kernelbase: Remove unnecessary handler from LocalUnlock.
[wine.git] / programs / winetest / send.c
blob2416faa3192fcd16f52fbdcb2e8d8d7cf8dee469
1 /*
2 * HTTP handling functions.
4 * Copyright 2003 Ferenc Wagner
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21 #include <winsock2.h>
22 #include <wininet.h>
23 #include <stdio.h>
24 #include <errno.h>
26 #include "winetest.h"
28 #define USER_AGENT "Winetest Shell"
29 #define SERVER_NAME "test.winehq.org"
30 #define URL_PATH "/submit"
31 #define SEP "--8<--cut-here--8<--"
32 #define CONTENT_HEADERS "Content-Type: multipart/form-data; boundary=\"" SEP "\"\r\n" \
33 "Content-Length: %u\r\n\r\n"
34 static const char body1[] = "--" SEP "\r\n"
35 "Content-Disposition: form-data; name=\"reportfile\"; filename=\"%s\"\r\n"
36 "Content-Type: application/octet-stream\r\n\r\n";
37 static const char body2[] = "\r\n--" SEP "\r\n"
38 "Content-Disposition: form-data; name=\"submit\"\r\n\r\n"
39 "Upload File\r\n"
40 "--" SEP "--\r\n";
42 static SOCKET
43 open_http (const char *server)
45 WSADATA wsad;
46 struct sockaddr_in sa;
47 SOCKET s;
49 report (R_STATUS, "Opening HTTP connection to %s", server);
50 if (WSAStartup (MAKEWORD (2,2), &wsad)) return INVALID_SOCKET;
52 sa.sin_family = AF_INET;
53 sa.sin_port = htons (80);
54 sa.sin_addr.s_addr = inet_addr (server);
55 memset (sa.sin_zero, 0, sizeof(sa.sin_zero));
56 if (sa.sin_addr.s_addr == INADDR_NONE) {
57 struct hostent *host = gethostbyname (server);
58 if (!host) {
59 report (R_ERROR, "Hostname lookup failed for %s", server);
60 goto failure;
62 sa.sin_addr.s_addr = ((struct in_addr *)host->h_addr)->s_addr;
64 s = socket (AF_INET, SOCK_STREAM, IPPROTO_TCP);
65 if (s == INVALID_SOCKET) {
66 report (R_ERROR, "Can't open network socket: %d",
67 WSAGetLastError ());
68 goto failure;
70 if (!connect (s, (struct sockaddr*)&sa, sizeof (struct sockaddr_in)))
71 return s;
73 report (R_ERROR, "Can't connect: %d", WSAGetLastError ());
74 closesocket (s);
75 failure:
76 WSACleanup ();
77 return INVALID_SOCKET;
80 static int
81 close_http (SOCKET s)
83 int ret;
85 ret = closesocket (s);
86 return (WSACleanup () || ret);
89 static int
90 send_buf (SOCKET s, const char *buf, size_t length)
92 int sent;
94 while (length > 0) {
95 sent = send (s, buf, length, 0);
96 if (sent == SOCKET_ERROR) {
97 if (errno == EINTR) continue;
98 return 1;
100 buf += sent;
101 length -= sent;
103 return 0;
106 static int WINAPIV send_str (SOCKET s, ...)
108 va_list ap;
109 char *p;
110 int ret;
111 size_t len;
113 va_start (ap, s);
114 p = vstrmake (&len, ap);
115 va_end (ap);
116 if (!p) return 1;
117 ret = send_buf (s, p, len);
118 heap_free (p);
119 return ret;
122 static int
123 send_file_direct (const char * url, const char *name)
125 SOCKET s;
126 HANDLE file;
127 #define BUFLEN 8192
128 char buffer[BUFLEN+1];
129 DWORD bytes_read, filesize;
130 size_t total, count;
131 char *str;
132 int ret;
134 /* RFC 2616 */
135 static const char head[] = "POST " URL_PATH " HTTP/1.0\r\n"
136 "Host: " SERVER_NAME "\r\n"
137 "User-Agent: " USER_AGENT "\r\n"
138 CONTENT_HEADERS
139 "\r\n";
141 if (url) {
142 report (R_WARNING, "Can't submit to an alternative URL");
143 return 0;
146 s = open_http (SERVER_NAME);
147 if (s == INVALID_SOCKET) return 1;
149 file = CreateFileA( name, GENERIC_READ,
150 FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE,
151 NULL, OPEN_EXISTING, 0, NULL );
153 if ((file == INVALID_HANDLE_VALUE) &&
154 (GetLastError() == ERROR_INVALID_PARAMETER)) {
155 /* FILE_SHARE_DELETE not supported on win9x */
156 file = CreateFileA( name, GENERIC_READ,
157 FILE_SHARE_READ | FILE_SHARE_WRITE,
158 NULL, OPEN_EXISTING, 0, NULL );
160 if (file == INVALID_HANDLE_VALUE)
162 report (R_WARNING, "Can't open file '%s': %u", name, GetLastError());
163 goto abort1;
166 report (R_STATUS, "Sending header");
167 filesize = GetFileSize( file, NULL );
168 str = strmake (&total, body1, name);
169 ret = send_str (s, head, filesize + total + sizeof body2 - 1) ||
170 send_buf (s, str, total);
171 heap_free (str);
172 if (ret) {
173 report (R_WARNING, "Error sending header: %d, %d",
174 errno, WSAGetLastError ());
175 goto abort2;
178 report (R_STATUS, "Sending %u bytes of data", filesize);
179 report (R_PROGRESS, 2, filesize);
180 total = 0;
181 while (total < filesize && ReadFile( file, buffer, BUFLEN/2, &bytes_read, NULL )) {
182 if (aborting) goto abort2;
183 if (!bytes_read) break;
184 total += bytes_read;
185 if (total > filesize) bytes_read -= total - filesize;
186 if (send_buf (s, buffer, bytes_read)) {
187 report (R_WARNING, "Error sending body: %d, %d",
188 errno, WSAGetLastError ());
189 goto abort2;
191 report (R_DELTA, bytes_read, "Network transfer: In progress");
193 CloseHandle( file );
195 if (send_buf (s, body2, sizeof body2 - 1)) {
196 report (R_WARNING, "Error sending trailer: %d, %d",
197 errno, WSAGetLastError ());
198 goto abort1;
200 report (R_DELTA, 0, "Network transfer: Done");
202 total = 0;
203 while ((bytes_read = recv (s, buffer+total, BUFLEN-total, 0))) {
204 if ((signed)bytes_read == SOCKET_ERROR) {
205 if (errno == EINTR) continue;
206 report (R_WARNING, "Error receiving reply: %d, %d",
207 errno, WSAGetLastError ());
208 goto abort1;
210 total += bytes_read;
211 if (total == BUFLEN) {
212 report (R_WARNING, "Buffer overflow");
213 goto abort1;
216 if (close_http (s)) {
217 report (R_WARNING, "Error closing connection: %d, %d",
218 errno, WSAGetLastError ());
219 return 1;
222 str = strmake (&count, "Received %s (%d bytes).\n",
223 name, filesize);
224 ret = total < count || memcmp (str, buffer + total - count, count) != 0;
225 heap_free (str);
226 if (ret) {
227 buffer[total] = 0;
228 str = strstr (buffer, "\r\n\r\n");
229 if (!str) str = buffer;
230 else str = str + 4;
231 report (R_ERROR, "Can't submit logfile '%s'. "
232 "Server response: %s", name, str);
234 return ret;
236 abort2:
237 CloseHandle( file );
238 abort1:
239 close_http (s);
240 return 1;
243 static int
244 send_file_wininet (const char *url, const char *name)
246 int ret = 0;
247 HMODULE wininet_mod = NULL;
248 HINTERNET (WINAPI *pInternetOpen)(LPCSTR agent, DWORD access_type, LPCSTR proxy_name, LPCSTR proxy_bypass, DWORD flags);
249 HINTERNET (WINAPI *pInternetConnect)(HINTERNET session, LPCSTR server_name, INTERNET_PORT server_port, LPCSTR username, LPCSTR password, DWORD service, DWORD flags, DWORD_PTR *context);
250 HINTERNET (WINAPI *pHttpOpenRequest)(HINTERNET connection, LPCSTR verb, LPCSTR object_name, LPCSTR version, LPCSTR referer, LPCSTR *accept_types, DWORD flags, DWORD_PTR context);
251 BOOL (WINAPI *pHttpSendRequestEx)(HINTERNET request, LPINTERNET_BUFFERSA buffers_in, LPINTERNET_BUFFERSA buffers_out, DWORD flags, DWORD_PTR context);
252 BOOL (WINAPI *pInternetWriteFile)(HINTERNET file, LPCVOID buffer, DWORD number_of_bytes_to_write, LPDWORD number_of_bytes_written);
253 BOOL (WINAPI *pHttpEndRequest)(HINTERNET request, LPINTERNET_BUFFERSA buffers_out, DWORD flags, DWORD_PTR context);
254 BOOL (WINAPI *pInternetReadFile)(HINTERNET file, LPCVOID buffer, DWORD number_of_bytes_to_read, LPDWORD number_of_bytes_read);
255 BOOL (WINAPI *pInternetCloseHandle)(HINTERNET Handle) = NULL;
256 HANDLE file = INVALID_HANDLE_VALUE;
257 DWORD filesize, bytes_read, bytes_written;
258 size_t total, count;
259 char *str = NULL;
260 HINTERNET session = NULL;
261 HINTERNET connection = NULL;
262 HINTERNET request = NULL;
263 INTERNET_BUFFERSA buffers_in = { 0 };
264 char buffer[BUFLEN+1];
265 URL_COMPONENTSA uc = { 0 };
267 static const char extra_headers[] =
268 CONTENT_HEADERS;
270 wininet_mod = LoadLibraryA("wininet.dll");
271 if (wininet_mod == NULL)
272 goto done;
273 pInternetOpen = (void *)GetProcAddress(wininet_mod, "InternetOpenA");
274 pInternetConnect = (void *)GetProcAddress(wininet_mod, "InternetConnectA");
275 pHttpOpenRequest = (void *)GetProcAddress(wininet_mod, "HttpOpenRequestA");
276 pHttpSendRequestEx = (void *)GetProcAddress(wininet_mod, "HttpSendRequestExA");
277 pInternetWriteFile = (void *)GetProcAddress(wininet_mod, "InternetWriteFile");
278 pHttpEndRequest = (void *)GetProcAddress(wininet_mod, "HttpEndRequestA");
279 pInternetReadFile = (void *)GetProcAddress(wininet_mod, "InternetReadFile");
280 pInternetCloseHandle = (void *)GetProcAddress(wininet_mod, "InternetCloseHandle");
281 if (pInternetOpen == NULL || pInternetConnect == NULL || pHttpOpenRequest == NULL || pHttpSendRequestEx == NULL || pHttpEndRequest == NULL ||
282 pInternetWriteFile == NULL || pInternetReadFile == NULL || pInternetCloseHandle == NULL) {
283 goto done;
285 if (url) {
286 BOOL (WINAPI *pInternetCrackUrlA)(const char *url, DWORD url_length, DWORD flags, URL_COMPONENTSA *ret_comp);
287 pInternetCrackUrlA = (void *)GetProcAddress(wininet_mod, "InternetCrackUrlA");
288 if (pInternetCrackUrlA == NULL)
289 goto done;
290 uc.dwStructSize = sizeof(uc);
291 uc.dwSchemeLength = uc.dwHostNameLength = uc.dwUserNameLength =
292 uc.dwPasswordLength = uc.dwUrlPathLength = uc.dwExtraInfoLength =
293 strlen(url) + 1;
294 uc.lpszScheme = heap_alloc (uc.dwSchemeLength);
295 uc.lpszHostName = heap_alloc (uc.dwHostNameLength);
296 uc.lpszUserName = heap_alloc (uc.dwUserNameLength);
297 uc.lpszPassword = heap_alloc (uc.dwPasswordLength);
298 uc.lpszUrlPath = heap_alloc (uc.dwUrlPathLength);
299 uc.lpszExtraInfo = heap_alloc (uc.dwExtraInfoLength);
300 if (!pInternetCrackUrlA(url, 0, 0, &uc)) {
301 report (R_WARNING, "Can't parse submit URL '%s'", url);
302 goto done;
304 if ((uc.nScheme != INTERNET_SCHEME_HTTP && uc.nScheme != INTERNET_SCHEME_HTTPS) || *uc.lpszExtraInfo) {
305 report (R_WARNING, "Can't submit report to scheme %s or extra info '%s'", uc.lpszScheme, uc.lpszExtraInfo);
306 goto done;
309 } else {
310 uc.nScheme = INTERNET_SCHEME_HTTP;
311 uc.lpszHostName = heap_strdup (SERVER_NAME);
312 uc.nPort = INTERNET_DEFAULT_HTTP_PORT;
313 uc.lpszUserName = heap_strdup ("");
314 uc.lpszPassword = heap_strdup ("");
315 uc.lpszUrlPath = heap_strdup (URL_PATH);
318 ret = 1;
320 file = CreateFileA( name, GENERIC_READ,
321 FILE_SHARE_READ | FILE_SHARE_WRITE | FILE_SHARE_DELETE,
322 NULL, OPEN_EXISTING, 0, NULL );
324 if ((file == INVALID_HANDLE_VALUE) &&
325 (GetLastError() == ERROR_INVALID_PARAMETER)) {
326 /* FILE_SHARE_DELETE not supported on win9x */
327 file = CreateFileA( name, GENERIC_READ,
328 FILE_SHARE_READ | FILE_SHARE_WRITE,
329 NULL, OPEN_EXISTING, 0, NULL );
331 if (file == INVALID_HANDLE_VALUE) {
332 report (R_WARNING, "Can't open file '%s': %u", name, GetLastError());
333 goto done;
336 report (R_STATUS, "Opening %s connection to %s:%d",
337 (uc.nScheme == INTERNET_SCHEME_HTTP ? "http" : "https"),
338 uc.lpszHostName, uc.nPort);
339 session = pInternetOpen (USER_AGENT, INTERNET_OPEN_TYPE_PRECONFIG, NULL, NULL, 0);
340 if (session == NULL) {
341 report (R_WARNING, "Unable to open connection, error %u", GetLastError());
342 goto done;
344 connection = pInternetConnect (session, uc.lpszHostName, uc.nPort, uc.lpszUserName, uc.lpszPassword, INTERNET_SERVICE_HTTP, 0, 0);
345 if (connection == NULL) {
346 report (R_WARNING, "Unable to connect, error %u", GetLastError());
347 goto done;
349 request = pHttpOpenRequest (connection, "POST", uc.lpszUrlPath, NULL, NULL, NULL,
350 INTERNET_FLAG_NO_CACHE_WRITE | INTERNET_FLAG_NO_COOKIES | INTERNET_FLAG_NO_UI |
351 INTERNET_FLAG_PRAGMA_NOCACHE | INTERNET_FLAG_RELOAD | (uc.nScheme == INTERNET_SCHEME_HTTPS ? INTERNET_FLAG_SECURE : 0), 0);
352 if (request == NULL) {
353 report (R_WARNING, "Unable to open request, error %u", GetLastError());
354 goto done;
357 report (R_STATUS, "Sending request");
358 filesize = GetFileSize( file, NULL );
359 str = strmake (&total, body1, name);
360 memset(&buffers_in, 0, sizeof(INTERNET_BUFFERSA));
361 buffers_in.dwStructSize = sizeof(INTERNET_BUFFERSA);
362 buffers_in.dwBufferTotal = filesize + total + sizeof body2 - 1;
363 buffers_in.lpcszHeader = strmake (&count, extra_headers, buffers_in.dwBufferTotal);
364 buffers_in.dwHeadersLength = count;
365 if (! pHttpSendRequestEx(request, &buffers_in, NULL, 0, 0)) {
366 report (R_WARNING, "Unable to send request, error %u", GetLastError());
367 goto done;
370 if (! pInternetWriteFile(request, str, total, &bytes_written) || bytes_written != total) {
371 report (R_WARNING, "Unable to write body data, error %u", GetLastError());
372 goto done;
375 report (R_STATUS, "Sending %u bytes of data", filesize);
376 report (R_PROGRESS, 2, filesize);
377 total = 0;
378 while (total < filesize && ReadFile( file, buffer, BUFLEN/2, &bytes_read, NULL )) {
379 if (aborting) goto done;
380 if (!bytes_read) break;
381 total += bytes_read;
382 if (total > filesize) bytes_read -= total - filesize;
383 if (! pInternetWriteFile (request, buffer, bytes_read, &bytes_written) || bytes_written != bytes_read) {
384 report (R_WARNING, "Error sending body: %u", GetLastError ());
385 goto done;
387 report (R_DELTA, bytes_read, "Network transfer: In progress");
390 if (! pInternetWriteFile(request, body2, sizeof body2 - 1, &bytes_written) || bytes_written != sizeof body2 - 1) {
391 report (R_WARNING, "Unable to write final body data, error %u", GetLastError());
392 goto done;
394 if (! pHttpEndRequest(request, NULL, 0, 0)) {
395 report (R_WARNING, "Unable to end request, error %u", GetLastError());
396 goto done;
398 report (R_DELTA, 0, "Network transfer: Done");
400 total = 0;
403 if (! pInternetReadFile(request, buffer+total, BUFLEN-total, &bytes_read)) {
404 report (R_WARNING, "Error receiving reply: %u", GetLastError ());
405 goto done;
407 total += bytes_read;
408 if (total == BUFLEN) {
409 report (R_WARNING, "Buffer overflow");
410 goto done;
413 while (bytes_read != 0);
415 heap_free (str);
416 str = strmake (&count, "Received %s (%d bytes).\n",
417 name, filesize);
418 if (total < count || memcmp (str, buffer + total - count, count) != 0) {
419 buffer[total] = 0;
420 report (R_ERROR, "Can't submit logfile '%s'. "
421 "Server response: %s", name, buffer);
424 done:
425 heap_free (uc.lpszScheme);
426 heap_free (uc.lpszHostName);
427 heap_free (uc.lpszUserName);
428 heap_free (uc.lpszPassword);
429 heap_free (uc.lpszUrlPath);
430 heap_free (uc.lpszExtraInfo);
431 heap_free((void *)buffers_in.lpcszHeader);
432 heap_free(str);
433 if (pInternetCloseHandle != NULL && request != NULL)
434 pInternetCloseHandle (request);
435 if (pInternetCloseHandle != NULL && connection != NULL)
436 pInternetCloseHandle (connection);
437 if (pInternetCloseHandle != NULL && session != NULL)
438 pInternetCloseHandle (session);
439 if (file != INVALID_HANDLE_VALUE)
440 CloseHandle (file);
441 if (wininet_mod != NULL)
442 FreeLibrary (wininet_mod);
444 return ret;
448 send_file (const char *url, const char *name)
450 return send_file_wininet( url, name ) || send_file_direct( url, name );