1 | /***************************************************************************
|
---|
2 | * _ _ ____ _
|
---|
3 | * Project ___| | | | _ \| |
|
---|
4 | * / __| | | | |_) | |
|
---|
5 | * | (__| |_| | _ <| |___
|
---|
6 | * \___|\___/|_| \_\_____|
|
---|
7 | *
|
---|
8 | * Copyright (C) 1998 - 2022, Daniel Stenberg, <[email protected]>, et al.
|
---|
9 | *
|
---|
10 | * This software is licensed as described in the file COPYING, which
|
---|
11 | * you should have received as part of this distribution. The terms
|
---|
12 | * are also available at https://curl.se/docs/copyright.html.
|
---|
13 | *
|
---|
14 | * You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
---|
15 | * copies of the Software, and permit persons to whom the Software is
|
---|
16 | * furnished to do so, under the terms of the COPYING file.
|
---|
17 | *
|
---|
18 | * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
---|
19 | * KIND, either express or implied.
|
---|
20 | *
|
---|
21 | * SPDX-License-Identifier: curl
|
---|
22 | *
|
---|
23 | * 'pingpong' is for generic back-and-forth support functions used by FTP,
|
---|
24 | * IMAP, POP3, SMTP and whatever more that likes them.
|
---|
25 | *
|
---|
26 | ***************************************************************************/
|
---|
27 |
|
---|
28 | #include "curl_setup.h"
|
---|
29 |
|
---|
30 | #include "urldata.h"
|
---|
31 | #include "cfilters.h"
|
---|
32 | #include "sendf.h"
|
---|
33 | #include "select.h"
|
---|
34 | #include "progress.h"
|
---|
35 | #include "speedcheck.h"
|
---|
36 | #include "pingpong.h"
|
---|
37 | #include "multiif.h"
|
---|
38 | #include "vtls/vtls.h"
|
---|
39 |
|
---|
40 | /* The last 3 #include files should be in this order */
|
---|
41 | #include "curl_printf.h"
|
---|
42 | #include "curl_memory.h"
|
---|
43 | #include "memdebug.h"
|
---|
44 |
|
---|
45 | #ifdef USE_PINGPONG
|
---|
46 |
|
---|
47 | /* Returns timeout in ms. 0 or negative number means the timeout has already
|
---|
48 | triggered */
|
---|
49 | timediff_t Curl_pp_state_timeout(struct Curl_easy *data,
|
---|
50 | struct pingpong *pp, bool disconnecting)
|
---|
51 | {
|
---|
52 | struct connectdata *conn = data->conn;
|
---|
53 | timediff_t timeout_ms; /* in milliseconds */
|
---|
54 | timediff_t response_time = (data->set.server_response_timeout)?
|
---|
55 | data->set.server_response_timeout: pp->response_time;
|
---|
56 |
|
---|
57 | /* if CURLOPT_SERVER_RESPONSE_TIMEOUT is set, use that to determine
|
---|
58 | remaining time, or use pp->response because SERVER_RESPONSE_TIMEOUT is
|
---|
59 | supposed to govern the response for any given server response, not for
|
---|
60 | the time from connect to the given server response. */
|
---|
61 |
|
---|
62 | /* Without a requested timeout, we only wait 'response_time' seconds for the
|
---|
63 | full response to arrive before we bail out */
|
---|
64 | timeout_ms = response_time -
|
---|
65 | Curl_timediff(Curl_now(), pp->response); /* spent time */
|
---|
66 |
|
---|
67 | if(data->set.timeout && !disconnecting) {
|
---|
68 | /* if timeout is requested, find out how much remaining time we have */
|
---|
69 | timediff_t timeout2_ms = data->set.timeout - /* timeout time */
|
---|
70 | Curl_timediff(Curl_now(), conn->now); /* spent time */
|
---|
71 |
|
---|
72 | /* pick the lowest number */
|
---|
73 | timeout_ms = CURLMIN(timeout_ms, timeout2_ms);
|
---|
74 | }
|
---|
75 |
|
---|
76 | return timeout_ms;
|
---|
77 | }
|
---|
78 |
|
---|
79 | /*
|
---|
80 | * Curl_pp_statemach()
|
---|
81 | */
|
---|
82 | CURLcode Curl_pp_statemach(struct Curl_easy *data,
|
---|
83 | struct pingpong *pp, bool block,
|
---|
84 | bool disconnecting)
|
---|
85 | {
|
---|
86 | struct connectdata *conn = data->conn;
|
---|
87 | curl_socket_t sock = conn->sock[FIRSTSOCKET];
|
---|
88 | int rc;
|
---|
89 | timediff_t interval_ms;
|
---|
90 | timediff_t timeout_ms = Curl_pp_state_timeout(data, pp, disconnecting);
|
---|
91 | CURLcode result = CURLE_OK;
|
---|
92 |
|
---|
93 | if(timeout_ms <= 0) {
|
---|
94 | failf(data, "server response timeout");
|
---|
95 | return CURLE_OPERATION_TIMEDOUT; /* already too little time */
|
---|
96 | }
|
---|
97 |
|
---|
98 | if(block) {
|
---|
99 | interval_ms = 1000; /* use 1 second timeout intervals */
|
---|
100 | if(timeout_ms < interval_ms)
|
---|
101 | interval_ms = timeout_ms;
|
---|
102 | }
|
---|
103 | else
|
---|
104 | interval_ms = 0; /* immediate */
|
---|
105 |
|
---|
106 | if(Curl_conn_data_pending(data, FIRSTSOCKET))
|
---|
107 | rc = 1;
|
---|
108 | else if(Curl_pp_moredata(pp))
|
---|
109 | /* We are receiving and there is data in the cache so just read it */
|
---|
110 | rc = 1;
|
---|
111 | else if(!pp->sendleft && Curl_conn_data_pending(data, FIRSTSOCKET))
|
---|
112 | /* We are receiving and there is data ready in the SSL library */
|
---|
113 | rc = 1;
|
---|
114 | else
|
---|
115 | rc = Curl_socket_check(pp->sendleft?CURL_SOCKET_BAD:sock, /* reading */
|
---|
116 | CURL_SOCKET_BAD,
|
---|
117 | pp->sendleft?sock:CURL_SOCKET_BAD, /* writing */
|
---|
118 | interval_ms);
|
---|
119 |
|
---|
120 | if(block) {
|
---|
121 | /* if we didn't wait, we don't have to spend time on this now */
|
---|
122 | if(Curl_pgrsUpdate(data))
|
---|
123 | result = CURLE_ABORTED_BY_CALLBACK;
|
---|
124 | else
|
---|
125 | result = Curl_speedcheck(data, Curl_now());
|
---|
126 |
|
---|
127 | if(result)
|
---|
128 | return result;
|
---|
129 | }
|
---|
130 |
|
---|
131 | if(rc == -1) {
|
---|
132 | failf(data, "select/poll error");
|
---|
133 | result = CURLE_OUT_OF_MEMORY;
|
---|
134 | }
|
---|
135 | else if(rc)
|
---|
136 | result = pp->statemachine(data, data->conn);
|
---|
137 |
|
---|
138 | return result;
|
---|
139 | }
|
---|
140 |
|
---|
141 | /* initialize stuff to prepare for reading a fresh new response */
|
---|
142 | void Curl_pp_init(struct Curl_easy *data, struct pingpong *pp)
|
---|
143 | {
|
---|
144 | DEBUGASSERT(data);
|
---|
145 | pp->nread_resp = 0;
|
---|
146 | pp->linestart_resp = data->state.buffer;
|
---|
147 | pp->pending_resp = TRUE;
|
---|
148 | pp->response = Curl_now(); /* start response time-out now! */
|
---|
149 | }
|
---|
150 |
|
---|
151 | /* setup for the coming transfer */
|
---|
152 | void Curl_pp_setup(struct pingpong *pp)
|
---|
153 | {
|
---|
154 | Curl_dyn_init(&pp->sendbuf, DYN_PINGPPONG_CMD);
|
---|
155 | }
|
---|
156 |
|
---|
157 | /***********************************************************************
|
---|
158 | *
|
---|
159 | * Curl_pp_vsendf()
|
---|
160 | *
|
---|
161 | * Send the formatted string as a command to a pingpong server. Note that
|
---|
162 | * the string should not have any CRLF appended, as this function will
|
---|
163 | * append the necessary things itself.
|
---|
164 | *
|
---|
165 | * made to never block
|
---|
166 | */
|
---|
167 | CURLcode Curl_pp_vsendf(struct Curl_easy *data,
|
---|
168 | struct pingpong *pp,
|
---|
169 | const char *fmt,
|
---|
170 | va_list args)
|
---|
171 | {
|
---|
172 | ssize_t bytes_written = 0;
|
---|
173 | size_t write_len;
|
---|
174 | char *s;
|
---|
175 | CURLcode result;
|
---|
176 | struct connectdata *conn = data->conn;
|
---|
177 |
|
---|
178 | #ifdef HAVE_GSSAPI
|
---|
179 | enum protection_level data_sec;
|
---|
180 | #endif
|
---|
181 |
|
---|
182 | DEBUGASSERT(pp->sendleft == 0);
|
---|
183 | DEBUGASSERT(pp->sendsize == 0);
|
---|
184 | DEBUGASSERT(pp->sendthis == NULL);
|
---|
185 |
|
---|
186 | if(!conn)
|
---|
187 | /* can't send without a connection! */
|
---|
188 | return CURLE_SEND_ERROR;
|
---|
189 |
|
---|
190 | Curl_dyn_reset(&pp->sendbuf);
|
---|
191 | result = Curl_dyn_vaddf(&pp->sendbuf, fmt, args);
|
---|
192 | if(result)
|
---|
193 | return result;
|
---|
194 |
|
---|
195 | /* append CRLF */
|
---|
196 | result = Curl_dyn_addn(&pp->sendbuf, "\r\n", 2);
|
---|
197 | if(result)
|
---|
198 | return result;
|
---|
199 |
|
---|
200 | write_len = Curl_dyn_len(&pp->sendbuf);
|
---|
201 | s = Curl_dyn_ptr(&pp->sendbuf);
|
---|
202 | Curl_pp_init(data, pp);
|
---|
203 |
|
---|
204 | #ifdef HAVE_GSSAPI
|
---|
205 | conn->data_prot = PROT_CMD;
|
---|
206 | #endif
|
---|
207 | result = Curl_write(data, conn->sock[FIRSTSOCKET], s, write_len,
|
---|
208 | &bytes_written);
|
---|
209 | if(result)
|
---|
210 | return result;
|
---|
211 | #ifdef HAVE_GSSAPI
|
---|
212 | data_sec = conn->data_prot;
|
---|
213 | DEBUGASSERT(data_sec > PROT_NONE && data_sec < PROT_LAST);
|
---|
214 | conn->data_prot = data_sec;
|
---|
215 | #endif
|
---|
216 |
|
---|
217 | Curl_debug(data, CURLINFO_HEADER_OUT, s, (size_t)bytes_written);
|
---|
218 |
|
---|
219 | if(bytes_written != (ssize_t)write_len) {
|
---|
220 | /* the whole chunk was not sent, keep it around and adjust sizes */
|
---|
221 | pp->sendthis = s;
|
---|
222 | pp->sendsize = write_len;
|
---|
223 | pp->sendleft = write_len - bytes_written;
|
---|
224 | }
|
---|
225 | else {
|
---|
226 | pp->sendthis = NULL;
|
---|
227 | pp->sendleft = pp->sendsize = 0;
|
---|
228 | pp->response = Curl_now();
|
---|
229 | }
|
---|
230 |
|
---|
231 | return CURLE_OK;
|
---|
232 | }
|
---|
233 |
|
---|
234 |
|
---|
235 | /***********************************************************************
|
---|
236 | *
|
---|
237 | * Curl_pp_sendf()
|
---|
238 | *
|
---|
239 | * Send the formatted string as a command to a pingpong server. Note that
|
---|
240 | * the string should not have any CRLF appended, as this function will
|
---|
241 | * append the necessary things itself.
|
---|
242 | *
|
---|
243 | * made to never block
|
---|
244 | */
|
---|
245 | CURLcode Curl_pp_sendf(struct Curl_easy *data, struct pingpong *pp,
|
---|
246 | const char *fmt, ...)
|
---|
247 | {
|
---|
248 | CURLcode result;
|
---|
249 | va_list ap;
|
---|
250 | va_start(ap, fmt);
|
---|
251 |
|
---|
252 | result = Curl_pp_vsendf(data, pp, fmt, ap);
|
---|
253 |
|
---|
254 | va_end(ap);
|
---|
255 |
|
---|
256 | return result;
|
---|
257 | }
|
---|
258 |
|
---|
259 | /*
|
---|
260 | * Curl_pp_readresp()
|
---|
261 | *
|
---|
262 | * Reads a piece of a server response.
|
---|
263 | */
|
---|
264 | CURLcode Curl_pp_readresp(struct Curl_easy *data,
|
---|
265 | curl_socket_t sockfd,
|
---|
266 | struct pingpong *pp,
|
---|
267 | int *code, /* return the server code if done */
|
---|
268 | size_t *size) /* size of the response */
|
---|
269 | {
|
---|
270 | ssize_t perline; /* count bytes per line */
|
---|
271 | bool keepon = TRUE;
|
---|
272 | ssize_t gotbytes;
|
---|
273 | char *ptr;
|
---|
274 | struct connectdata *conn = data->conn;
|
---|
275 | char * const buf = data->state.buffer;
|
---|
276 | CURLcode result = CURLE_OK;
|
---|
277 |
|
---|
278 | *code = 0; /* 0 for errors or not done */
|
---|
279 | *size = 0;
|
---|
280 |
|
---|
281 | ptr = buf + pp->nread_resp;
|
---|
282 |
|
---|
283 | /* number of bytes in the current line, so far */
|
---|
284 | perline = (ssize_t)(ptr-pp->linestart_resp);
|
---|
285 |
|
---|
286 | while((pp->nread_resp < (size_t)data->set.buffer_size) &&
|
---|
287 | (keepon && !result)) {
|
---|
288 |
|
---|
289 | if(pp->cache) {
|
---|
290 | /* we had data in the "cache", copy that instead of doing an actual
|
---|
291 | * read
|
---|
292 | *
|
---|
293 | * pp->cache_size is cast to ssize_t here. This should be safe, because
|
---|
294 | * it would have been populated with something of size int to begin
|
---|
295 | * with, even though its datatype may be larger than an int.
|
---|
296 | */
|
---|
297 | if((ptr + pp->cache_size) > (buf + data->set.buffer_size + 1)) {
|
---|
298 | failf(data, "cached response data too big to handle");
|
---|
299 | return CURLE_WEIRD_SERVER_REPLY;
|
---|
300 | }
|
---|
301 | memcpy(ptr, pp->cache, pp->cache_size);
|
---|
302 | gotbytes = (ssize_t)pp->cache_size;
|
---|
303 | free(pp->cache); /* free the cache */
|
---|
304 | pp->cache = NULL; /* clear the pointer */
|
---|
305 | pp->cache_size = 0; /* zero the size just in case */
|
---|
306 | }
|
---|
307 | else {
|
---|
308 | #ifdef HAVE_GSSAPI
|
---|
309 | enum protection_level prot = conn->data_prot;
|
---|
310 | conn->data_prot = PROT_CLEAR;
|
---|
311 | #endif
|
---|
312 | DEBUGASSERT((ptr + data->set.buffer_size - pp->nread_resp) <=
|
---|
313 | (buf + data->set.buffer_size + 1));
|
---|
314 | result = Curl_read(data, sockfd, ptr,
|
---|
315 | data->set.buffer_size - pp->nread_resp,
|
---|
316 | &gotbytes);
|
---|
317 | #ifdef HAVE_GSSAPI
|
---|
318 | DEBUGASSERT(prot > PROT_NONE && prot < PROT_LAST);
|
---|
319 | conn->data_prot = prot;
|
---|
320 | #endif
|
---|
321 | if(result == CURLE_AGAIN)
|
---|
322 | return CURLE_OK; /* return */
|
---|
323 |
|
---|
324 | if(result)
|
---|
325 | /* Set outer result variable to this error. */
|
---|
326 | keepon = FALSE;
|
---|
327 | }
|
---|
328 |
|
---|
329 | if(!keepon)
|
---|
330 | ;
|
---|
331 | else if(gotbytes <= 0) {
|
---|
332 | keepon = FALSE;
|
---|
333 | result = CURLE_RECV_ERROR;
|
---|
334 | failf(data, "response reading failed (errno: %d)", SOCKERRNO);
|
---|
335 | }
|
---|
336 | else {
|
---|
337 | /* we got a whole chunk of data, which can be anything from one
|
---|
338 | * byte to a set of lines and possible just a piece of the last
|
---|
339 | * line */
|
---|
340 | ssize_t i;
|
---|
341 | ssize_t clipamount = 0;
|
---|
342 | bool restart = FALSE;
|
---|
343 |
|
---|
344 | data->req.headerbytecount += (long)gotbytes;
|
---|
345 |
|
---|
346 | pp->nread_resp += gotbytes;
|
---|
347 | for(i = 0; i < gotbytes; ptr++, i++) {
|
---|
348 | perline++;
|
---|
349 | if(*ptr == '\n') {
|
---|
350 | /* a newline is CRLF in pp-talk, so the CR is ignored as
|
---|
351 | the line isn't really terminated until the LF comes */
|
---|
352 |
|
---|
353 | /* output debug output if that is requested */
|
---|
354 | #ifdef HAVE_GSSAPI
|
---|
355 | if(!conn->sec_complete)
|
---|
356 | #endif
|
---|
357 | Curl_debug(data, CURLINFO_HEADER_IN,
|
---|
358 | pp->linestart_resp, (size_t)perline);
|
---|
359 |
|
---|
360 | /*
|
---|
361 | * We pass all response-lines to the callback function registered
|
---|
362 | * for "headers". The response lines can be seen as a kind of
|
---|
363 | * headers.
|
---|
364 | */
|
---|
365 | result = Curl_client_write(data, CLIENTWRITE_HEADER,
|
---|
366 | pp->linestart_resp, perline);
|
---|
367 | if(result)
|
---|
368 | return result;
|
---|
369 |
|
---|
370 | if(pp->endofresp(data, conn, pp->linestart_resp, perline, code)) {
|
---|
371 | /* This is the end of the last line, copy the last line to the
|
---|
372 | start of the buffer and null-terminate, for old times sake */
|
---|
373 | size_t n = ptr - pp->linestart_resp;
|
---|
374 | memmove(buf, pp->linestart_resp, n);
|
---|
375 | buf[n] = 0; /* null-terminate */
|
---|
376 | keepon = FALSE;
|
---|
377 | pp->linestart_resp = ptr + 1; /* advance pointer */
|
---|
378 | i++; /* skip this before getting out */
|
---|
379 |
|
---|
380 | *size = pp->nread_resp; /* size of the response */
|
---|
381 | pp->nread_resp = 0; /* restart */
|
---|
382 | break;
|
---|
383 | }
|
---|
384 | perline = 0; /* line starts over here */
|
---|
385 | pp->linestart_resp = ptr + 1;
|
---|
386 | }
|
---|
387 | }
|
---|
388 |
|
---|
389 | if(!keepon && (i != gotbytes)) {
|
---|
390 | /* We found the end of the response lines, but we didn't parse the
|
---|
391 | full chunk of data we have read from the server. We therefore need
|
---|
392 | to store the rest of the data to be checked on the next invoke as
|
---|
393 | it may actually contain another end of response already! */
|
---|
394 | clipamount = gotbytes - i;
|
---|
395 | restart = TRUE;
|
---|
396 | DEBUGF(infof(data, "Curl_pp_readresp_ %d bytes of trailing "
|
---|
397 | "server response left",
|
---|
398 | (int)clipamount));
|
---|
399 | }
|
---|
400 | else if(keepon) {
|
---|
401 |
|
---|
402 | if((perline == gotbytes) &&
|
---|
403 | (gotbytes > (ssize_t)data->set.buffer_size/2)) {
|
---|
404 | /* We got an excessive line without newlines and we need to deal
|
---|
405 | with it. We keep the first bytes of the line then we throw
|
---|
406 | away the rest. */
|
---|
407 | infof(data, "Excessive server response line length received, "
|
---|
408 | "%zd bytes. Stripping", gotbytes);
|
---|
409 | restart = TRUE;
|
---|
410 |
|
---|
411 | /* we keep 40 bytes since all our pingpong protocols are only
|
---|
412 | interested in the first piece */
|
---|
413 | clipamount = 40;
|
---|
414 | }
|
---|
415 | else if(pp->nread_resp > (size_t)data->set.buffer_size/2) {
|
---|
416 | /* We got a large chunk of data and there's potentially still
|
---|
417 | trailing data to take care of, so we put any such part in the
|
---|
418 | "cache", clear the buffer to make space and restart. */
|
---|
419 | clipamount = perline;
|
---|
420 | restart = TRUE;
|
---|
421 | }
|
---|
422 | }
|
---|
423 | else if(i == gotbytes)
|
---|
424 | restart = TRUE;
|
---|
425 |
|
---|
426 | if(clipamount) {
|
---|
427 | pp->cache_size = clipamount;
|
---|
428 | pp->cache = malloc(pp->cache_size);
|
---|
429 | if(pp->cache)
|
---|
430 | memcpy(pp->cache, pp->linestart_resp, pp->cache_size);
|
---|
431 | else
|
---|
432 | return CURLE_OUT_OF_MEMORY;
|
---|
433 | }
|
---|
434 | if(restart) {
|
---|
435 | /* now reset a few variables to start over nicely from the start of
|
---|
436 | the big buffer */
|
---|
437 | pp->nread_resp = 0; /* start over from scratch in the buffer */
|
---|
438 | ptr = pp->linestart_resp = buf;
|
---|
439 | perline = 0;
|
---|
440 | }
|
---|
441 |
|
---|
442 | } /* there was data */
|
---|
443 |
|
---|
444 | } /* while there's buffer left and loop is requested */
|
---|
445 |
|
---|
446 | pp->pending_resp = FALSE;
|
---|
447 |
|
---|
448 | return result;
|
---|
449 | }
|
---|
450 |
|
---|
451 | int Curl_pp_getsock(struct Curl_easy *data,
|
---|
452 | struct pingpong *pp, curl_socket_t *socks)
|
---|
453 | {
|
---|
454 | struct connectdata *conn = data->conn;
|
---|
455 | socks[0] = conn->sock[FIRSTSOCKET];
|
---|
456 |
|
---|
457 | if(pp->sendleft) {
|
---|
458 | /* write mode */
|
---|
459 | return GETSOCK_WRITESOCK(0);
|
---|
460 | }
|
---|
461 |
|
---|
462 | /* read mode */
|
---|
463 | return GETSOCK_READSOCK(0);
|
---|
464 | }
|
---|
465 |
|
---|
466 | CURLcode Curl_pp_flushsend(struct Curl_easy *data,
|
---|
467 | struct pingpong *pp)
|
---|
468 | {
|
---|
469 | /* we have a piece of a command still left to send */
|
---|
470 | struct connectdata *conn = data->conn;
|
---|
471 | ssize_t written;
|
---|
472 | curl_socket_t sock = conn->sock[FIRSTSOCKET];
|
---|
473 | CURLcode result = Curl_write(data, sock, pp->sendthis + pp->sendsize -
|
---|
474 | pp->sendleft, pp->sendleft, &written);
|
---|
475 | if(result)
|
---|
476 | return result;
|
---|
477 |
|
---|
478 | if(written != (ssize_t)pp->sendleft) {
|
---|
479 | /* only a fraction was sent */
|
---|
480 | pp->sendleft -= written;
|
---|
481 | }
|
---|
482 | else {
|
---|
483 | pp->sendthis = NULL;
|
---|
484 | pp->sendleft = pp->sendsize = 0;
|
---|
485 | pp->response = Curl_now();
|
---|
486 | }
|
---|
487 | return CURLE_OK;
|
---|
488 | }
|
---|
489 |
|
---|
490 | CURLcode Curl_pp_disconnect(struct pingpong *pp)
|
---|
491 | {
|
---|
492 | Curl_dyn_free(&pp->sendbuf);
|
---|
493 | Curl_safefree(pp->cache);
|
---|
494 | return CURLE_OK;
|
---|
495 | }
|
---|
496 |
|
---|
497 | bool Curl_pp_moredata(struct pingpong *pp)
|
---|
498 | {
|
---|
499 | return (!pp->sendleft && pp->cache && pp->nread_resp < pp->cache_size) ?
|
---|
500 | TRUE : FALSE;
|
---|
501 | }
|
---|
502 |
|
---|
503 | #endif
|
---|