代码拉取完成,页面将自动刷新
同步操作将从 zentel/libghttps 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
/*
* http_trans.c -- Functions for doing transport related stuff including
* automatically extending buffers and whatnot.
* Created: Christopher Blizzard <blizzard@appliedtheory.com>, 5-Aug-1998
*
* Copyright (C) 1998 Free Software Foundation
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Library General Public
* License as published by the Free Software Foundation; either
* version 2 of the License, or (at your option) any later version.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Library General Public License for more details.
*
* You should have received a copy of the GNU Library General Public
* License along with this library; if not, write to the Free
* Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#ifndef _WIN32
#include <sys/time.h>
#define closesocket close
#endif
#include <sys/types.h>
#ifndef WIN32
#include <unistd.h>
#endif
#include <stdlib.h>
#include <string.h>
#include <errno.h>
#include "http_trans.h"
#include "http_global.h"
#ifdef USE_SSL
static int ssl_initialized = 0;
static const SSL_METHOD * ssl_method = NULL;
static SSL_CTX * ssl_context = NULL;
#endif
static int http_trans_buf_free(http_trans_conn *a_conn);
int
http_trans_connect(http_trans_conn *a_conn)
{
if ((a_conn == NULL) || (a_conn->host == NULL))
goto ec;
if (a_conn->hostinfo == NULL)
{
/* look up the name of the proxy if it's there. */
if (a_conn->proxy_host)
{
if ((a_conn->hostinfo = gethostbyname(a_conn->proxy_host)) == NULL)
{
a_conn->error_type = http_trans_err_type_host;
a_conn->error = h_errno;
goto ec;
}
}
else
{
/* look up the name */
if ((a_conn->hostinfo = gethostbyname(a_conn->host)) == NULL)
{
a_conn->error_type = http_trans_err_type_host;
a_conn->error = h_errno;
goto ec;
}
}
/* set up the saddr */
a_conn->saddr.sin_family = AF_INET;
/* set the proxy port */
if (a_conn->proxy_host)
a_conn->saddr.sin_port = htons(a_conn->proxy_port);
else
a_conn->saddr.sin_port = htons(a_conn->port);
/* copy the name info */
memcpy(&a_conn->saddr.sin_addr.s_addr,
a_conn->hostinfo->h_addr_list[0],
sizeof(unsigned long));
}
/* set up the socket */
#if PLATFORM == PLATFORM_WINDOWS
if ((a_conn->sock = socket(AF_INET, SOCK_STREAM, 0))==INVALID_SOCKET)
{
a_conn->error_type = http_trans_err_type_errno;
a_conn->error = errno;
goto ec;
}
#else
/* set up the socket */
if ((a_conn->sock = socket(AF_INET, SOCK_STREAM, 0)) < 0)
{
a_conn->error_type = http_trans_err_type_errno;
a_conn->error = errno;
goto ec;
}
#endif
/* set up the socket */
if (connect(a_conn->sock,
(struct sockaddr *)&a_conn->saddr,
sizeof(struct sockaddr)) < 0)
{
a_conn->error_type = http_trans_err_type_errno;
a_conn->error = errno;
goto ec;
}
#ifdef USE_SSL
/* initialize the SSL data structures */
if (a_conn->use_ssl)
{
int err_ret;
if(a_conn->ssl_conn)
{
SSL_free(a_conn->ssl_conn);
a_conn->ssl_conn = NULL;
}
a_conn->ssl_conn = SSL_new(ssl_context);
if(a_conn->ssl_conn == NULL) {
a_conn->error_type = http_trans_err_type_ssl;
a_conn->error = -1;
goto ec;
}
SSL_set_fd(a_conn->ssl_conn, a_conn->sock);
if((err_ret = SSL_connect(a_conn->ssl_conn)) < 1) {
a_conn->error_type = http_trans_err_type_ssl;
a_conn->error = SSL_get_error(a_conn->ssl_conn, err_ret);
goto ec;
}
}
#endif
return 0;
ec:
return -1;
}
http_trans_conn *
http_trans_conn_new(void)
{
http_trans_conn *l_return = NULL;
/* allocate a new connection struct */
l_return = (http_trans_conn *)malloc(sizeof(http_trans_conn));
memset(l_return, 0, sizeof(http_trans_conn));
/* default to 80 */
l_return->port = 80;
/* default to 1000 bytes at a time */
l_return->io_buf_chunksize = 1024;
/* allocate a new trans buffer */
l_return->io_buf = malloc(l_return->io_buf_chunksize);
memset(l_return->io_buf, 0, l_return->io_buf_chunksize);
l_return->io_buf_len = l_return->io_buf_chunksize;
/* make sure the socket looks like it's closed */
l_return->sock = -1;
/* don't use SSL until told to */
l_return->use_ssl = 0;
#ifdef USE_SSL
l_return->ssl_conn = NULL;
#endif
return l_return;
}
void
http_trans_conn_destroy(http_trans_conn *a_conn)
{
/* destroy the connection structure. */
if (a_conn == NULL)
return;
/* close the connection */
http_trans_conn_close(a_conn);
if (a_conn->io_buf)
free(a_conn->io_buf);
free(a_conn);
return;
}
void
http_trans_conn_close(http_trans_conn * a_conn)
{
if(a_conn == NULL)
return;
#ifdef USE_SSL
if(a_conn->use_ssl)
{
if(a_conn->ssl_conn)
{
SSL_shutdown(a_conn->ssl_conn);
if(a_conn->sock != -1)
{
closesocket(a_conn->sock);
a_conn->sock = -1;
}
SSL_free(a_conn->ssl_conn);
a_conn->ssl_conn = NULL;
}
a_conn->use_ssl = 0;
}
#endif
if (a_conn->sock != -1)
{
closesocket(a_conn->sock);
a_conn->sock = -1;
}
}
void
http_trans_conn_set_ssl(http_trans_conn * a_conn, int use_ssl)
{
if(a_conn == NULL)
return;
if(use_ssl == a_conn->use_ssl)
return;
#ifdef USE_SSL
if(use_ssl) {
a_conn->use_ssl = 1;
if (ssl_initialized == 0)
{
/* initialize OpenSSL */
SSL_library_init();
ssl_method = SSLv23_client_method();
ssl_context = SSL_CTX_new(ssl_method);
if(ssl_context == NULL)
{
a_conn->error_type = http_trans_err_type_ssl;
a_conn->error = -1;
return;
ssl_initialized = 0;
}
else
{
ssl_initialized = 1;
}
}
}
#else
a_conn->use_ssl = 0;
#endif
}
const char *
http_trans_get_host_error(int a_herror)
{
switch (a_herror)
{
case HOST_NOT_FOUND:
return "Host not found";
case NO_ADDRESS:
return "An address is not associated with that host";
case NO_RECOVERY:
return "An unrecoverable name server error occured";
case TRY_AGAIN:
return "A temporary error occurred on an authoritative name server. Please try again later.";
default:
return "No error or error not known.";
}
}
int
http_trans_append_data_to_buf(http_trans_conn *a_conn,
char *a_data,
int a_data_len)
{
if (http_trans_buf_free(a_conn) < a_data_len)
{
a_conn->io_buf = realloc(a_conn->io_buf, a_conn->io_buf_len + a_data_len);
a_conn->io_buf_len += a_data_len;
}
memcpy(&a_conn->io_buf[a_conn->io_buf_alloc], a_data, a_data_len);
a_conn->io_buf_alloc += a_data_len;
return 1;
}
int
http_trans_read_into_buf(http_trans_conn *a_conn)
{
int l_read = 0;
int l_bytes_to_read = 0;
/* set the length if this is the first time */
if (a_conn->io_buf_io_left == 0)
{
a_conn->io_buf_io_left = a_conn->io_buf_chunksize;
a_conn->io_buf_io_done = 0;
}
/* make sure there's enough space */
if (http_trans_buf_free(a_conn) < a_conn->io_buf_io_left)
{
a_conn->io_buf = realloc(a_conn->io_buf,
a_conn->io_buf_len + a_conn->io_buf_io_left);
a_conn->io_buf_len += a_conn->io_buf_io_left;
}
/* check to see how much we should try to read */
if (a_conn->io_buf_io_left > a_conn->io_buf_chunksize)
l_bytes_to_read = a_conn->io_buf_chunksize;
else
l_bytes_to_read = a_conn->io_buf_io_left;
/* read in some data */
if(a_conn->use_ssl)
{
#ifdef USE_SSL
if ((a_conn->last_read = l_read =
SSL_read(a_conn->ssl_conn,
&a_conn->io_buf[a_conn->io_buf_alloc],
l_bytes_to_read)) < 0)
{
long int sslerr = SSL_get_error(a_conn->ssl_conn, l_read);
if((sslerr == SSL_ERROR_WANT_READ) ||
(sslerr == SSL_ERROR_WANT_WRITE))
l_read = 0;
else
return HTTP_TRANS_ERR;
}
else if (l_read == 0) {
return HTTP_TRANS_DONE;
}
#else
return HTTP_TRANS_ERR;
#endif
}
#if PLATFORM == PLATFORM_WINDOWS
else if ((a_conn->last_read = l_read =
recv(a_conn->sock,
&a_conn->io_buf[a_conn->io_buf_alloc],
l_bytes_to_read,0)) < 0)
#else
else if ((a_conn->last_read = l_read =
read(a_conn->sock,
&a_conn->io_buf[a_conn->io_buf_alloc],
l_bytes_to_read)) < 0)
#endif
{
if (errno == EINTR)
l_read = 0;
else
return HTTP_TRANS_ERR;
}
else if (l_read == 0)
return HTTP_TRANS_DONE;
/* mark the buffer */
a_conn->io_buf_io_left -= l_read;
a_conn->io_buf_io_done += l_read;
a_conn->io_buf_alloc += l_read;
/* generate the result */
if (a_conn->io_buf_io_left == 0)
return HTTP_TRANS_DONE;
return HTTP_TRANS_NOT_DONE;
}
int
http_trans_write_buf(http_trans_conn *a_conn)
{
int l_written = 0;
if (a_conn->io_buf_io_left == 0)
{
a_conn->io_buf_io_left = a_conn->io_buf_alloc;
a_conn->io_buf_io_done = 0;
}
/* write out some data */
if(a_conn->use_ssl)
{
#ifdef USE_SSL
if ((a_conn->last_read = l_written =
SSL_write(a_conn->ssl_conn,
&a_conn->io_buf[a_conn->io_buf_io_done],
a_conn->io_buf_io_left)) <= 0)
{
long int sslerr = SSL_get_error(a_conn->ssl_conn, l_written);
if ((sslerr == SSL_ERROR_WANT_READ) ||
(sslerr == SSL_ERROR_WANT_WRITE))
l_written = 0;
else
return HTTP_TRANS_ERR;
}
#else
return HTTP_TRANS_ERR;
#endif
}
#if PLATFORM == PLATFORM_WINDOWS
else if ((a_conn->last_read = l_written = send (a_conn->sock,
&a_conn->io_buf[a_conn->io_buf_io_done],
a_conn->io_buf_io_left,0)) <= 0)
#else
else if ((a_conn->last_read = l_written = write (a_conn->sock,
&a_conn->io_buf[a_conn->io_buf_io_done],
a_conn->io_buf_io_left)) <= 0)
#endif
{
if (errno == EINTR)
l_written = 0;
else
return HTTP_TRANS_ERR;
}
if (l_written == 0)
return HTTP_TRANS_DONE;
/* advance the counters */
a_conn->io_buf_io_left -= l_written;
a_conn->io_buf_io_done += l_written;
if (a_conn->io_buf_io_left == 0)
return HTTP_TRANS_DONE;
return HTTP_TRANS_NOT_DONE;
}
void
http_trans_buf_reset(http_trans_conn *a_conn)
{
//if (a_conn->io_buf)
// free(a_conn->io_buf);
if (sizeof(a_conn->io_buf) < a_conn->io_buf_chunksize)
{
a_conn->io_buf = realloc(a_conn->io_buf, a_conn->io_buf_chunksize + 1);
}
//a_conn->io_buf = malloc(a_conn->io_buf_chunksize);
memset(a_conn->io_buf, 0, a_conn->io_buf_chunksize);
a_conn->io_buf_len = a_conn->io_buf_chunksize;
a_conn->io_buf_alloc = 0;
a_conn->io_buf_io_done = 0;
a_conn->io_buf_io_left = 0;
}
void
http_trans_buf_clip(http_trans_conn *a_conn, char *a_clip_to)
{
int l_bytes = 0;
/* get the number of bytes to clip off of the front */
l_bytes = a_clip_to - a_conn->io_buf;
if (l_bytes > 0)
{
memmove(a_conn->io_buf, a_clip_to, a_conn->io_buf_alloc - l_bytes);
a_conn->io_buf_alloc -= l_bytes;
}
a_conn->io_buf_io_done = 0;
a_conn->io_buf_io_left = 0;
}
char *
http_trans_buf_has_patt(char *a_buf, int a_len,
char *a_pat, int a_patlen)
{
int i = 0;
for ( ; i <= ( a_len - a_patlen ); i++ )
{
if (a_buf[i] == a_pat[0])
{
if (memcmp(&a_buf[i], a_pat, a_patlen) == 0)
return &a_buf[i];
}
}
return NULL;
}
/* static functions */
static int
http_trans_buf_free(http_trans_conn *a_conn)
{
return (a_conn->io_buf_len - a_conn->io_buf_alloc);
}
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。