[BACK] Return to HTTP.c CVS log [TXT] [DIR] Up to [Public] / libwww / Library / src

Annotation of libwww/Library/src/HTTP.c, revision 1.189

1.74 frystyk 1: /*                                   HTTP.c
 2: **   MULTITHREADED IMPLEMENTATION OF HTTP CLIENT
1.2 timbl 3: **
1.84 frystyk 4: **   (c) COPYRIGHT MIT 1995.
1.74 frystyk 5: **   Please first read the full copyright statement in the file COPYRIGH.
1.189 ! kahan 6: **   @(#) $Id: HTTP.c,v 1.188 2000年06月19日 14:35:15 kahan Exp $
1.74 frystyk 7: **
1.185 raff 8: **   This module implements the HTTP protocol as a state machine
1.55 frystyk 9: **
 10: ** History:
1.59 frystyk 11: **  < May 24 94 ??  Unknown - but obviously written
1.56 frystyk 12: **   May 24 94 HF  Made reentrent and cleaned up a bit. Implemented
 13: **           Forward, redirection, error handling and referer field
1.67 duns 14: **   8 Jul 94 FM  Insulate free() from _free structure element.
1.71 frystyk 15: **   Jul 94 HFN   Written on top of HTTP.c, Henrik Frystyk
1.55 frystyk 16: **
1.1 timbl 17: */
 18: 
1.78 frystyk 19: /* Library include files */
1.161 frystyk 20: #include "wwwsys.h"
1.123 frystyk 21: #include "WWWUtil.h"
 22: #include "WWWCore.h"
1.177 frystyk 23: #include "HTHeader.h"
 24: #include "HTMIMERq.h"
1.94 frystyk 25: #include "HTReqMan.h"
1.179 frystyk 26: #include "HTNetMan.h"
1.109 frystyk 27: #include "HTTPUtil.h"
1.80 frystyk 28: #include "HTTPReq.h"
1.55 frystyk 29: #include "HTTP.h"                       /* Implements */
 30: 
 31: /* Macros and other defines */
1.94 frystyk 32: #ifndef HTTP_PORT
 33: #define HTTP_PORT 80  /* Allocated to http by Jon Postel/ISI 24-Jan-92 */
 34: #endif
 35: 
1.71 frystyk 36: #define PUTC(c)        (*me->target->isa->put_character)(me->target, c)
 37: #define PUTS(s)        (*me->target->isa->put_string)(me->target, s)
 38: #define PUTBLOCK(b, l) (*me->target->isa->put_block)(me->target, b, l)
 39: #define FREE_TARGET  (*me->target->isa->_free)(me->target)
1.74 frystyk 40: #define ABORT_TARGET  (*me->target->isa->abort)(me->target, e)
1.2 timbl 41: 
1.178 frystyk 42: #ifdef HTDEBUG
1.177 frystyk 43: #include "WWWStream.h"
1.147 frystyk 44: #define HTTP_OUTPUT   "w3chttp.out"
1.162 frystyk 45: PRIVATE FILE * htfp = NULL;
1.140 frystyk 46: #endif
1.139 frystyk 47: 
1.59 frystyk 48: /* Type definitions and global variables etc. local to this module */
1.94 frystyk 49: 
 50: /* Final states have negative value */
1.59 frystyk 51: typedef enum _HTTPState {
1.167 frystyk 52:   HTTP_KILL_PIPE   = -4,
1.141 frystyk 53:   HTTP_RECOVER_PIPE = -3,
1.134 frystyk 54:   HTTP_ERROR     = -2,
 55:   HTTP_OK      = -1,
1.71 frystyk 56:   HTTP_BEGIN     = 0,
1.144 frystyk 57:   HTTP_NEED_STREAM,
1.141 frystyk 58:   HTTP_CONNECTED
1.59 frystyk 59: } HTTPState;
1.55 frystyk 60: 
1.94 frystyk 61: /* This is the context structure for the this module */
1.55 frystyk 62: typedef struct _http_info {
1.81 frystyk 63:   HTTPState     state;      /* Current State of the connection */
 64:   HTTPState     next;                 /* Next state */
1.134 frystyk 65:   int            result;   /* Result to report to the after filter */
1.139 frystyk 66:   BOOL        lock;              /* Block for writing */
1.141 frystyk 67:   HTNet *      net;
1.157 frystyk 68:   HTRequest *        request;
 69:   HTTimer *     timer;
1.165 frystyk 70:   BOOL        usedTimer;
1.181 frystyk 71:   BOOL        repetitive_writing;
1.55 frystyk 72: } http_info;
 73: 
1.88 frystyk 74: #define MAX_STATUS_LEN     100  /* Max nb of chars to check StatusLine */
1.55 frystyk 75: 
1.71 frystyk 76: struct _HTStream {
1.119 frystyk 77:   const HTStreamClass *   isa;
1.71 frystyk 78:   HTStream *         target;
1.157 frystyk 79:   HTStream *         info_target;  /* For 100 codes */
1.71 frystyk 80:   HTRequest *            request;
 81:   http_info *            http;
1.121 frystyk 82:   HTEOLState         state;
1.71 frystyk 83:   BOOL            transparent;
1.150 frystyk 84:   BOOL            cont;
1.81 frystyk 85:   char *           version;       /* Should we save this? */
1.71 frystyk 86:   int                status;
1.81 frystyk 87:   char *           reason;
1.71 frystyk 88:   char            buffer[MAX_STATUS_LEN+1];
1.80 frystyk 89:   int                buflen;
1.146 frystyk 90:   int                startLen;/* buflen when put_block was called */
1.71 frystyk 91: };
1.21 luotonen 92: 
1.123 frystyk 93: struct _HTInputStream {
 94:   const HTInputStreamClass * isa;
 95: };
 96: 
1.169 frystyk 97: /* How long to wait before writing the body in PUT and POST requests */
 98: #define DEFAULT_FIRST_WRITE_DELAY   2000
 99: #define DEFAULT_SECOND_WRITE_DELAY   3000
1.181 frystyk 100: #define DEFAULT_REPEAT_WRITE      30
1.169 frystyk 101: 
 102: PRIVATE ms_t HTFirstWriteDelay = DEFAULT_FIRST_WRITE_DELAY;
 103: PRIVATE ms_t HTSecondWriteDelay = DEFAULT_SECOND_WRITE_DELAY;
1.181 frystyk 104: PRIVATE ms_t HTRepeatWrite = DEFAULT_REPEAT_WRITE;
1.169 frystyk 105: 
1.147 frystyk 106: #ifdef HT_NO_PIPELINING
1.156 frystyk 107: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_NO_PIPELINING;
1.147 frystyk 108: #else
1.156 frystyk 109: #ifdef HT_MUX
 110: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_MUX;
 111: #else
 112: #ifdef HT_FORCE_10
 113: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_FORCE_10;
 114: #else
 115: PRIVATE HTTPConnectionMode ConnectionMode = HTTP_11_PIPELINING;
 116: #endif
 117: #endif
1.147 frystyk 118: #endif
 119: 
1.71 frystyk 120: /* ------------------------------------------------------------------------- */
 121: /*                Help Functions               */
 122: /* ------------------------------------------------------------------------- */
1.21 luotonen 123: 
1.94 frystyk 124: /*   HTTPCleanup
 125: **   -----------
1.55 frystyk 126: **   This function closes the connection and frees memory.
1.94 frystyk 127: **   Returns YES on OK, else NO
1.1 timbl 128: */
1.94 frystyk 129: PRIVATE int HTTPCleanup (HTRequest *req, int status)
1.1 timbl 130: {
1.126 frystyk 131:   HTNet * net = HTRequest_net(req);
 132:   http_info * http = (http_info *) HTNet_context(net);
 133:   HTStream * input = HTRequest_inputStream(req);
1.80 frystyk 134: 
1.178 frystyk 135:   HTTRACE(PROT_TRACE, "HTTP Clean.. Called with status %d, net %p\n" _ status _ net);
1.144 frystyk 136: 
1.164 frystyk 137:   if (status == HT_INTERRUPTED) {
 138:    HTAlertCallback * cbf = HTAlert_find(HT_PROG_INTERRUPT);
 139:    if (cbf) (*cbf)(req, HT_PROG_INTERRUPT,
 140:      HT_MSG_NULL, NULL, NULL, NULL);
1.166 frystyk 141:   } else if (status == HT_TIMEOUT) {
 142:    HTAlertCallback * cbf = HTAlert_find(HT_PROG_TIMEOUT);
 143:    if (cbf) (*cbf)(req, HT_PROG_TIMEOUT,
 144:      HT_MSG_NULL, NULL, NULL, NULL);
1.164 frystyk 145:   } 
1.166 frystyk 146: 
1.94 frystyk 147:   /* Free stream with data TO network */
1.167 frystyk 148:   if (input) {
1.187 kahan 149:    if (input->isa) {
 150:      if (status==HT_INTERRUPTED || status==HT_RECOVER_PIPE || status==HT_TIMEOUT)
 151:        (*input->isa->abort)(input, NULL);
 152:      else
 153:        (*input->isa->_free)(input);
 154:    }
1.126 frystyk 155:    HTRequest_setInputStream(req, NULL);
1.94 frystyk 156:   }
1.88 frystyk 157: 
1.144 frystyk 158:   /*
1.157 frystyk 159:   ** Remove if we have registered an upload function as a callback
 160:   */
1.187 kahan 161:   if (http && http->timer) {
1.157 frystyk 162:    HTTimer_delete(http->timer);
 163:    http->timer = NULL;
1.189 ! kahan 164:    http->lock = NO;
1.157 frystyk 165:   }
 166: 
 167:   /*
1.144 frystyk 168:   ** Remove the request object and our own context structure for http.
 169:   */
 170:   if (status != HT_RECOVER_PIPE) {
1.153 frystyk 171:     HTNet_delete(net, status);
1.141 frystyk 172:    HT_FREE(http);
 173:   }
1.94 frystyk 174:   return YES;
1.55 frystyk 175: }
 176: 
1.71 frystyk 177: /*
1.130 frystyk 178: **   Informational 1xx codes are handled separately
1.136 frystyk 179: **   Returns YES if we should continue, NO if we should stop
1.55 frystyk 180: */
1.130 frystyk 181: PRIVATE BOOL HTTPInformation (HTStream * me)
1.55 frystyk 182: {
1.136 frystyk 183:   http_info * http = me->http;
1.71 frystyk 184:   switch (me->status) {
 185: 
1.136 frystyk 186:   case 100:
1.161 frystyk 187: #if 0
1.136 frystyk 188:    HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CONTINUE,
 189:              me->reason, (int) strlen(me->reason),
 190:              "HTTPInformation");
1.161 frystyk 191: #endif
1.182 frystyk 192:    http->result = HT_CONTINUE;
1.136 frystyk 193:    return YES;
 194:    break;
 195: 
1.130 frystyk 196:   case 101:
1.136 frystyk 197:    /*
 198:    ** We consider 101 Switching as a final state and exit this request
 199:    */
1.130 frystyk 200:    HTRequest_addError(me->request, ERR_INFO, NO, HTERR_SWITCHING,
1.127 frystyk 201:              me->reason, (int) strlen(me->reason),
1.130 frystyk 202:              "HTTPInformation");
1.136 frystyk 203:    http->next = HTTP_OK;
 204:    http->result = HT_UPGRADE;
1.180 frystyk 205:    return YES;
1.127 frystyk 206:    break;
 207: 
1.130 frystyk 208:   default:
1.136 frystyk 209:    HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
 210:          (void *) me->buffer, me->buflen, "HTTPNextState");
 211:    http->next = HTTP_ERROR;
 212:    http->result = HT_ERROR;
1.127 frystyk 213:    break;
1.130 frystyk 214:   }
1.136 frystyk 215:   return NO;
1.130 frystyk 216: }
 217: 
1.158 frystyk 218: 
 219: 
1.130 frystyk 220: /*
 221: **   This is a big switch handling all HTTP return codes. It puts in any
 222: **   appropiate error message and decides whether we should expect data
 223: **   or not.
 224: */
 225: PRIVATE void HTTPNextState (HTStream * me)
 226: {
1.134 frystyk 227:   http_info * http = me->http;
1.158 frystyk 228:   int error_class = me->status / 100;
 229:   switch (error_class) {
1.127 frystyk 230: 
1.158 frystyk 231:   case 0:                             /* 0.9 response */
 232:   case 2:
1.112 frystyk 233: 
1.158 frystyk 234:    switch (me->status) {
1.112 frystyk 235: 
1.158 frystyk 236:    case 201:                             /* Created */
 237:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_CREATED,
 238:                me->reason, (int) strlen(me->reason),
 239:                "HTTPNextState");
 240:      http->next = HTTP_OK;
 241:      http->result = HT_CREATED;
 242:      break;
 243: 
 244:    case 202:                            /* Accepted */
 245:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_ACCEPTED,
 246:                me->reason, (int) strlen(me->reason),
 247:                "HTTPNextState");
 248:      http->next = HTTP_OK;
 249:      http->result = HT_ACCEPTED;
 250:      break;
 251: 
 252:    case 203:                  /* Non-authoritative information */
 253:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NON_AUTHORITATIVE,
 254:                me->reason, (int) strlen(me->reason),
 255:                "HTTPNextState");
 256:      http->next = HTTP_OK;
 257:      http->result = HT_LOADED;
 258:      break;
 259: 
 260:    case 204:                           /* No Response */
 261:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NO_CONTENT,
 262:                me->reason, (int) strlen(me->reason),
 263:                "HTTPNextState");
 264:      http->next = HTTP_OK;
 265:      http->result = HT_NO_DATA;
 266:      break;
 267: 
 268:    case 205:                          /* Reset Content */
 269:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_RESET,
 270:                me->reason, (int) strlen(me->reason),
 271:                "HTTPNextState");
 272:      http->next = HTTP_OK;
 273:      http->result = HT_RESET_CONTENT;
 274:      break;
 275: 
 276:    case 206:                         /* Partial Content */
 277:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL,
 278:                me->reason, (int) strlen(me->reason),
 279:                "HTTPNextState");
 280:      http->next = HTTP_OK;
 281:      http->result = HT_PARTIAL_CONTENT;
 282:      break;
 283: 
 284:    case 207:                        /* Partial Update OK */
 285:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PARTIAL_OK,
 286:                me->reason, (int) strlen(me->reason),
 287:                "HTTPNextState");
 288:      http->next = HTTP_OK;
 289:      http->result = HT_PARTIAL_CONTENT;
 290:      break;
 291: 
 292:    default:
 293:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_OK,
 294:                me->reason, (int) strlen(me->reason),
 295:                "HTTPNextState");
 296:      http->next = HTTP_OK;
 297:      http->result = HT_LOADED;
 298:      break;
 299:    }
1.134 frystyk 300:    break;
 301: 
1.158 frystyk 302:   case 3:
1.134 frystyk 303: 
1.158 frystyk 304:    switch (me->status) {
1.78 frystyk 305: 
1.158 frystyk 306:    case 301:                              /* Moved */
 307:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MOVED,
 308:                me->reason, (int) strlen(me->reason),
 309:                "HTTPNextState");
 310:      http->next = HTTP_ERROR;
 311:      http->result = HT_PERM_REDIRECT;
 312:      break;
 313: 
 314:    case 302:                              /* Found */
 315:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_FOUND,
 316:                me->reason, (int) strlen(me->reason),
 317:                "HTTPNextState");
 318:      http->next = HTTP_ERROR;
 319:      http->result = HT_FOUND;
 320:      break;
1.55 frystyk 321:    
1.158 frystyk 322:    case 303:                             /* Method */
 323:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_METHOD,
 324:                me->reason, (int) strlen(me->reason),
 325:                "HTTPNextState");
 326:      http->next = HTTP_ERROR;
 327:      http->result = HT_SEE_OTHER;
 328:      break;
 329: 
 330:    case 304:                          /* Not Modified */
 331:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_NOT_MODIFIED,
 332:                me->reason, (int) strlen(me->reason),
 333:                "HTTPNextState");
 334:      http->next = HTTP_OK;
 335:      http->result = HT_NOT_MODIFIED;
 336:      break;
1.134 frystyk 337:    
1.158 frystyk 338:    case 305:                            /* Use proxy */
 339:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_USE_PROXY,
 340:                me->reason, (int) strlen(me->reason),
 341:                "HTTPNextState");
 342:      http->next = HTTP_ERROR;
 343:      http->result = HT_USE_PROXY;
 344:      break;
1.55 frystyk 345:    
1.152 frystyk 346: #if 0
1.158 frystyk 347:    case 306:                            /* Use proxy */
 348:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_PROXY_REDIRECT,
 349:                me->reason, (int) strlen(me->reason),
 350:                "HTTPNextState");
 351:      http->next = HTTP_ERROR;
 352:      http->result = HT_USE_PROXY;
 353:      break;
1.152 frystyk 354: #endif
 355: 
1.158 frystyk 356:    case 307:                            /* Use proxy */
 357:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_TEMP_REDIRECT,
 358:                me->reason, (int) strlen(me->reason),
 359:                "HTTPNextState");
 360:      http->next = HTTP_ERROR;
 361:      http->result = HT_TEMP_REDIRECT;
 362:      break;
 363: 
 364:    default:
 365:      HTRequest_addError(me->request, ERR_INFO, NO, HTERR_MULTIPLE,
 366:                me->reason, (int) strlen(me->reason),
 367:                "HTTPNextState");
 368:      http->next = HTTP_OK;
 369:      http->result = HT_LOADED;
 370:      break;
 371:    }    
 372:    break;
 373: 
 374:   case 4:
 375: 
 376:    switch (me->status) {
 377:    case 401:
 378:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNAUTHORIZED,
 379:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 380:      http->next = HTTP_ERROR;
 381:      http->result = HT_NO_ACCESS;
 382:      break;
1.152 frystyk 383:    
1.158 frystyk 384:    case 402:                        /* Payment required */
 385:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PAYMENT_REQUIRED,
 386:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 387:      http->next = HTTP_ERROR;
 388:      http->result = -402;
 389:      break;
1.71 frystyk 390:    
1.158 frystyk 391:    case 403:                            /* Forbidden */
 392:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_FORBIDDEN,
 393:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 394:      http->next = HTTP_ERROR;
 395:      http->result = HT_FORBIDDEN;
 396:      break;
1.55 frystyk 397:    
1.158 frystyk 398:    case 404:                            /* Not Found */
 399:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_FOUND,
 400:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 401:      http->next = HTTP_ERROR;
 402:      http->result = -404;
 403:      break;
1.55 frystyk 404:    
1.158 frystyk 405:    case 405:                           /* Not Allowed */
 406:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_ALLOWED,
 407:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 408:      http->next = HTTP_ERROR;
 409:      http->result = -405;
 410:      break;
 411: 
 412:    case 406:                         /* None Acceptable */
 413:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NONE_ACCEPTABLE,
 414:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 415:      http->next = HTTP_ERROR;
 416:      http->result = HT_NOT_ACCEPTABLE;
 417:      break;
 418: 
 419:    case 407:                  /* Proxy Authentication Required */
 420:      HTRequest_addError(me->request, ERR_FATAL, NO,HTERR_PROXY_UNAUTHORIZED,
 421:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 422:      http->next = HTTP_ERROR;
 423:      http->result = HT_NO_PROXY_ACCESS;
 424:      break;
 425: 
 426:    case 408:                         /* Request Timeout */
 427:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TIMEOUT,
 428:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 429:      http->next = HTTP_ERROR;
 430:      http->result = -408;
 431:      break;
 432: 
 433:    case 409:                            /* Conflict */
 434:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_CONFLICT,
 435:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 436:      http->next = HTTP_ERROR;
 437:      http->result = HT_CONFLICT;
 438:      break;
 439: 
 440:    case 410:                              /* Gone */
 441:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GONE,
 442:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 443:      http->next = HTTP_ERROR;
 444:      http->result = -410;
 445:      break;
 446: 
 447:    case 411:                         /* Length Required */
 448:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_LENGTH_REQUIRED,
 449:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 450:      http->next = HTTP_ERROR;
 451:      http->result = HT_LENGTH_REQUIRED;
 452:      break;
 453: 
 454:    case 412:                       /* Precondition failed */
 455:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PRECON_FAILED,
 456:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 457:      http->next = HTTP_ERROR;
 458:      http->result = -412;
 459:      break;
 460: 
 461:    case 413:                    /* Request entity too large */
 462:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_TOO_BIG,
 463:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 464:      http->next = HTTP_ERROR;
 465:      http->result = -413;
 466:      break;
 467: 
 468:    case 414:                      /* Request-URI too long */
 469:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_URI_TOO_BIG,
 470:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 471:      http->next = HTTP_ERROR;
 472:      http->result = -414;
 473:      break;
 474: 
 475:    case 415:                           /* Unsupported */
 476:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_UNSUPPORTED,
 477:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 478:      http->next = HTTP_ERROR;
 479:      http->result = -415;
 480:      break;
 481: 
 482:    case 416:                  /* Request Range not satisfiable */
 483:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_RANGE,
 484:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 485:      http->next = HTTP_ERROR;
 486:      http->result = -416;
 487:      break;
 488: 
 489:    case 417:                       /* Expectation Failed */
 490:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_EXPECTATION_FAILED,
 491:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 492:      http->next = HTTP_ERROR;
 493:      http->result = -417;
 494:      break;
 495: 
 496:    case 418:                    /* Reauthentication required */
 497:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_REAUTH,
 498:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 499:      http->next = HTTP_ERROR;
 500:      http->result = -418;
 501:      break;
 502: 
 503:    case 419:                 /* Proxy Reauthentication required */
 504:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_PROXY_REAUTH,
 505:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 506:      http->next = HTTP_ERROR;
 507:      http->result = -419;
 508:      break;
 509: 
 510:    default:
 511:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REQUEST,
 512:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 513:      http->next = HTTP_ERROR;
 514:      http->result = -400;
 515:      break;
 516:    }
1.134 frystyk 517:    break;
 518: 
1.158 frystyk 519:   case 5:
1.134 frystyk 520: 
1.158 frystyk 521:    switch (me->status) {
 522:    case 501:
 523:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NOT_IMPLEMENTED,
 524:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 525:      http->next = HTTP_ERROR;
 526:      http->result = -501;
 527:      break;
 528: 
 529:    case 502:
 530:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_GATE,
 531:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 532:      http->next = HTTP_ERROR;
 533:      http->result = -502;
 534:      break;
 535: 
 536:    case 503:
 537:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_DOWN,
 538:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 539:      http->next = HTTP_ERROR;
 540: 
 541:      /*
 542:      ** If Retry-After header is found then return HT_RETRY else HT_ERROR.
 543:      ** The caller may want to reissue the request at a later point in time.
 544:      */
 545:      {
 546:        HTResponse * response = HTRequest_response(me->request);
 547:        if (HTResponse_retryTime(response))
 548:          http->result = HT_RETRY;
 549:        else
 550:          http->result = -500;
 551:      }
 552:      break;
 553: 
 554:    case 504:
 555:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_GATE_TIMEOUT,
 556:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 557:      http->next = HTTP_ERROR;
 558:      http->result = -504;
 559:      break;
 560: 
 561:    case 505:                  /* Unsupported protocol version */
 562:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_VERSION,
 563:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 564:      http->next = HTTP_ERROR;
 565:      http->result = HT_BAD_VERSION;
 566:      break;
 567: 
 568:    case 506:                 /* Partial update Not Implemented */
 569:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_NO_PARTIAL_UPDATE,
 570:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 571:      http->next = HTTP_ERROR;
 572:      http->result = HT_BAD_VERSION;
 573:      break;
 574: 
 575:    default:                            /* bad number */
 576:      HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_INTERNAL,
 577:                me->reason, (int) strlen(me->reason), "HTTPNextState");
 578:      http->next = HTTP_ERROR;
 579:      http->result = -500;
 580:      break;
1.140 frystyk 581:    }
1.78 frystyk 582:    break;
 583: 
1.158 frystyk 584:   default:
1.104 frystyk 585:    HTRequest_addError(me->request, ERR_FATAL, NO, HTERR_BAD_REPLY,
1.158 frystyk 586:              (void *) me->buffer, me->buflen, "HTTPNextState");
1.134 frystyk 587:    http->next = HTTP_ERROR;
1.155 frystyk 588:    http->result = -(me->status);
1.71 frystyk 589:    break;
1.55 frystyk 590:   }
 591: }
 592: 
1.71 frystyk 593: /* ------------------------------------------------------------------------- */
 594: /*             HTTP Status Line Stream             */
 595: /* ------------------------------------------------------------------------- */
1.55 frystyk 596: 
1.71 frystyk 597: /*
1.141 frystyk 598: **   Analyze the stream we have read. If it is a HTTP 1.0 or higher
1.71 frystyk 599: **   then create a MIME-stream, else create a Guess stream to find out
 600: **   what the 0.9 server is sending. We need to copy the buffer as we don't
 601: **   know if we can modify the contents or not.
1.78 frystyk 602: **
 603: **   Stream handling is a function of the status code returned from the 
 604: **   server:
 605: **       200:   Use `output_stream' in HTRequest structure
1.94 frystyk 606: **       else:  Use `debug_stream' in HTRequest structure
1.80 frystyk 607: **
 608: **   Return: YES if buffer should be written out. NO otherwise
1.56 frystyk 609: */
1.157 frystyk 610: PRIVATE int stream_pipe (HTStream * me, int length)
1.56 frystyk 611: {
1.136 frystyk 612:   HTRequest * request = me->request;
 613:   HTNet * net = HTRequest_net(request);
1.123 frystyk 614:   HTHost * host = HTNet_host(net);
1.141 frystyk 615: 
1.153 frystyk 616: #if 0
 617:   {
 618:    char * uri = HTAnchor_address((HTAnchor *) HTRequest_anchor(request));
 619:    fprintf(stderr, "HTTP header: %s for '%s'\n", me->buffer, uri);
 620:    HT_FREE(uri);
 621:   }
 622: #endif
 623:   
1.132 frystyk 624:   /*
 625:   ** Just check for HTTP and not HTTP/ as NCSA server chokes on 1.1 replies
 626:   ** Thanks to Markku Savela <msa@msa.tte.vtt.fi>
1.141 frystyk 627: 
1.132 frystyk 628:   */
 629:   if (strncasecomp(me->buffer, "http", 4)) {
1.80 frystyk 630:    int status;
1.136 frystyk 631:    HTRequest_addError(request, ERR_INFO, NO, HTERR_HTTP09,
1.80 frystyk 632:          (void *) me->buffer, me->buflen, "HTTPStatusStream");
1.136 frystyk 633:    me->target = HTStreamStack(WWW_UNKNOWN,
 634:                  HTRequest_outputFormat(request),
 635:                  HTRequest_outputStream(request),
 636:                  request, NO);
1.134 frystyk 637:    me->http->next = HTTP_OK;
1.80 frystyk 638:    if ((status = PUTBLOCK(me->buffer, me->buflen)) == HT_OK)
 639:      me->transparent = YES;
1.186 kahan 640:     /* JK: in 2000, we don't expect many HTTP/0.9 servers to remain.
 641:      I removed this line which made the backward change as most of
 642:      the time we fall here more due to a network or server problem,
 643:      rather than because we are accessing an old server. */
 644:    /* HTHost_setVersion(host, HTTP_09); */
1.157 frystyk 645:    if (length > 0) HTHost_setConsumed(host, length);
1.178 frystyk 646:    HTTRACE(PROT_TRACE, "HTTP Status. `%s\' is probably a broken 1.0 server that doesn't understand HEAD\n" _ 
1.171 frystyk 647:          HTHost_name(host));
 648:    return HT_ERROR;
1.80 frystyk 649:   } else {
1.140 frystyk 650:    HTResponse * response = HTRequest_response(request);
1.155 frystyk 651:    char * ptr = me->buffer+5;           /* Skip the HTTP part */
 652:    char * vptr = NULL;
 653:    int major = 0;
 654:    int minor = 0;
 655:    me->version = vptr = HTNextField(&ptr);
 656:    if (vptr) {
 657:      major = (int) strtol(me->version, &vptr, 10);
 658:      if (vptr++) minor = strtol(vptr, NULL, 10);
 659:    }
1.95 frystyk 660: 
1.130 frystyk 661:    /* Here we want to find out when to use persistent connection */
1.171 frystyk 662:    if (major > 1 && major < 100) {
1.178 frystyk 663:      HTTRACE(PROT_TRACE, "HTTP Status. Major version number is %d\n" _ major);
1.155 frystyk 664:      me->target = HTErrorStream();
1.158 frystyk 665:      me->status = 9999;
1.155 frystyk 666:      HTTPNextState(me);                   /* Get next state */
1.158 frystyk 667:      return HT_ERROR;
1.155 frystyk 668:    } else if (minor <= 0) {
1.171 frystyk 669:      if (major > 100) {
1.178 frystyk 670:        HTTRACE(PROT_TRACE, "HTTP Status. This is a *BROKEN* HTTP/1.0 server\n");
1.171 frystyk 671:        me->status = 200;
 672:      } else {
1.178 frystyk 673:        HTTRACE(PROT_TRACE, "HTTP Status. This is an HTTP/1.0 server\n");
1.171 frystyk 674:        me->status = atoi(HTNextField(&ptr));
 675:      }
1.128 frystyk 676:      HTHost_setVersion(host, HTTP_10);
1.155 frystyk 677:    } else {                    /* 1.x, x>0 family */
 678:      HTHost_setVersion(host, HTTP_11);      /* Best we can do */
1.156 frystyk 679:      if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 680:        HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with NO PIPELINING\n");
1.147 frystyk 681:        HTNet_setPersistent(net, YES, HT_TP_SINGLE);
1.156 frystyk 682:      } else if (ConnectionMode & HTTP_11_MUX) {
1.178 frystyk 683:        HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 with MUXING\n");
1.156 frystyk 684:        HTNet_setPersistent(net, YES, HT_TP_INTERLEAVE);
1.147 frystyk 685:      } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 686:        HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 687:        HTHost_setVersion(host, HTTP_10);
 688:        HTNet_setPersistent(net, NO, HT_TP_SINGLE);
 689:      } else
 690:        HTNet_setPersistent(net, YES, HT_TP_PIPELINE);
1.171 frystyk 691:      me->status = atoi(HTNextField(&ptr));
1.128 frystyk 692:    }
1.95 frystyk 693: 
1.81 frystyk 694:    me->reason = ptr;
 695:    if ((ptr = strchr(me->reason, '\r')) != NULL)   /* Strip \r and \n */
 696:      *ptr = '0円';
 697:    else if ((ptr = strchr(me->reason, '\n')) != NULL)
 698:      *ptr = '0円';
 699: 
1.130 frystyk 700:    /* 
 701:    ** If it is a 1xx code then find out what to do and return until we
 702:    ** get the next code. In the case of Upgrade we may not get back here
 703:    ** at all. If we are uploading an entity then continue doing that
 704:    */
 705:    if (me->status/100 == 1) {
1.136 frystyk 706:      if (HTTPInformation(me) == YES) {
1.180 frystyk 707:        if (me->status==100) {
 708:          me->buflen = 0;
 709:          me->state = EOL_BEGIN;
 710:          if (me->info_target) (*me->info_target->isa->_free)(me->info_target);
 711:          me->info_target = HTStreamStack(WWW_MIME_CONT,
 712:                          HTRequest_debugFormat(request),
 713:                          HTRequest_debugStream(request),
 714:                          request, NO);
 715:          if (length > 0) HTHost_setConsumed(host, length);
 716:          return HT_OK;
 717:        } else if (me->status==101) {
 718:          if (me->info_target) (*me->info_target->isa->_free)(me->info_target);
 719:          me->target = HTStreamStack(WWW_MIME_UPGRADE,
 720:                        HTRequest_outputFormat(request),
 721:                        HTRequest_outputStream(request),
 722:                        request, NO);
 723:          if (length > 0) HTHost_setConsumed(host, length);
 724:          me->transparent = YES;
 725:          return HT_OK;
 726:        }
1.103 frystyk 727:      }
1.56 frystyk 728:    }
1.133 frystyk 729: 
 730:    /*
 731:    ** As we are getting fresh metainformation in the HTTP response,
 732:    ** we clear the old metainfomation in order not to mix it with the new
 733:    ** one. This is particularly important for the content-length and the
1.139 frystyk 734:    ** like. The TRACE and OPTIONS method just adds to the current 
 735:    ** metainformation so in that case we don't clear the anchor.
1.133 frystyk 736:    */
1.136 frystyk 737:    if (me->status==200 || me->status==203 || me->status==300) {
1.140 frystyk 738:      /*
 739:      ** 200, 203 and 300 are all fully cacheable responses. No byte 
 740:      ** ranges or anything else make life hard in this case.
 741:      */
1.148 frystyk 742:      HTAnchor_clearHeader(HTRequest_anchor(request));
1.166 frystyk 743:      HTResponse_setCachable(response, HT_CACHE_ALL);
1.136 frystyk 744:      me->target = HTStreamStack(WWW_MIME,
 745:                    HTRequest_outputFormat(request),
 746:                    HTRequest_outputStream(request),
 747:                    request, NO);
1.176 frystyk 748:    } else if (me->status==204) {
 749:      HTResponse_setCachable(response, HT_CACHE_ALL);
 750:      me->target = HTStreamStack(WWW_MIME_HEAD,
 751:                    HTRequest_debugFormat(request),
 752:                    HTRequest_debugStream(request),
 753:                    request, NO);
1.140 frystyk 754:    } else if (me->status==206) {
 755:      /*
 756:      ** We got a partial response and now we must check whether
 757:      ** we issued a cache If-Range request or it was a new 
 758:      ** partial response which we don't have in cache. In the latter
 759:      ** case, we don't cache the object and in the former we append
 760:      ** the result to the already existing cache entry.
 761:      */
 762:      HTReload reload = HTRequest_reloadMode(request);
 763:      if (reload == HT_CACHE_RANGE_VALIDATE) {
1.166 frystyk 764:        HTResponse_setCachable(response, HT_CACHE_ALL);
1.140 frystyk 765:        me->target = HTStreamStack(WWW_MIME_PART,
 766:                      HTRequest_outputFormat(request),
 767:                      HTRequest_outputStream(request),
 768:                      request, NO);
 769:      } else {
1.149 frystyk 770:        HTAnchor_clearHeader(HTRequest_anchor(request));
1.140 frystyk 771:        me->target = HTStreamStack(WWW_MIME,
 772:                      HTRequest_outputFormat(request),
 773:                      HTRequest_outputStream(request),
 774:                      request, NO);
 775:      }
1.176 frystyk 776:    } else if (me->status==304) {
 777:      HTResponse_setCachable(response, HT_CACHE_NOT_MODIFIED);
1.136 frystyk 778:      me->target = HTStreamStack(WWW_MIME_HEAD,
 779:                    HTRequest_debugFormat(request),
 780:                    HTRequest_debugStream(request),
 781:                    request, NO);
 782:    } else if (HTRequest_debugStream(request)) {
1.175 frystyk 783:      HTResponse_setCachable(response,
 784:                  (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 785:      me->target = HTStreamStack(WWW_MIME,
 786:                    HTRequest_debugFormat(request),
 787:                    HTRequest_debugStream(request),
 788:                    request, NO);
 789:    } else {
1.140 frystyk 790:      /*
 791:      ** We still need to parse the MIME part in order to find any
 792:      ** valuable meta information which is needed from the response.
 793:      */
1.175 frystyk 794:      HTResponse_setCachable(response,
 795:                  (me->status == 201) ? HT_CACHE_ETAG : HT_NO_CACHE);
1.136 frystyk 796:      me->target = HTStreamStack(WWW_MIME,
 797:                    HTRequest_debugFormat(request),
 798:                    HTRequest_debugStream(request),
 799:                    request, NO);
1.133 frystyk 800:    }
1.56 frystyk 801:   }
1.113 frystyk 802:   if (!me->target) me->target = HTErrorStream();
1.81 frystyk 803:   HTTPNextState(me);                  /* Get next state */
1.80 frystyk 804:   me->transparent = YES;
1.157 frystyk 805:   if (length > 0) HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length);
1.80 frystyk 806:   return HT_OK;
1.71 frystyk 807: }
1.56 frystyk 808: 
1.80 frystyk 809: /*
 810: **   Searches for HTTP header line until buffer fills up or a CRLF or LF
 811: **   is found
 812: */
1.119 frystyk 813: PRIVATE int HTTPStatus_put_block (HTStream * me, const char * b, int l)
1.71 frystyk 814: {
1.150 frystyk 815:   int status = HT_OK;
1.153 frystyk 816:   int length = l;
1.146 frystyk 817:   me->startLen = me->buflen;
1.80 frystyk 818:   while (!me->transparent && l-- > 0) {
1.157 frystyk 819:    if (me->info_target) {
 820: 
 821:      /* Put data down the 1xx return code parser until we are done. */
 822:      status = (*me->info_target->isa->put_block)(me->info_target, b, l+1);
 823:      if (status != HT_CONTINUE) return status;
 824: 
 825:      /* Now free the info stream */
 826:      (*me->info_target->isa->_free)(me->info_target);
 827:      me->info_target = NULL;       
 828: 
 829:      /* Update where we are in the stream */
 830:      l = HTHost_remainingRead(HTNet_host(HTRequest_net(me->request)));
1.163 frystyk 831:      b += (length-l);    
1.159 frystyk 832:      length = l;
1.163 frystyk 833:      if (l <= 0) break;
1.157 frystyk 834: 
1.80 frystyk 835:    } else {
 836:      *(me->buffer+me->buflen++) = *b;
 837:      if (me->state == EOL_FCR) {
 838:        if (*b == LF) { /* Line found */
1.157 frystyk 839:          if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 840:        } else {
 841:          me->state = EOL_BEGIN;
 842:        }
 843:      } else if (*b == CR) {
 844:        me->state = EOL_FCR;
 845:      } else if (*b == LF) {
1.157 frystyk 846:        if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.71 frystyk 847:      } else {
1.80 frystyk 848:        if (me->buflen >= MAX_STATUS_LEN) {
1.157 frystyk 849:          if ((status = stream_pipe(me, length-l)) != HT_OK) return status;
1.80 frystyk 850:        }
1.71 frystyk 851:      }
1.80 frystyk 852:      b++;
1.71 frystyk 853:    }
1.56 frystyk 854:   }
1.153 frystyk 855: 
1.159 frystyk 856:   if (!me->transparent && length != l)
 857:    HTHost_setConsumed(HTNet_host(HTRequest_net(me->request)), length-l);
 858: 
1.99 frystyk 859:   if (l > 0) return PUTBLOCK(b, l);
1.150 frystyk 860:   return status;
1.56 frystyk 861: }
 862: 
1.119 frystyk 863: PRIVATE int HTTPStatus_put_string (HTStream * me, const char * s)
1.71 frystyk 864: {
1.80 frystyk 865:   return HTTPStatus_put_block(me, s, (int) strlen(s));
1.71 frystyk 866: }
1.56 frystyk 867: 
1.100 frystyk 868: PRIVATE int HTTPStatus_put_character (HTStream * me, char c)
1.71 frystyk 869: {
1.80 frystyk 870:   return HTTPStatus_put_block(me, &c, 1);
 871: }
 872: 
1.100 frystyk 873: PRIVATE int HTTPStatus_flush (HTStream * me)
1.80 frystyk 874: {
 875:   return (*me->target->isa->flush)(me->target);
1.71 frystyk 876: }
 877: 
1.100 frystyk 878: PRIVATE int HTTPStatus_free (HTStream * me)
1.71 frystyk 879: {
1.87 frystyk 880:   int status = HT_OK;
 881:   if (me->target) {
 882:    if ((status = (*me->target->isa->_free)(me->target))==HT_WOULD_BLOCK)
 883:      return HT_WOULD_BLOCK;
 884:   }
1.115 frystyk 885:   HT_FREE(me);
1.100 frystyk 886:   return status;
1.71 frystyk 887: }
 888: 
1.104 frystyk 889: PRIVATE int HTTPStatus_abort (HTStream * me, HTList * e)
1.71 frystyk 890: {
 891:   if (me->target)
1.74 frystyk 892:    ABORT_TARGET;
1.115 frystyk 893:   HT_FREE(me);
1.178 frystyk 894:   HTTRACE(PROT_TRACE, "HTTPStatus.. ABORTING...\n");
1.80 frystyk 895:   return HT_ERROR;
1.71 frystyk 896: }
 897: 
 898: /*   HTTPStatus Stream
 899: **   -----------------
 900: */
1.119 frystyk 901: PRIVATE const HTStreamClass HTTPStatusClass =
1.71 frystyk 902: {       
 903:   "HTTPStatus",
1.80 frystyk 904:   HTTPStatus_flush,
1.71 frystyk 905:   HTTPStatus_free,
 906:   HTTPStatus_abort,
 907:   HTTPStatus_put_character,
 908:   HTTPStatus_put_string,
 909:   HTTPStatus_put_block
 910: };
 911: 
1.113 frystyk 912: PUBLIC HTStream * HTTPStatus_new (HTRequest * request,
 913:                 void *    param,
 914:                 HTFormat   input_format,
 915:                 HTFormat   output_format,
 916:                 HTStream *  output_stream)
1.71 frystyk 917: {
1.115 frystyk 918:   HTStream * me;
 919:   if ((me = (HTStream *) HT_CALLOC(1, sizeof(HTStream))) == NULL)
 920:     HT_OUTOFMEM("HTTPStatus_new");
1.71 frystyk 921:   me->isa = &HTTPStatusClass;
1.113 frystyk 922:   if (request) {
1.126 frystyk 923:    HTNet * net = HTRequest_net(request);
1.125 frystyk 924:     /* Get existing copy */
 925:    http_info * http = (http_info *) HTNet_context(net);
1.113 frystyk 926:    me->request = request;
 927:    me->http = http;
 928:    http->next = HTTP_ERROR;
 929:    me->state = EOL_BEGIN;
 930:    return me;
 931:   } else
 932:    return HTErrorStream();
1.71 frystyk 933: }
 934: 
 935: /* ------------------------------------------------------------------------- */
 936: 
 937: /*       Load Document from HTTP Server            HTLoadHTTP
1.55 frystyk 938: **       ==============================
 939: **
 940: **   Given a hypertext address, this routine loads a document.
 941: **
 942: ** On entry,
 943: **   request        This is the request structure
1.94 frystyk 944: **   returns     HT_ERROR    Error has occured in call back
 945: **           HT_OK      Call back was OK
1.55 frystyk 946: */
1.141 frystyk 947: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type);
 948: 
 949: PUBLIC int HTLoadHTTP (SOCKET soc, HTRequest * request)
1.55 frystyk 950: {
 951:   http_info *http;            /* Specific protocol information */
1.112 frystyk 952:   HTParentAnchor *anchor = HTRequest_anchor(request);
1.141 frystyk 953:   HTNet * net = HTRequest_net(request);
1.112 frystyk 954: 
1.94 frystyk 955:   /*
 956:   ** Initiate a new http structure and bind to request structure
 957:   ** This is actually state HTTP_BEGIN, but it can't be in the state
 958:   ** machine as we need the structure first.
 959:   */
1.178 frystyk 960:   HTTRACE(PROT_TRACE, "HTTP........ Looking for `%s\'\n" _ 
1.141 frystyk 961:              HTAnchor_physical(anchor));
 962:   if ((http = (http_info *) HT_CALLOC(1, sizeof(http_info))) == NULL)
 963:    HT_OUTOFMEM("HTLoadHTTP");
 964:   http->net = net;
1.157 frystyk 965:   http->request = request;
1.141 frystyk 966:   HTNet_setContext(net, http);
 967:   HTNet_setEventCallback(net, HTTPEvent);
 968:   HTNet_setEventParam(net, http); /* callbacks get http* */
 969: 
1.157 frystyk 970:   return HTTPEvent(soc, http, HTEvent_BEGIN);      /* get it started - ops is ignored */
 971: }
 972: 
 973: PRIVATE int FlushPutEvent (HTTimer * timer, void * param, HTEventType type)
 974: {
 975:   http_info * http = (http_info *) param;
 976:   HTStream * input = HTRequest_inputStream(http->request);
 977:   HTPostCallback * pcbf = HTRequest_postCallback(http->request);
1.181 frystyk 978:   int status = HT_ERROR;
1.157 frystyk 979: 
1.165 frystyk 980:   http->usedTimer = YES;
1.160 frystyk 981:   if (timer != http->timer)
1.178 frystyk 982:    HTDEBUGBREAK("HTTP timer %p not in sync\n" _ timer);
 983:   HTTRACE(PROT_TRACE, "Uploading... Flushing %p with timer %p\n" _ http _ timer);
1.157 frystyk 984: 
 985:   /*
1.181 frystyk 986:   ** Call the callback that will provide the data to save
 987:   ** If the callback returns HT_OK then call it again until
 988:   ** it returns something else than HT_OK.
1.157 frystyk 989:   */
1.181 frystyk 990:   if (http && input && pcbf) {
 991:    status = (*pcbf)(http->request, input);
 992:    HTTRACE(PROT_TRACE, "Uploading... Callback returned %d\n" _ status);  
 993:   }
1.157 frystyk 994: 
 995:   /*
1.181 frystyk 996:   ** If the callback returned something else than HT_OK then delete
 997:   ** the timer, otherwise update it to a much shorter expiration
 998:   ** time so that we can write some more data to the net.
1.157 frystyk 999:   */
1.181 frystyk 1000:   if (status != HT_OK) {
 1001:    HTTimer_delete(http->timer);
 1002:    http->timer = NULL;
 1003:   } else if (!http->repetitive_writing) {
 1004:    http->timer = HTTimer_new(NULL, FlushPutEvent, http, HTRepeatWrite, YES, YES);
 1005:    http->repetitive_writing = YES;
 1006:   }
1.157 frystyk 1007:   return HT_OK;
1.141 frystyk 1008: }
 1009: 
 1010: PRIVATE int HTTPEvent (SOCKET soc, void * pVoid, HTEventType type)
 1011: {
 1012:   http_info * http = (http_info *)pVoid;
 1013:   int status = HT_ERROR;
 1014:   HTNet * net = http->net;
 1015:   HTRequest * request = HTNet_request(net);
1.144 frystyk 1016:   HTParentAnchor * anchor = HTRequest_anchor(request);
 1017:   HTHost * host = HTNet_host(net);
1.141 frystyk 1018: 
 1019:   /*
1.166 frystyk 1020:   ** Check whether we have been interrupted or timed out
1.141 frystyk 1021:   */
 1022:   if (type == HTEvent_BEGIN) {
1.134 frystyk 1023:    http->next = HTTP_OK;
 1024:    http->result = HT_ERROR;
1.141 frystyk 1025:   } else if (type == HTEvent_CLOSE) {
1.179 frystyk 1026:     long read_len = HTNet_bytesRead(net);
 1027:     long doc_len = HTAnchor_length(anchor);
 1028: 
 1029:     /*
 1030:     ** It is OK to get a close if a) we don't pipeline and b)
1.182 frystyk 1031:     ** we have the expected amount of data, and c) we haven't
 1032:    ** recieved a 100 Continue code. In case we don't
1.179 frystyk 1033:     ** know how much data to expect, we must accept it asis.
 1034:     */
 1035:     if (HTHost_numberOfOutstandingNetObjects(host) == 1 &&
1.182 frystyk 1036:      http->result != HT_CONTINUE && (doc_len<0 || doc_len==read_len)) {
1.183 frystyk 1037:      HTTPCleanup(request, http->result);     /* Raffaele Sena: was HT_LOADED */
1.179 frystyk 1038:     } else {
 1039:       HTRequest_addError(request, ERR_FATAL, NO, HTERR_INTERRUPTED,
 1040:                NULL, 0, "HTLoadHTTP");
 1041:      HTTPCleanup(request, HT_INTERRUPTED);
 1042:     }
1.166 frystyk 1043:    return HT_OK;
 1044:   } else if (type == HTEvent_TIMEOUT) {
 1045:    HTRequest_addError(request, ERR_FATAL, NO, HTERR_TIME_OUT,
 1046:              NULL, 0, "HTLoadHTTP");
 1047:    HTTPCleanup(request, HT_TIMEOUT);
1.94 frystyk 1048:    return HT_OK;
1.141 frystyk 1049:   } else if (type == HTEvent_END) {
 1050:    HTTPCleanup(request, http->result);
 1051:    return HT_OK;
 1052:   } else if (type == HTEvent_RESET) {
 1053:    HTTPCleanup(request, HT_RECOVER_PIPE);
1.145 frystyk 1054:    http->state = HTTP_BEGIN;
1.141 frystyk 1055:    return HT_OK;
 1056:   }
 1057: 
1.71 frystyk 1058:   /* Now jump into the machine. We know the state from the previous run */
 1059:   while (1) {
 1060:    switch (http->state) {
1.134 frystyk 1061:    case HTTP_BEGIN:
1.184 frystyk 1062:      status = HTHost_connect(host, net, HTAnchor_physical(anchor));
1.144 frystyk 1063:      host = HTNet_host(net);
1.153 frystyk 1064:       if (status == HT_OK) {
1.140 frystyk 1065: 
1.123 frystyk 1066:        /*
1.140 frystyk 1067:        ** Check the protocol class to see if we have connected to a
 1068:        ** the right class of server, in this case HTTP. If we don't 
 1069:        ** know the server then assume a HTTP/1.0
1.123 frystyk 1070:        */
 1071:        {
 1072:          char * s_class = HTHost_class(host);
1.140 frystyk 1073:          if (!s_class) {
1.174 frystyk 1074:            if (HTRequest_proxy(request) == NULL) {
 1075:              HTAssocList * alist = HTRequest_connection(request);
 1076:              if (!(alist && HTAssocList_findObject(alist, "close")))
 1077:                HTRequest_addConnection(request, "Keep-Alive", "");
 1078:            }
1.140 frystyk 1079:            HTHost_setClass(host, "http");
 1080:          } else if (strcasecomp(s_class, "http")) {
1.123 frystyk 1081:            HTRequest_addError(request, ERR_FATAL, NO, HTERR_CLASS,
 1082:                      NULL, 0, "HTLoadHTTP");
 1083:            http->state = HTTP_ERROR;
 1084:            break;
 1085:          }
1.95 frystyk 1086:        }
1.147 frystyk 1087: 
1.156 frystyk 1088:        if (ConnectionMode & HTTP_11_NO_PIPELINING) {
1.178 frystyk 1089:          HTTRACE(PROT_TRACE, "HTTP........ Mode is HTTP/1.1 WITH NO PIPELINING\n");
1.147 frystyk 1090:          HTRequest_setFlush(request, YES);
 1091:        } else if (ConnectionMode & HTTP_FORCE_10) {
1.178 frystyk 1092:          HTTRACE(PROT_TRACE, "HTTP........ Mode is FORCE HTTP/1.0\n");
1.147 frystyk 1093:          HTHost_setVersion(host, HTTP_10);
 1094:        }
 1095: 
1.151 frystyk 1096:        if (HTNet_preemptive(net)) {
1.178 frystyk 1097:          HTTRACE(PROT_TRACE, "HTTP........ Force flush on preemptive load\n");
1.151 frystyk 1098:          HTRequest_setFlush(request, YES);
 1099:        }
 1100: 
1.147 frystyk 1101:        /* Jump to next state */
1.144 frystyk 1102:        http->state = HTTP_NEED_STREAM;
1.159 frystyk 1103:      } else if (status == HT_WOULD_BLOCK || status == HT_PENDING) {
1.144 frystyk 1104:        return HT_OK;
1.171 frystyk 1105:      } else if (status == HT_NO_HOST) {
 1106:        http->result = HT_NO_HOST;
 1107:        http->state = HTTP_ERROR;
1.159 frystyk 1108:      } else   
1.144 frystyk 1109:        http->state = HTTP_ERROR;       /* Error or interrupt */
 1110:      break;
 1111:      
 1112:    case HTTP_NEED_STREAM:
1.138 frystyk 1113: 
1.144 frystyk 1114:      /* 
 1115:      ** Create the stream pipe FROM the channel to the application.
 1116:      ** The target for the input stream pipe is set up using the
 1117:      ** stream stack.
 1118:      */
1.167 frystyk 1119:      {
 1120:       /*
 1121:       ** during a recovery, we might keep the same HTNet object.
 1122:       ** if so, reuse it's read stream 
 1123:       */
1.176 frystyk 1124:      HTStream * me = HTNet_readStream( net );
1.167 frystyk 1125:       if ( me == NULL ) {
1.173 frystyk 1126:         me = HTStreamStack(WWW_HTTP,
 1127:                  HTRequest_outputFormat(request),
 1128:                  HTRequest_outputStream(request),
 1129:                  request, YES);
1.178 frystyk 1130: #ifdef HTDEBUG
1.173 frystyk 1131:        if (PROT_TRACE) {
 1132:          if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
 1133:          if (htfp) {
 1134:            me = HTTee(me, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1135:            HTTRACE(PROT_TRACE, "HTTP........ Dumping response to `%s\'\n" _ HTTP_OUTPUT);
1.173 frystyk 1136:          }
 1137:        }
1.178 frystyk 1138: #endif /* HTDEBUG */
1.173 frystyk 1139: 
 1140:        HTNet_setReadStream(net, me);
1.167 frystyk 1141:       }
 1142:       HTRequest_setOutputConnected(request, YES);
1.144 frystyk 1143:      }
1.127 frystyk 1144: 
1.144 frystyk 1145:      /*
 1146:      ** Create the stream pipe TO the channel from the application
 1147:      ** and hook it up to the request object
 1148:      */
 1149:      {
 1150:        HTChannel * channel = HTHost_channel(host);
 1151:        HTOutputStream * output = HTChannel_getChannelOStream(channel);
 1152:        int version = HTHost_version(host);
 1153:        HTStream * app = NULL;
 1154:        
1.178 frystyk 1155: #ifdef HTDEBUG
1.144 frystyk 1156:        if (PROT_TRACE) {
1.162 frystyk 1157:          if (!htfp) htfp = fopen(HTTP_OUTPUT, "ab");
 1158:          if (htfp) {
1.144 frystyk 1159:            output = (HTOutputStream *)
1.162 frystyk 1160:              HTTee((HTStream *) output, HTFWriter_new(request, htfp, YES), NULL);
1.178 frystyk 1161:            HTTRACE(PROT_TRACE, "HTTP........ Dumping request to `%s\'\n" _ HTTP_OUTPUT);
1.144 frystyk 1162:          }
 1163:        }    
1.178 frystyk 1164: #endif /* HTDEBUG */
1.144 frystyk 1165:        app = HTMethod_hasEntity(HTRequest_method(request)) ?
 1166:          HTMIMERequest_new(request,
 1167:                   HTTPRequest_new(request, (HTStream *) output, NO,
 1168:                           version),
 1169:                   YES) :
 1170:          HTTPRequest_new(request, (HTStream *) output, YES, version);
 1171:        HTRequest_setInputStream(request, app);
 1172:      }
1.88 frystyk 1173: 
1.144 frystyk 1174:      /*
 1175:      ** Set up concurrent read/write if this request isn't the
 1176:      ** source for a PUT or POST. As source we don't start reading
 1177:      ** before all destinations are ready. If destination then
 1178:      ** register the input stream and get ready for read
 1179:      */
 1180:      if (HTRequest_isDestination(request)) {
 1181:        HTHost_register(host, net, HTEvent_READ);
 1182:        HTRequest_linkDestination(request);
 1183:      }
 1184:      http->state = HTTP_CONNECTED;
 1185:      type = HTEvent_WRITE;              /* fresh, so try a write */
1.71 frystyk 1186:      break;
 1187: 
1.87 frystyk 1188:      /* As we can do simultanous read and write this is now one state */
1.141 frystyk 1189:     case HTTP_CONNECTED:
 1190:       if (type == HTEvent_WRITE) {
1.157 frystyk 1191:         HTStream * input = HTRequest_inputStream(request);
 1192:         HTPostCallback * pcbf = HTRequest_postCallback(request);
 1193:         status = HTRequest_flush(request) ?
 1194:           HTHost_forceFlush(host) : (*input->isa->flush)(input);
 1195: 
 1196:         /*
 1197:         ** Check to see if we are uploading something or just a normal
 1198:         ** GET kind of thing.
 1199:         */
1.187 kahan 1200:         
 1201:         /*
 1202:         ** JK: don't continue sending things thru the network
 1203:         ** if the flush resulted in an error or if the connection
 1204:         ** is closed 
 1205:         */
 1206:         if ((status != HT_ERROR) && status != HT_CLOSED) {
 1207:           if (pcbf) {
 1208:             if (http->lock == NO) {
 1209:               int retrys = HTRequest_retrys(request);
 1210:               ms_t delay = retrys > 3 ? HTSecondWriteDelay : HTFirstWriteDelay;
 1211:               if (!http->timer && !http->usedTimer) {
 1212:                 http->timer = HTTimer_new(NULL, FlushPutEvent,
1.162 frystyk 1213:                            http, delay, YES, NO);
1.187 kahan 1214:                 HTTRACE(PROT_TRACE, "Uploading... Holding %p for %lu ms using time %p\n" _ 
1.178 frystyk 1215:                     http _ delay _ http->timer);
1.187 kahan 1216:                 HTHost_register(host, net, HTEvent_READ);
 1217:               }
 1218:               http->lock = YES;
1.157 frystyk 1219:             }
1.187 kahan 1220:             type = HTEvent_READ;
 1221:           } else {
 1222: 
 1223:            /*
 1224:            ** Check to see if we can start a new request
 1225:            ** pending in the host object.
 1226:            */
 1227:            HTHost_launchPending(host);
 1228:            type = HTEvent_READ;
1.157 frystyk 1229:           }
 1230:         }
1.188 kahan 1231: 
1.157 frystyk 1232:         /* Now check the status code */
 1233:         if (status == HT_WOULD_BLOCK)
 1234:           return HT_OK;
 1235:         else if (status == HT_PAUSE || status == HT_LOADED) {
 1236:           type = HTEvent_READ;
1.168 frystyk 1237:         } else if (status==HT_ERROR)
1.157 frystyk 1238:           http->state = HTTP_RECOVER_PIPE;
 1239:       } else if (type == HTEvent_FLUSH) {
 1240:         HTStream * input = HTRequest_inputStream(request);
 1241:         if (input == NULL)
 1242:           return HT_ERROR;
 1243:         return (*input->isa->flush)(input);
 1244:       } else if (type == HTEvent_READ) {
 1245:         status = HTHost_read(host, net);
 1246:         if (status == HT_WOULD_BLOCK)
 1247:           return HT_OK;
 1248:         else if (status == HT_CONTINUE) {
1.178 frystyk 1249:           HTTRACE(PROT_TRACE, "HTTP........ Continuing\n");
1.157 frystyk 1250:           http->lock = NO;
 1251:           continue;
 1252:         } else if (status==HT_LOADED)
 1253:           http->state = http->next; /* Jump to next state (OK or ERROR) */
 1254:         else if (status==HT_CLOSED)
 1255:           http->state = HTTP_RECOVER_PIPE;
1.167 frystyk 1256:         else if (status == HT_ERROR)
 1257:           http->state = HTTP_KILL_PIPE;
1.157 frystyk 1258:         else
 1259:           http->state = HTTP_ERROR;
 1260:       } else {
 1261:         http->state = HTTP_ERROR;   /* don't know how to handle OOB */
 1262:       }
 1263:       break;
1.141 frystyk 1264: 
1.134 frystyk 1265:     case HTTP_OK:
 1266:      HTTPCleanup(request, http->result);
1.94 frystyk 1267:      return HT_OK;
1.71 frystyk 1268:      break;
1.141 frystyk 1269: 
 1270:      case HTTP_RECOVER_PIPE:
 1271:     {
 1272:       /*
 1273:       ** If this is a persistent connection and we get a close
 1274:       ** then it is an error and we should recover from it by
 1275:       ** restarting the pipe line of requests if any
 1276:       */
1.151 frystyk 1277:       if (HTHost_isPersistent(host) && !HTHost_closeNotification(host)) {
1.143 frystyk 1278:         if (host == NULL) return HT_ERROR;
1.144 frystyk 1279:         HTRequest_setFlush(request, YES);
1.182 frystyk 1280: 
 1281:         /*
 1282:         ** If we already have recovered more than we want and
 1283:         ** this call returns NO then simply kill the pipe.
 1284:         ** Otherwise we may loop forever.
 1285:         */
 1286:         if (HTHost_recoverPipe(host) != YES) {
 1287:           HTRequest_addError(request, ERR_FATAL, NO, HTERR_BAD_REPLY,
 1288:                     NULL, 0, "HTTPEvent");
 1289:           http->state = HTTP_KILL_PIPE;
 1290:           break;
 1291:         }
1.144 frystyk 1292:         return HT_OK;
1.141 frystyk 1293:       } else
 1294:         http->state = HTTP_OK;
 1295:     }
1.143 frystyk 1296:     break;
1.141 frystyk 1297: 
1.167 frystyk 1298:      case HTTP_KILL_PIPE:
 1299:       if (host == NULL) return HT_ERROR;
 1300:       HTHost_killPipe(host);
 1301:       return HT_OK;
 1302:       break;
 1303: 
1.71 frystyk 1304:     case HTTP_ERROR:
1.143 frystyk 1305:       HTTPCleanup(request, http->result);
 1306:       return HT_OK;
 1307:       break;
 1308: 
1.141 frystyk 1309:    default:
1.178 frystyk 1310:      HTDEBUGBREAK("Bad http state %d\n" _ http->state);
1.71 frystyk 1311:    }
 1312:   } /* End of while(1) */
 1313: }  
1.88 frystyk 1314: 
1.147 frystyk 1315: PUBLIC void HTTP_setConnectionMode (HTTPConnectionMode mode)
 1316: {
 1317:   ConnectionMode = mode;
 1318: }
 1319: 
 1320: PUBLIC HTTPConnectionMode HTTP_connectionMode (void)
 1321: {
 1322:   return ConnectionMode;
 1323: }
1.21 luotonen 1324: 
1.169 frystyk 1325: PUBLIC BOOL HTTP_setBodyWriteDelay (ms_t first_try, ms_t second_try)
 1326: {
 1327:    if (first_try > 20 && second_try >= first_try) {
 1328:      HTFirstWriteDelay = first_try;
 1329:        HTSecondWriteDelay = second_try;
 1330:        return YES;
 1331:    }
 1332:    return NO;
 1333: }
 1334: 
 1335: PUBLIC void HTTP_bodyWriteDelay (ms_t * first_try, ms_t * second_try)
 1336: {
 1337:    *first_try = HTFirstWriteDelay;
 1338:    *second_try = HTSecondWriteDelay;
1.170 frystyk 1339: }
 1340: 

Webmaster

AltStyle によって変換されたページ (->オリジナル) /