/*************************************************************************** * _ _ ____ _ * Project ___| | | | _ \| | * / __| | | | |_) | | * | (__| |_| | _ <| |___ * \___|\___/|_| \_\_____| * * Copyright (C) 1998 - 2002, Daniel Stenberg, , et al. * * This software is licensed as described in the file COPYING, which * you should have received as part of this distribution. The terms * are also available at http://curl.haxx.se/docs/copyright.html. * * You may opt to use, copy, modify, merge, publish, distribute and/or sell * copies of the Software, and permit persons to whom the Software is * furnished to do so, under the terms of the COPYING file. * * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY * KIND, either express or implied. * * $Id: sendf.c,v 1.1.1.3 2002/11/26 19:07:59 zarzycki Exp $ ***************************************************************************/ #include "setup.h" #include #include #include #include #ifdef HAVE_SYS_TYPES_H #include #endif #ifdef HAVE_SYS_SOCKET_H #include /* required for send() & recv() prototypes */ #endif #ifdef HAVE_UNISTD_H #include #endif #if defined(WIN32) && !defined(__GNUC__) || defined(__MINGW32__) #include #endif #include #include "urldata.h" #include "sendf.h" #define _MPRINTF_REPLACE /* use the internal *printf() functions */ #include #ifdef KRB4 #include "security.h" #endif #include /* The last #include file should be: */ #ifdef MALLOCDEBUG #include "memdebug.h" #endif /* returns last node in linked list */ static struct curl_slist *slist_get_last(struct curl_slist *list) { struct curl_slist *item; /* if caller passed us a NULL, return now */ if (!list) return NULL; /* loop through to find the last item */ item = list; while (item->next) { item = item->next; } return item; } /* append a struct to the linked list. It always retunrs the address of the * first record, so that you can sure this function as an initialization * function as well as an append function. If you find this bothersome, * then simply create a separate _init function and call it appropriately from * within the proram. */ struct curl_slist *curl_slist_append(struct curl_slist *list, const char *data) { struct curl_slist *last; struct curl_slist *new_item; new_item = (struct curl_slist *) malloc(sizeof(struct curl_slist)); if (new_item) { new_item->next = NULL; new_item->data = strdup(data); } if (new_item == NULL || new_item->data == NULL) { fprintf(stderr, "Cannot allocate memory for QUOTE list.\n"); return NULL; } if (list) { last = slist_get_last(list); last->next = new_item; return list; } /* if this is the first item, then new_item *is* the list */ return new_item; } /* be nice and clean up resources */ void curl_slist_free_all(struct curl_slist *list) { struct curl_slist *next; struct curl_slist *item; if (!list) return; item = list; do { next = item->next; if (item->data) { free(item->data); } free(item); item = next; } while (next); } /* Curl_infof() is for info message along the way */ void Curl_infof(struct SessionHandle *data, const char *fmt, ...) { va_list ap; if(data->set.verbose) { char print_buffer[1024 + 1]; va_start(ap, fmt); vsnprintf(print_buffer, 1024, fmt, ap); va_end(ap); Curl_debug(data, CURLINFO_TEXT, print_buffer, strlen(print_buffer)); } } /* Curl_failf() is for messages stating why we failed. * The message SHALL NOT include any LF or CR. */ void Curl_failf(struct SessionHandle *data, const char *fmt, ...) { va_list ap; va_start(ap, fmt); if(data->set.errorbuffer && !data->state.errorbuf) { vsnprintf(data->set.errorbuffer, CURL_ERROR_SIZE, fmt, ap); data->state.errorbuf = TRUE; /* wrote error string */ if(data->set.verbose) Curl_debug(data, CURLINFO_TEXT, data->set.errorbuffer, strlen(data->set.errorbuffer)); } va_end(ap); } /* Curl_sendf() sends formated data to the server */ CURLcode Curl_sendf(int sockfd, struct connectdata *conn, const char *fmt, ...) { struct SessionHandle *data = conn->data; ssize_t bytes_written; ssize_t write_len; CURLcode res; char *s; char *sptr; va_list ap; va_start(ap, fmt); s = vaprintf(fmt, ap); /* returns an allocated string */ va_end(ap); if(!s) return CURLE_OUT_OF_MEMORY; /* failure */ bytes_written=0; write_len = strlen(s); sptr = s; do { /* Write the buffer to the socket */ res = Curl_write(conn, sockfd, sptr, write_len, &bytes_written); if(CURLE_OK != res) break; if(data->set.verbose) Curl_debug(data, CURLINFO_DATA_OUT, sptr, bytes_written); if(bytes_written != write_len) { /* if not all was written at once, we must advance the pointer, decrease the size left and try again! */ write_len -= bytes_written; sptr += bytes_written; } else break; } while(1); free(s); /* free the output string */ return res; } /* * Curl_write() is an internal write function that sends plain (binary) data * to the server. Works with plain sockets, SSL or kerberos. * */ CURLcode Curl_write(struct connectdata *conn, int sockfd, void *mem, size_t len, ssize_t *written) { ssize_t bytes_written; #ifdef USE_SSLEAY /* SSL_write() is said to return 'int' while write() and send() returns 'size_t' */ if (conn->ssl.use) { int err; int rc = SSL_write(conn->ssl.handle, mem, len); if(rc < 0) { err = SSL_get_error(conn->ssl.handle, rc); switch(err) { case SSL_ERROR_WANT_READ: case SSL_ERROR_WANT_WRITE: /* this is basicly the EWOULDBLOCK equivalent */ *written = 0; return CURLE_OK; } /* a true error */ failf(conn->data, "SSL_write() return error %d\n", err); return CURLE_SEND_ERROR; } bytes_written = rc; } else { #endif #ifdef KRB4 if(conn->sec_complete) { bytes_written = Curl_sec_write(conn, sockfd, mem, len); } else #endif /* KRB4 */ { bytes_written = swrite(sockfd, mem, len); } if(-1 == bytes_written) { #ifdef WIN32 if(WSAEWOULDBLOCK == GetLastError()) #else if(EWOULDBLOCK == errno) #endif { /* this is just a case of EWOULDBLOCK */ *written=0; return CURLE_OK; } } #ifdef USE_SSLEAY } #endif *written = bytes_written; return (-1 != bytes_written)?CURLE_OK:CURLE_SEND_ERROR; } /* client_write() sends data to the write callback(s) The bit pattern defines to what "streams" to write to. Body and/or header. The defines are in sendf.h of course. */ CURLcode Curl_client_write(struct SessionHandle *data, int type, char *ptr, size_t len) { size_t wrote; if(0 == len) len = strlen(ptr); if(type & CLIENTWRITE_BODY) { wrote = data->set.fwrite(ptr, 1, len, data->set.out); if(wrote != len) { failf (data, "Failed writing body"); return CURLE_WRITE_ERROR; } } if((type & CLIENTWRITE_HEADER) && (data->set.fwrite_header || data->set.writeheader) ) { /* * Write headers to the same callback or to the especially setup * header callback function (added after version 7.7.1). */ curl_write_callback writeit= data->set.fwrite_header?data->set.fwrite_header:data->set.fwrite; wrote = writeit(ptr, 1, len, data->set.writeheader); if(wrote != len) { failf (data, "Failed writing header"); return CURLE_WRITE_ERROR; } } return CURLE_OK; } /* * Internal read-from-socket function. This is meant to deal with plain * sockets, SSL sockets and kerberos sockets. * * If the read would block (EWOULDBLOCK) we return -1. Otherwise we return * a regular CURLcode value. */ int Curl_read(struct connectdata *conn, int sockfd, char *buf, size_t buffersize, ssize_t *n) { ssize_t nread; #ifdef USE_SSLEAY if (conn->ssl.use) { bool loop=TRUE; int err; do { nread = SSL_read(conn->ssl.handle, buf, buffersize); if(nread >= 0) /* successful read */ break; err = SSL_get_error(conn->ssl.handle, nread); switch(err) { case SSL_ERROR_NONE: /* this is not an error */ case SSL_ERROR_ZERO_RETURN: /* no more data */ loop=0; /* get out of loop */ break; case SSL_ERROR_WANT_READ: case SSL_ERROR_WANT_WRITE: /* if there's data pending, then we re-invoke SSL_read() */ break; default: failf(conn->data, "SSL read error: %d", err); return CURLE_RECV_ERROR; } } while(loop); if(loop && SSL_pending(conn->ssl.handle)) return -1; /* basicly EWOULDBLOCK */ } else { #endif #ifdef KRB4 if(conn->sec_complete) nread = Curl_sec_read(conn, sockfd, buf, buffersize); else #endif nread = sread (sockfd, buf, buffersize); if(-1 == nread) { #ifdef WIN32 if(WSAEWOULDBLOCK == GetLastError()) #else if(EWOULDBLOCK == errno) #endif return -1; } #ifdef USE_SSLEAY } #endif /* USE_SSLEAY */ *n = nread; return CURLE_OK; } /* return 0 on success */ int Curl_debug(struct SessionHandle *data, curl_infotype type, char *ptr, size_t size) { static const char * const s_infotype[CURLINFO_END] = { "* ", "< ", "> ", "{ ", "} " }; if(data->set.fdebug) return (*data->set.fdebug)(data, type, ptr, size, data->set.debugdata); switch(type) { case CURLINFO_TEXT: case CURLINFO_HEADER_OUT: fwrite(s_infotype[type], 2, 1, data->set.err); fwrite(ptr, size, 1, data->set.err); break; default: /* nada */ break; } return 0; } /* * local variables: * eval: (load-file "../curl-mode.el") * end: * vim600: fdm=marker * vim: et sw=2 ts=2 sts=2 tw=78 */