|  | /* | 
|  | * Wininet - Http Implementation | 
|  | * | 
|  | * Copyright 1999 Corel Corporation | 
|  | * Copyright 2002 CodeWeavers Inc. | 
|  | * Copyright 2002 TransGaming Technologies Inc. | 
|  | * Copyright 2004 Mike McCormack for CodeWeavers | 
|  | * Copyright 2005 Aric Stewart for CodeWeavers | 
|  | * Copyright 2006 Robert Shearman for CodeWeavers | 
|  | * | 
|  | * Ulrich Czekalla | 
|  | * David Hammerton | 
|  | * | 
|  | * This library is free software; you can redistribute it and/or | 
|  | * modify it under the terms of the GNU Lesser General Public | 
|  | * License as published by the Free Software Foundation; either | 
|  | * version 2.1 of the License, or (at your option) any later version. | 
|  | * | 
|  | * This library is distributed in the hope that it will be useful, | 
|  | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | 
|  | * Lesser General Public License for more details. | 
|  | * | 
|  | * You should have received a copy of the GNU Lesser General Public | 
|  | * License along with this library; if not, write to the Free Software | 
|  | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA | 
|  | */ | 
|  |  | 
|  | #include "config.h" | 
|  | #include "wine/port.h" | 
|  |  | 
|  | #include <sys/types.h> | 
|  | #ifdef HAVE_SYS_SOCKET_H | 
|  | # include <sys/socket.h> | 
|  | #endif | 
|  | #ifdef HAVE_ARPA_INET_H | 
|  | # include <arpa/inet.h> | 
|  | #endif | 
|  | #include <stdarg.h> | 
|  | #include <stdio.h> | 
|  | #include <stdlib.h> | 
|  | #ifdef HAVE_UNISTD_H | 
|  | # include <unistd.h> | 
|  | #endif | 
|  | #include <time.h> | 
|  | #include <assert.h> | 
|  |  | 
|  | #include "windef.h" | 
|  | #include "winbase.h" | 
|  | #include "wininet.h" | 
|  | #include "winerror.h" | 
|  | #define NO_SHLWAPI_STREAM | 
|  | #define NO_SHLWAPI_REG | 
|  | #define NO_SHLWAPI_STRFCNS | 
|  | #define NO_SHLWAPI_GDI | 
|  | #include "shlwapi.h" | 
|  | #include "sspi.h" | 
|  |  | 
|  | #include "internet.h" | 
|  | #include "wine/debug.h" | 
|  | #include "wine/unicode.h" | 
|  |  | 
|  | WINE_DEFAULT_DEBUG_CHANNEL(wininet); | 
|  |  | 
|  | static const WCHAR g_szHttp1_1[] = {'H','T','T','P','/','1','.','1',0}; | 
|  | static const WCHAR g_szReferer[] = {'R','e','f','e','r','e','r',0}; | 
|  | static const WCHAR g_szAccept[] = {'A','c','c','e','p','t',0}; | 
|  | static const WCHAR g_szUserAgent[] = {'U','s','e','r','-','A','g','e','n','t',0}; | 
|  | static const WCHAR szHost[] = { 'H','o','s','t',0 }; | 
|  | static const WCHAR szAuthorization[] = { 'A','u','t','h','o','r','i','z','a','t','i','o','n',0 }; | 
|  | static const WCHAR szProxy_Authorization[] = { 'P','r','o','x','y','-','A','u','t','h','o','r','i','z','a','t','i','o','n',0 }; | 
|  | static const WCHAR szStatus[] = { 'S','t','a','t','u','s',0 }; | 
|  | static const WCHAR szKeepAlive[] = {'K','e','e','p','-','A','l','i','v','e',0}; | 
|  | static const WCHAR szGET[] = { 'G','E','T', 0 }; | 
|  |  | 
|  | #define MAXHOSTNAME 100 | 
|  | #define MAX_FIELD_VALUE_LEN 256 | 
|  | #define MAX_FIELD_LEN 256 | 
|  |  | 
|  | #define HTTP_REFERER    g_szReferer | 
|  | #define HTTP_ACCEPT     g_szAccept | 
|  | #define HTTP_USERAGENT  g_szUserAgent | 
|  |  | 
|  | #define HTTP_ADDHDR_FLAG_ADD				0x20000000 | 
|  | #define HTTP_ADDHDR_FLAG_ADD_IF_NEW			0x10000000 | 
|  | #define HTTP_ADDHDR_FLAG_COALESCE			0x40000000 | 
|  | #define HTTP_ADDHDR_FLAG_COALESCE_WITH_COMMA		0x40000000 | 
|  | #define HTTP_ADDHDR_FLAG_COALESCE_WITH_SEMICOLON	0x01000000 | 
|  | #define HTTP_ADDHDR_FLAG_REPLACE			0x80000000 | 
|  | #define HTTP_ADDHDR_FLAG_REQ				0x02000000 | 
|  |  | 
|  | #define ARRAYSIZE(array) (sizeof(array)/sizeof((array)[0])) | 
|  |  | 
|  | struct HttpAuthInfo | 
|  | { | 
|  | LPWSTR scheme; | 
|  | CredHandle cred; | 
|  | CtxtHandle ctx; | 
|  | TimeStamp exp; | 
|  | ULONG attr; | 
|  | void *auth_data; | 
|  | unsigned int auth_data_len; | 
|  | BOOL finished; /* finished authenticating */ | 
|  | }; | 
|  |  | 
|  | static void HTTP_CloseConnection(LPWININETHANDLEHEADER hdr); | 
|  | static void HTTP_CloseHTTPRequestHandle(LPWININETHANDLEHEADER hdr); | 
|  | static void HTTP_CloseHTTPSessionHandle(LPWININETHANDLEHEADER hdr); | 
|  | static BOOL HTTP_OpenConnection(LPWININETHTTPREQW lpwhr); | 
|  | static BOOL HTTP_GetResponseHeaders(LPWININETHTTPREQW lpwhr); | 
|  | static BOOL HTTP_ProcessHeader(LPWININETHTTPREQW lpwhr, LPCWSTR field, LPCWSTR value, DWORD dwModifier); | 
|  | static LPWSTR * HTTP_InterpretHttpHeader(LPCWSTR buffer); | 
|  | static BOOL HTTP_InsertCustomHeader(LPWININETHTTPREQW lpwhr, LPHTTPHEADERW lpHdr); | 
|  | static INT HTTP_GetCustomHeaderIndex(LPWININETHTTPREQW lpwhr, LPCWSTR lpszField, INT index, BOOL Request); | 
|  | static BOOL HTTP_DeleteCustomHeader(LPWININETHTTPREQW lpwhr, DWORD index); | 
|  | static LPWSTR HTTP_build_req( LPCWSTR *list, int len ); | 
|  | static BOOL WINAPI HTTP_HttpQueryInfoW( LPWININETHTTPREQW lpwhr, DWORD | 
|  | dwInfoLevel, LPVOID lpBuffer, LPDWORD lpdwBufferLength, LPDWORD | 
|  | lpdwIndex); | 
|  | static BOOL HTTP_HandleRedirect(LPWININETHTTPREQW lpwhr, LPCWSTR lpszUrl); | 
|  | static UINT HTTP_DecodeBase64(LPCWSTR base64, LPSTR bin); | 
|  | static BOOL HTTP_VerifyValidHeader(LPWININETHTTPREQW lpwhr, LPCWSTR field); | 
|  |  | 
|  |  | 
|  | LPHTTPHEADERW HTTP_GetHeader(LPWININETHTTPREQW req, LPCWSTR head) | 
|  | { | 
|  | int HeaderIndex = 0; | 
|  | HeaderIndex = HTTP_GetCustomHeaderIndex(req, head, 0, TRUE); | 
|  | if (HeaderIndex == -1) | 
|  | return NULL; | 
|  | else | 
|  | return &req->pCustHeaders[HeaderIndex]; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_Tokenize (internal) | 
|  | * | 
|  | *  Tokenize a string, allocating memory for the tokens. | 
|  | */ | 
|  | static LPWSTR * HTTP_Tokenize(LPCWSTR string, LPCWSTR token_string) | 
|  | { | 
|  | LPWSTR * token_array; | 
|  | int tokens = 0; | 
|  | int i; | 
|  | LPCWSTR next_token; | 
|  |  | 
|  | /* empty string has no tokens */ | 
|  | if (*string) | 
|  | tokens++; | 
|  | /* count tokens */ | 
|  | for (i = 0; string[i]; i++) | 
|  | if (!strncmpW(string+i, token_string, strlenW(token_string))) | 
|  | { | 
|  | DWORD j; | 
|  | tokens++; | 
|  | /* we want to skip over separators, but not the null terminator */ | 
|  | for (j = 0; j < strlenW(token_string) - 1; j++) | 
|  | if (!string[i+j]) | 
|  | break; | 
|  | i += j; | 
|  | } | 
|  |  | 
|  | /* add 1 for terminating NULL */ | 
|  | token_array = HeapAlloc(GetProcessHeap(), 0, (tokens+1) * sizeof(*token_array)); | 
|  | token_array[tokens] = NULL; | 
|  | if (!tokens) | 
|  | return token_array; | 
|  | for (i = 0; i < tokens; i++) | 
|  | { | 
|  | int len; | 
|  | next_token = strstrW(string, token_string); | 
|  | if (!next_token) next_token = string+strlenW(string); | 
|  | len = next_token - string; | 
|  | token_array[i] = HeapAlloc(GetProcessHeap(), 0, (len+1)*sizeof(WCHAR)); | 
|  | memcpy(token_array[i], string, len*sizeof(WCHAR)); | 
|  | token_array[i][len] = '\0'; | 
|  | string = next_token+strlenW(token_string); | 
|  | } | 
|  | return token_array; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_FreeTokens (internal) | 
|  | * | 
|  | *  Frees memory returned from HTTP_Tokenize. | 
|  | */ | 
|  | static void HTTP_FreeTokens(LPWSTR * token_array) | 
|  | { | 
|  | int i; | 
|  | for (i = 0; token_array[i]; i++) | 
|  | HeapFree(GetProcessHeap(), 0, token_array[i]); | 
|  | HeapFree(GetProcessHeap(), 0, token_array); | 
|  | } | 
|  |  | 
|  | /* ********************************************************************** | 
|  | * | 
|  | * Helper functions for the HttpSendRequest(Ex) functions | 
|  | * | 
|  | */ | 
|  | static void AsyncHttpSendRequestProc(WORKREQUEST *workRequest) | 
|  | { | 
|  | struct WORKREQ_HTTPSENDREQUESTW const *req = &workRequest->u.HttpSendRequestW; | 
|  | LPWININETHTTPREQW lpwhr = (LPWININETHTTPREQW) workRequest->hdr; | 
|  |  | 
|  | TRACE("%p\n", lpwhr); | 
|  |  | 
|  | HTTP_HttpSendRequestW(lpwhr, req->lpszHeader, | 
|  | req->dwHeaderLength, req->lpOptional, req->dwOptionalLength, | 
|  | req->dwContentLength, req->bEndRequest); | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, req->lpszHeader); | 
|  | } | 
|  |  | 
|  | static void HTTP_FixURL( LPWININETHTTPREQW lpwhr) | 
|  | { | 
|  | static const WCHAR szSlash[] = { '/',0 }; | 
|  | static const WCHAR szHttp[] = { 'h','t','t','p',':','/','/', 0 }; | 
|  |  | 
|  | /* If we don't have a path we set it to root */ | 
|  | if (NULL == lpwhr->lpszPath) | 
|  | lpwhr->lpszPath = WININET_strdupW(szSlash); | 
|  | else /* remove \r and \n*/ | 
|  | { | 
|  | int nLen = strlenW(lpwhr->lpszPath); | 
|  | while ((nLen >0 ) && ((lpwhr->lpszPath[nLen-1] == '\r')||(lpwhr->lpszPath[nLen-1] == '\n'))) | 
|  | { | 
|  | nLen--; | 
|  | lpwhr->lpszPath[nLen]='\0'; | 
|  | } | 
|  | /* Replace '\' with '/' */ | 
|  | while (nLen>0) { | 
|  | nLen--; | 
|  | if (lpwhr->lpszPath[nLen] == '\\') lpwhr->lpszPath[nLen]='/'; | 
|  | } | 
|  | } | 
|  |  | 
|  | if(CSTR_EQUAL != CompareStringW( LOCALE_SYSTEM_DEFAULT, NORM_IGNORECASE, | 
|  | lpwhr->lpszPath, strlenW(lpwhr->lpszPath), szHttp, strlenW(szHttp) ) | 
|  | && lpwhr->lpszPath[0] != '/') /* not an absolute path ?? --> fix it !! */ | 
|  | { | 
|  | WCHAR *fixurl = HeapAlloc(GetProcessHeap(), 0, | 
|  | (strlenW(lpwhr->lpszPath) + 2)*sizeof(WCHAR)); | 
|  | *fixurl = '/'; | 
|  | strcpyW(fixurl + 1, lpwhr->lpszPath); | 
|  | HeapFree( GetProcessHeap(), 0, lpwhr->lpszPath ); | 
|  | lpwhr->lpszPath = fixurl; | 
|  | } | 
|  | } | 
|  |  | 
|  | static LPWSTR HTTP_BuildHeaderRequestString( LPWININETHTTPREQW lpwhr, LPCWSTR verb, LPCWSTR path, LPCWSTR version ) | 
|  | { | 
|  | LPWSTR requestString; | 
|  | DWORD len, n; | 
|  | LPCWSTR *req; | 
|  | UINT i; | 
|  | LPWSTR p; | 
|  |  | 
|  | static const WCHAR szSpace[] = { ' ',0 }; | 
|  | static const WCHAR szcrlf[] = {'\r','\n', 0}; | 
|  | static const WCHAR szColon[] = { ':',' ',0 }; | 
|  | static const WCHAR sztwocrlf[] = {'\r','\n','\r','\n', 0}; | 
|  |  | 
|  | /* allocate space for an array of all the string pointers to be added */ | 
|  | len = (lpwhr->nCustHeaders)*4 + 10; | 
|  | req = HeapAlloc( GetProcessHeap(), 0, len*sizeof(LPCWSTR) ); | 
|  |  | 
|  | /* add the verb, path and HTTP version string */ | 
|  | n = 0; | 
|  | req[n++] = verb; | 
|  | req[n++] = szSpace; | 
|  | req[n++] = path; | 
|  | req[n++] = szSpace; | 
|  | req[n++] = version; | 
|  |  | 
|  | /* Append custom request headers */ | 
|  | for (i = 0; i < lpwhr->nCustHeaders; i++) | 
|  | { | 
|  | if (lpwhr->pCustHeaders[i].wFlags & HDR_ISREQUEST) | 
|  | { | 
|  | req[n++] = szcrlf; | 
|  | req[n++] = lpwhr->pCustHeaders[i].lpszField; | 
|  | req[n++] = szColon; | 
|  | req[n++] = lpwhr->pCustHeaders[i].lpszValue; | 
|  |  | 
|  | TRACE("Adding custom header %s (%s)\n", | 
|  | debugstr_w(lpwhr->pCustHeaders[i].lpszField), | 
|  | debugstr_w(lpwhr->pCustHeaders[i].lpszValue)); | 
|  | } | 
|  | } | 
|  |  | 
|  | if( n >= len ) | 
|  | ERR("oops. buffer overrun\n"); | 
|  |  | 
|  | req[n] = NULL; | 
|  | requestString = HTTP_build_req( req, 4 ); | 
|  | HeapFree( GetProcessHeap(), 0, req ); | 
|  |  | 
|  | /* | 
|  | * Set (header) termination string for request | 
|  | * Make sure there's exactly two new lines at the end of the request | 
|  | */ | 
|  | p = &requestString[strlenW(requestString)-1]; | 
|  | while ( (*p == '\n') || (*p == '\r') ) | 
|  | p--; | 
|  | strcpyW( p+1, sztwocrlf ); | 
|  |  | 
|  | return requestString; | 
|  | } | 
|  |  | 
|  | static void HTTP_ProcessCookies( LPWININETHTTPREQW lpwhr ) | 
|  | { | 
|  | static const WCHAR szSet_Cookie[] = { 'S','e','t','-','C','o','o','k','i','e',0 }; | 
|  | int HeaderIndex; | 
|  | LPHTTPHEADERW setCookieHeader; | 
|  |  | 
|  | HeaderIndex = HTTP_GetCustomHeaderIndex(lpwhr, szSet_Cookie, 0, FALSE); | 
|  | if (HeaderIndex == -1) | 
|  | return; | 
|  | setCookieHeader = &lpwhr->pCustHeaders[HeaderIndex]; | 
|  |  | 
|  | if (!(lpwhr->hdr.dwFlags & INTERNET_FLAG_NO_COOKIES) && setCookieHeader->lpszValue) | 
|  | { | 
|  | int nPosStart = 0, nPosEnd = 0, len; | 
|  | static const WCHAR szFmt[] = { 'h','t','t','p',':','/','/','%','s','/',0}; | 
|  |  | 
|  | while (setCookieHeader->lpszValue[nPosEnd] != '\0') | 
|  | { | 
|  | LPWSTR buf_cookie, cookie_name, cookie_data; | 
|  | LPWSTR buf_url; | 
|  | LPWSTR domain = NULL; | 
|  | LPHTTPHEADERW Host; | 
|  |  | 
|  | int nEqualPos = 0; | 
|  | while (setCookieHeader->lpszValue[nPosEnd] != ';' && setCookieHeader->lpszValue[nPosEnd] != ',' && | 
|  | setCookieHeader->lpszValue[nPosEnd] != '\0') | 
|  | { | 
|  | nPosEnd++; | 
|  | } | 
|  | if (setCookieHeader->lpszValue[nPosEnd] == ';') | 
|  | { | 
|  | /* fixme: not case sensitive, strcasestr is gnu only */ | 
|  | int nDomainPosEnd = 0; | 
|  | int nDomainPosStart = 0, nDomainLength = 0; | 
|  | static const WCHAR szDomain[] = {'d','o','m','a','i','n','=',0}; | 
|  | LPWSTR lpszDomain = strstrW(&setCookieHeader->lpszValue[nPosEnd], szDomain); | 
|  | if (lpszDomain) | 
|  | { /* they have specified their own domain, lets use it */ | 
|  | while (lpszDomain[nDomainPosEnd] != ';' && lpszDomain[nDomainPosEnd] != ',' && | 
|  | lpszDomain[nDomainPosEnd] != '\0') | 
|  | { | 
|  | nDomainPosEnd++; | 
|  | } | 
|  | nDomainPosStart = strlenW(szDomain); | 
|  | nDomainLength = (nDomainPosEnd - nDomainPosStart) + 1; | 
|  | domain = HeapAlloc(GetProcessHeap(), 0, (nDomainLength + 1)*sizeof(WCHAR)); | 
|  | lstrcpynW(domain, &lpszDomain[nDomainPosStart], nDomainLength + 1); | 
|  | } | 
|  | } | 
|  | if (setCookieHeader->lpszValue[nPosEnd] == '\0') break; | 
|  | buf_cookie = HeapAlloc(GetProcessHeap(), 0, ((nPosEnd - nPosStart) + 1)*sizeof(WCHAR)); | 
|  | lstrcpynW(buf_cookie, &setCookieHeader->lpszValue[nPosStart], (nPosEnd - nPosStart) + 1); | 
|  | TRACE("%s\n", debugstr_w(buf_cookie)); | 
|  | while (buf_cookie[nEqualPos] != '=' && buf_cookie[nEqualPos] != '\0') | 
|  | { | 
|  | nEqualPos++; | 
|  | } | 
|  | if (buf_cookie[nEqualPos] == '\0' || buf_cookie[nEqualPos + 1] == '\0') | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, buf_cookie); | 
|  | break; | 
|  | } | 
|  |  | 
|  | cookie_name = HeapAlloc(GetProcessHeap(), 0, (nEqualPos + 1)*sizeof(WCHAR)); | 
|  | lstrcpynW(cookie_name, buf_cookie, nEqualPos + 1); | 
|  | cookie_data = &buf_cookie[nEqualPos + 1]; | 
|  |  | 
|  | Host = HTTP_GetHeader(lpwhr,szHost); | 
|  | len = lstrlenW((domain ? domain : (Host?Host->lpszValue:NULL))) + | 
|  | strlenW(lpwhr->lpszPath) + 9; | 
|  | buf_url = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR)); | 
|  | sprintfW(buf_url, szFmt, (domain ? domain : (Host?Host->lpszValue:NULL))); /* FIXME PATH!!! */ | 
|  | InternetSetCookieW(buf_url, cookie_name, cookie_data); | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, buf_url); | 
|  | HeapFree(GetProcessHeap(), 0, buf_cookie); | 
|  | HeapFree(GetProcessHeap(), 0, cookie_name); | 
|  | HeapFree(GetProcessHeap(), 0, domain); | 
|  | nPosStart = nPosEnd; | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | static inline BOOL is_basic_auth_value( LPCWSTR pszAuthValue ) | 
|  | { | 
|  | static const WCHAR szBasic[] = {'B','a','s','i','c'}; /* Note: not nul-terminated */ | 
|  | return !strncmpiW(pszAuthValue, szBasic, ARRAYSIZE(szBasic)) && | 
|  | ((pszAuthValue[ARRAYSIZE(szBasic)] != ' ') || !pszAuthValue[ARRAYSIZE(szBasic)]); | 
|  | } | 
|  |  | 
|  | static BOOL HTTP_DoAuthorization( LPWININETHTTPREQW lpwhr, LPCWSTR pszAuthValue, | 
|  | struct HttpAuthInfo **ppAuthInfo, | 
|  | LPWSTR domain_and_username, LPWSTR password ) | 
|  | { | 
|  | SECURITY_STATUS sec_status; | 
|  | struct HttpAuthInfo *pAuthInfo = *ppAuthInfo; | 
|  | BOOL first = FALSE; | 
|  |  | 
|  | TRACE("%s\n", debugstr_w(pszAuthValue)); | 
|  |  | 
|  | if (!domain_and_username) return FALSE; | 
|  |  | 
|  | if (!pAuthInfo) | 
|  | { | 
|  | TimeStamp exp; | 
|  |  | 
|  | first = TRUE; | 
|  | pAuthInfo = HeapAlloc(GetProcessHeap(), 0, sizeof(*pAuthInfo)); | 
|  | if (!pAuthInfo) | 
|  | return FALSE; | 
|  |  | 
|  | SecInvalidateHandle(&pAuthInfo->cred); | 
|  | SecInvalidateHandle(&pAuthInfo->ctx); | 
|  | memset(&pAuthInfo->exp, 0, sizeof(pAuthInfo->exp)); | 
|  | pAuthInfo->attr = 0; | 
|  | pAuthInfo->auth_data = NULL; | 
|  | pAuthInfo->auth_data_len = 0; | 
|  | pAuthInfo->finished = FALSE; | 
|  |  | 
|  | if (is_basic_auth_value(pszAuthValue)) | 
|  | { | 
|  | static const WCHAR szBasic[] = {'B','a','s','i','c',0}; | 
|  | pAuthInfo->scheme = WININET_strdupW(szBasic); | 
|  | if (!pAuthInfo->scheme) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, pAuthInfo); | 
|  | return FALSE; | 
|  | } | 
|  | } | 
|  | else | 
|  | { | 
|  | SEC_WINNT_AUTH_IDENTITY_W nt_auth_identity; | 
|  | WCHAR *user = strchrW(domain_and_username, '\\'); | 
|  | WCHAR *domain = domain_and_username; | 
|  |  | 
|  | pAuthInfo->scheme = WININET_strdupW(pszAuthValue); | 
|  | if (!pAuthInfo->scheme) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, pAuthInfo); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | if (user) user++; | 
|  | else | 
|  | { | 
|  | user = domain_and_username; | 
|  | domain = NULL; | 
|  | } | 
|  | nt_auth_identity.Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE; | 
|  | nt_auth_identity.User = user; | 
|  | nt_auth_identity.UserLength = strlenW(nt_auth_identity.User); | 
|  | nt_auth_identity.Domain = domain; | 
|  | nt_auth_identity.DomainLength = domain ? user - domain - 1 : 0; | 
|  | nt_auth_identity.Password = password; | 
|  | nt_auth_identity.PasswordLength = strlenW(nt_auth_identity.Password); | 
|  |  | 
|  | /* FIXME: make sure scheme accepts SEC_WINNT_AUTH_IDENTITY before calling AcquireCredentialsHandle */ | 
|  |  | 
|  | sec_status = AcquireCredentialsHandleW(NULL, pAuthInfo->scheme, | 
|  | SECPKG_CRED_OUTBOUND, NULL, | 
|  | &nt_auth_identity, NULL, | 
|  | NULL, &pAuthInfo->cred, | 
|  | &exp); | 
|  | if (sec_status != SEC_E_OK) | 
|  | { | 
|  | WARN("AcquireCredentialsHandleW for scheme %s failed with error 0x%08x\n", | 
|  | debugstr_w(pAuthInfo->scheme), sec_status); | 
|  | HeapFree(GetProcessHeap(), 0, pAuthInfo->scheme); | 
|  | HeapFree(GetProcessHeap(), 0, pAuthInfo); | 
|  | return FALSE; | 
|  | } | 
|  | } | 
|  | *ppAuthInfo = pAuthInfo; | 
|  | } | 
|  | else if (pAuthInfo->finished) | 
|  | return FALSE; | 
|  |  | 
|  | if ((strlenW(pszAuthValue) < strlenW(pAuthInfo->scheme)) || | 
|  | strncmpiW(pszAuthValue, pAuthInfo->scheme, strlenW(pAuthInfo->scheme))) | 
|  | { | 
|  | ERR("authentication scheme changed from %s to %s\n", | 
|  | debugstr_w(pAuthInfo->scheme), debugstr_w(pszAuthValue)); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | if (is_basic_auth_value(pszAuthValue)) | 
|  | { | 
|  | int userlen = WideCharToMultiByte(CP_UTF8, 0, domain_and_username, lstrlenW(domain_and_username), NULL, 0, NULL, NULL); | 
|  | int passlen = WideCharToMultiByte(CP_UTF8, 0, password, lstrlenW(password), NULL, 0, NULL, NULL); | 
|  | char *auth_data; | 
|  |  | 
|  | TRACE("basic authentication\n"); | 
|  |  | 
|  | /* length includes a nul terminator, which will be re-used for the ':' */ | 
|  | auth_data = HeapAlloc(GetProcessHeap(), 0, userlen + 1 + passlen); | 
|  | if (!auth_data) | 
|  | return FALSE; | 
|  |  | 
|  | WideCharToMultiByte(CP_UTF8, 0, domain_and_username, -1, auth_data, userlen, NULL, NULL); | 
|  | auth_data[userlen] = ':'; | 
|  | WideCharToMultiByte(CP_UTF8, 0, password, -1, &auth_data[userlen+1], passlen, NULL, NULL); | 
|  |  | 
|  | pAuthInfo->auth_data = auth_data; | 
|  | pAuthInfo->auth_data_len = userlen + 1 + passlen; | 
|  | pAuthInfo->finished = TRUE; | 
|  |  | 
|  | return TRUE; | 
|  | } | 
|  | else | 
|  | { | 
|  | LPCWSTR pszAuthData; | 
|  | SecBufferDesc out_desc, in_desc; | 
|  | SecBuffer out, in; | 
|  | unsigned char *buffer; | 
|  | ULONG context_req = ISC_REQ_CONNECTION | ISC_REQ_USE_DCE_STYLE | | 
|  | ISC_REQ_MUTUAL_AUTH | ISC_REQ_DELEGATE; | 
|  |  | 
|  | in.BufferType = SECBUFFER_TOKEN; | 
|  | in.cbBuffer = 0; | 
|  | in.pvBuffer = NULL; | 
|  |  | 
|  | in_desc.ulVersion = 0; | 
|  | in_desc.cBuffers = 1; | 
|  | in_desc.pBuffers = ∈ | 
|  |  | 
|  | pszAuthData = pszAuthValue + strlenW(pAuthInfo->scheme); | 
|  | if (*pszAuthData == ' ') | 
|  | { | 
|  | pszAuthData++; | 
|  | in.cbBuffer = HTTP_DecodeBase64(pszAuthData, NULL); | 
|  | in.pvBuffer = HeapAlloc(GetProcessHeap(), 0, in.cbBuffer); | 
|  | HTTP_DecodeBase64(pszAuthData, in.pvBuffer); | 
|  | } | 
|  |  | 
|  | buffer = HeapAlloc(GetProcessHeap(), 0, 0x100); | 
|  |  | 
|  | out.BufferType = SECBUFFER_TOKEN; | 
|  | out.cbBuffer = 0x100; | 
|  | out.pvBuffer = buffer; | 
|  |  | 
|  | out_desc.ulVersion = 0; | 
|  | out_desc.cBuffers = 1; | 
|  | out_desc.pBuffers = &out; | 
|  |  | 
|  | sec_status = InitializeSecurityContextW(first ? &pAuthInfo->cred : NULL, | 
|  | first ? NULL : &pAuthInfo->ctx, | 
|  | first ? lpwhr->lpHttpSession->lpszServerName : NULL, | 
|  | context_req, 0, SECURITY_NETWORK_DREP, | 
|  | in.pvBuffer ? &in_desc : NULL, | 
|  | 0, &pAuthInfo->ctx, &out_desc, | 
|  | &pAuthInfo->attr, &pAuthInfo->exp); | 
|  | if (sec_status == SEC_E_OK) | 
|  | { | 
|  | pAuthInfo->finished = TRUE; | 
|  | pAuthInfo->auth_data = out.pvBuffer; | 
|  | pAuthInfo->auth_data_len = out.cbBuffer; | 
|  | TRACE("sending last auth packet\n"); | 
|  | } | 
|  | else if (sec_status == SEC_I_CONTINUE_NEEDED) | 
|  | { | 
|  | pAuthInfo->auth_data = out.pvBuffer; | 
|  | pAuthInfo->auth_data_len = out.cbBuffer; | 
|  | TRACE("sending next auth packet\n"); | 
|  | } | 
|  | else | 
|  | { | 
|  | ERR("InitializeSecurityContextW returned error 0x%08x\n", sec_status); | 
|  | HeapFree(GetProcessHeap(), 0, out.pvBuffer); | 
|  | return FALSE; | 
|  | } | 
|  | } | 
|  |  | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_HttpAddRequestHeadersW (internal) | 
|  | */ | 
|  | static BOOL WINAPI HTTP_HttpAddRequestHeadersW(LPWININETHTTPREQW lpwhr, | 
|  | LPCWSTR lpszHeader, DWORD dwHeaderLength, DWORD dwModifier) | 
|  | { | 
|  | LPWSTR lpszStart; | 
|  | LPWSTR lpszEnd; | 
|  | LPWSTR buffer; | 
|  | BOOL bSuccess = FALSE; | 
|  | DWORD len; | 
|  |  | 
|  | TRACE("copying header: %s\n", debugstr_wn(lpszHeader, dwHeaderLength)); | 
|  |  | 
|  | if( dwHeaderLength == ~0U ) | 
|  | len = strlenW(lpszHeader); | 
|  | else | 
|  | len = dwHeaderLength; | 
|  | buffer = HeapAlloc( GetProcessHeap(), 0, sizeof(WCHAR)*(len+1) ); | 
|  | lstrcpynW( buffer, lpszHeader, len + 1); | 
|  |  | 
|  | lpszStart = buffer; | 
|  |  | 
|  | do | 
|  | { | 
|  | LPWSTR * pFieldAndValue; | 
|  |  | 
|  | lpszEnd = lpszStart; | 
|  |  | 
|  | while (*lpszEnd != '\0') | 
|  | { | 
|  | if (*lpszEnd == '\r' && *(lpszEnd + 1) == '\n') | 
|  | break; | 
|  | lpszEnd++; | 
|  | } | 
|  |  | 
|  | if (*lpszStart == '\0') | 
|  | break; | 
|  |  | 
|  | if (*lpszEnd == '\r') | 
|  | { | 
|  | *lpszEnd = '\0'; | 
|  | lpszEnd += 2; /* Jump over \r\n */ | 
|  | } | 
|  | TRACE("interpreting header %s\n", debugstr_w(lpszStart)); | 
|  | pFieldAndValue = HTTP_InterpretHttpHeader(lpszStart); | 
|  | if (pFieldAndValue) | 
|  | { | 
|  | bSuccess = HTTP_VerifyValidHeader(lpwhr, pFieldAndValue[0]); | 
|  | if (bSuccess) | 
|  | bSuccess = HTTP_ProcessHeader(lpwhr, pFieldAndValue[0], | 
|  | pFieldAndValue[1], dwModifier | HTTP_ADDHDR_FLAG_REQ); | 
|  | HTTP_FreeTokens(pFieldAndValue); | 
|  | } | 
|  |  | 
|  | lpszStart = lpszEnd; | 
|  | } while (bSuccess); | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, buffer); | 
|  |  | 
|  | return bSuccess; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HttpAddRequestHeadersW (WININET.@) | 
|  | * | 
|  | * Adds one or more HTTP header to the request handler | 
|  | * | 
|  | * NOTE | 
|  | * On Windows if dwHeaderLength includes the trailing '\0', then | 
|  | * HttpAddRequestHeadersW() adds it too. However this results in an | 
|  | * invalid Http header which is rejected by some servers so we probably | 
|  | * don't need to match Windows on that point. | 
|  | * | 
|  | * RETURNS | 
|  | *    TRUE  on success | 
|  | *    FALSE on failure | 
|  | * | 
|  | */ | 
|  | BOOL WINAPI HttpAddRequestHeadersW(HINTERNET hHttpRequest, | 
|  | LPCWSTR lpszHeader, DWORD dwHeaderLength, DWORD dwModifier) | 
|  | { | 
|  | BOOL bSuccess = FALSE; | 
|  | LPWININETHTTPREQW lpwhr; | 
|  |  | 
|  | TRACE("%p, %s, %i, %i\n", hHttpRequest, debugstr_wn(lpszHeader, dwHeaderLength), dwHeaderLength, dwModifier); | 
|  |  | 
|  | if (!lpszHeader) | 
|  | return TRUE; | 
|  |  | 
|  | lpwhr = (LPWININETHTTPREQW) WININET_GetObject( hHttpRequest ); | 
|  | if (NULL == lpwhr ||  lpwhr->hdr.htype != WH_HHTTPREQ) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_INTERNET_INCORRECT_HANDLE_TYPE); | 
|  | goto lend; | 
|  | } | 
|  | bSuccess = HTTP_HttpAddRequestHeadersW( lpwhr, lpszHeader, dwHeaderLength, dwModifier ); | 
|  | lend: | 
|  | if( lpwhr ) | 
|  | WININET_Release( &lpwhr->hdr ); | 
|  |  | 
|  | return bSuccess; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HttpAddRequestHeadersA (WININET.@) | 
|  | * | 
|  | * Adds one or more HTTP header to the request handler | 
|  | * | 
|  | * RETURNS | 
|  | *    TRUE  on success | 
|  | *    FALSE on failure | 
|  | * | 
|  | */ | 
|  | BOOL WINAPI HttpAddRequestHeadersA(HINTERNET hHttpRequest, | 
|  | LPCSTR lpszHeader, DWORD dwHeaderLength, DWORD dwModifier) | 
|  | { | 
|  | DWORD len; | 
|  | LPWSTR hdr; | 
|  | BOOL r; | 
|  |  | 
|  | TRACE("%p, %s, %i, %i\n", hHttpRequest, debugstr_an(lpszHeader, dwHeaderLength), dwHeaderLength, dwModifier); | 
|  |  | 
|  | len = MultiByteToWideChar( CP_ACP, 0, lpszHeader, dwHeaderLength, NULL, 0 ); | 
|  | hdr = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) ); | 
|  | MultiByteToWideChar( CP_ACP, 0, lpszHeader, dwHeaderLength, hdr, len ); | 
|  | if( dwHeaderLength != ~0U ) | 
|  | dwHeaderLength = len; | 
|  |  | 
|  | r = HttpAddRequestHeadersW( hHttpRequest, hdr, dwHeaderLength, dwModifier ); | 
|  |  | 
|  | HeapFree( GetProcessHeap(), 0, hdr ); | 
|  |  | 
|  | return r; | 
|  | } | 
|  |  | 
|  | /* read any content returned by the server so that the connection can be | 
|  | * reused */ | 
|  | static void HTTP_DrainContent(LPWININETHTTPREQW lpwhr) | 
|  | { | 
|  | DWORD bytes_read; | 
|  |  | 
|  | if (!NETCON_connected(&lpwhr->netConnection)) return; | 
|  |  | 
|  | if (lpwhr->dwContentLength == -1) | 
|  | NETCON_close(&lpwhr->netConnection); | 
|  |  | 
|  | do | 
|  | { | 
|  | char buffer[2048]; | 
|  | if (!INTERNET_ReadFile(&lpwhr->hdr, buffer, sizeof(buffer), &bytes_read, | 
|  | TRUE, FALSE)) | 
|  | return; | 
|  | } while (bytes_read); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HttpEndRequestA (WININET.@) | 
|  | * | 
|  | * Ends an HTTP request that was started by HttpSendRequestEx | 
|  | * | 
|  | * RETURNS | 
|  | *    TRUE	if successful | 
|  | *    FALSE	on failure | 
|  | * | 
|  | */ | 
|  | BOOL WINAPI HttpEndRequestA(HINTERNET hRequest, | 
|  | LPINTERNET_BUFFERSA lpBuffersOut, DWORD dwFlags, DWORD_PTR dwContext) | 
|  | { | 
|  | LPINTERNET_BUFFERSA ptr; | 
|  | LPINTERNET_BUFFERSW lpBuffersOutW,ptrW; | 
|  | BOOL rc = FALSE; | 
|  |  | 
|  | TRACE("(%p, %p, %08x, %08lx): stub\n", hRequest, lpBuffersOut, dwFlags, | 
|  | dwContext); | 
|  |  | 
|  | ptr = lpBuffersOut; | 
|  | if (ptr) | 
|  | lpBuffersOutW = (LPINTERNET_BUFFERSW)HeapAlloc(GetProcessHeap(), | 
|  | HEAP_ZERO_MEMORY, sizeof(INTERNET_BUFFERSW)); | 
|  | else | 
|  | lpBuffersOutW = NULL; | 
|  |  | 
|  | ptrW = lpBuffersOutW; | 
|  | while (ptr) | 
|  | { | 
|  | if (ptr->lpvBuffer && ptr->dwBufferLength) | 
|  | ptrW->lpvBuffer = HeapAlloc(GetProcessHeap(),0,ptr->dwBufferLength); | 
|  | ptrW->dwBufferLength = ptr->dwBufferLength; | 
|  | ptrW->dwBufferTotal= ptr->dwBufferTotal; | 
|  |  | 
|  | if (ptr->Next) | 
|  | ptrW->Next = HeapAlloc(GetProcessHeap(),HEAP_ZERO_MEMORY, | 
|  | sizeof(INTERNET_BUFFERSW)); | 
|  |  | 
|  | ptr = ptr->Next; | 
|  | ptrW = ptrW->Next; | 
|  | } | 
|  |  | 
|  | rc = HttpEndRequestW(hRequest, lpBuffersOutW, dwFlags, dwContext); | 
|  |  | 
|  | if (lpBuffersOutW) | 
|  | { | 
|  | ptrW = lpBuffersOutW; | 
|  | while (ptrW) | 
|  | { | 
|  | LPINTERNET_BUFFERSW ptrW2; | 
|  |  | 
|  | FIXME("Do we need to translate info out of these buffer?\n"); | 
|  |  | 
|  | HeapFree(GetProcessHeap(),0,ptrW->lpvBuffer); | 
|  | ptrW2 = ptrW->Next; | 
|  | HeapFree(GetProcessHeap(),0,ptrW); | 
|  | ptrW = ptrW2; | 
|  | } | 
|  | } | 
|  |  | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HttpEndRequestW (WININET.@) | 
|  | * | 
|  | * Ends an HTTP request that was started by HttpSendRequestEx | 
|  | * | 
|  | * RETURNS | 
|  | *    TRUE	if successful | 
|  | *    FALSE	on failure | 
|  | * | 
|  | */ | 
|  | BOOL WINAPI HttpEndRequestW(HINTERNET hRequest, | 
|  | LPINTERNET_BUFFERSW lpBuffersOut, DWORD dwFlags, DWORD_PTR dwContext) | 
|  | { | 
|  | BOOL rc = FALSE; | 
|  | LPWININETHTTPREQW lpwhr; | 
|  | INT responseLen; | 
|  | DWORD dwBufferSize; | 
|  |  | 
|  | TRACE("-->\n"); | 
|  | lpwhr = (LPWININETHTTPREQW) WININET_GetObject( hRequest ); | 
|  |  | 
|  | if (NULL == lpwhr || lpwhr->hdr.htype != WH_HHTTPREQ) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_INTERNET_INCORRECT_HANDLE_TYPE); | 
|  | if (lpwhr) | 
|  | WININET_Release( &lpwhr->hdr ); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | lpwhr->hdr.dwFlags |= dwFlags; | 
|  | lpwhr->hdr.dwContext = dwContext; | 
|  |  | 
|  | /* We appear to do nothing with lpBuffersOut.. is that correct? */ | 
|  |  | 
|  | SendAsyncCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_RECEIVING_RESPONSE, NULL, 0); | 
|  |  | 
|  | responseLen = HTTP_GetResponseHeaders(lpwhr); | 
|  | if (responseLen) | 
|  | rc = TRUE; | 
|  |  | 
|  | SendAsyncCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_RESPONSE_RECEIVED, &responseLen, sizeof(DWORD)); | 
|  |  | 
|  | /* process cookies here. Is this right? */ | 
|  | HTTP_ProcessCookies(lpwhr); | 
|  |  | 
|  | dwBufferSize = sizeof(lpwhr->dwContentLength); | 
|  | if (!HTTP_HttpQueryInfoW(lpwhr,HTTP_QUERY_FLAG_NUMBER|HTTP_QUERY_CONTENT_LENGTH, | 
|  | &lpwhr->dwContentLength,&dwBufferSize,NULL)) | 
|  | lpwhr->dwContentLength = -1; | 
|  |  | 
|  | if (lpwhr->dwContentLength == 0) | 
|  | HTTP_FinishedReading(lpwhr); | 
|  |  | 
|  | if(!(lpwhr->hdr.dwFlags & INTERNET_FLAG_NO_AUTO_REDIRECT)) | 
|  | { | 
|  | DWORD dwCode,dwCodeLength=sizeof(DWORD); | 
|  | if(HTTP_HttpQueryInfoW(lpwhr,HTTP_QUERY_FLAG_NUMBER|HTTP_QUERY_STATUS_CODE,&dwCode,&dwCodeLength,NULL) && | 
|  | (dwCode==302 || dwCode==301)) | 
|  | { | 
|  | WCHAR szNewLocation[2048]; | 
|  | dwBufferSize=sizeof(szNewLocation); | 
|  | if(HTTP_HttpQueryInfoW(lpwhr,HTTP_QUERY_LOCATION,szNewLocation,&dwBufferSize,NULL)) | 
|  | { | 
|  | /* redirects are always GETs */ | 
|  | HeapFree(GetProcessHeap(),0,lpwhr->lpszVerb); | 
|  | lpwhr->lpszVerb = WININET_strdupW(szGET); | 
|  | HTTP_DrainContent(lpwhr); | 
|  | rc = HTTP_HandleRedirect(lpwhr, szNewLocation); | 
|  | if (rc) | 
|  | rc = HTTP_HttpSendRequestW(lpwhr, NULL, 0, NULL, 0, 0, TRUE); | 
|  | } | 
|  | } | 
|  | } | 
|  |  | 
|  | WININET_Release( &lpwhr->hdr ); | 
|  | TRACE("%i <--\n",rc); | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HttpOpenRequestW (WININET.@) | 
|  | * | 
|  | * Open a HTTP request handle | 
|  | * | 
|  | * RETURNS | 
|  | *    HINTERNET  a HTTP request handle on success | 
|  | *    NULL 	 on failure | 
|  | * | 
|  | */ | 
|  | HINTERNET WINAPI HttpOpenRequestW(HINTERNET hHttpSession, | 
|  | LPCWSTR lpszVerb, LPCWSTR lpszObjectName, LPCWSTR lpszVersion, | 
|  | LPCWSTR lpszReferrer , LPCWSTR *lpszAcceptTypes, | 
|  | DWORD dwFlags, DWORD_PTR dwContext) | 
|  | { | 
|  | LPWININETHTTPSESSIONW lpwhs; | 
|  | HINTERNET handle = NULL; | 
|  |  | 
|  | TRACE("(%p, %s, %s, %s, %s, %p, %08x, %08lx)\n", hHttpSession, | 
|  | debugstr_w(lpszVerb), debugstr_w(lpszObjectName), | 
|  | debugstr_w(lpszVersion), debugstr_w(lpszReferrer), lpszAcceptTypes, | 
|  | dwFlags, dwContext); | 
|  | if(lpszAcceptTypes!=NULL) | 
|  | { | 
|  | int i; | 
|  | for(i=0;lpszAcceptTypes[i]!=NULL;i++) | 
|  | TRACE("\taccept type: %s\n",debugstr_w(lpszAcceptTypes[i])); | 
|  | } | 
|  |  | 
|  | lpwhs = (LPWININETHTTPSESSIONW) WININET_GetObject( hHttpSession ); | 
|  | if (NULL == lpwhs ||  lpwhs->hdr.htype != WH_HHTTPSESSION) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_INTERNET_INCORRECT_HANDLE_TYPE); | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * My tests seem to show that the windows version does not | 
|  | * become asynchronous until after this point. And anyhow | 
|  | * if this call was asynchronous then how would you get the | 
|  | * necessary HINTERNET pointer returned by this function. | 
|  | * | 
|  | */ | 
|  | handle = HTTP_HttpOpenRequestW(lpwhs, lpszVerb, lpszObjectName, | 
|  | lpszVersion, lpszReferrer, lpszAcceptTypes, | 
|  | dwFlags, dwContext); | 
|  | lend: | 
|  | if( lpwhs ) | 
|  | WININET_Release( &lpwhs->hdr ); | 
|  | TRACE("returning %p\n", handle); | 
|  | return handle; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HttpOpenRequestA (WININET.@) | 
|  | * | 
|  | * Open a HTTP request handle | 
|  | * | 
|  | * RETURNS | 
|  | *    HINTERNET  a HTTP request handle on success | 
|  | *    NULL 	 on failure | 
|  | * | 
|  | */ | 
|  | HINTERNET WINAPI HttpOpenRequestA(HINTERNET hHttpSession, | 
|  | LPCSTR lpszVerb, LPCSTR lpszObjectName, LPCSTR lpszVersion, | 
|  | LPCSTR lpszReferrer , LPCSTR *lpszAcceptTypes, | 
|  | DWORD dwFlags, DWORD_PTR dwContext) | 
|  | { | 
|  | LPWSTR szVerb = NULL, szObjectName = NULL; | 
|  | LPWSTR szVersion = NULL, szReferrer = NULL, *szAcceptTypes = NULL; | 
|  | INT len; | 
|  | INT acceptTypesCount; | 
|  | HINTERNET rc = FALSE; | 
|  | TRACE("(%p, %s, %s, %s, %s, %p, %08x, %08lx)\n", hHttpSession, | 
|  | debugstr_a(lpszVerb), debugstr_a(lpszObjectName), | 
|  | debugstr_a(lpszVersion), debugstr_a(lpszReferrer), lpszAcceptTypes, | 
|  | dwFlags, dwContext); | 
|  |  | 
|  | if (lpszVerb) | 
|  | { | 
|  | len = MultiByteToWideChar(CP_ACP, 0, lpszVerb, -1, NULL, 0 ); | 
|  | szVerb = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR) ); | 
|  | if ( !szVerb ) | 
|  | goto end; | 
|  | MultiByteToWideChar(CP_ACP, 0, lpszVerb, -1, szVerb, len); | 
|  | } | 
|  |  | 
|  | if (lpszObjectName) | 
|  | { | 
|  | len = MultiByteToWideChar(CP_ACP, 0, lpszObjectName, -1, NULL, 0 ); | 
|  | szObjectName = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR) ); | 
|  | if ( !szObjectName ) | 
|  | goto end; | 
|  | MultiByteToWideChar(CP_ACP, 0, lpszObjectName, -1, szObjectName, len ); | 
|  | } | 
|  |  | 
|  | if (lpszVersion) | 
|  | { | 
|  | len = MultiByteToWideChar(CP_ACP, 0, lpszVersion, -1, NULL, 0 ); | 
|  | szVersion = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR)); | 
|  | if ( !szVersion ) | 
|  | goto end; | 
|  | MultiByteToWideChar(CP_ACP, 0, lpszVersion, -1, szVersion, len ); | 
|  | } | 
|  |  | 
|  | if (lpszReferrer) | 
|  | { | 
|  | len = MultiByteToWideChar(CP_ACP, 0, lpszReferrer, -1, NULL, 0 ); | 
|  | szReferrer = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR)); | 
|  | if ( !szReferrer ) | 
|  | goto end; | 
|  | MultiByteToWideChar(CP_ACP, 0, lpszReferrer, -1, szReferrer, len ); | 
|  | } | 
|  |  | 
|  | acceptTypesCount = 0; | 
|  | if (lpszAcceptTypes) | 
|  | { | 
|  | /* find out how many there are */ | 
|  | while (lpszAcceptTypes[acceptTypesCount] && *lpszAcceptTypes[acceptTypesCount]) | 
|  | acceptTypesCount++; | 
|  | szAcceptTypes = HeapAlloc(GetProcessHeap(), 0, sizeof(WCHAR *) * (acceptTypesCount+1)); | 
|  | acceptTypesCount = 0; | 
|  | while (lpszAcceptTypes[acceptTypesCount] && *lpszAcceptTypes[acceptTypesCount]) | 
|  | { | 
|  | len = MultiByteToWideChar(CP_ACP, 0, lpszAcceptTypes[acceptTypesCount], | 
|  | -1, NULL, 0 ); | 
|  | szAcceptTypes[acceptTypesCount] = HeapAlloc(GetProcessHeap(), 0, len * sizeof(WCHAR)); | 
|  | if (!szAcceptTypes[acceptTypesCount] ) | 
|  | goto end; | 
|  | MultiByteToWideChar(CP_ACP, 0, lpszAcceptTypes[acceptTypesCount], | 
|  | -1, szAcceptTypes[acceptTypesCount], len ); | 
|  | acceptTypesCount++; | 
|  | } | 
|  | szAcceptTypes[acceptTypesCount] = NULL; | 
|  | } | 
|  | else szAcceptTypes = 0; | 
|  |  | 
|  | rc = HttpOpenRequestW(hHttpSession, szVerb, szObjectName, | 
|  | szVersion, szReferrer, | 
|  | (LPCWSTR*)szAcceptTypes, dwFlags, dwContext); | 
|  |  | 
|  | end: | 
|  | if (szAcceptTypes) | 
|  | { | 
|  | acceptTypesCount = 0; | 
|  | while (szAcceptTypes[acceptTypesCount]) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, szAcceptTypes[acceptTypesCount]); | 
|  | acceptTypesCount++; | 
|  | } | 
|  | HeapFree(GetProcessHeap(), 0, szAcceptTypes); | 
|  | } | 
|  | HeapFree(GetProcessHeap(), 0, szReferrer); | 
|  | HeapFree(GetProcessHeap(), 0, szVersion); | 
|  | HeapFree(GetProcessHeap(), 0, szObjectName); | 
|  | HeapFree(GetProcessHeap(), 0, szVerb); | 
|  |  | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *  HTTP_EncodeBase64 | 
|  | */ | 
|  | static UINT HTTP_EncodeBase64( LPCSTR bin, unsigned int len, LPWSTR base64 ) | 
|  | { | 
|  | UINT n = 0, x; | 
|  | static const CHAR HTTP_Base64Enc[] = | 
|  | "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; | 
|  |  | 
|  | while( len > 0 ) | 
|  | { | 
|  | /* first 6 bits, all from bin[0] */ | 
|  | base64[n++] = HTTP_Base64Enc[(bin[0] & 0xfc) >> 2]; | 
|  | x = (bin[0] & 3) << 4; | 
|  |  | 
|  | /* next 6 bits, 2 from bin[0] and 4 from bin[1] */ | 
|  | if( len == 1 ) | 
|  | { | 
|  | base64[n++] = HTTP_Base64Enc[x]; | 
|  | base64[n++] = '='; | 
|  | base64[n++] = '='; | 
|  | break; | 
|  | } | 
|  | base64[n++] = HTTP_Base64Enc[ x | ( (bin[1]&0xf0) >> 4 ) ]; | 
|  | x = ( bin[1] & 0x0f ) << 2; | 
|  |  | 
|  | /* next 6 bits 4 from bin[1] and 2 from bin[2] */ | 
|  | if( len == 2 ) | 
|  | { | 
|  | base64[n++] = HTTP_Base64Enc[x]; | 
|  | base64[n++] = '='; | 
|  | break; | 
|  | } | 
|  | base64[n++] = HTTP_Base64Enc[ x | ( (bin[2]&0xc0 ) >> 6 ) ]; | 
|  |  | 
|  | /* last 6 bits, all from bin [2] */ | 
|  | base64[n++] = HTTP_Base64Enc[ bin[2] & 0x3f ]; | 
|  | bin += 3; | 
|  | len -= 3; | 
|  | } | 
|  | base64[n] = 0; | 
|  | return n; | 
|  | } | 
|  |  | 
|  | #define CH(x) (((x) >= 'A' && (x) <= 'Z') ? (x) - 'A' : \ | 
|  | ((x) >= 'a' && (x) <= 'z') ? (x) - 'a' + 26 : \ | 
|  | ((x) >= '0' && (x) <= '9') ? (x) - '0' + 52 : \ | 
|  | ((x) == '+') ? 62 : ((x) == '/') ? 63 : -1) | 
|  | static const signed char HTTP_Base64Dec[256] = | 
|  | { | 
|  | CH( 0),CH( 1),CH( 2),CH( 3),CH( 4),CH( 5),CH( 6),CH( 7),CH( 8),CH( 9), | 
|  | CH(10),CH(11),CH(12),CH(13),CH(14),CH(15),CH(16),CH(17),CH(18),CH(19), | 
|  | CH(20),CH(21),CH(22),CH(23),CH(24),CH(25),CH(26),CH(27),CH(28),CH(29), | 
|  | CH(30),CH(31),CH(32),CH(33),CH(34),CH(35),CH(36),CH(37),CH(38),CH(39), | 
|  | CH(40),CH(41),CH(42),CH(43),CH(44),CH(45),CH(46),CH(47),CH(48),CH(49), | 
|  | CH(50),CH(51),CH(52),CH(53),CH(54),CH(55),CH(56),CH(57),CH(58),CH(59), | 
|  | CH(60),CH(61),CH(62),CH(63),CH(64),CH(65),CH(66),CH(67),CH(68),CH(69), | 
|  | CH(70),CH(71),CH(72),CH(73),CH(74),CH(75),CH(76),CH(77),CH(78),CH(79), | 
|  | CH(80),CH(81),CH(82),CH(83),CH(84),CH(85),CH(86),CH(87),CH(88),CH(89), | 
|  | CH(90),CH(91),CH(92),CH(93),CH(94),CH(95),CH(96),CH(97),CH(98),CH(99), | 
|  | CH(100),CH(101),CH(102),CH(103),CH(104),CH(105),CH(106),CH(107),CH(108),CH(109), | 
|  | CH(110),CH(111),CH(112),CH(113),CH(114),CH(115),CH(116),CH(117),CH(118),CH(119), | 
|  | CH(120),CH(121),CH(122),CH(123),CH(124),CH(125),CH(126),CH(127),CH(128),CH(129), | 
|  | CH(130),CH(131),CH(132),CH(133),CH(134),CH(135),CH(136),CH(137),CH(138),CH(139), | 
|  | CH(140),CH(141),CH(142),CH(143),CH(144),CH(145),CH(146),CH(147),CH(148),CH(149), | 
|  | CH(150),CH(151),CH(152),CH(153),CH(154),CH(155),CH(156),CH(157),CH(158),CH(159), | 
|  | CH(160),CH(161),CH(162),CH(163),CH(164),CH(165),CH(166),CH(167),CH(168),CH(169), | 
|  | CH(170),CH(171),CH(172),CH(173),CH(174),CH(175),CH(176),CH(177),CH(178),CH(179), | 
|  | CH(180),CH(181),CH(182),CH(183),CH(184),CH(185),CH(186),CH(187),CH(188),CH(189), | 
|  | CH(190),CH(191),CH(192),CH(193),CH(194),CH(195),CH(196),CH(197),CH(198),CH(199), | 
|  | CH(200),CH(201),CH(202),CH(203),CH(204),CH(205),CH(206),CH(207),CH(208),CH(209), | 
|  | CH(210),CH(211),CH(212),CH(213),CH(214),CH(215),CH(216),CH(217),CH(218),CH(219), | 
|  | CH(220),CH(221),CH(222),CH(223),CH(224),CH(225),CH(226),CH(227),CH(228),CH(229), | 
|  | CH(230),CH(231),CH(232),CH(233),CH(234),CH(235),CH(236),CH(237),CH(238),CH(239), | 
|  | CH(240),CH(241),CH(242),CH(243),CH(244),CH(245),CH(246),CH(247),CH(248), CH(249), | 
|  | CH(250),CH(251),CH(252),CH(253),CH(254),CH(255), | 
|  | }; | 
|  | #undef CH | 
|  |  | 
|  | /*********************************************************************** | 
|  | *  HTTP_DecodeBase64 | 
|  | */ | 
|  | static UINT HTTP_DecodeBase64( LPCWSTR base64, LPSTR bin ) | 
|  | { | 
|  | unsigned int n = 0; | 
|  |  | 
|  | while(*base64) | 
|  | { | 
|  | signed char in[4]; | 
|  |  | 
|  | if (base64[0] >= ARRAYSIZE(HTTP_Base64Dec) || | 
|  | ((in[0] = HTTP_Base64Dec[base64[0]]) == -1) || | 
|  | base64[1] >= ARRAYSIZE(HTTP_Base64Dec) || | 
|  | ((in[1] = HTTP_Base64Dec[base64[1]]) == -1)) | 
|  | { | 
|  | WARN("invalid base64: %s\n", debugstr_w(base64)); | 
|  | return 0; | 
|  | } | 
|  | if (bin) | 
|  | bin[n] = (unsigned char) (in[0] << 2 | in[1] >> 4); | 
|  | n++; | 
|  |  | 
|  | if ((base64[2] == '=') && (base64[3] == '=')) | 
|  | break; | 
|  | if (base64[2] > ARRAYSIZE(HTTP_Base64Dec) || | 
|  | ((in[2] = HTTP_Base64Dec[base64[2]]) == -1)) | 
|  | { | 
|  | WARN("invalid base64: %s\n", debugstr_w(&base64[2])); | 
|  | return 0; | 
|  | } | 
|  | if (bin) | 
|  | bin[n] = (unsigned char) (in[1] << 4 | in[2] >> 2); | 
|  | n++; | 
|  |  | 
|  | if (base64[3] == '=') | 
|  | break; | 
|  | if (base64[3] > ARRAYSIZE(HTTP_Base64Dec) || | 
|  | ((in[3] = HTTP_Base64Dec[base64[3]]) == -1)) | 
|  | { | 
|  | WARN("invalid base64: %s\n", debugstr_w(&base64[3])); | 
|  | return 0; | 
|  | } | 
|  | if (bin) | 
|  | bin[n] = (unsigned char) (((in[2] << 6) & 0xc0) | in[3]); | 
|  | n++; | 
|  |  | 
|  | base64 += 4; | 
|  | } | 
|  |  | 
|  | return n; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *  HTTP_InsertAuthorizationForHeader | 
|  | * | 
|  | *   Insert or delete the authorization field in the request header. | 
|  | */ | 
|  | static BOOL HTTP_InsertAuthorization( LPWININETHTTPREQW lpwhr, LPCWSTR header, BOOL first ) | 
|  | { | 
|  | WCHAR *authorization = NULL; | 
|  | struct HttpAuthInfo *pAuthInfo = lpwhr->pAuthInfo; | 
|  | DWORD flags; | 
|  |  | 
|  | if (pAuthInfo && pAuthInfo->auth_data_len) | 
|  | { | 
|  | static const WCHAR wszSpace[] = {' ',0}; | 
|  | static const WCHAR wszBasic[] = {'B','a','s','i','c',0}; | 
|  | unsigned int len; | 
|  |  | 
|  | /* scheme + space + base64 encoded data (3/2/1 bytes data -> 4 bytes of characters) */ | 
|  | len = strlenW(pAuthInfo->scheme)+1+((pAuthInfo->auth_data_len+2)*4)/3; | 
|  | authorization = HeapAlloc(GetProcessHeap(), 0, (len+1)*sizeof(WCHAR)); | 
|  | if (!authorization) | 
|  | return FALSE; | 
|  |  | 
|  | strcpyW(authorization, pAuthInfo->scheme); | 
|  | strcatW(authorization, wszSpace); | 
|  | HTTP_EncodeBase64(pAuthInfo->auth_data, | 
|  | pAuthInfo->auth_data_len, | 
|  | authorization+strlenW(authorization)); | 
|  |  | 
|  | /* clear the data as it isn't valid now that it has been sent to the | 
|  | * server, unless it's Basic authentication which doesn't do | 
|  | * connection tracking */ | 
|  | if (strcmpiW(pAuthInfo->scheme, wszBasic)) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, pAuthInfo->auth_data); | 
|  | pAuthInfo->auth_data = NULL; | 
|  | pAuthInfo->auth_data_len = 0; | 
|  | } | 
|  | } | 
|  |  | 
|  | TRACE("Inserting authorization: %s\n", debugstr_w(authorization)); | 
|  |  | 
|  | /* make sure not to overwrite any caller supplied authorization header */ | 
|  | flags = HTTP_ADDHDR_FLAG_REQ; | 
|  | flags |= first ? HTTP_ADDHDR_FLAG_ADD_IF_NEW : HTTP_ADDHDR_FLAG_REPLACE; | 
|  |  | 
|  | HTTP_ProcessHeader(lpwhr, header, authorization, flags); | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, authorization); | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_DealWithProxy | 
|  | */ | 
|  | static BOOL HTTP_DealWithProxy( LPWININETAPPINFOW hIC, | 
|  | LPWININETHTTPSESSIONW lpwhs, LPWININETHTTPREQW lpwhr) | 
|  | { | 
|  | WCHAR buf[MAXHOSTNAME]; | 
|  | WCHAR proxy[MAXHOSTNAME + 15]; /* 15 == "http://" + sizeof(port#) + ":/\0" */ | 
|  | WCHAR* url; | 
|  | static WCHAR szNul[] = { 0 }; | 
|  | URL_COMPONENTSW UrlComponents; | 
|  | static const WCHAR szHttp[] = { 'h','t','t','p',':','/','/',0 }, szSlash[] = { '/',0 } ; | 
|  | static const WCHAR szFormat1[] = { 'h','t','t','p',':','/','/','%','s',0 }; | 
|  | static const WCHAR szFormat2[] = { 'h','t','t','p',':','/','/','%','s',':','%','d',0 }; | 
|  | int len; | 
|  |  | 
|  | memset( &UrlComponents, 0, sizeof UrlComponents ); | 
|  | UrlComponents.dwStructSize = sizeof UrlComponents; | 
|  | UrlComponents.lpszHostName = buf; | 
|  | UrlComponents.dwHostNameLength = MAXHOSTNAME; | 
|  |  | 
|  | if( CSTR_EQUAL != CompareStringW(LOCALE_SYSTEM_DEFAULT, NORM_IGNORECASE, | 
|  | hIC->lpszProxy,strlenW(szHttp),szHttp,strlenW(szHttp)) ) | 
|  | sprintfW(proxy, szFormat1, hIC->lpszProxy); | 
|  | else | 
|  | strcpyW(proxy, hIC->lpszProxy); | 
|  | if( !InternetCrackUrlW(proxy, 0, 0, &UrlComponents) ) | 
|  | return FALSE; | 
|  | if( UrlComponents.dwHostNameLength == 0 ) | 
|  | return FALSE; | 
|  |  | 
|  | if( !lpwhr->lpszPath ) | 
|  | lpwhr->lpszPath = szNul; | 
|  | TRACE("server=%s path=%s\n", | 
|  | debugstr_w(lpwhs->lpszHostName), debugstr_w(lpwhr->lpszPath)); | 
|  | /* for constant 15 see above */ | 
|  | len = strlenW(lpwhs->lpszHostName) + strlenW(lpwhr->lpszPath) + 15; | 
|  | url = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR)); | 
|  |  | 
|  | if(UrlComponents.nPort == INTERNET_INVALID_PORT_NUMBER) | 
|  | UrlComponents.nPort = INTERNET_DEFAULT_HTTP_PORT; | 
|  |  | 
|  | sprintfW(url, szFormat2, lpwhs->lpszHostName, lpwhs->nHostPort); | 
|  |  | 
|  | if( lpwhr->lpszPath[0] != '/' ) | 
|  | strcatW( url, szSlash ); | 
|  | strcatW(url, lpwhr->lpszPath); | 
|  | if(lpwhr->lpszPath != szNul) | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->lpszPath); | 
|  | lpwhr->lpszPath = url; | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, lpwhs->lpszServerName); | 
|  | lpwhs->lpszServerName = WININET_strdupW(UrlComponents.lpszHostName); | 
|  | lpwhs->nServerPort = UrlComponents.nPort; | 
|  |  | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | static BOOL HTTP_ResolveName(LPWININETHTTPREQW lpwhr) | 
|  | { | 
|  | char szaddr[32]; | 
|  | LPWININETHTTPSESSIONW lpwhs = lpwhr->lpHttpSession; | 
|  |  | 
|  | INTERNET_SendCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_RESOLVING_NAME, | 
|  | lpwhs->lpszServerName, | 
|  | strlenW(lpwhs->lpszServerName)+1); | 
|  |  | 
|  | if (!GetAddress(lpwhs->lpszServerName, lpwhs->nServerPort, | 
|  | &lpwhs->socketAddress)) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_INTERNET_NAME_NOT_RESOLVED); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | inet_ntop(lpwhs->socketAddress.sin_family, &lpwhs->socketAddress.sin_addr, | 
|  | szaddr, sizeof(szaddr)); | 
|  | INTERNET_SendCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_NAME_RESOLVED, | 
|  | szaddr, strlen(szaddr)+1); | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_HttpOpenRequestW (internal) | 
|  | * | 
|  | * Open a HTTP request handle | 
|  | * | 
|  | * RETURNS | 
|  | *    HINTERNET  a HTTP request handle on success | 
|  | *    NULL 	 on failure | 
|  | * | 
|  | */ | 
|  | HINTERNET WINAPI HTTP_HttpOpenRequestW(LPWININETHTTPSESSIONW lpwhs, | 
|  | LPCWSTR lpszVerb, LPCWSTR lpszObjectName, LPCWSTR lpszVersion, | 
|  | LPCWSTR lpszReferrer , LPCWSTR *lpszAcceptTypes, | 
|  | DWORD dwFlags, DWORD_PTR dwContext) | 
|  | { | 
|  | LPWININETAPPINFOW hIC = NULL; | 
|  | LPWININETHTTPREQW lpwhr; | 
|  | LPWSTR lpszCookies; | 
|  | LPWSTR lpszUrl = NULL; | 
|  | DWORD nCookieSize; | 
|  | HINTERNET handle = NULL; | 
|  | static const WCHAR szUrlForm[] = {'h','t','t','p',':','/','/','%','s',0}; | 
|  | DWORD len; | 
|  | LPHTTPHEADERW Host; | 
|  |  | 
|  | TRACE("-->\n"); | 
|  |  | 
|  | assert( lpwhs->hdr.htype == WH_HHTTPSESSION ); | 
|  | hIC = lpwhs->lpAppInfo; | 
|  |  | 
|  | lpwhr = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(WININETHTTPREQW)); | 
|  | if (NULL == lpwhr) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_OUTOFMEMORY); | 
|  | goto lend; | 
|  | } | 
|  | lpwhr->hdr.htype = WH_HHTTPREQ; | 
|  | lpwhr->hdr.dwFlags = dwFlags; | 
|  | lpwhr->hdr.dwContext = dwContext; | 
|  | lpwhr->hdr.dwRefCount = 1; | 
|  | lpwhr->hdr.close_connection = HTTP_CloseConnection; | 
|  | lpwhr->hdr.destroy = HTTP_CloseHTTPRequestHandle; | 
|  | lpwhr->hdr.lpfnStatusCB = lpwhs->hdr.lpfnStatusCB; | 
|  | lpwhr->hdr.dwInternalFlags = lpwhs->hdr.dwInternalFlags & INET_CALLBACKW; | 
|  |  | 
|  | WININET_AddRef( &lpwhs->hdr ); | 
|  | lpwhr->lpHttpSession = lpwhs; | 
|  | list_add_head( &lpwhs->hdr.children, &lpwhr->hdr.entry ); | 
|  |  | 
|  | handle = WININET_AllocHandle( &lpwhr->hdr ); | 
|  | if (NULL == handle) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_OUTOFMEMORY); | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | if (!NETCON_init(&lpwhr->netConnection, dwFlags & INTERNET_FLAG_SECURE)) | 
|  | { | 
|  | InternetCloseHandle( handle ); | 
|  | handle = NULL; | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | if (lpszObjectName && *lpszObjectName) { | 
|  | HRESULT rc; | 
|  |  | 
|  | len = 0; | 
|  | rc = UrlEscapeW(lpszObjectName, NULL, &len, URL_ESCAPE_SPACES_ONLY); | 
|  | if (rc != E_POINTER) | 
|  | len = strlenW(lpszObjectName)+1; | 
|  | lpwhr->lpszPath = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR)); | 
|  | rc = UrlEscapeW(lpszObjectName, lpwhr->lpszPath, &len, | 
|  | URL_ESCAPE_SPACES_ONLY); | 
|  | if (rc) | 
|  | { | 
|  | ERR("Unable to escape string!(%s) (%d)\n",debugstr_w(lpszObjectName),rc); | 
|  | strcpyW(lpwhr->lpszPath,lpszObjectName); | 
|  | } | 
|  | } | 
|  |  | 
|  | if (lpszReferrer && *lpszReferrer) | 
|  | HTTP_ProcessHeader(lpwhr, HTTP_REFERER, lpszReferrer, HTTP_ADDREQ_FLAG_ADD | HTTP_ADDHDR_FLAG_REQ); | 
|  |  | 
|  | if (lpszAcceptTypes) | 
|  | { | 
|  | int i; | 
|  | for (i = 0; lpszAcceptTypes[i]; i++) | 
|  | { | 
|  | if (!*lpszAcceptTypes[i]) continue; | 
|  | HTTP_ProcessHeader(lpwhr, HTTP_ACCEPT, lpszAcceptTypes[i], | 
|  | HTTP_ADDHDR_FLAG_COALESCE_WITH_COMMA | | 
|  | HTTP_ADDHDR_FLAG_REQ | | 
|  | (i == 0 ? HTTP_ADDHDR_FLAG_REPLACE : 0)); | 
|  | } | 
|  | } | 
|  |  | 
|  | lpwhr->lpszVerb = WININET_strdupW(lpszVerb && *lpszVerb ? lpszVerb : szGET); | 
|  |  | 
|  | if (lpszVersion) | 
|  | lpwhr->lpszVersion = WININET_strdupW(lpszVersion); | 
|  | else | 
|  | lpwhr->lpszVersion = WININET_strdupW(g_szHttp1_1); | 
|  |  | 
|  | HTTP_ProcessHeader(lpwhr, szHost, lpwhs->lpszHostName, HTTP_ADDREQ_FLAG_ADD | HTTP_ADDHDR_FLAG_REQ); | 
|  |  | 
|  | if (lpwhs->nServerPort == INTERNET_INVALID_PORT_NUMBER) | 
|  | lpwhs->nServerPort = (dwFlags & INTERNET_FLAG_SECURE ? | 
|  | INTERNET_DEFAULT_HTTPS_PORT : | 
|  | INTERNET_DEFAULT_HTTP_PORT); | 
|  | lpwhs->nHostPort = lpwhs->nServerPort; | 
|  |  | 
|  | if (NULL != hIC->lpszProxy && hIC->lpszProxy[0] != 0) | 
|  | HTTP_DealWithProxy( hIC, lpwhs, lpwhr ); | 
|  |  | 
|  | if (hIC->lpszAgent) | 
|  | { | 
|  | WCHAR *agent_header; | 
|  | static const WCHAR user_agent[] = {'U','s','e','r','-','A','g','e','n','t',':',' ','%','s','\r','\n',0 }; | 
|  |  | 
|  | len = strlenW(hIC->lpszAgent) + strlenW(user_agent); | 
|  | agent_header = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) ); | 
|  | sprintfW(agent_header, user_agent, hIC->lpszAgent ); | 
|  |  | 
|  | HTTP_HttpAddRequestHeadersW(lpwhr, agent_header, strlenW(agent_header), | 
|  | HTTP_ADDREQ_FLAG_ADD); | 
|  | HeapFree(GetProcessHeap(), 0, agent_header); | 
|  | } | 
|  |  | 
|  | Host = HTTP_GetHeader(lpwhr,szHost); | 
|  |  | 
|  | len = lstrlenW(Host->lpszValue) + strlenW(szUrlForm); | 
|  | lpszUrl = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR)); | 
|  | sprintfW( lpszUrl, szUrlForm, Host->lpszValue ); | 
|  |  | 
|  | if (!(lpwhr->hdr.dwFlags & INTERNET_FLAG_NO_COOKIES) && | 
|  | InternetGetCookieW(lpszUrl, NULL, NULL, &nCookieSize)) | 
|  | { | 
|  | int cnt = 0; | 
|  | static const WCHAR szCookie[] = {'C','o','o','k','i','e',':',' ',0}; | 
|  | static const WCHAR szcrlf[] = {'\r','\n',0}; | 
|  |  | 
|  | lpszCookies = HeapAlloc(GetProcessHeap(), 0, (nCookieSize + 1 + 8)*sizeof(WCHAR)); | 
|  |  | 
|  | cnt += sprintfW(lpszCookies, szCookie); | 
|  | InternetGetCookieW(lpszUrl, NULL, lpszCookies + cnt, &nCookieSize); | 
|  | strcatW(lpszCookies, szcrlf); | 
|  |  | 
|  | HTTP_HttpAddRequestHeadersW(lpwhr, lpszCookies, strlenW(lpszCookies), | 
|  | HTTP_ADDREQ_FLAG_ADD); | 
|  | HeapFree(GetProcessHeap(), 0, lpszCookies); | 
|  | } | 
|  | HeapFree(GetProcessHeap(), 0, lpszUrl); | 
|  |  | 
|  |  | 
|  | INTERNET_SendCallback(&lpwhs->hdr, dwContext, | 
|  | INTERNET_STATUS_HANDLE_CREATED, &handle, | 
|  | sizeof(handle)); | 
|  |  | 
|  | /* | 
|  | * A STATUS_REQUEST_COMPLETE is NOT sent here as per my tests on windows | 
|  | */ | 
|  |  | 
|  | if (!HTTP_ResolveName(lpwhr)) | 
|  | { | 
|  | InternetCloseHandle( handle ); | 
|  | handle = NULL; | 
|  | } | 
|  |  | 
|  | lend: | 
|  | if( lpwhr ) | 
|  | WININET_Release( &lpwhr->hdr ); | 
|  |  | 
|  | TRACE("<-- %p (%p)\n", handle, lpwhr); | 
|  | return handle; | 
|  | } | 
|  |  | 
|  | static const WCHAR szAccept[] = { 'A','c','c','e','p','t',0 }; | 
|  | static const WCHAR szAccept_Charset[] = { 'A','c','c','e','p','t','-','C','h','a','r','s','e','t', 0 }; | 
|  | static const WCHAR szAccept_Encoding[] = { 'A','c','c','e','p','t','-','E','n','c','o','d','i','n','g',0 }; | 
|  | static const WCHAR szAccept_Language[] = { 'A','c','c','e','p','t','-','L','a','n','g','u','a','g','e',0 }; | 
|  | static const WCHAR szAccept_Ranges[] = { 'A','c','c','e','p','t','-','R','a','n','g','e','s',0 }; | 
|  | static const WCHAR szAge[] = { 'A','g','e',0 }; | 
|  | static const WCHAR szAllow[] = { 'A','l','l','o','w',0 }; | 
|  | static const WCHAR szCache_Control[] = { 'C','a','c','h','e','-','C','o','n','t','r','o','l',0 }; | 
|  | static const WCHAR szConnection[] = { 'C','o','n','n','e','c','t','i','o','n',0 }; | 
|  | static const WCHAR szContent_Base[] = { 'C','o','n','t','e','n','t','-','B','a','s','e',0 }; | 
|  | static const WCHAR szContent_Encoding[] = { 'C','o','n','t','e','n','t','-','E','n','c','o','d','i','n','g',0 }; | 
|  | static const WCHAR szContent_ID[] = { 'C','o','n','t','e','n','t','-','I','D',0 }; | 
|  | static const WCHAR szContent_Language[] = { 'C','o','n','t','e','n','t','-','L','a','n','g','u','a','g','e',0 }; | 
|  | static const WCHAR szContent_Length[] = { 'C','o','n','t','e','n','t','-','L','e','n','g','t','h',0 }; | 
|  | static const WCHAR szContent_Location[] = { 'C','o','n','t','e','n','t','-','L','o','c','a','t','i','o','n',0 }; | 
|  | static const WCHAR szContent_MD5[] = { 'C','o','n','t','e','n','t','-','M','D','5',0 }; | 
|  | static const WCHAR szContent_Range[] = { 'C','o','n','t','e','n','t','-','R','a','n','g','e',0 }; | 
|  | static const WCHAR szContent_Transfer_Encoding[] = { 'C','o','n','t','e','n','t','-','T','r','a','n','s','f','e','r','-','E','n','c','o','d','i','n','g',0 }; | 
|  | static const WCHAR szContent_Type[] = { 'C','o','n','t','e','n','t','-','T','y','p','e',0 }; | 
|  | static const WCHAR szCookie[] = { 'C','o','o','k','i','e',0 }; | 
|  | static const WCHAR szDate[] = { 'D','a','t','e',0 }; | 
|  | static const WCHAR szFrom[] = { 'F','r','o','m',0 }; | 
|  | static const WCHAR szETag[] = { 'E','T','a','g',0 }; | 
|  | static const WCHAR szExpect[] = { 'E','x','p','e','c','t',0 }; | 
|  | static const WCHAR szExpires[] = { 'E','x','p','i','r','e','s',0 }; | 
|  | static const WCHAR szIf_Match[] = { 'I','f','-','M','a','t','c','h',0 }; | 
|  | static const WCHAR szIf_Modified_Since[] = { 'I','f','-','M','o','d','i','f','i','e','d','-','S','i','n','c','e',0 }; | 
|  | static const WCHAR szIf_None_Match[] = { 'I','f','-','N','o','n','e','-','M','a','t','c','h',0 }; | 
|  | static const WCHAR szIf_Range[] = { 'I','f','-','R','a','n','g','e',0 }; | 
|  | static const WCHAR szIf_Unmodified_Since[] = { 'I','f','-','U','n','m','o','d','i','f','i','e','d','-','S','i','n','c','e',0 }; | 
|  | static const WCHAR szLast_Modified[] = { 'L','a','s','t','-','M','o','d','i','f','i','e','d',0 }; | 
|  | static const WCHAR szLocation[] = { 'L','o','c','a','t','i','o','n',0 }; | 
|  | static const WCHAR szMax_Forwards[] = { 'M','a','x','-','F','o','r','w','a','r','d','s',0 }; | 
|  | static const WCHAR szMime_Version[] = { 'M','i','m','e','-','V','e','r','s','i','o','n',0 }; | 
|  | static const WCHAR szPragma[] = { 'P','r','a','g','m','a',0 }; | 
|  | static const WCHAR szProxy_Authenticate[] = { 'P','r','o','x','y','-','A','u','t','h','e','n','t','i','c','a','t','e',0 }; | 
|  | static const WCHAR szProxy_Connection[] = { 'P','r','o','x','y','-','C','o','n','n','e','c','t','i','o','n',0 }; | 
|  | static const WCHAR szPublic[] = { 'P','u','b','l','i','c',0 }; | 
|  | static const WCHAR szRange[] = { 'R','a','n','g','e',0 }; | 
|  | static const WCHAR szReferer[] = { 'R','e','f','e','r','e','r',0 }; | 
|  | static const WCHAR szRetry_After[] = { 'R','e','t','r','y','-','A','f','t','e','r',0 }; | 
|  | static const WCHAR szServer[] = { 'S','e','r','v','e','r',0 }; | 
|  | static const WCHAR szSet_Cookie[] = { 'S','e','t','-','C','o','o','k','i','e',0 }; | 
|  | static const WCHAR szTransfer_Encoding[] = { 'T','r','a','n','s','f','e','r','-','E','n','c','o','d','i','n','g',0 }; | 
|  | static const WCHAR szUnless_Modified_Since[] = { 'U','n','l','e','s','s','-','M','o','d','i','f','i','e','d','-','S','i','n','c','e',0 }; | 
|  | static const WCHAR szUpgrade[] = { 'U','p','g','r','a','d','e',0 }; | 
|  | static const WCHAR szURI[] = { 'U','R','I',0 }; | 
|  | static const WCHAR szUser_Agent[] = { 'U','s','e','r','-','A','g','e','n','t',0 }; | 
|  | static const WCHAR szVary[] = { 'V','a','r','y',0 }; | 
|  | static const WCHAR szVia[] = { 'V','i','a',0 }; | 
|  | static const WCHAR szWarning[] = { 'W','a','r','n','i','n','g',0 }; | 
|  | static const WCHAR szWWW_Authenticate[] = { 'W','W','W','-','A','u','t','h','e','n','t','i','c','a','t','e',0 }; | 
|  |  | 
|  | static const LPCWSTR header_lookup[] = { | 
|  | szMime_Version,		/* HTTP_QUERY_MIME_VERSION = 0 */ | 
|  | szContent_Type,		/* HTTP_QUERY_CONTENT_TYPE = 1 */ | 
|  | szContent_Transfer_Encoding,/* HTTP_QUERY_CONTENT_TRANSFER_ENCODING = 2 */ | 
|  | szContent_ID,		/* HTTP_QUERY_CONTENT_ID = 3 */ | 
|  | NULL,			/* HTTP_QUERY_CONTENT_DESCRIPTION = 4 */ | 
|  | szContent_Length,		/* HTTP_QUERY_CONTENT_LENGTH =  5 */ | 
|  | szContent_Language,		/* HTTP_QUERY_CONTENT_LANGUAGE =  6 */ | 
|  | szAllow,			/* HTTP_QUERY_ALLOW = 7 */ | 
|  | szPublic,			/* HTTP_QUERY_PUBLIC = 8 */ | 
|  | szDate,			/* HTTP_QUERY_DATE = 9 */ | 
|  | szExpires,			/* HTTP_QUERY_EXPIRES = 10 */ | 
|  | szLast_Modified,		/* HTTP_QUERY_LAST_MODIFIED = 11 */ | 
|  | NULL,			/* HTTP_QUERY_MESSAGE_ID = 12 */ | 
|  | szURI,			/* HTTP_QUERY_URI = 13 */ | 
|  | szFrom,			/* HTTP_QUERY_DERIVED_FROM = 14 */ | 
|  | NULL,			/* HTTP_QUERY_COST = 15 */ | 
|  | NULL,			/* HTTP_QUERY_LINK = 16 */ | 
|  | szPragma,			/* HTTP_QUERY_PRAGMA = 17 */ | 
|  | NULL,			/* HTTP_QUERY_VERSION = 18 */ | 
|  | szStatus,			/* HTTP_QUERY_STATUS_CODE = 19 */ | 
|  | NULL,			/* HTTP_QUERY_STATUS_TEXT = 20 */ | 
|  | NULL,			/* HTTP_QUERY_RAW_HEADERS = 21 */ | 
|  | NULL,			/* HTTP_QUERY_RAW_HEADERS_CRLF = 22 */ | 
|  | szConnection,		/* HTTP_QUERY_CONNECTION = 23 */ | 
|  | szAccept,			/* HTTP_QUERY_ACCEPT = 24 */ | 
|  | szAccept_Charset,		/* HTTP_QUERY_ACCEPT_CHARSET = 25 */ | 
|  | szAccept_Encoding,		/* HTTP_QUERY_ACCEPT_ENCODING = 26 */ | 
|  | szAccept_Language,		/* HTTP_QUERY_ACCEPT_LANGUAGE = 27 */ | 
|  | szAuthorization,		/* HTTP_QUERY_AUTHORIZATION = 28 */ | 
|  | szContent_Encoding,		/* HTTP_QUERY_CONTENT_ENCODING = 29 */ | 
|  | NULL,			/* HTTP_QUERY_FORWARDED = 30 */ | 
|  | NULL,			/* HTTP_QUERY_FROM = 31 */ | 
|  | szIf_Modified_Since,	/* HTTP_QUERY_IF_MODIFIED_SINCE = 32 */ | 
|  | szLocation,			/* HTTP_QUERY_LOCATION = 33 */ | 
|  | NULL,			/* HTTP_QUERY_ORIG_URI = 34 */ | 
|  | szReferer,			/* HTTP_QUERY_REFERER = 35 */ | 
|  | szRetry_After,		/* HTTP_QUERY_RETRY_AFTER = 36 */ | 
|  | szServer,			/* HTTP_QUERY_SERVER = 37 */ | 
|  | NULL,			/* HTTP_TITLE = 38 */ | 
|  | szUser_Agent,		/* HTTP_QUERY_USER_AGENT = 39 */ | 
|  | szWWW_Authenticate,		/* HTTP_QUERY_WWW_AUTHENTICATE = 40 */ | 
|  | szProxy_Authenticate,	/* HTTP_QUERY_PROXY_AUTHENTICATE = 41 */ | 
|  | szAccept_Ranges,		/* HTTP_QUERY_ACCEPT_RANGES = 42 */ | 
|  | szSet_Cookie,		/* HTTP_QUERY_SET_COOKIE = 43 */ | 
|  | szCookie,			/* HTTP_QUERY_COOKIE = 44 */ | 
|  | NULL,			/* HTTP_QUERY_REQUEST_METHOD = 45 */ | 
|  | NULL,			/* HTTP_QUERY_REFRESH = 46 */ | 
|  | NULL,			/* HTTP_QUERY_CONTENT_DISPOSITION = 47 */ | 
|  | szAge,			/* HTTP_QUERY_AGE = 48 */ | 
|  | szCache_Control,		/* HTTP_QUERY_CACHE_CONTROL = 49 */ | 
|  | szContent_Base,		/* HTTP_QUERY_CONTENT_BASE = 50 */ | 
|  | szContent_Location,		/* HTTP_QUERY_CONTENT_LOCATION = 51 */ | 
|  | szContent_MD5,		/* HTTP_QUERY_CONTENT_MD5 = 52 */ | 
|  | szContent_Range,		/* HTTP_QUERY_CONTENT_RANGE = 53 */ | 
|  | szETag,			/* HTTP_QUERY_ETAG = 54 */ | 
|  | szHost,			/* HTTP_QUERY_HOST = 55 */ | 
|  | szIf_Match,			/* HTTP_QUERY_IF_MATCH = 56 */ | 
|  | szIf_None_Match,		/* HTTP_QUERY_IF_NONE_MATCH = 57 */ | 
|  | szIf_Range,			/* HTTP_QUERY_IF_RANGE = 58 */ | 
|  | szIf_Unmodified_Since,	/* HTTP_QUERY_IF_UNMODIFIED_SINCE = 59 */ | 
|  | szMax_Forwards,		/* HTTP_QUERY_MAX_FORWARDS = 60 */ | 
|  | szProxy_Authorization,	/* HTTP_QUERY_PROXY_AUTHORIZATION = 61 */ | 
|  | szRange,			/* HTTP_QUERY_RANGE = 62 */ | 
|  | szTransfer_Encoding,	/* HTTP_QUERY_TRANSFER_ENCODING = 63 */ | 
|  | szUpgrade,			/* HTTP_QUERY_UPGRADE = 64 */ | 
|  | szVary,			/* HTTP_QUERY_VARY = 65 */ | 
|  | szVia,			/* HTTP_QUERY_VIA = 66 */ | 
|  | szWarning,			/* HTTP_QUERY_WARNING = 67 */ | 
|  | szExpect,			/* HTTP_QUERY_EXPECT = 68 */ | 
|  | szProxy_Connection,		/* HTTP_QUERY_PROXY_CONNECTION = 69 */ | 
|  | szUnless_Modified_Since,	/* HTTP_QUERY_UNLESS_MODIFIED_SINCE = 70 */ | 
|  | }; | 
|  |  | 
|  | #define LAST_TABLE_HEADER (sizeof(header_lookup)/sizeof(header_lookup[0])) | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_HttpQueryInfoW (internal) | 
|  | */ | 
|  | static BOOL WINAPI HTTP_HttpQueryInfoW( LPWININETHTTPREQW lpwhr, DWORD dwInfoLevel, | 
|  | LPVOID lpBuffer, LPDWORD lpdwBufferLength, LPDWORD lpdwIndex) | 
|  | { | 
|  | LPHTTPHEADERW lphttpHdr = NULL; | 
|  | BOOL bSuccess = FALSE; | 
|  | BOOL request_only = dwInfoLevel & HTTP_QUERY_FLAG_REQUEST_HEADERS; | 
|  | INT requested_index = lpdwIndex ? *lpdwIndex : 0; | 
|  | INT level = (dwInfoLevel & ~HTTP_QUERY_MODIFIER_FLAGS_MASK); | 
|  | INT index = -1; | 
|  |  | 
|  | /* Find requested header structure */ | 
|  | switch (level) | 
|  | { | 
|  | case HTTP_QUERY_CUSTOM: | 
|  | index = HTTP_GetCustomHeaderIndex(lpwhr, lpBuffer, requested_index, request_only); | 
|  | break; | 
|  |  | 
|  | case HTTP_QUERY_RAW_HEADERS_CRLF: | 
|  | { | 
|  | LPWSTR headers; | 
|  | DWORD len; | 
|  | BOOL ret; | 
|  |  | 
|  | if (request_only) | 
|  | headers = HTTP_BuildHeaderRequestString(lpwhr, lpwhr->lpszVerb, lpwhr->lpszPath, lpwhr->lpszVersion); | 
|  | else | 
|  | headers = lpwhr->lpszRawHeaders; | 
|  |  | 
|  | len = strlenW(headers); | 
|  | if (len + 1 > *lpdwBufferLength/sizeof(WCHAR)) | 
|  | { | 
|  | *lpdwBufferLength = (len + 1) * sizeof(WCHAR); | 
|  | INTERNET_SetLastError(ERROR_INSUFFICIENT_BUFFER); | 
|  | ret = FALSE; | 
|  | } else | 
|  | { | 
|  | memcpy(lpBuffer, headers, (len+1)*sizeof(WCHAR)); | 
|  | *lpdwBufferLength = len * sizeof(WCHAR); | 
|  |  | 
|  | TRACE("returning data: %s\n", debugstr_wn((WCHAR*)lpBuffer, len)); | 
|  | ret = TRUE; | 
|  | } | 
|  |  | 
|  | if (request_only) | 
|  | HeapFree(GetProcessHeap(), 0, headers); | 
|  | return ret; | 
|  | } | 
|  | case HTTP_QUERY_RAW_HEADERS: | 
|  | { | 
|  | static const WCHAR szCrLf[] = {'\r','\n',0}; | 
|  | LPWSTR * ppszRawHeaderLines = HTTP_Tokenize(lpwhr->lpszRawHeaders, szCrLf); | 
|  | DWORD i, size = 0; | 
|  | LPWSTR pszString = (WCHAR*)lpBuffer; | 
|  |  | 
|  | for (i = 0; ppszRawHeaderLines[i]; i++) | 
|  | size += strlenW(ppszRawHeaderLines[i]) + 1; | 
|  |  | 
|  | if (size + 1 > *lpdwBufferLength/sizeof(WCHAR)) | 
|  | { | 
|  | HTTP_FreeTokens(ppszRawHeaderLines); | 
|  | *lpdwBufferLength = (size + 1) * sizeof(WCHAR); | 
|  | INTERNET_SetLastError(ERROR_INSUFFICIENT_BUFFER); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | for (i = 0; ppszRawHeaderLines[i]; i++) | 
|  | { | 
|  | DWORD len = strlenW(ppszRawHeaderLines[i]); | 
|  | memcpy(pszString, ppszRawHeaderLines[i], (len+1)*sizeof(WCHAR)); | 
|  | pszString += len+1; | 
|  | } | 
|  | *pszString = '\0'; | 
|  |  | 
|  | TRACE("returning data: %s\n", debugstr_wn((WCHAR*)lpBuffer, size)); | 
|  |  | 
|  | *lpdwBufferLength = size * sizeof(WCHAR); | 
|  | HTTP_FreeTokens(ppszRawHeaderLines); | 
|  |  | 
|  | return TRUE; | 
|  | } | 
|  | case HTTP_QUERY_STATUS_TEXT: | 
|  | if (lpwhr->lpszStatusText) | 
|  | { | 
|  | DWORD len = strlenW(lpwhr->lpszStatusText); | 
|  | if (len + 1 > *lpdwBufferLength/sizeof(WCHAR)) | 
|  | { | 
|  | *lpdwBufferLength = (len + 1) * sizeof(WCHAR); | 
|  | INTERNET_SetLastError(ERROR_INSUFFICIENT_BUFFER); | 
|  | return FALSE; | 
|  | } | 
|  | memcpy(lpBuffer, lpwhr->lpszStatusText, (len+1)*sizeof(WCHAR)); | 
|  | *lpdwBufferLength = len * sizeof(WCHAR); | 
|  |  | 
|  | TRACE("returning data: %s\n", debugstr_wn((WCHAR*)lpBuffer, len)); | 
|  |  | 
|  | return TRUE; | 
|  | } | 
|  | break; | 
|  | case HTTP_QUERY_VERSION: | 
|  | if (lpwhr->lpszVersion) | 
|  | { | 
|  | DWORD len = strlenW(lpwhr->lpszVersion); | 
|  | if (len + 1 > *lpdwBufferLength/sizeof(WCHAR)) | 
|  | { | 
|  | *lpdwBufferLength = (len + 1) * sizeof(WCHAR); | 
|  | INTERNET_SetLastError(ERROR_INSUFFICIENT_BUFFER); | 
|  | return FALSE; | 
|  | } | 
|  | memcpy(lpBuffer, lpwhr->lpszVersion, (len+1)*sizeof(WCHAR)); | 
|  | *lpdwBufferLength = len * sizeof(WCHAR); | 
|  |  | 
|  | TRACE("returning data: %s\n", debugstr_wn((WCHAR*)lpBuffer, len)); | 
|  |  | 
|  | return TRUE; | 
|  | } | 
|  | break; | 
|  | default: | 
|  | assert (LAST_TABLE_HEADER == (HTTP_QUERY_UNLESS_MODIFIED_SINCE + 1)); | 
|  |  | 
|  | if (level >= 0 && level < LAST_TABLE_HEADER && header_lookup[level]) | 
|  | index = HTTP_GetCustomHeaderIndex(lpwhr, header_lookup[level], | 
|  | requested_index,request_only); | 
|  | } | 
|  |  | 
|  | if (index >= 0) | 
|  | lphttpHdr = &lpwhr->pCustHeaders[index]; | 
|  |  | 
|  | /* Ensure header satisfies requested attributes */ | 
|  | if (!lphttpHdr || | 
|  | ((dwInfoLevel & HTTP_QUERY_FLAG_REQUEST_HEADERS) && | 
|  | (~lphttpHdr->wFlags & HDR_ISREQUEST))) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_HTTP_HEADER_NOT_FOUND); | 
|  | return bSuccess; | 
|  | } | 
|  |  | 
|  | if (lpdwIndex) | 
|  | (*lpdwIndex)++; | 
|  |  | 
|  | /* coalesce value to requested type */ | 
|  | if (dwInfoLevel & HTTP_QUERY_FLAG_NUMBER) | 
|  | { | 
|  | *(int *)lpBuffer = atoiW(lphttpHdr->lpszValue); | 
|  | bSuccess = TRUE; | 
|  |  | 
|  | TRACE(" returning number : %d\n", *(int *)lpBuffer); | 
|  | } | 
|  | else if (dwInfoLevel & HTTP_QUERY_FLAG_SYSTEMTIME) | 
|  | { | 
|  | time_t tmpTime; | 
|  | struct tm tmpTM; | 
|  | SYSTEMTIME *STHook; | 
|  |  | 
|  | tmpTime = ConvertTimeString(lphttpHdr->lpszValue); | 
|  |  | 
|  | tmpTM = *gmtime(&tmpTime); | 
|  | STHook = (SYSTEMTIME *) lpBuffer; | 
|  | if(STHook==NULL) | 
|  | return bSuccess; | 
|  |  | 
|  | STHook->wDay = tmpTM.tm_mday; | 
|  | STHook->wHour = tmpTM.tm_hour; | 
|  | STHook->wMilliseconds = 0; | 
|  | STHook->wMinute = tmpTM.tm_min; | 
|  | STHook->wDayOfWeek = tmpTM.tm_wday; | 
|  | STHook->wMonth = tmpTM.tm_mon + 1; | 
|  | STHook->wSecond = tmpTM.tm_sec; | 
|  | STHook->wYear = tmpTM.tm_year; | 
|  |  | 
|  | bSuccess = TRUE; | 
|  |  | 
|  | TRACE(" returning time : %04d/%02d/%02d - %d - %02d:%02d:%02d.%02d\n", | 
|  | STHook->wYear, STHook->wMonth, STHook->wDay, STHook->wDayOfWeek, | 
|  | STHook->wHour, STHook->wMinute, STHook->wSecond, STHook->wMilliseconds); | 
|  | } | 
|  | else if (lphttpHdr->lpszValue) | 
|  | { | 
|  | DWORD len = (strlenW(lphttpHdr->lpszValue) + 1) * sizeof(WCHAR); | 
|  |  | 
|  | if (len > *lpdwBufferLength) | 
|  | { | 
|  | *lpdwBufferLength = len; | 
|  | INTERNET_SetLastError(ERROR_INSUFFICIENT_BUFFER); | 
|  | return bSuccess; | 
|  | } | 
|  |  | 
|  | memcpy(lpBuffer, lphttpHdr->lpszValue, len); | 
|  | *lpdwBufferLength = len - sizeof(WCHAR); | 
|  | bSuccess = TRUE; | 
|  |  | 
|  | TRACE(" returning string : %s\n", debugstr_w(lpBuffer)); | 
|  | } | 
|  | return bSuccess; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HttpQueryInfoW (WININET.@) | 
|  | * | 
|  | * Queries for information about an HTTP request | 
|  | * | 
|  | * RETURNS | 
|  | *    TRUE  on success | 
|  | *    FALSE on failure | 
|  | * | 
|  | */ | 
|  | BOOL WINAPI HttpQueryInfoW(HINTERNET hHttpRequest, DWORD dwInfoLevel, | 
|  | LPVOID lpBuffer, LPDWORD lpdwBufferLength, LPDWORD lpdwIndex) | 
|  | { | 
|  | BOOL bSuccess = FALSE; | 
|  | LPWININETHTTPREQW lpwhr; | 
|  |  | 
|  | if (TRACE_ON(wininet)) { | 
|  | #define FE(x) { x, #x } | 
|  | static const wininet_flag_info query_flags[] = { | 
|  | FE(HTTP_QUERY_MIME_VERSION), | 
|  | FE(HTTP_QUERY_CONTENT_TYPE), | 
|  | FE(HTTP_QUERY_CONTENT_TRANSFER_ENCODING), | 
|  | FE(HTTP_QUERY_CONTENT_ID), | 
|  | FE(HTTP_QUERY_CONTENT_DESCRIPTION), | 
|  | FE(HTTP_QUERY_CONTENT_LENGTH), | 
|  | FE(HTTP_QUERY_CONTENT_LANGUAGE), | 
|  | FE(HTTP_QUERY_ALLOW), | 
|  | FE(HTTP_QUERY_PUBLIC), | 
|  | FE(HTTP_QUERY_DATE), | 
|  | FE(HTTP_QUERY_EXPIRES), | 
|  | FE(HTTP_QUERY_LAST_MODIFIED), | 
|  | FE(HTTP_QUERY_MESSAGE_ID), | 
|  | FE(HTTP_QUERY_URI), | 
|  | FE(HTTP_QUERY_DERIVED_FROM), | 
|  | FE(HTTP_QUERY_COST), | 
|  | FE(HTTP_QUERY_LINK), | 
|  | FE(HTTP_QUERY_PRAGMA), | 
|  | FE(HTTP_QUERY_VERSION), | 
|  | FE(HTTP_QUERY_STATUS_CODE), | 
|  | FE(HTTP_QUERY_STATUS_TEXT), | 
|  | FE(HTTP_QUERY_RAW_HEADERS), | 
|  | FE(HTTP_QUERY_RAW_HEADERS_CRLF), | 
|  | FE(HTTP_QUERY_CONNECTION), | 
|  | FE(HTTP_QUERY_ACCEPT), | 
|  | FE(HTTP_QUERY_ACCEPT_CHARSET), | 
|  | FE(HTTP_QUERY_ACCEPT_ENCODING), | 
|  | FE(HTTP_QUERY_ACCEPT_LANGUAGE), | 
|  | FE(HTTP_QUERY_AUTHORIZATION), | 
|  | FE(HTTP_QUERY_CONTENT_ENCODING), | 
|  | FE(HTTP_QUERY_FORWARDED), | 
|  | FE(HTTP_QUERY_FROM), | 
|  | FE(HTTP_QUERY_IF_MODIFIED_SINCE), | 
|  | FE(HTTP_QUERY_LOCATION), | 
|  | FE(HTTP_QUERY_ORIG_URI), | 
|  | FE(HTTP_QUERY_REFERER), | 
|  | FE(HTTP_QUERY_RETRY_AFTER), | 
|  | FE(HTTP_QUERY_SERVER), | 
|  | FE(HTTP_QUERY_TITLE), | 
|  | FE(HTTP_QUERY_USER_AGENT), | 
|  | FE(HTTP_QUERY_WWW_AUTHENTICATE), | 
|  | FE(HTTP_QUERY_PROXY_AUTHENTICATE), | 
|  | FE(HTTP_QUERY_ACCEPT_RANGES), | 
|  | FE(HTTP_QUERY_SET_COOKIE), | 
|  | FE(HTTP_QUERY_COOKIE), | 
|  | FE(HTTP_QUERY_REQUEST_METHOD), | 
|  | FE(HTTP_QUERY_REFRESH), | 
|  | FE(HTTP_QUERY_CONTENT_DISPOSITION), | 
|  | FE(HTTP_QUERY_AGE), | 
|  | FE(HTTP_QUERY_CACHE_CONTROL), | 
|  | FE(HTTP_QUERY_CONTENT_BASE), | 
|  | FE(HTTP_QUERY_CONTENT_LOCATION), | 
|  | FE(HTTP_QUERY_CONTENT_MD5), | 
|  | FE(HTTP_QUERY_CONTENT_RANGE), | 
|  | FE(HTTP_QUERY_ETAG), | 
|  | FE(HTTP_QUERY_HOST), | 
|  | FE(HTTP_QUERY_IF_MATCH), | 
|  | FE(HTTP_QUERY_IF_NONE_MATCH), | 
|  | FE(HTTP_QUERY_IF_RANGE), | 
|  | FE(HTTP_QUERY_IF_UNMODIFIED_SINCE), | 
|  | FE(HTTP_QUERY_MAX_FORWARDS), | 
|  | FE(HTTP_QUERY_PROXY_AUTHORIZATION), | 
|  | FE(HTTP_QUERY_RANGE), | 
|  | FE(HTTP_QUERY_TRANSFER_ENCODING), | 
|  | FE(HTTP_QUERY_UPGRADE), | 
|  | FE(HTTP_QUERY_VARY), | 
|  | FE(HTTP_QUERY_VIA), | 
|  | FE(HTTP_QUERY_WARNING), | 
|  | FE(HTTP_QUERY_CUSTOM) | 
|  | }; | 
|  | static const wininet_flag_info modifier_flags[] = { | 
|  | FE(HTTP_QUERY_FLAG_REQUEST_HEADERS), | 
|  | FE(HTTP_QUERY_FLAG_SYSTEMTIME), | 
|  | FE(HTTP_QUERY_FLAG_NUMBER), | 
|  | FE(HTTP_QUERY_FLAG_COALESCE) | 
|  | }; | 
|  | #undef FE | 
|  | DWORD info_mod = dwInfoLevel & HTTP_QUERY_MODIFIER_FLAGS_MASK; | 
|  | DWORD info = dwInfoLevel & HTTP_QUERY_HEADER_MASK; | 
|  | DWORD i; | 
|  |  | 
|  | TRACE("(%p, 0x%08x)--> %d\n", hHttpRequest, dwInfoLevel, dwInfoLevel); | 
|  | TRACE("  Attribute:"); | 
|  | for (i = 0; i < (sizeof(query_flags) / sizeof(query_flags[0])); i++) { | 
|  | if (query_flags[i].val == info) { | 
|  | TRACE(" %s", query_flags[i].name); | 
|  | break; | 
|  | } | 
|  | } | 
|  | if (i == (sizeof(query_flags) / sizeof(query_flags[0]))) { | 
|  | TRACE(" Unknown (%08x)", info); | 
|  | } | 
|  |  | 
|  | TRACE(" Modifier:"); | 
|  | for (i = 0; i < (sizeof(modifier_flags) / sizeof(modifier_flags[0])); i++) { | 
|  | if (modifier_flags[i].val & info_mod) { | 
|  | TRACE(" %s", modifier_flags[i].name); | 
|  | info_mod &= ~ modifier_flags[i].val; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (info_mod) { | 
|  | TRACE(" Unknown (%08x)", info_mod); | 
|  | } | 
|  | TRACE("\n"); | 
|  | } | 
|  |  | 
|  | lpwhr = (LPWININETHTTPREQW) WININET_GetObject( hHttpRequest ); | 
|  | if (NULL == lpwhr ||  lpwhr->hdr.htype != WH_HHTTPREQ) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_INTERNET_INCORRECT_HANDLE_TYPE); | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | if (lpBuffer == NULL) | 
|  | *lpdwBufferLength = 0; | 
|  | bSuccess = HTTP_HttpQueryInfoW( lpwhr, dwInfoLevel, | 
|  | lpBuffer, lpdwBufferLength, lpdwIndex); | 
|  |  | 
|  | lend: | 
|  | if( lpwhr ) | 
|  | WININET_Release( &lpwhr->hdr ); | 
|  |  | 
|  | TRACE("%d <--\n", bSuccess); | 
|  | return bSuccess; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HttpQueryInfoA (WININET.@) | 
|  | * | 
|  | * Queries for information about an HTTP request | 
|  | * | 
|  | * RETURNS | 
|  | *    TRUE  on success | 
|  | *    FALSE on failure | 
|  | * | 
|  | */ | 
|  | BOOL WINAPI HttpQueryInfoA(HINTERNET hHttpRequest, DWORD dwInfoLevel, | 
|  | LPVOID lpBuffer, LPDWORD lpdwBufferLength, LPDWORD lpdwIndex) | 
|  | { | 
|  | BOOL result; | 
|  | DWORD len; | 
|  | WCHAR* bufferW; | 
|  |  | 
|  | if((dwInfoLevel & HTTP_QUERY_FLAG_NUMBER) || | 
|  | (dwInfoLevel & HTTP_QUERY_FLAG_SYSTEMTIME)) | 
|  | { | 
|  | return HttpQueryInfoW( hHttpRequest, dwInfoLevel, lpBuffer, | 
|  | lpdwBufferLength, lpdwIndex ); | 
|  | } | 
|  |  | 
|  | if (lpBuffer) | 
|  | { | 
|  | DWORD alloclen; | 
|  | len = (*lpdwBufferLength)*sizeof(WCHAR); | 
|  | if ((dwInfoLevel & HTTP_QUERY_HEADER_MASK) == HTTP_QUERY_CUSTOM) | 
|  | { | 
|  | alloclen = MultiByteToWideChar( CP_ACP, 0, lpBuffer, -1, NULL, 0 ) * sizeof(WCHAR); | 
|  | if (alloclen < len) | 
|  | alloclen = len; | 
|  | } | 
|  | else | 
|  | alloclen = len; | 
|  | bufferW = HeapAlloc( GetProcessHeap(), 0, alloclen ); | 
|  | /* buffer is in/out because of HTTP_QUERY_CUSTOM */ | 
|  | if ((dwInfoLevel & HTTP_QUERY_HEADER_MASK) == HTTP_QUERY_CUSTOM) | 
|  | MultiByteToWideChar( CP_ACP, 0, lpBuffer, -1, bufferW, alloclen / sizeof(WCHAR) ); | 
|  | } else | 
|  | { | 
|  | bufferW = NULL; | 
|  | len = 0; | 
|  | } | 
|  |  | 
|  | result = HttpQueryInfoW( hHttpRequest, dwInfoLevel, bufferW, | 
|  | &len, lpdwIndex ); | 
|  | if( result ) | 
|  | { | 
|  | len = WideCharToMultiByte( CP_ACP,0, bufferW, len / sizeof(WCHAR) + 1, | 
|  | lpBuffer, *lpdwBufferLength, NULL, NULL ); | 
|  | *lpdwBufferLength = len - 1; | 
|  |  | 
|  | TRACE("lpBuffer: %s\n", debugstr_a(lpBuffer)); | 
|  | } | 
|  | else | 
|  | /* since the strings being returned from HttpQueryInfoW should be | 
|  | * only ASCII characters, it is reasonable to assume that all of | 
|  | * the Unicode characters can be reduced to a single byte */ | 
|  | *lpdwBufferLength = len / sizeof(WCHAR); | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, bufferW ); | 
|  |  | 
|  | return result; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HttpSendRequestExA (WININET.@) | 
|  | * | 
|  | * Sends the specified request to the HTTP server and allows chunked | 
|  | * transfers. | 
|  | * | 
|  | * RETURNS | 
|  | *  Success: TRUE | 
|  | *  Failure: FALSE, call GetLastError() for more information. | 
|  | */ | 
|  | BOOL WINAPI HttpSendRequestExA(HINTERNET hRequest, | 
|  | LPINTERNET_BUFFERSA lpBuffersIn, | 
|  | LPINTERNET_BUFFERSA lpBuffersOut, | 
|  | DWORD dwFlags, DWORD_PTR dwContext) | 
|  | { | 
|  | INTERNET_BUFFERSW BuffersInW; | 
|  | BOOL rc = FALSE; | 
|  | DWORD headerlen; | 
|  | LPWSTR header = NULL; | 
|  |  | 
|  | TRACE("(%p, %p, %p, %08x, %08lx): stub\n", hRequest, lpBuffersIn, | 
|  | lpBuffersOut, dwFlags, dwContext); | 
|  |  | 
|  | if (lpBuffersIn) | 
|  | { | 
|  | BuffersInW.dwStructSize = sizeof(LPINTERNET_BUFFERSW); | 
|  | if (lpBuffersIn->lpcszHeader) | 
|  | { | 
|  | headerlen = MultiByteToWideChar(CP_ACP,0,lpBuffersIn->lpcszHeader, | 
|  | lpBuffersIn->dwHeadersLength,0,0); | 
|  | header = HeapAlloc(GetProcessHeap(),0,headerlen*sizeof(WCHAR)); | 
|  | if (!(BuffersInW.lpcszHeader = header)) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_OUTOFMEMORY); | 
|  | return FALSE; | 
|  | } | 
|  | BuffersInW.dwHeadersLength = MultiByteToWideChar(CP_ACP, 0, | 
|  | lpBuffersIn->lpcszHeader, lpBuffersIn->dwHeadersLength, | 
|  | header, headerlen); | 
|  | } | 
|  | else | 
|  | BuffersInW.lpcszHeader = NULL; | 
|  | BuffersInW.dwHeadersTotal = lpBuffersIn->dwHeadersTotal; | 
|  | BuffersInW.lpvBuffer = lpBuffersIn->lpvBuffer; | 
|  | BuffersInW.dwBufferLength = lpBuffersIn->dwBufferLength; | 
|  | BuffersInW.dwBufferTotal = lpBuffersIn->dwBufferTotal; | 
|  | BuffersInW.Next = NULL; | 
|  | } | 
|  |  | 
|  | rc = HttpSendRequestExW(hRequest, lpBuffersIn ? &BuffersInW : NULL, NULL, dwFlags, dwContext); | 
|  |  | 
|  | HeapFree(GetProcessHeap(),0,header); | 
|  |  | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HttpSendRequestExW (WININET.@) | 
|  | * | 
|  | * Sends the specified request to the HTTP server and allows chunked | 
|  | * transfers | 
|  | * | 
|  | * RETURNS | 
|  | *  Success: TRUE | 
|  | *  Failure: FALSE, call GetLastError() for more information. | 
|  | */ | 
|  | BOOL WINAPI HttpSendRequestExW(HINTERNET hRequest, | 
|  | LPINTERNET_BUFFERSW lpBuffersIn, | 
|  | LPINTERNET_BUFFERSW lpBuffersOut, | 
|  | DWORD dwFlags, DWORD_PTR dwContext) | 
|  | { | 
|  | BOOL ret = FALSE; | 
|  | LPWININETHTTPREQW lpwhr; | 
|  | LPWININETHTTPSESSIONW lpwhs; | 
|  | LPWININETAPPINFOW hIC; | 
|  |  | 
|  | TRACE("(%p, %p, %p, %08x, %08lx)\n", hRequest, lpBuffersIn, | 
|  | lpBuffersOut, dwFlags, dwContext); | 
|  |  | 
|  | lpwhr = (LPWININETHTTPREQW) WININET_GetObject( hRequest ); | 
|  |  | 
|  | if (NULL == lpwhr || lpwhr->hdr.htype != WH_HHTTPREQ) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_INTERNET_INCORRECT_HANDLE_TYPE); | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | lpwhs = lpwhr->lpHttpSession; | 
|  | assert(lpwhs->hdr.htype == WH_HHTTPSESSION); | 
|  | hIC = lpwhs->lpAppInfo; | 
|  | assert(hIC->hdr.htype == WH_HINIT); | 
|  |  | 
|  | if (hIC->hdr.dwFlags & INTERNET_FLAG_ASYNC) | 
|  | { | 
|  | WORKREQUEST workRequest; | 
|  | struct WORKREQ_HTTPSENDREQUESTW *req; | 
|  |  | 
|  | workRequest.asyncproc = AsyncHttpSendRequestProc; | 
|  | workRequest.hdr = WININET_AddRef( &lpwhr->hdr ); | 
|  | req = &workRequest.u.HttpSendRequestW; | 
|  | if (lpBuffersIn) | 
|  | { | 
|  | if (lpBuffersIn->lpcszHeader) | 
|  | /* FIXME: this should use dwHeadersLength or may not be necessary at all */ | 
|  | req->lpszHeader = WININET_strdupW(lpBuffersIn->lpcszHeader); | 
|  | else | 
|  | req->lpszHeader = NULL; | 
|  | req->dwHeaderLength = lpBuffersIn->dwHeadersLength; | 
|  | req->lpOptional = lpBuffersIn->lpvBuffer; | 
|  | req->dwOptionalLength = lpBuffersIn->dwBufferLength; | 
|  | req->dwContentLength = lpBuffersIn->dwBufferTotal; | 
|  | } | 
|  | else | 
|  | { | 
|  | req->lpszHeader = NULL; | 
|  | req->dwHeaderLength = 0; | 
|  | req->lpOptional = NULL; | 
|  | req->dwOptionalLength = 0; | 
|  | req->dwContentLength = 0; | 
|  | } | 
|  |  | 
|  | req->bEndRequest = FALSE; | 
|  |  | 
|  | INTERNET_AsyncCall(&workRequest); | 
|  | /* | 
|  | * This is from windows. | 
|  | */ | 
|  | INTERNET_SetLastError(ERROR_IO_PENDING); | 
|  | } | 
|  | else | 
|  | { | 
|  | if (lpBuffersIn) | 
|  | ret = HTTP_HttpSendRequestW(lpwhr, lpBuffersIn->lpcszHeader, lpBuffersIn->dwHeadersLength, | 
|  | lpBuffersIn->lpvBuffer, lpBuffersIn->dwBufferLength, | 
|  | lpBuffersIn->dwBufferTotal, FALSE); | 
|  | else | 
|  | ret = HTTP_HttpSendRequestW(lpwhr, NULL, 0, NULL, 0, 0, FALSE); | 
|  | } | 
|  |  | 
|  | lend: | 
|  | if ( lpwhr ) | 
|  | WININET_Release( &lpwhr->hdr ); | 
|  |  | 
|  | TRACE("<---\n"); | 
|  | return ret; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HttpSendRequestW (WININET.@) | 
|  | * | 
|  | * Sends the specified request to the HTTP server | 
|  | * | 
|  | * RETURNS | 
|  | *    TRUE  on success | 
|  | *    FALSE on failure | 
|  | * | 
|  | */ | 
|  | BOOL WINAPI HttpSendRequestW(HINTERNET hHttpRequest, LPCWSTR lpszHeaders, | 
|  | DWORD dwHeaderLength, LPVOID lpOptional ,DWORD dwOptionalLength) | 
|  | { | 
|  | LPWININETHTTPREQW lpwhr; | 
|  | LPWININETHTTPSESSIONW lpwhs = NULL; | 
|  | LPWININETAPPINFOW hIC = NULL; | 
|  | BOOL r; | 
|  |  | 
|  | TRACE("%p, %s, %i, %p, %i)\n", hHttpRequest, | 
|  | debugstr_wn(lpszHeaders, dwHeaderLength), dwHeaderLength, lpOptional, dwOptionalLength); | 
|  |  | 
|  | lpwhr = (LPWININETHTTPREQW) WININET_GetObject( hHttpRequest ); | 
|  | if (NULL == lpwhr || lpwhr->hdr.htype != WH_HHTTPREQ) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_INTERNET_INCORRECT_HANDLE_TYPE); | 
|  | r = FALSE; | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | lpwhs = lpwhr->lpHttpSession; | 
|  | if (NULL == lpwhs ||  lpwhs->hdr.htype != WH_HHTTPSESSION) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_INTERNET_INCORRECT_HANDLE_TYPE); | 
|  | r = FALSE; | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | hIC = lpwhs->lpAppInfo; | 
|  | if (NULL == hIC ||  hIC->hdr.htype != WH_HINIT) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_INTERNET_INCORRECT_HANDLE_TYPE); | 
|  | r = FALSE; | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | if (hIC->hdr.dwFlags & INTERNET_FLAG_ASYNC) | 
|  | { | 
|  | WORKREQUEST workRequest; | 
|  | struct WORKREQ_HTTPSENDREQUESTW *req; | 
|  |  | 
|  | workRequest.asyncproc = AsyncHttpSendRequestProc; | 
|  | workRequest.hdr = WININET_AddRef( &lpwhr->hdr ); | 
|  | req = &workRequest.u.HttpSendRequestW; | 
|  | if (lpszHeaders) | 
|  | { | 
|  | req->lpszHeader = HeapAlloc(GetProcessHeap(), 0, dwHeaderLength * sizeof(WCHAR)); | 
|  | memcpy(req->lpszHeader, lpszHeaders, dwHeaderLength * sizeof(WCHAR)); | 
|  | } | 
|  | else | 
|  | req->lpszHeader = 0; | 
|  | req->dwHeaderLength = dwHeaderLength; | 
|  | req->lpOptional = lpOptional; | 
|  | req->dwOptionalLength = dwOptionalLength; | 
|  | req->dwContentLength = dwOptionalLength; | 
|  | req->bEndRequest = TRUE; | 
|  |  | 
|  | INTERNET_AsyncCall(&workRequest); | 
|  | /* | 
|  | * This is from windows. | 
|  | */ | 
|  | INTERNET_SetLastError(ERROR_IO_PENDING); | 
|  | r = FALSE; | 
|  | } | 
|  | else | 
|  | { | 
|  | r = HTTP_HttpSendRequestW(lpwhr, lpszHeaders, | 
|  | dwHeaderLength, lpOptional, dwOptionalLength, | 
|  | dwOptionalLength, TRUE); | 
|  | } | 
|  | lend: | 
|  | if( lpwhr ) | 
|  | WININET_Release( &lpwhr->hdr ); | 
|  | return r; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HttpSendRequestA (WININET.@) | 
|  | * | 
|  | * Sends the specified request to the HTTP server | 
|  | * | 
|  | * RETURNS | 
|  | *    TRUE  on success | 
|  | *    FALSE on failure | 
|  | * | 
|  | */ | 
|  | BOOL WINAPI HttpSendRequestA(HINTERNET hHttpRequest, LPCSTR lpszHeaders, | 
|  | DWORD dwHeaderLength, LPVOID lpOptional ,DWORD dwOptionalLength) | 
|  | { | 
|  | BOOL result; | 
|  | LPWSTR szHeaders=NULL; | 
|  | DWORD nLen=dwHeaderLength; | 
|  | if(lpszHeaders!=NULL) | 
|  | { | 
|  | nLen=MultiByteToWideChar(CP_ACP,0,lpszHeaders,dwHeaderLength,NULL,0); | 
|  | szHeaders=HeapAlloc(GetProcessHeap(),0,nLen*sizeof(WCHAR)); | 
|  | MultiByteToWideChar(CP_ACP,0,lpszHeaders,dwHeaderLength,szHeaders,nLen); | 
|  | } | 
|  | result=HttpSendRequestW(hHttpRequest, szHeaders, nLen, lpOptional, dwOptionalLength); | 
|  | HeapFree(GetProcessHeap(),0,szHeaders); | 
|  | return result; | 
|  | } | 
|  |  | 
|  | static BOOL HTTP_GetRequestURL(WININETHTTPREQW *req, LPWSTR buf) | 
|  | { | 
|  | LPHTTPHEADERW host_header; | 
|  |  | 
|  | static const WCHAR formatW[] = {'h','t','t','p',':','/','/','%','s','%','s',0}; | 
|  |  | 
|  | host_header = HTTP_GetHeader(req, szHost); | 
|  | if(!host_header) | 
|  | return FALSE; | 
|  |  | 
|  | sprintfW(buf, formatW, host_header->lpszValue, req->lpszPath); /* FIXME */ | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_HandleRedirect (internal) | 
|  | */ | 
|  | static BOOL HTTP_HandleRedirect(LPWININETHTTPREQW lpwhr, LPCWSTR lpszUrl) | 
|  | { | 
|  | LPWININETHTTPSESSIONW lpwhs = lpwhr->lpHttpSession; | 
|  | LPWININETAPPINFOW hIC = lpwhs->lpAppInfo; | 
|  | WCHAR path[2048]; | 
|  |  | 
|  | if(lpszUrl[0]=='/') | 
|  | { | 
|  | /* if it's an absolute path, keep the same session info */ | 
|  | lstrcpynW(path, lpszUrl, 2048); | 
|  | } | 
|  | else if (NULL != hIC->lpszProxy && hIC->lpszProxy[0] != 0) | 
|  | { | 
|  | TRACE("Redirect through proxy\n"); | 
|  | lstrcpynW(path, lpszUrl, 2048); | 
|  | } | 
|  | else | 
|  | { | 
|  | URL_COMPONENTSW urlComponents; | 
|  | WCHAR protocol[32], hostName[MAXHOSTNAME], userName[1024]; | 
|  | static WCHAR szHttp[] = {'h','t','t','p',0}; | 
|  | static WCHAR szHttps[] = {'h','t','t','p','s',0}; | 
|  | DWORD url_length = 0; | 
|  | LPWSTR orig_url; | 
|  | LPWSTR combined_url; | 
|  |  | 
|  | urlComponents.dwStructSize = sizeof(URL_COMPONENTSW); | 
|  | urlComponents.lpszScheme = (lpwhr->hdr.dwFlags & INTERNET_FLAG_SECURE) ? szHttps : szHttp; | 
|  | urlComponents.dwSchemeLength = 0; | 
|  | urlComponents.lpszHostName = lpwhs->lpszHostName; | 
|  | urlComponents.dwHostNameLength = 0; | 
|  | urlComponents.nPort = lpwhs->nHostPort; | 
|  | urlComponents.lpszUserName = lpwhs->lpszUserName; | 
|  | urlComponents.dwUserNameLength = 0; | 
|  | urlComponents.lpszPassword = NULL; | 
|  | urlComponents.dwPasswordLength = 0; | 
|  | urlComponents.lpszUrlPath = lpwhr->lpszPath; | 
|  | urlComponents.dwUrlPathLength = 0; | 
|  | urlComponents.lpszExtraInfo = NULL; | 
|  | urlComponents.dwExtraInfoLength = 0; | 
|  |  | 
|  | if (!InternetCreateUrlW(&urlComponents, 0, NULL, &url_length) && | 
|  | (GetLastError() != ERROR_INSUFFICIENT_BUFFER)) | 
|  | return FALSE; | 
|  |  | 
|  | orig_url = HeapAlloc(GetProcessHeap(), 0, url_length); | 
|  |  | 
|  | /* convert from bytes to characters */ | 
|  | url_length = url_length / sizeof(WCHAR) - 1; | 
|  | if (!InternetCreateUrlW(&urlComponents, 0, orig_url, &url_length)) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, orig_url); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | url_length = 0; | 
|  | if (!InternetCombineUrlW(orig_url, lpszUrl, NULL, &url_length, ICU_ENCODE_SPACES_ONLY) && | 
|  | (GetLastError() != ERROR_INSUFFICIENT_BUFFER)) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, orig_url); | 
|  | return FALSE; | 
|  | } | 
|  | combined_url = HeapAlloc(GetProcessHeap(), 0, url_length * sizeof(WCHAR)); | 
|  |  | 
|  | if (!InternetCombineUrlW(orig_url, lpszUrl, combined_url, &url_length, ICU_ENCODE_SPACES_ONLY)) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, orig_url); | 
|  | HeapFree(GetProcessHeap(), 0, combined_url); | 
|  | return FALSE; | 
|  | } | 
|  | HeapFree(GetProcessHeap(), 0, orig_url); | 
|  |  | 
|  | userName[0] = 0; | 
|  | hostName[0] = 0; | 
|  | protocol[0] = 0; | 
|  |  | 
|  | urlComponents.dwStructSize = sizeof(URL_COMPONENTSW); | 
|  | urlComponents.lpszScheme = protocol; | 
|  | urlComponents.dwSchemeLength = 32; | 
|  | urlComponents.lpszHostName = hostName; | 
|  | urlComponents.dwHostNameLength = MAXHOSTNAME; | 
|  | urlComponents.lpszUserName = userName; | 
|  | urlComponents.dwUserNameLength = 1024; | 
|  | urlComponents.lpszPassword = NULL; | 
|  | urlComponents.dwPasswordLength = 0; | 
|  | urlComponents.lpszUrlPath = path; | 
|  | urlComponents.dwUrlPathLength = 2048; | 
|  | urlComponents.lpszExtraInfo = NULL; | 
|  | urlComponents.dwExtraInfoLength = 0; | 
|  | if(!InternetCrackUrlW(combined_url, strlenW(combined_url), 0, &urlComponents)) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, combined_url); | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, combined_url); | 
|  |  | 
|  | if (!strncmpW(szHttp, urlComponents.lpszScheme, strlenW(szHttp)) && | 
|  | (lpwhr->hdr.dwFlags & INTERNET_FLAG_SECURE)) | 
|  | { | 
|  | TRACE("redirect from secure page to non-secure page\n"); | 
|  | /* FIXME: warn about from secure redirect to non-secure page */ | 
|  | lpwhr->hdr.dwFlags &= ~INTERNET_FLAG_SECURE; | 
|  | } | 
|  | if (!strncmpW(szHttps, urlComponents.lpszScheme, strlenW(szHttps)) && | 
|  | !(lpwhr->hdr.dwFlags & INTERNET_FLAG_SECURE)) | 
|  | { | 
|  | TRACE("redirect from non-secure page to secure page\n"); | 
|  | /* FIXME: notify about redirect to secure page */ | 
|  | lpwhr->hdr.dwFlags |= INTERNET_FLAG_SECURE; | 
|  | } | 
|  |  | 
|  | if (urlComponents.nPort == INTERNET_INVALID_PORT_NUMBER) | 
|  | { | 
|  | if (lstrlenW(protocol)>4) /*https*/ | 
|  | urlComponents.nPort = INTERNET_DEFAULT_HTTPS_PORT; | 
|  | else /*http*/ | 
|  | urlComponents.nPort = INTERNET_DEFAULT_HTTP_PORT; | 
|  | } | 
|  |  | 
|  | #if 0 | 
|  | /* | 
|  | * This upsets redirects to binary files on sourceforge.net | 
|  | * and gives an html page instead of the target file | 
|  | * Examination of the HTTP request sent by native wininet.dll | 
|  | * reveals that it doesn't send a referrer in that case. | 
|  | * Maybe there's a flag that enables this, or maybe a referrer | 
|  | * shouldn't be added in case of a redirect. | 
|  | */ | 
|  |  | 
|  | /* consider the current host as the referrer */ | 
|  | if (lpwhs->lpszServerName && *lpwhs->lpszServerName) | 
|  | HTTP_ProcessHeader(lpwhr, HTTP_REFERER, lpwhs->lpszServerName, | 
|  | HTTP_ADDHDR_FLAG_REQ|HTTP_ADDREQ_FLAG_REPLACE| | 
|  | HTTP_ADDHDR_FLAG_ADD_IF_NEW); | 
|  | #endif | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, lpwhs->lpszServerName); | 
|  | lpwhs->lpszServerName = WININET_strdupW(hostName); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhs->lpszHostName); | 
|  | if (urlComponents.nPort != INTERNET_DEFAULT_HTTP_PORT && | 
|  | urlComponents.nPort != INTERNET_DEFAULT_HTTPS_PORT) | 
|  | { | 
|  | int len; | 
|  | static const WCHAR fmt[] = {'%','s',':','%','i',0}; | 
|  | len = lstrlenW(hostName); | 
|  | len += 7; /* 5 for strlen("65535") + 1 for ":" + 1 for '\0' */ | 
|  | lpwhs->lpszHostName = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR)); | 
|  | sprintfW(lpwhs->lpszHostName, fmt, hostName, urlComponents.nPort); | 
|  | } | 
|  | else | 
|  | lpwhs->lpszHostName = WININET_strdupW(hostName); | 
|  |  | 
|  | HTTP_ProcessHeader(lpwhr, szHost, lpwhs->lpszHostName, HTTP_ADDREQ_FLAG_ADD | HTTP_ADDREQ_FLAG_REPLACE | HTTP_ADDHDR_FLAG_REQ); | 
|  |  | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, lpwhs->lpszUserName); | 
|  | lpwhs->lpszUserName = NULL; | 
|  | if (userName[0]) | 
|  | lpwhs->lpszUserName = WININET_strdupW(userName); | 
|  | lpwhs->nServerPort = urlComponents.nPort; | 
|  |  | 
|  | if (!HTTP_ResolveName(lpwhr)) | 
|  | return FALSE; | 
|  |  | 
|  | NETCON_close(&lpwhr->netConnection); | 
|  |  | 
|  | if (!NETCON_init(&lpwhr->netConnection,lpwhr->hdr.dwFlags & INTERNET_FLAG_SECURE)) | 
|  | return FALSE; | 
|  | } | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->lpszPath); | 
|  | lpwhr->lpszPath=NULL; | 
|  | if (*path) | 
|  | { | 
|  | DWORD needed = 0; | 
|  | HRESULT rc; | 
|  |  | 
|  | rc = UrlEscapeW(path, NULL, &needed, URL_ESCAPE_SPACES_ONLY); | 
|  | if (rc != E_POINTER) | 
|  | needed = strlenW(path)+1; | 
|  | lpwhr->lpszPath = HeapAlloc(GetProcessHeap(), 0, needed*sizeof(WCHAR)); | 
|  | rc = UrlEscapeW(path, lpwhr->lpszPath, &needed, | 
|  | URL_ESCAPE_SPACES_ONLY); | 
|  | if (rc) | 
|  | { | 
|  | ERR("Unable to escape string!(%s) (%d)\n",debugstr_w(path),rc); | 
|  | strcpyW(lpwhr->lpszPath,path); | 
|  | } | 
|  | } | 
|  |  | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_build_req (internal) | 
|  | * | 
|  | *  concatenate all the strings in the request together | 
|  | */ | 
|  | static LPWSTR HTTP_build_req( LPCWSTR *list, int len ) | 
|  | { | 
|  | LPCWSTR *t; | 
|  | LPWSTR str; | 
|  |  | 
|  | for( t = list; *t ; t++  ) | 
|  | len += strlenW( *t ); | 
|  | len++; | 
|  |  | 
|  | str = HeapAlloc( GetProcessHeap(), 0, len*sizeof(WCHAR) ); | 
|  | *str = 0; | 
|  |  | 
|  | for( t = list; *t ; t++ ) | 
|  | strcatW( str, *t ); | 
|  |  | 
|  | return str; | 
|  | } | 
|  |  | 
|  | static BOOL HTTP_SecureProxyConnect(LPWININETHTTPREQW lpwhr) | 
|  | { | 
|  | LPWSTR lpszPath; | 
|  | LPWSTR requestString; | 
|  | INT len; | 
|  | INT cnt; | 
|  | INT responseLen; | 
|  | char *ascii_req; | 
|  | BOOL ret; | 
|  | static const WCHAR szConnect[] = {'C','O','N','N','E','C','T',0}; | 
|  | static const WCHAR szFormat[] = {'%','s',':','%','d',0}; | 
|  | LPWININETHTTPSESSIONW lpwhs = lpwhr->lpHttpSession; | 
|  |  | 
|  | TRACE("\n"); | 
|  |  | 
|  | lpszPath = HeapAlloc( GetProcessHeap(), 0, (lstrlenW( lpwhs->lpszHostName ) + 13)*sizeof(WCHAR) ); | 
|  | sprintfW( lpszPath, szFormat, lpwhs->lpszHostName, lpwhs->nHostPort ); | 
|  | requestString = HTTP_BuildHeaderRequestString( lpwhr, szConnect, lpszPath, g_szHttp1_1 ); | 
|  | HeapFree( GetProcessHeap(), 0, lpszPath ); | 
|  |  | 
|  | len = WideCharToMultiByte( CP_ACP, 0, requestString, -1, | 
|  | NULL, 0, NULL, NULL ); | 
|  | len--; /* the nul terminator isn't needed */ | 
|  | ascii_req = HeapAlloc( GetProcessHeap(), 0, len ); | 
|  | WideCharToMultiByte( CP_ACP, 0, requestString, -1, | 
|  | ascii_req, len, NULL, NULL ); | 
|  | HeapFree( GetProcessHeap(), 0, requestString ); | 
|  |  | 
|  | TRACE("full request -> %s\n", debugstr_an( ascii_req, len ) ); | 
|  |  | 
|  | ret = NETCON_send( &lpwhr->netConnection, ascii_req, len, 0, &cnt ); | 
|  | HeapFree( GetProcessHeap(), 0, ascii_req ); | 
|  | if (!ret || cnt < 0) | 
|  | return FALSE; | 
|  |  | 
|  | responseLen = HTTP_GetResponseHeaders( lpwhr ); | 
|  | if (!responseLen) | 
|  | return FALSE; | 
|  |  | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_HttpSendRequestW (internal) | 
|  | * | 
|  | * Sends the specified request to the HTTP server | 
|  | * | 
|  | * RETURNS | 
|  | *    TRUE  on success | 
|  | *    FALSE on failure | 
|  | * | 
|  | */ | 
|  | BOOL WINAPI HTTP_HttpSendRequestW(LPWININETHTTPREQW lpwhr, LPCWSTR lpszHeaders, | 
|  | DWORD dwHeaderLength, LPVOID lpOptional, DWORD dwOptionalLength, | 
|  | DWORD dwContentLength, BOOL bEndRequest) | 
|  | { | 
|  | INT cnt; | 
|  | BOOL bSuccess = FALSE; | 
|  | LPWSTR requestString = NULL; | 
|  | INT responseLen; | 
|  | BOOL loop_next; | 
|  | INTERNET_ASYNC_RESULT iar; | 
|  | static const WCHAR szClose[] = { 'C','l','o','s','e',0 }; | 
|  | static const WCHAR szPost[] = { 'P','O','S','T',0 }; | 
|  | static const WCHAR szContentLength[] = | 
|  | { 'C','o','n','t','e','n','t','-','L','e','n','g','t','h',':',' ','%','l','i','\r','\n',0 }; | 
|  | WCHAR contentLengthStr[sizeof szContentLength/2 /* includes \r\n */ + 20 /* int */ ]; | 
|  |  | 
|  | TRACE("--> %p\n", lpwhr); | 
|  |  | 
|  | assert(lpwhr->hdr.htype == WH_HHTTPREQ); | 
|  |  | 
|  | /* Clear any error information */ | 
|  | INTERNET_SetLastError(0); | 
|  |  | 
|  | /* if the verb is NULL default to GET */ | 
|  | if (!lpwhr->lpszVerb) | 
|  | lpwhr->lpszVerb = WININET_strdupW(szGET); | 
|  |  | 
|  | if (dwContentLength || !strcmpW(lpwhr->lpszVerb, szPost)) | 
|  | { | 
|  | sprintfW(contentLengthStr, szContentLength, dwContentLength); | 
|  | HTTP_HttpAddRequestHeadersW(lpwhr, contentLengthStr, -1L, HTTP_ADDREQ_FLAG_ADD | HTTP_ADDHDR_FLAG_REPLACE); | 
|  | } | 
|  |  | 
|  | do | 
|  | { | 
|  | DWORD len; | 
|  | char *ascii_req; | 
|  |  | 
|  | loop_next = FALSE; | 
|  |  | 
|  | /* like native, just in case the caller forgot to call InternetReadFile | 
|  | * for all the data */ | 
|  | HTTP_DrainContent(lpwhr); | 
|  | lpwhr->dwContentRead = 0; | 
|  |  | 
|  | if (TRACE_ON(wininet)) | 
|  | { | 
|  | LPHTTPHEADERW Host = HTTP_GetHeader(lpwhr,szHost); | 
|  | TRACE("Going to url %s %s\n", debugstr_w(Host->lpszValue), debugstr_w(lpwhr->lpszPath)); | 
|  | } | 
|  |  | 
|  | HTTP_FixURL(lpwhr); | 
|  | HTTP_ProcessHeader(lpwhr, szConnection, | 
|  | lpwhr->hdr.dwFlags & INTERNET_FLAG_KEEP_CONNECTION ? szKeepAlive : szClose, | 
|  | HTTP_ADDHDR_FLAG_REQ | HTTP_ADDHDR_FLAG_REPLACE); | 
|  |  | 
|  | HTTP_InsertAuthorization(lpwhr, szAuthorization, !loop_next); | 
|  | HTTP_InsertAuthorization(lpwhr, szProxy_Authorization, !loop_next); | 
|  |  | 
|  | /* add the headers the caller supplied */ | 
|  | if( lpszHeaders && dwHeaderLength ) | 
|  | { | 
|  | HTTP_HttpAddRequestHeadersW(lpwhr, lpszHeaders, dwHeaderLength, | 
|  | HTTP_ADDREQ_FLAG_ADD | HTTP_ADDHDR_FLAG_REPLACE); | 
|  | } | 
|  |  | 
|  | requestString = HTTP_BuildHeaderRequestString(lpwhr, lpwhr->lpszVerb, lpwhr->lpszPath, lpwhr->lpszVersion); | 
|  |  | 
|  | TRACE("Request header -> %s\n", debugstr_w(requestString) ); | 
|  |  | 
|  | /* Send the request and store the results */ | 
|  | if (!HTTP_OpenConnection(lpwhr)) | 
|  | goto lend; | 
|  |  | 
|  | /* send the request as ASCII, tack on the optional data */ | 
|  | if( !lpOptional ) | 
|  | dwOptionalLength = 0; | 
|  | len = WideCharToMultiByte( CP_ACP, 0, requestString, -1, | 
|  | NULL, 0, NULL, NULL ); | 
|  | ascii_req = HeapAlloc( GetProcessHeap(), 0, len + dwOptionalLength ); | 
|  | WideCharToMultiByte( CP_ACP, 0, requestString, -1, | 
|  | ascii_req, len, NULL, NULL ); | 
|  | if( lpOptional ) | 
|  | memcpy( &ascii_req[len-1], lpOptional, dwOptionalLength ); | 
|  | len = (len + dwOptionalLength - 1); | 
|  | ascii_req[len] = 0; | 
|  | TRACE("full request -> %s\n", debugstr_a(ascii_req) ); | 
|  |  | 
|  | INTERNET_SendCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_SENDING_REQUEST, NULL, 0); | 
|  |  | 
|  | NETCON_send(&lpwhr->netConnection, ascii_req, len, 0, &cnt); | 
|  | HeapFree( GetProcessHeap(), 0, ascii_req ); | 
|  |  | 
|  | INTERNET_SendCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_REQUEST_SENT, | 
|  | &len, sizeof(DWORD)); | 
|  |  | 
|  | if (bEndRequest) | 
|  | { | 
|  | DWORD dwBufferSize; | 
|  | DWORD dwStatusCode; | 
|  |  | 
|  | INTERNET_SendCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_RECEIVING_RESPONSE, NULL, 0); | 
|  |  | 
|  | if (cnt < 0) | 
|  | goto lend; | 
|  |  | 
|  | responseLen = HTTP_GetResponseHeaders(lpwhr); | 
|  | if (responseLen) | 
|  | bSuccess = TRUE; | 
|  |  | 
|  | INTERNET_SendCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_RESPONSE_RECEIVED, &responseLen, | 
|  | sizeof(DWORD)); | 
|  |  | 
|  | HTTP_ProcessCookies(lpwhr); | 
|  |  | 
|  | dwBufferSize = sizeof(lpwhr->dwContentLength); | 
|  | if (!HTTP_HttpQueryInfoW(lpwhr,HTTP_QUERY_FLAG_NUMBER|HTTP_QUERY_CONTENT_LENGTH, | 
|  | &lpwhr->dwContentLength,&dwBufferSize,NULL)) | 
|  | lpwhr->dwContentLength = -1; | 
|  |  | 
|  | if (lpwhr->dwContentLength == 0) | 
|  | HTTP_FinishedReading(lpwhr); | 
|  |  | 
|  | dwBufferSize = sizeof(dwStatusCode); | 
|  | if (!HTTP_HttpQueryInfoW(lpwhr,HTTP_QUERY_FLAG_NUMBER|HTTP_QUERY_STATUS_CODE, | 
|  | &dwStatusCode,&dwBufferSize,NULL)) | 
|  | dwStatusCode = 0; | 
|  |  | 
|  | if (!(lpwhr->hdr.dwFlags & INTERNET_FLAG_NO_AUTO_REDIRECT) && bSuccess) | 
|  | { | 
|  | WCHAR szNewLocation[2048]; | 
|  | dwBufferSize=sizeof(szNewLocation); | 
|  | if ((dwStatusCode==HTTP_STATUS_REDIRECT || dwStatusCode==HTTP_STATUS_MOVED) && | 
|  | HTTP_HttpQueryInfoW(lpwhr,HTTP_QUERY_LOCATION,szNewLocation,&dwBufferSize,NULL)) | 
|  | { | 
|  | HTTP_DrainContent(lpwhr); | 
|  | INTERNET_SendCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_REDIRECT, szNewLocation, | 
|  | dwBufferSize); | 
|  | bSuccess = HTTP_HandleRedirect(lpwhr, szNewLocation); | 
|  | if (bSuccess) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, requestString); | 
|  | loop_next = TRUE; | 
|  | } | 
|  | } | 
|  | } | 
|  | if (!(lpwhr->hdr.dwFlags & INTERNET_FLAG_NO_AUTH) && bSuccess) | 
|  | { | 
|  | WCHAR szAuthValue[2048]; | 
|  | dwBufferSize=2048; | 
|  | if (dwStatusCode == HTTP_STATUS_DENIED) | 
|  | { | 
|  | DWORD dwIndex = 0; | 
|  | while (HTTP_HttpQueryInfoW(lpwhr,HTTP_QUERY_WWW_AUTHENTICATE,szAuthValue,&dwBufferSize,&dwIndex)) | 
|  | { | 
|  | if (HTTP_DoAuthorization(lpwhr, szAuthValue, | 
|  | &lpwhr->pAuthInfo, | 
|  | lpwhr->lpHttpSession->lpszUserName, | 
|  | lpwhr->lpHttpSession->lpszPassword)) | 
|  | { | 
|  | loop_next = TRUE; | 
|  | break; | 
|  | } | 
|  | } | 
|  | } | 
|  | if (dwStatusCode == HTTP_STATUS_PROXY_AUTH_REQ) | 
|  | { | 
|  | DWORD dwIndex = 0; | 
|  | while (HTTP_HttpQueryInfoW(lpwhr,HTTP_QUERY_PROXY_AUTHENTICATE,szAuthValue,&dwBufferSize,&dwIndex)) | 
|  | { | 
|  | if (HTTP_DoAuthorization(lpwhr, szAuthValue, | 
|  | &lpwhr->pProxyAuthInfo, | 
|  | lpwhr->lpHttpSession->lpAppInfo->lpszProxyUsername, | 
|  | lpwhr->lpHttpSession->lpAppInfo->lpszProxyPassword)) | 
|  | { | 
|  | loop_next = TRUE; | 
|  | break; | 
|  | } | 
|  | } | 
|  | } | 
|  | } | 
|  | } | 
|  | else | 
|  | bSuccess = TRUE; | 
|  | } | 
|  | while (loop_next); | 
|  |  | 
|  | /* FIXME: Better check, when we have to create the cache file */ | 
|  | if(bSuccess && (lpwhr->hdr.dwFlags & INTERNET_FLAG_NEED_FILE)) { | 
|  | WCHAR url[INTERNET_MAX_URL_LENGTH]; | 
|  | WCHAR cacheFileName[MAX_PATH+1]; | 
|  | BOOL b; | 
|  |  | 
|  | b = HTTP_GetRequestURL(lpwhr, url); | 
|  | if(!b) { | 
|  | WARN("Could not get URL\n"); | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | b = CreateUrlCacheEntryW(url, lpwhr->dwContentLength > 0 ? lpwhr->dwContentLength : 0, NULL, cacheFileName, 0); | 
|  | if(b) { | 
|  | lpwhr->lpszCacheFile = WININET_strdupW(cacheFileName); | 
|  | lpwhr->hCacheFile = CreateFileW(lpwhr->lpszCacheFile, GENERIC_WRITE, FILE_SHARE_READ|FILE_SHARE_WRITE, | 
|  | NULL, CREATE_ALWAYS, FILE_ATTRIBUTE_NORMAL, NULL); | 
|  | if(lpwhr->hCacheFile == INVALID_HANDLE_VALUE) { | 
|  | WARN("Could not create file: %u\n", GetLastError()); | 
|  | lpwhr->hCacheFile = NULL; | 
|  | } | 
|  | }else { | 
|  | WARN("Could not create cache entry: %08x\n", GetLastError()); | 
|  | } | 
|  | } | 
|  |  | 
|  | lend: | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, requestString); | 
|  |  | 
|  | /* TODO: send notification for P3P header */ | 
|  |  | 
|  | iar.dwResult = (DWORD)bSuccess; | 
|  | iar.dwError = bSuccess ? ERROR_SUCCESS : INTERNET_GetLastError(); | 
|  |  | 
|  | INTERNET_SendCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_REQUEST_COMPLETE, &iar, | 
|  | sizeof(INTERNET_ASYNC_RESULT)); | 
|  |  | 
|  | TRACE("<--\n"); | 
|  | return bSuccess; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_Connect  (internal) | 
|  | * | 
|  | * Create http session handle | 
|  | * | 
|  | * RETURNS | 
|  | *   HINTERNET a session handle on success | 
|  | *   NULL on failure | 
|  | * | 
|  | */ | 
|  | HINTERNET HTTP_Connect(LPWININETAPPINFOW hIC, LPCWSTR lpszServerName, | 
|  | INTERNET_PORT nServerPort, LPCWSTR lpszUserName, | 
|  | LPCWSTR lpszPassword, DWORD dwFlags, DWORD_PTR dwContext, | 
|  | DWORD dwInternalFlags) | 
|  | { | 
|  | BOOL bSuccess = FALSE; | 
|  | LPWININETHTTPSESSIONW lpwhs = NULL; | 
|  | HINTERNET handle = NULL; | 
|  |  | 
|  | TRACE("-->\n"); | 
|  |  | 
|  | if (!lpszServerName || !lpszServerName[0]) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_INVALID_PARAMETER); | 
|  | goto lerror; | 
|  | } | 
|  |  | 
|  | assert( hIC->hdr.htype == WH_HINIT ); | 
|  |  | 
|  | lpwhs = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(WININETHTTPSESSIONW)); | 
|  | if (NULL == lpwhs) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_OUTOFMEMORY); | 
|  | goto lerror; | 
|  | } | 
|  |  | 
|  | /* | 
|  | * According to my tests. The name is not resolved until a request is sent | 
|  | */ | 
|  |  | 
|  | lpwhs->hdr.htype = WH_HHTTPSESSION; | 
|  | lpwhs->hdr.dwFlags = dwFlags; | 
|  | lpwhs->hdr.dwContext = dwContext; | 
|  | lpwhs->hdr.dwInternalFlags = dwInternalFlags | (hIC->hdr.dwInternalFlags & INET_CALLBACKW); | 
|  | lpwhs->hdr.dwRefCount = 1; | 
|  | lpwhs->hdr.close_connection = NULL; | 
|  | lpwhs->hdr.destroy = HTTP_CloseHTTPSessionHandle; | 
|  | lpwhs->hdr.lpfnStatusCB = hIC->hdr.lpfnStatusCB; | 
|  |  | 
|  | WININET_AddRef( &hIC->hdr ); | 
|  | lpwhs->lpAppInfo = hIC; | 
|  | list_add_head( &hIC->hdr.children, &lpwhs->hdr.entry ); | 
|  |  | 
|  | handle = WININET_AllocHandle( &lpwhs->hdr ); | 
|  | if (NULL == handle) | 
|  | { | 
|  | ERR("Failed to alloc handle\n"); | 
|  | INTERNET_SetLastError(ERROR_OUTOFMEMORY); | 
|  | goto lerror; | 
|  | } | 
|  |  | 
|  | if(hIC->lpszProxy && hIC->dwAccessType == INTERNET_OPEN_TYPE_PROXY) { | 
|  | if(strchrW(hIC->lpszProxy, ' ')) | 
|  | FIXME("Several proxies not implemented.\n"); | 
|  | if(hIC->lpszProxyBypass) | 
|  | FIXME("Proxy bypass is ignored.\n"); | 
|  | } | 
|  | if (lpszServerName && lpszServerName[0]) | 
|  | { | 
|  | lpwhs->lpszServerName = WININET_strdupW(lpszServerName); | 
|  | lpwhs->lpszHostName = WININET_strdupW(lpszServerName); | 
|  | } | 
|  | if (lpszUserName && lpszUserName[0]) | 
|  | lpwhs->lpszUserName = WININET_strdupW(lpszUserName); | 
|  | if (lpszPassword && lpszPassword[0]) | 
|  | lpwhs->lpszPassword = WININET_strdupW(lpszPassword); | 
|  | lpwhs->nServerPort = nServerPort; | 
|  | lpwhs->nHostPort = nServerPort; | 
|  |  | 
|  | /* Don't send a handle created callback if this handle was created with InternetOpenUrl */ | 
|  | if (!(lpwhs->hdr.dwInternalFlags & INET_OPENURL)) | 
|  | { | 
|  | INTERNET_SendCallback(&hIC->hdr, dwContext, | 
|  | INTERNET_STATUS_HANDLE_CREATED, &handle, | 
|  | sizeof(handle)); | 
|  | } | 
|  |  | 
|  | bSuccess = TRUE; | 
|  |  | 
|  | lerror: | 
|  | if( lpwhs ) | 
|  | WININET_Release( &lpwhs->hdr ); | 
|  |  | 
|  | /* | 
|  | * an INTERNET_STATUS_REQUEST_COMPLETE is NOT sent here as per my tests on | 
|  | * windows | 
|  | */ | 
|  |  | 
|  | TRACE("%p --> %p (%p)\n", hIC, handle, lpwhs); | 
|  | return handle; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_OpenConnection (internal) | 
|  | * | 
|  | * Connect to a web server | 
|  | * | 
|  | * RETURNS | 
|  | * | 
|  | *   TRUE  on success | 
|  | *   FALSE on failure | 
|  | */ | 
|  | static BOOL HTTP_OpenConnection(LPWININETHTTPREQW lpwhr) | 
|  | { | 
|  | BOOL bSuccess = FALSE; | 
|  | LPWININETHTTPSESSIONW lpwhs; | 
|  | LPWININETAPPINFOW hIC = NULL; | 
|  | char szaddr[32]; | 
|  |  | 
|  | TRACE("-->\n"); | 
|  |  | 
|  |  | 
|  | if (NULL == lpwhr ||  lpwhr->hdr.htype != WH_HHTTPREQ) | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_INVALID_PARAMETER); | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | if (NETCON_connected(&lpwhr->netConnection)) | 
|  | { | 
|  | bSuccess = TRUE; | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | lpwhs = lpwhr->lpHttpSession; | 
|  |  | 
|  | hIC = lpwhs->lpAppInfo; | 
|  | inet_ntop(lpwhs->socketAddress.sin_family, &lpwhs->socketAddress.sin_addr, | 
|  | szaddr, sizeof(szaddr)); | 
|  | INTERNET_SendCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_CONNECTING_TO_SERVER, | 
|  | szaddr, | 
|  | strlen(szaddr)+1); | 
|  |  | 
|  | if (!NETCON_create(&lpwhr->netConnection, lpwhs->socketAddress.sin_family, | 
|  | SOCK_STREAM, 0)) | 
|  | { | 
|  | WARN("Socket creation failed\n"); | 
|  | goto lend; | 
|  | } | 
|  |  | 
|  | if (!NETCON_connect(&lpwhr->netConnection, (struct sockaddr *)&lpwhs->socketAddress, | 
|  | sizeof(lpwhs->socketAddress))) | 
|  | goto lend; | 
|  |  | 
|  | if (lpwhr->hdr.dwFlags & INTERNET_FLAG_SECURE) | 
|  | { | 
|  | /* Note: we differ from Microsoft's WinINet here. they seem to have | 
|  | * a bug that causes no status callbacks to be sent when starting | 
|  | * a tunnel to a proxy server using the CONNECT verb. i believe our | 
|  | * behaviour to be more correct and to not cause any incompatibilities | 
|  | * because using a secure connection through a proxy server is a rare | 
|  | * case that would be hard for anyone to depend on */ | 
|  | if (hIC->lpszProxy && !HTTP_SecureProxyConnect(lpwhr)) | 
|  | goto lend; | 
|  |  | 
|  | if (!NETCON_secure_connect(&lpwhr->netConnection, lpwhs->lpszHostName)) | 
|  | { | 
|  | WARN("Couldn't connect securely to host\n"); | 
|  | goto lend; | 
|  | } | 
|  | } | 
|  |  | 
|  | INTERNET_SendCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_CONNECTED_TO_SERVER, | 
|  | szaddr, strlen(szaddr)+1); | 
|  |  | 
|  | bSuccess = TRUE; | 
|  |  | 
|  | lend: | 
|  | TRACE("%d <--\n", bSuccess); | 
|  | return bSuccess; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_clear_response_headers (internal) | 
|  | * | 
|  | * clear out any old response headers | 
|  | */ | 
|  | static void HTTP_clear_response_headers( LPWININETHTTPREQW lpwhr ) | 
|  | { | 
|  | DWORD i; | 
|  |  | 
|  | for( i=0; i<lpwhr->nCustHeaders; i++) | 
|  | { | 
|  | if( !lpwhr->pCustHeaders[i].lpszField ) | 
|  | continue; | 
|  | if( !lpwhr->pCustHeaders[i].lpszValue ) | 
|  | continue; | 
|  | if ( lpwhr->pCustHeaders[i].wFlags & HDR_ISREQUEST ) | 
|  | continue; | 
|  | HTTP_DeleteCustomHeader( lpwhr, i ); | 
|  | i--; | 
|  | } | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_GetResponseHeaders (internal) | 
|  | * | 
|  | * Read server response | 
|  | * | 
|  | * RETURNS | 
|  | * | 
|  | *   TRUE  on success | 
|  | *   FALSE on error | 
|  | */ | 
|  | static INT HTTP_GetResponseHeaders(LPWININETHTTPREQW lpwhr) | 
|  | { | 
|  | INT cbreaks = 0; | 
|  | WCHAR buffer[MAX_REPLY_LEN]; | 
|  | DWORD buflen = MAX_REPLY_LEN; | 
|  | BOOL bSuccess = FALSE; | 
|  | INT  rc = 0; | 
|  | static const WCHAR szCrLf[] = {'\r','\n',0}; | 
|  | static const WCHAR szHundred[] = {'1','0','0',0}; | 
|  | char bufferA[MAX_REPLY_LEN]; | 
|  | LPWSTR status_code, status_text; | 
|  | DWORD cchMaxRawHeaders = 1024; | 
|  | LPWSTR lpszRawHeaders = HeapAlloc(GetProcessHeap(), 0, (cchMaxRawHeaders+1)*sizeof(WCHAR)); | 
|  | DWORD cchRawHeaders = 0; | 
|  |  | 
|  | TRACE("-->\n"); | 
|  |  | 
|  | /* clear old response headers (eg. from a redirect response) */ | 
|  | HTTP_clear_response_headers( lpwhr ); | 
|  |  | 
|  | if (!NETCON_connected(&lpwhr->netConnection)) | 
|  | goto lend; | 
|  |  | 
|  | do { | 
|  | /* | 
|  | * HACK peek at the buffer | 
|  | */ | 
|  | buflen = MAX_REPLY_LEN; | 
|  | NETCON_recv(&lpwhr->netConnection, buffer, buflen, MSG_PEEK, &rc); | 
|  |  | 
|  | /* | 
|  | * We should first receive 'HTTP/1.x nnn OK' where nnn is the status code. | 
|  | */ | 
|  | memset(buffer, 0, MAX_REPLY_LEN); | 
|  | if (!NETCON_getNextLine(&lpwhr->netConnection, bufferA, &buflen)) | 
|  | goto lend; | 
|  | MultiByteToWideChar( CP_ACP, 0, bufferA, buflen, buffer, MAX_REPLY_LEN ); | 
|  |  | 
|  | /* split the version from the status code */ | 
|  | status_code = strchrW( buffer, ' ' ); | 
|  | if( !status_code ) | 
|  | goto lend; | 
|  | *status_code++=0; | 
|  |  | 
|  | /* split the status code from the status text */ | 
|  | status_text = strchrW( status_code, ' ' ); | 
|  | if( !status_text ) | 
|  | goto lend; | 
|  | *status_text++=0; | 
|  |  | 
|  | TRACE("version [%s] status code [%s] status text [%s]\n", | 
|  | debugstr_w(buffer), debugstr_w(status_code), debugstr_w(status_text) ); | 
|  |  | 
|  | } while (!strcmpW(status_code, szHundred)); /* ignore "100 Continue" responses */ | 
|  |  | 
|  | /* regenerate raw headers */ | 
|  | while (cchRawHeaders + buflen + strlenW(szCrLf) > cchMaxRawHeaders) | 
|  | { | 
|  | cchMaxRawHeaders *= 2; | 
|  | lpszRawHeaders = HeapReAlloc(GetProcessHeap(), 0, lpszRawHeaders, (cchMaxRawHeaders+1)*sizeof(WCHAR)); | 
|  | } | 
|  | memcpy(lpszRawHeaders+cchRawHeaders, buffer, (buflen-1)*sizeof(WCHAR)); | 
|  | cchRawHeaders += (buflen-1); | 
|  | memcpy(lpszRawHeaders+cchRawHeaders, szCrLf, sizeof(szCrLf)); | 
|  | cchRawHeaders += sizeof(szCrLf)/sizeof(szCrLf[0])-1; | 
|  | lpszRawHeaders[cchRawHeaders] = '\0'; | 
|  |  | 
|  | HTTP_ProcessHeader(lpwhr, szStatus, status_code, | 
|  | HTTP_ADDHDR_FLAG_REPLACE); | 
|  |  | 
|  | HeapFree(GetProcessHeap(),0,lpwhr->lpszVersion); | 
|  | HeapFree(GetProcessHeap(),0,lpwhr->lpszStatusText); | 
|  |  | 
|  | lpwhr->lpszVersion= WININET_strdupW(buffer); | 
|  | lpwhr->lpszStatusText = WININET_strdupW(status_text); | 
|  |  | 
|  | /* Parse each response line */ | 
|  | do | 
|  | { | 
|  | buflen = MAX_REPLY_LEN; | 
|  | if (NETCON_getNextLine(&lpwhr->netConnection, bufferA, &buflen)) | 
|  | { | 
|  | LPWSTR * pFieldAndValue; | 
|  |  | 
|  | TRACE("got line %s, now interpreting\n", debugstr_a(bufferA)); | 
|  | MultiByteToWideChar( CP_ACP, 0, bufferA, buflen, buffer, MAX_REPLY_LEN ); | 
|  |  | 
|  | while (cchRawHeaders + buflen + strlenW(szCrLf) > cchMaxRawHeaders) | 
|  | { | 
|  | cchMaxRawHeaders *= 2; | 
|  | lpszRawHeaders = HeapReAlloc(GetProcessHeap(), 0, lpszRawHeaders, (cchMaxRawHeaders+1)*sizeof(WCHAR)); | 
|  | } | 
|  | memcpy(lpszRawHeaders+cchRawHeaders, buffer, (buflen-1)*sizeof(WCHAR)); | 
|  | cchRawHeaders += (buflen-1); | 
|  | memcpy(lpszRawHeaders+cchRawHeaders, szCrLf, sizeof(szCrLf)); | 
|  | cchRawHeaders += sizeof(szCrLf)/sizeof(szCrLf[0])-1; | 
|  | lpszRawHeaders[cchRawHeaders] = '\0'; | 
|  |  | 
|  | pFieldAndValue = HTTP_InterpretHttpHeader(buffer); | 
|  | if (!pFieldAndValue) | 
|  | break; | 
|  |  | 
|  | HTTP_ProcessHeader(lpwhr, pFieldAndValue[0], pFieldAndValue[1], | 
|  | HTTP_ADDREQ_FLAG_ADD ); | 
|  |  | 
|  | HTTP_FreeTokens(pFieldAndValue); | 
|  | } | 
|  | else | 
|  | { | 
|  | cbreaks++; | 
|  | if (cbreaks >= 2) | 
|  | break; | 
|  | } | 
|  | }while(1); | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->lpszRawHeaders); | 
|  | lpwhr->lpszRawHeaders = lpszRawHeaders; | 
|  | TRACE("raw headers: %s\n", debugstr_w(lpszRawHeaders)); | 
|  | bSuccess = TRUE; | 
|  |  | 
|  | lend: | 
|  |  | 
|  | TRACE("<--\n"); | 
|  | if (bSuccess) | 
|  | return rc; | 
|  | else | 
|  | return 0; | 
|  | } | 
|  |  | 
|  |  | 
|  | static void strip_spaces(LPWSTR start) | 
|  | { | 
|  | LPWSTR str = start; | 
|  | LPWSTR end; | 
|  |  | 
|  | while (*str == ' ' && *str != '\0') | 
|  | str++; | 
|  |  | 
|  | if (str != start) | 
|  | memmove(start, str, sizeof(WCHAR) * (strlenW(str) + 1)); | 
|  |  | 
|  | end = start + strlenW(start) - 1; | 
|  | while (end >= start && *end == ' ') | 
|  | { | 
|  | *end = '\0'; | 
|  | end--; | 
|  | } | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_InterpretHttpHeader (internal) | 
|  | * | 
|  | * Parse server response | 
|  | * | 
|  | * RETURNS | 
|  | * | 
|  | *   Pointer to array of field, value, NULL on success. | 
|  | *   NULL on error. | 
|  | */ | 
|  | static LPWSTR * HTTP_InterpretHttpHeader(LPCWSTR buffer) | 
|  | { | 
|  | LPWSTR * pTokenPair; | 
|  | LPWSTR pszColon; | 
|  | INT len; | 
|  |  | 
|  | pTokenPair = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(*pTokenPair)*3); | 
|  |  | 
|  | pszColon = strchrW(buffer, ':'); | 
|  | /* must have two tokens */ | 
|  | if (!pszColon) | 
|  | { | 
|  | HTTP_FreeTokens(pTokenPair); | 
|  | if (buffer[0]) | 
|  | TRACE("No ':' in line: %s\n", debugstr_w(buffer)); | 
|  | return NULL; | 
|  | } | 
|  |  | 
|  | pTokenPair[0] = HeapAlloc(GetProcessHeap(), 0, (pszColon - buffer + 1) * sizeof(WCHAR)); | 
|  | if (!pTokenPair[0]) | 
|  | { | 
|  | HTTP_FreeTokens(pTokenPair); | 
|  | return NULL; | 
|  | } | 
|  | memcpy(pTokenPair[0], buffer, (pszColon - buffer) * sizeof(WCHAR)); | 
|  | pTokenPair[0][pszColon - buffer] = '\0'; | 
|  |  | 
|  | /* skip colon */ | 
|  | pszColon++; | 
|  | len = strlenW(pszColon); | 
|  | pTokenPair[1] = HeapAlloc(GetProcessHeap(), 0, (len + 1) * sizeof(WCHAR)); | 
|  | if (!pTokenPair[1]) | 
|  | { | 
|  | HTTP_FreeTokens(pTokenPair); | 
|  | return NULL; | 
|  | } | 
|  | memcpy(pTokenPair[1], pszColon, (len + 1) * sizeof(WCHAR)); | 
|  |  | 
|  | strip_spaces(pTokenPair[0]); | 
|  | strip_spaces(pTokenPair[1]); | 
|  |  | 
|  | TRACE("field(%s) Value(%s)\n", debugstr_w(pTokenPair[0]), debugstr_w(pTokenPair[1])); | 
|  | return pTokenPair; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_ProcessHeader (internal) | 
|  | * | 
|  | * Stuff header into header tables according to <dwModifier> | 
|  | * | 
|  | */ | 
|  |  | 
|  | #define COALESCEFLAGS (HTTP_ADDHDR_FLAG_COALESCE|HTTP_ADDHDR_FLAG_COALESCE_WITH_COMMA|HTTP_ADDHDR_FLAG_COALESCE_WITH_SEMICOLON) | 
|  |  | 
|  | static BOOL HTTP_ProcessHeader(LPWININETHTTPREQW lpwhr, LPCWSTR field, LPCWSTR value, DWORD dwModifier) | 
|  | { | 
|  | LPHTTPHEADERW lphttpHdr = NULL; | 
|  | BOOL bSuccess = FALSE; | 
|  | INT index = -1; | 
|  | BOOL request_only = dwModifier & HTTP_ADDHDR_FLAG_REQ; | 
|  |  | 
|  | TRACE("--> %s: %s - 0x%08x\n", debugstr_w(field), debugstr_w(value), dwModifier); | 
|  |  | 
|  | /* REPLACE wins out over ADD */ | 
|  | if (dwModifier & HTTP_ADDHDR_FLAG_REPLACE) | 
|  | dwModifier &= ~HTTP_ADDHDR_FLAG_ADD; | 
|  |  | 
|  | if (dwModifier & HTTP_ADDHDR_FLAG_ADD) | 
|  | index = -1; | 
|  | else | 
|  | index = HTTP_GetCustomHeaderIndex(lpwhr, field, 0, request_only); | 
|  |  | 
|  | if (index >= 0) | 
|  | { | 
|  | if (dwModifier & HTTP_ADDHDR_FLAG_ADD_IF_NEW) | 
|  | { | 
|  | return FALSE; | 
|  | } | 
|  | lphttpHdr = &lpwhr->pCustHeaders[index]; | 
|  | } | 
|  | else if (value) | 
|  | { | 
|  | HTTPHEADERW hdr; | 
|  |  | 
|  | hdr.lpszField = (LPWSTR)field; | 
|  | hdr.lpszValue = (LPWSTR)value; | 
|  | hdr.wFlags = hdr.wCount = 0; | 
|  |  | 
|  | if (dwModifier & HTTP_ADDHDR_FLAG_REQ) | 
|  | hdr.wFlags |= HDR_ISREQUEST; | 
|  |  | 
|  | return HTTP_InsertCustomHeader(lpwhr, &hdr); | 
|  | } | 
|  | /* no value to delete */ | 
|  | else return TRUE; | 
|  |  | 
|  | if (dwModifier & HTTP_ADDHDR_FLAG_REQ) | 
|  | lphttpHdr->wFlags |= HDR_ISREQUEST; | 
|  | else | 
|  | lphttpHdr->wFlags &= ~HDR_ISREQUEST; | 
|  |  | 
|  | if (dwModifier & HTTP_ADDHDR_FLAG_REPLACE) | 
|  | { | 
|  | HTTP_DeleteCustomHeader( lpwhr, index ); | 
|  |  | 
|  | if (value) | 
|  | { | 
|  | HTTPHEADERW hdr; | 
|  |  | 
|  | hdr.lpszField = (LPWSTR)field; | 
|  | hdr.lpszValue = (LPWSTR)value; | 
|  | hdr.wFlags = hdr.wCount = 0; | 
|  |  | 
|  | if (dwModifier & HTTP_ADDHDR_FLAG_REQ) | 
|  | hdr.wFlags |= HDR_ISREQUEST; | 
|  |  | 
|  | return HTTP_InsertCustomHeader(lpwhr, &hdr); | 
|  | } | 
|  |  | 
|  | return TRUE; | 
|  | } | 
|  | else if (dwModifier & COALESCEFLAGS) | 
|  | { | 
|  | LPWSTR lpsztmp; | 
|  | WCHAR ch = 0; | 
|  | INT len = 0; | 
|  | INT origlen = strlenW(lphttpHdr->lpszValue); | 
|  | INT valuelen = strlenW(value); | 
|  |  | 
|  | if (dwModifier & HTTP_ADDHDR_FLAG_COALESCE_WITH_COMMA) | 
|  | { | 
|  | ch = ','; | 
|  | lphttpHdr->wFlags |= HDR_COMMADELIMITED; | 
|  | } | 
|  | else if (dwModifier & HTTP_ADDHDR_FLAG_COALESCE_WITH_SEMICOLON) | 
|  | { | 
|  | ch = ';'; | 
|  | lphttpHdr->wFlags |= HDR_COMMADELIMITED; | 
|  | } | 
|  |  | 
|  | len = origlen + valuelen + ((ch > 0) ? 2 : 0); | 
|  |  | 
|  | lpsztmp = HeapReAlloc(GetProcessHeap(), 0, lphttpHdr->lpszValue, (len+1)*sizeof(WCHAR)); | 
|  | if (lpsztmp) | 
|  | { | 
|  | lphttpHdr->lpszValue = lpsztmp; | 
|  | /* FIXME: Increment lphttpHdr->wCount. Perhaps lpszValue should be an array */ | 
|  | if (ch > 0) | 
|  | { | 
|  | lphttpHdr->lpszValue[origlen] = ch; | 
|  | origlen++; | 
|  | lphttpHdr->lpszValue[origlen] = ' '; | 
|  | origlen++; | 
|  | } | 
|  |  | 
|  | memcpy(&lphttpHdr->lpszValue[origlen], value, valuelen*sizeof(WCHAR)); | 
|  | lphttpHdr->lpszValue[len] = '\0'; | 
|  | bSuccess = TRUE; | 
|  | } | 
|  | else | 
|  | { | 
|  | WARN("HeapReAlloc (%d bytes) failed\n",len+1); | 
|  | INTERNET_SetLastError(ERROR_OUTOFMEMORY); | 
|  | } | 
|  | } | 
|  | TRACE("<-- %d\n",bSuccess); | 
|  | return bSuccess; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_CloseConnection (internal) | 
|  | * | 
|  | * Close socket connection | 
|  | * | 
|  | */ | 
|  | static void HTTP_CloseConnection(LPWININETHANDLEHEADER hdr) | 
|  | { | 
|  | LPWININETHTTPREQW lpwhr = (LPWININETHTTPREQW) hdr; | 
|  | LPWININETHTTPSESSIONW lpwhs = NULL; | 
|  | LPWININETAPPINFOW hIC = NULL; | 
|  |  | 
|  | TRACE("%p\n",lpwhr); | 
|  |  | 
|  | if (!NETCON_connected(&lpwhr->netConnection)) | 
|  | return; | 
|  |  | 
|  | if (lpwhr->pAuthInfo) | 
|  | { | 
|  | DeleteSecurityContext(&lpwhr->pAuthInfo->ctx); | 
|  | FreeCredentialsHandle(&lpwhr->pAuthInfo->cred); | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->pAuthInfo->auth_data); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->pAuthInfo->scheme); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->pAuthInfo); | 
|  | lpwhr->pAuthInfo = NULL; | 
|  | } | 
|  | if (lpwhr->pProxyAuthInfo) | 
|  | { | 
|  | DeleteSecurityContext(&lpwhr->pProxyAuthInfo->ctx); | 
|  | FreeCredentialsHandle(&lpwhr->pProxyAuthInfo->cred); | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->pProxyAuthInfo->auth_data); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->pProxyAuthInfo->scheme); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->pProxyAuthInfo); | 
|  | lpwhr->pProxyAuthInfo = NULL; | 
|  | } | 
|  |  | 
|  | lpwhs = lpwhr->lpHttpSession; | 
|  | hIC = lpwhs->lpAppInfo; | 
|  |  | 
|  | INTERNET_SendCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_CLOSING_CONNECTION, 0, 0); | 
|  |  | 
|  | NETCON_close(&lpwhr->netConnection); | 
|  |  | 
|  | INTERNET_SendCallback(&lpwhr->hdr, lpwhr->hdr.dwContext, | 
|  | INTERNET_STATUS_CONNECTION_CLOSED, 0, 0); | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_FinishedReading (internal) | 
|  | * | 
|  | * Called when all content from server has been read by client. | 
|  | * | 
|  | */ | 
|  | BOOL HTTP_FinishedReading(LPWININETHTTPREQW lpwhr) | 
|  | { | 
|  | WCHAR szConnectionResponse[20]; | 
|  | DWORD dwBufferSize = sizeof(szConnectionResponse); | 
|  |  | 
|  | TRACE("\n"); | 
|  |  | 
|  | if (!HTTP_HttpQueryInfoW(lpwhr, HTTP_QUERY_CONNECTION, szConnectionResponse, | 
|  | &dwBufferSize, NULL) || | 
|  | strcmpiW(szConnectionResponse, szKeepAlive)) | 
|  | { | 
|  | HTTP_CloseConnection(&lpwhr->hdr); | 
|  | } | 
|  |  | 
|  | /* FIXME: store data in the URL cache here */ | 
|  |  | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_CloseHTTPRequestHandle (internal) | 
|  | * | 
|  | * Deallocate request handle | 
|  | * | 
|  | */ | 
|  | static void HTTP_CloseHTTPRequestHandle(LPWININETHANDLEHEADER hdr) | 
|  | { | 
|  | DWORD i; | 
|  | LPWININETHTTPREQW lpwhr = (LPWININETHTTPREQW) hdr; | 
|  |  | 
|  | TRACE("\n"); | 
|  |  | 
|  | if(lpwhr->hCacheFile) | 
|  | CloseHandle(lpwhr->hCacheFile); | 
|  |  | 
|  | if(lpwhr->lpszCacheFile) { | 
|  | DeleteFileW(lpwhr->lpszCacheFile); /* FIXME */ | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->lpszCacheFile); | 
|  | } | 
|  |  | 
|  | WININET_Release(&lpwhr->lpHttpSession->hdr); | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->lpszPath); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->lpszVerb); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->lpszRawHeaders); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->lpszVersion); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->lpszStatusText); | 
|  |  | 
|  | for (i = 0; i < lpwhr->nCustHeaders; i++) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->pCustHeaders[i].lpszField); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->pCustHeaders[i].lpszValue); | 
|  | } | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr->pCustHeaders); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhr); | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_CloseHTTPSessionHandle (internal) | 
|  | * | 
|  | * Deallocate session handle | 
|  | * | 
|  | */ | 
|  | static void HTTP_CloseHTTPSessionHandle(LPWININETHANDLEHEADER hdr) | 
|  | { | 
|  | LPWININETHTTPSESSIONW lpwhs = (LPWININETHTTPSESSIONW) hdr; | 
|  |  | 
|  | TRACE("%p\n", lpwhs); | 
|  |  | 
|  | WININET_Release(&lpwhs->lpAppInfo->hdr); | 
|  |  | 
|  | HeapFree(GetProcessHeap(), 0, lpwhs->lpszHostName); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhs->lpszServerName); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhs->lpszPassword); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhs->lpszUserName); | 
|  | HeapFree(GetProcessHeap(), 0, lpwhs); | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_GetCustomHeaderIndex (internal) | 
|  | * | 
|  | * Return index of custom header from header array | 
|  | * | 
|  | */ | 
|  | static INT HTTP_GetCustomHeaderIndex(LPWININETHTTPREQW lpwhr, LPCWSTR lpszField, | 
|  | int requested_index, BOOL request_only) | 
|  | { | 
|  | DWORD index; | 
|  |  | 
|  | TRACE("%s\n", debugstr_w(lpszField)); | 
|  |  | 
|  | for (index = 0; index < lpwhr->nCustHeaders; index++) | 
|  | { | 
|  | if (strcmpiW(lpwhr->pCustHeaders[index].lpszField, lpszField)) | 
|  | continue; | 
|  |  | 
|  | if (request_only && !(lpwhr->pCustHeaders[index].wFlags & HDR_ISREQUEST)) | 
|  | continue; | 
|  |  | 
|  | if (!request_only && (lpwhr->pCustHeaders[index].wFlags & HDR_ISREQUEST)) | 
|  | continue; | 
|  |  | 
|  | if (requested_index == 0) | 
|  | break; | 
|  | requested_index --; | 
|  | } | 
|  |  | 
|  | if (index >= lpwhr->nCustHeaders) | 
|  | index = -1; | 
|  |  | 
|  | TRACE("Return: %d\n", index); | 
|  | return index; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_InsertCustomHeader (internal) | 
|  | * | 
|  | * Insert header into array | 
|  | * | 
|  | */ | 
|  | static BOOL HTTP_InsertCustomHeader(LPWININETHTTPREQW lpwhr, LPHTTPHEADERW lpHdr) | 
|  | { | 
|  | INT count; | 
|  | LPHTTPHEADERW lph = NULL; | 
|  | BOOL r = FALSE; | 
|  |  | 
|  | TRACE("--> %s: %s\n", debugstr_w(lpHdr->lpszField), debugstr_w(lpHdr->lpszValue)); | 
|  | count = lpwhr->nCustHeaders + 1; | 
|  | if (count > 1) | 
|  | lph = HeapReAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, lpwhr->pCustHeaders, sizeof(HTTPHEADERW) * count); | 
|  | else | 
|  | lph = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(HTTPHEADERW) * count); | 
|  |  | 
|  | if (NULL != lph) | 
|  | { | 
|  | lpwhr->pCustHeaders = lph; | 
|  | lpwhr->pCustHeaders[count-1].lpszField = WININET_strdupW(lpHdr->lpszField); | 
|  | lpwhr->pCustHeaders[count-1].lpszValue = WININET_strdupW(lpHdr->lpszValue); | 
|  | lpwhr->pCustHeaders[count-1].wFlags = lpHdr->wFlags; | 
|  | lpwhr->pCustHeaders[count-1].wCount= lpHdr->wCount; | 
|  | lpwhr->nCustHeaders++; | 
|  | r = TRUE; | 
|  | } | 
|  | else | 
|  | { | 
|  | INTERNET_SetLastError(ERROR_OUTOFMEMORY); | 
|  | } | 
|  |  | 
|  | return r; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_DeleteCustomHeader (internal) | 
|  | * | 
|  | * Delete header from array | 
|  | *  If this function is called, the indexs may change. | 
|  | */ | 
|  | static BOOL HTTP_DeleteCustomHeader(LPWININETHTTPREQW lpwhr, DWORD index) | 
|  | { | 
|  | if( lpwhr->nCustHeaders <= 0 ) | 
|  | return FALSE; | 
|  | if( index >= lpwhr->nCustHeaders ) | 
|  | return FALSE; | 
|  | lpwhr->nCustHeaders--; | 
|  |  | 
|  | memmove( &lpwhr->pCustHeaders[index], &lpwhr->pCustHeaders[index+1], | 
|  | (lpwhr->nCustHeaders - index)* sizeof(HTTPHEADERW) ); | 
|  | memset( &lpwhr->pCustHeaders[lpwhr->nCustHeaders], 0, sizeof(HTTPHEADERW) ); | 
|  |  | 
|  | return TRUE; | 
|  | } | 
|  |  | 
|  |  | 
|  | /*********************************************************************** | 
|  | *           HTTP_VerifyValidHeader (internal) | 
|  | * | 
|  | * Verify the given header is not invalid for the given http request | 
|  | * | 
|  | */ | 
|  | static BOOL HTTP_VerifyValidHeader(LPWININETHTTPREQW lpwhr, LPCWSTR field) | 
|  | { | 
|  | BOOL rc = TRUE; | 
|  |  | 
|  | /* Accept-Encoding is stripped from HTTP/1.0 requests. It is invalid */ | 
|  | if (strcmpiW(field,szAccept_Encoding)==0) | 
|  | return FALSE; | 
|  |  | 
|  | return rc; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *          IsHostInProxyBypassList (@) | 
|  | * | 
|  | * Undocumented | 
|  | * | 
|  | */ | 
|  | BOOL WINAPI IsHostInProxyBypassList(DWORD flags, LPCSTR szHost, DWORD length) | 
|  | { | 
|  | FIXME("STUB: flags=%d host=%s length=%d\n",flags,szHost,length); | 
|  | return FALSE; | 
|  | } |