1 #ifndef HEADER_CURL_URLDATA_H 2 #define HEADER_CURL_URLDATA_H 3 /*************************************************************************** 4 * _ _ ____ _ 5 * Project ___| | | | _ \| | 6 * / __| | | | |_) | | 7 * | (__| |_| | _ <| |___ 8 * \___|\___/|_| \_\_____| 9 * 10 * Copyright (C) 1998 - 2015, Daniel Stenberg, <daniel@haxx.se>, et al. 11 * 12 * This software is licensed as described in the file COPYING, which 13 * you should have received as part of this distribution. The terms 14 * are also available at http://curl.haxx.se/docs/copyright.html. 15 * 16 * You may opt to use, copy, modify, merge, publish, distribute and/or sell 17 * copies of the Software, and permit persons to whom the Software is 18 * furnished to do so, under the terms of the COPYING file. 19 * 20 * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY 21 * KIND, either express or implied. 22 * 23 ***************************************************************************/ 24 25 /* This file is for lib internal stuff */ 26 27 #include "curl_setup.h" 28 29 #define PORT_FTP 21 30 #define PORT_FTPS 990 31 #define PORT_TELNET 23 32 #define PORT_HTTP 80 33 #define PORT_HTTPS 443 34 #define PORT_DICT 2628 35 #define PORT_LDAP 389 36 #define PORT_LDAPS 636 37 #define PORT_TFTP 69 38 #define PORT_SSH 22 39 #define PORT_IMAP 143 40 #define PORT_IMAPS 993 41 #define PORT_POP3 110 42 #define PORT_POP3S 995 43 #define PORT_SMB 445 44 #define PORT_SMBS 445 45 #define PORT_SMTP 25 46 #define PORT_SMTPS 465 /* sometimes called SSMTP */ 47 #define PORT_RTSP 554 48 #define PORT_RTMP 1935 49 #define PORT_RTMPT PORT_HTTP 50 #define PORT_RTMPS PORT_HTTPS 51 #define PORT_GOPHER 70 52 53 #define DICT_MATCH "/MATCH:" 54 #define DICT_MATCH2 "/M:" 55 #define DICT_MATCH3 "/FIND:" 56 #define DICT_DEFINE "/DEFINE:" 57 #define DICT_DEFINE2 "/D:" 58 #define DICT_DEFINE3 "/LOOKUP:" 59 60 #define CURL_DEFAULT_USER "anonymous" 61 #define CURL_DEFAULT_PASSWORD "ftp@example.com" 62 63 /* Convenience defines for checking protocols or their SSL based version. Each 64 protocol handler should only ever have a single CURLPROTO_ in its protocol 65 field. */ 66 #define PROTO_FAMILY_HTTP (CURLPROTO_HTTP|CURLPROTO_HTTPS) 67 #define PROTO_FAMILY_FTP (CURLPROTO_FTP|CURLPROTO_FTPS) 68 #define PROTO_FAMILY_POP3 (CURLPROTO_POP3|CURLPROTO_POP3S) 69 #define PROTO_FAMILY_SMB (CURLPROTO_SMB|CURLPROTO_SMBS) 70 #define PROTO_FAMILY_SMTP (CURLPROTO_SMTP|CURLPROTO_SMTPS) 71 72 #define DEFAULT_CONNCACHE_SIZE 5 73 74 /* length of longest IPv6 address string including the trailing null */ 75 #define MAX_IPADR_LEN sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255") 76 77 /* Default FTP/IMAP etc response timeout in milliseconds. 78 Symbian OS panics when given a timeout much greater than 1/2 hour. 79 */ 80 #define RESP_TIMEOUT (1800*1000) 81 82 #include "cookie.h" 83 #include "formdata.h" 84 85 #ifdef USE_OPENSSL 86 #include <openssl/ssl.h> 87 #ifdef HAVE_OPENSSL_ENGINE_H 88 #include <openssl/engine.h> 89 #endif 90 #endif /* USE_OPENSSL */ 91 92 #ifdef USE_GNUTLS 93 #include <gnutls/gnutls.h> 94 #endif 95 96 #ifdef USE_POLARSSL 97 #include <polarssl/ssl.h> 98 #include <polarssl/version.h> 99 #if POLARSSL_VERSION_NUMBER<0x01010000 100 #include <polarssl/havege.h> 101 #else 102 #include <polarssl/entropy.h> 103 #include <polarssl/ctr_drbg.h> 104 #endif /* POLARSSL_VERSION_NUMBER<0x01010000 */ 105 #endif /* USE_POLARSSL */ 106 107 #ifdef USE_CYASSL 108 #undef OCSP_REQUEST /* avoid cyassl/openssl/ssl.h clash with wincrypt.h */ 109 #undef OCSP_RESPONSE /* avoid cyassl/openssl/ssl.h clash with wincrypt.h */ 110 #include <cyassl/openssl/ssl.h> 111 #endif 112 113 #ifdef USE_NSS 114 #include <nspr.h> 115 #include <pk11pub.h> 116 #endif 117 118 #ifdef USE_GSKIT 119 #include <gskssl.h> 120 #endif 121 122 #ifdef USE_AXTLS 123 #include <axTLS/config.h> 124 #include <axTLS/ssl.h> 125 #undef malloc 126 #undef calloc 127 #undef realloc 128 #endif /* USE_AXTLS */ 129 130 #ifdef USE_SCHANNEL 131 #include "curl_sspi.h" 132 #include <schnlsp.h> 133 #include <schannel.h> 134 #endif 135 136 #ifdef USE_DARWINSSL 137 #include <Security/Security.h> 138 /* For some reason, when building for iOS, the omnibus header above does 139 * not include SecureTransport.h as of iOS SDK 5.1. */ 140 #include <Security/SecureTransport.h> 141 #endif 142 143 #ifdef HAVE_NETINET_IN_H 144 #include <netinet/in.h> 145 #endif 146 147 #include "timeval.h" 148 149 #ifdef HAVE_ZLIB_H 150 #include <zlib.h> /* for content-encoding */ 151 #ifdef __SYMBIAN32__ 152 /* zlib pollutes the namespace with this definition */ 153 #undef WIN32 154 #endif 155 #endif 156 157 #include <curl/curl.h> 158 159 #include "http_chunks.h" /* for the structs and enum stuff */ 160 #include "hostip.h" 161 #include "hash.h" 162 #include "splay.h" 163 164 #include "imap.h" 165 #include "pop3.h" 166 #include "smtp.h" 167 #include "ftp.h" 168 #include "file.h" 169 #include "ssh.h" 170 #include "http.h" 171 #include "rtsp.h" 172 #include "smb.h" 173 #include "wildcard.h" 174 #include "multihandle.h" 175 176 #ifdef HAVE_GSSAPI 177 # ifdef HAVE_GSSGNU 178 # include <gss.h> 179 # elif defined HAVE_GSSMIT 180 # include <gssapi/gssapi.h> 181 # include <gssapi/gssapi_generic.h> 182 # else 183 # include <gssapi.h> 184 # endif 185 #endif 186 187 #ifdef HAVE_LIBSSH2_H 188 #include <libssh2.h> 189 #include <libssh2_sftp.h> 190 #endif /* HAVE_LIBSSH2_H */ 191 192 /* Download buffer size, keep it fairly big for speed reasons */ 193 #undef BUFSIZE 194 #define BUFSIZE CURL_MAX_WRITE_SIZE 195 196 /* Initial size of the buffer to store headers in, it'll be enlarged in case 197 of need. */ 198 #define HEADERSIZE 256 199 200 #define CURLEASY_MAGIC_NUMBER 0xc0dedbadU 201 202 /* Some convenience macros to get the larger/smaller value out of two given. 203 We prefix with CURL to prevent name collisions. */ 204 #define CURLMAX(x,y) ((x)>(y)?(x):(y)) 205 #define CURLMIN(x,y) ((x)<(y)?(x):(y)) 206 207 208 #ifdef HAVE_GSSAPI 209 /* Types needed for krb5-ftp connections */ 210 struct krb5buffer { 211 void *data; 212 size_t size; 213 size_t index; 214 int eof_flag; 215 }; 216 217 enum protection_level { 218 PROT_NONE, /* first in list */ 219 PROT_CLEAR, 220 PROT_SAFE, 221 PROT_CONFIDENTIAL, 222 PROT_PRIVATE, 223 PROT_CMD, 224 PROT_LAST /* last in list */ 225 }; 226 #endif 227 228 #ifdef USE_SCHANNEL 229 /* Structs to store Schannel handles */ 230 struct curl_schannel_cred { 231 CredHandle cred_handle; 232 TimeStamp time_stamp; 233 int refcount; 234 bool cached; 235 }; 236 237 struct curl_schannel_ctxt { 238 CtxtHandle ctxt_handle; 239 TimeStamp time_stamp; 240 }; 241 #endif 242 243 /* enum for the nonblocking SSL connection state machine */ 244 typedef enum { 245 ssl_connect_1, 246 ssl_connect_2, 247 ssl_connect_2_reading, 248 ssl_connect_2_writing, 249 ssl_connect_3, 250 ssl_connect_done 251 } ssl_connect_state; 252 253 typedef enum { 254 ssl_connection_none, 255 ssl_connection_negotiating, 256 ssl_connection_complete 257 } ssl_connection_state; 258 259 /* struct for data related to each SSL connection */ 260 struct ssl_connect_data { 261 /* Use ssl encrypted communications TRUE/FALSE, not necessarily using it atm 262 but at least asked to or meaning to use it. See 'state' for the exact 263 current state of the connection. */ 264 bool use; 265 ssl_connection_state state; 266 #ifdef USE_OPENSSL 267 /* these ones requires specific SSL-types */ 268 SSL_CTX* ctx; 269 SSL* handle; 270 X509* server_cert; 271 ssl_connect_state connecting_state; 272 #endif /* USE_OPENSSL */ 273 #ifdef USE_GNUTLS 274 gnutls_session_t session; 275 gnutls_certificate_credentials_t cred; 276 #ifdef USE_TLS_SRP 277 gnutls_srp_client_credentials_t srp_client_cred; 278 #endif 279 ssl_connect_state connecting_state; 280 #endif /* USE_GNUTLS */ 281 #ifdef USE_POLARSSL 282 ctr_drbg_context ctr_drbg; 283 entropy_context entropy; 284 ssl_context ssl; 285 ssl_session ssn; 286 int server_fd; 287 x509_crt cacert; 288 x509_crt clicert; 289 x509_crl crl; 290 rsa_context rsa; 291 ssl_connect_state connecting_state; 292 #endif /* USE_POLARSSL */ 293 #ifdef USE_CYASSL 294 SSL_CTX* ctx; 295 SSL* handle; 296 ssl_connect_state connecting_state; 297 #endif /* USE_CYASSL */ 298 #ifdef USE_NSS 299 PRFileDesc *handle; 300 char *client_nickname; 301 struct SessionHandle *data; 302 struct curl_llist *obj_list; 303 PK11GenericObject *obj_clicert; 304 ssl_connect_state connecting_state; 305 #endif /* USE_NSS */ 306 #ifdef USE_GSKIT 307 gsk_handle handle; 308 int iocport; 309 ssl_connect_state connecting_state; 310 #endif 311 #ifdef USE_AXTLS 312 SSL_CTX* ssl_ctx; 313 SSL* ssl; 314 ssl_connect_state connecting_state; 315 #endif /* USE_AXTLS */ 316 #ifdef USE_SCHANNEL 317 struct curl_schannel_cred *cred; 318 struct curl_schannel_ctxt *ctxt; 319 SecPkgContext_StreamSizes stream_sizes; 320 ssl_connect_state connecting_state; 321 size_t encdata_length, decdata_length; 322 size_t encdata_offset, decdata_offset; 323 unsigned char *encdata_buffer, *decdata_buffer; 324 unsigned long req_flags, ret_flags; 325 CURLcode recv_unrecoverable_err; /* schannel_recv had an unrecoverable err */ 326 bool recv_sspi_close_notify; /* true if connection closed by close_notify */ 327 bool recv_connection_closed; /* true if connection closed, regardless how */ 328 #endif /* USE_SCHANNEL */ 329 #ifdef USE_DARWINSSL 330 SSLContextRef ssl_ctx; 331 curl_socket_t ssl_sockfd; 332 ssl_connect_state connecting_state; 333 bool ssl_direction; /* true if writing, false if reading */ 334 size_t ssl_write_buffered_length; 335 #endif /* USE_DARWINSSL */ 336 }; 337 338 struct ssl_config_data { 339 long version; /* what version the client wants to use */ 340 long certverifyresult; /* result from the certificate verification */ 341 342 bool verifypeer; /* set TRUE if this is desired */ 343 bool verifyhost; /* set TRUE if CN/SAN must match hostname */ 344 bool verifystatus; /* set TRUE if certificate status must be checked */ 345 char *CApath; /* certificate dir (doesn't work on windows) */ 346 char *CAfile; /* certificate to verify peer against */ 347 const char *CRLfile; /* CRL to check certificate revocation */ 348 const char *issuercert;/* optional issuer certificate filename */ 349 char *random_file; /* path to file containing "random" data */ 350 char *egdsocket; /* path to file containing the EGD daemon socket */ 351 char *cipher_list; /* list of ciphers to use */ 352 size_t max_ssl_sessions; /* SSL session id cache size */ 353 curl_ssl_ctx_callback fsslctx; /* function to initialize ssl ctx */ 354 void *fsslctxp; /* parameter for call back */ 355 bool sessionid; /* cache session IDs or not */ 356 bool certinfo; /* gather lots of certificate info */ 357 bool falsestart; 358 359 #ifdef USE_TLS_SRP 360 char *username; /* TLS username (for, e.g., SRP) */ 361 char *password; /* TLS password (for, e.g., SRP) */ 362 enum CURL_TLSAUTH authtype; /* TLS authentication type (default SRP) */ 363 #endif 364 }; 365 366 /* information stored about one single SSL session */ 367 struct curl_ssl_session { 368 char *name; /* host name for which this ID was used */ 369 void *sessionid; /* as returned from the SSL layer */ 370 size_t idsize; /* if known, otherwise 0 */ 371 long age; /* just a number, the higher the more recent */ 372 int remote_port; /* remote port to connect to */ 373 struct ssl_config_data ssl_config; /* setup for this session */ 374 }; 375 376 /* Struct used for Digest challenge-response authentication */ 377 struct digestdata { 378 #if defined(USE_WINDOWS_SSPI) 379 BYTE *input_token; 380 size_t input_token_len; 381 #else 382 char *nonce; 383 char *cnonce; 384 char *realm; 385 int algo; 386 bool stale; /* set true for re-negotiation */ 387 char *opaque; 388 char *qop; 389 char *algorithm; 390 int nc; /* nounce count */ 391 #endif 392 }; 393 394 typedef enum { 395 NTLMSTATE_NONE, 396 NTLMSTATE_TYPE1, 397 NTLMSTATE_TYPE2, 398 NTLMSTATE_TYPE3, 399 NTLMSTATE_LAST 400 } curlntlm; 401 402 #ifdef USE_WINDOWS_SSPI 403 #include "curl_sspi.h" 404 #endif 405 406 #if defined(CURL_DOES_CONVERSIONS) && defined(HAVE_ICONV) 407 #include <iconv.h> 408 #endif 409 410 /* Struct used for GSSAPI (Kerberos V5) authentication */ 411 #if defined(USE_KERBEROS5) 412 struct kerberos5data { 413 #if defined(USE_WINDOWS_SSPI) 414 CredHandle *credentials; 415 CtxtHandle *context; 416 TCHAR *spn; 417 SEC_WINNT_AUTH_IDENTITY identity; 418 SEC_WINNT_AUTH_IDENTITY *p_identity; 419 size_t token_max; 420 BYTE *output_token; 421 #else 422 gss_ctx_id_t context; 423 gss_name_t spn; 424 #endif 425 }; 426 #endif 427 428 /* Struct used for NTLM challenge-response authentication */ 429 #if defined(USE_NTLM) 430 struct ntlmdata { 431 curlntlm state; 432 #ifdef USE_WINDOWS_SSPI 433 CredHandle *credentials; 434 CtxtHandle *context; 435 SEC_WINNT_AUTH_IDENTITY identity; 436 SEC_WINNT_AUTH_IDENTITY *p_identity; 437 size_t token_max; 438 BYTE *output_token; 439 BYTE *input_token; 440 size_t input_token_len; 441 #else 442 unsigned int flags; 443 unsigned char nonce[8]; 444 void* target_info; /* TargetInfo received in the ntlm type-2 message */ 445 unsigned int target_info_len; 446 #endif 447 }; 448 #endif 449 450 #ifdef USE_SPNEGO 451 struct negotiatedata { 452 /* When doing Negotiate (SPNEGO) auth, we first need to send a token 453 and then validate the received one. */ 454 enum { GSS_AUTHNONE, GSS_AUTHRECV, GSS_AUTHSENT } state; 455 #ifdef HAVE_GSSAPI 456 OM_uint32 status; 457 gss_ctx_id_t context; 458 gss_name_t server_name; 459 gss_buffer_desc output_token; 460 #else 461 #ifdef USE_WINDOWS_SSPI 462 DWORD status; 463 CredHandle *credentials; 464 CtxtHandle *context; 465 SEC_WINNT_AUTH_IDENTITY identity; 466 SEC_WINNT_AUTH_IDENTITY *p_identity; 467 TCHAR *server_name; 468 size_t token_max; 469 BYTE *output_token; 470 size_t output_token_length; 471 #endif 472 #endif 473 }; 474 #endif 475 476 477 /* 478 * Boolean values that concerns this connection. 479 */ 480 struct ConnectBits { 481 /* always modify bits.close with the connclose() and connkeep() macros! */ 482 bool close; /* if set, we close the connection after this request */ 483 bool reuse; /* if set, this is a re-used connection */ 484 bool proxy; /* if set, this transfer is done through a proxy - any type */ 485 bool httpproxy; /* if set, this transfer is done through a http proxy */ 486 bool user_passwd; /* do we use user+password for this connection? */ 487 bool proxy_user_passwd; /* user+password for the proxy? */ 488 bool ipv6_ip; /* we communicate with a remote site specified with pure IPv6 489 IP address */ 490 bool ipv6; /* we communicate with a site using an IPv6 address */ 491 492 bool do_more; /* this is set TRUE if the ->curl_do_more() function is 493 supposed to be called, after ->curl_do() */ 494 bool tcpconnect[2]; /* the TCP layer (or similar) is connected, this is set 495 the first time on the first connect function call */ 496 bool protoconnstart;/* the protocol layer has STARTED its operation after 497 the TCP layer connect */ 498 499 bool retry; /* this connection is about to get closed and then 500 re-attempted at another connection. */ 501 bool tunnel_proxy; /* if CONNECT is used to "tunnel" through the proxy. 502 This is implicit when SSL-protocols are used through 503 proxies, but can also be enabled explicitly by 504 apps */ 505 bool authneg; /* TRUE when the auth phase has started, which means 506 that we are creating a request with an auth header, 507 but it is not the final request in the auth 508 negotiation. */ 509 bool rewindaftersend;/* TRUE when the sending couldn't be stopped even 510 though it will be discarded. When the whole send 511 operation is done, we must call the data rewind 512 callback. */ 513 bool ftp_use_epsv; /* As set with CURLOPT_FTP_USE_EPSV, but if we find out 514 EPSV doesn't work we disable it for the forthcoming 515 requests */ 516 517 bool ftp_use_eprt; /* As set with CURLOPT_FTP_USE_EPRT, but if we find out 518 EPRT doesn't work we disable it for the forthcoming 519 requests */ 520 bool netrc; /* name+password provided by netrc */ 521 bool userpwd_in_url; /* name+password found in url */ 522 bool stream_was_rewound; /* Indicates that the stream was rewound after a 523 request read past the end of its response byte 524 boundary */ 525 bool proxy_connect_closed; /* set true if a proxy disconnected the 526 connection in a CONNECT request with auth, so 527 that libcurl should reconnect and continue. */ 528 bool bound; /* set true if bind() has already been done on this socket/ 529 connection */ 530 bool type_set; /* type= was used in the URL */ 531 bool multiplex; /* connection is multiplexed */ 532 }; 533 534 struct hostname { 535 char *rawalloc; /* allocated "raw" version of the name */ 536 char *encalloc; /* allocated IDN-encoded version of the name */ 537 char *name; /* name to use internally, might be encoded, might be raw */ 538 const char *dispname; /* name to display, as 'name' might be encoded */ 539 }; 540 541 /* 542 * Flags on the keepon member of the Curl_transfer_keeper 543 */ 544 545 #define KEEP_NONE 0 546 #define KEEP_RECV (1<<0) /* there is or may be data to read */ 547 #define KEEP_SEND (1<<1) /* there is or may be data to write */ 548 #define KEEP_RECV_HOLD (1<<2) /* when set, no reading should be done but there 549 might still be data to read */ 550 #define KEEP_SEND_HOLD (1<<3) /* when set, no writing should be done but there 551 might still be data to write */ 552 #define KEEP_RECV_PAUSE (1<<4) /* reading is paused */ 553 #define KEEP_SEND_PAUSE (1<<5) /* writing is paused */ 554 555 #define KEEP_RECVBITS (KEEP_RECV | KEEP_RECV_HOLD | KEEP_RECV_PAUSE) 556 #define KEEP_SENDBITS (KEEP_SEND | KEEP_SEND_HOLD | KEEP_SEND_PAUSE) 557 558 559 #ifdef HAVE_LIBZ 560 typedef enum { 561 ZLIB_UNINIT, /* uninitialized */ 562 ZLIB_INIT, /* initialized */ 563 ZLIB_GZIP_HEADER, /* reading gzip header */ 564 ZLIB_GZIP_INFLATING, /* inflating gzip stream */ 565 ZLIB_INIT_GZIP /* initialized in transparent gzip mode */ 566 } zlibInitState; 567 #endif 568 569 #ifdef CURLRES_ASYNCH 570 struct Curl_async { 571 char *hostname; 572 int port; 573 struct Curl_dns_entry *dns; 574 bool done; /* set TRUE when the lookup is complete */ 575 int status; /* if done is TRUE, this is the status from the callback */ 576 void *os_specific; /* 'struct thread_data' for Windows */ 577 }; 578 #endif 579 580 #define FIRSTSOCKET 0 581 #define SECONDARYSOCKET 1 582 583 /* These function pointer types are here only to allow easier typecasting 584 within the source when we need to cast between data pointers (such as NULL) 585 and function pointers. */ 586 typedef CURLcode (*Curl_do_more_func)(struct connectdata *, int *); 587 typedef CURLcode (*Curl_done_func)(struct connectdata *, CURLcode, bool); 588 589 enum expect100 { 590 EXP100_SEND_DATA, /* enough waiting, just send the body now */ 591 EXP100_AWAITING_CONTINUE, /* waiting for the 100 Continue header */ 592 EXP100_SENDING_REQUEST, /* still sending the request but will wait for 593 the 100 header once done with the request */ 594 EXP100_FAILED /* used on 417 Expectation Failed */ 595 }; 596 597 enum upgrade101 { 598 UPGR101_INIT, /* default state */ 599 UPGR101_REQUESTED, /* upgrade requested */ 600 UPGR101_RECEIVED, /* response received */ 601 UPGR101_WORKING /* talking upgraded protocol */ 602 }; 603 604 /* 605 * Request specific data in the easy handle (SessionHandle). Previously, 606 * these members were on the connectdata struct but since a conn struct may 607 * now be shared between different SessionHandles, we store connection-specific 608 * data here. This struct only keeps stuff that's interesting for *this* 609 * request, as it will be cleared between multiple ones 610 */ 611 struct SingleRequest { 612 curl_off_t size; /* -1 if unknown at this point */ 613 curl_off_t *bytecountp; /* return number of bytes read or NULL */ 614 615 curl_off_t maxdownload; /* in bytes, the maximum amount of data to fetch, 616 -1 means unlimited */ 617 curl_off_t *writebytecountp; /* return number of bytes written or NULL */ 618 619 curl_off_t bytecount; /* total number of bytes read */ 620 curl_off_t writebytecount; /* number of bytes written */ 621 622 long headerbytecount; /* only count received headers */ 623 long deductheadercount; /* this amount of bytes doesn't count when we check 624 if anything has been transferred at the end of a 625 connection. We use this counter to make only a 626 100 reply (without a following second response 627 code) result in a CURLE_GOT_NOTHING error code */ 628 629 struct timeval start; /* transfer started at this time */ 630 struct timeval now; /* current time */ 631 bool header; /* incoming data has HTTP header */ 632 enum { 633 HEADER_NORMAL, /* no bad header at all */ 634 HEADER_PARTHEADER, /* part of the chunk is a bad header, the rest 635 is normal data */ 636 HEADER_ALLBAD /* all was believed to be header */ 637 } badheader; /* the header was deemed bad and will be 638 written as body */ 639 int headerline; /* counts header lines to better track the 640 first one */ 641 char *hbufp; /* points at *end* of header line */ 642 size_t hbuflen; 643 char *str; /* within buf */ 644 char *str_start; /* within buf */ 645 char *end_ptr; /* within buf */ 646 char *p; /* within headerbuff */ 647 bool content_range; /* set TRUE if Content-Range: was found */ 648 curl_off_t offset; /* possible resume offset read from the 649 Content-Range: header */ 650 int httpcode; /* error code from the 'HTTP/1.? XXX' or 651 'RTSP/1.? XXX' line */ 652 struct timeval start100; /* time stamp to wait for the 100 code from */ 653 enum expect100 exp100; /* expect 100 continue state */ 654 enum upgrade101 upgr101; /* 101 upgrade state */ 655 656 int auto_decoding; /* What content encoding. sec 3.5, RFC2616. */ 657 658 #define IDENTITY 0 /* No encoding */ 659 #define DEFLATE 1 /* zlib deflate [RFC 1950 & 1951] */ 660 #define GZIP 2 /* gzip algorithm [RFC 1952] */ 661 #define COMPRESS 3 /* Not handled, added for completeness */ 662 663 #ifdef HAVE_LIBZ 664 zlibInitState zlib_init; /* possible zlib init state; 665 undefined if Content-Encoding header. */ 666 z_stream z; /* State structure for zlib. */ 667 #endif 668 669 time_t timeofdoc; 670 long bodywrites; 671 672 char *buf; 673 char *uploadbuf; 674 curl_socket_t maxfd; 675 676 int keepon; 677 678 bool upload_done; /* set to TRUE when doing chunked transfer-encoding upload 679 and we're uploading the last chunk */ 680 681 bool ignorebody; /* we read a response-body but we ignore it! */ 682 bool ignorecl; /* This HTTP response has no body so we ignore the Content- 683 Length: header */ 684 685 char *location; /* This points to an allocated version of the Location: 686 header data */ 687 char *newurl; /* Set to the new URL to use when a redirect or a retry is 688 wanted */ 689 690 /* 'upload_present' is used to keep a byte counter of how much data there is 691 still left in the buffer, aimed for upload. */ 692 ssize_t upload_present; 693 694 /* 'upload_fromhere' is used as a read-pointer when we uploaded parts of a 695 buffer, so the next read should read from where this pointer points to, 696 and the 'upload_present' contains the number of bytes available at this 697 position */ 698 char *upload_fromhere; 699 700 bool chunk; /* if set, this is a chunked transfer-encoding */ 701 bool upload_chunky; /* set TRUE if we are doing chunked transfer-encoding 702 on upload */ 703 bool getheader; /* TRUE if header parsing is wanted */ 704 705 bool forbidchunk; /* used only to explicitly forbid chunk-upload for 706 specific upload buffers. See readmoredata() in 707 http.c for details. */ 708 709 void *protop; /* Allocated protocol-specific data. Each protocol 710 handler makes sure this points to data it needs. */ 711 }; 712 713 /* 714 * Specific protocol handler. 715 */ 716 717 struct Curl_handler { 718 const char * scheme; /* URL scheme name. */ 719 720 /* Complement to setup_connection_internals(). */ 721 CURLcode (*setup_connection)(struct connectdata *); 722 723 /* These two functions MUST be set to be protocol dependent */ 724 CURLcode (*do_it)(struct connectdata *, bool *done); 725 Curl_done_func done; 726 727 /* If the curl_do() function is better made in two halves, this 728 * curl_do_more() function will be called afterwards, if set. For example 729 * for doing the FTP stuff after the PASV/PORT command. 730 */ 731 Curl_do_more_func do_more; 732 733 /* This function *MAY* be set to a protocol-dependent function that is run 734 * after the connect() and everything is done, as a step in the connection. 735 * The 'done' pointer points to a bool that should be set to TRUE if the 736 * function completes before return. If it doesn't complete, the caller 737 * should call the curl_connecting() function until it is. 738 */ 739 CURLcode (*connect_it)(struct connectdata *, bool *done); 740 741 /* See above. Currently only used for FTP. */ 742 CURLcode (*connecting)(struct connectdata *, bool *done); 743 CURLcode (*doing)(struct connectdata *, bool *done); 744 745 /* Called from the multi interface during the PROTOCONNECT phase, and it 746 should then return a proper fd set */ 747 int (*proto_getsock)(struct connectdata *conn, 748 curl_socket_t *socks, 749 int numsocks); 750 751 /* Called from the multi interface during the DOING phase, and it should 752 then return a proper fd set */ 753 int (*doing_getsock)(struct connectdata *conn, 754 curl_socket_t *socks, 755 int numsocks); 756 757 /* Called from the multi interface during the DO_MORE phase, and it should 758 then return a proper fd set */ 759 int (*domore_getsock)(struct connectdata *conn, 760 curl_socket_t *socks, 761 int numsocks); 762 763 /* Called from the multi interface during the DO_DONE, PERFORM and 764 WAITPERFORM phases, and it should then return a proper fd set. Not setting 765 this will make libcurl use the generic default one. */ 766 int (*perform_getsock)(const struct connectdata *conn, 767 curl_socket_t *socks, 768 int numsocks); 769 770 /* This function *MAY* be set to a protocol-dependent function that is run 771 * by the curl_disconnect(), as a step in the disconnection. If the handler 772 * is called because the connection has been considered dead, dead_connection 773 * is set to TRUE. 774 */ 775 CURLcode (*disconnect)(struct connectdata *, bool dead_connection); 776 777 /* If used, this function gets called from transfer.c:readwrite_data() to 778 allow the protocol to do extra reads/writes */ 779 CURLcode (*readwrite)(struct SessionHandle *data, struct connectdata *conn, 780 ssize_t *nread, bool *readmore); 781 782 long defport; /* Default port. */ 783 unsigned int protocol; /* See CURLPROTO_* - this needs to be the single 784 specific protocol bit */ 785 unsigned int flags; /* Extra particular characteristics, see PROTOPT_* */ 786 }; 787 788 #define PROTOPT_NONE 0 /* nothing extra */ 789 #define PROTOPT_SSL (1<<0) /* uses SSL */ 790 #define PROTOPT_DUAL (1<<1) /* this protocol uses two connections */ 791 #define PROTOPT_CLOSEACTION (1<<2) /* need action before socket close */ 792 /* some protocols will have to call the underlying functions without regard to 793 what exact state the socket signals. IE even if the socket says "readable", 794 the send function might need to be called while uploading, or vice versa. 795 */ 796 #define PROTOPT_DIRLOCK (1<<3) 797 #define PROTOPT_NONETWORK (1<<4) /* protocol doesn't use the network! */ 798 #define PROTOPT_NEEDSPWD (1<<5) /* needs a password, and if none is set it 799 gets a default */ 800 #define PROTOPT_NOURLQUERY (1<<6) /* protocol can't handle 801 url query strings (?foo=bar) ! */ 802 #define PROTOPT_CREDSPERREQUEST (1<<7) /* requires login credentials per 803 request instead of per connection */ 804 805 806 /* return the count of bytes sent, or -1 on error */ 807 typedef ssize_t (Curl_send)(struct connectdata *conn, /* connection data */ 808 int sockindex, /* socketindex */ 809 const void *buf, /* data to write */ 810 size_t len, /* max amount to write */ 811 CURLcode *err); /* error to return */ 812 813 /* return the count of bytes read, or -1 on error */ 814 typedef ssize_t (Curl_recv)(struct connectdata *conn, /* connection data */ 815 int sockindex, /* socketindex */ 816 char *buf, /* store data here */ 817 size_t len, /* max amount to read */ 818 CURLcode *err); /* error to return */ 819 820 /* 821 * The connectdata struct contains all fields and variables that should be 822 * unique for an entire connection. 823 */ 824 struct connectdata { 825 /* 'data' is the CURRENT SessionHandle using this connection -- take great 826 caution that this might very well vary between different times this 827 connection is used! */ 828 struct SessionHandle *data; 829 830 /* chunk is for HTTP chunked encoding, but is in the general connectdata 831 struct only because we can do just about any protocol through a HTTP proxy 832 and a HTTP proxy may in fact respond using chunked encoding */ 833 struct Curl_chunker chunk; 834 835 curl_closesocket_callback fclosesocket; /* function closing the socket(s) */ 836 void *closesocket_client; 837 838 bool inuse; /* This is a marker for the connection cache logic. If this is 839 TRUE this handle is being used by an easy handle and cannot 840 be used by any other easy handle without careful 841 consideration (== only for pipelining). */ 842 843 /**** Fields set when inited and not modified again */ 844 long connection_id; /* Contains a unique number to make it easier to 845 track the connections in the log output */ 846 847 /* 'dns_entry' is the particular host we use. This points to an entry in the 848 DNS cache and it will not get pruned while locked. It gets unlocked in 849 Curl_done(). This entry will be NULL if the connection is re-used as then 850 there is no name resolve done. */ 851 struct Curl_dns_entry *dns_entry; 852 853 /* 'ip_addr' is the particular IP we connected to. It points to a struct 854 within the DNS cache, so this pointer is only valid as long as the DNS 855 cache entry remains locked. It gets unlocked in Curl_done() */ 856 Curl_addrinfo *ip_addr; 857 Curl_addrinfo *tempaddr[2]; /* for happy eyeballs */ 858 859 /* 'ip_addr_str' is the ip_addr data as a human readable string. 860 It remains available as long as the connection does, which is longer than 861 the ip_addr itself. */ 862 char ip_addr_str[MAX_IPADR_LEN]; 863 864 unsigned int scope_id; /* Scope id for IPv6 */ 865 866 int socktype; /* SOCK_STREAM or SOCK_DGRAM */ 867 868 struct hostname host; 869 struct hostname proxy; 870 871 long port; /* which port to use locally */ 872 int remote_port; /* what remote port to connect to, not the proxy port! */ 873 874 /* 'primary_ip' and 'primary_port' get filled with peer's numerical 875 ip address and port number whenever an outgoing connection is 876 *attempted* from the primary socket to a remote address. When more 877 than one address is tried for a connection these will hold data 878 for the last attempt. When the connection is actually established 879 these are updated with data which comes directly from the socket. */ 880 881 char primary_ip[MAX_IPADR_LEN]; 882 long primary_port; 883 884 /* 'local_ip' and 'local_port' get filled with local's numerical 885 ip address and port number whenever an outgoing connection is 886 **established** from the primary socket to a remote address. */ 887 888 char local_ip[MAX_IPADR_LEN]; 889 long local_port; 890 891 char *user; /* user name string, allocated */ 892 char *passwd; /* password string, allocated */ 893 char *options; /* options string, allocated */ 894 895 char *xoauth2_bearer; /* bearer token for xoauth2, allocated */ 896 897 char *proxyuser; /* proxy user name string, allocated */ 898 char *proxypasswd; /* proxy password string, allocated */ 899 curl_proxytype proxytype; /* what kind of proxy that is in use */ 900 901 int httpversion; /* the HTTP version*10 reported by the server */ 902 int rtspversion; /* the RTSP version*10 reported by the server */ 903 904 struct timeval now; /* "current" time */ 905 struct timeval created; /* creation time */ 906 curl_socket_t sock[2]; /* two sockets, the second is used for the data 907 transfer when doing FTP */ 908 curl_socket_t tempsock[2]; /* temporary sockets for happy eyeballs */ 909 bool sock_accepted[2]; /* TRUE if the socket on this index was created with 910 accept() */ 911 Curl_recv *recv[2]; 912 Curl_send *send[2]; 913 914 struct ssl_connect_data ssl[2]; /* this is for ssl-stuff */ 915 struct ssl_config_data ssl_config; 916 917 struct ConnectBits bits; /* various state-flags for this connection */ 918 919 /* connecttime: when connect() is called on the current IP address. Used to 920 be able to track when to move on to try next IP - but only when the multi 921 interface is used. */ 922 struct timeval connecttime; 923 /* The two fields below get set in Curl_connecthost */ 924 int num_addr; /* number of addresses to try to connect to */ 925 long timeoutms_per_addr; /* how long time in milliseconds to spend on 926 trying to connect to each IP address */ 927 928 const struct Curl_handler *handler; /* Connection's protocol handler */ 929 const struct Curl_handler *given; /* The protocol first given */ 930 931 long ip_version; /* copied from the SessionHandle at creation time */ 932 933 /**** curl_get() phase fields */ 934 935 curl_socket_t sockfd; /* socket to read from or CURL_SOCKET_BAD */ 936 curl_socket_t writesockfd; /* socket to write to, it may very 937 well be the same we read from. 938 CURL_SOCKET_BAD disables */ 939 940 /** Dynamicly allocated strings, MUST be freed before this **/ 941 /** struct is killed. **/ 942 struct dynamically_allocated_data { 943 char *proxyuserpwd; 944 char *uagent; 945 char *accept_encoding; 946 char *userpwd; 947 char *rangeline; 948 char *ref; 949 char *host; 950 char *cookiehost; 951 char *rtsp_transport; 952 char *te; /* TE: request header */ 953 } allocptr; 954 955 #ifdef HAVE_GSSAPI 956 int sec_complete; /* if Kerberos is enabled for this connection */ 957 enum protection_level command_prot; 958 enum protection_level data_prot; 959 enum protection_level request_data_prot; 960 size_t buffer_size; 961 struct krb5buffer in_buffer; 962 void *app_data; 963 const struct Curl_sec_client_mech *mech; 964 struct sockaddr_in local_addr; 965 #endif 966 967 #if defined(USE_KERBEROS5) /* Consider moving some of the above GSS-API */ 968 struct kerberos5data krb5; /* variables into the structure definition, */ 969 #endif /* however, some of them are ftp specific. */ 970 971 /* the two following *_inuse fields are only flags, not counters in any way. 972 If TRUE it means the channel is in use, and if FALSE it means the channel 973 is up for grabs by one. */ 974 975 bool readchannel_inuse; /* whether the read channel is in use by an easy 976 handle */ 977 bool writechannel_inuse; /* whether the write channel is in use by an easy 978 handle */ 979 struct curl_llist *send_pipe; /* List of handles waiting to 980 send on this pipeline */ 981 struct curl_llist *recv_pipe; /* List of handles waiting to read 982 their responses on this pipeline */ 983 char* master_buffer; /* The master buffer allocated on-demand; 984 used for pipelining. */ 985 size_t read_pos; /* Current read position in the master buffer */ 986 size_t buf_len; /* Length of the buffer?? */ 987 988 989 curl_seek_callback seek_func; /* function that seeks the input */ 990 void *seek_client; /* pointer to pass to the seek() above */ 991 992 /*************** Request - specific items ************/ 993 994 #if defined(USE_NTLM) 995 struct ntlmdata ntlm; /* NTLM differs from other authentication schemes 996 because it authenticates connections, not 997 single requests! */ 998 struct ntlmdata proxyntlm; /* NTLM data for proxy */ 999 1000 #if defined(NTLM_WB_ENABLED) 1001 /* used for communication with Samba's winbind daemon helper ntlm_auth */ 1002 curl_socket_t ntlm_auth_hlpr_socket; 1003 pid_t ntlm_auth_hlpr_pid; 1004 char* challenge_header; 1005 char* response_header; 1006 #endif 1007 #endif 1008 1009 char syserr_buf [256]; /* buffer for Curl_strerror() */ 1010 1011 #ifdef CURLRES_ASYNCH 1012 /* data used for the asynch name resolve callback */ 1013 struct Curl_async async; 1014 #endif 1015 1016 /* These three are used for chunked-encoding trailer support */ 1017 char *trailer; /* allocated buffer to store trailer in */ 1018 int trlMax; /* allocated buffer size */ 1019 int trlPos; /* index of where to store data */ 1020 1021 union { 1022 struct ftp_conn ftpc; 1023 struct http_conn httpc; 1024 struct ssh_conn sshc; 1025 struct tftp_state_data *tftpc; 1026 struct imap_conn imapc; 1027 struct pop3_conn pop3c; 1028 struct smtp_conn smtpc; 1029 struct rtsp_conn rtspc; 1030 struct smb_conn smbc; 1031 void *generic; /* RTMP and LDAP use this */ 1032 } proto; 1033 1034 int cselect_bits; /* bitmask of socket events */ 1035 int waitfor; /* current READ/WRITE bits to wait for */ 1036 1037 #if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI) 1038 int socks5_gssapi_enctype; 1039 #endif 1040 1041 bool verifypeer; 1042 bool verifyhost; 1043 1044 /* When this connection is created, store the conditions for the local end 1045 bind. This is stored before the actual bind and before any connection is 1046 made and will serve the purpose of being used for comparison reasons so 1047 that subsequent bound-requested connections aren't accidentally re-using 1048 wrong connections. */ 1049 char *localdev; 1050 unsigned short localport; 1051 int localportrange; 1052 1053 /* tunnel as in tunnel through a HTTP proxy with CONNECT */ 1054 enum { 1055 TUNNEL_INIT, /* init/default/no tunnel state */ 1056 TUNNEL_CONNECT, /* CONNECT has been sent off */ 1057 TUNNEL_COMPLETE /* CONNECT response received completely */ 1058 } tunnel_state[2]; /* two separate ones to allow FTP */ 1059 struct connectbundle *bundle; /* The bundle we are member of */ 1060 1061 int negnpn; /* APLN or NPN TLS negotiated protocol, CURL_HTTP_VERSION* */ 1062 }; 1063 1064 /* The end of connectdata. */ 1065 1066 /* 1067 * Struct to keep statistical and informational data. 1068 */ 1069 struct PureInfo { 1070 int httpcode; /* Recent HTTP, FTP, or RTSP response code */ 1071 int httpproxycode; /* response code from proxy when received separate */ 1072 int httpversion; /* the http version number X.Y = X*10+Y */ 1073 long filetime; /* If requested, this is might get set. Set to -1 if the time 1074 was unretrievable. We cannot have this of type time_t, 1075 since time_t is unsigned on several platforms such as 1076 OpenVMS. */ 1077 bool timecond; /* set to TRUE if the time condition didn't match, which 1078 thus made the document NOT get fetched */ 1079 long header_size; /* size of read header(s) in bytes */ 1080 long request_size; /* the amount of bytes sent in the request(s) */ 1081 unsigned long proxyauthavail; /* what proxy auth types were announced */ 1082 unsigned long httpauthavail; /* what host auth types were announced */ 1083 long numconnects; /* how many new connection did libcurl created */ 1084 char *contenttype; /* the content type of the object */ 1085 char *wouldredirect; /* URL this would've been redirected to if asked to */ 1086 1087 /* PureInfo members 'conn_primary_ip', 'conn_primary_port', 'conn_local_ip' 1088 and, 'conn_local_port' are copied over from the connectdata struct in 1089 order to allow curl_easy_getinfo() to return this information even when 1090 the session handle is no longer associated with a connection, and also 1091 allow curl_easy_reset() to clear this information from the session handle 1092 without disturbing information which is still alive, and that might be 1093 reused, in the connection cache. */ 1094 1095 char conn_primary_ip[MAX_IPADR_LEN]; 1096 long conn_primary_port; 1097 1098 char conn_local_ip[MAX_IPADR_LEN]; 1099 long conn_local_port; 1100 1101 struct curl_certinfo certs; /* info about the certs, only populated in 1102 OpenSSL builds. Asked for with 1103 CURLOPT_CERTINFO / CURLINFO_CERTINFO */ 1104 }; 1105 1106 1107 struct Progress { 1108 long lastshow; /* time() of the last displayed progress meter or NULL to 1109 force redraw at next call */ 1110 curl_off_t size_dl; /* total expected size */ 1111 curl_off_t size_ul; /* total expected size */ 1112 curl_off_t downloaded; /* transferred so far */ 1113 curl_off_t uploaded; /* transferred so far */ 1114 1115 curl_off_t current_speed; /* uses the currently fastest transfer */ 1116 1117 bool callback; /* set when progress callback is used */ 1118 int width; /* screen width at download start */ 1119 int flags; /* see progress.h */ 1120 1121 double timespent; 1122 1123 curl_off_t dlspeed; 1124 curl_off_t ulspeed; 1125 1126 double t_nslookup; 1127 double t_connect; 1128 double t_appconnect; 1129 double t_pretransfer; 1130 double t_starttransfer; 1131 double t_redirect; 1132 1133 struct timeval start; 1134 struct timeval t_startsingle; 1135 struct timeval t_startop; 1136 struct timeval t_acceptdata; 1137 #define CURR_TIME (5+1) /* 6 entries for 5 seconds */ 1138 1139 curl_off_t speeder[ CURR_TIME ]; 1140 struct timeval speeder_time[ CURR_TIME ]; 1141 int speeder_c; 1142 }; 1143 1144 typedef enum { 1145 HTTPREQ_NONE, /* first in list */ 1146 HTTPREQ_GET, 1147 HTTPREQ_POST, 1148 HTTPREQ_POST_FORM, /* we make a difference internally */ 1149 HTTPREQ_PUT, 1150 HTTPREQ_HEAD, 1151 HTTPREQ_CUSTOM, 1152 HTTPREQ_LAST /* last in list */ 1153 } Curl_HttpReq; 1154 1155 typedef enum { 1156 RTSPREQ_NONE, /* first in list */ 1157 RTSPREQ_OPTIONS, 1158 RTSPREQ_DESCRIBE, 1159 RTSPREQ_ANNOUNCE, 1160 RTSPREQ_SETUP, 1161 RTSPREQ_PLAY, 1162 RTSPREQ_PAUSE, 1163 RTSPREQ_TEARDOWN, 1164 RTSPREQ_GET_PARAMETER, 1165 RTSPREQ_SET_PARAMETER, 1166 RTSPREQ_RECORD, 1167 RTSPREQ_RECEIVE, 1168 RTSPREQ_LAST /* last in list */ 1169 } Curl_RtspReq; 1170 1171 /* 1172 * Values that are generated, temporary or calculated internally for a 1173 * "session handle" must be defined within the 'struct UrlState'. This struct 1174 * will be used within the SessionHandle struct. When the 'SessionHandle' 1175 * struct is cloned, this data MUST NOT be copied. 1176 * 1177 * Remember that any "state" information goes globally for the curl handle. 1178 * Session-data MUST be put in the connectdata struct and here. */ 1179 #define MAX_CURL_USER_LENGTH 256 1180 #define MAX_CURL_PASSWORD_LENGTH 256 1181 1182 struct auth { 1183 unsigned long want; /* Bitmask set to the authentication methods wanted by 1184 app (with CURLOPT_HTTPAUTH or CURLOPT_PROXYAUTH). */ 1185 unsigned long picked; 1186 unsigned long avail; /* Bitmask for what the server reports to support for 1187 this resource */ 1188 bool done; /* TRUE when the auth phase is done and ready to do the *actual* 1189 request */ 1190 bool multi; /* TRUE if this is not yet authenticated but within the auth 1191 multipass negotiation */ 1192 bool iestyle; /* TRUE if digest should be done IE-style or FALSE if it should 1193 be RFC compliant */ 1194 }; 1195 1196 struct UrlState { 1197 1198 /* Points to the connection cache */ 1199 struct conncache *conn_cache; 1200 1201 /* when curl_easy_perform() is called, the multi handle is "owned" by 1202 the easy handle so curl_easy_cleanup() on such an easy handle will 1203 also close the multi handle! */ 1204 bool multi_owned_by_easy; 1205 1206 /* buffers to store authentication data in, as parsed from input options */ 1207 struct timeval keeps_speed; /* for the progress meter really */ 1208 1209 struct connectdata *lastconnect; /* The last connection, NULL if undefined */ 1210 1211 char *headerbuff; /* allocated buffer to store headers in */ 1212 size_t headersize; /* size of the allocation */ 1213 1214 char buffer[BUFSIZE+1]; /* download buffer */ 1215 char uploadbuffer[BUFSIZE+1]; /* upload buffer */ 1216 curl_off_t current_speed; /* the ProgressShow() funcion sets this, 1217 bytes / second */ 1218 bool this_is_a_follow; /* this is a followed Location: request */ 1219 1220 char *first_host; /* if set, this should be the host name that we will 1221 sent authorization to, no else. Used to make Location: 1222 following not keep sending user+password... This is 1223 strdup() data. 1224 */ 1225 struct curl_ssl_session *session; /* array of 'max_ssl_sessions' size */ 1226 long sessionage; /* number of the most recent session */ 1227 char *tempwrite; /* allocated buffer to keep data in when a write 1228 callback returns to make the connection paused */ 1229 size_t tempwritesize; /* size of the 'tempwrite' allocated buffer */ 1230 int tempwritetype; /* type of the 'tempwrite' buffer as a bitmask that is 1231 used with Curl_client_write() */ 1232 char *scratch; /* huge buffer[BUFSIZE*2] when doing upload CRLF replacing */ 1233 bool errorbuf; /* Set to TRUE if the error buffer is already filled in. 1234 This must be set to FALSE every time _easy_perform() is 1235 called. */ 1236 int os_errno; /* filled in with errno whenever an error occurs */ 1237 #ifdef HAVE_SIGNAL 1238 /* storage for the previous bag^H^H^HSIGPIPE signal handler :-) */ 1239 void (*prev_signal)(int sig); 1240 #endif 1241 bool allow_port; /* Is set.use_port allowed to take effect or not. This 1242 is always set TRUE when curl_easy_perform() is called. */ 1243 struct digestdata digest; /* state data for host Digest auth */ 1244 struct digestdata proxydigest; /* state data for proxy Digest auth */ 1245 1246 #ifdef USE_SPNEGO 1247 struct negotiatedata negotiate; /* state data for host Negotiate auth */ 1248 struct negotiatedata proxyneg; /* state data for proxy Negotiate auth */ 1249 #endif 1250 1251 struct auth authhost; /* auth details for host */ 1252 struct auth authproxy; /* auth details for proxy */ 1253 1254 bool authproblem; /* TRUE if there's some problem authenticating */ 1255 1256 void *resolver; /* resolver state, if it is used in the URL state - 1257 ares_channel f.e. */ 1258 1259 #if defined(USE_OPENSSL) && defined(HAVE_OPENSSL_ENGINE_H) 1260 ENGINE *engine; 1261 #endif /* USE_OPENSSL */ 1262 struct timeval expiretime; /* set this with Curl_expire() only */ 1263 struct Curl_tree timenode; /* for the splay stuff */ 1264 struct curl_llist *timeoutlist; /* list of pending timeouts */ 1265 1266 /* a place to store the most recently set FTP entrypath */ 1267 char *most_recent_ftp_entrypath; 1268 1269 /* set after initial USER failure, to prevent an authentication loop */ 1270 bool ftp_trying_alternative; 1271 1272 int httpversion; /* the lowest HTTP version*10 reported by any server 1273 involved in this request */ 1274 bool expect100header; /* TRUE if we added Expect: 100-continue */ 1275 1276 bool pipe_broke; /* TRUE if the connection we were pipelined on broke 1277 and we need to restart from the beginning */ 1278 1279 #if !defined(WIN32) && !defined(MSDOS) && !defined(__EMX__) && \ 1280 !defined(__SYMBIAN32__) 1281 /* do FTP line-end conversions on most platforms */ 1282 #define CURL_DO_LINEEND_CONV 1283 /* for FTP downloads: track CRLF sequences that span blocks */ 1284 bool prev_block_had_trailing_cr; 1285 /* for FTP downloads: how many CRLFs did we converted to LFs? */ 1286 curl_off_t crlf_conversions; 1287 #endif 1288 char *pathbuffer;/* allocated buffer to store the URL's path part in */ 1289 char *path; /* path to use, points to somewhere within the pathbuffer 1290 area */ 1291 bool slash_removed; /* set TRUE if the 'path' points to a path where the 1292 initial URL slash separator has been taken off */ 1293 bool use_range; 1294 bool rangestringalloc; /* the range string is malloc()'ed */ 1295 1296 char *range; /* range, if used. See README for detailed specification on 1297 this syntax. */ 1298 curl_off_t resume_from; /* continue [ftp] transfer from here */ 1299 1300 /* This RTSP state information survives requests and connections */ 1301 long rtsp_next_client_CSeq; /* the session's next client CSeq */ 1302 long rtsp_next_server_CSeq; /* the session's next server CSeq */ 1303 long rtsp_CSeq_recv; /* most recent CSeq received */ 1304 1305 curl_off_t infilesize; /* size of file to upload, -1 means unknown. 1306 Copied from set.filesize at start of operation */ 1307 1308 int drain; /* Increased when this stream has data to read, even if its 1309 socket not necessarily is readable. Decreased when 1310 checked. */ 1311 bool done; /* set to FALSE when Curl_do() is called and set to TRUE when 1312 Curl_done() is called, to prevent Curl_done() to get invoked 1313 twice when the multi interface is used. */ 1314 }; 1315 1316 1317 /* 1318 * This 'DynamicStatic' struct defines dynamic states that actually change 1319 * values in the 'UserDefined' area, which MUST be taken into consideration 1320 * if the UserDefined struct is cloned or similar. You can probably just 1321 * copy these, but each one indicate a special action on other data. 1322 */ 1323 1324 struct DynamicStatic { 1325 char *url; /* work URL, copied from UserDefined */ 1326 bool url_alloc; /* URL string is malloc()'ed */ 1327 char *referer; /* referer string */ 1328 bool referer_alloc; /* referer sting is malloc()ed */ 1329 struct curl_slist *cookielist; /* list of cookie files set by 1330 curl_easy_setopt(COOKIEFILE) calls */ 1331 struct curl_slist *resolve; /* set to point to the set.resolve list when 1332 this should be dealt with in pretransfer */ 1333 }; 1334 1335 /* 1336 * This 'UserDefined' struct must only contain data that is set once to go 1337 * for many (perhaps) independent connections. Values that are generated or 1338 * calculated internally for the "session handle" MUST be defined within the 1339 * 'struct UrlState' instead. The only exceptions MUST note the changes in 1340 * the 'DynamicStatic' struct. 1341 * Character pointer fields point to dynamic storage, unless otherwise stated. 1342 */ 1343 1344 struct Curl_multi; /* declared and used only in multi.c */ 1345 1346 enum dupstring { 1347 STRING_CERT, /* client certificate file name */ 1348 STRING_CERT_TYPE, /* format for certificate (default: PEM)*/ 1349 STRING_COOKIE, /* HTTP cookie string to send */ 1350 STRING_COOKIEJAR, /* dump all cookies to this file */ 1351 STRING_CUSTOMREQUEST, /* HTTP/FTP/RTSP request/method to use */ 1352 STRING_DEVICE, /* local network interface/address to use */ 1353 STRING_ENCODING, /* Accept-Encoding string */ 1354 STRING_FTP_ACCOUNT, /* ftp account data */ 1355 STRING_FTP_ALTERNATIVE_TO_USER, /* command to send if USER/PASS fails */ 1356 STRING_FTPPORT, /* port to send with the FTP PORT command */ 1357 STRING_KEY, /* private key file name */ 1358 STRING_KEY_PASSWD, /* plain text private key password */ 1359 STRING_KEY_TYPE, /* format for private key (default: PEM) */ 1360 STRING_KRB_LEVEL, /* krb security level */ 1361 STRING_NETRC_FILE, /* if not NULL, use this instead of trying to find 1362 $HOME/.netrc */ 1363 STRING_PROXY, /* proxy to use */ 1364 STRING_SET_RANGE, /* range, if used */ 1365 STRING_SET_REFERER, /* custom string for the HTTP referer field */ 1366 STRING_SET_URL, /* what original URL to work on */ 1367 STRING_SSL_CAPATH, /* CA directory name (doesn't work on windows) */ 1368 STRING_SSL_CAFILE, /* certificate file to verify peer against */ 1369 STRING_SSL_PINNEDPUBLICKEY, /* public key file to verify peer against */ 1370 STRING_SSL_CIPHER_LIST, /* list of ciphers to use */ 1371 STRING_SSL_EGDSOCKET, /* path to file containing the EGD daemon socket */ 1372 STRING_SSL_RANDOM_FILE, /* path to file containing "random" data */ 1373 STRING_USERAGENT, /* User-Agent string */ 1374 STRING_SSL_CRLFILE, /* crl file to check certificate */ 1375 STRING_SSL_ISSUERCERT, /* issuer cert file to check certificate */ 1376 STRING_USERNAME, /* <username>, if used */ 1377 STRING_PASSWORD, /* <password>, if used */ 1378 STRING_OPTIONS, /* <options>, if used */ 1379 STRING_PROXYUSERNAME, /* Proxy <username>, if used */ 1380 STRING_PROXYPASSWORD, /* Proxy <password>, if used */ 1381 STRING_NOPROXY, /* List of hosts which should not use the proxy, if 1382 used */ 1383 STRING_RTSP_SESSION_ID, /* Session ID to use */ 1384 STRING_RTSP_STREAM_URI, /* Stream URI for this request */ 1385 STRING_RTSP_TRANSPORT, /* Transport for this session */ 1386 #ifdef USE_LIBSSH2 1387 STRING_SSH_PRIVATE_KEY, /* path to the private key file for auth */ 1388 STRING_SSH_PUBLIC_KEY, /* path to the public key file for auth */ 1389 STRING_SSH_HOST_PUBLIC_KEY_MD5, /* md5 of host public key in ascii hex */ 1390 STRING_SSH_KNOWNHOSTS, /* file name of knownhosts file */ 1391 #endif 1392 #if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI) 1393 STRING_SOCKS5_GSSAPI_SERVICE, /* GSSAPI service name */ 1394 STRING_PROXY_SERVICE_NAME, /* Proxy service name */ 1395 STRING_SERVICE_NAME, /* Service name */ 1396 #endif 1397 STRING_MAIL_FROM, 1398 STRING_MAIL_AUTH, 1399 1400 #ifdef USE_TLS_SRP 1401 STRING_TLSAUTH_USERNAME, /* TLS auth <username> */ 1402 STRING_TLSAUTH_PASSWORD, /* TLS auth <password> */ 1403 #endif 1404 STRING_BEARER, /* <bearer>, if used */ 1405 #ifdef USE_UNIX_SOCKETS 1406 STRING_UNIX_SOCKET_PATH, /* path to Unix socket, if used */ 1407 #endif 1408 1409 /* -- end of zero-terminated strings -- */ 1410 1411 STRING_LASTZEROTERMINATED, 1412 1413 /* -- below this are pointers to binary data that cannot be strdup'ed. 1414 Each such pointer must be added manually to Curl_dupset() --- */ 1415 1416 STRING_COPYPOSTFIELDS, /* if POST, set the fields' values here */ 1417 1418 STRING_LAST /* not used, just an end-of-list marker */ 1419 }; 1420 1421 struct UserDefined { 1422 FILE *err; /* the stderr user data goes here */ 1423 void *debugdata; /* the data that will be passed to fdebug */ 1424 char *errorbuffer; /* (Static) store failure messages in here */ 1425 long proxyport; /* If non-zero, use this port number by default. If the 1426 proxy string features a ":[port]" that one will override 1427 this. */ 1428 void *out; /* CURLOPT_WRITEDATA */ 1429 void *in; /* CURLOPT_READDATA */ 1430 void *writeheader; /* write the header to this if non-NULL */ 1431 void *rtp_out; /* write RTP to this if non-NULL */ 1432 long use_port; /* which port to use (when not using default) */ 1433 unsigned long httpauth; /* kind of HTTP authentication to use (bitmask) */ 1434 unsigned long proxyauth; /* kind of proxy authentication to use (bitmask) */ 1435 long followlocation; /* as in HTTP Location: */ 1436 long maxredirs; /* maximum no. of http(s) redirects to follow, set to -1 1437 for infinity */ 1438 1439 int keep_post; /* keep POSTs as POSTs after a 30x request; each 1440 bit represents a request, from 301 to 303 */ 1441 bool free_referer; /* set TRUE if 'referer' points to a string we 1442 allocated */ 1443 void *postfields; /* if POST, set the fields' values here */ 1444 curl_seek_callback seek_func; /* function that seeks the input */ 1445 curl_off_t postfieldsize; /* if POST, this might have a size to use instead 1446 of strlen(), and then the data *may* be binary 1447 (contain zero bytes) */ 1448 unsigned short localport; /* local port number to bind to */ 1449 int localportrange; /* number of additional port numbers to test in case the 1450 'localport' one can't be bind()ed */ 1451 curl_write_callback fwrite_func; /* function that stores the output */ 1452 curl_write_callback fwrite_header; /* function that stores headers */ 1453 curl_write_callback fwrite_rtp; /* function that stores interleaved RTP */ 1454 curl_read_callback fread_func; /* function that reads the input */ 1455 int is_fread_set; /* boolean, has read callback been set to non-NULL? */ 1456 int is_fwrite_set; /* boolean, has write callback been set to non-NULL? */ 1457 curl_progress_callback fprogress; /* OLD and deprecated progress callback */ 1458 curl_xferinfo_callback fxferinfo; /* progress callback */ 1459 curl_debug_callback fdebug; /* function that write informational data */ 1460 curl_ioctl_callback ioctl_func; /* function for I/O control */ 1461 curl_sockopt_callback fsockopt; /* function for setting socket options */ 1462 void *sockopt_client; /* pointer to pass to the socket options callback */ 1463 curl_opensocket_callback fopensocket; /* function for checking/translating 1464 the address and opening the 1465 socket */ 1466 void* opensocket_client; 1467 curl_closesocket_callback fclosesocket; /* function for closing the 1468 socket */ 1469 void* closesocket_client; 1470 1471 void *seek_client; /* pointer to pass to the seek callback */ 1472 /* the 3 curl_conv_callback functions below are used on non-ASCII hosts */ 1473 /* function to convert from the network encoding: */ 1474 curl_conv_callback convfromnetwork; 1475 /* function to convert to the network encoding: */ 1476 curl_conv_callback convtonetwork; 1477 /* function to convert from UTF-8 encoding: */ 1478 curl_conv_callback convfromutf8; 1479 1480 void *progress_client; /* pointer to pass to the progress callback */ 1481 void *ioctl_client; /* pointer to pass to the ioctl callback */ 1482 long timeout; /* in milliseconds, 0 means no timeout */ 1483 long connecttimeout; /* in milliseconds, 0 means no timeout */ 1484 long accepttimeout; /* in milliseconds, 0 means no timeout */ 1485 long server_response_timeout; /* in milliseconds, 0 means no timeout */ 1486 long tftp_blksize ; /* in bytes, 0 means use default */ 1487 curl_off_t filesize; /* size of file to upload, -1 means unknown */ 1488 long low_speed_limit; /* bytes/second */ 1489 long low_speed_time; /* number of seconds */ 1490 curl_off_t max_send_speed; /* high speed limit in bytes/second for upload */ 1491 curl_off_t max_recv_speed; /* high speed limit in bytes/second for 1492 download */ 1493 curl_off_t set_resume_from; /* continue [ftp] transfer from here */ 1494 struct curl_slist *headers; /* linked list of extra headers */ 1495 struct curl_slist *proxyheaders; /* linked list of extra CONNECT headers */ 1496 struct curl_httppost *httppost; /* linked list of POST data */ 1497 bool sep_headers; /* handle host and proxy headers separately */ 1498 bool cookiesession; /* new cookie session? */ 1499 bool crlf; /* convert crlf on ftp upload(?) */ 1500 struct curl_slist *quote; /* after connection is established */ 1501 struct curl_slist *postquote; /* after the transfer */ 1502 struct curl_slist *prequote; /* before the transfer, after type */ 1503 struct curl_slist *source_quote; /* 3rd party quote */ 1504 struct curl_slist *source_prequote; /* in 3rd party transfer mode - before 1505 the transfer on source host */ 1506 struct curl_slist *source_postquote; /* in 3rd party transfer mode - after 1507 the transfer on source host */ 1508 struct curl_slist *telnet_options; /* linked list of telnet options */ 1509 struct curl_slist *resolve; /* list of names to add/remove from 1510 DNS cache */ 1511 curl_TimeCond timecondition; /* kind of time/date comparison */ 1512 time_t timevalue; /* what time to compare with */ 1513 Curl_HttpReq httpreq; /* what kind of HTTP request (if any) is this */ 1514 long httpversion; /* when non-zero, a specific HTTP version requested to 1515 be used in the library's request(s) */ 1516 struct ssl_config_data ssl; /* user defined SSL stuff */ 1517 curl_proxytype proxytype; /* what kind of proxy that is in use */ 1518 long dns_cache_timeout; /* DNS cache timeout */ 1519 long buffer_size; /* size of receive buffer to use */ 1520 void *private_data; /* application-private data */ 1521 1522 struct curl_slist *http200aliases; /* linked list of aliases for http200 */ 1523 1524 long ipver; /* the CURL_IPRESOLVE_* defines in the public header file 1525 0 - whatever, 1 - v2, 2 - v6 */ 1526 1527 curl_off_t max_filesize; /* Maximum file size to download */ 1528 1529 curl_ftpfile ftp_filemethod; /* how to get to a file when FTP is used */ 1530 1531 int ftp_create_missing_dirs; /* 1 - create directories that don't exist 1532 2 - the same but also allow MKD to fail once 1533 */ 1534 1535 curl_sshkeycallback ssh_keyfunc; /* key matching callback */ 1536 void *ssh_keyfunc_userp; /* custom pointer to callback */ 1537 1538 /* Here follows boolean settings that define how to behave during 1539 this session. They are STATIC, set by libcurl users or at least initially 1540 and they don't change during operations. */ 1541 1542 bool printhost; /* printing host name in debug info */ 1543 bool get_filetime; /* get the time and get of the remote file */ 1544 bool tunnel_thru_httpproxy; /* use CONNECT through a HTTP proxy */ 1545 bool prefer_ascii; /* ASCII rather than binary */ 1546 bool ftp_append; /* append, not overwrite, on upload */ 1547 bool ftp_list_only; /* switch FTP command for listing directories */ 1548 bool ftp_use_port; /* use the FTP PORT command */ 1549 bool hide_progress; /* don't use the progress meter */ 1550 bool http_fail_on_error; /* fail on HTTP error codes >= 400 */ 1551 bool http_follow_location; /* follow HTTP redirects */ 1552 bool http_transfer_encoding; /* request compressed HTTP transfer-encoding */ 1553 bool http_disable_hostname_check_before_authentication; 1554 bool include_header; /* include received protocol headers in data output */ 1555 bool http_set_referer; /* is a custom referer used */ 1556 bool http_auto_referer; /* set "correct" referer when following location: */ 1557 bool opt_no_body; /* as set with CURLOPT_NOBODY */ 1558 bool set_port; /* custom port number used */ 1559 bool upload; /* upload request */ 1560 enum CURL_NETRC_OPTION 1561 use_netrc; /* defined in include/curl.h */ 1562 bool verbose; /* output verbosity */ 1563 bool krb; /* Kerberos connection requested */ 1564 bool reuse_forbid; /* forbidden to be reused, close after use */ 1565 bool reuse_fresh; /* do not re-use an existing connection */ 1566 bool ftp_use_epsv; /* if EPSV is to be attempted or not */ 1567 bool ftp_use_eprt; /* if EPRT is to be attempted or not */ 1568 bool ftp_use_pret; /* if PRET is to be used before PASV or not */ 1569 1570 curl_usessl use_ssl; /* if AUTH TLS is to be attempted etc, for FTP or 1571 IMAP or POP3 or others! */ 1572 curl_ftpauth ftpsslauth; /* what AUTH XXX to be attempted */ 1573 curl_ftpccc ftp_ccc; /* FTP CCC options */ 1574 bool no_signal; /* do not use any signal/alarm handler */ 1575 bool global_dns_cache; /* subject for future removal */ 1576 bool tcp_nodelay; /* whether to enable TCP_NODELAY or not */ 1577 bool ignorecl; /* ignore content length */ 1578 bool ftp_skip_ip; /* skip the IP address the FTP server passes on to 1579 us */ 1580 bool connect_only; /* make connection, let application use the socket */ 1581 bool ssl_enable_beast; /* especially allow this flaw for interoperability's 1582 sake*/ 1583 long ssh_auth_types; /* allowed SSH auth types */ 1584 bool http_te_skip; /* pass the raw body data to the user, even when 1585 transfer-encoded (chunked, compressed) */ 1586 bool http_ce_skip; /* pass the raw body data to the user, even when 1587 content-encoded (chunked, compressed) */ 1588 long new_file_perms; /* Permissions to use when creating remote files */ 1589 long new_directory_perms; /* Permissions to use when creating remote dirs */ 1590 bool proxy_transfer_mode; /* set transfer mode (;type=<a|i>) when doing FTP 1591 via an HTTP proxy */ 1592 char *str[STRING_LAST]; /* array of strings, pointing to allocated memory */ 1593 unsigned int scope_id; /* Scope id for IPv6 */ 1594 long allowed_protocols; 1595 long redir_protocols; 1596 #if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI) 1597 long socks5_gssapi_nec; /* flag to support nec socks5 server */ 1598 #endif 1599 struct curl_slist *mail_rcpt; /* linked list of mail recipients */ 1600 bool sasl_ir; /* Enable/disable SASL initial response */ 1601 /* Common RTSP header options */ 1602 Curl_RtspReq rtspreq; /* RTSP request type */ 1603 long rtspversion; /* like httpversion, for RTSP */ 1604 bool wildcardmatch; /* enable wildcard matching */ 1605 curl_chunk_bgn_callback chunk_bgn; /* called before part of transfer 1606 starts */ 1607 curl_chunk_end_callback chunk_end; /* called after part transferring 1608 stopped */ 1609 curl_fnmatch_callback fnmatch; /* callback to decide which file corresponds 1610 to pattern (e.g. if WILDCARDMATCH is on) */ 1611 void *fnmatch_data; 1612 1613 long gssapi_delegation; /* GSS-API credential delegation, see the 1614 documentation of CURLOPT_GSSAPI_DELEGATION */ 1615 1616 bool tcp_keepalive; /* use TCP keepalives */ 1617 long tcp_keepidle; /* seconds in idle before sending keepalive probe */ 1618 long tcp_keepintvl; /* seconds between TCP keepalive probes */ 1619 1620 size_t maxconnects; /* Max idle connections in the connection cache */ 1621 1622 bool ssl_enable_npn; /* TLS NPN extension? */ 1623 bool ssl_enable_alpn; /* TLS ALPN extension? */ 1624 bool path_as_is; /* allow dotdots? */ 1625 bool pipewait; /* wait for pipe/multiplex status before starting a 1626 new connection */ 1627 long expect_100_timeout; /* in milliseconds */ 1628 }; 1629 1630 struct Names { 1631 struct curl_hash *hostcache; 1632 enum { 1633 HCACHE_NONE, /* not pointing to anything */ 1634 HCACHE_GLOBAL, /* points to the (shrug) global one */ 1635 HCACHE_MULTI, /* points to a shared one in the multi handle */ 1636 HCACHE_SHARED /* points to a shared one in a shared object */ 1637 } hostcachetype; 1638 }; 1639 1640 /* 1641 * The 'connectdata' struct MUST have all the connection oriented stuff as we 1642 * may have several simultaneous connections and connection structs in memory. 1643 * 1644 * The 'struct UserDefined' must only contain data that is set once to go for 1645 * many (perhaps) independent connections. Values that are generated or 1646 * calculated internally for the "session handle" must be defined within the 1647 * 'struct UrlState' instead. 1648 */ 1649 1650 struct SessionHandle { 1651 /* first, two fields for the linked list of these */ 1652 struct SessionHandle *next; 1653 struct SessionHandle *prev; 1654 1655 struct connectdata *easy_conn; /* the "unit's" connection */ 1656 1657 CURLMstate mstate; /* the handle's state */ 1658 CURLcode result; /* previous result */ 1659 1660 struct Curl_message msg; /* A single posted message. */ 1661 1662 /* Array with the plain socket numbers this handle takes care of, in no 1663 particular order. Note that all sockets are added to the sockhash, where 1664 the state etc are also kept. This array is mostly used to detect when a 1665 socket is to be removed from the hash. See singlesocket(). */ 1666 curl_socket_t sockets[MAX_SOCKSPEREASYHANDLE]; 1667 int numsocks; 1668 1669 struct Names dns; 1670 struct Curl_multi *multi; /* if non-NULL, points to the multi handle 1671 struct to which this "belongs" when used by 1672 the multi interface */ 1673 struct Curl_multi *multi_easy; /* if non-NULL, points to the multi handle 1674 struct to which this "belongs" when used 1675 by the easy interface */ 1676 struct Curl_share *share; /* Share, handles global variable mutexing */ 1677 struct SingleRequest req; /* Request-specific data */ 1678 struct UserDefined set; /* values set by the libcurl user */ 1679 struct DynamicStatic change; /* possibly modified userdefined data */ 1680 struct CookieInfo *cookies; /* the cookies, read from files and servers. 1681 NOTE that the 'cookie' field in the 1682 UserDefined struct defines if the "engine" 1683 is to be used or not. */ 1684 struct Progress progress; /* for all the progress meter data */ 1685 struct UrlState state; /* struct for fields used for state info and 1686 other dynamic purposes */ 1687 struct WildcardData wildcard; /* wildcard download state info */ 1688 struct PureInfo info; /* stats, reports and info data */ 1689 struct curl_tlssessioninfo tsi; /* Information about the TLS session, only 1690 valid after a client has asked for it */ 1691 #if defined(CURL_DOES_CONVERSIONS) && defined(HAVE_ICONV) 1692 iconv_t outbound_cd; /* for translating to the network encoding */ 1693 iconv_t inbound_cd; /* for translating from the network encoding */ 1694 iconv_t utf8_cd; /* for translating to UTF8 */ 1695 #endif /* CURL_DOES_CONVERSIONS && HAVE_ICONV */ 1696 unsigned int magic; /* set to a CURLEASY_MAGIC_NUMBER */ 1697 }; 1698 1699 #define LIBCURL_NAME "libcurl" 1700 1701 #endif /* HEADER_CURL_URLDATA_H */ 1702