mirror of
git://source.winehq.org/git/wine.git
synced 2024-11-05 18:01:34 +00:00
453 lines
12 KiB
C
453 lines
12 KiB
C
/*
|
|
* Wininet
|
|
*
|
|
* Copyright 1999 Corel Corporation
|
|
*
|
|
* Ulrich Czekalla
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
*/
|
|
|
|
#ifndef _WINE_INTERNET_H_
|
|
#define _WINE_INTERNET_H_
|
|
|
|
#include "wine/list.h"
|
|
|
|
#include <time.h>
|
|
|
|
#include "winineti.h"
|
|
|
|
extern HMODULE WININET_hModule;
|
|
|
|
typedef struct {
|
|
WCHAR *name;
|
|
INTERNET_PORT port;
|
|
BOOL is_https;
|
|
struct sockaddr_storage addr;
|
|
int addr_len;
|
|
char addr_str[INET6_ADDRSTRLEN];
|
|
|
|
WCHAR *scheme_host_port;
|
|
const WCHAR *host_port;
|
|
const WCHAR *canon_host_port;
|
|
|
|
LONG ref;
|
|
|
|
DWORD security_flags;
|
|
const CERT_CHAIN_CONTEXT *cert_chain;
|
|
|
|
struct list entry;
|
|
struct list conn_pool;
|
|
} server_t;
|
|
|
|
void server_addref(server_t*);
|
|
void server_release(server_t*);
|
|
|
|
typedef enum {
|
|
COLLECT_TIMEOUT,
|
|
COLLECT_CONNECTIONS,
|
|
COLLECT_CLEANUP
|
|
} collect_type_t;
|
|
BOOL collect_connections(collect_type_t);
|
|
|
|
/* used for netconnection.c stuff */
|
|
typedef struct
|
|
{
|
|
int socket;
|
|
BOOL secure;
|
|
BOOL is_blocking;
|
|
CtxtHandle ssl_ctx;
|
|
SecPkgContext_StreamSizes ssl_sizes;
|
|
server_t *server;
|
|
char *ssl_buf;
|
|
char *extra_buf;
|
|
size_t extra_len;
|
|
char *peek_msg;
|
|
char *peek_msg_mem;
|
|
size_t peek_len;
|
|
DWORD security_flags;
|
|
BOOL mask_errors;
|
|
|
|
BOOL keep_alive;
|
|
DWORD64 keep_until;
|
|
struct list pool_entry;
|
|
} netconn_t;
|
|
|
|
BOOL is_valid_netconn(netconn_t *);
|
|
void close_netconn(netconn_t *);
|
|
|
|
static inline WCHAR *strndupW(const WCHAR *str, UINT max_len)
|
|
{
|
|
LPWSTR ret;
|
|
UINT len;
|
|
|
|
if(!str)
|
|
return NULL;
|
|
|
|
for(len=0; len<max_len; len++)
|
|
if(str[len] == '\0')
|
|
break;
|
|
|
|
ret = malloc(sizeof(WCHAR) * (len + 1));
|
|
if(ret) {
|
|
memcpy(ret, str, sizeof(WCHAR)*len);
|
|
ret[len] = '\0';
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static inline WCHAR *strndupAtoW(const char *str, int len_a, DWORD *len_w)
|
|
{
|
|
WCHAR *ret = NULL;
|
|
|
|
if(str) {
|
|
size_t len;
|
|
if(len_a < 0)
|
|
len_a = strlen(str);
|
|
else if(len_a > 0)
|
|
len_a = strnlen(str, len_a);
|
|
len = MultiByteToWideChar(CP_ACP, 0, str, len_a, NULL, 0);
|
|
ret = malloc((len + 1) * sizeof(WCHAR));
|
|
if(ret) {
|
|
MultiByteToWideChar(CP_ACP, 0, str, len_a, ret, len);
|
|
ret[len] = 0;
|
|
*len_w = len;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static inline WCHAR *strdupAtoW(const char *str)
|
|
{
|
|
LPWSTR ret = NULL;
|
|
|
|
if(str) {
|
|
DWORD len;
|
|
|
|
len = MultiByteToWideChar(CP_ACP, 0, str, -1, NULL, 0);
|
|
ret = malloc(len * sizeof(WCHAR));
|
|
if(ret)
|
|
MultiByteToWideChar(CP_ACP, 0, str, -1, ret, len);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
static inline char *strdupWtoA(const WCHAR *str)
|
|
{
|
|
char *ret = NULL;
|
|
|
|
if(str) {
|
|
DWORD size = WideCharToMultiByte(CP_ACP, 0, str, -1, NULL, 0, NULL, NULL);
|
|
ret = malloc(size);
|
|
if(ret)
|
|
WideCharToMultiByte(CP_ACP, 0, str, -1, ret, size, NULL, NULL);
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
typedef struct {
|
|
const WCHAR *str;
|
|
size_t len;
|
|
} substr_t;
|
|
|
|
static inline substr_t substr(const WCHAR *str, size_t len)
|
|
{
|
|
substr_t r = {str, len};
|
|
return r;
|
|
}
|
|
|
|
static inline substr_t substrz(const WCHAR *str)
|
|
{
|
|
return substr(str, lstrlenW(str));
|
|
}
|
|
|
|
static inline void WININET_find_data_WtoA(LPWIN32_FIND_DATAW dataW, LPWIN32_FIND_DATAA dataA)
|
|
{
|
|
dataA->dwFileAttributes = dataW->dwFileAttributes;
|
|
dataA->ftCreationTime = dataW->ftCreationTime;
|
|
dataA->ftLastAccessTime = dataW->ftLastAccessTime;
|
|
dataA->ftLastWriteTime = dataW->ftLastWriteTime;
|
|
dataA->nFileSizeHigh = dataW->nFileSizeHigh;
|
|
dataA->nFileSizeLow = dataW->nFileSizeLow;
|
|
dataA->dwReserved0 = dataW->dwReserved0;
|
|
dataA->dwReserved1 = dataW->dwReserved1;
|
|
WideCharToMultiByte(CP_ACP, 0, dataW->cFileName, -1,
|
|
dataA->cFileName, sizeof(dataA->cFileName),
|
|
NULL, NULL);
|
|
WideCharToMultiByte(CP_ACP, 0, dataW->cAlternateFileName, -1,
|
|
dataA->cAlternateFileName, sizeof(dataA->cAlternateFileName),
|
|
NULL, NULL);
|
|
}
|
|
|
|
typedef enum
|
|
{
|
|
WH_HINIT = INTERNET_HANDLE_TYPE_INTERNET,
|
|
WH_HFTPSESSION = INTERNET_HANDLE_TYPE_CONNECT_FTP,
|
|
WH_HGOPHERSESSION = INTERNET_HANDLE_TYPE_CONNECT_GOPHER,
|
|
WH_HHTTPSESSION = INTERNET_HANDLE_TYPE_CONNECT_HTTP,
|
|
WH_HFILE = INTERNET_HANDLE_TYPE_FTP_FILE,
|
|
WH_HFTPFINDNEXT = INTERNET_HANDLE_TYPE_FTP_FIND,
|
|
WH_HHTTPREQ = INTERNET_HANDLE_TYPE_HTTP_REQUEST,
|
|
} WH_TYPE;
|
|
|
|
#define INET_OPENURL 0x0001
|
|
#define INET_CALLBACKW 0x0002
|
|
|
|
typedef struct
|
|
{
|
|
LONG ref;
|
|
HANDLE file_handle;
|
|
WCHAR *file_name;
|
|
WCHAR *url;
|
|
BOOL is_committed;
|
|
} req_file_t;
|
|
|
|
typedef struct _object_header_t object_header_t;
|
|
|
|
typedef struct {
|
|
void (*Destroy)(object_header_t*);
|
|
void (*CloseConnection)(object_header_t*);
|
|
DWORD (*QueryOption)(object_header_t*,DWORD,void*,DWORD*,BOOL);
|
|
DWORD (*SetOption)(object_header_t*,DWORD,void*,DWORD);
|
|
DWORD (*SetFilePointer)(object_header_t*,LONG,DWORD);
|
|
DWORD (*ReadFile)(object_header_t*,void*,DWORD,DWORD*,DWORD,DWORD_PTR);
|
|
DWORD (*WriteFile)(object_header_t*,const void*,DWORD,DWORD*);
|
|
DWORD (*QueryDataAvailable)(object_header_t*,DWORD*,DWORD,DWORD_PTR);
|
|
DWORD (*FindNextFileW)(object_header_t*,void*);
|
|
DWORD (*LockRequestFile)(object_header_t*,req_file_t**);
|
|
} object_vtbl_t;
|
|
|
|
#define INTERNET_HANDLE_IN_USE 1
|
|
|
|
struct _object_header_t
|
|
{
|
|
WH_TYPE htype;
|
|
const object_vtbl_t *vtbl;
|
|
HINTERNET hInternet;
|
|
BOOL valid_handle;
|
|
DWORD dwFlags;
|
|
DWORD_PTR dwContext;
|
|
DWORD dwError;
|
|
ULONG ErrorMask;
|
|
DWORD dwInternalFlags;
|
|
LONG refs;
|
|
BOOL decoding;
|
|
INTERNET_STATUS_CALLBACK lpfnStatusCB;
|
|
struct list entry;
|
|
struct list children;
|
|
};
|
|
|
|
typedef struct
|
|
{
|
|
object_header_t hdr;
|
|
LPWSTR agent;
|
|
LPWSTR proxy;
|
|
LPWSTR proxyBypass;
|
|
LPWSTR proxyUsername;
|
|
LPWSTR proxyPassword;
|
|
DWORD accessType;
|
|
DWORD connect_timeout;
|
|
} appinfo_t;
|
|
|
|
typedef struct
|
|
{
|
|
object_header_t hdr;
|
|
appinfo_t *appInfo;
|
|
LPWSTR hostName; /* the final destination of the request */
|
|
LPWSTR userName;
|
|
LPWSTR password;
|
|
INTERNET_PORT hostPort; /* the final destination port of the request */
|
|
DWORD connect_timeout;
|
|
DWORD send_timeout;
|
|
DWORD receive_timeout;
|
|
} http_session_t;
|
|
|
|
#define HDR_ISREQUEST 0x0001
|
|
#define HDR_COMMADELIMITED 0x0002
|
|
#define HDR_SEMIDELIMITED 0x0004
|
|
|
|
typedef struct
|
|
{
|
|
LPWSTR lpszField;
|
|
LPWSTR lpszValue;
|
|
WORD wFlags;
|
|
WORD wCount;
|
|
} HTTPHEADERW, *LPHTTPHEADERW;
|
|
|
|
|
|
struct HttpAuthInfo;
|
|
|
|
typedef struct data_stream_vtbl_t data_stream_vtbl_t;
|
|
|
|
typedef struct {
|
|
const data_stream_vtbl_t *vtbl;
|
|
} data_stream_t;
|
|
|
|
typedef struct {
|
|
data_stream_t data_stream;
|
|
ULONGLONG content_length;
|
|
ULONGLONG content_read;
|
|
} netconn_stream_t;
|
|
|
|
#define READ_BUFFER_SIZE 8192
|
|
|
|
typedef struct
|
|
{
|
|
object_header_t hdr;
|
|
http_session_t *session;
|
|
server_t *server;
|
|
server_t *proxy;
|
|
LPWSTR path;
|
|
LPWSTR verb;
|
|
netconn_t *netconn;
|
|
DWORD security_flags;
|
|
DWORD connect_timeout;
|
|
DWORD send_timeout;
|
|
DWORD receive_timeout;
|
|
LPWSTR version;
|
|
DWORD status_code;
|
|
LPWSTR statusText;
|
|
DWORD bytesToWrite;
|
|
DWORD bytesWritten;
|
|
BOOL clear_auth; /* Flag to clear the password field on the authorization dialog */
|
|
|
|
CRITICAL_SECTION headers_section; /* section to protect the headers array */
|
|
HTTPHEADERW *custHeaders;
|
|
DWORD nCustHeaders;
|
|
|
|
FILETIME last_modified;
|
|
HANDLE hCacheFile;
|
|
ULONGLONG cache_size; /* size of cached data */
|
|
req_file_t *req_file;
|
|
FILETIME expires;
|
|
struct HttpAuthInfo *authInfo;
|
|
struct HttpAuthInfo *proxyAuthInfo;
|
|
|
|
CRITICAL_SECTION read_section; /* section to protect the following fields */
|
|
ULONGLONG contentLength; /* total number of bytes to be read */
|
|
ULONGLONG content_pos; /* content read position */
|
|
BOOL read_gzip; /* are we reading in gzip mode? */
|
|
DWORD read_pos; /* current read position in read_buf */
|
|
DWORD read_size; /* valid data size in read_buf */
|
|
BYTE read_buf[READ_BUFFER_SIZE]; /* buffer for already read but not returned data */
|
|
|
|
data_stream_t *data_stream;
|
|
netconn_stream_t netconn_stream;
|
|
} http_request_t;
|
|
|
|
typedef struct task_header_t task_header_t;
|
|
typedef void (*async_task_proc_t)(task_header_t*);
|
|
|
|
struct task_header_t
|
|
{
|
|
async_task_proc_t proc;
|
|
object_header_t *hdr;
|
|
};
|
|
|
|
void *alloc_async_task(object_header_t*,async_task_proc_t,size_t);
|
|
|
|
void *alloc_object(object_header_t*,const object_vtbl_t*,size_t);
|
|
object_header_t *get_handle_object( HINTERNET hinternet );
|
|
object_header_t *WININET_AddRef( object_header_t *info );
|
|
BOOL WININET_Release( object_header_t *info );
|
|
|
|
DWORD INET_QueryOption(object_header_t*,DWORD,void*,DWORD*,BOOL);
|
|
DWORD INET_SetOption(object_header_t*,DWORD,void*,DWORD);
|
|
|
|
time_t ConvertTimeString(LPCWSTR asctime);
|
|
|
|
HINTERNET FTP_Connect(appinfo_t *hIC, LPCWSTR lpszServerName,
|
|
INTERNET_PORT nServerPort, LPCWSTR lpszUserName,
|
|
LPCWSTR lpszPassword, DWORD dwFlags, DWORD_PTR dwContext,
|
|
DWORD dwInternalFlags);
|
|
|
|
DWORD HTTP_Connect(appinfo_t*,LPCWSTR,
|
|
INTERNET_PORT nServerPort, LPCWSTR lpszUserName,
|
|
LPCWSTR lpszPassword, DWORD dwFlags, DWORD_PTR dwContext,
|
|
DWORD dwInternalFlags, HINTERNET*);
|
|
|
|
BOOL GetAddress(const WCHAR*,INTERNET_PORT,SOCKADDR*,int*,char*);
|
|
|
|
DWORD get_cookie_header(const WCHAR*,const WCHAR*,WCHAR**);
|
|
DWORD set_cookie(substr_t,substr_t,substr_t,substr_t,DWORD);
|
|
|
|
void INTERNET_SetLastError(DWORD dwError);
|
|
DWORD INTERNET_GetLastError(void);
|
|
DWORD INTERNET_AsyncCall(task_header_t*);
|
|
LPSTR INTERNET_GetResponseBuffer(void);
|
|
|
|
VOID INTERNET_SendCallback(object_header_t *hdr, DWORD_PTR dwContext,
|
|
DWORD dwInternetStatus, LPVOID lpvStatusInfo,
|
|
DWORD dwStatusInfoLength);
|
|
WCHAR *INTERNET_FindProxyForProtocol(LPCWSTR szProxy, LPCWSTR proto);
|
|
|
|
DWORD create_netconn(server_t*,DWORD,BOOL,DWORD,netconn_t**);
|
|
void free_netconn(netconn_t*);
|
|
void NETCON_unload(void);
|
|
DWORD NETCON_secure_connect(netconn_t*,server_t*);
|
|
DWORD NETCON_send(netconn_t *connection, const void *msg, size_t len, int flags,
|
|
int *sent /* out */);
|
|
DWORD NETCON_recv(netconn_t*,void*,size_t,BOOL,int*);
|
|
BOOL NETCON_is_alive(netconn_t*);
|
|
LPCVOID NETCON_GetCert(netconn_t *connection);
|
|
int NETCON_GetCipherStrength(netconn_t*);
|
|
DWORD NETCON_set_timeout(netconn_t *connection, BOOL send, DWORD value);
|
|
int sock_send(int fd, const void *msg, size_t len, int flags);
|
|
int sock_recv(int fd, void *msg, size_t len, int flags);
|
|
|
|
server_t *get_server(substr_t,INTERNET_PORT,BOOL,BOOL);
|
|
|
|
DWORD create_req_file(const WCHAR*,req_file_t**);
|
|
void req_file_release(req_file_t*);
|
|
|
|
static inline req_file_t *req_file_addref(req_file_t *req_file)
|
|
{
|
|
InterlockedIncrement(&req_file->ref);
|
|
return req_file;
|
|
}
|
|
|
|
BOOL init_urlcache(void);
|
|
void free_urlcache(void);
|
|
void free_cookie(void);
|
|
void free_authorization_cache(void);
|
|
|
|
void init_winsock(void);
|
|
|
|
#define MAX_REPLY_LEN 0x1000
|
|
|
|
/* Used for debugging - maybe need to be shared in the Wine debugging code ? */
|
|
typedef struct
|
|
{
|
|
DWORD val;
|
|
const char* name;
|
|
} wininet_flag_info;
|
|
|
|
/* Undocumented security flags */
|
|
#define _SECURITY_FLAG_CERT_REV_FAILED 0x00800000
|
|
#define _SECURITY_FLAG_CERT_INVALID_CA 0x01000000
|
|
#define _SECURITY_FLAG_CERT_INVALID_CN 0x02000000
|
|
#define _SECURITY_FLAG_CERT_INVALID_DATE 0x04000000
|
|
|
|
#define _SECURITY_ERROR_FLAGS_MASK \
|
|
(_SECURITY_FLAG_CERT_REV_FAILED \
|
|
|_SECURITY_FLAG_CERT_INVALID_CA \
|
|
|_SECURITY_FLAG_CERT_INVALID_CN \
|
|
|_SECURITY_FLAG_CERT_INVALID_DATE)
|
|
|
|
#endif /* _WINE_INTERNET_H_ */
|