winhttp: Fix up headers with wrong termination.
[wine/multimedia.git] / dlls / winhttp / request.c
blob8870e50a2614364784386eab6917b99c5284e808
1 /*
2 * Copyright 2004 Mike McCormack for CodeWeavers
3 * Copyright 2006 Rob Shearman for CodeWeavers
4 * Copyright 2008, 2011 Hans Leidekker for CodeWeavers
5 * Copyright 2009 Juan Lang
7 * This library is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation; either
10 * version 2.1 of the License, or (at your option) any later version.
12 * This library is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with this library; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
22 #define COBJMACROS
23 #include "config.h"
24 #include "wine/port.h"
25 #include "wine/debug.h"
27 #include <stdarg.h>
28 #ifdef HAVE_ARPA_INET_H
29 # include <arpa/inet.h>
30 #endif
32 #include "windef.h"
33 #include "winbase.h"
34 #include "ole2.h"
35 #include "initguid.h"
36 #include "httprequest.h"
37 #include "winhttp.h"
39 #include "winhttp_private.h"
41 WINE_DEFAULT_DEBUG_CHANNEL(winhttp);
43 static const WCHAR attr_accept[] = {'A','c','c','e','p','t',0};
44 static const WCHAR attr_accept_charset[] = {'A','c','c','e','p','t','-','C','h','a','r','s','e','t', 0};
45 static const WCHAR attr_accept_encoding[] = {'A','c','c','e','p','t','-','E','n','c','o','d','i','n','g',0};
46 static const WCHAR attr_accept_language[] = {'A','c','c','e','p','t','-','L','a','n','g','u','a','g','e',0};
47 static const WCHAR attr_accept_ranges[] = {'A','c','c','e','p','t','-','R','a','n','g','e','s',0};
48 static const WCHAR attr_age[] = {'A','g','e',0};
49 static const WCHAR attr_allow[] = {'A','l','l','o','w',0};
50 static const WCHAR attr_authorization[] = {'A','u','t','h','o','r','i','z','a','t','i','o','n',0};
51 static const WCHAR attr_cache_control[] = {'C','a','c','h','e','-','C','o','n','t','r','o','l',0};
52 static const WCHAR attr_connection[] = {'C','o','n','n','e','c','t','i','o','n',0};
53 static const WCHAR attr_content_base[] = {'C','o','n','t','e','n','t','-','B','a','s','e',0};
54 static const WCHAR attr_content_encoding[] = {'C','o','n','t','e','n','t','-','E','n','c','o','d','i','n','g',0};
55 static const WCHAR attr_content_id[] = {'C','o','n','t','e','n','t','-','I','D',0};
56 static const WCHAR attr_content_language[] = {'C','o','n','t','e','n','t','-','L','a','n','g','u','a','g','e',0};
57 static const WCHAR attr_content_length[] = {'C','o','n','t','e','n','t','-','L','e','n','g','t','h',0};
58 static const WCHAR attr_content_location[] = {'C','o','n','t','e','n','t','-','L','o','c','a','t','i','o','n',0};
59 static const WCHAR attr_content_md5[] = {'C','o','n','t','e','n','t','-','M','D','5',0};
60 static const WCHAR attr_content_range[] = {'C','o','n','t','e','n','t','-','R','a','n','g','e',0};
61 static const WCHAR attr_content_transfer_encoding[] = {'C','o','n','t','e','n','t','-','T','r','a','n','s','f','e','r','-','E','n','c','o','d','i','n','g',0};
62 static const WCHAR attr_content_type[] = {'C','o','n','t','e','n','t','-','T','y','p','e',0};
63 static const WCHAR attr_cookie[] = {'C','o','o','k','i','e',0};
64 static const WCHAR attr_date[] = {'D','a','t','e',0};
65 static const WCHAR attr_from[] = {'F','r','o','m',0};
66 static const WCHAR attr_etag[] = {'E','T','a','g',0};
67 static const WCHAR attr_expect[] = {'E','x','p','e','c','t',0};
68 static const WCHAR attr_expires[] = {'E','x','p','i','r','e','s',0};
69 static const WCHAR attr_host[] = {'H','o','s','t',0};
70 static const WCHAR attr_if_match[] = {'I','f','-','M','a','t','c','h',0};
71 static const WCHAR attr_if_modified_since[] = {'I','f','-','M','o','d','i','f','i','e','d','-','S','i','n','c','e',0};
72 static const WCHAR attr_if_none_match[] = {'I','f','-','N','o','n','e','-','M','a','t','c','h',0};
73 static const WCHAR attr_if_range[] = {'I','f','-','R','a','n','g','e',0};
74 static const WCHAR attr_if_unmodified_since[] = {'I','f','-','U','n','m','o','d','i','f','i','e','d','-','S','i','n','c','e',0};
75 static const WCHAR attr_last_modified[] = {'L','a','s','t','-','M','o','d','i','f','i','e','d',0};
76 static const WCHAR attr_location[] = {'L','o','c','a','t','i','o','n',0};
77 static const WCHAR attr_max_forwards[] = {'M','a','x','-','F','o','r','w','a','r','d','s',0};
78 static const WCHAR attr_mime_version[] = {'M','i','m','e','-','V','e','r','s','i','o','n',0};
79 static const WCHAR attr_pragma[] = {'P','r','a','g','m','a',0};
80 static const WCHAR attr_proxy_authenticate[] = {'P','r','o','x','y','-','A','u','t','h','e','n','t','i','c','a','t','e',0};
81 static const WCHAR attr_proxy_authorization[] = {'P','r','o','x','y','-','A','u','t','h','o','r','i','z','a','t','i','o','n',0};
82 static const WCHAR attr_proxy_connection[] = {'P','r','o','x','y','-','C','o','n','n','e','c','t','i','o','n',0};
83 static const WCHAR attr_public[] = {'P','u','b','l','i','c',0};
84 static const WCHAR attr_range[] = {'R','a','n','g','e',0};
85 static const WCHAR attr_referer[] = {'R','e','f','e','r','e','r',0};
86 static const WCHAR attr_retry_after[] = {'R','e','t','r','y','-','A','f','t','e','r',0};
87 static const WCHAR attr_server[] = {'S','e','r','v','e','r',0};
88 static const WCHAR attr_set_cookie[] = {'S','e','t','-','C','o','o','k','i','e',0};
89 static const WCHAR attr_status[] = {'S','t','a','t','u','s',0};
90 static const WCHAR attr_transfer_encoding[] = {'T','r','a','n','s','f','e','r','-','E','n','c','o','d','i','n','g',0};
91 static const WCHAR attr_unless_modified_since[] = {'U','n','l','e','s','s','-','M','o','d','i','f','i','e','d','-','S','i','n','c','e',0};
92 static const WCHAR attr_upgrade[] = {'U','p','g','r','a','d','e',0};
93 static const WCHAR attr_uri[] = {'U','R','I',0};
94 static const WCHAR attr_user_agent[] = {'U','s','e','r','-','A','g','e','n','t',0};
95 static const WCHAR attr_vary[] = {'V','a','r','y',0};
96 static const WCHAR attr_via[] = {'V','i','a',0};
97 static const WCHAR attr_warning[] = {'W','a','r','n','i','n','g',0};
98 static const WCHAR attr_www_authenticate[] = {'W','W','W','-','A','u','t','h','e','n','t','i','c','a','t','e',0};
100 static const WCHAR *attribute_table[] =
102 attr_mime_version, /* WINHTTP_QUERY_MIME_VERSION = 0 */
103 attr_content_type, /* WINHTTP_QUERY_CONTENT_TYPE = 1 */
104 attr_content_transfer_encoding, /* WINHTTP_QUERY_CONTENT_TRANSFER_ENCODING = 2 */
105 attr_content_id, /* WINHTTP_QUERY_CONTENT_ID = 3 */
106 NULL, /* WINHTTP_QUERY_CONTENT_DESCRIPTION = 4 */
107 attr_content_length, /* WINHTTP_QUERY_CONTENT_LENGTH = 5 */
108 attr_content_language, /* WINHTTP_QUERY_CONTENT_LANGUAGE = 6 */
109 attr_allow, /* WINHTTP_QUERY_ALLOW = 7 */
110 attr_public, /* WINHTTP_QUERY_PUBLIC = 8 */
111 attr_date, /* WINHTTP_QUERY_DATE = 9 */
112 attr_expires, /* WINHTTP_QUERY_EXPIRES = 10 */
113 attr_last_modified, /* WINHTTP_QUERY_LAST_MODIFIEDcw = 11 */
114 NULL, /* WINHTTP_QUERY_MESSAGE_ID = 12 */
115 attr_uri, /* WINHTTP_QUERY_URI = 13 */
116 attr_from, /* WINHTTP_QUERY_DERIVED_FROM = 14 */
117 NULL, /* WINHTTP_QUERY_COST = 15 */
118 NULL, /* WINHTTP_QUERY_LINK = 16 */
119 attr_pragma, /* WINHTTP_QUERY_PRAGMA = 17 */
120 NULL, /* WINHTTP_QUERY_VERSION = 18 */
121 attr_status, /* WINHTTP_QUERY_STATUS_CODE = 19 */
122 NULL, /* WINHTTP_QUERY_STATUS_TEXT = 20 */
123 NULL, /* WINHTTP_QUERY_RAW_HEADERS = 21 */
124 NULL, /* WINHTTP_QUERY_RAW_HEADERS_CRLF = 22 */
125 attr_connection, /* WINHTTP_QUERY_CONNECTION = 23 */
126 attr_accept, /* WINHTTP_QUERY_ACCEPT = 24 */
127 attr_accept_charset, /* WINHTTP_QUERY_ACCEPT_CHARSET = 25 */
128 attr_accept_encoding, /* WINHTTP_QUERY_ACCEPT_ENCODING = 26 */
129 attr_accept_language, /* WINHTTP_QUERY_ACCEPT_LANGUAGE = 27 */
130 attr_authorization, /* WINHTTP_QUERY_AUTHORIZATION = 28 */
131 attr_content_encoding, /* WINHTTP_QUERY_CONTENT_ENCODING = 29 */
132 NULL, /* WINHTTP_QUERY_FORWARDED = 30 */
133 NULL, /* WINHTTP_QUERY_FROM = 31 */
134 attr_if_modified_since, /* WINHTTP_QUERY_IF_MODIFIED_SINCE = 32 */
135 attr_location, /* WINHTTP_QUERY_LOCATION = 33 */
136 NULL, /* WINHTTP_QUERY_ORIG_URI = 34 */
137 attr_referer, /* WINHTTP_QUERY_REFERER = 35 */
138 attr_retry_after, /* WINHTTP_QUERY_RETRY_AFTER = 36 */
139 attr_server, /* WINHTTP_QUERY_SERVER = 37 */
140 NULL, /* WINHTTP_TITLE = 38 */
141 attr_user_agent, /* WINHTTP_QUERY_USER_AGENT = 39 */
142 attr_www_authenticate, /* WINHTTP_QUERY_WWW_AUTHENTICATE = 40 */
143 attr_proxy_authenticate, /* WINHTTP_QUERY_PROXY_AUTHENTICATE = 41 */
144 attr_accept_ranges, /* WINHTTP_QUERY_ACCEPT_RANGES = 42 */
145 attr_set_cookie, /* WINHTTP_QUERY_SET_COOKIE = 43 */
146 attr_cookie, /* WINHTTP_QUERY_COOKIE = 44 */
147 NULL, /* WINHTTP_QUERY_REQUEST_METHOD = 45 */
148 NULL, /* WINHTTP_QUERY_REFRESH = 46 */
149 NULL, /* WINHTTP_QUERY_CONTENT_DISPOSITION = 47 */
150 attr_age, /* WINHTTP_QUERY_AGE = 48 */
151 attr_cache_control, /* WINHTTP_QUERY_CACHE_CONTROL = 49 */
152 attr_content_base, /* WINHTTP_QUERY_CONTENT_BASE = 50 */
153 attr_content_location, /* WINHTTP_QUERY_CONTENT_LOCATION = 51 */
154 attr_content_md5, /* WINHTTP_QUERY_CONTENT_MD5 = 52 */
155 attr_content_range, /* WINHTTP_QUERY_CONTENT_RANGE = 53 */
156 attr_etag, /* WINHTTP_QUERY_ETAG = 54 */
157 attr_host, /* WINHTTP_QUERY_HOST = 55 */
158 attr_if_match, /* WINHTTP_QUERY_IF_MATCH = 56 */
159 attr_if_none_match, /* WINHTTP_QUERY_IF_NONE_MATCH = 57 */
160 attr_if_range, /* WINHTTP_QUERY_IF_RANGE = 58 */
161 attr_if_unmodified_since, /* WINHTTP_QUERY_IF_UNMODIFIED_SINCE = 59 */
162 attr_max_forwards, /* WINHTTP_QUERY_MAX_FORWARDS = 60 */
163 attr_proxy_authorization, /* WINHTTP_QUERY_PROXY_AUTHORIZATION = 61 */
164 attr_range, /* WINHTTP_QUERY_RANGE = 62 */
165 attr_transfer_encoding, /* WINHTTP_QUERY_TRANSFER_ENCODING = 63 */
166 attr_upgrade, /* WINHTTP_QUERY_UPGRADE = 64 */
167 attr_vary, /* WINHTTP_QUERY_VARY = 65 */
168 attr_via, /* WINHTTP_QUERY_VIA = 66 */
169 attr_warning, /* WINHTTP_QUERY_WARNING = 67 */
170 attr_expect, /* WINHTTP_QUERY_EXPECT = 68 */
171 attr_proxy_connection, /* WINHTTP_QUERY_PROXY_CONNECTION = 69 */
172 attr_unless_modified_since, /* WINHTTP_QUERY_UNLESS_MODIFIED_SINCE = 70 */
173 NULL, /* WINHTTP_QUERY_PROXY_SUPPORT = 75 */
174 NULL, /* WINHTTP_QUERY_AUTHENTICATION_INFO = 76 */
175 NULL, /* WINHTTP_QUERY_PASSPORT_URLS = 77 */
176 NULL /* WINHTTP_QUERY_PASSPORT_CONFIG = 78 */
179 static DWORD CALLBACK task_thread( LPVOID param )
181 task_header_t *task = param;
183 task->proc( task );
185 release_object( &task->request->hdr );
186 heap_free( task );
187 return ERROR_SUCCESS;
190 static BOOL queue_task( task_header_t *task )
192 return QueueUserWorkItem( task_thread, task, WT_EXECUTELONGFUNCTION );
195 static void free_header( header_t *header )
197 heap_free( header->field );
198 heap_free( header->value );
199 heap_free( header );
202 static BOOL valid_token_char( WCHAR c )
204 if (c < 32 || c == 127) return FALSE;
205 switch (c)
207 case '(': case ')':
208 case '<': case '>':
209 case '@': case ',':
210 case ';': case ':':
211 case '\\': case '\"':
212 case '/': case '[':
213 case ']': case '?':
214 case '=': case '{':
215 case '}': case ' ':
216 case '\t':
217 return FALSE;
218 default:
219 return TRUE;
223 static header_t *parse_header( LPCWSTR string )
225 const WCHAR *p, *q;
226 header_t *header;
227 int len;
229 p = string;
230 if (!(q = strchrW( p, ':' )))
232 WARN("no ':' in line %s\n", debugstr_w(string));
233 return NULL;
235 if (q == string)
237 WARN("empty field name in line %s\n", debugstr_w(string));
238 return NULL;
240 while (*p != ':')
242 if (!valid_token_char( *p ))
244 WARN("invalid character in field name %s\n", debugstr_w(string));
245 return NULL;
247 p++;
249 len = q - string;
250 if (!(header = heap_alloc_zero( sizeof(header_t) ))) return NULL;
251 if (!(header->field = heap_alloc( (len + 1) * sizeof(WCHAR) )))
253 heap_free( header );
254 return NULL;
256 memcpy( header->field, string, len * sizeof(WCHAR) );
257 header->field[len] = 0;
259 q++; /* skip past colon */
260 while (*q == ' ') q++;
261 if (!*q)
263 WARN("no value in line %s\n", debugstr_w(string));
264 return header;
266 len = strlenW( q );
267 if (!(header->value = heap_alloc( (len + 1) * sizeof(WCHAR) )))
269 free_header( header );
270 return NULL;
272 memcpy( header->value, q, len * sizeof(WCHAR) );
273 header->value[len] = 0;
275 return header;
278 static int get_header_index( request_t *request, LPCWSTR field, int requested_index, BOOL request_only )
280 int index;
282 TRACE("%s\n", debugstr_w(field));
284 for (index = 0; index < request->num_headers; index++)
286 if (strcmpiW( request->headers[index].field, field )) continue;
287 if (request_only && !request->headers[index].is_request) continue;
288 if (!request_only && request->headers[index].is_request) continue;
290 if (!requested_index) break;
291 requested_index--;
293 if (index >= request->num_headers) index = -1;
294 TRACE("returning %d\n", index);
295 return index;
298 static BOOL insert_header( request_t *request, header_t *header )
300 DWORD count;
301 header_t *hdrs;
303 count = request->num_headers + 1;
304 if (count > 1)
305 hdrs = heap_realloc_zero( request->headers, sizeof(header_t) * count );
306 else
307 hdrs = heap_alloc_zero( sizeof(header_t) * count );
309 if (hdrs)
311 request->headers = hdrs;
312 request->headers[count - 1].field = strdupW( header->field );
313 request->headers[count - 1].value = strdupW( header->value );
314 request->headers[count - 1].is_request = header->is_request;
315 request->num_headers++;
316 return TRUE;
318 return FALSE;
321 static BOOL delete_header( request_t *request, DWORD index )
323 if (!request->num_headers) return FALSE;
324 if (index >= request->num_headers) return FALSE;
325 request->num_headers--;
327 heap_free( request->headers[index].field );
328 heap_free( request->headers[index].value );
330 memmove( &request->headers[index], &request->headers[index + 1], (request->num_headers - index) * sizeof(header_t) );
331 memset( &request->headers[request->num_headers], 0, sizeof(header_t) );
332 return TRUE;
335 static BOOL process_header( request_t *request, LPCWSTR field, LPCWSTR value, DWORD flags, BOOL request_only )
337 int index;
338 header_t *header;
340 TRACE("%s: %s 0x%08x\n", debugstr_w(field), debugstr_w(value), flags);
342 /* replace wins out over add */
343 if (flags & WINHTTP_ADDREQ_FLAG_REPLACE) flags &= ~WINHTTP_ADDREQ_FLAG_ADD;
345 if (flags & WINHTTP_ADDREQ_FLAG_ADD) index = -1;
346 else
347 index = get_header_index( request, field, 0, request_only );
349 if (index >= 0)
351 if (flags & WINHTTP_ADDREQ_FLAG_ADD_IF_NEW) return FALSE;
352 header = &request->headers[index];
354 else if (value)
356 header_t hdr;
358 hdr.field = (LPWSTR)field;
359 hdr.value = (LPWSTR)value;
360 hdr.is_request = request_only;
362 return insert_header( request, &hdr );
364 /* no value to delete */
365 else return TRUE;
367 if (flags & WINHTTP_ADDREQ_FLAG_REPLACE)
369 delete_header( request, index );
370 if (value)
372 header_t hdr;
374 hdr.field = (LPWSTR)field;
375 hdr.value = (LPWSTR)value;
376 hdr.is_request = request_only;
378 return insert_header( request, &hdr );
380 return TRUE;
382 else if (flags & (WINHTTP_ADDREQ_FLAG_COALESCE_WITH_COMMA | WINHTTP_ADDREQ_FLAG_COALESCE_WITH_SEMICOLON))
384 WCHAR sep, *tmp;
385 int len, orig_len, value_len;
387 orig_len = strlenW( header->value );
388 value_len = strlenW( value );
390 if (flags & WINHTTP_ADDREQ_FLAG_COALESCE_WITH_COMMA) sep = ',';
391 else sep = ';';
393 len = orig_len + value_len + 2;
394 if ((tmp = heap_realloc( header->value, (len + 1) * sizeof(WCHAR) )))
396 header->value = tmp;
398 header->value[orig_len] = sep;
399 orig_len++;
400 header->value[orig_len] = ' ';
401 orig_len++;
403 memcpy( &header->value[orig_len], value, value_len * sizeof(WCHAR) );
404 header->value[len] = 0;
405 return TRUE;
408 return TRUE;
411 BOOL add_request_headers( request_t *request, LPCWSTR headers, DWORD len, DWORD flags )
413 BOOL ret = FALSE;
414 WCHAR *buffer, *p, *q;
415 header_t *header;
417 if (len == ~0u) len = strlenW( headers );
418 if (!len) return TRUE;
419 if (!(buffer = heap_alloc( (len + 1) * sizeof(WCHAR) ))) return FALSE;
420 strcpyW( buffer, headers );
422 p = buffer;
425 q = p;
426 while (*q)
428 if (q[0] == '\n' && q[1] == '\r')
430 q[0] = '\r';
431 q[1] = '\n';
433 if (q[0] == '\r' && q[1] == '\n') break;
434 q++;
436 if (!*p) break;
437 if (*q == '\r')
439 *q = 0;
440 q += 2; /* jump over \r\n */
442 if ((header = parse_header( p )))
444 ret = process_header( request, header->field, header->value, flags, TRUE );
445 free_header( header );
447 p = q;
448 } while (ret);
450 heap_free( buffer );
451 return ret;
454 /***********************************************************************
455 * WinHttpAddRequestHeaders (winhttp.@)
457 BOOL WINAPI WinHttpAddRequestHeaders( HINTERNET hrequest, LPCWSTR headers, DWORD len, DWORD flags )
459 BOOL ret;
460 request_t *request;
462 TRACE("%p, %s, 0x%x, 0x%08x\n", hrequest, debugstr_w(headers), len, flags);
464 if (!headers)
466 set_last_error( ERROR_INVALID_PARAMETER );
467 return FALSE;
469 if (!(request = (request_t *)grab_object( hrequest )))
471 set_last_error( ERROR_INVALID_HANDLE );
472 return FALSE;
474 if (request->hdr.type != WINHTTP_HANDLE_TYPE_REQUEST)
476 release_object( &request->hdr );
477 set_last_error( ERROR_WINHTTP_INCORRECT_HANDLE_TYPE );
478 return FALSE;
481 ret = add_request_headers( request, headers, len, flags );
483 release_object( &request->hdr );
484 return ret;
487 static WCHAR *build_request_path( request_t *request )
489 WCHAR *ret;
491 if (strcmpiW( request->connect->hostname, request->connect->servername ))
493 static const WCHAR http[] = { 'h','t','t','p',0 };
494 static const WCHAR https[] = { 'h','t','t','p','s',0 };
495 static const WCHAR fmt[] = { '%','s',':','/','/','%','s',0 };
496 LPCWSTR scheme = request->netconn.secure ? https : http;
497 int len;
499 len = strlenW( scheme ) + strlenW( request->connect->hostname );
500 /* 3 characters for '://', 1 for NUL. */
501 len += 4;
502 if (request->connect->hostport)
504 /* 1 for ':' between host and port, up to 5 for port */
505 len += 6;
507 if (request->path)
508 len += strlenW( request->path );
509 if ((ret = heap_alloc( len * sizeof(WCHAR) )))
511 sprintfW( ret, fmt, scheme, request->connect->hostname );
512 if (request->connect->hostport)
514 static const WCHAR colonFmt[] = { ':','%','u',0 };
516 sprintfW( ret + strlenW( ret ), colonFmt,
517 request->connect->hostport );
519 if (request->path)
520 strcatW( ret, request->path );
523 else
524 ret = request->path;
525 return ret;
528 static WCHAR *build_request_string( request_t *request )
530 static const WCHAR space[] = {' ',0};
531 static const WCHAR crlf[] = {'\r','\n',0};
532 static const WCHAR colon[] = {':',' ',0};
533 static const WCHAR twocrlf[] = {'\r','\n','\r','\n',0};
535 WCHAR *path, *ret;
536 const WCHAR **headers, **p;
537 unsigned int len, i = 0, j;
539 /* allocate space for an array of all the string pointers to be added */
540 len = request->num_headers * 4 + 7;
541 if (!(headers = heap_alloc( len * sizeof(LPCWSTR) ))) return NULL;
543 path = build_request_path( request );
544 headers[i++] = request->verb;
545 headers[i++] = space;
546 headers[i++] = path;
547 headers[i++] = space;
548 headers[i++] = request->version;
550 for (j = 0; j < request->num_headers; j++)
552 if (request->headers[j].is_request)
554 headers[i++] = crlf;
555 headers[i++] = request->headers[j].field;
556 headers[i++] = colon;
557 headers[i++] = request->headers[j].value;
559 TRACE("adding header %s (%s)\n", debugstr_w(request->headers[j].field),
560 debugstr_w(request->headers[j].value));
563 headers[i++] = twocrlf;
564 headers[i] = NULL;
566 len = 0;
567 for (p = headers; *p; p++) len += strlenW( *p );
568 len++;
570 if (!(ret = heap_alloc( len * sizeof(WCHAR) )))
571 goto out;
572 *ret = 0;
573 for (p = headers; *p; p++) strcatW( ret, *p );
575 out:
576 if (path != request->path)
577 heap_free( path );
578 heap_free( headers );
579 return ret;
582 #define QUERY_MODIFIER_MASK (WINHTTP_QUERY_FLAG_REQUEST_HEADERS | WINHTTP_QUERY_FLAG_SYSTEMTIME | WINHTTP_QUERY_FLAG_NUMBER)
584 static BOOL query_headers( request_t *request, DWORD level, LPCWSTR name, LPVOID buffer, LPDWORD buflen, LPDWORD index )
586 header_t *header = NULL;
587 BOOL request_only, ret = FALSE;
588 int requested_index, header_index = -1;
589 DWORD attr, len;
591 request_only = level & WINHTTP_QUERY_FLAG_REQUEST_HEADERS;
592 requested_index = index ? *index : 0;
594 attr = level & ~QUERY_MODIFIER_MASK;
595 switch (attr)
597 case WINHTTP_QUERY_CUSTOM:
599 header_index = get_header_index( request, name, requested_index, request_only );
600 break;
602 case WINHTTP_QUERY_RAW_HEADERS:
604 WCHAR *headers, *p, *q;
606 if (request_only)
607 headers = build_request_string( request );
608 else
609 headers = request->raw_headers;
611 if (!(p = headers)) return FALSE;
612 for (len = 0; *p; p++) if (*p != '\r') len++;
614 if (!buffer || (len + 1) * sizeof(WCHAR) > *buflen)
616 len++;
617 set_last_error( ERROR_INSUFFICIENT_BUFFER );
619 else
621 for (p = headers, q = buffer; *p; p++, q++)
623 if (*p != '\r') *q = *p;
624 else
626 *q = 0;
627 p++; /* skip '\n' */
630 *q = 0;
631 TRACE("returning data: %s\n", debugstr_wn(buffer, len));
632 ret = TRUE;
634 *buflen = len * sizeof(WCHAR);
635 if (request_only) heap_free( headers );
636 return ret;
638 case WINHTTP_QUERY_RAW_HEADERS_CRLF:
640 WCHAR *headers;
642 if (request_only)
643 headers = build_request_string( request );
644 else
645 headers = request->raw_headers;
647 if (!headers) return FALSE;
648 len = strlenW( headers ) * sizeof(WCHAR);
649 if (!buffer || len + sizeof(WCHAR) > *buflen)
651 len += sizeof(WCHAR);
652 set_last_error( ERROR_INSUFFICIENT_BUFFER );
654 else
656 memcpy( buffer, headers, len + sizeof(WCHAR) );
657 TRACE("returning data: %s\n", debugstr_wn(buffer, len / sizeof(WCHAR)));
658 ret = TRUE;
660 *buflen = len;
661 if (request_only) heap_free( headers );
662 return ret;
664 case WINHTTP_QUERY_VERSION:
665 len = strlenW( request->version ) * sizeof(WCHAR);
666 if (!buffer || len + sizeof(WCHAR) > *buflen)
668 len += sizeof(WCHAR);
669 set_last_error( ERROR_INSUFFICIENT_BUFFER );
671 else
673 strcpyW( buffer, request->version );
674 TRACE("returning string: %s\n", debugstr_w(buffer));
675 ret = TRUE;
677 *buflen = len;
678 return ret;
680 case WINHTTP_QUERY_STATUS_TEXT:
681 len = strlenW( request->status_text ) * sizeof(WCHAR);
682 if (!buffer || len + sizeof(WCHAR) > *buflen)
684 len += sizeof(WCHAR);
685 set_last_error( ERROR_INSUFFICIENT_BUFFER );
687 else
689 strcpyW( buffer, request->status_text );
690 TRACE("returning string: %s\n", debugstr_w(buffer));
691 ret = TRUE;
693 *buflen = len;
694 return ret;
696 default:
697 if (attr >= sizeof(attribute_table)/sizeof(attribute_table[0]) || !attribute_table[attr])
699 FIXME("attribute %u not implemented\n", attr);
700 return FALSE;
702 TRACE("attribute %s\n", debugstr_w(attribute_table[attr]));
703 header_index = get_header_index( request, attribute_table[attr], requested_index, request_only );
704 break;
707 if (header_index >= 0)
709 header = &request->headers[header_index];
711 if (!header || (request_only && !header->is_request))
713 set_last_error( ERROR_WINHTTP_HEADER_NOT_FOUND );
714 return FALSE;
716 if (index) *index += 1;
717 if (level & WINHTTP_QUERY_FLAG_NUMBER)
719 if (!buffer || sizeof(int) > *buflen)
721 set_last_error( ERROR_INSUFFICIENT_BUFFER );
723 else
725 int *number = buffer;
726 *number = atoiW( header->value );
727 TRACE("returning number: %d\n", *number);
728 ret = TRUE;
730 *buflen = sizeof(int);
732 else if (level & WINHTTP_QUERY_FLAG_SYSTEMTIME)
734 SYSTEMTIME *st = buffer;
735 if (!buffer || sizeof(SYSTEMTIME) > *buflen)
737 set_last_error( ERROR_INSUFFICIENT_BUFFER );
739 else if ((ret = WinHttpTimeToSystemTime( header->value, st )))
741 TRACE("returning time: %04d/%02d/%02d - %d - %02d:%02d:%02d.%02d\n",
742 st->wYear, st->wMonth, st->wDay, st->wDayOfWeek,
743 st->wHour, st->wMinute, st->wSecond, st->wMilliseconds);
745 *buflen = sizeof(SYSTEMTIME);
747 else if (header->value)
749 len = strlenW( header->value ) * sizeof(WCHAR);
750 if (!buffer || len + sizeof(WCHAR) > *buflen)
752 len += sizeof(WCHAR);
753 set_last_error( ERROR_INSUFFICIENT_BUFFER );
755 else
757 strcpyW( buffer, header->value );
758 TRACE("returning string: %s\n", debugstr_w(buffer));
759 ret = TRUE;
761 *buflen = len;
763 return ret;
766 /***********************************************************************
767 * WinHttpQueryHeaders (winhttp.@)
769 BOOL WINAPI WinHttpQueryHeaders( HINTERNET hrequest, DWORD level, LPCWSTR name, LPVOID buffer, LPDWORD buflen, LPDWORD index )
771 BOOL ret;
772 request_t *request;
774 TRACE("%p, 0x%08x, %s, %p, %p, %p\n", hrequest, level, debugstr_w(name), buffer, buflen, index);
776 if (!(request = (request_t *)grab_object( hrequest )))
778 set_last_error( ERROR_INVALID_HANDLE );
779 return FALSE;
781 if (request->hdr.type != WINHTTP_HANDLE_TYPE_REQUEST)
783 release_object( &request->hdr );
784 set_last_error( ERROR_WINHTTP_INCORRECT_HANDLE_TYPE );
785 return FALSE;
788 ret = query_headers( request, level, name, buffer, buflen, index );
790 release_object( &request->hdr );
791 return ret;
794 static LPWSTR concatenate_string_list( LPCWSTR *list, int len )
796 LPCWSTR *t;
797 LPWSTR str;
799 for( t = list; *t ; t++ )
800 len += strlenW( *t );
801 len++;
803 str = heap_alloc( len * sizeof(WCHAR) );
804 if (!str) return NULL;
805 *str = 0;
807 for( t = list; *t ; t++ )
808 strcatW( str, *t );
810 return str;
813 static LPWSTR build_header_request_string( request_t *request, LPCWSTR verb,
814 LPCWSTR path, LPCWSTR version )
816 static const WCHAR crlf[] = {'\r','\n',0};
817 static const WCHAR space[] = { ' ',0 };
818 static const WCHAR colon[] = { ':',' ',0 };
819 static const WCHAR twocrlf[] = {'\r','\n','\r','\n', 0};
820 LPWSTR requestString;
821 DWORD len, n;
822 LPCWSTR *req;
823 UINT i;
824 LPWSTR p;
826 /* allocate space for an array of all the string pointers to be added */
827 len = (request->num_headers) * 4 + 10;
828 req = heap_alloc( len * sizeof(LPCWSTR) );
829 if (!req) return NULL;
831 /* add the verb, path and HTTP version string */
832 n = 0;
833 req[n++] = verb;
834 req[n++] = space;
835 req[n++] = path;
836 req[n++] = space;
837 req[n++] = version;
839 /* Append custom request headers */
840 for (i = 0; i < request->num_headers; i++)
842 if (request->headers[i].is_request)
844 req[n++] = crlf;
845 req[n++] = request->headers[i].field;
846 req[n++] = colon;
847 req[n++] = request->headers[i].value;
849 TRACE("Adding custom header %s (%s)\n",
850 debugstr_w(request->headers[i].field),
851 debugstr_w(request->headers[i].value));
855 if( n >= len )
856 ERR("oops. buffer overrun\n");
858 req[n] = NULL;
859 requestString = concatenate_string_list( req, 4 );
860 heap_free( req );
861 if (!requestString) return NULL;
864 * Set (header) termination string for request
865 * Make sure there's exactly two new lines at the end of the request
867 p = &requestString[strlenW(requestString)-1];
868 while ( (*p == '\n') || (*p == '\r') )
869 p--;
870 strcpyW( p+1, twocrlf );
872 return requestString;
875 static BOOL read_reply( request_t *request );
877 static BOOL secure_proxy_connect( request_t *request )
879 static const WCHAR verbConnect[] = {'C','O','N','N','E','C','T',0};
880 static const WCHAR fmt[] = {'%','s',':','%','u',0};
881 BOOL ret = FALSE;
882 LPWSTR path;
883 connect_t *connect = request->connect;
885 path = heap_alloc( (strlenW( connect->hostname ) + 13) * sizeof(WCHAR) );
886 if (path)
888 LPWSTR requestString;
890 sprintfW( path, fmt, connect->hostname, connect->hostport );
891 requestString = build_header_request_string( request, verbConnect,
892 path, http1_1 );
893 heap_free( path );
894 if (requestString)
896 LPSTR req_ascii = strdupWA( requestString );
898 heap_free( requestString );
899 if (req_ascii)
901 int len = strlen( req_ascii ), bytes_sent;
903 ret = netconn_send( &request->netconn, req_ascii, len, 0, &bytes_sent );
904 heap_free( req_ascii );
905 if (ret)
906 ret = read_reply( request );
910 return ret;
913 #ifndef INET6_ADDRSTRLEN
914 #define INET6_ADDRSTRLEN 46
915 #endif
917 static WCHAR *addr_to_str( const struct sockaddr *addr )
919 char buf[INET6_ADDRSTRLEN];
920 const void *src;
922 switch (addr->sa_family)
924 case AF_INET:
925 src = &((struct sockaddr_in *)addr)->sin_addr;
926 break;
927 case AF_INET6:
928 src = &((struct sockaddr_in6 *)addr)->sin6_addr;
929 break;
930 default:
931 WARN("unsupported address family %d\n", addr->sa_family);
932 return NULL;
934 if (!inet_ntop( addr->sa_family, src, buf, sizeof(buf) )) return NULL;
935 return strdupAW( buf );
938 static BOOL open_connection( request_t *request )
940 connect_t *connect;
941 WCHAR *addressW = NULL;
942 INTERNET_PORT port;
943 socklen_t slen;
944 struct sockaddr *saddr;
945 DWORD len;
947 if (netconn_connected( &request->netconn )) return TRUE;
949 connect = request->connect;
950 port = connect->serverport ? connect->serverport : (request->hdr.flags & WINHTTP_FLAG_SECURE ? 443 : 80);
951 saddr = (struct sockaddr *)&connect->sockaddr;
952 slen = sizeof(struct sockaddr);
954 if (!connect->resolved)
956 len = strlenW( connect->servername ) + 1;
957 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_RESOLVING_NAME, connect->servername, len );
959 if (!netconn_resolve( connect->servername, port, saddr, &slen, request->resolve_timeout )) return FALSE;
960 connect->resolved = TRUE;
962 if (!(addressW = addr_to_str( saddr ))) return FALSE;
963 len = strlenW( addressW ) + 1;
964 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_NAME_RESOLVED, addressW, len );
966 if (!addressW && !(addressW = addr_to_str( saddr ))) return FALSE;
967 TRACE("connecting to %s:%u\n", debugstr_w(addressW), port);
969 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_CONNECTING_TO_SERVER, addressW, 0 );
971 if (!netconn_create( &request->netconn, saddr->sa_family, SOCK_STREAM, 0 ))
973 heap_free( addressW );
974 return FALSE;
976 netconn_set_timeout( &request->netconn, TRUE, request->send_timeout );
977 netconn_set_timeout( &request->netconn, FALSE, request->recv_timeout );
978 if (!netconn_connect( &request->netconn, saddr, slen, request->connect_timeout ))
980 netconn_close( &request->netconn );
981 heap_free( addressW );
982 return FALSE;
984 if (request->hdr.flags & WINHTTP_FLAG_SECURE)
986 if (connect->session->proxy_server &&
987 strcmpiW( connect->hostname, connect->servername ))
989 if (!secure_proxy_connect( request ))
991 heap_free( addressW );
992 return FALSE;
995 if (!netconn_secure_connect( &request->netconn, connect->servername ))
997 netconn_close( &request->netconn );
998 heap_free( addressW );
999 return FALSE;
1003 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_CONNECTED_TO_SERVER, addressW, strlenW(addressW) + 1 );
1005 heap_free( addressW );
1006 return TRUE;
1009 void close_connection( request_t *request )
1011 if (!netconn_connected( &request->netconn )) return;
1013 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_CLOSING_CONNECTION, 0, 0 );
1014 netconn_close( &request->netconn );
1015 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_CONNECTION_CLOSED, 0, 0 );
1018 static BOOL add_host_header( request_t *request, DWORD modifier )
1020 BOOL ret;
1021 DWORD len;
1022 WCHAR *host;
1023 static const WCHAR fmt[] = {'%','s',':','%','u',0};
1024 connect_t *connect = request->connect;
1025 INTERNET_PORT port;
1027 port = connect->hostport ? connect->hostport : (request->hdr.flags & WINHTTP_FLAG_SECURE ? 443 : 80);
1029 if (port == INTERNET_DEFAULT_HTTP_PORT || port == INTERNET_DEFAULT_HTTPS_PORT)
1031 return process_header( request, attr_host, connect->hostname, modifier, TRUE );
1033 len = strlenW( connect->hostname ) + 7; /* sizeof(":65335") */
1034 if (!(host = heap_alloc( len * sizeof(WCHAR) ))) return FALSE;
1035 sprintfW( host, fmt, connect->hostname, port );
1036 ret = process_header( request, attr_host, host, modifier, TRUE );
1037 heap_free( host );
1038 return ret;
1041 static BOOL send_request( request_t *request, LPCWSTR headers, DWORD headers_len, LPVOID optional,
1042 DWORD optional_len, DWORD total_len, DWORD_PTR context, BOOL async )
1044 static const WCHAR keep_alive[] = {'K','e','e','p','-','A','l','i','v','e',0};
1045 static const WCHAR no_cache[] = {'n','o','-','c','a','c','h','e',0};
1046 static const WCHAR length_fmt[] = {'%','l','d',0};
1048 BOOL ret = FALSE;
1049 connect_t *connect = request->connect;
1050 session_t *session = connect->session;
1051 WCHAR *req = NULL;
1052 char *req_ascii;
1053 int bytes_sent;
1054 DWORD len, i, flags;
1056 flags = WINHTTP_ADDREQ_FLAG_ADD|WINHTTP_ADDREQ_FLAG_COALESCE_WITH_COMMA;
1057 for (i = 0; i < request->num_accept_types; i++)
1059 process_header( request, attr_accept, request->accept_types[i], flags, TRUE );
1061 if (session->agent)
1062 process_header( request, attr_user_agent, session->agent, WINHTTP_ADDREQ_FLAG_ADD_IF_NEW, TRUE );
1064 if (connect->hostname)
1065 add_host_header( request, WINHTTP_ADDREQ_FLAG_ADD_IF_NEW );
1067 if (total_len || (request->verb && !strcmpW( request->verb, postW )))
1069 WCHAR length[21]; /* decimal long int + null */
1070 sprintfW( length, length_fmt, total_len );
1071 process_header( request, attr_content_length, length, WINHTTP_ADDREQ_FLAG_ADD_IF_NEW, TRUE );
1073 if (!(request->hdr.disable_flags & WINHTTP_DISABLE_KEEP_ALIVE))
1075 process_header( request, attr_connection, keep_alive, WINHTTP_ADDREQ_FLAG_ADD_IF_NEW, TRUE );
1077 if (request->hdr.flags & WINHTTP_FLAG_REFRESH)
1079 process_header( request, attr_pragma, no_cache, WINHTTP_ADDREQ_FLAG_ADD_IF_NEW, TRUE );
1080 process_header( request, attr_cache_control, no_cache, WINHTTP_ADDREQ_FLAG_ADD_IF_NEW, TRUE );
1082 if (headers && !add_request_headers( request, headers, headers_len, WINHTTP_ADDREQ_FLAG_ADD | WINHTTP_ADDREQ_FLAG_REPLACE ))
1084 TRACE("failed to add request headers\n");
1085 return FALSE;
1087 if (!(request->hdr.disable_flags & WINHTTP_DISABLE_COOKIES) && !add_cookie_headers( request ))
1089 WARN("failed to add cookie headers\n");
1090 return FALSE;
1093 if (context) request->hdr.context = context;
1095 if (!(ret = open_connection( request ))) goto end;
1096 if (!(req = build_request_string( request ))) goto end;
1098 if (!(req_ascii = strdupWA( req ))) goto end;
1099 TRACE("full request: %s\n", debugstr_a(req_ascii));
1100 len = strlen(req_ascii);
1102 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_SENDING_REQUEST, NULL, 0 );
1104 ret = netconn_send( &request->netconn, req_ascii, len, 0, &bytes_sent );
1105 heap_free( req_ascii );
1106 if (!ret) goto end;
1108 if (optional_len && !netconn_send( &request->netconn, optional, optional_len, 0, &bytes_sent )) goto end;
1109 len += optional_len;
1111 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_REQUEST_SENT, &len, sizeof(DWORD) );
1113 end:
1114 if (async)
1116 if (ret) send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_SENDREQUEST_COMPLETE, NULL, 0 );
1117 else
1119 WINHTTP_ASYNC_RESULT result;
1120 result.dwResult = API_SEND_REQUEST;
1121 result.dwError = get_last_error();
1122 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_REQUEST_ERROR, &result, sizeof(result) );
1125 heap_free( req );
1126 return ret;
1129 static void task_send_request( task_header_t *task )
1131 send_request_t *s = (send_request_t *)task;
1132 send_request( s->hdr.request, s->headers, s->headers_len, s->optional, s->optional_len, s->total_len, s->context, TRUE );
1133 heap_free( s->headers );
1136 /***********************************************************************
1137 * WinHttpSendRequest (winhttp.@)
1139 BOOL WINAPI WinHttpSendRequest( HINTERNET hrequest, LPCWSTR headers, DWORD headers_len,
1140 LPVOID optional, DWORD optional_len, DWORD total_len, DWORD_PTR context )
1142 BOOL ret;
1143 request_t *request;
1145 TRACE("%p, %s, 0x%x, %u, %u, %lx\n",
1146 hrequest, debugstr_w(headers), headers_len, optional_len, total_len, context);
1148 if (!(request = (request_t *)grab_object( hrequest )))
1150 set_last_error( ERROR_INVALID_HANDLE );
1151 return FALSE;
1153 if (request->hdr.type != WINHTTP_HANDLE_TYPE_REQUEST)
1155 release_object( &request->hdr );
1156 set_last_error( ERROR_WINHTTP_INCORRECT_HANDLE_TYPE );
1157 return FALSE;
1160 if (request->connect->hdr.flags & WINHTTP_FLAG_ASYNC)
1162 send_request_t *s;
1164 if (!(s = heap_alloc( sizeof(send_request_t) ))) return FALSE;
1165 s->hdr.request = request;
1166 s->hdr.proc = task_send_request;
1167 s->headers = strdupW( headers );
1168 s->headers_len = headers_len;
1169 s->optional = optional;
1170 s->optional_len = optional_len;
1171 s->total_len = total_len;
1172 s->context = context;
1174 addref_object( &request->hdr );
1175 ret = queue_task( (task_header_t *)s );
1177 else
1178 ret = send_request( request, headers, headers_len, optional, optional_len, total_len, context, FALSE );
1180 release_object( &request->hdr );
1181 return ret;
1184 #define ARRAYSIZE(array) (sizeof(array) / sizeof((array)[0]))
1186 static DWORD auth_scheme_from_header( WCHAR *header )
1188 static const WCHAR basic[] = {'B','a','s','i','c'};
1189 static const WCHAR ntlm[] = {'N','T','L','M'};
1190 static const WCHAR passport[] = {'P','a','s','s','p','o','r','t'};
1191 static const WCHAR digest[] = {'D','i','g','e','s','t'};
1192 static const WCHAR negotiate[] = {'N','e','g','o','t','i','a','t','e'};
1194 if (!strncmpiW( header, basic, ARRAYSIZE(basic) ) &&
1195 (header[ARRAYSIZE(basic)] == ' ' || !header[ARRAYSIZE(basic)])) return WINHTTP_AUTH_SCHEME_BASIC;
1197 if (!strncmpiW( header, ntlm, ARRAYSIZE(ntlm) ) &&
1198 (header[ARRAYSIZE(ntlm)] == ' ' || !header[ARRAYSIZE(ntlm)])) return WINHTTP_AUTH_SCHEME_NTLM;
1200 if (!strncmpiW( header, passport, ARRAYSIZE(passport) ) &&
1201 (header[ARRAYSIZE(passport)] == ' ' || !header[ARRAYSIZE(passport)])) return WINHTTP_AUTH_SCHEME_PASSPORT;
1203 if (!strncmpiW( header, digest, ARRAYSIZE(digest) ) &&
1204 (header[ARRAYSIZE(digest)] == ' ' || !header[ARRAYSIZE(digest)])) return WINHTTP_AUTH_SCHEME_DIGEST;
1206 if (!strncmpiW( header, negotiate, ARRAYSIZE(negotiate) ) &&
1207 (header[ARRAYSIZE(negotiate)] == ' ' || !header[ARRAYSIZE(negotiate)])) return WINHTTP_AUTH_SCHEME_NEGOTIATE;
1209 return 0;
1212 static BOOL query_auth_schemes( request_t *request, DWORD level, LPDWORD supported, LPDWORD first )
1214 DWORD index = 0;
1215 BOOL ret = FALSE;
1217 for (;;)
1219 WCHAR *buffer;
1220 DWORD size, scheme;
1222 size = 0;
1223 query_headers( request, level, NULL, NULL, &size, &index );
1224 if (get_last_error() != ERROR_INSUFFICIENT_BUFFER) break;
1226 index--;
1227 if (!(buffer = heap_alloc( size ))) return FALSE;
1228 if (!query_headers( request, level, NULL, buffer, &size, &index ))
1230 heap_free( buffer );
1231 return FALSE;
1233 scheme = auth_scheme_from_header( buffer );
1234 if (first && index == 1) *first = scheme;
1235 *supported |= scheme;
1237 heap_free( buffer );
1238 ret = TRUE;
1240 return ret;
1243 /***********************************************************************
1244 * WinHttpQueryAuthSchemes (winhttp.@)
1246 BOOL WINAPI WinHttpQueryAuthSchemes( HINTERNET hrequest, LPDWORD supported, LPDWORD first, LPDWORD target )
1248 BOOL ret = FALSE;
1249 request_t *request;
1251 TRACE("%p, %p, %p, %p\n", hrequest, supported, first, target);
1253 if (!(request = (request_t *)grab_object( hrequest )))
1255 set_last_error( ERROR_INVALID_HANDLE );
1256 return FALSE;
1258 if (request->hdr.type != WINHTTP_HANDLE_TYPE_REQUEST)
1260 release_object( &request->hdr );
1261 set_last_error( ERROR_WINHTTP_INCORRECT_HANDLE_TYPE );
1262 return FALSE;
1265 if (query_auth_schemes( request, WINHTTP_QUERY_WWW_AUTHENTICATE, supported, first ))
1267 *target = WINHTTP_AUTH_TARGET_SERVER;
1268 ret = TRUE;
1270 else if (query_auth_schemes( request, WINHTTP_QUERY_PROXY_AUTHENTICATE, supported, first ))
1272 *target = WINHTTP_AUTH_TARGET_PROXY;
1273 ret = TRUE;
1276 release_object( &request->hdr );
1277 return ret;
1280 static UINT encode_base64( const char *bin, unsigned int len, WCHAR *base64 )
1282 UINT n = 0, x;
1283 static const char base64enc[] =
1284 "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
1286 while (len > 0)
1288 /* first 6 bits, all from bin[0] */
1289 base64[n++] = base64enc[(bin[0] & 0xfc) >> 2];
1290 x = (bin[0] & 3) << 4;
1292 /* next 6 bits, 2 from bin[0] and 4 from bin[1] */
1293 if (len == 1)
1295 base64[n++] = base64enc[x];
1296 base64[n++] = '=';
1297 base64[n++] = '=';
1298 break;
1300 base64[n++] = base64enc[x | ((bin[1] & 0xf0) >> 4)];
1301 x = (bin[1] & 0x0f) << 2;
1303 /* next 6 bits 4 from bin[1] and 2 from bin[2] */
1304 if (len == 2)
1306 base64[n++] = base64enc[x];
1307 base64[n++] = '=';
1308 break;
1310 base64[n++] = base64enc[x | ((bin[2] & 0xc0) >> 6)];
1312 /* last 6 bits, all from bin [2] */
1313 base64[n++] = base64enc[bin[2] & 0x3f];
1314 bin += 3;
1315 len -= 3;
1317 base64[n] = 0;
1318 return n;
1321 static BOOL set_credentials( request_t *request, DWORD target, DWORD scheme, LPCWSTR username, LPCWSTR password )
1323 static const WCHAR basic[] = {'B','a','s','i','c',' ',0};
1324 const WCHAR *auth_scheme, *auth_target;
1325 WCHAR *auth_header;
1326 DWORD len, auth_data_len;
1327 char *auth_data;
1328 BOOL ret;
1330 if (!username || !password)
1332 set_last_error( ERROR_INVALID_PARAMETER );
1333 return FALSE;
1336 switch (target)
1338 case WINHTTP_AUTH_TARGET_SERVER: auth_target = attr_authorization; break;
1339 case WINHTTP_AUTH_TARGET_PROXY: auth_target = attr_proxy_authorization; break;
1340 default:
1341 WARN("unknown target %x\n", target);
1342 return FALSE;
1344 switch (scheme)
1346 case WINHTTP_AUTH_SCHEME_BASIC:
1348 int userlen = WideCharToMultiByte( CP_UTF8, 0, username, strlenW( username ), NULL, 0, NULL, NULL );
1349 int passlen = WideCharToMultiByte( CP_UTF8, 0, password, strlenW( password ), NULL, 0, NULL, NULL );
1351 TRACE("basic authentication\n");
1353 auth_scheme = basic;
1354 auth_data_len = userlen + 1 + passlen;
1355 if (!(auth_data = heap_alloc( auth_data_len ))) return FALSE;
1357 WideCharToMultiByte( CP_UTF8, 0, username, -1, auth_data, userlen, NULL, NULL );
1358 auth_data[userlen] = ':';
1359 WideCharToMultiByte( CP_UTF8, 0, password, -1, auth_data + userlen + 1, passlen, NULL, NULL );
1360 break;
1362 case WINHTTP_AUTH_SCHEME_NTLM:
1363 case WINHTTP_AUTH_SCHEME_PASSPORT:
1364 case WINHTTP_AUTH_SCHEME_DIGEST:
1365 case WINHTTP_AUTH_SCHEME_NEGOTIATE:
1366 FIXME("unimplemented authentication scheme %x\n", scheme);
1367 return FALSE;
1368 default:
1369 WARN("unknown authentication scheme %x\n", scheme);
1370 return FALSE;
1373 len = strlenW( auth_scheme ) + ((auth_data_len + 2) * 4) / 3;
1374 if (!(auth_header = heap_alloc( (len + 1) * sizeof(WCHAR) )))
1376 heap_free( auth_data );
1377 return FALSE;
1379 strcpyW( auth_header, auth_scheme );
1380 encode_base64( auth_data, auth_data_len, auth_header + strlenW( auth_header ) );
1382 ret = process_header( request, auth_target, auth_header, WINHTTP_ADDREQ_FLAG_ADD | WINHTTP_ADDREQ_FLAG_REPLACE, TRUE );
1384 heap_free( auth_data );
1385 heap_free( auth_header );
1386 return ret;
1389 /***********************************************************************
1390 * WinHttpSetCredentials (winhttp.@)
1392 BOOL WINAPI WinHttpSetCredentials( HINTERNET hrequest, DWORD target, DWORD scheme, LPCWSTR username,
1393 LPCWSTR password, LPVOID params )
1395 BOOL ret;
1396 request_t *request;
1398 TRACE("%p, %x, 0x%08x, %s, %p, %p\n", hrequest, target, scheme, debugstr_w(username), password, params);
1400 if (!(request = (request_t *)grab_object( hrequest )))
1402 set_last_error( ERROR_INVALID_HANDLE );
1403 return FALSE;
1405 if (request->hdr.type != WINHTTP_HANDLE_TYPE_REQUEST)
1407 release_object( &request->hdr );
1408 set_last_error( ERROR_WINHTTP_INCORRECT_HANDLE_TYPE );
1409 return FALSE;
1412 ret = set_credentials( request, target, scheme, username, password );
1414 release_object( &request->hdr );
1415 return ret;
1418 static BOOL handle_authorization( request_t *request, DWORD status )
1420 DWORD schemes, level, target;
1421 const WCHAR *username, *password;
1423 switch (status)
1425 case 401:
1426 target = WINHTTP_AUTH_TARGET_SERVER;
1427 level = WINHTTP_QUERY_WWW_AUTHENTICATE;
1428 break;
1430 case 407:
1431 target = WINHTTP_AUTH_TARGET_PROXY;
1432 level = WINHTTP_QUERY_PROXY_AUTHENTICATE;
1433 break;
1435 default:
1436 WARN("unhandled status %u\n", status);
1437 return FALSE;
1440 if (!query_auth_schemes( request, level, &schemes, NULL )) return FALSE;
1442 if (target == WINHTTP_AUTH_TARGET_SERVER)
1444 username = request->connect->username;
1445 password = request->connect->password;
1447 else
1449 username = request->connect->session->proxy_username;
1450 password = request->connect->session->proxy_password;
1453 if (schemes & WINHTTP_AUTH_SCHEME_BASIC)
1454 return set_credentials( request, target, WINHTTP_AUTH_SCHEME_BASIC, username, password );
1456 FIXME("unsupported authentication scheme\n");
1457 return FALSE;
1460 static void clear_response_headers( request_t *request )
1462 unsigned int i;
1464 for (i = 0; i < request->num_headers; i++)
1466 if (!request->headers[i].field) continue;
1467 if (!request->headers[i].value) continue;
1468 if (request->headers[i].is_request) continue;
1469 delete_header( request, i );
1470 i--;
1474 #define MAX_REPLY_LEN 1460
1475 #define INITIAL_HEADER_BUFFER_LEN 512
1477 static BOOL read_reply( request_t *request )
1479 static const WCHAR crlf[] = {'\r','\n',0};
1481 char buffer[MAX_REPLY_LEN];
1482 DWORD buflen, len, offset, received_len, crlf_len = 2; /* strlenW(crlf) */
1483 char *status_code, *status_text;
1484 WCHAR *versionW, *status_textW, *raw_headers;
1485 WCHAR status_codeW[4]; /* sizeof("nnn") */
1487 if (!netconn_connected( &request->netconn )) return FALSE;
1489 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_RECEIVING_RESPONSE, NULL, 0 );
1491 received_len = 0;
1494 buflen = MAX_REPLY_LEN;
1495 if (!netconn_get_next_line( &request->netconn, buffer, &buflen )) return FALSE;
1496 received_len += buflen;
1498 /* first line should look like 'HTTP/1.x nnn OK' where nnn is the status code */
1499 if (!(status_code = strchr( buffer, ' ' ))) return FALSE;
1500 status_code++;
1501 if (!(status_text = strchr( status_code, ' ' ))) return FALSE;
1502 if ((len = status_text - status_code) != sizeof("nnn") - 1) return FALSE;
1503 status_text++;
1505 TRACE("version [%s] status code [%s] status text [%s]\n",
1506 debugstr_an(buffer, status_code - buffer - 1),
1507 debugstr_an(status_code, len),
1508 debugstr_a(status_text));
1510 } while (!memcmp( status_code, "100", len )); /* ignore "100 Continue" responses */
1512 /* we rely on the fact that the protocol is ascii */
1513 MultiByteToWideChar( CP_ACP, 0, status_code, len, status_codeW, len );
1514 status_codeW[len] = 0;
1515 if (!(process_header( request, attr_status, status_codeW, WINHTTP_ADDREQ_FLAG_REPLACE, FALSE ))) return FALSE;
1517 len = status_code - buffer;
1518 if (!(versionW = heap_alloc( len * sizeof(WCHAR) ))) return FALSE;
1519 MultiByteToWideChar( CP_ACP, 0, buffer, len - 1, versionW, len -1 );
1520 versionW[len - 1] = 0;
1522 heap_free( request->version );
1523 request->version = versionW;
1525 len = buflen - (status_text - buffer);
1526 if (!(status_textW = heap_alloc( len * sizeof(WCHAR) ))) return FALSE;
1527 MultiByteToWideChar( CP_ACP, 0, status_text, len, status_textW, len );
1529 heap_free( request->status_text );
1530 request->status_text = status_textW;
1532 len = max( buflen + crlf_len, INITIAL_HEADER_BUFFER_LEN );
1533 if (!(raw_headers = heap_alloc( len * sizeof(WCHAR) ))) return FALSE;
1534 MultiByteToWideChar( CP_ACP, 0, buffer, buflen, raw_headers, buflen );
1535 memcpy( raw_headers + buflen - 1, crlf, sizeof(crlf) );
1537 heap_free( request->raw_headers );
1538 request->raw_headers = raw_headers;
1540 offset = buflen + crlf_len - 1;
1541 for (;;)
1543 header_t *header;
1545 buflen = MAX_REPLY_LEN;
1546 if (!netconn_get_next_line( &request->netconn, buffer, &buflen )) goto end;
1547 received_len += buflen;
1548 if (!*buffer) break;
1550 while (len - offset < buflen + crlf_len)
1552 WCHAR *tmp;
1553 len *= 2;
1554 if (!(tmp = heap_realloc( raw_headers, len * sizeof(WCHAR) ))) return FALSE;
1555 request->raw_headers = raw_headers = tmp;
1557 MultiByteToWideChar( CP_ACP, 0, buffer, buflen, raw_headers + offset, buflen );
1559 if (!(header = parse_header( raw_headers + offset ))) break;
1560 if (!(process_header( request, header->field, header->value, WINHTTP_ADDREQ_FLAG_ADD, FALSE )))
1562 free_header( header );
1563 break;
1565 free_header( header );
1566 memcpy( raw_headers + offset + buflen - 1, crlf, sizeof(crlf) );
1567 offset += buflen + crlf_len - 1;
1570 TRACE("raw headers: %s\n", debugstr_w(raw_headers));
1572 end:
1573 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_RESPONSE_RECEIVED, &received_len, sizeof(DWORD) );
1574 return TRUE;
1577 static BOOL handle_redirect( request_t *request, DWORD status )
1579 BOOL ret = FALSE;
1580 DWORD size, len;
1581 URL_COMPONENTS uc;
1582 connect_t *connect = request->connect;
1583 INTERNET_PORT port;
1584 WCHAR *hostname = NULL, *location = NULL;
1585 int index;
1587 size = 0;
1588 query_headers( request, WINHTTP_QUERY_LOCATION, NULL, NULL, &size, NULL );
1589 if (!(location = heap_alloc( size ))) return FALSE;
1590 if (!query_headers( request, WINHTTP_QUERY_LOCATION, NULL, location, &size, NULL )) goto end;
1592 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_REDIRECT, location, size / sizeof(WCHAR) + 1 );
1594 memset( &uc, 0, sizeof(uc) );
1595 uc.dwStructSize = sizeof(uc);
1596 uc.dwSchemeLength = uc.dwHostNameLength = uc.dwUrlPathLength = uc.dwExtraInfoLength = ~0u;
1598 if (!WinHttpCrackUrl( location, size / sizeof(WCHAR), 0, &uc )) /* assume relative redirect */
1600 WCHAR *path, *p;
1602 len = strlenW( location ) + 1;
1603 if (location[0] != '/') len++;
1604 if (!(p = path = heap_alloc( len * sizeof(WCHAR) ))) goto end;
1606 if (location[0] != '/') *p++ = '/';
1607 strcpyW( p, location );
1609 heap_free( request->path );
1610 request->path = path;
1612 else
1614 if (uc.nScheme == INTERNET_SCHEME_HTTP && request->hdr.flags & WINHTTP_FLAG_SECURE)
1616 TRACE("redirect from secure page to non-secure page\n");
1617 request->hdr.flags &= ~WINHTTP_FLAG_SECURE;
1619 else if (uc.nScheme == INTERNET_SCHEME_HTTPS && !(request->hdr.flags & WINHTTP_FLAG_SECURE))
1621 TRACE("redirect from non-secure page to secure page\n");
1622 request->hdr.flags |= WINHTTP_FLAG_SECURE;
1625 len = uc.dwHostNameLength;
1626 if (!(hostname = heap_alloc( (len + 1) * sizeof(WCHAR) ))) goto end;
1627 memcpy( hostname, uc.lpszHostName, len * sizeof(WCHAR) );
1628 hostname[len] = 0;
1630 port = uc.nPort ? uc.nPort : (uc.nScheme == INTERNET_SCHEME_HTTPS ? 443 : 80);
1631 if (strcmpiW( connect->hostname, hostname ) || connect->serverport != port)
1633 heap_free( connect->hostname );
1634 connect->hostname = hostname;
1635 connect->hostport = port;
1636 if (!(ret = set_server_for_hostname( connect, hostname, port ))) goto end;
1638 netconn_close( &request->netconn );
1639 if (!(ret = netconn_init( &request->netconn, request->hdr.flags & WINHTTP_FLAG_SECURE ))) goto end;
1641 if (!(ret = add_host_header( request, WINHTTP_ADDREQ_FLAG_REPLACE ))) goto end;
1642 if (!(ret = open_connection( request ))) goto end;
1644 heap_free( request->path );
1645 request->path = NULL;
1646 if (uc.dwUrlPathLength)
1648 len = uc.dwUrlPathLength + uc.dwExtraInfoLength;
1649 if (!(request->path = heap_alloc( (len + 1) * sizeof(WCHAR) ))) goto end;
1650 strcpyW( request->path, uc.lpszUrlPath );
1652 else request->path = strdupW( slashW );
1655 /* remove content-type/length headers */
1656 if ((index = get_header_index( request, attr_content_type, 0, TRUE )) >= 0) delete_header( request, index );
1657 if ((index = get_header_index( request, attr_content_length, 0, TRUE )) >= 0 ) delete_header( request, index );
1659 if (status != HTTP_STATUS_REDIRECT_KEEP_VERB && !strcmpW( request->verb, postW ))
1661 heap_free( request->verb );
1662 request->verb = strdupW( getW );
1664 ret = TRUE;
1666 end:
1667 if (!ret) heap_free( hostname );
1668 heap_free( location );
1669 return ret;
1672 static BOOL receive_data( request_t *request, void *buffer, DWORD size, DWORD *read, BOOL async )
1674 DWORD to_read;
1675 int bytes_read;
1677 to_read = min( size, request->content_length - request->content_read );
1678 if (!netconn_recv( &request->netconn, buffer, to_read, async ? 0 : MSG_WAITALL, &bytes_read ))
1680 if (bytes_read != to_read)
1682 ERR("not all data received %d/%d\n", bytes_read, to_read);
1684 /* always return success, even if the network layer returns an error */
1685 *read = 0;
1686 return TRUE;
1688 request->content_read += bytes_read;
1689 *read = bytes_read;
1690 return TRUE;
1693 static DWORD get_chunk_size( const char *buffer )
1695 const char *p;
1696 DWORD size = 0;
1698 for (p = buffer; *p; p++)
1700 if (*p >= '0' && *p <= '9') size = size * 16 + *p - '0';
1701 else if (*p >= 'a' && *p <= 'f') size = size * 16 + *p - 'a' + 10;
1702 else if (*p >= 'A' && *p <= 'F') size = size * 16 + *p - 'A' + 10;
1703 else if (*p == ';') break;
1705 return size;
1708 static BOOL receive_data_chunked( request_t *request, void *buffer, DWORD size, DWORD *read, BOOL async )
1710 char reply[MAX_REPLY_LEN], *p = buffer;
1711 DWORD buflen, to_read, to_write = size;
1712 int bytes_read;
1714 *read = 0;
1715 for (;;)
1717 if (*read == size) break;
1719 if (request->content_length == ~0u) /* new chunk */
1721 buflen = sizeof(reply);
1722 if (!netconn_get_next_line( &request->netconn, reply, &buflen )) break;
1724 if (!(request->content_length = get_chunk_size( reply )))
1726 /* zero sized chunk marks end of transfer; read any trailing headers and return */
1727 read_reply( request );
1728 break;
1731 to_read = min( to_write, request->content_length - request->content_read );
1733 if (!netconn_recv( &request->netconn, p, to_read, async ? 0 : MSG_WAITALL, &bytes_read ))
1735 if (bytes_read != to_read)
1737 ERR("Not all data received %d/%d\n", bytes_read, to_read);
1739 /* always return success, even if the network layer returns an error */
1740 *read = 0;
1741 break;
1743 if (!bytes_read) break;
1745 request->content_read += bytes_read;
1746 to_write -= bytes_read;
1747 *read += bytes_read;
1748 p += bytes_read;
1750 if (request->content_read == request->content_length) /* chunk complete */
1752 request->content_read = 0;
1753 request->content_length = ~0u;
1755 buflen = sizeof(reply);
1756 if (!netconn_get_next_line( &request->netconn, reply, &buflen ))
1758 ERR("Malformed chunk\n");
1759 *read = 0;
1760 break;
1764 return TRUE;
1767 static void finished_reading( request_t *request )
1769 static const WCHAR closeW[] = {'c','l','o','s','e',0};
1771 BOOL close = FALSE;
1772 WCHAR connection[20];
1773 DWORD size = sizeof(connection);
1775 if (request->hdr.disable_flags & WINHTTP_DISABLE_KEEP_ALIVE) close = TRUE;
1776 else if (query_headers( request, WINHTTP_QUERY_CONNECTION, NULL, connection, &size, NULL ) ||
1777 query_headers( request, WINHTTP_QUERY_PROXY_CONNECTION, NULL, connection, &size, NULL ))
1779 if (!strcmpiW( connection, closeW )) close = TRUE;
1781 else if (!strcmpW( request->version, http1_0 )) close = TRUE;
1783 if (close) close_connection( request );
1784 request->content_length = ~0u;
1785 request->content_read = 0;
1788 static BOOL read_data( request_t *request, void *buffer, DWORD to_read, DWORD *read, BOOL async )
1790 static const WCHAR chunked[] = {'c','h','u','n','k','e','d',0};
1792 BOOL ret;
1793 WCHAR encoding[20];
1794 DWORD num_bytes, buflen = sizeof(encoding);
1796 if (query_headers( request, WINHTTP_QUERY_TRANSFER_ENCODING, NULL, encoding, &buflen, NULL ) &&
1797 !strcmpiW( encoding, chunked ))
1799 ret = receive_data_chunked( request, buffer, to_read, &num_bytes, async );
1801 else
1802 ret = receive_data( request, buffer, to_read, &num_bytes, async );
1804 if (async)
1806 if (ret) send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_READ_COMPLETE, buffer, num_bytes );
1807 else
1809 WINHTTP_ASYNC_RESULT result;
1810 result.dwResult = API_READ_DATA;
1811 result.dwError = get_last_error();
1812 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_REQUEST_ERROR, &result, sizeof(result) );
1815 if (ret)
1817 if (read) *read = num_bytes;
1818 if (!num_bytes) finished_reading( request );
1820 return ret;
1823 /* read any content returned by the server so that the connection can be reused */
1824 static void drain_content( request_t *request )
1826 DWORD bytes_read;
1827 char buffer[2048];
1829 if (!request->content_length)
1831 finished_reading( request );
1832 return;
1834 for (;;)
1836 if (!read_data( request, buffer, sizeof(buffer), &bytes_read, FALSE ) || !bytes_read) return;
1840 static void record_cookies( request_t *request )
1842 unsigned int i;
1844 for (i = 0; i < request->num_headers; i++)
1846 header_t *set_cookie = &request->headers[i];
1847 if (!strcmpiW( set_cookie->field, attr_set_cookie ) && !set_cookie->is_request)
1849 set_cookies( request, set_cookie->value );
1854 static BOOL receive_response( request_t *request, BOOL async )
1856 BOOL ret;
1857 DWORD size, query, status;
1859 for (;;)
1861 if (!(ret = read_reply( request )))
1863 set_last_error( ERROR_WINHTTP_INVALID_SERVER_RESPONSE );
1864 break;
1866 size = sizeof(DWORD);
1867 query = WINHTTP_QUERY_STATUS_CODE | WINHTTP_QUERY_FLAG_NUMBER;
1868 if (!(ret = query_headers( request, query, NULL, &status, &size, NULL ))) break;
1870 size = sizeof(DWORD);
1871 query = WINHTTP_QUERY_CONTENT_LENGTH | WINHTTP_QUERY_FLAG_NUMBER;
1872 if (!query_headers( request, query, NULL, &request->content_length, &size, NULL ))
1873 request->content_length = ~0u;
1875 if (!(request->hdr.disable_flags & WINHTTP_DISABLE_COOKIES)) record_cookies( request );
1877 if (status == HTTP_STATUS_MOVED || status == HTTP_STATUS_REDIRECT || status == HTTP_STATUS_REDIRECT_KEEP_VERB)
1879 if (request->hdr.disable_flags & WINHTTP_DISABLE_REDIRECTS) break;
1881 drain_content( request );
1882 if (!(ret = handle_redirect( request, status ))) break;
1884 clear_response_headers( request );
1885 send_request( request, NULL, 0, NULL, 0, 0, 0, FALSE ); /* recurse synchronously */
1886 continue;
1888 else if (status == 401 || status == 407)
1890 if (request->hdr.disable_flags & WINHTTP_DISABLE_AUTHENTICATION) break;
1892 drain_content( request );
1893 if (!handle_authorization( request, status ))
1895 ret = TRUE;
1896 break;
1898 clear_response_headers( request );
1899 send_request( request, NULL, 0, NULL, 0, 0, 0, FALSE );
1900 continue;
1902 break;
1905 if (async)
1907 if (ret) send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_HEADERS_AVAILABLE, NULL, 0 );
1908 else
1910 WINHTTP_ASYNC_RESULT result;
1911 result.dwResult = API_RECEIVE_RESPONSE;
1912 result.dwError = get_last_error();
1913 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_REQUEST_ERROR, &result, sizeof(result) );
1916 return ret;
1919 static void task_receive_response( task_header_t *task )
1921 receive_response_t *r = (receive_response_t *)task;
1922 receive_response( r->hdr.request, TRUE );
1925 /***********************************************************************
1926 * WinHttpReceiveResponse (winhttp.@)
1928 BOOL WINAPI WinHttpReceiveResponse( HINTERNET hrequest, LPVOID reserved )
1930 BOOL ret;
1931 request_t *request;
1933 TRACE("%p, %p\n", hrequest, reserved);
1935 if (!(request = (request_t *)grab_object( hrequest )))
1937 set_last_error( ERROR_INVALID_HANDLE );
1938 return FALSE;
1940 if (request->hdr.type != WINHTTP_HANDLE_TYPE_REQUEST)
1942 release_object( &request->hdr );
1943 set_last_error( ERROR_WINHTTP_INCORRECT_HANDLE_TYPE );
1944 return FALSE;
1947 if (request->connect->hdr.flags & WINHTTP_FLAG_ASYNC)
1949 receive_response_t *r;
1951 if (!(r = heap_alloc( sizeof(receive_response_t) ))) return FALSE;
1952 r->hdr.request = request;
1953 r->hdr.proc = task_receive_response;
1955 addref_object( &request->hdr );
1956 ret = queue_task( (task_header_t *)r );
1958 else
1959 ret = receive_response( request, FALSE );
1961 release_object( &request->hdr );
1962 return ret;
1965 static BOOL query_data( request_t *request, LPDWORD available, BOOL async )
1967 BOOL ret;
1968 DWORD num_bytes;
1970 if ((ret = netconn_query_data_available( &request->netconn, &num_bytes )))
1972 if (request->content_read < request->content_length)
1974 if (!num_bytes)
1976 char buffer[4096];
1977 size_t to_read = min( sizeof(buffer), request->content_length - request->content_read );
1979 ret = netconn_recv( &request->netconn, buffer, to_read, MSG_PEEK, (int *)&num_bytes );
1980 if (ret && !num_bytes) WARN("expected more data to be available\n");
1983 else if (num_bytes)
1985 WARN("extra data available %u\n", num_bytes);
1986 ret = FALSE;
1989 TRACE("%u bytes available\n", num_bytes);
1991 if (async)
1993 if (ret) send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_DATA_AVAILABLE, &num_bytes, sizeof(DWORD) );
1994 else
1996 WINHTTP_ASYNC_RESULT result;
1997 result.dwResult = API_QUERY_DATA_AVAILABLE;
1998 result.dwError = get_last_error();
1999 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_REQUEST_ERROR, &result, sizeof(result) );
2002 if (ret && available) *available = num_bytes;
2003 return ret;
2006 static void task_query_data( task_header_t *task )
2008 query_data_t *q = (query_data_t *)task;
2009 query_data( q->hdr.request, q->available, TRUE );
2012 /***********************************************************************
2013 * WinHttpQueryDataAvailable (winhttp.@)
2015 BOOL WINAPI WinHttpQueryDataAvailable( HINTERNET hrequest, LPDWORD available )
2017 BOOL ret;
2018 request_t *request;
2020 TRACE("%p, %p\n", hrequest, available);
2022 if (!(request = (request_t *)grab_object( hrequest )))
2024 set_last_error( ERROR_INVALID_HANDLE );
2025 return FALSE;
2027 if (request->hdr.type != WINHTTP_HANDLE_TYPE_REQUEST)
2029 release_object( &request->hdr );
2030 set_last_error( ERROR_WINHTTP_INCORRECT_HANDLE_TYPE );
2031 return FALSE;
2034 if (request->connect->hdr.flags & WINHTTP_FLAG_ASYNC)
2036 query_data_t *q;
2038 if (!(q = heap_alloc( sizeof(query_data_t) ))) return FALSE;
2039 q->hdr.request = request;
2040 q->hdr.proc = task_query_data;
2041 q->available = available;
2043 addref_object( &request->hdr );
2044 ret = queue_task( (task_header_t *)q );
2046 else
2047 ret = query_data( request, available, FALSE );
2049 release_object( &request->hdr );
2050 return ret;
2053 static void task_read_data( task_header_t *task )
2055 read_data_t *r = (read_data_t *)task;
2056 read_data( r->hdr.request, r->buffer, r->to_read, r->read, TRUE );
2059 /***********************************************************************
2060 * WinHttpReadData (winhttp.@)
2062 BOOL WINAPI WinHttpReadData( HINTERNET hrequest, LPVOID buffer, DWORD to_read, LPDWORD read )
2064 BOOL ret;
2065 request_t *request;
2067 TRACE("%p, %p, %d, %p\n", hrequest, buffer, to_read, read);
2069 if (!(request = (request_t *)grab_object( hrequest )))
2071 set_last_error( ERROR_INVALID_HANDLE );
2072 return FALSE;
2074 if (request->hdr.type != WINHTTP_HANDLE_TYPE_REQUEST)
2076 release_object( &request->hdr );
2077 set_last_error( ERROR_WINHTTP_INCORRECT_HANDLE_TYPE );
2078 return FALSE;
2081 if (request->connect->hdr.flags & WINHTTP_FLAG_ASYNC)
2083 read_data_t *r;
2085 if (!(r = heap_alloc( sizeof(read_data_t) ))) return FALSE;
2086 r->hdr.request = request;
2087 r->hdr.proc = task_read_data;
2088 r->buffer = buffer;
2089 r->to_read = to_read;
2090 r->read = read;
2092 addref_object( &request->hdr );
2093 ret = queue_task( (task_header_t *)r );
2095 else
2096 ret = read_data( request, buffer, to_read, read, FALSE );
2098 release_object( &request->hdr );
2099 return ret;
2102 static BOOL write_data( request_t *request, LPCVOID buffer, DWORD to_write, LPDWORD written, BOOL async )
2104 BOOL ret;
2105 int num_bytes;
2107 ret = netconn_send( &request->netconn, buffer, to_write, 0, &num_bytes );
2109 if (async)
2111 if (ret) send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_WRITE_COMPLETE, &num_bytes, sizeof(DWORD) );
2112 else
2114 WINHTTP_ASYNC_RESULT result;
2115 result.dwResult = API_WRITE_DATA;
2116 result.dwError = get_last_error();
2117 send_callback( &request->hdr, WINHTTP_CALLBACK_STATUS_REQUEST_ERROR, &result, sizeof(result) );
2120 if (ret && written) *written = num_bytes;
2121 return ret;
2124 static void task_write_data( task_header_t *task )
2126 write_data_t *w = (write_data_t *)task;
2127 write_data( w->hdr.request, w->buffer, w->to_write, w->written, TRUE );
2130 /***********************************************************************
2131 * WinHttpWriteData (winhttp.@)
2133 BOOL WINAPI WinHttpWriteData( HINTERNET hrequest, LPCVOID buffer, DWORD to_write, LPDWORD written )
2135 BOOL ret;
2136 request_t *request;
2138 TRACE("%p, %p, %d, %p\n", hrequest, buffer, to_write, written);
2140 if (!(request = (request_t *)grab_object( hrequest )))
2142 set_last_error( ERROR_INVALID_HANDLE );
2143 return FALSE;
2145 if (request->hdr.type != WINHTTP_HANDLE_TYPE_REQUEST)
2147 release_object( &request->hdr );
2148 set_last_error( ERROR_WINHTTP_INCORRECT_HANDLE_TYPE );
2149 return FALSE;
2152 if (request->connect->hdr.flags & WINHTTP_FLAG_ASYNC)
2154 write_data_t *w;
2156 if (!(w = heap_alloc( sizeof(write_data_t) ))) return FALSE;
2157 w->hdr.request = request;
2158 w->hdr.proc = task_write_data;
2159 w->buffer = buffer;
2160 w->to_write = to_write;
2161 w->written = written;
2163 addref_object( &request->hdr );
2164 ret = queue_task( (task_header_t *)w );
2166 else
2167 ret = write_data( request, buffer, to_write, written, FALSE );
2169 release_object( &request->hdr );
2170 return ret;
2173 enum request_state
2175 REQUEST_STATE_UNINITIALIZED,
2176 REQUEST_STATE_INITIALIZED,
2177 REQUEST_STATE_CANCELLED,
2178 REQUEST_STATE_OPEN,
2179 REQUEST_STATE_SENT,
2180 REQUEST_STATE_RESPONSE_RECEIVED
2183 struct winhttp_request
2185 IWinHttpRequest IWinHttpRequest_iface;
2186 LONG refs;
2187 CRITICAL_SECTION cs;
2188 enum request_state state;
2189 HINTERNET hsession;
2190 HINTERNET hconnect;
2191 HINTERNET hrequest;
2192 VARIANT data;
2193 WCHAR *verb;
2194 HANDLE thread;
2195 HANDLE wait;
2196 HANDLE cancel;
2197 char *buffer;
2198 DWORD offset;
2199 DWORD bytes_available;
2200 DWORD bytes_read;
2201 DWORD error;
2202 DWORD logon_policy;
2203 DWORD disable_feature;
2204 LONG resolve_timeout;
2205 LONG connect_timeout;
2206 LONG send_timeout;
2207 LONG receive_timeout;
2208 WINHTTP_PROXY_INFO proxy;
2211 static inline struct winhttp_request *impl_from_IWinHttpRequest( IWinHttpRequest *iface )
2213 return CONTAINING_RECORD( iface, struct winhttp_request, IWinHttpRequest_iface );
2216 static ULONG WINAPI winhttp_request_AddRef(
2217 IWinHttpRequest *iface )
2219 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2220 return InterlockedIncrement( &request->refs );
2223 /* critical section must be held */
2224 static void cancel_request( struct winhttp_request *request )
2226 if (request->state <= REQUEST_STATE_CANCELLED) return;
2227 if (request->thread) SetEvent( request->cancel );
2228 request->state = REQUEST_STATE_CANCELLED;
2231 /* critical section must be held */
2232 static void free_request( struct winhttp_request *request )
2234 if (request->state < REQUEST_STATE_INITIALIZED) return;
2235 WinHttpCloseHandle( request->hrequest );
2236 WinHttpCloseHandle( request->hconnect );
2237 WinHttpCloseHandle( request->hsession );
2238 CloseHandle( request->thread );
2239 CloseHandle( request->wait );
2240 CloseHandle( request->cancel );
2241 heap_free( (WCHAR *)request->proxy.lpszProxy );
2242 heap_free( (WCHAR *)request->proxy.lpszProxyBypass );
2243 heap_free( request->buffer );
2244 heap_free( request->verb );
2245 VariantClear( &request->data );
2248 static ULONG WINAPI winhttp_request_Release(
2249 IWinHttpRequest *iface )
2251 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2252 LONG refs = InterlockedDecrement( &request->refs );
2253 if (!refs)
2255 TRACE("destroying %p\n", request);
2257 EnterCriticalSection( &request->cs );
2258 cancel_request( request );
2259 free_request( request );
2260 LeaveCriticalSection( &request->cs );
2261 request->cs.DebugInfo->Spare[0] = 0;
2262 DeleteCriticalSection( &request->cs );
2263 heap_free( request );
2265 return refs;
2268 static HRESULT WINAPI winhttp_request_QueryInterface(
2269 IWinHttpRequest *iface,
2270 REFIID riid,
2271 void **obj )
2273 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2275 TRACE("%p, %s, %p\n", request, debugstr_guid(riid), obj );
2277 if (IsEqualGUID( riid, &IID_IWinHttpRequest ) ||
2278 IsEqualGUID( riid, &IID_IDispatch ) ||
2279 IsEqualGUID( riid, &IID_IUnknown ))
2281 *obj = iface;
2283 else
2285 FIXME("interface %s not implemented\n", debugstr_guid(riid));
2286 return E_NOINTERFACE;
2288 IWinHttpRequest_AddRef( iface );
2289 return S_OK;
2292 static HRESULT WINAPI winhttp_request_GetTypeInfoCount(
2293 IWinHttpRequest *iface,
2294 UINT *count )
2296 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2298 TRACE("%p, %p\n", request, count);
2299 *count = 1;
2300 return S_OK;
2303 enum type_id
2305 IWinHttpRequest_tid,
2306 last_tid
2309 static ITypeLib *winhttp_typelib;
2310 static ITypeInfo *winhttp_typeinfo[last_tid];
2312 static REFIID winhttp_tid_id[] =
2314 &IID_IWinHttpRequest
2317 static HRESULT get_typeinfo( enum type_id tid, ITypeInfo **ret )
2319 HRESULT hr;
2321 if (!winhttp_typelib)
2323 ITypeLib *typelib;
2325 hr = LoadRegTypeLib( &LIBID_WinHttp, 5, 1, LOCALE_SYSTEM_DEFAULT, &typelib );
2326 if (FAILED(hr))
2328 ERR("LoadRegTypeLib failed: %08x\n", hr);
2329 return hr;
2331 if (InterlockedCompareExchangePointer( (void **)&winhttp_typelib, typelib, NULL ))
2332 ITypeLib_Release( typelib );
2334 if (!winhttp_typeinfo[tid])
2336 ITypeInfo *typeinfo;
2338 hr = ITypeLib_GetTypeInfoOfGuid( winhttp_typelib, winhttp_tid_id[tid], &typeinfo );
2339 if (FAILED(hr))
2341 ERR("GetTypeInfoOfGuid(%s) failed: %08x\n", debugstr_guid(winhttp_tid_id[tid]), hr);
2342 return hr;
2344 if (InterlockedCompareExchangePointer( (void **)(winhttp_typeinfo + tid), typeinfo, NULL ))
2345 ITypeInfo_Release( typeinfo );
2347 *ret = winhttp_typeinfo[tid];
2348 return S_OK;
2351 static HRESULT WINAPI winhttp_request_GetTypeInfo(
2352 IWinHttpRequest *iface,
2353 UINT index,
2354 LCID lcid,
2355 ITypeInfo **info )
2357 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2358 TRACE("%p, %u, %u, %p\n", request, index, lcid, info);
2360 return get_typeinfo( IWinHttpRequest_tid, info );
2363 static HRESULT WINAPI winhttp_request_GetIDsOfNames(
2364 IWinHttpRequest *iface,
2365 REFIID riid,
2366 LPOLESTR *names,
2367 UINT count,
2368 LCID lcid,
2369 DISPID *dispid )
2371 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2372 ITypeInfo *typeinfo;
2373 HRESULT hr;
2375 TRACE("%p, %s, %p, %u, %u, %p\n", request, debugstr_guid(riid), names, count, lcid, dispid);
2377 if (!names || !count || !dispid) return E_INVALIDARG;
2379 hr = get_typeinfo( IWinHttpRequest_tid, &typeinfo );
2380 if (SUCCEEDED(hr))
2382 hr = ITypeInfo_GetIDsOfNames( typeinfo, names, count, dispid );
2383 ITypeInfo_Release( typeinfo );
2385 return hr;
2388 static HRESULT WINAPI winhttp_request_Invoke(
2389 IWinHttpRequest *iface,
2390 DISPID member,
2391 REFIID riid,
2392 LCID lcid,
2393 WORD flags,
2394 DISPPARAMS *params,
2395 VARIANT *result,
2396 EXCEPINFO *excep_info,
2397 UINT *arg_err )
2399 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2400 ITypeInfo *typeinfo;
2401 HRESULT hr;
2403 TRACE("%p, %d, %s, %d, %d, %p, %p, %p, %p\n", request, member, debugstr_guid(riid),
2404 lcid, flags, params, result, excep_info, arg_err);
2406 hr = get_typeinfo( IWinHttpRequest_tid, &typeinfo );
2407 if (SUCCEEDED(hr))
2409 hr = ITypeInfo_Invoke( typeinfo, &request->IWinHttpRequest_iface, member, flags,
2410 params, result, excep_info, arg_err );
2411 ITypeInfo_Release( typeinfo );
2413 return hr;
2416 static HRESULT WINAPI winhttp_request_SetProxy(
2417 IWinHttpRequest *iface,
2418 HTTPREQUEST_PROXY_SETTING proxy_setting,
2419 VARIANT proxy_server,
2420 VARIANT bypass_list )
2422 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2423 DWORD err = ERROR_SUCCESS;
2425 TRACE("%p, %u, %s, %s\n", request, proxy_setting, debugstr_variant(&proxy_server),
2426 debugstr_variant(&bypass_list));
2428 EnterCriticalSection( &request->cs );
2429 switch (proxy_setting)
2431 case HTTPREQUEST_PROXYSETTING_DEFAULT:
2432 request->proxy.dwAccessType = WINHTTP_ACCESS_TYPE_DEFAULT_PROXY;
2433 heap_free( (WCHAR *)request->proxy.lpszProxy );
2434 heap_free( (WCHAR *)request->proxy.lpszProxyBypass );
2435 request->proxy.lpszProxy = NULL;
2436 request->proxy.lpszProxyBypass = NULL;
2437 break;
2439 case HTTPREQUEST_PROXYSETTING_DIRECT:
2440 request->proxy.dwAccessType = WINHTTP_ACCESS_TYPE_NO_PROXY;
2441 heap_free( (WCHAR *)request->proxy.lpszProxy );
2442 heap_free( (WCHAR *)request->proxy.lpszProxyBypass );
2443 request->proxy.lpszProxy = NULL;
2444 request->proxy.lpszProxyBypass = NULL;
2445 break;
2447 case HTTPREQUEST_PROXYSETTING_PROXY:
2448 request->proxy.dwAccessType = WINHTTP_ACCESS_TYPE_NAMED_PROXY;
2449 if (V_VT( &proxy_server ) == VT_BSTR)
2451 heap_free( (WCHAR *)request->proxy.lpszProxy );
2452 request->proxy.lpszProxy = strdupW( V_BSTR( &proxy_server ) );
2454 if (V_VT( &bypass_list ) == VT_BSTR)
2456 heap_free( (WCHAR *)request->proxy.lpszProxyBypass );
2457 request->proxy.lpszProxyBypass = strdupW( V_BSTR( &bypass_list ) );
2459 break;
2461 default:
2462 err = ERROR_INVALID_PARAMETER;
2463 break;
2465 LeaveCriticalSection( &request->cs );
2466 return HRESULT_FROM_WIN32( err );
2469 static HRESULT WINAPI winhttp_request_SetCredentials(
2470 IWinHttpRequest *iface,
2471 BSTR username,
2472 BSTR password,
2473 HTTPREQUEST_SETCREDENTIALS_FLAGS flags )
2475 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2476 DWORD target, scheme = WINHTTP_AUTH_SCHEME_BASIC; /* FIXME: query supported schemes */
2477 DWORD err = ERROR_SUCCESS;
2479 TRACE("%p, %s, %p\n", request, debugstr_w(username), password);
2481 EnterCriticalSection( &request->cs );
2482 if (request->state < REQUEST_STATE_OPEN)
2484 err = ERROR_WINHTTP_CANNOT_CALL_BEFORE_OPEN;
2485 goto done;
2487 switch (flags)
2489 case HTTPREQUEST_SETCREDENTIALS_FOR_SERVER:
2490 target = WINHTTP_AUTH_TARGET_SERVER;
2491 break;
2492 case HTTPREQUEST_SETCREDENTIALS_FOR_PROXY:
2493 target = WINHTTP_AUTH_TARGET_PROXY;
2494 break;
2495 default:
2496 err = ERROR_INVALID_PARAMETER;
2497 goto done;
2499 if (!WinHttpSetCredentials( request->hrequest, target, scheme, username, password, NULL ))
2501 err = get_last_error();
2503 done:
2504 LeaveCriticalSection( &request->cs );
2505 return HRESULT_FROM_WIN32( err );
2508 static void initialize_request( struct winhttp_request *request )
2510 request->hrequest = NULL;
2511 request->hconnect = NULL;
2512 request->hsession = NULL;
2513 request->thread = NULL;
2514 request->wait = NULL;
2515 request->cancel = NULL;
2516 request->buffer = NULL;
2517 request->verb = NULL;
2518 request->offset = 0;
2519 request->bytes_available = 0;
2520 request->bytes_read = 0;
2521 request->error = ERROR_SUCCESS;
2522 request->logon_policy = WINHTTP_AUTOLOGON_SECURITY_LEVEL_MEDIUM;
2523 request->disable_feature = WINHTTP_DISABLE_AUTHENTICATION;
2524 request->proxy.dwAccessType = WINHTTP_ACCESS_TYPE_DEFAULT_PROXY;
2525 request->proxy.lpszProxy = NULL;
2526 request->proxy.lpszProxyBypass = NULL;
2527 request->resolve_timeout = 0;
2528 request->connect_timeout = 60000;
2529 request->send_timeout = 30000;
2530 request->receive_timeout = 30000;
2531 VariantInit( &request->data );
2532 request->state = REQUEST_STATE_INITIALIZED;
2535 static HRESULT WINAPI winhttp_request_Open(
2536 IWinHttpRequest *iface,
2537 BSTR method,
2538 BSTR url,
2539 VARIANT async )
2541 static const WCHAR typeW[] = {'*','/','*',0};
2542 static const WCHAR *acceptW[] = {typeW, NULL};
2543 static const WCHAR httpsW[] = {'h','t','t','p','s'};
2544 static const WCHAR user_agentW[] = {
2545 'M','o','z','i','l','l','a','/','4','.','0',' ','(','c','o','m','p','a','t','i','b','l','e',';',' ',
2546 'W','i','n','3','2',';',' ','W','i','n','H','t','t','p','.','W','i','n','H','t','t','p',
2547 'R','e','q','u','e','s','t','.','5',')',0};
2548 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2549 HINTERNET hsession = NULL, hconnect = NULL, hrequest;
2550 URL_COMPONENTS uc;
2551 WCHAR *hostname, *path = NULL, *verb = NULL;
2552 DWORD err = ERROR_OUTOFMEMORY, len, flags = 0, request_flags = 0;
2554 TRACE("%p, %s, %s, %s\n", request, debugstr_w(method), debugstr_w(url),
2555 debugstr_variant(&async));
2557 if (!method || !url) return E_INVALIDARG;
2559 memset( &uc, 0, sizeof(uc) );
2560 uc.dwStructSize = sizeof(uc);
2561 uc.dwSchemeLength = ~0u;
2562 uc.dwHostNameLength = ~0u;
2563 uc.dwUrlPathLength = ~0u;
2564 uc.dwExtraInfoLength = ~0u;
2565 if (!WinHttpCrackUrl( url, 0, 0, &uc )) return HRESULT_FROM_WIN32( get_last_error() );
2567 EnterCriticalSection( &request->cs );
2568 if (request->state != REQUEST_STATE_INITIALIZED)
2570 cancel_request( request );
2571 free_request( request );
2572 initialize_request( request );
2574 if (!(hostname = heap_alloc( (uc.dwHostNameLength + 1) * sizeof(WCHAR) ))) goto error;
2575 memcpy( hostname, uc.lpszHostName, uc.dwHostNameLength * sizeof(WCHAR) );
2576 hostname[uc.dwHostNameLength] = 0;
2578 if (!(path = heap_alloc( (uc.dwUrlPathLength + uc.dwExtraInfoLength + 1) * sizeof(WCHAR) ))) goto error;
2579 memcpy( path, uc.lpszUrlPath, (uc.dwUrlPathLength + uc.dwExtraInfoLength) * sizeof(WCHAR) );
2580 path[uc.dwUrlPathLength + uc.dwExtraInfoLength] = 0;
2582 if (!(verb = strdupW( method ))) goto error;
2583 if (V_BOOL( &async )) flags |= WINHTTP_FLAG_ASYNC;
2584 if (!(hsession = WinHttpOpen( user_agentW, WINHTTP_ACCESS_TYPE_DEFAULT_PROXY, NULL, NULL, flags )))
2586 err = get_last_error();
2587 goto error;
2589 if (!(hconnect = WinHttpConnect( hsession, hostname, uc.nPort, 0 )))
2591 err = get_last_error();
2592 goto error;
2594 len = sizeof(httpsW) / sizeof(WCHAR);
2595 if (uc.dwSchemeLength == len && !memcmp( uc.lpszScheme, httpsW, len * sizeof(WCHAR) ))
2597 request_flags |= WINHTTP_FLAG_SECURE;
2599 if (!(hrequest = WinHttpOpenRequest( hconnect, method, path, NULL, NULL, acceptW, request_flags )))
2601 err = get_last_error();
2602 goto error;
2604 if (flags & WINHTTP_FLAG_ASYNC)
2606 request->wait = CreateEventW( NULL, FALSE, FALSE, NULL );
2607 request->cancel = CreateEventW( NULL, FALSE, FALSE, NULL );
2608 WinHttpSetOption( hrequest, WINHTTP_OPTION_CONTEXT_VALUE, &request, sizeof(request) );
2610 request->state = REQUEST_STATE_OPEN;
2611 request->hsession = hsession;
2612 request->hconnect = hconnect;
2613 request->hrequest = hrequest;
2614 request->verb = verb;
2615 heap_free( hostname );
2616 heap_free( path );
2617 LeaveCriticalSection( &request->cs );
2618 return S_OK;
2620 error:
2621 WinHttpCloseHandle( hconnect );
2622 WinHttpCloseHandle( hsession );
2623 heap_free( hostname );
2624 heap_free( path );
2625 heap_free( verb );
2626 LeaveCriticalSection( &request->cs );
2627 return HRESULT_FROM_WIN32( err );
2630 static HRESULT WINAPI winhttp_request_SetRequestHeader(
2631 IWinHttpRequest *iface,
2632 BSTR header,
2633 BSTR value )
2635 static const WCHAR fmtW[] = {'%','s',':',' ','%','s','\r','\n',0};
2636 static const WCHAR emptyW[] = {0};
2637 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2638 DWORD len, err = ERROR_SUCCESS;
2639 WCHAR *str;
2641 TRACE("%p, %s, %s\n", request, debugstr_w(header), debugstr_w(value));
2643 if (!header) return E_INVALIDARG;
2645 EnterCriticalSection( &request->cs );
2646 if (request->state < REQUEST_STATE_OPEN)
2648 err = ERROR_WINHTTP_CANNOT_CALL_BEFORE_OPEN;
2649 goto done;
2651 if (request->state >= REQUEST_STATE_SENT)
2653 err = ERROR_WINHTTP_CANNOT_CALL_AFTER_SEND;
2654 goto done;
2656 len = strlenW( header ) + 4;
2657 if (value) len += strlenW( value );
2658 if (!(str = heap_alloc( (len + 1) * sizeof(WCHAR) )))
2660 err = ERROR_OUTOFMEMORY;
2661 goto done;
2663 sprintfW( str, fmtW, header, value ? value : emptyW );
2664 if (!WinHttpAddRequestHeaders( request->hrequest, str, len, WINHTTP_ADDREQ_FLAG_REPLACE ))
2666 err = get_last_error();
2668 heap_free( str );
2670 done:
2671 LeaveCriticalSection( &request->cs );
2672 return HRESULT_FROM_WIN32( err );
2675 static HRESULT WINAPI winhttp_request_GetResponseHeader(
2676 IWinHttpRequest *iface,
2677 BSTR header,
2678 BSTR *value )
2680 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2681 DWORD size, err = ERROR_SUCCESS;
2683 TRACE("%p, %p\n", request, header);
2685 EnterCriticalSection( &request->cs );
2686 if (request->state < REQUEST_STATE_SENT)
2688 err = ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND;
2689 goto done;
2691 if (!header || !value)
2693 err = ERROR_INVALID_PARAMETER;
2694 goto done;
2696 size = 0;
2697 if (!WinHttpQueryHeaders( request->hrequest, WINHTTP_QUERY_CUSTOM, header, NULL, &size, NULL ))
2699 err = get_last_error();
2700 if (err != ERROR_INSUFFICIENT_BUFFER) goto done;
2702 if (!(*value = SysAllocStringLen( NULL, size / sizeof(WCHAR) )))
2704 err = ERROR_OUTOFMEMORY;
2705 goto done;
2707 err = ERROR_SUCCESS;
2708 if (!WinHttpQueryHeaders( request->hrequest, WINHTTP_QUERY_CUSTOM, header, *value, &size, NULL ))
2710 err = get_last_error();
2711 SysFreeString( *value );
2713 done:
2714 LeaveCriticalSection( &request->cs );
2715 return HRESULT_FROM_WIN32( err );
2718 static HRESULT WINAPI winhttp_request_GetAllResponseHeaders(
2719 IWinHttpRequest *iface,
2720 BSTR *headers )
2722 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2723 DWORD size, err = ERROR_SUCCESS;
2725 TRACE("%p, %p\n", request, headers);
2727 if (!headers) return E_INVALIDARG;
2729 EnterCriticalSection( &request->cs );
2730 if (request->state < REQUEST_STATE_SENT)
2732 err = ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND;
2733 goto done;
2735 size = 0;
2736 if (!WinHttpQueryHeaders( request->hrequest, WINHTTP_QUERY_RAW_HEADERS_CRLF, NULL, NULL, &size, NULL ))
2738 err = get_last_error();
2739 if (err != ERROR_INSUFFICIENT_BUFFER) goto done;
2741 if (!(*headers = SysAllocStringLen( NULL, size / sizeof(WCHAR) )))
2743 err = ERROR_OUTOFMEMORY;
2744 goto done;
2746 err = ERROR_SUCCESS;
2747 if (!WinHttpQueryHeaders( request->hrequest, WINHTTP_QUERY_RAW_HEADERS_CRLF, NULL, *headers, &size, NULL ))
2749 err = get_last_error();
2750 SysFreeString( *headers );
2752 done:
2753 LeaveCriticalSection( &request->cs );
2754 return HRESULT_FROM_WIN32( err );
2757 static void CALLBACK wait_status_callback( HINTERNET handle, DWORD_PTR context, DWORD status, LPVOID buffer, DWORD size )
2759 struct winhttp_request *request = (struct winhttp_request *)context;
2761 switch (status)
2763 case WINHTTP_CALLBACK_STATUS_DATA_AVAILABLE:
2764 request->bytes_available = *(DWORD *)buffer;
2765 request->error = ERROR_SUCCESS;
2766 break;
2767 case WINHTTP_CALLBACK_STATUS_READ_COMPLETE:
2768 request->bytes_read = size;
2769 request->error = ERROR_SUCCESS;
2770 break;
2771 case WINHTTP_CALLBACK_STATUS_REQUEST_ERROR:
2773 WINHTTP_ASYNC_RESULT *result = (WINHTTP_ASYNC_RESULT *)buffer;
2774 request->error = result->dwError;
2775 break;
2777 default: break;
2779 SetEvent( request->wait );
2782 static void wait_set_status_callback( struct winhttp_request *request, DWORD status )
2784 if (!request->wait) return;
2785 status |= WINHTTP_CALLBACK_STATUS_REQUEST_ERROR;
2786 WinHttpSetStatusCallback( request->hrequest, wait_status_callback, status, 0 );
2789 static DWORD wait_for_completion( struct winhttp_request *request )
2791 HANDLE handles[2];
2793 if (!request->wait)
2795 request->error = ERROR_SUCCESS;
2796 return ERROR_SUCCESS;
2798 handles[0] = request->wait;
2799 handles[1] = request->cancel;
2800 switch (WaitForMultipleObjects( 2, handles, FALSE, INFINITE ))
2802 case WAIT_OBJECT_0:
2803 break;
2804 case WAIT_OBJECT_0 + 1:
2805 request->error = ERROR_CANCELLED;
2806 break;
2807 default:
2808 request->error = get_last_error();
2809 break;
2811 return request->error;
2814 static HRESULT request_receive( struct winhttp_request *request )
2816 DWORD err, size, total_bytes_read, buflen = 4096;
2818 wait_set_status_callback( request, WINHTTP_CALLBACK_STATUS_HEADERS_AVAILABLE );
2819 if (!WinHttpReceiveResponse( request->hrequest, NULL ))
2821 return HRESULT_FROM_WIN32( get_last_error() );
2823 if ((err = wait_for_completion( request ))) return HRESULT_FROM_WIN32( err );
2824 if (!strcmpW( request->verb, headW ))
2826 request->state = REQUEST_STATE_RESPONSE_RECEIVED;
2827 return S_OK;
2829 if (!(request->buffer = heap_alloc( buflen ))) return E_OUTOFMEMORY;
2830 request->buffer[0] = 0;
2831 size = total_bytes_read = 0;
2834 wait_set_status_callback( request, WINHTTP_CALLBACK_STATUS_DATA_AVAILABLE );
2835 if (!WinHttpQueryDataAvailable( request->hrequest, &request->bytes_available ))
2837 err = get_last_error();
2838 goto error;
2840 if ((err = wait_for_completion( request ))) goto error;
2841 if (!request->bytes_available) break;
2842 size += request->bytes_available;
2843 if (buflen < size)
2845 char *tmp;
2846 while (buflen < size) buflen *= 2;
2847 if (!(tmp = heap_realloc( request->buffer, buflen )))
2849 err = ERROR_OUTOFMEMORY;
2850 goto error;
2852 request->buffer = tmp;
2854 wait_set_status_callback( request, WINHTTP_CALLBACK_STATUS_READ_COMPLETE );
2855 if (!WinHttpReadData( request->hrequest, request->buffer + request->offset,
2856 request->bytes_available, &request->bytes_read ))
2858 err = get_last_error();
2859 goto error;
2861 if ((err = wait_for_completion( request ))) goto error;
2862 total_bytes_read += request->bytes_read;
2863 request->offset += request->bytes_read;
2864 } while (request->bytes_read);
2866 request->state = REQUEST_STATE_RESPONSE_RECEIVED;
2867 return S_OK;
2869 error:
2870 heap_free( request->buffer );
2871 request->buffer = NULL;
2872 return HRESULT_FROM_WIN32( err );
2875 static DWORD request_set_parameters( struct winhttp_request *request )
2877 if (!WinHttpSetOption( request->hrequest, WINHTTP_OPTION_PROXY, &request->proxy,
2878 sizeof(request->proxy) )) return get_last_error();
2880 if (!WinHttpSetOption( request->hrequest, WINHTTP_OPTION_AUTOLOGON_POLICY, &request->logon_policy,
2881 sizeof(request->logon_policy) )) return get_last_error();
2883 if (!WinHttpSetOption( request->hrequest, WINHTTP_OPTION_DISABLE_FEATURE, &request->disable_feature,
2884 sizeof(request->disable_feature) )) return get_last_error();
2886 if (!WinHttpSetTimeouts( request->hrequest,
2887 request->resolve_timeout,
2888 request->connect_timeout,
2889 request->send_timeout,
2890 request->receive_timeout )) return get_last_error();
2891 return ERROR_SUCCESS;
2894 static void request_set_utf8_content_type( struct winhttp_request *request )
2896 static const WCHAR fmtW[] = {'%','s',':',' ','%','s',0};
2897 static const WCHAR text_plainW[] = {'t','e','x','t','/','p','l','a','i','n',0};
2898 static const WCHAR charset_utf8W[] = {'c','h','a','r','s','e','t','=','u','t','f','-','8',0};
2899 WCHAR headerW[64];
2900 int len;
2902 len = sprintfW( headerW, fmtW, attr_content_type, text_plainW );
2903 WinHttpAddRequestHeaders( request->hrequest, headerW, len, WINHTTP_ADDREQ_FLAG_ADD_IF_NEW );
2904 len = sprintfW( headerW, fmtW, attr_content_type, charset_utf8W );
2905 WinHttpAddRequestHeaders( request->hrequest, headerW, len, WINHTTP_ADDREQ_FLAG_COALESCE_WITH_SEMICOLON );
2908 static HRESULT request_send( struct winhttp_request *request )
2910 SAFEARRAY *sa = NULL;
2911 VARIANT data;
2912 char *ptr = NULL;
2913 LONG size = 0;
2914 HRESULT hr;
2915 BOOL ret;
2916 DWORD err;
2918 if ((err = request_set_parameters( request ))) return HRESULT_FROM_WIN32( err );
2919 if (strcmpW( request->verb, getW ))
2921 VariantInit( &data );
2922 if (V_VT( &request->data ) == VT_BSTR)
2924 UINT i, cp = CP_ACP;
2925 const WCHAR *str = V_BSTR( &request->data );
2926 int len = strlenW( str );
2928 for (i = 0; i < len; i++)
2930 if (str[i] > 127)
2932 cp = CP_UTF8;
2933 break;
2936 size = WideCharToMultiByte( cp, 0, str, len, NULL, 0, NULL, NULL );
2937 if (!(ptr = heap_alloc( size ))) return E_OUTOFMEMORY;
2938 WideCharToMultiByte( cp, 0, str, len, ptr, size, NULL, NULL );
2939 if (cp == CP_UTF8) request_set_utf8_content_type( request );
2941 else if (VariantChangeType( &data, &request->data, 0, VT_ARRAY|VT_UI1 ) == S_OK)
2943 sa = V_ARRAY( &data );
2944 if ((hr = SafeArrayAccessData( sa, (void **)&ptr )) != S_OK) return hr;
2945 if ((hr = SafeArrayGetUBound( sa, 1, &size ) != S_OK))
2947 SafeArrayUnaccessData( sa );
2948 return hr;
2950 size++;
2953 wait_set_status_callback( request, WINHTTP_CALLBACK_STATUS_REQUEST_SENT );
2954 if (!(ret = WinHttpSendRequest( request->hrequest, NULL, 0, ptr, size, size, 0 )))
2956 err = get_last_error();
2957 goto error;
2959 if ((err = wait_for_completion( request ))) goto error;
2960 if (sa) SafeArrayUnaccessData( sa );
2961 else heap_free( ptr );
2962 request->state = REQUEST_STATE_SENT;
2963 return S_OK;
2965 error:
2966 if (sa) SafeArrayUnaccessData( sa );
2967 else heap_free( ptr );
2968 return HRESULT_FROM_WIN32( err );
2971 static HRESULT request_send_and_receive( struct winhttp_request *request )
2973 HRESULT hr = request_send( request );
2974 if (hr == S_OK) hr = request_receive( request );
2975 return hr;
2978 static DWORD CALLBACK send_and_receive_proc( void *arg )
2980 struct winhttp_request *request = (struct winhttp_request *)arg;
2981 return request_send_and_receive( request );
2984 static HRESULT WINAPI winhttp_request_Send(
2985 IWinHttpRequest *iface,
2986 VARIANT body )
2988 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
2989 HRESULT hr;
2991 TRACE("%p, %s\n", request, debugstr_variant(&body));
2993 EnterCriticalSection( &request->cs );
2994 if (request->state < REQUEST_STATE_OPEN)
2996 LeaveCriticalSection( &request->cs );
2997 return HRESULT_FROM_WIN32( ERROR_WINHTTP_CANNOT_CALL_BEFORE_OPEN );
2999 if (request->state >= REQUEST_STATE_SENT)
3001 LeaveCriticalSection( &request->cs );
3002 return S_OK;
3004 VariantClear( &request->data );
3005 if ((hr = VariantCopyInd( &request->data, &body )) != S_OK) {
3006 LeaveCriticalSection( &request->cs );
3007 return hr;
3010 if (request->wait) /* async request */
3012 if (!(request->thread = CreateThread( NULL, 0, send_and_receive_proc, request, 0, NULL )))
3014 LeaveCriticalSection( &request->cs );
3015 return HRESULT_FROM_WIN32( get_last_error() );
3018 else hr = request_send_and_receive( request );
3019 LeaveCriticalSection( &request->cs );
3020 return hr;
3023 static HRESULT WINAPI winhttp_request_get_Status(
3024 IWinHttpRequest *iface,
3025 LONG *status )
3027 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
3028 DWORD err = ERROR_SUCCESS, flags, status_code, len = sizeof(status_code), index = 0;
3030 TRACE("%p, %p\n", request, status);
3032 if (!status) return E_INVALIDARG;
3034 EnterCriticalSection( &request->cs );
3035 if (request->state < REQUEST_STATE_SENT)
3037 err = ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND;
3038 goto done;
3040 flags = WINHTTP_QUERY_STATUS_CODE | WINHTTP_QUERY_FLAG_NUMBER;
3041 if (!WinHttpQueryHeaders( request->hrequest, flags, NULL, &status_code, &len, &index ))
3043 err = get_last_error();
3045 *status = status_code;
3047 done:
3048 LeaveCriticalSection( &request->cs );
3049 return HRESULT_FROM_WIN32( err );
3052 static HRESULT WINAPI winhttp_request_get_StatusText(
3053 IWinHttpRequest *iface,
3054 BSTR *status )
3056 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
3057 DWORD err = ERROR_SUCCESS, len = 0, index = 0;
3059 TRACE("%p, %p\n", request, status);
3061 if (!status) return E_INVALIDARG;
3063 EnterCriticalSection( &request->cs );
3064 if (request->state < REQUEST_STATE_SENT)
3066 err = ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND;
3067 goto done;
3069 if (!WinHttpQueryHeaders( request->hrequest, WINHTTP_QUERY_STATUS_TEXT, NULL, NULL, &len, &index ))
3071 err = get_last_error();
3072 if (err != ERROR_INSUFFICIENT_BUFFER) goto done;
3074 if (!(*status = SysAllocStringLen( NULL, len / sizeof(WCHAR) )))
3076 err = ERROR_OUTOFMEMORY;
3077 goto done;
3079 index = 0;
3080 err = ERROR_SUCCESS;
3081 if (!WinHttpQueryHeaders( request->hrequest, WINHTTP_QUERY_STATUS_TEXT, NULL, *status, &len, &index ))
3083 err = get_last_error();
3084 SysFreeString( *status );
3086 done:
3087 LeaveCriticalSection( &request->cs );
3088 return HRESULT_FROM_WIN32( err );
3091 static DWORD request_get_codepage( struct winhttp_request *request, UINT *codepage )
3093 static const WCHAR utf8W[] = {'u','t','f','-','8',0};
3094 static const WCHAR charsetW[] = {'c','h','a','r','s','e','t',0};
3095 WCHAR *buffer, *p;
3096 DWORD size;
3098 *codepage = CP_ACP;
3099 if (!WinHttpQueryHeaders( request->hrequest, WINHTTP_QUERY_CONTENT_TYPE, NULL, NULL, &size, NULL ) &&
3100 get_last_error() == ERROR_INSUFFICIENT_BUFFER)
3102 if (!(buffer = heap_alloc( size ))) return ERROR_OUTOFMEMORY;
3103 if (!WinHttpQueryHeaders( request->hrequest, WINHTTP_QUERY_CONTENT_TYPE, NULL, buffer, &size, NULL ))
3105 return get_last_error();
3107 if ((p = strstrW( buffer, charsetW )))
3109 p += strlenW( charsetW );
3110 while (*p == ' ') p++;
3111 if (*p++ == '=')
3113 while (*p == ' ') p++;
3114 if (!strcmpiW( p, utf8W )) *codepage = CP_UTF8;
3117 heap_free( buffer );
3119 return ERROR_SUCCESS;
3122 static HRESULT WINAPI winhttp_request_get_ResponseText(
3123 IWinHttpRequest *iface,
3124 BSTR *body )
3126 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
3127 UINT codepage;
3128 DWORD err = ERROR_SUCCESS;
3129 int len;
3131 TRACE("%p, %p\n", request, body);
3133 if (!body) return E_INVALIDARG;
3135 EnterCriticalSection( &request->cs );
3136 if (request->state < REQUEST_STATE_SENT)
3138 err = ERROR_WINHTTP_CANNOT_CALL_BEFORE_SEND;
3139 goto done;
3141 if ((err = request_get_codepage( request, &codepage ))) goto done;
3142 len = MultiByteToWideChar( codepage, 0, request->buffer, request->offset, NULL, 0 );
3143 if (!(*body = SysAllocStringLen( NULL, len )))
3145 err = ERROR_OUTOFMEMORY;
3146 goto done;
3148 MultiByteToWideChar( codepage, 0, request->buffer, request->offset, *body, len );
3149 (*body)[len] = 0;
3151 done:
3152 LeaveCriticalSection( &request->cs );
3153 return HRESULT_FROM_WIN32( err );
3156 static HRESULT WINAPI winhttp_request_get_ResponseBody(
3157 IWinHttpRequest *iface,
3158 VARIANT *body )
3160 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
3161 SAFEARRAY *sa;
3162 HRESULT hr;
3163 DWORD err = ERROR_SUCCESS;
3164 char *ptr;
3166 TRACE("%p, %p\n", request, body);
3168 if (!body) return E_INVALIDARG;
3170 EnterCriticalSection( &request->cs );
3171 if (!(sa = SafeArrayCreateVector( VT_UI1, 0, request->offset )))
3173 err = ERROR_OUTOFMEMORY;
3174 goto done;
3176 if ((hr = SafeArrayAccessData( sa, (void **)&ptr )) != S_OK)
3178 SafeArrayDestroy( sa );
3179 LeaveCriticalSection( &request->cs );
3180 return hr;
3182 memcpy( ptr, request->buffer, request->offset );
3183 if ((hr = SafeArrayUnaccessData( sa )) != S_OK)
3185 SafeArrayDestroy( sa );
3186 LeaveCriticalSection( &request->cs );
3187 return hr;
3189 V_VT( body ) = VT_ARRAY|VT_UI1;
3190 V_ARRAY( body ) = sa;
3192 done:
3193 LeaveCriticalSection( &request->cs );
3194 return HRESULT_FROM_WIN32( err );
3197 static HRESULT WINAPI winhttp_request_get_ResponseStream(
3198 IWinHttpRequest *iface,
3199 VARIANT *body )
3201 FIXME("\n");
3202 return E_NOTIMPL;
3205 static HRESULT WINAPI winhttp_request_get_Option(
3206 IWinHttpRequest *iface,
3207 WinHttpRequestOption option,
3208 VARIANT *value )
3210 FIXME("\n");
3211 return E_NOTIMPL;
3214 static HRESULT WINAPI winhttp_request_put_Option(
3215 IWinHttpRequest *iface,
3216 WinHttpRequestOption option,
3217 VARIANT value )
3219 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
3220 HRESULT hr = S_OK;
3222 TRACE("%p, %u, %s\n", request, option, debugstr_variant(&value));
3224 EnterCriticalSection( &request->cs );
3225 switch (option)
3227 case WinHttpRequestOption_EnableRedirects:
3229 if (V_BOOL( &value ))
3230 request->disable_feature &= ~WINHTTP_DISABLE_REDIRECTS;
3231 else
3232 request->disable_feature |= WINHTTP_DISABLE_REDIRECTS;
3233 break;
3235 default:
3236 FIXME("unimplemented option %u\n", option);
3237 hr = E_NOTIMPL;
3238 break;
3240 LeaveCriticalSection( &request->cs );
3241 return hr;
3244 /* critical section must be held */
3245 static DWORD wait_for_response( struct winhttp_request *request, DWORD timeout )
3247 HANDLE thread = request->thread;
3248 DWORD err, ret;
3250 LeaveCriticalSection( &request->cs );
3251 while ((err = MsgWaitForMultipleObjects( 1, &thread, FALSE, timeout, QS_ALLINPUT )) == WAIT_OBJECT_0 + 1)
3253 MSG msg;
3254 while (PeekMessageW( &msg, NULL, 0, 0, PM_REMOVE ))
3256 TranslateMessage( &msg );
3257 DispatchMessageW( &msg );
3260 switch (err)
3262 case WAIT_OBJECT_0:
3263 ret = ERROR_SUCCESS;
3264 break;
3265 case WAIT_TIMEOUT:
3266 ret = ERROR_TIMEOUT;
3267 break;
3268 case WAIT_FAILED:
3269 default:
3270 ret = get_last_error();
3271 break;
3273 EnterCriticalSection( &request->cs );
3274 return ret;
3277 static HRESULT WINAPI winhttp_request_WaitForResponse(
3278 IWinHttpRequest *iface,
3279 VARIANT timeout,
3280 VARIANT_BOOL *succeeded )
3282 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
3283 DWORD err, msecs = (V_I4(&timeout) == -1) ? INFINITE : V_I4(&timeout) * 1000;
3285 TRACE("%p, %s, %p\n", request, debugstr_variant(&timeout), succeeded);
3287 EnterCriticalSection( &request->cs );
3288 if (!request->thread)
3290 LeaveCriticalSection( &request->cs );
3291 return S_OK;
3293 if (request->state >= REQUEST_STATE_RESPONSE_RECEIVED)
3295 LeaveCriticalSection( &request->cs );
3296 return S_OK;
3298 switch ((err = wait_for_response( request, msecs )))
3300 case ERROR_TIMEOUT:
3301 if (succeeded) *succeeded = VARIANT_FALSE;
3302 err = ERROR_SUCCESS;
3303 break;
3305 case ERROR_SUCCESS:
3306 if (succeeded) *succeeded = VARIANT_TRUE;
3307 break;
3309 default: break;
3311 LeaveCriticalSection( &request->cs );
3312 return HRESULT_FROM_WIN32( err );
3315 static HRESULT WINAPI winhttp_request_Abort(
3316 IWinHttpRequest *iface )
3318 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
3320 TRACE("%p\n", request);
3322 EnterCriticalSection( &request->cs );
3323 cancel_request( request );
3324 LeaveCriticalSection( &request->cs );
3325 return S_OK;
3328 static HRESULT WINAPI winhttp_request_SetTimeouts(
3329 IWinHttpRequest *iface,
3330 LONG resolve_timeout,
3331 LONG connect_timeout,
3332 LONG send_timeout,
3333 LONG receive_timeout )
3335 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
3337 TRACE("%p, %d, %d, %d, %d\n", request, resolve_timeout, connect_timeout, send_timeout, receive_timeout);
3339 EnterCriticalSection( &request->cs );
3340 request->resolve_timeout = resolve_timeout;
3341 request->connect_timeout = connect_timeout;
3342 request->send_timeout = send_timeout;
3343 request->receive_timeout = receive_timeout;
3344 LeaveCriticalSection( &request->cs );
3345 return S_OK;
3348 static HRESULT WINAPI winhttp_request_SetClientCertificate(
3349 IWinHttpRequest *iface,
3350 BSTR certificate )
3352 FIXME("\n");
3353 return E_NOTIMPL;
3356 static HRESULT WINAPI winhttp_request_SetAutoLogonPolicy(
3357 IWinHttpRequest *iface,
3358 WinHttpRequestAutoLogonPolicy policy )
3360 struct winhttp_request *request = impl_from_IWinHttpRequest( iface );
3361 HRESULT hr = S_OK;
3363 TRACE("%p, %u\n", request, policy );
3365 EnterCriticalSection( &request->cs );
3366 switch (policy)
3368 case AutoLogonPolicy_Always:
3369 request->logon_policy = WINHTTP_AUTOLOGON_SECURITY_LEVEL_LOW;
3370 break;
3371 case AutoLogonPolicy_OnlyIfBypassProxy:
3372 request->logon_policy = WINHTTP_AUTOLOGON_SECURITY_LEVEL_MEDIUM;
3373 break;
3374 case AutoLogonPolicy_Never:
3375 request->logon_policy = WINHTTP_AUTOLOGON_SECURITY_LEVEL_HIGH;
3376 break;
3377 default: hr = E_INVALIDARG;
3378 break;
3380 LeaveCriticalSection( &request->cs );
3381 return hr;
3384 static const struct IWinHttpRequestVtbl winhttp_request_vtbl =
3386 winhttp_request_QueryInterface,
3387 winhttp_request_AddRef,
3388 winhttp_request_Release,
3389 winhttp_request_GetTypeInfoCount,
3390 winhttp_request_GetTypeInfo,
3391 winhttp_request_GetIDsOfNames,
3392 winhttp_request_Invoke,
3393 winhttp_request_SetProxy,
3394 winhttp_request_SetCredentials,
3395 winhttp_request_Open,
3396 winhttp_request_SetRequestHeader,
3397 winhttp_request_GetResponseHeader,
3398 winhttp_request_GetAllResponseHeaders,
3399 winhttp_request_Send,
3400 winhttp_request_get_Status,
3401 winhttp_request_get_StatusText,
3402 winhttp_request_get_ResponseText,
3403 winhttp_request_get_ResponseBody,
3404 winhttp_request_get_ResponseStream,
3405 winhttp_request_get_Option,
3406 winhttp_request_put_Option,
3407 winhttp_request_WaitForResponse,
3408 winhttp_request_Abort,
3409 winhttp_request_SetTimeouts,
3410 winhttp_request_SetClientCertificate,
3411 winhttp_request_SetAutoLogonPolicy
3414 HRESULT WinHttpRequest_create( IUnknown *unknown, void **obj )
3416 struct winhttp_request *request;
3418 TRACE("%p, %p\n", unknown, obj);
3420 if (!(request = heap_alloc( sizeof(*request) ))) return E_OUTOFMEMORY;
3421 request->IWinHttpRequest_iface.lpVtbl = &winhttp_request_vtbl;
3422 request->refs = 1;
3423 request->state = REQUEST_STATE_UNINITIALIZED;
3424 request->proxy.lpszProxy = NULL;
3425 request->proxy.lpszProxyBypass = NULL;
3426 InitializeCriticalSection( &request->cs );
3427 request->cs.DebugInfo->Spare[0] = (DWORD_PTR)(__FILE__ ": winhttp_request.cs");
3429 *obj = &request->IWinHttpRequest_iface;
3430 TRACE("returning iface %p\n", *obj);
3431 return S_OK;