIME_UPGRADE,
! 709: HTRequest_outputFormat(request),
! 710: HTRequest_outputStream(request),
! 711: request, NO);
! 712: if (length > 0) HTHost_setConsumed(host, length);
! 713: me->transparent = YES;
! 714: return HT_OK;
! 715: }
1.103 frystyk 716: }
1.56 frystyk 717: }
1.133 frystyk 718:
719: /*
720: ** As we are getting fresh metainformation in the HTTP response,
721: ** we clear the old metainfomation in order not to mix it with the new
722: ** one. This is particularly important for the content-length and the
1.139 frystyk 723: ** like. The TRACE and OPTIONS method just adds to the current
724: ** metainformation so in that case we don't clear the anchor.
1.133 frystyk 725: */
1.136 frystyk 726: if (me->status==200 || me->status==203 || me->status==300) {
1.140 frystyk 727: /*
728: ** 200, 203 and 300 are all fully cacheable responses. No byte
729: ** ranges or anything else make life hard in this case.
730: */
1.148 frystyk 731: HTAnchor_clearHeader(HTRequest_anchor(request));
1.166 frystyk 732: HTResponse_setCachable(response, HT_CACHE_ALL);
1.136 frystyk 733: me->target = HTStreamStack(WWW_MIME,
734: HTRequest_outputFormat(request),
735: HTRequest_outputStream(request),
736: request, NO);
1.176 frystyk 737: } else if (me->status==204) {
738: HTResponse_setCachable(response, HT_CACHE_ALL);
739: me->target = HTStreamStack(WWW_MIME_HEAD,
740: HTRequest_debugFormat(request),
741: HTRequest_debugStream(request),
742: request, NO);
1.140 frystyk 743: } else if (me->status==206) {
744: /*
745: ** We got a partial response and now we must check whether
746: ** we issued a cache If-Range request or it was a new
747: ** partial response which we don't have in cache. In the latter
748: ** case, we don't cache the object and in the former we append
749: ** the result to the already existing cache entry.
750: */
751: HTReload reload = HTRequest_reloadMode(request);
752: if (reload == HT_CACHE_RANGE_VALIDATE) {
1.166 frystyk 753: HTResponse_setCachable(response, HT_CACHE_ALL);
1.140 frystyk 754: me->target = HTStreamStack(WWW_MIME_PART,
755: HTRequest_outputFormat(request),
756: HTRequest_outputStream(request),
757: request, NO);
758: } else {
1.149 frystyk 759: HTAnchor_clearHeader(HTRequest_anchor(request));
1.140 frystyk 760: me->target = HTStreamStack(WWW_MIME,
761: HTRequest_outputFormat(request),
762: HTRequest_outputStream(request),
763: request, NO);
764: }
1.176 frystyk 765: } else if (me->status==304) {
766: HTResponse_setCachable(response, HT_CACHE_NOT_MODIFIED);
1.136 frystyk 767: me->target = HTStreamStack(WWW_MIME_HEAD,
768: HTRequest_debugFormat(request),
769: HTRequest_debugStream(request),
770: request, NO);
771: } else if (HTRequest_debugStream(request)) {
1.175 frystyk 772: HTResponse_setCachable(response,
773: (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 774: me->target = HTStreamStack(WWW_MIME,
775: HTRequest_debugFormat(request),
776: HTRequest_debugStream(request),
777: request, NO);
778: } else {
1.140 frystyk 779: /*
780: ** We still need to parse the MIME part in order to find any
781: ** valuable meta information which is needed from the response.
782: */
1.175 frystyk 783: HTResponse_setCachable(response,
784: (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 785: me->target = HTStreamStack(WWW_MIME,
786: HTRequest_debugFormat(request),
787: HTRequest_debugStream(request),
788: request, NO);
1.133 frystyk 789: }
1.56 frystyk 790: }
1.113 frystyk 791: if (!me->target) me->target = HTErrorStream();
1.81 frystyk 792: HTTPNextState(me); /* Get next state */
1.80 frystyk 793: me->transparent = YES;
1.157 frystyk 794: if (length > 0) HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length);
1.80 frystyk 795: return HT_OK;
1.71 frystyk 796: }
1.56 frystyk 797:
1.80 frystyk 798: /*
799: ** Searches for HTTP header line until buffer fills up or a CRLF or LF
800: ** is found
801: */
1.119 frystyk 802: PRIVATE int HTTPStatus_put_block (HTStream * me, const char * b, int l)
1.71 frystyk 803: {
1.150 frystyk 804: int status = HT_OK;
1.153 frystyk 805: int length = l;
1.146 frystyk 806: me->startLen = me->buflen;
1.80 frystyk 807: while (!me->transparent && l-- > 0) {
1.157 frystyk 808: if (me->info_target) {
809:
810: /* Put data down the 1xx return code parser until we are done. */
811: status = (*me->info_target->isa->put_block)(me->info_target, b, l+1);
812: if (status != HT_CONTINUE) return status;
813:
814: /* Now free the info stream */
815: (*me->info_target->isa->_free)(me->info_target);
816: me->info_target = NULL;
817:
818: /* Update where we are in the stream */
819: l = HTHost_remainingRead(HTNet_host(HTRequest_net(me->request)));
1.163 frystyk 820: b += (length-l);
1.159 frystyk 821: length = l;
1.163 frystyk 822: if (l <= 0) break;
1.157 frystyk 823:
1.80 frystyk 824: } else {
825: *(me->buffer+me->buflen++) = *b;
826: if (me->state == EOL_FCR) {
827: if (*b == LF) { /* Line found */
1.157 frystyk 828: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 829: } else {
830: me->state = EOL_BEGIN;
831: }
832: } else if (*b == CR) {
833: me->state = EOL_FCR;
834: } else if (*b == LF) {
1.157 frystyk 835: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.71 frystyk 836: } else {
1.80 frystyk 837: if (me->buflen >= MAX_STATUS_LEN) {
1.157 frystyk 838: if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 839: }
1.71 frystyk 840: }
1.80 frystyk 841: b++;
1.71 frystyk 842: }
1.56 frystyk 843: }
1.153 frystyk 844:
1.159 frystyk 845: if (!me->transparent && length != l)
846: HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length-l);
847:
1.99 frystyk 848: if (l > 0) return PUTBLOCK(b, l);
1.150 frystyk 849: return status;
1.56 frystyk 850: }
851:
1.119 frystyk 852: PRIVATE int HTTPStatus_put_string (HTStream * me, const char * s)
1.71 frystyk 853: {
1.80 frystyk 854: return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 855: }
1.56 frystyk 856:
1.100 frystyk 857: PRIVATE int HTTPStatus_put_character (HTStream * me, char c)
1.71 frystyk 858: {
1.80 frystyk 859: return HTTPStatus_put_block(me, &c, 1);
860: }
861:
1.100 frystyk 862: PRIVATE int HTTPStatus_flush (HTStream * me)
1.80 frystyk 863: {
864: return (*me->target->isa->flush)(me->target);
1.71 frystyk 865: }
866:
1.100 frystyk 867: PRIVATE int HTTPStatus_free (HTStream * me)
1.71 frystyk 868: {
1.87 frystyk 869: int status = HT_OK;
870: if (me->target) {
871: if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
872: return HT_WOULD_BLOCK;
873: }
1.115 frystyk 874: HT_FREE(me);
1.100 frystyk 875: return status;
1.71 frystyk 876: }
877:
1.104 frystyk 878: PRIVATE int HTTPStatus_abort (HTStream * me, HTList * e)
1.71 frystyk 879: {
880: if (me->target)
1.74 frystyk 881: ABORT_TARGET;
1.115 frystyk 882: HT_FREE(me);
1.178 frystyk 883: HTTRACE(PROT_TRACE, "HTTPStatus.. ABORTING...\n");
1.80 frystyk 884: return HT_ERROR;
1.71 frystyk 885: }
886:
887: /* HTTPStatus Stream
888: ** -----------------
889: */
1.119 frystyk 890: PRIVATE const HTStreamClass HTTPStatusClass =
1.71 frystyk 891: {
892: "HTTPStatus",
1.80 frystyk 893: HTTPStatus_flush,
1.71 frystyk 894: HTTPStatus_free,
895: HTTPStatus_abort,
896: HTTPStatus_put_character,
897: HTTPStatus_put_string,
898: HTTPStatus_put_block
899: };
900:
1.113 frystyk 901: PUBLIC HTStream * HTTPStatus_new (HTRequest * request,
902: void * param,
903: HTFormat input_format,
904: HTFormat output_format,
905: HTStream * output_stream)
1.71 frystyk 906: {
1.115 frystyk 907: HTStream * me;
908: if ((me = (HTStream *) HT_CALLOC(1, sizeof(HTStream))) == NULL)
909: HT_OUTOFMEM("HTTPStatus_new");
1.71 frystyk 910: me->isa = &HTTPStatusClass;
1.113 frystyk 911: if (request) {
1.126 frystyk 912: HTNet * net = HTRequest_net(request);
1.125 frystyk 913: /* Get existing copy */
914: http_info * http = (http_info *) HTNet_context(net);
1.113 frystyk 915: me->request = request;
916: me->http = http;
917: http->next = HTTP_ERROR;
918: me->state = EOL_BEGIN;
919: return me;
920: } else
921: return HTErrorStream();
1.71 frystyk 922: }
923:
924: /* ------------------------------------------------------------------------- */
925:
926: /* Load Document from HTTP Server HTLoadHTTP
1.55 frystyk 927: ** ==============================
928: **
929: ** Given a hypertext address, this routine loads a document.
930: **
931: ** On entry,
932: ** request This is the request structure
1.94 frystyk 933: ** returns HT_ERROR Error has occured in call back
934: ** HT_OK Call back was OK
1.55 frystyk 935: */
1.141 frystyk 936: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type);
937:
938: PUBLIC int HTLoadHTTP (SOCKET soc, HTRequest * request)
1.55 frystyk 939: {
940: http_info *http; /* Specific protocol information */
1.112 frystyk 941: HTParentAnchor *anchor = HTRequest_anchor(request);
1.141 frystyk 942: HTNet * net = HTRequest_net(request);
1.112 frystyk 943:
1.94 frystyk 944: /*
945: ** Initiate a new http structure and bind to request structure
946: ** This is actually state HTTP_BEGIN, but it can't be in the state
947: ** machine as we need the structure first.
948: */
1.178 frystyk 949: HTTRACE(PROT_TRACE, "HTTP........ Looking for `%s\'\n" _
1.141 frystyk 950: HTAnchor_physical(anchor));
951: if ((http = (http_info *) HT_CALLOC(1, sizeof(http_info))) == NULL)
952: HT_OUTOFMEM("HTLoadHTTP");
953: http->net = net;
1.157 frystyk 954: http->request = request;
1.141 frystyk 955: HTNet_setContext(net, http);
956: HTNet_setEventCallback(net, HTTPEvent);
957: HTNet_setEventParam(net, http); /* callbacks get http* */
958:
1.157 frystyk 959: return HTTPEvent(soc, http, HTEvent_BEGIN); /* get it started - ops is ignored */
960: }
961:
962: PRIVATE int FlushPutEvent (HTTimer * timer, void * param, HTEventType type)
963: {
964: http_info * http = (http_info *) param;
965: HTStream * input = HTRequest_inputStream(http->request);
966: HTPostCallback * pcbf = HTRequest_postCallback(http->request);
967:
1.165 frystyk 968: http->usedTimer = YES;
1.160 frystyk 969: if (timer != http->timer)
1.178 frystyk 970: HTDEBUGBREAK("HTTP timer %p not in sync\n" _ timer);
971: HTTRACE(PROT_TRACE, "Uploading... Flushing %p with timer %p\n" _ http _ timer);
1.157 frystyk 972:
973: /*
974: ** We ignore the return code here which we shouldn't!!!
975: */
976: if (http && input && pcbf) (*pcbf)(http->request, input);
977:
978: /*
1.172 frystyk 979: ** Delete the timer
1.157 frystyk 980: */
1.172 frystyk 981: HTTimer_delete(http->timer);
1.157 frystyk 982: http->timer = NULL;
1.165 frystyk 983:
1.157 frystyk 984: return HT_OK;
1.141 frystyk 985: }
986:
987: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type)
988: {
989: http_info * http = (http_info *)pVoid;
990: int status = HT_ERROR;
991: HTNet * net = http->net;
992: HTRequest * request = HTNet_request(net);
1.144 frystyk 993: HTParentAnchor * anchor = HTRequest_anchor(request);
994: HTHost * host = HTNet_host(net);
1.141 frystyk 995:
996: /*
1.166 frystyk 997: ** Check whether we have been interrupted or timed out
1.141 frystyk 998: */
999: if (type == HTEvent_BEGIN) {
1.134 frystyk 1000: http->next = HTTP_OK;
1001: http->result = HT_ERROR;
1.141 frystyk 1002: } else if (type == HTEvent_CLOSE) {
1.179 frystyk 1003: long read_len = HTNet_bytesRead(net);
1004: long doc_len = HTAnchor_length(anchor);
1005:
1006: /*
1007: ** It is OK to get a close if a) we don't pipeline and b)
1008: ** we have the expected amount of data. In case we don't
1009: ** know how much data to expect, we must accept it asis.
1010: */
1011: if (HTHost_numberOfOutstandingNetObjects(host) == 1 &&
1012: (doc_len<0 || doc_len==read_len)) {
1013: HTTPCleanup(request, HT_LOADED);
1014: } else {
1015: HTRequest_addError(request, ERR_FATAL, NO, HTERR_INTERRUPTED,
1016: NULL, 0, "HTLoadHTTP");
1017: HTTPCleanup(request, HT_INTERRUPTED);
1018: }
1.166 frystyk 1019: return HT_OK;
1020: } else if (type == HTEvent_TIMEOUT) {
1021: HTRequest_addError(request, ERR_FATAL, NO, HTERR_TIME_OUT,
1022: NULL, 0, "HTLoadHTTP");
1023: HTTPCleanup(request, HT_TIMEOUT);
1.94 frystyk 1024: return HT_OK;
1.141 frystyk 1025: } else if (type == HTEvent_END) {
1026: HTTPCleanup(request, http->result);
1027: return HT_OK;
1028: } else if (type == HTEvent_RESET) {
1029: HTTPCleanup(request, HT_RECOVER_PIPE);
1.145 frystyk 1030: http->state = HTTP_BEGIN;
1.141 frystyk 1031: return HT_OK;
1032: }
1033:
1.71 frystyk 1034: /* Now jump into the machine. We know the state from the previous run */
1035: while (1) {
1036: switch (http->state) {
1.134 frystyk 1037: case HTTP_BEGIN:
1.144 frystyk 1038: status = HTHost_connect(host, net, HTAnchor_physical(anchor), HTTP_PORT);
1039: host = HTNet_host(net);
1.153 frystyk 1040: if (status == HT_OK) {
1.140 frystyk 1041:
1.123 frystyk 1042: /*
1.140 frystyk 1043: ** Check the protocol class to see if we have connected to a
1044: ** the right class of server, in this case HTTP. If we don't
1045: ** know the server then assume a HTTP/1.0
1.123 frystyk 1046: */
1047: {
1048: char * s_class = HTHost_class(host);
1.140 frystyk 1049: if (!s_class) {
1.174 frystyk 1050: if (HTRequest_proxy(request) == NULL) {
1051: HTAssocList * alist = HTRequest_connection(request);
1052: if (!(alist && HTAssocList_findObject(alist, "close")))
1053: HTRequest_addConnection(request, "Keep-Alive", "");
1054: }
1.140 frystyk 1055: HTHost_setClass(host, "http");
1056: } else if (strcasecomp(s_class, "http")) {
1.123 frystyk 1057: HTRequest_addError(request, ERR_FATAL, NO, HTERR_CLASS,
1058: NULL, 0, "HTLoadHTTP");
1059: http->state = HTTP_ERROR;
1060: break;
1061: }
1.95 frystyk 1062: }
1.147 frystyk 1063:
1.156 frystyk 1064: if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 1065: HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 WITH NO PIPELINING\n");
1.147 frystyk 1066: HTRequest_setFlush(request, YES);
1067: } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 1068: HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 1069: HTHost_setVersion(host, HTTP_10);
1070: }
1071:
1.151 frystyk 1072: if (HTNet_preemptive(net)) {
1.178 frystyk 1073: HTTRACE(PROT_TRACE, "HTTP........ Force flush on preemptive load\n");
1.151 frystyk 1074: HTRequest_setFlush(request, YES);
1075: }
1076:
1.147 frystyk 1077: /* Jump to next state */
1.144 frystyk 1078: http->state = HTTP_NEED_STREAM;
1.159 frystyk 1079: } else if (status == HT_WOULD_BLOCK || status == HT_PENDING) {
1.144 frystyk 1080: return HT_OK;
1.171 frystyk 1081: } else if (status == HT_NO_HOST) {
1082: http->result = HT_NO_HOST;
1083: http->state = HTTP_ERROR;
1.159 frystyk 1084: } else
1.144 frystyk 1085: http->state = HTTP_ERROR; /* Error or interrupt */
1086: break;
1087:
1088: case HTTP_NEED_STREAM:
1.138 frystyk 1089:
1.144 frystyk 1090: /*
1091: ** Create the stream pipe FROM the channel to the application.
1092: ** The target for the input stream pipe is set up using the
1093: ** stream stack.
1094: */
1.167 frystyk 1095: {
1096: /*
1097: ** during a recovery, we might keep the same HTNet object.
1098: ** if so, reuse it's read stream
1099: */
1.176 frystyk 1100: HTStream * me = HTNet_readStream( net );
1.167 frystyk 1101: if ( me == NULL ) {
1.173 frystyk 1102: me = HTStreamStack(WWW_HTTP,
1103: HTRequest_outputFormat(request),
1104: HTRequest_outputStream(request),
1105: request, YES);
1.178 frystyk 1106: #ifdef HTDEBUG
1.173 frystyk 1107: if (PROT_TRACE) {
1108: if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
1109: if (htfp) {
1110: me = HTTee(me, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1111: HTTRACE(PROT_TRACE, "HTTP........ Dumping response to `%s\'\n" _ HTTP_OUTPUT);
1.173 frystyk 1112: }
1113: }
1.178 frystyk 1114: #endif /* HTDEBUG */
1.173 frystyk 1115:
1116: HTNet_setReadStream(net, me);
1.167 frystyk 1117: }
1118: HTRequest_setOutputConnected(request, YES);
1.144 frystyk 1119: }
1.127 frystyk 1120:
1.144 frystyk 1121: /*
1122: ** Create the stream pipe TO the channel from the application
1123: ** and hook it up to the request object
1124: */
1125: {
1126: HTChannel * channel = HTHost_channel(host);
1127: HTOutputStream * output = HTChannel_getChannelOStream(channel);
1128: int version = HTHost_version(host);
1129: HTStream * app = NULL;
1130:
1.178 frystyk 1131: #ifdef HTDEBUG
1.144 frystyk 1132: if (PROT_TRACE) {
1.162 frystyk 1133: if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
1134: if (htfp) {
1.144 frystyk 1135: output = (HTOutputStream *)
1.162 frystyk 1136: HTTee((HTStream *) output, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1137: HTTRACE(PROT_TRACE, "HTTP........ Dumping request to `%s\'\n" _ HTTP_OUTPUT);
1.144 frystyk 1138: }
1139: }
1.178 frystyk 1140: #endif /* HTDEBUG */
1.144 frystyk 1141: app = HTMethod_hasEntity(HTRequest_method(request)) ?
1142: HTMIMERequest_new(request,
1143: HTTPRequest_new(request, (HTStream *) output, NO,
1144: version),
1145: YES) :
1146: HTTPRequest_new(request, (HTStream *) output, YES, version);
1147: HTRequest_setInputStream(request, app);
1148: }
1.88 frystyk 1149:
1.144 frystyk 1150: /*
1151: ** Set up concurrent read/write if this request isn't the
1152: ** source for a PUT or POST. As source we don't start reading
1153: ** before all destinations are ready. If destination then
1154: ** register the input stream and get ready for read
1155: */
1156: if (HTRequest_isDestination(request)) {
1157: HTHost_register(host, net, HTEvent_READ);
1158: HTRequest_linkDestination(request);
1159: }
1160: http->state = HTTP_CONNECTED;
1161: type = HTEvent_WRITE; /* fresh, so try a write */
1.71 frystyk 1162: break;
1163:
1.87 frystyk 1164: /* As we can do simultanous read and write this is now one state */
1.141 frystyk 1165: case HTTP_CONNECTED:
1166: if (type == HTEvent_WRITE) {
1.157 frystyk 1167: HTStream * input = HTRequest_inputStream(request);
1168: HTPostCallback * pcbf = HTRequest_postCallback(request);
1169: status = HTRequest_flush(request) ?
1170: HTHost_forceFlush(host) : (*input->isa->flush)(input);
1171:
1172: /*
1173: ** Check to see if we are uploading something or just a normal
1174: ** GET kind of thing.
1175: */
1176: if (pcbf) {
1177: if (http->lock == NO) {
1178: int retrys = HTRequest_retrys(request);
1.169 frystyk 1179: ms_t delay = retrys > 3 ? HTSecondWriteDelay : HTFirstWriteDelay;
1.165 frystyk 1180: if (!http->timer && !http->usedTimer) {
1.162 frystyk 1181: http->timer = HTTimer_new(NULL, FlushPutEvent,
1182: http, delay, YES, NO);
1.178 frystyk 1183: HTTRACE(PROT_TRACE, "Uploading... Holding %p for %lu ms using time %p\n" _
1184: http _ delay _ http->timer);
1.157 frystyk 1185: HTHost_register(host, net, HTEvent_READ);
1186: }
1187: http->lock = YES;
1188: }
1189: type = HTEvent_READ;
1190: } else {
1191:
1192: /*
1193: ** Check to see if we can start a new request
1194: ** pending in the host object.
1195: */
1196: HTHost_launchPending(host);
1197: type = HTEvent_READ;
1198: }
1199:
1200: /* Now check the status code */
1201: if (status == HT_WOULD_BLOCK)
1202: return HT_OK;
1203: else if (status == HT_PAUSE || status == HT_LOADED) {
1204: type = HTEvent_READ;
1.168 frystyk 1205: } else if (status==HT_ERROR)
1.157 frystyk 1206: http->state = HTTP_RECOVER_PIPE;
1207: } else if (type == HTEvent_FLUSH) {
1208: HTStream * input = HTRequest_inputStream(request);
1209: if (input == NULL)
1210: return HT_ERROR;
1211: return (*input->isa->flush)(input);
1212: } else if (type == HTEvent_READ) {
1213: status = HTHost_read(host, net);
1214: if (status == HT_WOULD_BLOCK)
1215: return HT_OK;
1216: else if (status == HT_CONTINUE) {
1.178 frystyk 1217: HTTRACE(PROT_TRACE, "HTTP........ Continuing\n");
1.157 frystyk 1218: http->lock = NO;
1219: continue;
1220: } else if (status==HT_LOADED)
1221: http->state = http->next; /* Jump to next state (OK or ERROR) */
1222: else if (status==HT_CLOSED)
1223: http->state = HTTP_RECOVER_PIPE;
1.167 frystyk 1224: else if (status == HT_ERROR)
1225: http->state = HTTP_KILL_PIPE;
1.157 frystyk 1226: else
1227: http->state = HTTP_ERROR;
1228: } else {
1229: http->state = HTTP_ERROR; /* don't know how to handle OOB */
1230: }
1231: break;
1.141 frystyk 1232:
1.134 frystyk 1233: case HTTP_OK:
1234: HTTPCleanup(request, http->result);
1.94 frystyk 1235: return HT_OK;
1.71 frystyk 1236: break;
1.141 frystyk 1237:
1238: case HTTP_RECOVER_PIPE:
1239: {
1240: /*
1241: ** If this is a persistent connection and we get a close
1242: ** then it is an error and we should recover from it by
1243: ** restarting the pipe line of requests if any
1244: */
1.151 frystyk 1245: if (HTHost_isPersistent(host) && !HTHost_closeNotification(host)) {
1.143 frystyk 1246: if (host == NULL) return HT_ERROR;
1.144 frystyk 1247: HTRequest_setFlush(request, YES);
1248: HTHost_recoverPipe(host);
1249: return HT_OK;
1.141 frystyk 1250: } else
1251: http->state = HTTP_OK;
1252: }
1.143 frystyk 1253: break;
1.141 frystyk 1254:
1.167 frystyk 1255: case HTTP_KILL_PIPE:
1256: if (host == NULL) return HT_ERROR;
1257: HTHost_killPipe(host);
1258: return HT_OK;
1259: break;
1260:
1.71 frystyk 1261: case HTTP_ERROR:
1.143 frystyk 1262: HTTPCleanup(request, http->result);
1263: return HT_OK;
1264: break;
1265:
1.141 frystyk 1266: default:
1.178 frystyk 1267: HTDEBUGBREAK("Bad http state %d\n" _ http->state);
1.71 frystyk 1268: }
1269: } /* End of while(1) */
1270: }
1.88 frystyk 1271:
1.147 frystyk 1272: PUBLIC void HTTP_setConnectionMode (HTTPConnectionMode mode)
1273: {
1274: ConnectionMode = mode;
1275: }
1276:
1277: PUBLIC HTTPConnectionMode HTTP_connectionMode (void)
1278: {
1279: return ConnectionMode;
1280: }
1.21 luotonen 1281:
1.169 frystyk 1282: PUBLIC BOOL HTTP_setBodyWriteDelay (ms_t first_try, ms_t second_try)
1283: {
1284: if (first_try > 20 && second_try >= first_try) {
1285: HTFirstWriteDelay = first_try;
1286: HTSecondWriteDelay = second_try;
1287: return YES;
1288: }
1289: return NO;
1290: }
1291:
1292: PUBLIC void HTTP_bodyWriteDelay (ms_t * first_try, ms_t * second_try)
1293: {
1294: *first_try = HTFirstWriteDelay;
1295: *second_try = HTSecondWriteDelay;
1.170 frystyk 1296: }
1297:
Webmaster