2011-06-08 00:35:42 +08:00
|
|
|
#ifndef HEADER_CURL_URLDATA_H
|
|
|
|
#define HEADER_CURL_URLDATA_H
|
2002-09-03 19:52:59 +08:00
|
|
|
/***************************************************************************
|
2004-05-17 14:50:32 +08:00
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
1999-12-29 22:20:26 +08:00
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2023-01-02 20:51:48 +08:00
|
|
|
* Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
1999-12-29 22:20:26 +08:00
|
|
|
*
|
2002-09-03 19:52:59 +08:00
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
2020-11-04 21:02:01 +08:00
|
|
|
* are also available at https://curl.se/docs/copyright.html.
|
2004-05-17 14:50:32 +08:00
|
|
|
*
|
2001-01-03 17:29:33 +08:00
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
2002-09-03 19:52:59 +08:00
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
1999-12-29 22:20:26 +08:00
|
|
|
*
|
2001-01-03 17:29:33 +08:00
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
1999-12-29 22:20:26 +08:00
|
|
|
*
|
2016-06-21 21:47:12 +08:00
|
|
|
* SPDX-License-Identifier: curl
|
2022-05-17 17:16:50 +08:00
|
|
|
*
|
2002-09-03 19:52:59 +08:00
|
|
|
***************************************************************************/
|
1999-12-29 22:20:26 +08:00
|
|
|
|
|
|
|
/* This file is for lib internal stuff */
|
|
|
|
|
2013-01-07 02:06:49 +08:00
|
|
|
#include "curl_setup.h"
|
1999-12-29 22:20:26 +08:00
|
|
|
|
|
|
|
#define PORT_FTP 21
|
2004-01-12 06:56:36 +08:00
|
|
|
#define PORT_FTPS 990
|
1999-12-29 22:20:26 +08:00
|
|
|
#define PORT_TELNET 23
|
|
|
|
#define PORT_HTTP 80
|
|
|
|
#define PORT_HTTPS 443
|
|
|
|
#define PORT_DICT 2628
|
|
|
|
#define PORT_LDAP 389
|
2007-08-16 00:17:32 +08:00
|
|
|
#define PORT_LDAPS 636
|
2005-09-02 23:11:08 +08:00
|
|
|
#define PORT_TFTP 69
|
2006-11-03 05:56:40 +08:00
|
|
|
#define PORT_SSH 22
|
2009-12-13 05:54:01 +08:00
|
|
|
#define PORT_IMAP 143
|
|
|
|
#define PORT_IMAPS 993
|
|
|
|
#define PORT_POP3 110
|
|
|
|
#define PORT_POP3S 995
|
2014-11-30 03:19:23 +08:00
|
|
|
#define PORT_SMB 445
|
|
|
|
#define PORT_SMBS 445
|
2009-12-13 05:54:01 +08:00
|
|
|
#define PORT_SMTP 25
|
|
|
|
#define PORT_SMTPS 465 /* sometimes called SSMTP */
|
2010-01-21 21:58:30 +08:00
|
|
|
#define PORT_RTSP 554
|
2010-05-13 05:07:20 +08:00
|
|
|
#define PORT_RTMP 1935
|
|
|
|
#define PORT_RTMPT PORT_HTTP
|
|
|
|
#define PORT_RTMPS PORT_HTTPS
|
2010-08-12 22:55:48 +08:00
|
|
|
#define PORT_GOPHER 70
|
2020-04-14 17:19:12 +08:00
|
|
|
#define PORT_MQTT 1883
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2023-11-27 18:30:25 +08:00
|
|
|
struct curl_trc_featt;
|
|
|
|
|
2024-04-04 21:23:35 +08:00
|
|
|
#ifdef USE_ECH
|
|
|
|
/* CURLECH_ bits for the tls_ech option */
|
|
|
|
# define CURLECH_DISABLE (1<<0)
|
|
|
|
# define CURLECH_GREASE (1<<1)
|
|
|
|
# define CURLECH_ENABLE (1<<2)
|
|
|
|
# define CURLECH_HARD (1<<3)
|
|
|
|
# define CURLECH_CLA_CFG (1<<4)
|
|
|
|
#endif
|
|
|
|
|
2022-09-09 21:11:14 +08:00
|
|
|
#ifdef USE_WEBSOCKETS
|
2022-09-12 15:57:01 +08:00
|
|
|
/* CURLPROTO_GOPHERS (29) is the highest publicly used protocol bit number,
|
|
|
|
* the rest are internal information. If we use higher bits we only do this on
|
|
|
|
* platforms that have a >= 64 bit type and then we use such a type for the
|
|
|
|
* protocol fields in the protocol handler.
|
|
|
|
*/
|
2022-09-09 21:11:14 +08:00
|
|
|
#define CURLPROTO_WS (1<<30)
|
2022-09-22 21:27:04 +08:00
|
|
|
#define CURLPROTO_WSS ((curl_prot_t)1<<31)
|
2022-09-09 21:11:14 +08:00
|
|
|
#else
|
|
|
|
#define CURLPROTO_WS 0
|
|
|
|
#define CURLPROTO_WSS 0
|
2022-09-22 21:27:04 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/* This should be undefined once we need bit 32 or higher */
|
|
|
|
#define PROTO_TYPE_SMALL
|
|
|
|
|
|
|
|
#ifndef PROTO_TYPE_SMALL
|
|
|
|
typedef curl_off_t curl_prot_t;
|
|
|
|
#else
|
2022-09-12 15:57:01 +08:00
|
|
|
typedef unsigned int curl_prot_t;
|
2022-09-09 21:11:14 +08:00
|
|
|
#endif
|
|
|
|
|
2022-09-12 15:57:01 +08:00
|
|
|
/* This mask is for all the old protocols that are provided and defined in the
|
|
|
|
public header and shall exclude protocols added since which are not exposed
|
|
|
|
in the API */
|
|
|
|
#define CURLPROTO_MASK (0x3ffffff)
|
|
|
|
|
1999-12-29 22:20:26 +08:00
|
|
|
#define DICT_MATCH "/MATCH:"
|
|
|
|
#define DICT_MATCH2 "/M:"
|
|
|
|
#define DICT_MATCH3 "/FIND:"
|
|
|
|
#define DICT_DEFINE "/DEFINE:"
|
|
|
|
#define DICT_DEFINE2 "/D:"
|
|
|
|
#define DICT_DEFINE3 "/LOOKUP:"
|
|
|
|
|
|
|
|
#define CURL_DEFAULT_USER "anonymous"
|
2007-02-14 06:50:16 +08:00
|
|
|
#define CURL_DEFAULT_PASSWORD "ftp@example.com"
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2014-04-21 01:37:54 +08:00
|
|
|
/* Convenience defines for checking protocols or their SSL based version. Each
|
|
|
|
protocol handler should only ever have a single CURLPROTO_ in its protocol
|
|
|
|
field. */
|
2022-09-09 21:11:14 +08:00
|
|
|
#define PROTO_FAMILY_HTTP (CURLPROTO_HTTP|CURLPROTO_HTTPS|CURLPROTO_WS| \
|
|
|
|
CURLPROTO_WSS)
|
2014-04-21 01:37:54 +08:00
|
|
|
#define PROTO_FAMILY_FTP (CURLPROTO_FTP|CURLPROTO_FTPS)
|
|
|
|
#define PROTO_FAMILY_POP3 (CURLPROTO_POP3|CURLPROTO_POP3S)
|
2014-11-30 03:19:23 +08:00
|
|
|
#define PROTO_FAMILY_SMB (CURLPROTO_SMB|CURLPROTO_SMBS)
|
2014-04-21 01:37:54 +08:00
|
|
|
#define PROTO_FAMILY_SMTP (CURLPROTO_SMTP|CURLPROTO_SMTPS)
|
2019-04-13 06:57:53 +08:00
|
|
|
#define PROTO_FAMILY_SSH (CURLPROTO_SCP|CURLPROTO_SFTP)
|
2014-04-21 01:37:54 +08:00
|
|
|
|
2023-08-17 20:18:06 +08:00
|
|
|
#if !defined(CURL_DISABLE_FTP) || defined(USE_SSH) || \
|
2024-03-16 19:39:01 +08:00
|
|
|
!defined(CURL_DISABLE_POP3) || !defined(CURL_DISABLE_FILE)
|
2023-08-17 20:18:06 +08:00
|
|
|
/* these protocols support CURLOPT_DIRLISTONLY */
|
|
|
|
#define CURL_LIST_ONLY_PROTOCOL 1
|
|
|
|
#endif
|
|
|
|
|
2013-04-05 15:20:04 +08:00
|
|
|
#define DEFAULT_CONNCACHE_SIZE 5
|
|
|
|
|
2008-11-03 22:58:08 +08:00
|
|
|
/* length of longest IPv6 address string including the trailing null */
|
|
|
|
#define MAX_IPADR_LEN sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255")
|
2008-06-07 01:33:35 +08:00
|
|
|
|
2020-09-21 20:28:40 +08:00
|
|
|
/* Default FTP/IMAP etc response timeout in milliseconds */
|
2018-12-14 16:26:17 +08:00
|
|
|
#define RESP_TIMEOUT (120*1000)
|
2009-12-13 05:54:01 +08:00
|
|
|
|
2020-05-26 03:44:04 +08:00
|
|
|
/* Max string input length is a precaution against abuse and to detect junk
|
2019-04-29 14:00:49 +08:00
|
|
|
input easier and better. */
|
|
|
|
#define CURL_MAX_INPUT_LENGTH 8000000
|
|
|
|
|
2022-11-22 16:55:41 +08:00
|
|
|
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "cookie.h"
|
2018-05-29 02:29:15 +08:00
|
|
|
#include "psl.h"
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "formdata.h"
|
2004-05-17 14:50:32 +08:00
|
|
|
|
2000-06-14 07:04:44 +08:00
|
|
|
#ifdef HAVE_NETINET_IN_H
|
2000-05-22 22:12:12 +08:00
|
|
|
#include <netinet/in.h>
|
2000-06-14 07:04:44 +08:00
|
|
|
#endif
|
2017-12-06 00:41:27 +08:00
|
|
|
#ifdef HAVE_NETINET_IN6_H
|
|
|
|
#include <netinet/in6.h>
|
|
|
|
#endif
|
2000-05-22 22:12:12 +08:00
|
|
|
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "timeval.h"
|
1999-12-29 22:20:26 +08:00
|
|
|
|
2000-06-08 23:11:39 +08:00
|
|
|
#include <curl/curl.h>
|
2000-05-22 22:12:12 +08:00
|
|
|
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "http_chunks.h" /* for the structs and enum stuff */
|
|
|
|
#include "hostip.h"
|
|
|
|
#include "hash.h"
|
|
|
|
#include "splay.h"
|
2020-05-02 23:04:08 +08:00
|
|
|
#include "dynbuf.h"
|
2023-04-06 15:54:57 +08:00
|
|
|
#include "dynhds.h"
|
2024-02-14 19:09:32 +08:00
|
|
|
#include "request.h"
|
2013-01-04 09:50:28 +08:00
|
|
|
|
2018-05-14 15:38:56 +08:00
|
|
|
/* return the count of bytes sent, or -1 on error */
|
2021-01-09 00:58:15 +08:00
|
|
|
typedef ssize_t (Curl_send)(struct Curl_easy *data, /* transfer */
|
2018-05-14 15:38:56 +08:00
|
|
|
int sockindex, /* socketindex */
|
|
|
|
const void *buf, /* data to write */
|
|
|
|
size_t len, /* max amount to write */
|
|
|
|
CURLcode *err); /* error to return */
|
|
|
|
|
|
|
|
/* return the count of bytes read, or -1 on error */
|
2021-01-09 00:58:15 +08:00
|
|
|
typedef ssize_t (Curl_recv)(struct Curl_easy *data, /* transfer */
|
2018-05-14 15:38:56 +08:00
|
|
|
int sockindex, /* socketindex */
|
|
|
|
char *buf, /* store data here */
|
|
|
|
size_t len, /* max amount to read */
|
|
|
|
CURLcode *err); /* error to return */
|
|
|
|
|
2020-12-14 21:10:33 +08:00
|
|
|
#ifdef USE_HYPER
|
|
|
|
typedef CURLcode (*Curl_datastream)(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn,
|
|
|
|
int *didwhat,
|
|
|
|
int select_res);
|
|
|
|
#endif
|
|
|
|
|
2017-09-03 00:47:10 +08:00
|
|
|
#include "mime.h"
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "imap.h"
|
|
|
|
#include "pop3.h"
|
|
|
|
#include "smtp.h"
|
|
|
|
#include "ftp.h"
|
|
|
|
#include "file.h"
|
2019-11-18 04:04:37 +08:00
|
|
|
#include "vssh/ssh.h"
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "http.h"
|
|
|
|
#include "rtsp.h"
|
2014-12-01 00:09:41 +08:00
|
|
|
#include "smb.h"
|
2020-04-14 17:19:12 +08:00
|
|
|
#include "mqtt.h"
|
2023-02-28 16:22:46 +08:00
|
|
|
#include "ftplistparser.h"
|
2013-08-02 06:09:59 +08:00
|
|
|
#include "multihandle.h"
|
2020-12-14 21:10:33 +08:00
|
|
|
#include "c-hyper.h"
|
2023-01-07 03:00:59 +08:00
|
|
|
#include "cf-socket.h"
|
2009-12-13 05:54:01 +08:00
|
|
|
|
2003-09-19 20:56:22 +08:00
|
|
|
#ifdef HAVE_GSSAPI
|
2005-08-29 16:42:45 +08:00
|
|
|
# ifdef HAVE_GSSGNU
|
|
|
|
# include <gss.h>
|
2019-02-13 20:48:18 +08:00
|
|
|
# elif defined HAVE_GSSAPI_GSSAPI_H
|
2005-08-29 16:42:45 +08:00
|
|
|
# include <gssapi/gssapi.h>
|
|
|
|
# else
|
|
|
|
# include <gssapi.h>
|
|
|
|
# endif
|
2019-02-13 20:48:18 +08:00
|
|
|
# ifdef HAVE_GSSAPI_GSSAPI_GENERIC_H
|
|
|
|
# include <gssapi/gssapi_generic.h>
|
|
|
|
# endif
|
2003-09-19 20:56:22 +08:00
|
|
|
#endif
|
2003-06-10 20:22:19 +08:00
|
|
|
|
tidy-up: delete parallel/unused feature flags
Detecting headers and lib separately makes sense when headers come in
variations or with extra ones, but this wasn't the case here. These were
duplicate/parallel macros that we had to keep in sync with each other
for a working build. This patch leaves a single macro for each of these
dependencies:
- Rely on `HAVE_LIBZ`, delete parallel `HAVE_ZLIB_H`.
Also delete CMake logic making sure these two were in sync, along with
a toggle to turn off that logic, called `CURL_SPECIAL_LIBZ`.
Also delete stray `HAVE_ZLIB` defines.
There is also a `USE_ZLIB` variant in `lib/config-dos.h`. This patch
retains it for compatibility and deprecates it.
- Rely on `USE_LIBSSH2`, delete parallel `HAVE_LIBSSH2_H`.
Also delete `LIBSSH2_WIN32`, `LIBSSH2_LIBRARY` from
`winbuild/MakefileBuild.vc`, these have a role when building libssh2
itself. And `CURL_USE_LIBSSH`, which had no use at all.
Also delete stray `HAVE_LIBSSH2` defines.
- Rely on `USE_LIBSSH`, delete parallel `HAVE_LIBSSH_LIBSSH_H`.
Also delete `LIBSSH_WIN32`, `LIBSSH_LIBRARY` and `HAVE_LIBSSH` from
`winbuild/MakefileBuild.vc`, these were the result of copy-pasting the
libssh2 line, and were not having any use.
- Delete unused `HAVE_LIBPSL_H` and `HAVE_LIBPSL`.
Reviewed-by: Daniel Stenberg
Closes #9652
2022-10-06 23:30:13 +08:00
|
|
|
#ifdef USE_LIBSSH2
|
2006-11-03 05:56:40 +08:00
|
|
|
#include <libssh2.h>
|
|
|
|
#include <libssh2_sftp.h>
|
tidy-up: delete parallel/unused feature flags
Detecting headers and lib separately makes sense when headers come in
variations or with extra ones, but this wasn't the case here. These were
duplicate/parallel macros that we had to keep in sync with each other
for a working build. This patch leaves a single macro for each of these
dependencies:
- Rely on `HAVE_LIBZ`, delete parallel `HAVE_ZLIB_H`.
Also delete CMake logic making sure these two were in sync, along with
a toggle to turn off that logic, called `CURL_SPECIAL_LIBZ`.
Also delete stray `HAVE_ZLIB` defines.
There is also a `USE_ZLIB` variant in `lib/config-dos.h`. This patch
retains it for compatibility and deprecates it.
- Rely on `USE_LIBSSH2`, delete parallel `HAVE_LIBSSH2_H`.
Also delete `LIBSSH2_WIN32`, `LIBSSH2_LIBRARY` from
`winbuild/MakefileBuild.vc`, these have a role when building libssh2
itself. And `CURL_USE_LIBSSH`, which had no use at all.
Also delete stray `HAVE_LIBSSH2` defines.
- Rely on `USE_LIBSSH`, delete parallel `HAVE_LIBSSH_LIBSSH_H`.
Also delete `LIBSSH_WIN32`, `LIBSSH_LIBRARY` and `HAVE_LIBSSH` from
`winbuild/MakefileBuild.vc`, these were the result of copy-pasting the
libssh2 line, and were not having any use.
- Delete unused `HAVE_LIBPSL_H` and `HAVE_LIBPSL`.
Reviewed-by: Daniel Stenberg
Closes #9652
2022-10-06 23:30:13 +08:00
|
|
|
#endif /* USE_LIBSSH2 */
|
2006-11-03 05:56:40 +08:00
|
|
|
|
2021-01-19 22:30:59 +08:00
|
|
|
#define READBUFFER_SIZE CURL_MAX_WRITE_SIZE
|
|
|
|
#define READBUFFER_MAX CURL_MAX_READ_SIZE
|
|
|
|
#define READBUFFER_MIN 1024
|
|
|
|
|
|
|
|
/* The default upload buffer size, should not be smaller than
|
|
|
|
CURL_MAX_WRITE_SIZE, as it needs to hold a full buffer as could be sent in
|
|
|
|
a write callback.
|
|
|
|
|
|
|
|
The size was 16KB for many years but was bumped to 64KB because it makes
|
|
|
|
libcurl able to do significantly faster uploads in some circumstances. Even
|
|
|
|
larger buffers can help further, but this is deemed a fair memory/speed
|
|
|
|
compromise. */
|
|
|
|
#define UPLOADBUFFER_DEFAULT 65536
|
|
|
|
#define UPLOADBUFFER_MAX (2*1024*1024)
|
|
|
|
#define UPLOADBUFFER_MIN CURL_MAX_WRITE_SIZE
|
|
|
|
|
2007-08-26 13:53:26 +08:00
|
|
|
#define CURLEASY_MAGIC_NUMBER 0xc0dedbadU
|
2023-03-22 17:25:24 +08:00
|
|
|
#ifdef DEBUGBUILD
|
|
|
|
/* On a debug build, we want to fail hard on easy handles that
|
|
|
|
* are not NULL, but no longer have the MAGIC touch. This gives
|
|
|
|
* us early warning on things only discovered by valgrind otherwise. */
|
|
|
|
#define GOOD_EASY_HANDLE(x) \
|
|
|
|
(((x) && ((x)->magic == CURLEASY_MAGIC_NUMBER))? TRUE: \
|
|
|
|
(DEBUGASSERT(!(x)), FALSE))
|
|
|
|
#else
|
2015-06-01 17:45:52 +08:00
|
|
|
#define GOOD_EASY_HANDLE(x) \
|
2016-06-21 21:47:12 +08:00
|
|
|
((x) && ((x)->magic == CURLEASY_MAGIC_NUMBER))
|
2023-03-22 17:25:24 +08:00
|
|
|
#endif
|
2006-09-11 06:15:32 +08:00
|
|
|
|
2013-08-23 22:16:42 +08:00
|
|
|
#ifdef HAVE_GSSAPI
|
|
|
|
/* Types needed for krb5-ftp connections */
|
|
|
|
struct krb5buffer {
|
2024-05-08 21:20:23 +08:00
|
|
|
struct dynbuf buf;
|
2000-09-21 16:50:48 +08:00
|
|
|
size_t index;
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(eof_flag);
|
2000-09-21 16:50:48 +08:00
|
|
|
};
|
2010-11-14 06:42:34 +08:00
|
|
|
|
2004-05-17 14:50:32 +08:00
|
|
|
enum protection_level {
|
2010-11-14 06:42:34 +08:00
|
|
|
PROT_NONE, /* first in list */
|
|
|
|
PROT_CLEAR,
|
|
|
|
PROT_SAFE,
|
|
|
|
PROT_CONFIDENTIAL,
|
|
|
|
PROT_PRIVATE,
|
|
|
|
PROT_CMD,
|
|
|
|
PROT_LAST /* last in list */
|
2000-09-21 16:50:48 +08:00
|
|
|
};
|
|
|
|
#endif
|
2000-05-22 22:12:12 +08:00
|
|
|
|
2006-03-22 05:54:44 +08:00
|
|
|
/* enum for the nonblocking SSL connection state machine */
|
|
|
|
typedef enum {
|
|
|
|
ssl_connect_1,
|
|
|
|
ssl_connect_2,
|
|
|
|
ssl_connect_2_reading,
|
|
|
|
ssl_connect_2_writing,
|
2012-06-27 03:39:48 +08:00
|
|
|
ssl_connect_3,
|
|
|
|
ssl_connect_done
|
2006-03-22 05:54:44 +08:00
|
|
|
} ssl_connect_state;
|
|
|
|
|
2008-02-20 17:56:26 +08:00
|
|
|
typedef enum {
|
|
|
|
ssl_connection_none,
|
|
|
|
ssl_connection_negotiating,
|
|
|
|
ssl_connection_complete
|
|
|
|
} ssl_connection_state;
|
|
|
|
|
vtls: encapsulate SSL backend-specific data
So far, all of the SSL backends' private data has been declared as
part of the ssl_connect_data struct, in one big #if .. #elif .. #endif
block.
This can only work as long as the SSL backend is a compile-time option,
something we want to change in the next commits.
Therefore, let's encapsulate the exact data needed by each SSL backend
into a private struct, and let's avoid bleeding any SSL backend-specific
information into urldata.h. This is also necessary to allow multiple SSL
backends to be compiled in at the same time, as e.g. OpenSSL's and
CyaSSL's headers cannot be included in the same .c file.
To avoid too many malloc() calls, we simply append the private structs
to the connectdata struct in allocate_conn().
This requires us to take extra care of alignment issues: struct fields
often need to be aligned on certain boundaries e.g. 32-bit values need to
be stored at addresses that divide evenly by 4 (= 32 bit / 8
bit-per-byte).
We do that by assuming that no SSL backend's private data contains any
fields that need to be aligned on boundaries larger than `long long`
(typically 64-bit) would need. Under this assumption, we simply add a
dummy field of type `long long` to the `struct connectdata` struct. This
field will never be accessed but acts as a placeholder for the four
instances of ssl_backend_data instead. the size of each ssl_backend_data
struct is stored in the SSL backend-specific metadata, to allow
allocate_conn() to know how much extra space to allocate, and how to
initialize the ssl[sockindex]->backend and proxy_ssl[sockindex]->backend
pointers.
This would appear to be a little complicated at first, but is really
necessary to encapsulate the private data of each SSL backend correctly.
And we need to encapsulate thusly if we ever want to allow selecting
CyaSSL and OpenSSL at runtime, as their headers cannot be included within
the same .c file (there are just too many conflicting definitions and
declarations for that).
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
2017-07-29 04:09:35 +08:00
|
|
|
/* SSL backend-specific data; declared differently by each SSL backend */
|
|
|
|
struct ssl_backend_data;
|
|
|
|
|
2024-02-13 18:05:21 +08:00
|
|
|
typedef enum {
|
|
|
|
CURL_SSL_PEER_DNS,
|
|
|
|
CURL_SSL_PEER_IPV4,
|
|
|
|
CURL_SSL_PEER_IPV6
|
|
|
|
} ssl_peer_type;
|
|
|
|
|
2023-11-17 22:26:08 +08:00
|
|
|
struct ssl_peer {
|
|
|
|
char *hostname; /* hostname for verification */
|
|
|
|
char *dispname; /* display version of hostname */
|
|
|
|
char *sni; /* SNI version of hostname or NULL if not usable */
|
2024-02-13 18:05:21 +08:00
|
|
|
ssl_peer_type type; /* type of the peer information */
|
2024-03-22 20:07:25 +08:00
|
|
|
int port; /* port we are talking to */
|
|
|
|
int transport; /* TCP or QUIC */
|
2023-11-17 22:26:08 +08:00
|
|
|
};
|
|
|
|
|
2016-11-17 01:49:15 +08:00
|
|
|
struct ssl_primary_config {
|
2007-08-02 05:20:01 +08:00
|
|
|
char *CApath; /* certificate dir (doesn't work on windows) */
|
2009-01-13 14:44:03 +08:00
|
|
|
char *CAfile; /* certificate to verify peer against */
|
2021-06-19 06:42:28 +08:00
|
|
|
char *issuercert; /* optional issuer certificate filename */
|
2016-07-01 19:32:31 +08:00
|
|
|
char *clientcert;
|
2001-09-12 06:21:26 +08:00
|
|
|
char *cipher_list; /* list of ciphers to use */
|
2018-05-29 22:12:52 +08:00
|
|
|
char *cipher_list13; /* list of TLS 1.3 cipher suites to use */
|
2019-09-13 22:38:58 +08:00
|
|
|
char *pinned_key;
|
2022-05-10 05:13:53 +08:00
|
|
|
char *CRLfile; /* CRL to check certificate revocation */
|
2020-06-27 05:26:01 +08:00
|
|
|
struct curl_blob *cert_blob;
|
2020-07-13 09:17:56 +08:00
|
|
|
struct curl_blob *ca_info_blob;
|
2021-06-19 06:42:28 +08:00
|
|
|
struct curl_blob *issuercert_blob;
|
2022-05-10 05:13:53 +08:00
|
|
|
#ifdef USE_TLS_SRP
|
|
|
|
char *username; /* TLS username (for, e.g., SRP) */
|
|
|
|
char *password; /* TLS password (for, e.g., SRP) */
|
|
|
|
#endif
|
2020-08-29 20:09:24 +08:00
|
|
|
char *curves; /* list of curves to use */
|
2022-05-10 05:13:53 +08:00
|
|
|
unsigned char ssl_options; /* the CURLOPT_SSL_OPTIONS bitmask */
|
2023-01-01 18:26:22 +08:00
|
|
|
unsigned int version_max; /* max supported version the client wants to use */
|
|
|
|
unsigned char version; /* what version the client wants to use */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(verifypeer); /* set TRUE if this is desired */
|
|
|
|
BIT(verifyhost); /* set TRUE if CN/SAN must match hostname */
|
|
|
|
BIT(verifystatus); /* set TRUE if certificate status must be checked */
|
|
|
|
BIT(sessionid); /* cache session IDs or not */
|
2016-11-17 01:49:15 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
struct ssl_config_data {
|
|
|
|
struct ssl_primary_config primary;
|
|
|
|
long certverifyresult; /* result from the certificate verification */
|
2006-09-12 01:18:18 +08:00
|
|
|
curl_ssl_ctx_callback fsslctx; /* function to initialize ssl ctx */
|
|
|
|
void *fsslctxp; /* parameter for call back */
|
2016-11-17 01:49:15 +08:00
|
|
|
char *cert_type; /* format for certificate (default: PEM)*/
|
|
|
|
char *key; /* private key file name */
|
2020-05-15 16:47:46 +08:00
|
|
|
struct curl_blob *key_blob;
|
2016-11-17 01:49:15 +08:00
|
|
|
char *key_type; /* format for private key (default: PEM) */
|
|
|
|
char *key_passwd; /* plain text private key password */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(certinfo); /* gather lots of certificate info */
|
|
|
|
BIT(falsestart);
|
2022-10-31 00:38:16 +08:00
|
|
|
BIT(enable_beast); /* allow this flaw for interoperability's sake */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(no_revoke); /* disable SSL certificate revocation checks */
|
2019-12-02 17:55:33 +08:00
|
|
|
BIT(no_partialchain); /* don't accept partial certificate chains */
|
schannel: add "best effort" revocation check option
- Implement new option CURLSSLOPT_REVOKE_BEST_EFFORT and
--ssl-revoke-best-effort to allow a "best effort" revocation check.
A best effort revocation check ignores errors that the revocation check
was unable to take place. The reasoning is described in detail below and
discussed further in the PR.
---
When running e.g. with Fiddler, the schannel backend fails with an
unhelpful error message:
Unknown error (0x80092012) - The revocation function was unable
to check revocation for the certificate.
Sadly, many enterprise users who are stuck behind MITM proxies suffer
the very same problem.
This has been discussed in plenty of issues:
https://github.com/curl/curl/issues/3727,
https://github.com/curl/curl/issues/264, for example.
In the latter, a Microsoft Edge developer even made the case that the
common behavior is to ignore issues when a certificate has no recorded
distribution point for revocation lists, or when the server is offline.
This is also known as "best effort" strategy and addresses the Fiddler
issue.
Unfortunately, this strategy was not chosen as the default for schannel
(and is therefore a backend-specific behavior: OpenSSL seems to happily
ignore the offline servers and missing distribution points).
To maintain backward-compatibility, we therefore add a new flag
(`CURLSSLOPT_REVOKE_BEST_EFFORT`) and a new option
(`--ssl-revoke-best-effort`) to select the new behavior.
Due to the many related issues Git for Windows and GitHub Desktop, the
plan is to make this behavior the default in these software packages.
The test 2070 was added to verify this behavior, adapted from 310.
Based-on-work-by: georgeok <giorgos.n.oikonomou@gmail.com>
Co-authored-by: Markus Olsson <j.markus.olsson@gmail.com>
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
Closes https://github.com/curl/curl/pull/4981
2020-02-26 18:24:26 +08:00
|
|
|
BIT(revoke_best_effort); /* ignore SSL revocation offline/missing revocation
|
|
|
|
list errors */
|
2019-09-13 17:24:00 +08:00
|
|
|
BIT(native_ca_store); /* use the native ca store of operating system */
|
2021-02-28 05:27:31 +08:00
|
|
|
BIT(auto_client_cert); /* automatically locate and use a client
|
|
|
|
certificate for authentication (Schannel) */
|
2001-02-21 01:35:51 +08:00
|
|
|
};
|
|
|
|
|
2016-11-17 01:49:15 +08:00
|
|
|
struct ssl_general_config {
|
|
|
|
size_t max_ssl_sessions; /* SSL session id cache size */
|
2022-10-12 19:12:08 +08:00
|
|
|
int ca_cache_timeout; /* Certificate store cache timeout (seconds) */
|
2016-11-17 01:49:15 +08:00
|
|
|
};
|
|
|
|
|
2024-04-26 16:11:51 +08:00
|
|
|
typedef void Curl_ssl_sessionid_dtor(void *sessionid, size_t idsize);
|
|
|
|
|
2003-03-31 13:13:26 +08:00
|
|
|
/* information stored about one single SSL session */
|
2020-09-02 18:17:49 +08:00
|
|
|
struct Curl_ssl_session {
|
2003-03-31 13:13:26 +08:00
|
|
|
char *name; /* host name for which this ID was used */
|
2016-01-25 21:37:24 +08:00
|
|
|
char *conn_to_host; /* host name for the connection (may be NULL) */
|
2016-10-10 22:47:54 +08:00
|
|
|
const char *scheme; /* protocol scheme used */
|
2003-03-31 13:13:26 +08:00
|
|
|
void *sessionid; /* as returned from the SSL layer */
|
2005-04-07 23:27:13 +08:00
|
|
|
size_t idsize; /* if known, otherwise 0 */
|
2024-04-26 16:11:51 +08:00
|
|
|
Curl_ssl_sessionid_dtor *sessionid_free; /* free `sessionid` callback */
|
2003-03-31 13:13:26 +08:00
|
|
|
long age; /* just a number, the higher the more recent */
|
2016-01-25 21:37:24 +08:00
|
|
|
int remote_port; /* remote port */
|
|
|
|
int conn_to_port; /* remote port for the connection (may be -1) */
|
2024-03-22 20:07:25 +08:00
|
|
|
int transport; /* TCP or QUIC */
|
2016-11-17 01:49:15 +08:00
|
|
|
struct ssl_primary_config ssl_config; /* setup for this session */
|
2003-03-31 13:13:26 +08:00
|
|
|
};
|
|
|
|
|
2017-07-31 05:19:19 +08:00
|
|
|
#ifdef USE_WINDOWS_SSPI
|
|
|
|
#include "curl_sspi.h"
|
|
|
|
#endif
|
|
|
|
|
2023-07-20 22:09:04 +08:00
|
|
|
#ifndef CURL_DISABLE_DIGEST_AUTH
|
2003-05-23 00:09:54 +08:00
|
|
|
/* Struct used for Digest challenge-response authentication */
|
|
|
|
struct digestdata {
|
2014-11-06 18:23:08 +08:00
|
|
|
#if defined(USE_WINDOWS_SSPI)
|
|
|
|
BYTE *input_token;
|
2014-11-06 23:05:36 +08:00
|
|
|
size_t input_token_len;
|
2017-02-07 01:40:51 +08:00
|
|
|
CtxtHandle *http_context;
|
2017-08-09 07:32:19 +08:00
|
|
|
/* copy of user/passwd used to make the identity for http_context.
|
|
|
|
either may be NULL. */
|
|
|
|
char *user;
|
|
|
|
char *passwd;
|
2014-11-06 18:23:08 +08:00
|
|
|
#else
|
2003-05-23 00:09:54 +08:00
|
|
|
char *nonce;
|
|
|
|
char *cnonce;
|
|
|
|
char *realm;
|
2004-04-29 16:18:32 +08:00
|
|
|
char *opaque;
|
|
|
|
char *qop;
|
|
|
|
char *algorithm;
|
2021-10-23 02:59:11 +08:00
|
|
|
int nc; /* nonce count */
|
2022-07-04 14:27:21 +08:00
|
|
|
unsigned char algo;
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(stale); /* set true for re-negotiation */
|
|
|
|
BIT(userhash);
|
2014-11-06 18:23:08 +08:00
|
|
|
#endif
|
2003-05-23 00:09:54 +08:00
|
|
|
};
|
2023-07-20 22:09:04 +08:00
|
|
|
#endif
|
2003-03-31 13:13:26 +08:00
|
|
|
|
2003-06-11 21:38:55 +08:00
|
|
|
typedef enum {
|
|
|
|
NTLMSTATE_NONE,
|
|
|
|
NTLMSTATE_TYPE1,
|
|
|
|
NTLMSTATE_TYPE2,
|
|
|
|
NTLMSTATE_TYPE3,
|
|
|
|
NTLMSTATE_LAST
|
|
|
|
} curlntlm;
|
|
|
|
|
2019-05-14 03:29:40 +08:00
|
|
|
typedef enum {
|
|
|
|
GSS_AUTHNONE,
|
|
|
|
GSS_AUTHRECV,
|
|
|
|
GSS_AUTHSENT,
|
|
|
|
GSS_AUTHDONE,
|
|
|
|
GSS_AUTHSUCC
|
|
|
|
} curlnegotiate;
|
|
|
|
|
2014-08-10 20:58:44 +08:00
|
|
|
/* Struct used for GSSAPI (Kerberos V5) authentication */
|
2014-11-16 17:50:06 +08:00
|
|
|
#if defined(USE_KERBEROS5)
|
2014-08-10 20:58:44 +08:00
|
|
|
struct kerberos5data {
|
2014-12-03 14:59:41 +08:00
|
|
|
#if defined(USE_WINDOWS_SSPI)
|
2014-08-10 20:58:44 +08:00
|
|
|
CredHandle *credentials;
|
|
|
|
CtxtHandle *context;
|
|
|
|
TCHAR *spn;
|
|
|
|
SEC_WINNT_AUTH_IDENTITY identity;
|
|
|
|
SEC_WINNT_AUTH_IDENTITY *p_identity;
|
|
|
|
size_t token_max;
|
|
|
|
BYTE *output_token;
|
2014-12-03 14:59:41 +08:00
|
|
|
#else
|
|
|
|
gss_ctx_id_t context;
|
|
|
|
gss_name_t spn;
|
|
|
|
#endif
|
2014-08-10 20:58:44 +08:00
|
|
|
};
|
2014-08-14 19:06:42 +08:00
|
|
|
#endif
|
2014-08-10 20:58:44 +08:00
|
|
|
|
2020-12-25 02:48:45 +08:00
|
|
|
/* Struct used for SCRAM-SHA-1 authentication */
|
|
|
|
#ifdef USE_GSASL
|
|
|
|
#include <gsasl.h>
|
|
|
|
struct gsasldata {
|
|
|
|
Gsasl *ctx;
|
|
|
|
Gsasl_session *client;
|
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2003-11-24 15:08:07 +08:00
|
|
|
/* Struct used for NTLM challenge-response authentication */
|
2014-10-26 05:32:46 +08:00
|
|
|
#if defined(USE_NTLM)
|
2003-06-11 21:38:55 +08:00
|
|
|
struct ntlmdata {
|
2005-03-11 07:15:29 +08:00
|
|
|
#ifdef USE_WINDOWS_SSPI
|
2018-11-28 01:39:45 +08:00
|
|
|
/* The sslContext is used for the Schannel bindings. The
|
|
|
|
* api is available on the Windows 7 SDK and later.
|
|
|
|
*/
|
|
|
|
#ifdef SECPKG_ATTR_ENDPOINT_BINDINGS
|
|
|
|
CtxtHandle *sslContext;
|
|
|
|
#endif
|
2014-10-25 21:23:40 +08:00
|
|
|
CredHandle *credentials;
|
|
|
|
CtxtHandle *context;
|
2005-03-11 07:15:29 +08:00
|
|
|
SEC_WINNT_AUTH_IDENTITY identity;
|
|
|
|
SEC_WINNT_AUTH_IDENTITY *p_identity;
|
2014-10-26 22:36:05 +08:00
|
|
|
size_t token_max;
|
2014-08-08 14:23:38 +08:00
|
|
|
BYTE *output_token;
|
2014-10-25 21:12:41 +08:00
|
|
|
BYTE *input_token;
|
|
|
|
size_t input_token_len;
|
2017-07-08 08:10:08 +08:00
|
|
|
TCHAR *spn;
|
2005-03-11 07:15:29 +08:00
|
|
|
#else
|
2006-04-05 20:35:48 +08:00
|
|
|
unsigned int flags;
|
2003-06-11 21:38:55 +08:00
|
|
|
unsigned char nonce[8];
|
2014-01-24 21:01:29 +08:00
|
|
|
unsigned int target_info_len;
|
2021-01-17 05:17:51 +08:00
|
|
|
void *target_info; /* TargetInfo received in the ntlm type-2 message */
|
2005-03-11 07:15:29 +08:00
|
|
|
#endif
|
2003-06-11 21:38:55 +08:00
|
|
|
};
|
2014-10-26 05:32:46 +08:00
|
|
|
#endif
|
2003-06-11 21:38:55 +08:00
|
|
|
|
2019-05-14 04:42:35 +08:00
|
|
|
/* Struct used for Negotiate (SPNEGO) authentication */
|
2014-07-21 15:53:46 +08:00
|
|
|
#ifdef USE_SPNEGO
|
2003-06-10 20:22:19 +08:00
|
|
|
struct negotiatedata {
|
2011-01-06 00:01:07 +08:00
|
|
|
#ifdef HAVE_GSSAPI
|
2003-06-10 20:22:19 +08:00
|
|
|
OM_uint32 status;
|
|
|
|
gss_ctx_id_t context;
|
2016-04-02 13:41:29 +08:00
|
|
|
gss_name_t spn;
|
2003-06-10 20:22:19 +08:00
|
|
|
gss_buffer_desc output_token;
|
2011-01-06 00:01:07 +08:00
|
|
|
#else
|
|
|
|
#ifdef USE_WINDOWS_SSPI
|
2019-01-30 01:26:31 +08:00
|
|
|
#ifdef SECPKG_ATTR_ENDPOINT_BINDINGS
|
|
|
|
CtxtHandle *sslContext;
|
|
|
|
#endif
|
2011-01-06 00:01:07 +08:00
|
|
|
DWORD status;
|
|
|
|
CredHandle *credentials;
|
2014-10-26 22:36:05 +08:00
|
|
|
CtxtHandle *context;
|
2014-07-12 04:45:25 +08:00
|
|
|
SEC_WINNT_AUTH_IDENTITY identity;
|
|
|
|
SEC_WINNT_AUTH_IDENTITY *p_identity;
|
2016-04-02 13:41:29 +08:00
|
|
|
TCHAR *spn;
|
2014-10-26 22:36:05 +08:00
|
|
|
size_t token_max;
|
2011-01-06 00:01:07 +08:00
|
|
|
BYTE *output_token;
|
|
|
|
size_t output_token_length;
|
|
|
|
#endif
|
|
|
|
#endif
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(noauthpersist);
|
|
|
|
BIT(havenoauthpersist);
|
|
|
|
BIT(havenegdata);
|
|
|
|
BIT(havemultiplerequests);
|
2003-06-10 20:22:19 +08:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
2022-01-28 23:52:24 +08:00
|
|
|
#ifdef CURL_DISABLE_PROXY
|
|
|
|
#define CONN_IS_PROXIED(x) 0
|
|
|
|
#else
|
|
|
|
#define CONN_IS_PROXIED(x) x->bits.proxy
|
|
|
|
#endif
|
2001-03-05 21:39:01 +08:00
|
|
|
|
2001-02-21 01:35:51 +08:00
|
|
|
/*
|
|
|
|
* Boolean values that concerns this connection.
|
|
|
|
*/
|
|
|
|
struct ConnectBits {
|
2020-05-27 17:51:34 +08:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
2022-10-26 14:59:35 +08:00
|
|
|
BIT(httpproxy); /* if set, this transfer is done through an HTTP proxy */
|
2020-05-27 17:51:34 +08:00
|
|
|
BIT(socksproxy); /* if set, this transfer is done through a socks proxy */
|
|
|
|
BIT(proxy_user_passwd); /* user+password for the proxy? */
|
|
|
|
BIT(tunnel_proxy); /* if CONNECT is used to "tunnel" through the proxy.
|
|
|
|
This is implicit when SSL-protocols are used through
|
|
|
|
proxies, but can also be enabled explicitly by
|
|
|
|
apps */
|
|
|
|
BIT(proxy_connect_closed); /* TRUE if a proxy disconnected the connection
|
|
|
|
in a CONNECT request with auth, so that
|
|
|
|
libcurl should reconnect and continue. */
|
2022-01-28 23:52:24 +08:00
|
|
|
BIT(proxy); /* if set, this transfer is done through a proxy - any type */
|
2020-05-27 17:51:34 +08:00
|
|
|
#endif
|
|
|
|
/* always modify bits.close with the connclose() and connkeep() macros! */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(close); /* if set, we close the connection after this request */
|
2023-08-23 20:47:45 +08:00
|
|
|
BIT(reuse); /* if set, this is a reused connection */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(altused); /* this is an alt-svc "redirect" */
|
|
|
|
BIT(conn_to_host); /* if set, this connection has a "connect to host"
|
|
|
|
that overrides the host in the URL */
|
|
|
|
BIT(conn_to_port); /* if set, this connection has a "connect to port"
|
|
|
|
that overrides the port in the URL (remote port) */
|
|
|
|
BIT(ipv6_ip); /* we communicate with a remote site specified with pure IPv6
|
|
|
|
IP address */
|
|
|
|
BIT(ipv6); /* we communicate with a site using an IPv6 address */
|
|
|
|
BIT(do_more); /* this is set TRUE if the ->curl_do_more() function is
|
|
|
|
supposed to be called, after ->curl_do() */
|
|
|
|
BIT(protoconnstart);/* the protocol layer has STARTED its operation after
|
|
|
|
the TCP layer connect */
|
|
|
|
BIT(retry); /* this connection is about to get closed and then
|
|
|
|
re-attempted at another connection. */
|
2019-05-05 23:08:22 +08:00
|
|
|
#ifndef CURL_DISABLE_FTP
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(ftp_use_epsv); /* As set with CURLOPT_FTP_USE_EPSV, but if we find out
|
|
|
|
EPSV doesn't work we disable it for the forthcoming
|
|
|
|
requests */
|
|
|
|
BIT(ftp_use_eprt); /* As set with CURLOPT_FTP_USE_EPRT, but if we find out
|
|
|
|
EPRT doesn't work we disable it for the forthcoming
|
|
|
|
requests */
|
|
|
|
BIT(ftp_use_data_ssl); /* Enabled SSL for the data connection */
|
2020-09-21 15:15:51 +08:00
|
|
|
BIT(ftp_use_control_ssl); /* Enabled SSL for the control connection */
|
2019-05-05 23:08:22 +08:00
|
|
|
#endif
|
2021-07-17 23:43:57 +08:00
|
|
|
#ifndef CURL_DISABLE_NETRC
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(netrc); /* name+password provided by netrc */
|
2021-07-17 23:43:57 +08:00
|
|
|
#endif
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(bound); /* set true if bind() has already been done on this socket/
|
|
|
|
connection */
|
|
|
|
BIT(multiplex); /* connection is multiplexed */
|
|
|
|
BIT(tcp_fastopen); /* use TCP Fast Open */
|
|
|
|
BIT(tls_enable_alpn); /* TLS ALPN extension? */
|
2021-09-06 22:36:34 +08:00
|
|
|
#ifndef CURL_DISABLE_DOH
|
2020-05-26 17:07:06 +08:00
|
|
|
BIT(doh);
|
2021-09-06 22:36:34 +08:00
|
|
|
#endif
|
2020-05-26 20:42:47 +08:00
|
|
|
#ifdef USE_UNIX_SOCKETS
|
|
|
|
BIT(abstract_unix_socket);
|
|
|
|
#endif
|
|
|
|
BIT(tls_upgraded);
|
|
|
|
BIT(sock_accepted); /* TRUE if the SECONDARYSOCKET was created with
|
|
|
|
accept() */
|
|
|
|
BIT(parallel_connect); /* set TRUE when a parallel connect attempt has
|
|
|
|
started (happy eyeballs) */
|
2001-02-21 01:35:51 +08:00
|
|
|
};
|
|
|
|
|
2004-04-27 21:56:23 +08:00
|
|
|
struct hostname {
|
|
|
|
char *rawalloc; /* allocated "raw" version of the name */
|
|
|
|
char *encalloc; /* allocated IDN-encoded version of the name */
|
|
|
|
char *name; /* name to use internally, might be encoded, might be raw */
|
2008-09-05 03:43:35 +08:00
|
|
|
const char *dispname; /* name to display, as 'name' might be encoded */
|
2004-04-27 21:56:23 +08:00
|
|
|
};
|
|
|
|
|
2006-09-08 05:49:20 +08:00
|
|
|
/*
|
|
|
|
* Flags on the keepon member of the Curl_transfer_keeper
|
|
|
|
*/
|
|
|
|
|
2006-12-06 17:37:40 +08:00
|
|
|
#define KEEP_NONE 0
|
2009-05-11 15:53:38 +08:00
|
|
|
#define KEEP_RECV (1<<0) /* there is or may be data to read */
|
|
|
|
#define KEEP_SEND (1<<1) /* there is or may be data to write */
|
|
|
|
#define KEEP_RECV_HOLD (1<<2) /* when set, no reading should be done but there
|
2008-01-08 22:52:05 +08:00
|
|
|
might still be data to read */
|
2009-05-11 15:53:38 +08:00
|
|
|
#define KEEP_SEND_HOLD (1<<3) /* when set, no writing should be done but there
|
2008-01-08 22:52:05 +08:00
|
|
|
might still be data to write */
|
2009-05-11 15:53:38 +08:00
|
|
|
#define KEEP_RECV_PAUSE (1<<4) /* reading is paused */
|
|
|
|
#define KEEP_SEND_PAUSE (1<<5) /* writing is paused */
|
2008-01-08 22:52:05 +08:00
|
|
|
|
2024-03-12 00:23:15 +08:00
|
|
|
/* KEEP_SEND_TIMED is set when the transfer should attempt sending
|
|
|
|
* at timer (or other) events. A transfer waiting on a timer will
|
|
|
|
* remove KEEP_SEND to suppress POLLOUTs of the connection.
|
|
|
|
* Adding KEEP_SEND_TIMED will then attempt to send whenever the transfer
|
|
|
|
* enters the "readwrite" loop, e.g. when a timer fires.
|
|
|
|
* This is used in HTTP for 'Expect: 100-continue' waiting. */
|
|
|
|
#define KEEP_SEND_TIMED (1<<6)
|
|
|
|
|
2009-05-11 15:53:38 +08:00
|
|
|
#define KEEP_RECVBITS (KEEP_RECV | KEEP_RECV_HOLD | KEEP_RECV_PAUSE)
|
|
|
|
#define KEEP_SENDBITS (KEEP_SEND | KEEP_SEND_HOLD | KEEP_SEND_PAUSE)
|
2008-01-08 22:52:05 +08:00
|
|
|
|
lib: introduce struct easy_poll_set for poll information
Connection filter had a `get_select_socks()` method, inspired by the
various `getsocks` functions involved during the lifetime of a
transfer. These, depending on transfer state (CONNECT/DO/DONE/ etc.),
return sockets to monitor and flag if this shall be done for POLLIN
and/or POLLOUT.
Due to this design, sockets and flags could only be added, not
removed. This led to problems in filters like HTTP/2 where flow control
prohibits the sending of data until the peer increases the flow
window. The general transfer loop wants to write, adds POLLOUT, the
socket is writeable but no data can be written.
This leads to cpu busy loops. To prevent that, HTTP/2 did set the
`SEND_HOLD` flag of such a blocked transfer, so the transfer loop cedes
further attempts. This works if only one such filter is involved. If a
HTTP/2 transfer goes through a HTTP/2 proxy, two filters are
setting/clearing this flag and may step on each other's toes.
Connection filters `get_select_socks()` is replaced by
`adjust_pollset()`. They get passed a `struct easy_pollset` that keeps
up to `MAX_SOCKSPEREASYHANDLE` sockets and their `POLLIN|POLLOUT`
flags. This struct is initialized in `multi_getsock()` by calling the
various `getsocks()` implementations based on transfer state, as before.
After protocol handlers/transfer loop have set the sockets and flags
they want, the `easy_pollset` is *always* passed to the filters. Filters
"higher" in the chain are called first, starting at the first
not-yet-connection one. Each filter may add sockets and/or change
flags. When all flags are removed, the socket itself is removed from the
pollset.
Example:
* transfer wants to send, adds POLLOUT
* http/2 filter has a flow control block, removes POLLOUT and adds
POLLIN (it is waiting on a WINDOW_UPDATE from the server)
* TLS filter is connected and changes nothing
* h2-proxy filter also has a flow control block on its tunnel stream,
removes POLLOUT and adds POLLIN also.
* socket filter is connected and changes nothing
* The resulting pollset is then mixed together with all other transfers
and their pollsets, just as before.
Use of `SEND_HOLD` is no longer necessary in the filters.
All filters are adapted for the changed method. The handling in
`multi.c` has been adjusted, but its state handling the the protocol
handlers' `getsocks` method are untouched.
The most affected filters are http/2, ngtcp2, quiche and h2-proxy. TLS
filters needed to be adjusted for the connecting handshake read/write
handling.
No noticeable difference in performance was detected in local scorecard
runs.
Closes #11833
2023-09-04 18:06:07 +08:00
|
|
|
/* transfer wants to send is not PAUSE or HOLD */
|
|
|
|
#define CURL_WANT_SEND(data) \
|
|
|
|
(((data)->req.keepon & KEEP_SENDBITS) == KEEP_SEND)
|
|
|
|
/* transfer receive is not on PAUSE or HOLD */
|
|
|
|
#define CURL_WANT_RECV(data) \
|
2024-01-05 19:28:09 +08:00
|
|
|
(((data)->req.keepon & KEEP_RECVBITS) == KEEP_RECV)
|
lib: introduce struct easy_poll_set for poll information
Connection filter had a `get_select_socks()` method, inspired by the
various `getsocks` functions involved during the lifetime of a
transfer. These, depending on transfer state (CONNECT/DO/DONE/ etc.),
return sockets to monitor and flag if this shall be done for POLLIN
and/or POLLOUT.
Due to this design, sockets and flags could only be added, not
removed. This led to problems in filters like HTTP/2 where flow control
prohibits the sending of data until the peer increases the flow
window. The general transfer loop wants to write, adds POLLOUT, the
socket is writeable but no data can be written.
This leads to cpu busy loops. To prevent that, HTTP/2 did set the
`SEND_HOLD` flag of such a blocked transfer, so the transfer loop cedes
further attempts. This works if only one such filter is involved. If a
HTTP/2 transfer goes through a HTTP/2 proxy, two filters are
setting/clearing this flag and may step on each other's toes.
Connection filters `get_select_socks()` is replaced by
`adjust_pollset()`. They get passed a `struct easy_pollset` that keeps
up to `MAX_SOCKSPEREASYHANDLE` sockets and their `POLLIN|POLLOUT`
flags. This struct is initialized in `multi_getsock()` by calling the
various `getsocks()` implementations based on transfer state, as before.
After protocol handlers/transfer loop have set the sockets and flags
they want, the `easy_pollset` is *always* passed to the filters. Filters
"higher" in the chain are called first, starting at the first
not-yet-connection one. Each filter may add sockets and/or change
flags. When all flags are removed, the socket itself is removed from the
pollset.
Example:
* transfer wants to send, adds POLLOUT
* http/2 filter has a flow control block, removes POLLOUT and adds
POLLIN (it is waiting on a WINDOW_UPDATE from the server)
* TLS filter is connected and changes nothing
* h2-proxy filter also has a flow control block on its tunnel stream,
removes POLLOUT and adds POLLIN also.
* socket filter is connected and changes nothing
* The resulting pollset is then mixed together with all other transfers
and their pollsets, just as before.
Use of `SEND_HOLD` is no longer necessary in the filters.
All filters are adapted for the changed method. The handling in
`multi.c` has been adjusted, but its state handling the the protocol
handlers' `getsocks` method are untouched.
The most affected filters are http/2, ngtcp2, quiche and h2-proxy. TLS
filters needed to be adjusted for the connecting handshake read/write
handling.
No noticeable difference in performance was detected in local scorecard
runs.
Closes #11833
2023-09-04 18:06:07 +08:00
|
|
|
|
2021-01-20 17:15:43 +08:00
|
|
|
#if defined(CURLRES_ASYNCH) || !defined(CURL_DISABLE_DOH)
|
|
|
|
#define USE_CURL_ASYNC
|
2007-11-25 07:16:55 +08:00
|
|
|
struct Curl_async {
|
|
|
|
char *hostname;
|
2021-01-17 05:17:51 +08:00
|
|
|
struct Curl_dns_entry *dns;
|
2020-11-23 21:54:10 +08:00
|
|
|
struct thread_data *tdata;
|
2021-01-20 17:15:43 +08:00
|
|
|
void *resolver; /* resolver state, if it is used in the URL state -
|
2022-09-30 05:29:04 +08:00
|
|
|
ares_channel e.g. */
|
2021-01-20 17:15:43 +08:00
|
|
|
int port;
|
|
|
|
int status; /* if done is TRUE, this is the status from the callback */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(done); /* set TRUE when the lookup is complete */
|
2007-11-25 07:16:55 +08:00
|
|
|
};
|
2002-01-03 23:01:22 +08:00
|
|
|
|
2021-01-20 17:15:43 +08:00
|
|
|
#endif
|
|
|
|
|
2007-11-25 07:16:55 +08:00
|
|
|
#define FIRSTSOCKET 0
|
|
|
|
#define SECONDARYSOCKET 1
|
|
|
|
|
lib: introduce struct easy_poll_set for poll information
Connection filter had a `get_select_socks()` method, inspired by the
various `getsocks` functions involved during the lifetime of a
transfer. These, depending on transfer state (CONNECT/DO/DONE/ etc.),
return sockets to monitor and flag if this shall be done for POLLIN
and/or POLLOUT.
Due to this design, sockets and flags could only be added, not
removed. This led to problems in filters like HTTP/2 where flow control
prohibits the sending of data until the peer increases the flow
window. The general transfer loop wants to write, adds POLLOUT, the
socket is writeable but no data can be written.
This leads to cpu busy loops. To prevent that, HTTP/2 did set the
`SEND_HOLD` flag of such a blocked transfer, so the transfer loop cedes
further attempts. This works if only one such filter is involved. If a
HTTP/2 transfer goes through a HTTP/2 proxy, two filters are
setting/clearing this flag and may step on each other's toes.
Connection filters `get_select_socks()` is replaced by
`adjust_pollset()`. They get passed a `struct easy_pollset` that keeps
up to `MAX_SOCKSPEREASYHANDLE` sockets and their `POLLIN|POLLOUT`
flags. This struct is initialized in `multi_getsock()` by calling the
various `getsocks()` implementations based on transfer state, as before.
After protocol handlers/transfer loop have set the sockets and flags
they want, the `easy_pollset` is *always* passed to the filters. Filters
"higher" in the chain are called first, starting at the first
not-yet-connection one. Each filter may add sockets and/or change
flags. When all flags are removed, the socket itself is removed from the
pollset.
Example:
* transfer wants to send, adds POLLOUT
* http/2 filter has a flow control block, removes POLLOUT and adds
POLLIN (it is waiting on a WINDOW_UPDATE from the server)
* TLS filter is connected and changes nothing
* h2-proxy filter also has a flow control block on its tunnel stream,
removes POLLOUT and adds POLLIN also.
* socket filter is connected and changes nothing
* The resulting pollset is then mixed together with all other transfers
and their pollsets, just as before.
Use of `SEND_HOLD` is no longer necessary in the filters.
All filters are adapted for the changed method. The handling in
`multi.c` has been adjusted, but its state handling the the protocol
handlers' `getsocks` method are untouched.
The most affected filters are http/2, ngtcp2, quiche and h2-proxy. TLS
filters needed to be adjusted for the connecting handshake read/write
handling.
No noticeable difference in performance was detected in local scorecard
runs.
Closes #11833
2023-09-04 18:06:07 +08:00
|
|
|
/* Polling requested by an easy handle.
|
|
|
|
* `action` is CURL_POLL_IN, CURL_POLL_OUT or CURL_POLL_INOUT.
|
|
|
|
*/
|
|
|
|
struct easy_pollset {
|
|
|
|
curl_socket_t sockets[MAX_SOCKSPEREASYHANDLE];
|
|
|
|
unsigned int num;
|
|
|
|
unsigned char actions[MAX_SOCKSPEREASYHANDLE];
|
|
|
|
};
|
|
|
|
|
2019-11-21 20:15:44 +08:00
|
|
|
enum doh_slots {
|
|
|
|
/* Explicit values for first two symbols so as to match hard-coded
|
|
|
|
* constants in existing code
|
|
|
|
*/
|
|
|
|
DOH_PROBE_SLOT_IPADDR_V4 = 0, /* make 'V4' stand out for readability */
|
|
|
|
DOH_PROBE_SLOT_IPADDR_V6 = 1, /* 'V6' likewise */
|
|
|
|
|
|
|
|
/* Space here for (possibly build-specific) additional slot definitions */
|
2024-04-04 21:23:35 +08:00
|
|
|
#ifdef USE_HTTPSRR
|
|
|
|
DOH_PROBE_SLOT_HTTPS = 2, /* for HTTPS RR */
|
|
|
|
#endif
|
2019-11-21 20:15:44 +08:00
|
|
|
|
|
|
|
/* for example */
|
|
|
|
/* #ifdef WANT_DOH_FOOBAR_TXT */
|
|
|
|
/* DOH_PROBE_SLOT_FOOBAR_TXT, */
|
|
|
|
/* #endif */
|
|
|
|
|
|
|
|
/* AFTER all slot definitions, establish how many we have */
|
|
|
|
DOH_PROBE_SLOTS
|
|
|
|
};
|
|
|
|
|
2007-10-12 21:36:37 +08:00
|
|
|
/*
|
|
|
|
* Specific protocol handler.
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct Curl_handler {
|
2024-05-07 22:55:23 +08:00
|
|
|
const char *scheme; /* URL scheme name in lowercase */
|
2007-10-12 21:36:37 +08:00
|
|
|
|
2021-01-09 00:58:15 +08:00
|
|
|
/* Complement to setup_connection_internals(). This is done before the
|
|
|
|
transfer "owns" the connection. */
|
|
|
|
CURLcode (*setup_connection)(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn);
|
2007-10-12 21:36:37 +08:00
|
|
|
|
|
|
|
/* These two functions MUST be set to be protocol dependent */
|
2021-01-09 00:58:15 +08:00
|
|
|
CURLcode (*do_it)(struct Curl_easy *data, bool *done);
|
|
|
|
CURLcode (*done)(struct Curl_easy *, CURLcode, bool);
|
2007-10-12 21:36:37 +08:00
|
|
|
|
|
|
|
/* If the curl_do() function is better made in two halves, this
|
|
|
|
* curl_do_more() function will be called afterwards, if set. For example
|
|
|
|
* for doing the FTP stuff after the PASV/PORT command.
|
|
|
|
*/
|
2021-01-09 00:58:15 +08:00
|
|
|
CURLcode (*do_more)(struct Curl_easy *, int *);
|
2007-10-12 21:36:37 +08:00
|
|
|
|
|
|
|
/* This function *MAY* be set to a protocol-dependent function that is run
|
|
|
|
* after the connect() and everything is done, as a step in the connection.
|
|
|
|
* The 'done' pointer points to a bool that should be set to TRUE if the
|
|
|
|
* function completes before return. If it doesn't complete, the caller
|
2023-08-24 16:02:23 +08:00
|
|
|
* should call the ->connecting() function until it is.
|
2007-10-12 21:36:37 +08:00
|
|
|
*/
|
2021-01-09 00:58:15 +08:00
|
|
|
CURLcode (*connect_it)(struct Curl_easy *data, bool *done);
|
2007-10-12 21:36:37 +08:00
|
|
|
|
2018-10-25 19:02:26 +08:00
|
|
|
/* See above. */
|
2021-01-09 00:58:15 +08:00
|
|
|
CURLcode (*connecting)(struct Curl_easy *data, bool *done);
|
|
|
|
CURLcode (*doing)(struct Curl_easy *data, bool *done);
|
2007-10-12 21:36:37 +08:00
|
|
|
|
|
|
|
/* Called from the multi interface during the PROTOCONNECT phase, and it
|
|
|
|
should then return a proper fd set */
|
2021-01-09 00:58:15 +08:00
|
|
|
int (*proto_getsock)(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn, curl_socket_t *socks);
|
2007-10-12 21:36:37 +08:00
|
|
|
|
|
|
|
/* Called from the multi interface during the DOING phase, and it should
|
|
|
|
then return a proper fd set */
|
2021-01-09 00:58:15 +08:00
|
|
|
int (*doing_getsock)(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn, curl_socket_t *socks);
|
2007-10-12 21:36:37 +08:00
|
|
|
|
2011-10-22 05:36:54 +08:00
|
|
|
/* Called from the multi interface during the DO_MORE phase, and it should
|
|
|
|
then return a proper fd set */
|
2021-01-09 00:58:15 +08:00
|
|
|
int (*domore_getsock)(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn, curl_socket_t *socks);
|
2011-10-22 05:36:54 +08:00
|
|
|
|
2008-12-20 05:14:52 +08:00
|
|
|
/* Called from the multi interface during the DO_DONE, PERFORM and
|
|
|
|
WAITPERFORM phases, and it should then return a proper fd set. Not setting
|
|
|
|
this will make libcurl use the generic default one. */
|
2021-01-09 00:58:15 +08:00
|
|
|
int (*perform_getsock)(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn, curl_socket_t *socks);
|
2008-12-20 05:14:52 +08:00
|
|
|
|
2007-10-12 21:36:37 +08:00
|
|
|
/* This function *MAY* be set to a protocol-dependent function that is run
|
2010-11-19 20:43:20 +08:00
|
|
|
* by the curl_disconnect(), as a step in the disconnection. If the handler
|
2021-01-09 00:58:15 +08:00
|
|
|
* is called because the connection has been considered dead,
|
2023-01-30 16:35:39 +08:00
|
|
|
* dead_connection is set to TRUE. The connection is (again) associated with
|
|
|
|
* the transfer here.
|
2007-10-12 21:36:37 +08:00
|
|
|
*/
|
2021-01-09 00:58:15 +08:00
|
|
|
CURLcode (*disconnect)(struct Curl_easy *, struct connectdata *,
|
|
|
|
bool dead_connection);
|
2007-10-12 21:36:37 +08:00
|
|
|
|
2024-03-21 19:15:59 +08:00
|
|
|
/* If used, this function gets called from transfer.c to
|
lib: replace readwrite with write_resp
This clarifies the handling of server responses by folding the code for
the complicated protocols into their protocol handlers. This concerns
mainly HTTP and its bastard sibling RTSP.
The terms "read" and "write" are often used without clear context if
they refer to the connect or the client/application side of a
transfer. This PR uses "read/write" for operations on the client side
and "send/receive" for the connection, e.g. server side. If this is
considered useful, we can revisit renaming of further methods in another
PR.
Curl's protocol handler `readwrite()` method been changed:
```diff
- CURLcode (*readwrite)(struct Curl_easy *data, struct connectdata *conn,
- const char *buf, size_t blen,
- size_t *pconsumed, bool *readmore);
+ CURLcode (*write_resp)(struct Curl_easy *data, const char *buf, size_t blen,
+ bool is_eos, bool *done);
```
The name was changed to clarify that this writes reponse data to the
client side. The parameter changes are:
* `conn` removed as it always operates on `data->conn`
* `pconsumed` removed as the method needs to handle all data on success
* `readmore` removed as no longer necessary
* `is_eos` as indicator that this is the last call for the transfer
response (end-of-stream).
* `done` TRUE on return iff the transfer response is to be treated as
finished
This change affects many files only because of updated comments in
handlers that provide no implementation. The real change is that the
HTTP protocol handlers now provide an implementation.
The HTTP protocol handlers `write_resp()` implementation will get passed
**all** raw data of a server response for the transfer. The HTTP/1.x
formatted status and headers, as well as the undecoded response
body. `Curl_http_write_resp_hds()` is used internally to parse the
response headers and pass them on. This method is public as the RTSP
protocol handler also uses it.
HTTP/1.1 "chunked" transport encoding is now part of the general
*content encoding* writer stack, just like other encodings. A new flag
`CLIENTWRITE_EOS` was added for the last client write. This allows
writers to verify that they are in a valid end state. The chunked
decoder will check if it indeed has seen the last chunk.
The general response handling in `transfer.c:466` happens in function
`readwrite_data()`. This mainly operates now like:
```
static CURLcode readwrite_data(data, ...)
{
do {
Curl_xfer_recv_resp(data, buf)
...
Curl_xfer_write_resp(data, buf)
...
} while(interested);
...
}
```
All the response data handling is implemented in
`Curl_xfer_write_resp()`. It calls the protocol handler's `write_resp()`
implementation if available, or does the default behaviour.
All raw response data needs to pass through this function. Which also
means that anyone in possession of such data may call
`Curl_xfer_write_resp()`.
Closes #12480
2023-12-01 20:50:32 +08:00
|
|
|
allow the protocol to do extra handling in writing response to
|
|
|
|
the client. */
|
|
|
|
CURLcode (*write_resp)(struct Curl_easy *data, const char *buf, size_t blen,
|
2024-03-11 19:35:07 +08:00
|
|
|
bool is_eos);
|
2011-05-05 22:27:03 +08:00
|
|
|
|
2024-03-21 19:15:59 +08:00
|
|
|
/* If used, this function gets called from transfer.c to
|
|
|
|
allow the protocol to do extra handling in writing a single response
|
|
|
|
header line to the client. */
|
|
|
|
CURLcode (*write_resp_hd)(struct Curl_easy *data,
|
|
|
|
const char *hd, size_t hdlen, bool is_eos);
|
|
|
|
|
2017-05-31 19:09:56 +08:00
|
|
|
/* This function can perform various checks on the connection. See
|
|
|
|
CONNCHECK_* for more information about the checks that can be performed,
|
|
|
|
and CONNRESULT_* for the results that can be returned. */
|
2021-01-09 00:58:15 +08:00
|
|
|
unsigned int (*connection_check)(struct Curl_easy *data,
|
|
|
|
struct connectdata *conn,
|
2017-05-31 19:09:56 +08:00
|
|
|
unsigned int checks_to_perform);
|
|
|
|
|
2021-05-17 14:54:00 +08:00
|
|
|
/* attach() attaches this transfer to this connection */
|
|
|
|
void (*attach)(struct Curl_easy *data, struct connectdata *conn);
|
|
|
|
|
2021-01-26 18:04:33 +08:00
|
|
|
int defport; /* Default port. */
|
2022-09-12 15:57:01 +08:00
|
|
|
curl_prot_t protocol; /* See CURLPROTO_* - this needs to be the single
|
|
|
|
specific protocol bit */
|
|
|
|
curl_prot_t family; /* single bit for protocol family; basically the
|
|
|
|
non-TLS name of the protocol this is */
|
2011-03-15 05:22:22 +08:00
|
|
|
unsigned int flags; /* Extra particular characteristics, see PROTOPT_* */
|
2021-05-17 14:54:00 +08:00
|
|
|
|
2007-10-12 21:36:37 +08:00
|
|
|
};
|
|
|
|
|
2011-03-15 05:52:14 +08:00
|
|
|
#define PROTOPT_NONE 0 /* nothing extra */
|
|
|
|
#define PROTOPT_SSL (1<<0) /* uses SSL */
|
|
|
|
#define PROTOPT_DUAL (1<<1) /* this protocol uses two connections */
|
|
|
|
#define PROTOPT_CLOSEACTION (1<<2) /* need action before socket close */
|
|
|
|
/* some protocols will have to call the underlying functions without regard to
|
|
|
|
what exact state the socket signals. IE even if the socket says "readable",
|
|
|
|
the send function might need to be called while uploading, or vice versa.
|
|
|
|
*/
|
|
|
|
#define PROTOPT_DIRLOCK (1<<3)
|
2011-05-05 23:07:21 +08:00
|
|
|
#define PROTOPT_NONETWORK (1<<4) /* protocol doesn't use the network! */
|
|
|
|
#define PROTOPT_NEEDSPWD (1<<5) /* needs a password, and if none is set it
|
|
|
|
gets a default */
|
2011-11-25 06:28:54 +08:00
|
|
|
#define PROTOPT_NOURLQUERY (1<<6) /* protocol can't handle
|
|
|
|
url query strings (?foo=bar) ! */
|
2014-04-01 14:00:13 +08:00
|
|
|
#define PROTOPT_CREDSPERREQUEST (1<<7) /* requires login credentials per
|
|
|
|
request instead of per connection */
|
2022-09-01 15:23:22 +08:00
|
|
|
#define PROTOPT_ALPN (1<<8) /* set ALPN for this */
|
2022-12-30 16:14:55 +08:00
|
|
|
/* (1<<9) was PROTOPT_STREAM, now free */
|
2017-02-10 17:50:19 +08:00
|
|
|
#define PROTOPT_URLOPTIONS (1<<10) /* allow options part in the userinfo field
|
|
|
|
of the URL */
|
2017-06-15 19:45:57 +08:00
|
|
|
#define PROTOPT_PROXY_AS_HTTP (1<<11) /* allow this non-HTTP scheme over a
|
|
|
|
HTTP proxy as HTTP proxies may know
|
|
|
|
this protocol and act as a gateway */
|
2017-10-26 05:51:50 +08:00
|
|
|
#define PROTOPT_WILDCARD (1<<12) /* protocol supports wildcard matching */
|
2020-06-23 22:23:51 +08:00
|
|
|
#define PROTOPT_USERPWDCTRL (1<<13) /* Allow "control bytes" (< 32 ascii) in
|
|
|
|
user name and password */
|
2021-11-15 23:51:32 +08:00
|
|
|
#define PROTOPT_NOTCPPROXY (1<<14) /* this protocol can't proxy over TCP */
|
2011-03-15 05:52:14 +08:00
|
|
|
|
2017-05-31 19:09:56 +08:00
|
|
|
#define CONNCHECK_NONE 0 /* No checks */
|
|
|
|
#define CONNCHECK_ISDEAD (1<<0) /* Check if the connection is dead. */
|
2018-04-18 23:40:17 +08:00
|
|
|
#define CONNCHECK_KEEPALIVE (1<<1) /* Perform any keepalive function. */
|
2017-05-31 19:09:56 +08:00
|
|
|
|
|
|
|
#define CONNRESULT_NONE 0 /* No extra information. */
|
|
|
|
#define CONNRESULT_DEAD (1<<0) /* The connection is dead. */
|
|
|
|
|
2024-03-08 17:45:14 +08:00
|
|
|
struct ip_quadruple {
|
|
|
|
char remote_ip[MAX_IPADR_LEN];
|
|
|
|
char local_ip[MAX_IPADR_LEN];
|
|
|
|
int remote_port;
|
|
|
|
int local_port;
|
|
|
|
};
|
|
|
|
|
2016-11-17 01:49:15 +08:00
|
|
|
struct proxy_info {
|
|
|
|
struct hostname host;
|
2022-11-18 20:17:06 +08:00
|
|
|
int port;
|
2022-07-21 05:13:35 +08:00
|
|
|
unsigned char proxytype; /* curl_proxytype: what kind of proxy that is in
|
|
|
|
use */
|
2016-11-17 01:49:15 +08:00
|
|
|
char *user; /* proxy user name string, allocated */
|
|
|
|
char *passwd; /* proxy password string, allocated */
|
|
|
|
};
|
|
|
|
|
2019-09-03 19:31:44 +08:00
|
|
|
struct ldapconninfo;
|
2020-02-14 23:16:54 +08:00
|
|
|
|
2022-08-08 18:36:41 +08:00
|
|
|
#define TRNSPRT_TCP 3
|
|
|
|
#define TRNSPRT_UDP 4
|
|
|
|
#define TRNSPRT_QUIC 5
|
|
|
|
#define TRNSPRT_UNIX 6
|
|
|
|
|
2000-05-22 22:12:12 +08:00
|
|
|
/*
|
|
|
|
* The connectdata struct contains all fields and variables that should be
|
|
|
|
* unique for an entire connection.
|
|
|
|
*/
|
|
|
|
struct connectdata {
|
2020-09-02 18:06:20 +08:00
|
|
|
struct Curl_llist_element bundle_node; /* conncache */
|
2017-04-20 21:10:04 +08:00
|
|
|
|
2011-05-17 05:46:43 +08:00
|
|
|
curl_closesocket_callback fclosesocket; /* function closing the socket(s) */
|
|
|
|
void *closesocket_client;
|
|
|
|
|
2018-07-04 06:55:48 +08:00
|
|
|
/* This is used by the connection cache logic. If this returns TRUE, this
|
2019-04-05 22:38:36 +08:00
|
|
|
handle is still used by one or more easy handles and can only used by any
|
2018-07-04 06:55:48 +08:00
|
|
|
other easy handle without careful consideration (== only for
|
2019-04-05 22:38:36 +08:00
|
|
|
multiplexing) and it cannot be used by another multi handle! */
|
|
|
|
#define CONN_INUSE(c) ((c)->easyq.size)
|
2001-02-21 01:35:51 +08:00
|
|
|
|
2006-09-08 05:49:20 +08:00
|
|
|
/**** Fields set when inited and not modified again */
|
2023-05-23 18:48:58 +08:00
|
|
|
curl_off_t connection_id; /* Contains a unique number to make it easier to
|
|
|
|
track the connections in the log output */
|
2011-03-15 05:22:22 +08:00
|
|
|
|
2005-01-29 06:14:48 +08:00
|
|
|
/* 'dns_entry' is the particular host we use. This points to an entry in the
|
|
|
|
DNS cache and it will not get pruned while locked. It gets unlocked in
|
2023-08-23 20:47:45 +08:00
|
|
|
multi_done(). This entry will be NULL if the connection is reused as then
|
2006-10-20 20:25:39 +08:00
|
|
|
there is no name resolve done. */
|
2004-06-24 15:43:48 +08:00
|
|
|
struct Curl_dns_entry *dns_entry;
|
2005-01-29 06:14:48 +08:00
|
|
|
|
2023-01-03 20:13:37 +08:00
|
|
|
/* 'remote_addr' is the particular IP we connected to. it is owned, set
|
|
|
|
* and NULLed by the connected socket filter (if there is one). */
|
|
|
|
const struct Curl_sockaddr_ex *remote_addr;
|
2004-04-27 21:56:23 +08:00
|
|
|
|
|
|
|
struct hostname host;
|
2018-11-03 04:24:14 +08:00
|
|
|
char *hostname_resolve; /* host name to resolve to address, allocated */
|
2016-11-17 01:49:15 +08:00
|
|
|
char *secondaryhostname; /* secondary socket host name (ftp) */
|
2016-01-25 21:37:24 +08:00
|
|
|
struct hostname conn_to_host; /* the host to connect to. valid only if
|
|
|
|
bits.conn_to_host is set */
|
2020-05-27 17:51:34 +08:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
2016-11-17 01:49:15 +08:00
|
|
|
struct proxy_info socks_proxy;
|
|
|
|
struct proxy_info http_proxy;
|
2020-05-27 17:51:34 +08:00
|
|
|
#endif
|
2024-03-08 17:45:14 +08:00
|
|
|
/* 'primary' and 'secondary' get filled with IP quadruple
|
|
|
|
(local/remote numerical ip address and port) whenever a is *attempted*.
|
|
|
|
When more than one address is tried for a connection these will hold data
|
2011-04-19 21:54:13 +08:00
|
|
|
for the last attempt. When the connection is actually established
|
2010-12-01 05:14:37 +08:00
|
|
|
these are updated with data which comes directly from the socket. */
|
2024-03-08 17:45:14 +08:00
|
|
|
struct ip_quadruple primary;
|
|
|
|
struct ip_quadruple secondary;
|
2003-07-20 07:55:15 +08:00
|
|
|
char *user; /* user name string, allocated */
|
|
|
|
char *passwd; /* password string, allocated */
|
2013-04-13 17:49:42 +08:00
|
|
|
char *options; /* options string, allocated */
|
2022-04-05 19:32:26 +08:00
|
|
|
char *sasl_authzid; /* authorization identity string, allocated */
|
2022-04-25 17:44:05 +08:00
|
|
|
char *oauth_bearer; /* OAUTH2 bearer, allocated */
|
2017-07-28 21:49:36 +08:00
|
|
|
struct curltime now; /* "current" time */
|
|
|
|
struct curltime created; /* creation time */
|
2019-04-15 05:20:01 +08:00
|
|
|
struct curltime lastused; /* when returned to the connection cache */
|
2004-03-10 06:52:50 +08:00
|
|
|
curl_socket_t sock[2]; /* two sockets, the second is used for the data
|
|
|
|
transfer when doing FTP */
|
2010-05-12 04:48:38 +08:00
|
|
|
Curl_recv *recv[2];
|
|
|
|
Curl_send *send[2];
|
2022-11-11 18:45:34 +08:00
|
|
|
struct Curl_cfilter *cfilter[2]; /* connection filters */
|
2010-05-07 21:05:34 +08:00
|
|
|
|
2016-11-17 01:49:15 +08:00
|
|
|
struct ssl_primary_config ssl_config;
|
2020-05-27 17:51:34 +08:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
2016-11-17 01:49:15 +08:00
|
|
|
struct ssl_primary_config proxy_ssl_config;
|
2020-05-27 17:51:34 +08:00
|
|
|
#endif
|
2001-02-21 01:35:51 +08:00
|
|
|
struct ConnectBits bits; /* various state-flags for this connection */
|
|
|
|
|
2011-03-15 05:22:22 +08:00
|
|
|
const struct Curl_handler *handler; /* Connection's protocol handler */
|
|
|
|
const struct Curl_handler *given; /* The protocol first given */
|
2000-07-26 05:14:12 +08:00
|
|
|
|
2018-04-18 23:40:17 +08:00
|
|
|
/* Protocols can use a custom keepalive mechanism to keep connections alive.
|
|
|
|
This allows those protocols to track the last time the keepalive mechanism
|
|
|
|
was used on this connection. */
|
|
|
|
struct curltime keepalive;
|
|
|
|
|
2000-05-22 22:12:12 +08:00
|
|
|
/**** curl_get() phase fields */
|
|
|
|
|
2004-10-06 15:50:18 +08:00
|
|
|
curl_socket_t sockfd; /* socket to read from or CURL_SOCKET_BAD */
|
2004-03-10 06:52:50 +08:00
|
|
|
curl_socket_t writesockfd; /* socket to write to, it may very
|
|
|
|
well be the same we read from.
|
|
|
|
CURL_SOCKET_BAD disables */
|
2000-05-22 22:12:12 +08:00
|
|
|
|
2013-08-23 22:16:42 +08:00
|
|
|
#ifdef HAVE_GSSAPI
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(sec_complete); /* if Kerberos is enabled for this connection */
|
2022-08-08 19:16:52 +08:00
|
|
|
unsigned char command_prot; /* enum protection_level */
|
|
|
|
unsigned char data_prot; /* enum protection_level */
|
|
|
|
unsigned char request_data_prot; /* enum protection_level */
|
2000-09-21 16:50:48 +08:00
|
|
|
size_t buffer_size;
|
2013-08-23 22:16:42 +08:00
|
|
|
struct krb5buffer in_buffer;
|
2000-09-21 16:50:48 +08:00
|
|
|
void *app_data;
|
2004-12-15 09:38:25 +08:00
|
|
|
const struct Curl_sec_client_mech *mech;
|
2001-08-17 18:13:32 +08:00
|
|
|
struct sockaddr_in local_addr;
|
2000-09-21 16:50:48 +08:00
|
|
|
#endif
|
2001-02-21 01:35:51 +08:00
|
|
|
|
2014-11-16 17:50:06 +08:00
|
|
|
#if defined(USE_KERBEROS5) /* Consider moving some of the above GSS-API */
|
2014-08-10 20:58:44 +08:00
|
|
|
struct kerberos5data krb5; /* variables into the structure definition, */
|
|
|
|
#endif /* however, some of them are ftp specific. */
|
|
|
|
|
2020-09-02 18:06:20 +08:00
|
|
|
struct Curl_llist easyq; /* List of easy handles using this connection */
|
2008-01-10 18:30:19 +08:00
|
|
|
|
2006-09-08 05:49:20 +08:00
|
|
|
/*************** Request - specific items ************/
|
2019-01-30 01:26:31 +08:00
|
|
|
#if defined(USE_WINDOWS_SSPI) && defined(SECPKG_ATTR_ENDPOINT_BINDINGS)
|
|
|
|
CtxtHandle *sslContext;
|
|
|
|
#endif
|
2006-09-08 05:49:20 +08:00
|
|
|
|
2020-12-25 02:48:45 +08:00
|
|
|
#ifdef USE_GSASL
|
|
|
|
struct gsasldata gsasl;
|
|
|
|
#endif
|
|
|
|
|
2014-10-26 05:32:46 +08:00
|
|
|
#if defined(USE_NTLM)
|
2019-05-14 03:58:39 +08:00
|
|
|
curlntlm http_ntlm_state;
|
|
|
|
curlntlm proxy_ntlm_state;
|
|
|
|
|
2003-07-16 07:36:50 +08:00
|
|
|
struct ntlmdata ntlm; /* NTLM differs from other authentication schemes
|
|
|
|
because it authenticates connections, not
|
|
|
|
single requests! */
|
2003-07-22 17:58:18 +08:00
|
|
|
struct ntlmdata proxyntlm; /* NTLM data for proxy */
|
2011-07-19 05:36:36 +08:00
|
|
|
#endif
|
|
|
|
|
2018-09-10 15:18:01 +08:00
|
|
|
#ifdef USE_SPNEGO
|
2019-05-14 04:42:35 +08:00
|
|
|
curlnegotiate http_negotiate_state;
|
|
|
|
curlnegotiate proxy_negotiate_state;
|
|
|
|
|
2018-09-10 15:18:01 +08:00
|
|
|
struct negotiatedata negotiate; /* state data for host Negotiate auth */
|
|
|
|
struct negotiatedata proxyneg; /* state data for proxy Negotiate auth */
|
|
|
|
#endif
|
|
|
|
|
2006-09-08 05:49:20 +08:00
|
|
|
union {
|
2022-06-01 20:30:55 +08:00
|
|
|
#ifndef CURL_DISABLE_FTP
|
2006-09-08 05:49:20 +08:00
|
|
|
struct ftp_conn ftpc;
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
|
|
|
#ifdef USE_SSH
|
2007-06-12 20:31:10 +08:00
|
|
|
struct ssh_conn sshc;
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_TFTP
|
2009-01-27 06:43:06 +08:00
|
|
|
struct tftp_state_data *tftpc;
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_IMAP
|
2009-12-13 05:54:01 +08:00
|
|
|
struct imap_conn imapc;
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_POP3
|
2009-12-13 05:54:01 +08:00
|
|
|
struct pop3_conn pop3c;
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_SMTP
|
2009-12-13 05:54:01 +08:00
|
|
|
struct smtp_conn smtpc;
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_RTSP
|
2010-01-21 21:58:30 +08:00
|
|
|
struct rtsp_conn rtspc;
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_SMB
|
2014-12-01 00:09:41 +08:00
|
|
|
struct smb_conn smbc;
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
2023-08-17 20:18:06 +08:00
|
|
|
#ifdef USE_LIBRTMP
|
2019-09-03 19:31:44 +08:00
|
|
|
void *rtmp;
|
2023-08-17 20:18:06 +08:00
|
|
|
#endif
|
|
|
|
#ifdef USE_OPENLDAP
|
2019-09-03 19:31:44 +08:00
|
|
|
struct ldapconninfo *ldapc;
|
2023-08-17 20:18:06 +08:00
|
|
|
#endif
|
2022-06-01 20:30:55 +08:00
|
|
|
#ifndef CURL_DISABLE_MQTT
|
2020-04-14 17:19:12 +08:00
|
|
|
struct mqtt_conn mqtt;
|
2023-02-08 21:24:49 +08:00
|
|
|
#endif
|
|
|
|
#ifdef USE_WEBSOCKETS
|
2023-04-18 21:02:34 +08:00
|
|
|
struct websocket *ws;
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
2023-08-17 20:18:06 +08:00
|
|
|
unsigned int unused:1; /* avoids empty union */
|
2006-09-08 05:49:20 +08:00
|
|
|
} proto;
|
2007-04-17 00:34:08 +08:00
|
|
|
|
2021-01-26 22:09:22 +08:00
|
|
|
struct connectbundle *bundle; /* The bundle we are member of */
|
|
|
|
#ifdef USE_UNIX_SOCKETS
|
|
|
|
char *unix_domain_socket;
|
|
|
|
#endif
|
|
|
|
#ifdef USE_HYPER
|
|
|
|
/* if set, an alternative data transfer function */
|
|
|
|
Curl_datastream datastream;
|
2009-01-29 05:33:58 +08:00
|
|
|
#endif
|
2011-03-25 23:00:41 +08:00
|
|
|
/* When this connection is created, store the conditions for the local end
|
|
|
|
bind. This is stored before the actual bind and before any connection is
|
|
|
|
made and will serve the purpose of being used for comparison reasons so
|
2023-08-23 20:47:45 +08:00
|
|
|
that subsequent bound-requested connections aren't accidentally reusing
|
2011-03-25 23:00:41 +08:00
|
|
|
wrong connections. */
|
|
|
|
char *localdev;
|
2022-12-23 06:25:34 +08:00
|
|
|
unsigned short localportrange;
|
2021-01-26 22:09:22 +08:00
|
|
|
int waitfor; /* current READ/WRITE bits to wait for */
|
|
|
|
#if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)
|
|
|
|
int socks5_gssapi_enctype;
|
2022-08-08 20:41:01 +08:00
|
|
|
#endif
|
2022-12-30 16:14:55 +08:00
|
|
|
/* The field below gets set in connect.c:connecthost() */
|
2022-08-08 20:41:01 +08:00
|
|
|
int remote_port; /* the remote port, not the proxy port! */
|
|
|
|
int conn_to_port; /* the remote port to connect to. valid only if
|
|
|
|
bits.conn_to_port is set */
|
2024-04-11 20:01:58 +08:00
|
|
|
#ifdef USE_IPV6
|
2022-08-08 20:41:01 +08:00
|
|
|
unsigned int scope_id; /* Scope id for IPv6 */
|
2020-12-14 21:10:33 +08:00
|
|
|
#endif
|
2021-01-26 22:09:22 +08:00
|
|
|
unsigned short localport;
|
2022-08-08 20:41:01 +08:00
|
|
|
unsigned short secondary_port; /* secondary socket remote port to connect to
|
|
|
|
(ftp) */
|
2022-09-01 15:23:22 +08:00
|
|
|
unsigned char alpn; /* APLN TLS negotiated protocol, a CURL_HTTP_VERSION*
|
|
|
|
value */
|
2023-04-06 15:54:57 +08:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
|
|
|
unsigned char proxy_alpn; /* APLN of proxy tunnel, CURL_HTTP_VERSION* */
|
|
|
|
#endif
|
2022-08-08 20:41:01 +08:00
|
|
|
unsigned char transport; /* one of the TRNSPRT_* defines */
|
|
|
|
unsigned char ip_version; /* copied from the Curl_easy at creation time */
|
|
|
|
unsigned char httpversion; /* the HTTP version*10 reported by the server */
|
2022-09-09 21:11:14 +08:00
|
|
|
unsigned char connect_only;
|
2023-03-10 16:22:43 +08:00
|
|
|
unsigned char gssapi_delegation; /* inherited from set.gssapi_delegation */
|
2001-08-31 06:48:34 +08:00
|
|
|
};
|
2001-02-21 01:35:51 +08:00
|
|
|
|
2023-08-03 23:32:25 +08:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
|
|
|
#define CURL_CONN_HOST_DISPNAME(c) \
|
|
|
|
((c)->bits.socksproxy ? (c)->socks_proxy.host.dispname : \
|
|
|
|
(c)->bits.httpproxy ? (c)->http_proxy.host.dispname : \
|
|
|
|
(c)->bits.conn_to_host ? (c)->conn_to_host.dispname : \
|
|
|
|
(c)->host.dispname)
|
|
|
|
#else
|
|
|
|
#define CURL_CONN_HOST_DISPNAME(c) \
|
|
|
|
(c)->bits.conn_to_host ? (c)->conn_to_host.dispname : \
|
2023-08-04 15:59:18 +08:00
|
|
|
(c)->host.dispname
|
2023-08-03 23:32:25 +08:00
|
|
|
#endif
|
|
|
|
|
2003-06-26 19:31:50 +08:00
|
|
|
/* The end of connectdata. */
|
2002-09-03 06:31:18 +08:00
|
|
|
|
2001-08-31 06:48:34 +08:00
|
|
|
/*
|
|
|
|
* Struct to keep statistical and informational data.
|
2016-11-06 11:05:52 +08:00
|
|
|
* All variables in this struct must be initialized/reset in Curl_initinfo().
|
2001-08-31 06:48:34 +08:00
|
|
|
*/
|
|
|
|
struct PureInfo {
|
2016-08-21 03:20:32 +08:00
|
|
|
int httpcode; /* Recent HTTP, FTP, RTSP or SMTP response code */
|
2008-05-01 05:20:08 +08:00
|
|
|
int httpproxycode; /* response code from proxy when received separate */
|
|
|
|
int httpversion; /* the http version number X.Y = X*10+Y */
|
2018-01-26 06:05:24 +08:00
|
|
|
time_t filetime; /* If requested, this is might get set. Set to -1 if the
|
|
|
|
time was unretrievable. */
|
2019-02-28 18:36:26 +08:00
|
|
|
curl_off_t request_size; /* the amount of bytes sent in the request(s) */
|
2012-04-19 05:04:35 +08:00
|
|
|
unsigned long proxyauthavail; /* what proxy auth types were announced */
|
|
|
|
unsigned long httpauthavail; /* what host auth types were announced */
|
2004-10-19 23:30:08 +08:00
|
|
|
long numconnects; /* how many new connection did libcurl created */
|
2002-01-29 18:49:32 +08:00
|
|
|
char *contenttype; /* the content type of the object */
|
2008-05-01 05:20:08 +08:00
|
|
|
char *wouldredirect; /* URL this would've been redirected to if asked to */
|
2019-08-06 17:30:08 +08:00
|
|
|
curl_off_t retry_after; /* info from Retry-After: header */
|
2023-08-03 05:34:48 +08:00
|
|
|
unsigned int header_size; /* size of read header(s) in bytes */
|
2010-11-30 13:20:54 +08:00
|
|
|
|
2024-03-08 17:45:14 +08:00
|
|
|
/* PureInfo primary ip_quadruple is copied over from the connectdata
|
|
|
|
struct in order to allow curl_easy_getinfo() to return this information
|
|
|
|
even when the session handle is no longer associated with a connection,
|
|
|
|
and also allow curl_easy_reset() to clear this information from the
|
|
|
|
session handle without disturbing information which is still alive, and
|
|
|
|
that might be reused, in the connection cache. */
|
|
|
|
struct ip_quadruple primary;
|
2022-04-25 22:24:33 +08:00
|
|
|
int conn_remote_port; /* this is the "remote port", which is the port
|
|
|
|
number of the used URL, independent of proxy or
|
|
|
|
not */
|
2016-11-23 17:44:18 +08:00
|
|
|
const char *conn_scheme;
|
|
|
|
unsigned int conn_protocol;
|
2023-07-30 05:44:28 +08:00
|
|
|
struct curl_certinfo certs; /* info about the certs. Asked for with
|
|
|
|
CURLOPT_CERTINFO / CURLINFO_CERTINFO */
|
2020-08-24 14:39:29 +08:00
|
|
|
CURLproxycode pxcode;
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(timecond); /* set to TRUE if the time condition didn't match, which
|
|
|
|
thus made the document NOT get fetched */
|
2024-02-22 15:38:53 +08:00
|
|
|
BIT(used_proxy); /* the transfer used a proxy */
|
2000-05-22 22:12:12 +08:00
|
|
|
};
|
|
|
|
|
2001-08-31 06:48:34 +08:00
|
|
|
|
2000-02-15 07:13:15 +08:00
|
|
|
struct Progress {
|
2016-11-11 17:19:22 +08:00
|
|
|
time_t lastshow; /* time() of the last displayed progress meter or NULL to
|
|
|
|
force redraw at next call */
|
2004-03-11 00:20:33 +08:00
|
|
|
curl_off_t size_dl; /* total expected size */
|
|
|
|
curl_off_t size_ul; /* total expected size */
|
2011-04-19 21:54:13 +08:00
|
|
|
curl_off_t downloaded; /* transferred so far */
|
|
|
|
curl_off_t uploaded; /* transferred so far */
|
2000-02-15 07:13:15 +08:00
|
|
|
|
2004-03-12 05:48:15 +08:00
|
|
|
curl_off_t current_speed; /* uses the currently fastest transfer */
|
2000-02-15 07:13:15 +08:00
|
|
|
|
|
|
|
int width; /* screen width at download start */
|
2013-01-04 09:50:28 +08:00
|
|
|
int flags; /* see progress.h */
|
2001-10-12 20:31:43 +08:00
|
|
|
|
2019-07-31 21:30:31 +08:00
|
|
|
timediff_t timespent;
|
2001-10-12 20:31:43 +08:00
|
|
|
|
2004-03-12 05:48:15 +08:00
|
|
|
curl_off_t dlspeed;
|
|
|
|
curl_off_t ulspeed;
|
2000-03-02 06:06:57 +08:00
|
|
|
|
2023-12-27 16:28:48 +08:00
|
|
|
timediff_t t_postqueue;
|
2019-07-31 21:30:31 +08:00
|
|
|
timediff_t t_nslookup;
|
|
|
|
timediff_t t_connect;
|
|
|
|
timediff_t t_appconnect;
|
|
|
|
timediff_t t_pretransfer;
|
|
|
|
timediff_t t_starttransfer;
|
|
|
|
timediff_t t_redirect;
|
2000-09-26 05:49:37 +08:00
|
|
|
|
2017-07-28 21:49:36 +08:00
|
|
|
struct curltime start;
|
|
|
|
struct curltime t_startsingle;
|
|
|
|
struct curltime t_startop;
|
|
|
|
struct curltime t_acceptdata;
|
2016-08-17 02:32:02 +08:00
|
|
|
|
2017-06-22 01:15:46 +08:00
|
|
|
|
2016-08-17 02:32:02 +08:00
|
|
|
/* upload speed limit */
|
2017-07-28 21:49:36 +08:00
|
|
|
struct curltime ul_limit_start;
|
2016-08-17 02:32:02 +08:00
|
|
|
curl_off_t ul_limit_size;
|
|
|
|
/* download speed limit */
|
2017-07-28 21:49:36 +08:00
|
|
|
struct curltime dl_limit_start;
|
2016-08-17 02:32:02 +08:00
|
|
|
curl_off_t dl_limit_size;
|
|
|
|
|
2017-09-10 05:55:08 +08:00
|
|
|
#define CURR_TIME (5 + 1) /* 6 entries for 5 seconds */
|
2000-09-26 05:49:37 +08:00
|
|
|
|
2004-03-11 00:20:33 +08:00
|
|
|
curl_off_t speeder[ CURR_TIME ];
|
2017-07-28 21:49:36 +08:00
|
|
|
struct curltime speeder_time[ CURR_TIME ];
|
2000-09-26 05:49:37 +08:00
|
|
|
int speeder_c;
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(callback); /* set when progress callback is used */
|
|
|
|
BIT(is_t_startransfer_set);
|
2000-02-15 07:13:15 +08:00
|
|
|
};
|
|
|
|
|
2010-01-21 21:58:30 +08:00
|
|
|
typedef enum {
|
|
|
|
RTSPREQ_NONE, /* first in list */
|
|
|
|
RTSPREQ_OPTIONS,
|
|
|
|
RTSPREQ_DESCRIBE,
|
|
|
|
RTSPREQ_ANNOUNCE,
|
|
|
|
RTSPREQ_SETUP,
|
|
|
|
RTSPREQ_PLAY,
|
|
|
|
RTSPREQ_PAUSE,
|
|
|
|
RTSPREQ_TEARDOWN,
|
|
|
|
RTSPREQ_GET_PARAMETER,
|
|
|
|
RTSPREQ_SET_PARAMETER,
|
|
|
|
RTSPREQ_RECORD,
|
|
|
|
RTSPREQ_RECEIVE,
|
|
|
|
RTSPREQ_LAST /* last in list */
|
|
|
|
} Curl_RtspReq;
|
|
|
|
|
2004-05-04 15:52:53 +08:00
|
|
|
struct auth {
|
2012-04-19 05:04:35 +08:00
|
|
|
unsigned long want; /* Bitmask set to the authentication methods wanted by
|
|
|
|
app (with CURLOPT_HTTPAUTH or CURLOPT_PROXYAUTH). */
|
|
|
|
unsigned long picked;
|
|
|
|
unsigned long avail; /* Bitmask for what the server reports to support for
|
|
|
|
this resource */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(done); /* TRUE when the auth phase is done and ready to do the
|
|
|
|
actual request */
|
|
|
|
BIT(multipass); /* TRUE if this is not yet authenticated but within the
|
|
|
|
auth multipass negotiation */
|
|
|
|
BIT(iestyle); /* TRUE if digest should be done IE-style or FALSE if it
|
|
|
|
should be RFC compliant */
|
2004-05-04 15:52:53 +08:00
|
|
|
};
|
|
|
|
|
2022-12-30 16:14:55 +08:00
|
|
|
#ifdef USE_NGHTTP2
|
|
|
|
struct Curl_data_prio_node {
|
|
|
|
struct Curl_data_prio_node *next;
|
2016-11-15 07:32:00 +08:00
|
|
|
struct Curl_easy *data;
|
|
|
|
};
|
2022-12-30 16:14:55 +08:00
|
|
|
#endif
|
|
|
|
|
|
|
|
/**
|
|
|
|
* Priority information for an easy handle in relation to others
|
|
|
|
* on the same connection.
|
|
|
|
* TODO: we need to adapt it to the new priority scheme as defined in RFC 9218
|
|
|
|
*/
|
|
|
|
struct Curl_data_priority {
|
|
|
|
#ifdef USE_NGHTTP2
|
|
|
|
/* tree like dependencies only implemented in nghttp2 */
|
|
|
|
struct Curl_easy *parent;
|
|
|
|
struct Curl_data_prio_node *children;
|
|
|
|
#endif
|
|
|
|
int weight;
|
|
|
|
#ifdef USE_NGHTTP2
|
|
|
|
BIT(exclusive);
|
|
|
|
#endif
|
|
|
|
};
|
2016-11-15 07:32:00 +08:00
|
|
|
|
2017-05-09 18:47:49 +08:00
|
|
|
/* Timers */
|
|
|
|
typedef enum {
|
|
|
|
EXPIRE_100_TIMEOUT,
|
|
|
|
EXPIRE_ASYNC_NAME,
|
|
|
|
EXPIRE_CONNECTTIMEOUT,
|
2020-06-15 22:17:55 +08:00
|
|
|
EXPIRE_DNS_PER_NAME, /* family1 */
|
|
|
|
EXPIRE_DNS_PER_NAME2, /* family2 */
|
2019-01-16 02:39:41 +08:00
|
|
|
EXPIRE_HAPPY_EYEBALLS_DNS, /* See asyn-ares.c */
|
2017-05-09 18:47:49 +08:00
|
|
|
EXPIRE_HAPPY_EYEBALLS,
|
|
|
|
EXPIRE_MULTI_PENDING,
|
|
|
|
EXPIRE_RUN_NOW,
|
|
|
|
EXPIRE_SPEEDCHECK,
|
|
|
|
EXPIRE_TIMEOUT,
|
|
|
|
EXPIRE_TOOFAST,
|
2019-08-07 18:49:27 +08:00
|
|
|
EXPIRE_QUIC,
|
2022-07-20 03:03:48 +08:00
|
|
|
EXPIRE_FTP_ACCEPT,
|
connections: introduce http/3 happy eyeballs
New cfilter HTTP-CONNECT for h3/h2/http1.1 eyeballing.
- filter is installed when `--http3` in the tool is used (or
the equivalent CURLOPT_ done in the library)
- starts a QUIC/HTTP/3 connect right away. Should that not
succeed after 100ms (subject to change), a parallel attempt
is started for HTTP/2 and HTTP/1.1 via TCP
- both attempts are subject to IPv6/IPv4 eyeballing, same
as happens for other connections
- tie timeout to the ip-version HAPPY_EYEBALLS_TIMEOUT
- use a `soft` timeout at half the value. When the soft timeout
expires, the HTTPS-CONNECT filter checks if the QUIC filter
has received any data from the server. If not, it will start
the HTTP/2 attempt.
HTTP/3(ngtcp2) improvements.
- setting call_data in all cfilter calls similar to http/2 and vtls filters
for use in callback where no stream data is available.
- returning CURLE_PARTIAL_FILE for prematurely terminated transfers
- enabling pytest test_05 for h3
- shifting functionality to "connect" UDP sockets from ngtcp2
implementation into the udp socket cfilter. Because unconnected
UDP sockets are weird. For example they error when adding to a
pollset.
HTTP/3(quiche) improvements.
- fixed upload bug in quiche implementation, now passes 251 and pytest
- error codes on stream RESET
- improved debug logs
- handling of DRAIN during connect
- limiting pending event queue
HTTP/2 cfilter improvements.
- use LOG_CF macros for dynamic logging in debug build
- fix CURLcode on RST streams to be CURLE_PARTIAL_FILE
- enable pytest test_05 for h2
- fix upload pytests and improve parallel transfer performance.
GOAWAY handling for ngtcp2/quiche
- during connect, when the remote server refuses to accept new connections
and closes immediately (so the local conn goes into DRAIN phase), the
connection is torn down and a another attempt is made after a short grace
period.
This is the behaviour observed with nghttpx when we tell it to shut
down gracefully. Tested in pytest test_03_02.
TLS improvements
- ALPN selection for SSL/SSL-PROXY filters in one vtls set of functions, replaces
copy of logic in all tls backends.
- standardized the infof logging of offered ALPNs
- ALPN negotiated: have common function for all backends that sets alpn proprty
and connection related things based on the negotiated protocol (or lack thereof).
- new tests/tests-httpd/scorecard.py for testing h3/h2 protocol implementation.
Invoke:
python3 tests/tests-httpd/scorecard.py --help
for usage.
Improvements on gathering connect statistics and socket access.
- new CF_CTRL_CONN_REPORT_STATS cfilter control for having cfilters
report connection statistics. This is triggered when the connection
has completely connected.
- new void Curl_pgrsTimeWas(..) method to report a timer update with
a timestamp of when it happend. This allows for updating timers
"later", e.g. a connect statistic after full connectivity has been
reached.
- in case of HTTP eyeballing, the previous changes will update
statistics only from the filter chain that "won" the eyeballing.
- new cfilter query CF_QUERY_SOCKET for retrieving the socket used
by a filter chain.
Added methods Curl_conn_cf_get_socket() and Curl_conn_get_socket()
for convenient use of this query.
- Change VTLS backend to query their sub-filters for the socket when
checks during the handshake are made.
HTTP/3 documentation on how https eyeballing works.
TLS improvements
- ALPN selection for SSL/SSL-PROXY filters in one vtls set of functions, replaces
copy of logic in all tls backends.
- standardized the infof logging of offered ALPNs
- ALPN negotiated: have common function for all backends that sets alpn proprty
and connection related things based on the negotiated protocol (or lack thereof).
Scorecard with Caddy.
- configure can be run with `--with-test-caddy=path` to specify which caddy to use for testing
- tests/tests-httpd/scorecard.py now measures download speeds with caddy
pytest improvements
- adding Makfile to clean gen dir
- adding nghttpx rundir creation on start
- checking httpd version 2.4.55 for test_05 cases where it is needed. Skipping with message if too old.
- catch exception when checking for caddy existance on system.
Closes #10349
2023-02-02 00:13:12 +08:00
|
|
|
EXPIRE_ALPN_EYEBALLS,
|
2017-05-09 18:47:49 +08:00
|
|
|
EXPIRE_LAST /* not an actual timer, used as a marker only */
|
|
|
|
} expire_id;
|
|
|
|
|
2018-12-06 17:18:03 +08:00
|
|
|
|
|
|
|
typedef enum {
|
|
|
|
TRAILERS_NONE,
|
|
|
|
TRAILERS_INITIALIZED,
|
|
|
|
TRAILERS_SENDING,
|
|
|
|
TRAILERS_DONE
|
|
|
|
} trailers_state;
|
|
|
|
|
|
|
|
|
2017-05-09 18:47:49 +08:00
|
|
|
/*
|
|
|
|
* One instance for each timeout an easy handle can set.
|
|
|
|
*/
|
|
|
|
struct time_node {
|
2020-09-02 18:06:20 +08:00
|
|
|
struct Curl_llist_element list;
|
2017-07-28 21:49:36 +08:00
|
|
|
struct curltime time;
|
2017-05-09 18:47:49 +08:00
|
|
|
expire_id eid;
|
|
|
|
};
|
|
|
|
|
2018-09-15 05:33:28 +08:00
|
|
|
/* individual pieces of the URL */
|
|
|
|
struct urlpieces {
|
|
|
|
char *scheme;
|
|
|
|
char *hostname;
|
|
|
|
char *port;
|
|
|
|
char *user;
|
|
|
|
char *password;
|
|
|
|
char *options;
|
|
|
|
char *path;
|
|
|
|
char *query;
|
|
|
|
};
|
|
|
|
|
2001-08-31 06:48:34 +08:00
|
|
|
struct UrlState {
|
2012-12-06 19:12:04 +08:00
|
|
|
/* Points to the connection cache */
|
|
|
|
struct conncache *conn_cache;
|
2001-08-31 06:48:34 +08:00
|
|
|
/* buffers to store authentication data in, as parsed from input options */
|
2017-07-28 21:49:36 +08:00
|
|
|
struct curltime keeps_speed; /* for the progress meter really */
|
2001-08-31 06:48:34 +08:00
|
|
|
|
2023-05-23 18:48:58 +08:00
|
|
|
curl_off_t lastconnect_id; /* The last connection, -1 if undefined */
|
|
|
|
curl_off_t recent_conn_id; /* The most recent connection used, might no
|
|
|
|
* longer exist */
|
2020-05-02 23:04:08 +08:00
|
|
|
struct dynbuf headerb; /* buffer to store headers in */
|
2023-11-13 19:37:50 +08:00
|
|
|
struct curl_slist *hstslist; /* list of HSTS files set by
|
|
|
|
curl_easy_setopt(HSTS) calls */
|
2017-03-26 23:02:22 +08:00
|
|
|
curl_off_t current_speed; /* the ProgressShow() function sets this,
|
2004-03-24 00:01:31 +08:00
|
|
|
bytes / second */
|
2022-04-25 19:05:40 +08:00
|
|
|
|
|
|
|
/* host name, port number and protocol of the first (not followed) request.
|
|
|
|
if set, this should be the host name that we will sent authorization to,
|
|
|
|
no else. Used to make Location: following not keep sending user+password.
|
|
|
|
This is strdup()ed data. */
|
|
|
|
char *first_host;
|
|
|
|
int first_remote_port;
|
2022-09-12 15:57:01 +08:00
|
|
|
curl_prot_t first_remote_protocol;
|
2022-04-25 19:05:40 +08:00
|
|
|
|
2021-03-26 21:25:45 +08:00
|
|
|
int retrycount; /* number of retries on a new connection */
|
2020-09-02 18:17:49 +08:00
|
|
|
struct Curl_ssl_session *session; /* array of 'max_ssl_sessions' size */
|
2001-09-06 16:32:01 +08:00
|
|
|
long sessionage; /* number of the most recent session */
|
2004-10-01 05:01:23 +08:00
|
|
|
int os_errno; /* filled in with errno whenever an error occurs */
|
2021-01-17 05:17:51 +08:00
|
|
|
char *scratch; /* huge buffer[set.buffer_size*2] for upload CRLF replacing */
|
2021-02-09 06:00:21 +08:00
|
|
|
long followlocation; /* redirect counter */
|
2022-03-17 17:20:19 +08:00
|
|
|
int requests; /* request counter: redirects + authentication retakes */
|
2002-01-03 23:01:22 +08:00
|
|
|
#ifdef HAVE_SIGNAL
|
|
|
|
/* storage for the previous bag^H^H^HSIGPIPE signal handler :-) */
|
|
|
|
void (*prev_signal)(int sig);
|
|
|
|
#endif
|
2023-07-20 22:09:04 +08:00
|
|
|
#ifndef CURL_DISABLE_DIGEST_AUTH
|
2007-11-21 06:57:24 +08:00
|
|
|
struct digestdata digest; /* state data for host Digest auth */
|
|
|
|
struct digestdata proxydigest; /* state data for proxy Digest auth */
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
2007-11-21 06:57:24 +08:00
|
|
|
struct auth authhost; /* auth details for host */
|
|
|
|
struct auth authproxy; /* auth details for proxy */
|
2023-12-15 06:25:09 +08:00
|
|
|
#ifdef USE_CURL_ASYNC
|
|
|
|
struct Curl_async async; /* asynchronous name resolver data */
|
|
|
|
#endif
|
2004-12-14 17:36:22 +08:00
|
|
|
|
2018-06-08 22:36:47 +08:00
|
|
|
#if defined(USE_OPENSSL)
|
vtls: encapsulate SSL backend-specific data
So far, all of the SSL backends' private data has been declared as
part of the ssl_connect_data struct, in one big #if .. #elif .. #endif
block.
This can only work as long as the SSL backend is a compile-time option,
something we want to change in the next commits.
Therefore, let's encapsulate the exact data needed by each SSL backend
into a private struct, and let's avoid bleeding any SSL backend-specific
information into urldata.h. This is also necessary to allow multiple SSL
backends to be compiled in at the same time, as e.g. OpenSSL's and
CyaSSL's headers cannot be included in the same .c file.
To avoid too many malloc() calls, we simply append the private structs
to the connectdata struct in allocate_conn().
This requires us to take extra care of alignment issues: struct fields
often need to be aligned on certain boundaries e.g. 32-bit values need to
be stored at addresses that divide evenly by 4 (= 32 bit / 8
bit-per-byte).
We do that by assuming that no SSL backend's private data contains any
fields that need to be aligned on boundaries larger than `long long`
(typically 64-bit) would need. Under this assumption, we simply add a
dummy field of type `long long` to the `struct connectdata` struct. This
field will never be accessed but acts as a placeholder for the four
instances of ssl_backend_data instead. the size of each ssl_backend_data
struct is stored in the SSL backend-specific metadata, to allow
allocate_conn() to know how much extra space to allocate, and how to
initialize the ssl[sockindex]->backend and proxy_ssl[sockindex]->backend
pointers.
This would appear to be a little complicated at first, but is really
necessary to encapsulate the private data of each SSL backend correctly.
And we need to encapsulate thusly if we ever want to allow selecting
CyaSSL and OpenSSL at runtime, as their headers cannot be included within
the same .c file (there are just too many conflicting definitions and
declarations for that).
Signed-off-by: Johannes Schindelin <johannes.schindelin@gmx.de>
2017-07-29 04:09:35 +08:00
|
|
|
/* void instead of ENGINE to avoid bleeding OpenSSL into this header */
|
|
|
|
void *engine;
|
2015-03-05 17:57:52 +08:00
|
|
|
#endif /* USE_OPENSSL */
|
2017-07-28 21:49:36 +08:00
|
|
|
struct curltime expiretime; /* set this with Curl_expire() only */
|
2006-04-10 23:00:53 +08:00
|
|
|
struct Curl_tree timenode; /* for the splay stuff */
|
2020-09-02 18:06:20 +08:00
|
|
|
struct Curl_llist timeoutlist; /* list of pending timeouts */
|
2017-05-09 18:47:49 +08:00
|
|
|
struct time_node expires[EXPIRE_LAST]; /* nodes for each expire type */
|
2006-03-22 06:30:03 +08:00
|
|
|
|
2022-06-01 20:30:55 +08:00
|
|
|
/* a place to store the most recently set (S)FTP entrypath */
|
2006-03-22 06:30:03 +08:00
|
|
|
char *most_recent_ftp_entrypath;
|
2023-11-22 00:54:49 +08:00
|
|
|
#if !defined(_WIN32) && !defined(MSDOS) && !defined(__EMX__)
|
2006-04-26 15:40:37 +08:00
|
|
|
/* do FTP line-end conversions on most platforms */
|
|
|
|
#define CURL_DO_LINEEND_CONV
|
|
|
|
/* for FTP downloads: how many CRLFs did we converted to LFs? */
|
2006-04-26 21:08:12 +08:00
|
|
|
curl_off_t crlf_conversions;
|
2006-04-26 15:40:37 +08:00
|
|
|
#endif
|
2007-11-25 07:16:55 +08:00
|
|
|
char *range; /* range, if used. See README for detailed specification on
|
|
|
|
this syntax. */
|
|
|
|
curl_off_t resume_from; /* continue [ftp] transfer from here */
|
|
|
|
|
2022-06-01 20:30:55 +08:00
|
|
|
#ifndef CURL_DISABLE_RTSP
|
2010-01-21 21:58:30 +08:00
|
|
|
/* This RTSP state information survives requests and connections */
|
|
|
|
long rtsp_next_client_CSeq; /* the session's next client CSeq */
|
|
|
|
long rtsp_next_server_CSeq; /* the session's next server CSeq */
|
|
|
|
long rtsp_CSeq_recv; /* most recent CSeq received */
|
2023-03-21 15:45:59 +08:00
|
|
|
|
|
|
|
unsigned char rtp_channel_mask[32]; /* for the correctness checking of the
|
|
|
|
interleaved data */
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
2010-01-21 21:58:30 +08:00
|
|
|
|
2014-04-15 19:49:18 +08:00
|
|
|
curl_off_t infilesize; /* size of file to upload, -1 means unknown.
|
|
|
|
Copied from set.filesize at start of operation */
|
2022-06-01 20:30:55 +08:00
|
|
|
#if defined(USE_HTTP2) || defined(USE_HTTP3)
|
2023-02-08 05:50:36 +08:00
|
|
|
struct Curl_data_priority priority; /* shallow copy of data->set */
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
2015-10-06 02:39:10 +08:00
|
|
|
|
|
|
|
curl_read_callback fread_func; /* read callback/function */
|
|
|
|
void *in; /* CURLOPT_READDATA */
|
2018-09-15 05:33:28 +08:00
|
|
|
CURLU *uh; /* URL handle for the current parsed URL */
|
|
|
|
struct urlpieces up;
|
2021-03-26 21:25:45 +08:00
|
|
|
char *url; /* work URL, copied from UserDefined */
|
|
|
|
char *referer; /* referer string */
|
|
|
|
struct curl_slist *resolve; /* set to point to the set.resolve list when
|
|
|
|
this should be dealt with in pretransfer */
|
2020-12-18 20:18:14 +08:00
|
|
|
#ifndef CURL_DISABLE_HTTP
|
2023-08-16 16:43:02 +08:00
|
|
|
curl_mimepart *mimepost;
|
2024-02-10 01:20:47 +08:00
|
|
|
#ifndef CURL_DISABLE_FORM_API
|
2023-11-23 19:41:13 +08:00
|
|
|
curl_mimepart *formp; /* storage for old API form-posting, allocated on
|
2023-08-16 16:43:02 +08:00
|
|
|
demand */
|
2024-02-10 01:20:47 +08:00
|
|
|
#endif
|
2018-12-06 17:18:03 +08:00
|
|
|
size_t trailers_bytes_sent;
|
2020-05-02 23:04:08 +08:00
|
|
|
struct dynbuf trailers_buf; /* a buffer containing the compiled trailing
|
|
|
|
headers */
|
2022-03-17 17:20:19 +08:00
|
|
|
struct Curl_llist httphdrs; /* received headers */
|
2023-03-08 07:33:33 +08:00
|
|
|
struct curl_header headerout[2]; /* for external purposes */
|
2022-05-25 05:33:35 +08:00
|
|
|
struct Curl_header_store *prevhead; /* the latest added header */
|
2018-12-06 17:18:03 +08:00
|
|
|
trailers_state trailers_state; /* whether we are sending trailers
|
2022-06-01 20:30:55 +08:00
|
|
|
and what stage are we at */
|
|
|
|
#endif
|
2023-11-15 05:52:18 +08:00
|
|
|
#ifndef CURL_DISABLE_COOKIES
|
|
|
|
struct curl_slist *cookielist; /* list of cookie files set by
|
|
|
|
curl_easy_setopt(COOKIEFILE) calls */
|
|
|
|
#endif
|
2020-12-14 21:10:33 +08:00
|
|
|
#ifdef USE_HYPER
|
2021-06-09 05:30:57 +08:00
|
|
|
bool hconnect; /* set if a CONNECT request */
|
2020-12-14 21:10:33 +08:00
|
|
|
CURLcode hresult; /* used to pass return codes back from hyper callbacks */
|
|
|
|
#endif
|
2020-06-15 17:28:17 +08:00
|
|
|
|
2023-11-27 18:30:25 +08:00
|
|
|
#ifndef CURL_DISABLE_VERBOSE_STRINGS
|
|
|
|
struct curl_trc_feat *feat; /* opt. trace feature transfer is part of */
|
|
|
|
#endif
|
|
|
|
|
2020-06-15 17:28:17 +08:00
|
|
|
/* Dynamically allocated strings, MUST be freed before this struct is
|
|
|
|
killed. */
|
|
|
|
struct dynamically_allocated_data {
|
|
|
|
char *uagent;
|
|
|
|
char *accept_encoding;
|
|
|
|
char *userpwd;
|
|
|
|
char *rangeline;
|
|
|
|
char *ref;
|
|
|
|
char *host;
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifndef CURL_DISABLE_COOKIES
|
2020-06-15 17:28:17 +08:00
|
|
|
char *cookiehost;
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_RTSP
|
2020-06-15 17:28:17 +08:00
|
|
|
char *rtsp_transport;
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2020-06-15 17:28:17 +08:00
|
|
|
char *te; /* TE: request header */
|
2021-02-12 17:27:42 +08:00
|
|
|
|
|
|
|
/* transfer credentials */
|
|
|
|
char *user;
|
|
|
|
char *passwd;
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
|
|
|
char *proxyuserpwd;
|
2021-02-12 17:27:42 +08:00
|
|
|
char *proxyuser;
|
|
|
|
char *proxypasswd;
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2020-06-15 17:28:17 +08:00
|
|
|
} aptr;
|
|
|
|
|
2023-04-26 00:04:46 +08:00
|
|
|
unsigned char httpwant; /* when non-zero, a specific HTTP version requested
|
|
|
|
to be used in the library's request(s) */
|
|
|
|
unsigned char httpversion; /* the lowest HTTP version*10 reported by any
|
|
|
|
server involved in this request */
|
|
|
|
unsigned char httpreq; /* Curl_HttpReq; what kind of HTTP request (if any)
|
|
|
|
is this */
|
2023-12-13 18:25:20 +08:00
|
|
|
unsigned char select_bits; /* != 0 -> bitmask of socket events for this
|
2023-04-26 00:04:46 +08:00
|
|
|
transfer overriding anything the socket may
|
|
|
|
report */
|
2024-05-20 20:21:05 +08:00
|
|
|
#ifdef DEBUGBUILD
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(conncache_lock);
|
2019-02-25 18:17:53 +08:00
|
|
|
#endif
|
|
|
|
/* when curl_easy_perform() is called, the multi handle is "owned" by
|
|
|
|
the easy handle so curl_easy_cleanup() on such an easy handle will
|
|
|
|
also close the multi handle! */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(multi_owned_by_easy);
|
2019-02-25 18:17:53 +08:00
|
|
|
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(this_is_a_follow); /* this is a followed Location: request */
|
|
|
|
BIT(refused_stream); /* this was refused, try again */
|
|
|
|
BIT(errorbuf); /* Set to TRUE if the error buffer is already filled in.
|
2019-02-25 18:17:53 +08:00
|
|
|
This must be set to FALSE every time _easy_perform() is
|
|
|
|
called. */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(allow_port); /* Is set.use_port allowed to take effect or not. This
|
2019-02-25 18:17:53 +08:00
|
|
|
is always set TRUE when curl_easy_perform() is called. */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(authproblem); /* TRUE if there's some problem authenticating */
|
2019-02-25 18:17:53 +08:00
|
|
|
/* set after initial USER failure, to prevent an authentication loop */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(wildcardmatch); /* enable wildcard matching */
|
2020-02-27 05:48:09 +08:00
|
|
|
BIT(disableexpect); /* TRUE if Expect: is disabled due to a previous
|
|
|
|
417 response */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(use_range);
|
|
|
|
BIT(rangestringalloc); /* the range string is malloc()'ed */
|
|
|
|
BIT(done); /* set to FALSE when Curl_init_do() is called and set to TRUE
|
2021-03-26 21:25:45 +08:00
|
|
|
when multi_done() is called, to prevent multi_done() to get
|
|
|
|
invoked twice when the multi interface is used. */
|
2023-08-17 20:18:06 +08:00
|
|
|
#ifndef CURL_DISABLE_COOKIES
|
2019-09-27 15:41:43 +08:00
|
|
|
BIT(cookie_engine);
|
2023-08-17 20:18:06 +08:00
|
|
|
#endif
|
2021-02-08 23:40:34 +08:00
|
|
|
BIT(prefer_ascii); /* ASCII rather than binary */
|
2023-08-17 20:18:06 +08:00
|
|
|
#ifdef CURL_LIST_ONLY_PROTOCOL
|
2021-02-08 23:40:34 +08:00
|
|
|
BIT(list_only); /* list directory contents */
|
2023-08-17 20:18:06 +08:00
|
|
|
#endif
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(url_alloc); /* URL string is malloc()'ed */
|
|
|
|
BIT(referer_alloc); /* referer string is malloc()ed */
|
2021-03-26 21:25:45 +08:00
|
|
|
BIT(wildcard_resolve); /* Set to true if any resolve change is a wildcard */
|
2023-04-25 14:28:01 +08:00
|
|
|
BIT(upload); /* upload request */
|
2023-10-20 17:33:08 +08:00
|
|
|
BIT(internal); /* internal: true if this easy handle was created for
|
|
|
|
internal use and the user does not have ownership of the
|
|
|
|
handle. */
|
2001-08-31 06:48:34 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* This 'UserDefined' struct must only contain data that is set once to go
|
2001-02-23 07:32:02 +08:00
|
|
|
* for many (perhaps) independent connections. Values that are generated or
|
2001-08-31 06:48:34 +08:00
|
|
|
* calculated internally for the "session handle" MUST be defined within the
|
2006-03-22 06:30:03 +08:00
|
|
|
* 'struct UrlState' instead. The only exceptions MUST note the changes in
|
2001-08-31 06:48:34 +08:00
|
|
|
* the 'DynamicStatic' struct.
|
2007-08-02 05:20:01 +08:00
|
|
|
* Character pointer fields point to dynamic storage, unless otherwise stated.
|
2000-05-22 22:12:12 +08:00
|
|
|
*/
|
2013-08-02 18:21:11 +08:00
|
|
|
|
2022-09-28 22:51:44 +08:00
|
|
|
struct Curl_multi; /* declared in multihandle.c */
|
2000-05-22 22:12:12 +08:00
|
|
|
|
2007-08-02 05:20:01 +08:00
|
|
|
enum dupstring {
|
2021-02-18 17:13:56 +08:00
|
|
|
STRING_CERT, /* client certificate file name */
|
|
|
|
STRING_CERT_TYPE, /* format for certificate (default: PEM)*/
|
2024-03-26 07:19:23 +08:00
|
|
|
STRING_KEY, /* private key file name */
|
|
|
|
STRING_KEY_PASSWD, /* plain text private key password */
|
|
|
|
STRING_KEY_TYPE, /* format for private key (default: PEM) */
|
|
|
|
STRING_SSL_CAPATH, /* CA directory name (doesn't work on windows) */
|
|
|
|
STRING_SSL_CAFILE, /* certificate file to verify peer against */
|
|
|
|
STRING_SSL_PINNEDPUBLICKEY, /* public key file to verify peer against */
|
|
|
|
STRING_SSL_CIPHER_LIST, /* list of ciphers to use */
|
|
|
|
STRING_SSL_CIPHER13_LIST, /* list of TLS 1.3 ciphers to use */
|
|
|
|
STRING_SSL_CRLFILE, /* crl file to check certificate */
|
|
|
|
STRING_SSL_ISSUERCERT, /* issuer cert file to check certificate */
|
|
|
|
STRING_SERVICE_NAME, /* Service name */
|
|
|
|
#ifndef CURL_DISABLE_PROXY
|
|
|
|
STRING_CERT_PROXY, /* client certificate file name */
|
2016-11-17 01:49:15 +08:00
|
|
|
STRING_CERT_TYPE_PROXY, /* format for certificate (default: PEM)*/
|
2024-03-26 07:19:23 +08:00
|
|
|
STRING_KEY_PROXY, /* private key file name */
|
|
|
|
STRING_KEY_PASSWD_PROXY, /* plain text private key password */
|
|
|
|
STRING_KEY_TYPE_PROXY, /* format for private key (default: PEM) */
|
|
|
|
STRING_SSL_CAPATH_PROXY, /* CA directory name (doesn't work on windows) */
|
|
|
|
STRING_SSL_CAFILE_PROXY, /* certificate file to verify peer against */
|
|
|
|
STRING_SSL_PINNEDPUBLICKEY_PROXY, /* public key file to verify proxy */
|
|
|
|
STRING_SSL_CIPHER_LIST_PROXY, /* list of ciphers to use */
|
|
|
|
STRING_SSL_CIPHER13_LIST_PROXY, /* list of TLS 1.3 ciphers to use */
|
|
|
|
STRING_SSL_CRLFILE_PROXY, /* crl file to check certificate */
|
|
|
|
STRING_SSL_ISSUERCERT_PROXY, /* issuer cert file to check certificate */
|
|
|
|
STRING_PROXY_SERVICE_NAME, /* Proxy service name */
|
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_COOKIES
|
2007-08-02 05:20:01 +08:00
|
|
|
STRING_COOKIE, /* HTTP cookie string to send */
|
|
|
|
STRING_COOKIEJAR, /* dump all cookies to this file */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2010-01-21 21:58:30 +08:00
|
|
|
STRING_CUSTOMREQUEST, /* HTTP/FTP/RTSP request/method to use */
|
2015-08-23 09:49:26 +08:00
|
|
|
STRING_DEFAULT_PROTOCOL, /* Protocol to use when the URL doesn't specify */
|
2007-08-02 05:20:01 +08:00
|
|
|
STRING_DEVICE, /* local network interface/address to use */
|
|
|
|
STRING_ENCODING, /* Accept-Encoding string */
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifndef CURL_DISABLE_FTP
|
2007-08-02 05:20:01 +08:00
|
|
|
STRING_FTP_ACCOUNT, /* ftp account data */
|
|
|
|
STRING_FTP_ALTERNATIVE_TO_USER, /* command to send if USER/PASS fails */
|
|
|
|
STRING_FTPPORT, /* port to send with the FTP PORT command */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#if defined(HAVE_GSSAPI)
|
2007-08-02 05:20:01 +08:00
|
|
|
STRING_KRB_LEVEL, /* krb security level */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_NETRC
|
2007-08-02 05:20:01 +08:00
|
|
|
STRING_NETRC_FILE, /* if not NULL, use this instead of trying to find
|
|
|
|
$HOME/.netrc */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_PROXY
|
2007-08-02 05:20:01 +08:00
|
|
|
STRING_PROXY, /* proxy to use */
|
2016-12-16 23:02:08 +08:00
|
|
|
STRING_PRE_PROXY, /* pre socks proxy to use */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2007-08-02 05:20:01 +08:00
|
|
|
STRING_SET_RANGE, /* range, if used */
|
|
|
|
STRING_SET_REFERER, /* custom string for the HTTP referer field */
|
|
|
|
STRING_SET_URL, /* what original URL to work on */
|
|
|
|
STRING_USERAGENT, /* User-Agent string */
|
2018-08-17 23:39:01 +08:00
|
|
|
STRING_SSL_ENGINE, /* name of ssl engine */
|
2008-10-08 18:39:43 +08:00
|
|
|
STRING_USERNAME, /* <username>, if used */
|
|
|
|
STRING_PASSWORD, /* <password>, if used */
|
2013-04-20 15:47:59 +08:00
|
|
|
STRING_OPTIONS, /* <options>, if used */
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
2008-10-17 11:59:02 +08:00
|
|
|
STRING_PROXYUSERNAME, /* Proxy <username>, if used */
|
|
|
|
STRING_PROXYPASSWORD, /* Proxy <password>, if used */
|
2009-01-26 07:26:25 +08:00
|
|
|
STRING_NOPROXY, /* List of hosts which should not use the proxy, if
|
|
|
|
used */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_RTSP
|
2010-01-21 21:58:30 +08:00
|
|
|
STRING_RTSP_SESSION_ID, /* Session ID to use */
|
|
|
|
STRING_RTSP_STREAM_URI, /* Stream URI for this request */
|
|
|
|
STRING_RTSP_TRANSPORT, /* Transport for this session */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#ifdef USE_SSH
|
2009-07-23 06:49:01 +08:00
|
|
|
STRING_SSH_PRIVATE_KEY, /* path to the private key file for auth */
|
|
|
|
STRING_SSH_PUBLIC_KEY, /* path to the public key file for auth */
|
|
|
|
STRING_SSH_HOST_PUBLIC_KEY_MD5, /* md5 of host public key in ascii hex */
|
2021-09-27 05:20:53 +08:00
|
|
|
STRING_SSH_HOST_PUBLIC_KEY_SHA256, /* sha256 of host public key in base64 */
|
2009-07-23 06:49:01 +08:00
|
|
|
STRING_SSH_KNOWNHOSTS, /* file name of knownhosts file */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_SMTP
|
2009-12-13 05:54:01 +08:00
|
|
|
STRING_MAIL_FROM,
|
2011-10-06 05:22:29 +08:00
|
|
|
STRING_MAIL_AUTH,
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#ifdef USE_TLS_SRP
|
2021-02-18 17:13:56 +08:00
|
|
|
STRING_TLSAUTH_USERNAME, /* TLS auth <username> */
|
|
|
|
STRING_TLSAUTH_PASSWORD, /* TLS auth <password> */
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
|
|
|
STRING_TLSAUTH_USERNAME_PROXY, /* TLS auth <username> */
|
2016-11-17 01:49:15 +08:00
|
|
|
STRING_TLSAUTH_PASSWORD_PROXY, /* TLS auth <password> */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#endif
|
2014-12-27 04:45:21 +08:00
|
|
|
STRING_BEARER, /* <bearer>, if used */
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifdef USE_UNIX_SOCKETS
|
2014-12-27 04:45:21 +08:00
|
|
|
STRING_UNIX_SOCKET_PATH, /* path to Unix socket, if used */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2017-06-22 05:35:08 +08:00
|
|
|
STRING_TARGET, /* CURLOPT_REQUEST_TARGET */
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifndef CURL_DISABLE_DOH
|
2018-09-06 15:16:02 +08:00
|
|
|
STRING_DOH, /* CURLOPT_DOH_URL */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_ALTSVC
|
2019-03-03 18:17:52 +08:00
|
|
|
STRING_ALTSVC, /* CURLOPT_ALTSVC */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_HSTS
|
2020-11-03 06:17:01 +08:00
|
|
|
STRING_HSTS, /* CURLOPT_HSTS */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2019-04-18 06:47:51 +08:00
|
|
|
STRING_SASL_AUTHZID, /* CURLOPT_SASL_AUTHZID */
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifdef USE_ARES
|
2020-03-02 21:51:43 +08:00
|
|
|
STRING_DNS_SERVERS,
|
|
|
|
STRING_DNS_INTERFACE,
|
|
|
|
STRING_DNS_LOCAL_IP4,
|
|
|
|
STRING_DNS_LOCAL_IP6,
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2020-08-29 20:09:24 +08:00
|
|
|
STRING_SSL_EC_CURVES,
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifndef CURL_DISABLE_AWS
|
2023-04-25 18:22:55 +08:00
|
|
|
STRING_AWS_SIGV4, /* Parameters for V4 signature */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_PROXY
|
2023-03-16 21:20:11 +08:00
|
|
|
STRING_HAPROXY_CLIENT_IP, /* CURLOPT_HAPROXY_CLIENT_IP */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2024-04-04 21:23:35 +08:00
|
|
|
STRING_ECH_CONFIG, /* CURLOPT_ECH_CONFIG */
|
|
|
|
STRING_ECH_PUBLIC, /* CURLOPT_ECH_PUBLIC */
|
2020-03-02 21:51:43 +08:00
|
|
|
|
2020-06-25 17:38:25 +08:00
|
|
|
/* -- end of null-terminated strings -- */
|
2014-10-17 18:59:32 +08:00
|
|
|
|
|
|
|
STRING_LASTZEROTERMINATED,
|
|
|
|
|
2018-07-13 23:17:19 +08:00
|
|
|
/* -- below this are pointers to binary data that cannot be strdup'ed. --- */
|
2014-10-17 18:59:32 +08:00
|
|
|
|
|
|
|
STRING_COPYPOSTFIELDS, /* if POST, set the fields' values here */
|
|
|
|
|
2007-08-02 05:20:01 +08:00
|
|
|
STRING_LAST /* not used, just an end-of-list marker */
|
|
|
|
};
|
|
|
|
|
2020-05-15 16:47:46 +08:00
|
|
|
enum dupblob {
|
2021-02-18 17:13:56 +08:00
|
|
|
BLOB_CERT,
|
|
|
|
BLOB_KEY,
|
|
|
|
BLOB_SSL_ISSUERCERT,
|
2020-07-13 09:17:56 +08:00
|
|
|
BLOB_CAINFO,
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
|
|
|
BLOB_CERT_PROXY,
|
|
|
|
BLOB_KEY_PROXY,
|
|
|
|
BLOB_SSL_ISSUERCERT_PROXY,
|
2020-07-13 09:17:56 +08:00
|
|
|
BLOB_CAINFO_PROXY,
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2020-05-15 16:47:46 +08:00
|
|
|
BLOB_LAST
|
|
|
|
};
|
|
|
|
|
2018-09-06 15:16:02 +08:00
|
|
|
/* callback that gets called when this easy handle is completed within a multi
|
|
|
|
handle. Only used for internally created transfers, like for example
|
|
|
|
DoH. */
|
|
|
|
typedef int (*multidone_func)(struct Curl_easy *easy, CURLcode result);
|
|
|
|
|
2001-08-31 06:48:34 +08:00
|
|
|
struct UserDefined {
|
2002-04-12 15:21:11 +08:00
|
|
|
FILE *err; /* the stderr user data goes here */
|
|
|
|
void *debugdata; /* the data that will be passed to fdebug */
|
2007-08-02 05:20:01 +08:00
|
|
|
char *errorbuffer; /* (Static) store failure messages in here */
|
2015-05-20 20:33:04 +08:00
|
|
|
void *out; /* CURLOPT_WRITEDATA */
|
2015-10-06 02:39:10 +08:00
|
|
|
void *in_set; /* CURLOPT_READDATA */
|
2006-03-22 06:30:03 +08:00
|
|
|
void *writeheader; /* write the header to this if non-NULL */
|
2022-07-05 01:42:40 +08:00
|
|
|
unsigned short use_port; /* which port to use (when not using default) */
|
2012-04-19 05:04:35 +08:00
|
|
|
unsigned long httpauth; /* kind of HTTP authentication to use (bitmask) */
|
|
|
|
unsigned long proxyauth; /* kind of proxy authentication to use (bitmask) */
|
2005-10-28 06:05:38 +08:00
|
|
|
long maxredirs; /* maximum no. of http(s) redirects to follow, set to -1
|
|
|
|
for infinity */
|
2012-03-30 15:40:04 +08:00
|
|
|
|
2007-10-16 02:32:01 +08:00
|
|
|
void *postfields; /* if POST, set the fields' values here */
|
2008-01-10 18:30:19 +08:00
|
|
|
curl_seek_callback seek_func; /* function that seeks the input */
|
2004-03-12 16:55:47 +08:00
|
|
|
curl_off_t postfieldsize; /* if POST, this might have a size to use instead
|
|
|
|
of strlen(), and then the data *may* be binary
|
|
|
|
(contain zero bytes) */
|
2023-08-17 20:36:30 +08:00
|
|
|
#ifndef CURL_DISABLE_BINDLOCAL
|
2006-01-30 16:24:07 +08:00
|
|
|
unsigned short localport; /* local port number to bind to */
|
2022-12-23 06:25:34 +08:00
|
|
|
unsigned short localportrange; /* number of additional port numbers to test
|
|
|
|
in case the 'localport' one can't be
|
|
|
|
bind()ed */
|
2023-08-17 20:36:30 +08:00
|
|
|
#endif
|
2007-07-24 02:51:22 +08:00
|
|
|
curl_write_callback fwrite_func; /* function that stores the output */
|
2001-08-31 06:48:34 +08:00
|
|
|
curl_write_callback fwrite_header; /* function that stores headers */
|
2010-01-21 21:58:30 +08:00
|
|
|
curl_write_callback fwrite_rtp; /* function that stores interleaved RTP */
|
2015-10-06 02:39:10 +08:00
|
|
|
curl_read_callback fread_func_set; /* function that reads the input */
|
2013-06-15 20:57:01 +08:00
|
|
|
curl_progress_callback fprogress; /* OLD and deprecated progress callback */
|
|
|
|
curl_xferinfo_callback fxferinfo; /* progress callback */
|
2002-04-12 15:21:11 +08:00
|
|
|
curl_debug_callback fdebug; /* function that write informational data */
|
2007-07-24 02:51:22 +08:00
|
|
|
curl_ioctl_callback ioctl_func; /* function for I/O control */
|
2006-08-29 22:39:33 +08:00
|
|
|
curl_sockopt_callback fsockopt; /* function for setting socket options */
|
|
|
|
void *sockopt_client; /* pointer to pass to the socket options callback */
|
2007-10-03 16:45:00 +08:00
|
|
|
curl_opensocket_callback fopensocket; /* function for checking/translating
|
2011-04-20 21:17:42 +08:00
|
|
|
the address and opening the
|
|
|
|
socket */
|
2016-11-23 14:53:24 +08:00
|
|
|
void *opensocket_client;
|
2011-05-17 05:46:43 +08:00
|
|
|
curl_closesocket_callback fclosesocket; /* function for closing the
|
|
|
|
socket */
|
2016-11-23 14:53:24 +08:00
|
|
|
void *closesocket_client;
|
2021-07-22 22:32:30 +08:00
|
|
|
curl_prereq_callback fprereq; /* pre-initial request callback */
|
|
|
|
void *prereq_userp; /* pre-initial request user data */
|
2006-04-08 05:50:47 +08:00
|
|
|
|
2008-01-10 18:30:19 +08:00
|
|
|
void *seek_client; /* pointer to pass to the seek callback */
|
2021-03-08 15:30:32 +08:00
|
|
|
#ifndef CURL_DISABLE_HSTS
|
2020-11-03 06:17:01 +08:00
|
|
|
curl_hstsread_callback hsts_read;
|
|
|
|
void *hsts_read_userp;
|
|
|
|
curl_hstswrite_callback hsts_write;
|
|
|
|
void *hsts_write_userp;
|
|
|
|
#endif
|
2000-05-22 22:12:12 +08:00
|
|
|
void *progress_client; /* pointer to pass to the progress callback */
|
2004-11-27 00:08:15 +08:00
|
|
|
void *ioctl_client; /* pointer to pass to the ioctl callback */
|
2022-07-04 20:58:08 +08:00
|
|
|
unsigned int timeout; /* ms, 0 means no timeout */
|
|
|
|
unsigned int connecttimeout; /* ms, 0 means no timeout */
|
|
|
|
unsigned int happy_eyeballs_timeout; /* ms, 0 is a valid value */
|
|
|
|
unsigned int server_response_timeout; /* ms, 0 means no timeout */
|
2019-04-15 05:20:01 +08:00
|
|
|
long maxage_conn; /* in seconds, max idle time to allow a connection that
|
|
|
|
is to be reused */
|
2021-09-19 00:29:44 +08:00
|
|
|
long maxlifetime_conn; /* in seconds, max time since creation to allow a
|
|
|
|
connection that is to be reused */
|
2022-06-01 20:30:55 +08:00
|
|
|
#ifndef CURL_DISABLE_TFTP
|
2015-08-17 23:54:47 +08:00
|
|
|
long tftp_blksize; /* in bytes, 0 means use default */
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
2014-04-15 19:49:18 +08:00
|
|
|
curl_off_t filesize; /* size of file to upload, -1 means unknown */
|
1999-12-29 22:20:26 +08:00
|
|
|
long low_speed_limit; /* bytes/second */
|
|
|
|
long low_speed_time; /* number of seconds */
|
2006-06-23 05:36:53 +08:00
|
|
|
curl_off_t max_send_speed; /* high speed limit in bytes/second for upload */
|
2011-04-20 21:17:42 +08:00
|
|
|
curl_off_t max_recv_speed; /* high speed limit in bytes/second for
|
|
|
|
download */
|
2004-01-22 20:45:50 +08:00
|
|
|
curl_off_t set_resume_from; /* continue [ftp] transfer from here */
|
2000-06-05 16:23:50 +08:00
|
|
|
struct curl_slist *headers; /* linked list of extra headers */
|
2017-09-03 00:47:10 +08:00
|
|
|
struct curl_httppost *httppost; /* linked list of old POST data */
|
2024-02-10 01:20:47 +08:00
|
|
|
#if !defined(CURL_DISABLE_MIME) || !defined(CURL_DISABLE_FORM_API)
|
2017-09-05 17:45:21 +08:00
|
|
|
curl_mimepart mimepost; /* MIME/POST data. */
|
2024-02-10 01:20:47 +08:00
|
|
|
#endif
|
2022-06-01 20:30:55 +08:00
|
|
|
#ifndef CURL_DISABLE_TELNET
|
2001-02-21 01:35:51 +08:00
|
|
|
struct curl_slist *telnet_options; /* linked list of telnet options */
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
2010-11-06 05:31:40 +08:00
|
|
|
struct curl_slist *resolve; /* list of names to add/remove from
|
|
|
|
DNS cache */
|
2016-01-25 21:37:24 +08:00
|
|
|
struct curl_slist *connect_to; /* list of host:port mappings to override
|
|
|
|
the hostname and port to connect to */
|
2001-01-24 20:10:10 +08:00
|
|
|
time_t timevalue; /* what time to compare with */
|
2022-07-05 06:04:38 +08:00
|
|
|
unsigned char timecondition; /* kind of time comparison: curl_TimeCond */
|
|
|
|
unsigned char method; /* what kind of HTTP request: Curl_HttpReq */
|
2021-02-11 23:30:32 +08:00
|
|
|
unsigned char httpwant; /* when non-zero, a specific HTTP version requested
|
|
|
|
to be used in the library's request(s) */
|
2001-08-31 06:48:34 +08:00
|
|
|
struct ssl_config_data ssl; /* user defined SSL stuff */
|
2020-05-27 17:51:34 +08:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
2016-11-17 01:49:15 +08:00
|
|
|
struct ssl_config_data proxy_ssl; /* user defined SSL stuff for proxy */
|
2022-12-23 06:25:34 +08:00
|
|
|
struct curl_slist *proxyheaders; /* linked list of extra CONNECT headers */
|
|
|
|
unsigned short proxyport; /* If non-zero, use this port number by
|
|
|
|
default. If the proxy string features a
|
|
|
|
":[port]" that one will override this. */
|
|
|
|
unsigned char proxytype; /* what kind of proxy: curl_proxytype */
|
|
|
|
unsigned char socks5auth;/* kind of SOCKS5 authentication to use (bitmask) */
|
2020-05-27 17:51:34 +08:00
|
|
|
#endif
|
2016-11-17 01:49:15 +08:00
|
|
|
struct ssl_general_config general_ssl; /* general user defined SSL stuff */
|
2022-07-05 01:28:49 +08:00
|
|
|
int dns_cache_timeout; /* DNS cache timeout (seconds) */
|
2022-07-05 01:41:52 +08:00
|
|
|
unsigned int buffer_size; /* size of receive buffer to use */
|
2021-05-06 16:25:56 +08:00
|
|
|
unsigned int upload_buffer_size; /* size of upload buffer to use,
|
|
|
|
keep it >= CURL_MAX_WRITE_SIZE */
|
2007-11-21 06:57:24 +08:00
|
|
|
void *private_data; /* application-private data */
|
2022-12-23 00:08:38 +08:00
|
|
|
#ifndef CURL_DISABLE_HTTP
|
2003-01-08 00:15:53 +08:00
|
|
|
struct curl_slist *http200aliases; /* linked list of aliases for http200 */
|
2022-12-23 00:08:38 +08:00
|
|
|
#endif
|
2021-01-26 21:59:01 +08:00
|
|
|
unsigned char ipver; /* the CURL_IPRESOLVE_* defines in the public header
|
|
|
|
file 0 - whatever, 1 - v2, 2 - v6 */
|
2004-01-22 20:45:50 +08:00
|
|
|
curl_off_t max_filesize; /* Maximum file size to download */
|
2019-05-05 23:08:22 +08:00
|
|
|
#ifndef CURL_DISABLE_FTP
|
2022-07-05 06:11:35 +08:00
|
|
|
unsigned char ftp_filemethod; /* how to get to a file: curl_ftpfile */
|
|
|
|
unsigned char ftpsslauth; /* what AUTH XXX to try: curl_ftpauth */
|
|
|
|
unsigned char ftp_ccc; /* FTP CCC options: curl_ftpccc */
|
|
|
|
unsigned int accepttimeout; /* in milliseconds, 0 means no timeout */
|
2019-05-05 23:08:22 +08:00
|
|
|
#endif
|
2022-12-23 06:25:34 +08:00
|
|
|
#if !defined(CURL_DISABLE_FTP) || defined(USE_SSH)
|
|
|
|
struct curl_slist *quote; /* after connection is established */
|
|
|
|
struct curl_slist *postquote; /* after the transfer */
|
|
|
|
struct curl_slist *prequote; /* before the transfer, after type */
|
2022-12-22 23:52:42 +08:00
|
|
|
/* Despite the name, ftp_create_missing_dirs is for FTP(S) and SFTP
|
2022-07-05 05:09:15 +08:00
|
|
|
1 - create directories that don't exist
|
|
|
|
2 - the same but also allow MKD to fail once
|
|
|
|
*/
|
|
|
|
unsigned char ftp_create_missing_dirs;
|
2022-12-22 23:52:42 +08:00
|
|
|
#endif
|
2021-11-04 22:55:47 +08:00
|
|
|
#ifdef USE_LIBSSH2
|
|
|
|
curl_sshhostkeycallback ssh_hostkeyfunc; /* hostkey check callback */
|
|
|
|
void *ssh_hostkeyfunc_userp; /* custom pointer to callback */
|
|
|
|
#endif
|
2022-12-23 00:08:38 +08:00
|
|
|
#ifdef USE_SSH
|
2009-07-23 06:49:01 +08:00
|
|
|
curl_sshkeycallback ssh_keyfunc; /* key matching callback */
|
|
|
|
void *ssh_keyfunc_userp; /* custom pointer to callback */
|
2022-12-23 00:08:38 +08:00
|
|
|
int ssh_auth_types; /* allowed SSH auth types */
|
|
|
|
unsigned int new_directory_perms; /* when creating remote dirs */
|
|
|
|
#endif
|
2021-07-17 23:43:57 +08:00
|
|
|
#ifndef CURL_DISABLE_NETRC
|
2022-07-04 21:03:35 +08:00
|
|
|
unsigned char use_netrc; /* enum CURL_NETRC_OPTION values */
|
2021-07-17 23:43:57 +08:00
|
|
|
#endif
|
2022-05-31 19:42:31 +08:00
|
|
|
unsigned int new_file_perms; /* when creating remote files */
|
2007-08-02 05:20:01 +08:00
|
|
|
char *str[STRING_LAST]; /* array of strings, pointing to allocated memory */
|
2020-05-15 16:47:46 +08:00
|
|
|
struct curl_blob *blobs[BLOB_LAST];
|
2024-04-11 20:01:58 +08:00
|
|
|
#ifdef USE_IPV6
|
2014-12-16 20:29:01 +08:00
|
|
|
unsigned int scope_id; /* Scope id for IPv6 */
|
2022-02-08 03:47:09 +08:00
|
|
|
#endif
|
2022-09-12 15:57:01 +08:00
|
|
|
curl_prot_t allowed_protocols;
|
|
|
|
curl_prot_t redir_protocols;
|
2022-06-01 20:30:55 +08:00
|
|
|
#ifndef CURL_DISABLE_RTSP
|
|
|
|
void *rtp_out; /* write RTP to this if non-NULL */
|
2010-01-21 21:58:30 +08:00
|
|
|
/* Common RTSP header options */
|
|
|
|
Curl_RtspReq rtspreq; /* RTSP request type */
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
|
|
|
#ifndef CURL_DISABLE_FTP
|
2011-04-20 21:17:42 +08:00
|
|
|
curl_chunk_bgn_callback chunk_bgn; /* called before part of transfer
|
|
|
|
starts */
|
2010-05-12 21:33:22 +08:00
|
|
|
curl_chunk_end_callback chunk_end; /* called after part transferring
|
|
|
|
stopped */
|
|
|
|
curl_fnmatch_callback fnmatch; /* callback to decide which file corresponds
|
|
|
|
to pattern (e.g. if WILDCARDMATCH is on) */
|
2010-05-16 08:49:08 +08:00
|
|
|
void *fnmatch_data;
|
2023-02-28 06:44:39 +08:00
|
|
|
void *wildcardptr;
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
2022-12-23 06:25:34 +08:00
|
|
|
/* GSS-API credential delegation, see the documentation of
|
|
|
|
CURLOPT_GSSAPI_DELEGATION */
|
|
|
|
unsigned char gssapi_delegation;
|
2012-01-24 09:28:06 +08:00
|
|
|
|
2022-05-31 19:42:35 +08:00
|
|
|
int tcp_keepidle; /* seconds in idle before sending keepalive probe */
|
|
|
|
int tcp_keepintvl; /* seconds between TCP keepalive probes */
|
2012-12-06 19:12:04 +08:00
|
|
|
|
2014-02-13 17:49:27 +08:00
|
|
|
long expect_100_timeout; /* in milliseconds */
|
2022-12-30 16:14:55 +08:00
|
|
|
#if defined(USE_HTTP2) || defined(USE_HTTP3)
|
|
|
|
struct Curl_data_priority priority;
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
2018-02-15 01:20:43 +08:00
|
|
|
curl_resolver_start_callback resolver_start; /* optional callback called
|
|
|
|
before resolver start */
|
|
|
|
void *resolver_start_client; /* pointer to pass to resolver start callback */
|
2018-04-18 23:40:17 +08:00
|
|
|
long upkeep_interval_ms; /* Time between calls for connection upkeep. */
|
2018-09-06 15:16:02 +08:00
|
|
|
multidone_func fmultidone;
|
2022-06-01 20:30:55 +08:00
|
|
|
#ifndef CURL_DISABLE_DOH
|
2018-09-06 15:16:02 +08:00
|
|
|
struct Curl_easy *dohfor; /* this is a DoH request for that transfer */
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
2018-11-02 02:16:15 +08:00
|
|
|
CURLU *uh; /* URL handle for the current parsed URL */
|
2022-12-23 06:25:34 +08:00
|
|
|
#ifndef CURL_DISABLE_HTTP
|
2018-12-06 17:18:03 +08:00
|
|
|
void *trailer_data; /* pointer to pass to trailer data callback */
|
|
|
|
curl_trailer_callback trailer_callback; /* trailing data callback */
|
2022-12-23 06:25:34 +08:00
|
|
|
#endif
|
2022-05-31 19:42:31 +08:00
|
|
|
char keep_post; /* keep POSTs as POSTs after a 30x request; each
|
|
|
|
bit represents a request, from 301 to 303 */
|
2022-06-01 20:30:55 +08:00
|
|
|
#ifndef CURL_DISABLE_SMTP
|
|
|
|
struct curl_slist *mail_rcpt; /* linked list of mail recipients */
|
|
|
|
BIT(mail_rcpt_allowfails); /* allow RCPT TO command to fail for some
|
|
|
|
recipients */
|
|
|
|
#endif
|
2023-11-22 01:18:27 +08:00
|
|
|
unsigned int maxconnects; /* Max idle connections in the connection cache */
|
2023-03-10 00:47:06 +08:00
|
|
|
unsigned char use_ssl; /* if AUTH TLS is to be attempted etc, for FTP or
|
|
|
|
IMAP or POP3 or others! (type: curl_usessl)*/
|
2022-09-09 21:11:14 +08:00
|
|
|
unsigned char connect_only; /* make connection/request, then let
|
|
|
|
application use the socket */
|
2023-11-22 00:44:05 +08:00
|
|
|
#ifndef CURL_DISABLE_MIME
|
|
|
|
BIT(mime_formescape);
|
|
|
|
#endif
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(is_fread_set); /* has read callback been set to non-NULL? */
|
2022-05-31 19:42:23 +08:00
|
|
|
#ifndef CURL_DISABLE_TFTP
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(tftp_no_options); /* do not send TFTP options requests */
|
2022-05-31 19:42:23 +08:00
|
|
|
#endif
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(sep_headers); /* handle host and proxy headers separately */
|
2023-08-17 20:18:06 +08:00
|
|
|
#ifndef CURL_DISABLE_COOKIES
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(cookiesession); /* new cookie session? */
|
2023-08-17 20:18:06 +08:00
|
|
|
#endif
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(crlf); /* convert crlf on ftp upload(?) */
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifdef USE_SSH
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(ssh_compression); /* enable SSH compression */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2019-02-25 18:17:53 +08:00
|
|
|
|
|
|
|
/* Here follows boolean settings that define how to behave during
|
|
|
|
this session. They are STATIC, set by libcurl users or at least initially
|
|
|
|
and they don't change during operations. */
|
2022-07-13 05:40:05 +08:00
|
|
|
BIT(quick_exit); /* set 1L when it is okay to leak things (like
|
|
|
|
threads), as we're about to exit() anyway and
|
|
|
|
don't want lengthy cleanups to delay termination,
|
|
|
|
e.g. after a DNS timeout */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(get_filetime); /* get the time and get of the remote file */
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
2022-10-26 14:59:35 +08:00
|
|
|
BIT(tunnel_thru_httpproxy); /* use CONNECT through an HTTP proxy */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(prefer_ascii); /* ASCII rather than binary */
|
2021-02-08 23:21:31 +08:00
|
|
|
BIT(remote_append); /* append, not overwrite, on upload */
|
2023-08-17 20:18:06 +08:00
|
|
|
#ifdef CURL_LIST_ONLY_PROTOCOL
|
2021-02-08 23:40:34 +08:00
|
|
|
BIT(list_only); /* list directory */
|
2023-08-17 20:18:06 +08:00
|
|
|
#endif
|
2019-05-05 23:08:22 +08:00
|
|
|
#ifndef CURL_DISABLE_FTP
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(ftp_use_port); /* use the FTP PORT command */
|
|
|
|
BIT(ftp_use_epsv); /* if EPSV is to be attempted or not */
|
|
|
|
BIT(ftp_use_eprt); /* if EPRT is to be attempted or not */
|
|
|
|
BIT(ftp_use_pret); /* if PRET is to be used before PASV or not */
|
|
|
|
BIT(ftp_skip_ip); /* skip the IP address the FTP server passes on to
|
2019-05-05 23:08:22 +08:00
|
|
|
us */
|
2022-06-01 20:30:55 +08:00
|
|
|
BIT(wildcard_enabled); /* enable wildcard matching */
|
2019-05-05 23:08:22 +08:00
|
|
|
#endif
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(hide_progress); /* don't use the progress meter */
|
|
|
|
BIT(http_fail_on_error); /* fail on HTTP error codes >= 400 */
|
|
|
|
BIT(http_keep_sending_on_error); /* for HTTP status codes >= 300 */
|
|
|
|
BIT(http_follow_location); /* follow HTTP redirects */
|
|
|
|
BIT(http_transfer_encoding); /* request compressed HTTP transfer-encoding */
|
|
|
|
BIT(allow_auth_to_other_hosts);
|
|
|
|
BIT(include_header); /* include received protocol headers in data output */
|
|
|
|
BIT(http_set_referer); /* is a custom referer used */
|
|
|
|
BIT(http_auto_referer); /* set "correct" referer when following
|
|
|
|
location: */
|
|
|
|
BIT(opt_no_body); /* as set with CURLOPT_NOBODY */
|
|
|
|
BIT(verbose); /* output verbosity */
|
2024-03-26 07:19:23 +08:00
|
|
|
#if defined(HAVE_GSSAPI)
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(krb); /* Kerberos connection requested */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(reuse_forbid); /* forbidden to be reused, close after use */
|
2023-08-23 20:47:45 +08:00
|
|
|
BIT(reuse_fresh); /* do not reuse an existing connection */
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(no_signal); /* do not use any signal/alarm handler */
|
|
|
|
BIT(tcp_nodelay); /* whether to enable TCP_NODELAY or not */
|
|
|
|
BIT(ignorecl); /* ignore content length */
|
|
|
|
BIT(http_te_skip); /* pass the raw body data to the user, even when
|
|
|
|
transfer-encoded (chunked, compressed) */
|
|
|
|
BIT(http_ce_skip); /* pass the raw body data to the user, even when
|
|
|
|
content-encoded (chunked, compressed) */
|
|
|
|
BIT(proxy_transfer_mode); /* set transfer mode (;type=<a|i>) when doing
|
|
|
|
FTP via an HTTP proxy */
|
2019-02-25 18:17:53 +08:00
|
|
|
#if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(socks5_gssapi_nec); /* Flag to support NEC SOCKS5 server */
|
2019-02-25 18:17:53 +08:00
|
|
|
#endif
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(sasl_ir); /* Enable/disable SASL initial response */
|
|
|
|
BIT(tcp_keepalive); /* use TCP keepalives */
|
|
|
|
BIT(tcp_fastopen); /* use TCP Fast Open */
|
|
|
|
BIT(ssl_enable_alpn);/* TLS ALPN extension? */
|
|
|
|
BIT(path_as_is); /* allow dotdots? */
|
|
|
|
BIT(pipewait); /* wait for multiplex status before starting a new
|
|
|
|
connection */
|
|
|
|
BIT(suppress_connect_headers); /* suppress proxy CONNECT response headers
|
|
|
|
from user callbacks */
|
|
|
|
BIT(dns_shuffle_addresses); /* whether to shuffle addresses before use */
|
2024-03-26 07:19:23 +08:00
|
|
|
#ifndef CURL_DISABLE_PROXY
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(haproxyprotocol); /* whether to send HAProxy PROXY protocol v1
|
|
|
|
header */
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
|
|
|
#ifdef USE_UNIX_SOCKETS
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(abstract_unix_socket);
|
2024-03-26 07:19:23 +08:00
|
|
|
#endif
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(disallow_username_in_url); /* disallow username in url */
|
2021-09-06 22:36:34 +08:00
|
|
|
#ifndef CURL_DISABLE_DOH
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(doh); /* DNS-over-HTTPS enabled */
|
2021-07-16 15:17:03 +08:00
|
|
|
BIT(doh_verifypeer); /* DoH certificate peer verification */
|
|
|
|
BIT(doh_verifyhost); /* DoH certificate hostname verification */
|
|
|
|
BIT(doh_verifystatus); /* DoH certificate status verification */
|
2021-09-06 22:36:34 +08:00
|
|
|
#endif
|
2019-09-20 15:59:55 +08:00
|
|
|
BIT(http09_allowed); /* allow HTTP/0.9 responses */
|
2022-09-09 21:11:14 +08:00
|
|
|
#ifdef USE_WEBSOCKETS
|
|
|
|
BIT(ws_raw_mode);
|
|
|
|
#endif
|
2024-04-04 21:23:35 +08:00
|
|
|
#ifdef USE_ECH
|
|
|
|
int tls_ech; /* TLS ECH configuration */
|
|
|
|
#endif
|
2001-08-31 06:48:34 +08:00
|
|
|
};
|
2001-02-21 01:35:51 +08:00
|
|
|
|
2024-02-10 01:20:47 +08:00
|
|
|
#ifndef CURL_DISABLE_MIME
|
|
|
|
#define IS_MIME_POST(a) ((a)->set.mimepost.kind != MIMEKIND_NONE)
|
|
|
|
#else
|
|
|
|
#define IS_MIME_POST(a) FALSE
|
|
|
|
#endif
|
|
|
|
|
2006-07-08 06:58:06 +08:00
|
|
|
struct Names {
|
2020-09-02 18:07:44 +08:00
|
|
|
struct Curl_hash *hostcache;
|
2006-07-08 06:58:06 +08:00
|
|
|
enum {
|
|
|
|
HCACHE_NONE, /* not pointing to anything */
|
|
|
|
HCACHE_MULTI, /* points to a shared one in the multi handle */
|
|
|
|
HCACHE_SHARED /* points to a shared one in a shared object */
|
|
|
|
} hostcachetype;
|
|
|
|
};
|
|
|
|
|
2001-08-31 06:48:34 +08:00
|
|
|
/*
|
2006-07-08 06:58:06 +08:00
|
|
|
* The 'connectdata' struct MUST have all the connection oriented stuff as we
|
|
|
|
* may have several simultaneous connections and connection structs in memory.
|
2001-08-31 06:48:34 +08:00
|
|
|
*
|
2006-07-08 06:58:06 +08:00
|
|
|
* The 'struct UserDefined' must only contain data that is set once to go for
|
|
|
|
* many (perhaps) independent connections. Values that are generated or
|
2001-08-31 06:48:34 +08:00
|
|
|
* calculated internally for the "session handle" must be defined within the
|
2006-07-08 06:58:06 +08:00
|
|
|
* 'struct UrlState' instead.
|
|
|
|
*/
|
2001-08-31 06:48:34 +08:00
|
|
|
|
2016-06-21 21:47:12 +08:00
|
|
|
struct Curl_easy {
|
2021-01-19 15:23:52 +08:00
|
|
|
/* First a simple identifier to easier detect if a user mix up this easy
|
|
|
|
handle with a multi handle. Set this to CURLEASY_MAGIC_NUMBER */
|
|
|
|
unsigned int magic;
|
2023-05-23 18:48:58 +08:00
|
|
|
/* once an easy handle is tied to a connection cache
|
|
|
|
a non-negative number to distinguish this transfer from
|
|
|
|
other using the same cache. For easier tracking
|
|
|
|
in log output.
|
|
|
|
This may wrap around after LONG_MAX to 0 again, so it
|
2023-09-25 23:08:41 +08:00
|
|
|
has no uniqueness guarantee for very large processings. */
|
2023-05-23 18:48:58 +08:00
|
|
|
curl_off_t id;
|
2021-01-19 15:23:52 +08:00
|
|
|
|
2013-08-02 06:09:59 +08:00
|
|
|
/* first, two fields for the linked list of these */
|
2016-06-21 21:47:12 +08:00
|
|
|
struct Curl_easy *next;
|
|
|
|
struct Curl_easy *prev;
|
2013-08-02 06:09:59 +08:00
|
|
|
|
2019-01-03 01:04:58 +08:00
|
|
|
struct connectdata *conn;
|
2023-03-26 23:43:28 +08:00
|
|
|
struct Curl_llist_element connect_queue; /* for the pending and msgsent
|
|
|
|
lists */
|
2020-09-02 18:06:20 +08:00
|
|
|
struct Curl_llist_element conn_queue; /* list per connectdata */
|
2013-08-02 06:09:59 +08:00
|
|
|
|
|
|
|
CURLMstate mstate; /* the handle's state */
|
|
|
|
CURLcode result; /* previous result */
|
|
|
|
|
|
|
|
struct Curl_message msg; /* A single posted message. */
|
|
|
|
|
|
|
|
/* Array with the plain socket numbers this handle takes care of, in no
|
|
|
|
particular order. Note that all sockets are added to the sockhash, where
|
|
|
|
the state etc are also kept. This array is mostly used to detect when a
|
|
|
|
socket is to be removed from the hash. See singlesocket(). */
|
lib: introduce struct easy_poll_set for poll information
Connection filter had a `get_select_socks()` method, inspired by the
various `getsocks` functions involved during the lifetime of a
transfer. These, depending on transfer state (CONNECT/DO/DONE/ etc.),
return sockets to monitor and flag if this shall be done for POLLIN
and/or POLLOUT.
Due to this design, sockets and flags could only be added, not
removed. This led to problems in filters like HTTP/2 where flow control
prohibits the sending of data until the peer increases the flow
window. The general transfer loop wants to write, adds POLLOUT, the
socket is writeable but no data can be written.
This leads to cpu busy loops. To prevent that, HTTP/2 did set the
`SEND_HOLD` flag of such a blocked transfer, so the transfer loop cedes
further attempts. This works if only one such filter is involved. If a
HTTP/2 transfer goes through a HTTP/2 proxy, two filters are
setting/clearing this flag and may step on each other's toes.
Connection filters `get_select_socks()` is replaced by
`adjust_pollset()`. They get passed a `struct easy_pollset` that keeps
up to `MAX_SOCKSPEREASYHANDLE` sockets and their `POLLIN|POLLOUT`
flags. This struct is initialized in `multi_getsock()` by calling the
various `getsocks()` implementations based on transfer state, as before.
After protocol handlers/transfer loop have set the sockets and flags
they want, the `easy_pollset` is *always* passed to the filters. Filters
"higher" in the chain are called first, starting at the first
not-yet-connection one. Each filter may add sockets and/or change
flags. When all flags are removed, the socket itself is removed from the
pollset.
Example:
* transfer wants to send, adds POLLOUT
* http/2 filter has a flow control block, removes POLLOUT and adds
POLLIN (it is waiting on a WINDOW_UPDATE from the server)
* TLS filter is connected and changes nothing
* h2-proxy filter also has a flow control block on its tunnel stream,
removes POLLOUT and adds POLLIN also.
* socket filter is connected and changes nothing
* The resulting pollset is then mixed together with all other transfers
and their pollsets, just as before.
Use of `SEND_HOLD` is no longer necessary in the filters.
All filters are adapted for the changed method. The handling in
`multi.c` has been adjusted, but its state handling the the protocol
handlers' `getsocks` method are untouched.
The most affected filters are http/2, ngtcp2, quiche and h2-proxy. TLS
filters needed to be adjusted for the connecting handshake read/write
handling.
No noticeable difference in performance was detected in local scorecard
runs.
Closes #11833
2023-09-04 18:06:07 +08:00
|
|
|
struct easy_pollset last_poll;
|
2013-08-02 06:09:59 +08:00
|
|
|
|
2006-07-08 06:58:06 +08:00
|
|
|
struct Names dns;
|
2006-04-10 23:00:53 +08:00
|
|
|
struct Curl_multi *multi; /* if non-NULL, points to the multi handle
|
2013-01-17 19:59:23 +08:00
|
|
|
struct to which this "belongs" when used by
|
|
|
|
the multi interface */
|
|
|
|
struct Curl_multi *multi_easy; /* if non-NULL, points to the multi handle
|
|
|
|
struct to which this "belongs" when used
|
|
|
|
by the easy interface */
|
2003-01-08 23:50:52 +08:00
|
|
|
struct Curl_share *share; /* Share, handles global variable mutexing */
|
2018-05-29 02:29:15 +08:00
|
|
|
#ifdef USE_LIBPSL
|
|
|
|
struct PslCache *psl; /* The associated PSL cache. */
|
|
|
|
#endif
|
2007-11-25 07:16:55 +08:00
|
|
|
struct SingleRequest req; /* Request-specific data */
|
2001-08-31 06:48:34 +08:00
|
|
|
struct UserDefined set; /* values set by the libcurl user */
|
2022-06-01 20:30:55 +08:00
|
|
|
#ifndef CURL_DISABLE_COOKIES
|
2007-11-21 06:57:24 +08:00
|
|
|
struct CookieInfo *cookies; /* the cookies, read from files and servers.
|
|
|
|
NOTE that the 'cookie' field in the
|
|
|
|
UserDefined struct defines if the "engine"
|
|
|
|
is to be used or not. */
|
2022-06-01 20:30:55 +08:00
|
|
|
#endif
|
2021-03-08 15:30:32 +08:00
|
|
|
#ifndef CURL_DISABLE_HSTS
|
2020-11-03 06:17:01 +08:00
|
|
|
struct hsts *hsts;
|
|
|
|
#endif
|
2020-10-26 06:08:54 +08:00
|
|
|
#ifndef CURL_DISABLE_ALTSVC
|
2019-03-03 18:17:52 +08:00
|
|
|
struct altsvcinfo *asi; /* the alt-svc cache */
|
|
|
|
#endif
|
2001-08-31 06:48:34 +08:00
|
|
|
struct Progress progress; /* for all the progress meter data */
|
|
|
|
struct UrlState state; /* struct for fields used for state info and
|
|
|
|
other dynamic purposes */
|
2019-05-05 23:08:21 +08:00
|
|
|
#ifndef CURL_DISABLE_FTP
|
2023-02-28 06:57:23 +08:00
|
|
|
struct WildcardData *wildcard; /* wildcard download state info */
|
2019-05-05 23:08:21 +08:00
|
|
|
#endif
|
2001-08-31 06:48:34 +08:00
|
|
|
struct PureInfo info; /* stats, reports and info data */
|
2013-11-30 18:59:01 +08:00
|
|
|
struct curl_tlssessioninfo tsi; /* Information about the TLS session, only
|
|
|
|
valid after a client has asked for it */
|
2020-12-14 21:10:33 +08:00
|
|
|
#ifdef USE_HYPER
|
|
|
|
struct hyptransfer hyp;
|
|
|
|
#endif
|
1999-12-29 22:20:26 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
#define LIBCURL_NAME "libcurl"
|
|
|
|
|
2011-06-08 00:35:42 +08:00
|
|
|
#endif /* HEADER_CURL_URLDATA_H */
|