From c19844a0a3d7f7d1c7351de65605d13d422f2600 Mon Sep 17 00:00:00 2001 From: Daniel Stenberg Date: Fri, 13 Sep 2002 12:40:36 +0000 Subject: better deal with HTTP(S) servers that respond with no headers at all, test case 306 added to verify that we do right --- lib/http.c | 6 ++++-- lib/transfer.c | 44 ++++++++++++++++++++++++++++++++------------ lib/urldata.h | 4 ++-- 3 files changed, 38 insertions(+), 16 deletions(-) (limited to 'lib') diff --git a/lib/http.c b/lib/http.c index 6a71e47b1..177d61100 100644 --- a/lib/http.c +++ b/lib/http.c @@ -965,7 +965,8 @@ CURLcode Curl_http(struct connectdata *conn) failf(data, "Failed sending HTTP POST request"); else result = - Curl_Transfer(conn, conn->firstsocket, -1, TRUE, bytecount, + Curl_Transfer(conn, conn->firstsocket, -1, TRUE, + &http->readbytecount, data->set.postfields?-1:conn->firstsocket, data->set.postfields?NULL:&http->writebytecount); break; @@ -981,7 +982,8 @@ CURLcode Curl_http(struct connectdata *conn) failf(data, "Failed sending HTTP request"); else /* HTTP GET/HEAD download: */ - result = Curl_Transfer(conn, conn->firstsocket, -1, TRUE, bytecount, + result = Curl_Transfer(conn, conn->firstsocket, -1, TRUE, + &http->readbytecount, -1, NULL); /* nothing to upload */ } if(result) diff --git a/lib/transfer.c b/lib/transfer.c index e95e92d62..22fffa6a1 100644 --- a/lib/transfer.c +++ b/lib/transfer.c @@ -292,8 +292,18 @@ CURLcode Curl_readwrite(struct connectdata *conn, k->hbufp = data->state.headerbuff + hbufp_index; } strcpy (k->hbufp, k->str); - k->hbufp += strlen (k->str); - k->hbuflen += strlen (k->str); + k->hbufp += str_length; + k->hbuflen += str_length; + if (!k->headerline && (k->hbuflen>5)) { + /* make a first check that this looks like a HTTP header */ + if(!strnequal(data->state.headerbuff, "HTTP/", 5)) { + /* this is not the beginning of a HTTP first header line */ + k->header = FALSE; + k->badheader = TRUE; + break; + } + } + break; /* read more and try again */ } @@ -496,22 +506,24 @@ CURLcode Curl_readwrite(struct connectdata *conn, } } else { - k->header = FALSE; /* this is not a header line */ + k->header = FALSE; /* this is not a header line */ + k->badheader = TRUE; /* this was a bad header */ break; } } + /* check for Content-Length: header lines to get size */ if (strnequal("Content-Length:", k->p, 15) && sscanf (k->p+15, " %ld", &k->contentlength)) { conn->size = k->contentlength; Curl_pgrsSetDownloadSize(data, k->contentlength); - } + } /* check for Content-Type: header lines to get the mime-type */ else if (strnequal("Content-Type:", k->p, 13)) { char *start; char *end; int len; - + /* Find the first non-space letter */ for(start=k->p+14; *start && isspace((int)*start); @@ -525,10 +537,10 @@ CURLcode Curl_readwrite(struct connectdata *conn, /* allocate memory of a cloned copy */ data->info.contenttype = malloc(len + 1); if (NULL == data->info.contenttype) - return CURLE_OUT_OF_MEMORY; + return CURLE_OUT_OF_MEMORY; /* copy the content-type string */ - memcpy(data->info.contenttype, start, len); + memcpy(data->info.contenttype, start, len); data->info.contenttype[len] = 0; /* zero terminate */ } else if((k->httpversion == 10) && @@ -690,8 +702,7 @@ CURLcode Curl_readwrite(struct connectdata *conn, buffer. */ if (!k->header) { - /* the next token and forward is not part of - the header! */ + /* starting here, this is not part of the header! */ /* we subtract the remaining header size from the buffer */ nread -= (k->str - k->buf); @@ -712,8 +723,8 @@ CURLcode Curl_readwrite(struct connectdata *conn, if (conn->newurl) { /* abort after the headers if "follow Location" is set */ infof (data, "Follow to new URL: %s\n", conn->newurl); - k->keepon &= ~KEEP_READ; - FD_ZERO(&k->rkeepfd); + k->keepon &= ~KEEP_READ; + FD_ZERO(&k->rkeepfd); return CURLE_OK; } else if (conn->resume_from && @@ -804,9 +815,18 @@ CURLcode Curl_readwrite(struct connectdata *conn, Curl_pgrsSetDownloadCounter(data, (double)k->bytecount); - if(!conn->bits.chunk && nread) { + if(!conn->bits.chunk && (nread || k->badheader)) { /* If this is chunky transfer, it was already written */ + if(k->badheader) { + /* we parsed a piece of data wrongly assuming it was a header + and now we output it as body instead */ + result = Curl_client_write(data, CLIENTWRITE_BODY, + data->state.headerbuff, + k->hbuflen); + k->badheader = FALSE; /* taken care of now */ + } + /* This switch handles various content encodings. If there's an error here, be sure to check over the almost identical code in http_chunk.c. 08/29/02 jhrg */ diff --git a/lib/urldata.h b/lib/urldata.h index 6d3f9ce73..f4cca8fda 100644 --- a/lib/urldata.h +++ b/lib/urldata.h @@ -229,6 +229,8 @@ struct Curl_transfer_keeper { struct timeval start; /* transfer started at this time */ struct timeval now; /* current time */ bool header; /* incoming data has HTTP header */ + bool badheader; /* the header was deemed bad and will be + written as body */ int headerline; /* counts header lines to better track the first one */ char *hbufp; /* points at *end* of header line */ @@ -245,8 +247,6 @@ struct Curl_transfer_keeper { bool write_after_100_header; /* should we enable the write after we received a 100-continue/timeout or directly */ - - /* for content-encoding 08/28/02 jhrg */ int content_encoding; /* What content encoding. sec 3.5, RFC2616. */ #define IDENTITY 0 /* No encoding */ -- cgit v1.2.3