• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 #ifndef HEADER_CURL_URLDATA_H
2 #define HEADER_CURL_URLDATA_H
3 /***************************************************************************
4  *                                  _   _ ____  _
5  *  Project                     ___| | | |  _ \| |
6  *                             / __| | | | |_) | |
7  *                            | (__| |_| |  _ <| |___
8  *                             \___|\___/|_| \_\_____|
9  *
10  * Copyright (C) 1998 - 2021, Daniel Stenberg, <daniel@haxx.se>, et al.
11  *
12  * This software is licensed as described in the file COPYING, which
13  * you should have received as part of this distribution. The terms
14  * are also available at https://curl.se/docs/copyright.html.
15  *
16  * You may opt to use, copy, modify, merge, publish, distribute and/or sell
17  * copies of the Software, and permit persons to whom the Software is
18  * furnished to do so, under the terms of the COPYING file.
19  *
20  * This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
21  * KIND, either express or implied.
22  *
23  ***************************************************************************/
24 
25 /* This file is for lib internal stuff */
26 
27 #include "curl_setup.h"
28 
29 #define PORT_FTP 21
30 #define PORT_FTPS 990
31 #define PORT_TELNET 23
32 #define PORT_HTTP 80
33 #define PORT_HTTPS 443
34 #define PORT_DICT 2628
35 #define PORT_LDAP 389
36 #define PORT_LDAPS 636
37 #define PORT_TFTP 69
38 #define PORT_SSH 22
39 #define PORT_IMAP 143
40 #define PORT_IMAPS 993
41 #define PORT_POP3 110
42 #define PORT_POP3S 995
43 #define PORT_SMB 445
44 #define PORT_SMBS 445
45 #define PORT_SMTP 25
46 #define PORT_SMTPS 465 /* sometimes called SSMTP */
47 #define PORT_RTSP 554
48 #define PORT_RTMP 1935
49 #define PORT_RTMPT PORT_HTTP
50 #define PORT_RTMPS PORT_HTTPS
51 #define PORT_GOPHER 70
52 #define PORT_MQTT 1883
53 
54 #define DICT_MATCH "/MATCH:"
55 #define DICT_MATCH2 "/M:"
56 #define DICT_MATCH3 "/FIND:"
57 #define DICT_DEFINE "/DEFINE:"
58 #define DICT_DEFINE2 "/D:"
59 #define DICT_DEFINE3 "/LOOKUP:"
60 
61 #define CURL_DEFAULT_USER "anonymous"
62 #define CURL_DEFAULT_PASSWORD "ftp@example.com"
63 
64 /* Convenience defines for checking protocols or their SSL based version. Each
65    protocol handler should only ever have a single CURLPROTO_ in its protocol
66    field. */
67 #define PROTO_FAMILY_HTTP (CURLPROTO_HTTP|CURLPROTO_HTTPS)
68 #define PROTO_FAMILY_FTP  (CURLPROTO_FTP|CURLPROTO_FTPS)
69 #define PROTO_FAMILY_POP3 (CURLPROTO_POP3|CURLPROTO_POP3S)
70 #define PROTO_FAMILY_SMB  (CURLPROTO_SMB|CURLPROTO_SMBS)
71 #define PROTO_FAMILY_SMTP (CURLPROTO_SMTP|CURLPROTO_SMTPS)
72 #define PROTO_FAMILY_SSH  (CURLPROTO_SCP|CURLPROTO_SFTP)
73 
74 #define DEFAULT_CONNCACHE_SIZE 5
75 
76 /* length of longest IPv6 address string including the trailing null */
77 #define MAX_IPADR_LEN sizeof("ffff:ffff:ffff:ffff:ffff:ffff:255.255.255.255")
78 
79 /* Default FTP/IMAP etc response timeout in milliseconds */
80 #define RESP_TIMEOUT (120*1000)
81 
82 /* Max string input length is a precaution against abuse and to detect junk
83    input easier and better. */
84 #define CURL_MAX_INPUT_LENGTH 8000000
85 
86 #include "cookie.h"
87 #include "psl.h"
88 #include "formdata.h"
89 
90 #ifdef HAVE_NETINET_IN_H
91 #include <netinet/in.h>
92 #endif
93 #ifdef HAVE_NETINET_IN6_H
94 #include <netinet/in6.h>
95 #endif
96 
97 #include "timeval.h"
98 
99 #include <curl/curl.h>
100 
101 #include "http_chunks.h" /* for the structs and enum stuff */
102 #include "hostip.h"
103 #include "hash.h"
104 #include "splay.h"
105 #include "dynbuf.h"
106 
107 /* return the count of bytes sent, or -1 on error */
108 typedef ssize_t (Curl_send)(struct Curl_easy *data,   /* transfer */
109                             int sockindex,            /* socketindex */
110                             const void *buf,          /* data to write */
111                             size_t len,               /* max amount to write */
112                             CURLcode *err);           /* error to return */
113 
114 /* return the count of bytes read, or -1 on error */
115 typedef ssize_t (Curl_recv)(struct Curl_easy *data,   /* transfer */
116                             int sockindex,            /* socketindex */
117                             char *buf,                /* store data here */
118                             size_t len,               /* max amount to read */
119                             CURLcode *err);           /* error to return */
120 
121 #ifdef USE_HYPER
122 typedef CURLcode (*Curl_datastream)(struct Curl_easy *data,
123                                     struct connectdata *conn,
124                                     int *didwhat,
125                                     bool *done,
126                                     int select_res);
127 #endif
128 
129 #include "mime.h"
130 #include "imap.h"
131 #include "pop3.h"
132 #include "smtp.h"
133 #include "ftp.h"
134 #include "file.h"
135 #include "vssh/ssh.h"
136 #include "http.h"
137 #include "rtsp.h"
138 #include "smb.h"
139 #include "mqtt.h"
140 #include "wildcard.h"
141 #include "multihandle.h"
142 #include "quic.h"
143 #include "c-hyper.h"
144 
145 #ifdef HAVE_GSSAPI
146 # ifdef HAVE_GSSGNU
147 #  include <gss.h>
148 # elif defined HAVE_GSSAPI_GSSAPI_H
149 #  include <gssapi/gssapi.h>
150 # else
151 #  include <gssapi.h>
152 # endif
153 # ifdef HAVE_GSSAPI_GSSAPI_GENERIC_H
154 #  include <gssapi/gssapi_generic.h>
155 # endif
156 #endif
157 
158 #ifdef HAVE_LIBSSH2_H
159 #include <libssh2.h>
160 #include <libssh2_sftp.h>
161 #endif /* HAVE_LIBSSH2_H */
162 
163 #define READBUFFER_SIZE CURL_MAX_WRITE_SIZE
164 #define READBUFFER_MAX  CURL_MAX_READ_SIZE
165 #define READBUFFER_MIN  1024
166 
167 /* The default upload buffer size, should not be smaller than
168    CURL_MAX_WRITE_SIZE, as it needs to hold a full buffer as could be sent in
169    a write callback.
170 
171    The size was 16KB for many years but was bumped to 64KB because it makes
172    libcurl able to do significantly faster uploads in some circumstances. Even
173    larger buffers can help further, but this is deemed a fair memory/speed
174    compromise. */
175 #define UPLOADBUFFER_DEFAULT 65536
176 #define UPLOADBUFFER_MAX (2*1024*1024)
177 #define UPLOADBUFFER_MIN CURL_MAX_WRITE_SIZE
178 
179 #define CURLEASY_MAGIC_NUMBER 0xc0dedbadU
180 #define GOOD_EASY_HANDLE(x) \
181   ((x) && ((x)->magic == CURLEASY_MAGIC_NUMBER))
182 
183 /* the type we use for storing a single boolean bit */
184 #ifdef _MSC_VER
185 typedef bool bit;
186 #define BIT(x) bool x
187 #else
188 typedef unsigned int bit;
189 #define BIT(x) bit x:1
190 #endif
191 
192 #ifdef HAVE_GSSAPI
193 /* Types needed for krb5-ftp connections */
194 struct krb5buffer {
195   void *data;
196   size_t size;
197   size_t index;
198   BIT(eof_flag);
199 };
200 
201 enum protection_level {
202   PROT_NONE, /* first in list */
203   PROT_CLEAR,
204   PROT_SAFE,
205   PROT_CONFIDENTIAL,
206   PROT_PRIVATE,
207   PROT_CMD,
208   PROT_LAST /* last in list */
209 };
210 #endif
211 
212 /* enum for the nonblocking SSL connection state machine */
213 typedef enum {
214   ssl_connect_1,
215   ssl_connect_2,
216   ssl_connect_2_reading,
217   ssl_connect_2_writing,
218   ssl_connect_3,
219   ssl_connect_done
220 } ssl_connect_state;
221 
222 typedef enum {
223   ssl_connection_none,
224   ssl_connection_negotiating,
225   ssl_connection_complete
226 } ssl_connection_state;
227 
228 /* SSL backend-specific data; declared differently by each SSL backend */
229 struct ssl_backend_data;
230 
231 /* struct for data related to each SSL connection */
232 struct ssl_connect_data {
233   ssl_connection_state state;
234   ssl_connect_state connecting_state;
235 #if defined(USE_SSL)
236   struct ssl_backend_data *backend;
237 #endif
238   /* Use ssl encrypted communications TRUE/FALSE. The library is not
239      necessarily using ssl at the moment but at least asked to or means to use
240      it. See 'state' for the exact current state of the connection. */
241   BIT(use);
242 };
243 
244 struct ssl_primary_config {
245   long version;          /* what version the client wants to use */
246   long version_max;      /* max supported version the client wants to use*/
247   char *CApath;          /* certificate dir (doesn't work on windows) */
248   char *CAfile;          /* certificate to verify peer against */
249   char *issuercert;      /* optional issuer certificate filename */
250   char *clientcert;
251   char *random_file;     /* path to file containing "random" data */
252   char *egdsocket;       /* path to file containing the EGD daemon socket */
253   char *cipher_list;     /* list of ciphers to use */
254   char *cipher_list13;   /* list of TLS 1.3 cipher suites to use */
255   char *pinned_key;
256   char *CRLfile;         /* CRL to check certificate revocation */
257   struct curl_blob *cert_blob;
258   struct curl_blob *ca_info_blob;
259   struct curl_blob *issuercert_blob;
260 #ifdef USE_TLS_SRP
261   char *username; /* TLS username (for, e.g., SRP) */
262   char *password; /* TLS password (for, e.g., SRP) */
263   enum CURL_TLSAUTH authtype; /* TLS authentication type (default SRP) */
264 #endif
265   char *curves;          /* list of curves to use */
266   unsigned char ssl_options;  /* the CURLOPT_SSL_OPTIONS bitmask */
267   BIT(verifypeer);       /* set TRUE if this is desired */
268   BIT(verifyhost);       /* set TRUE if CN/SAN must match hostname */
269   BIT(verifystatus);     /* set TRUE if certificate status must be checked */
270   BIT(sessionid);        /* cache session IDs or not */
271 };
272 
273 struct ssl_config_data {
274   struct ssl_primary_config primary;
275   long certverifyresult; /* result from the certificate verification */
276   curl_ssl_ctx_callback fsslctx; /* function to initialize ssl ctx */
277   void *fsslctxp;        /* parameter for call back */
278   char *cert_type; /* format for certificate (default: PEM)*/
279   char *key; /* private key file name */
280   struct curl_blob *key_blob;
281   char *key_type; /* format for private key (default: PEM) */
282   char *key_passwd; /* plain text private key password */
283   BIT(certinfo);     /* gather lots of certificate info */
284   BIT(falsestart);
285   BIT(enable_beast); /* allow this flaw for interoperability's sake*/
286   BIT(no_revoke);    /* disable SSL certificate revocation checks */
287   BIT(no_partialchain); /* don't accept partial certificate chains */
288   BIT(revoke_best_effort); /* ignore SSL revocation offline/missing revocation
289                               list errors */
290   BIT(native_ca_store); /* use the native ca store of operating system */
291   BIT(auto_client_cert);   /* automatically locate and use a client
292                               certificate for authentication (Schannel) */
293 };
294 
295 struct ssl_general_config {
296   size_t max_ssl_sessions; /* SSL session id cache size */
297 };
298 
299 /* information stored about one single SSL session */
300 struct Curl_ssl_session {
301   char *name;       /* host name for which this ID was used */
302   char *conn_to_host; /* host name for the connection (may be NULL) */
303   const char *scheme; /* protocol scheme used */
304   void *sessionid;  /* as returned from the SSL layer */
305   size_t idsize;    /* if known, otherwise 0 */
306   long age;         /* just a number, the higher the more recent */
307   int remote_port;  /* remote port */
308   int conn_to_port; /* remote port for the connection (may be -1) */
309   struct ssl_primary_config ssl_config; /* setup for this session */
310 };
311 
312 #ifdef USE_WINDOWS_SSPI
313 #include "curl_sspi.h"
314 #endif
315 
316 /* Struct used for Digest challenge-response authentication */
317 struct digestdata {
318 #if defined(USE_WINDOWS_SSPI)
319   BYTE *input_token;
320   size_t input_token_len;
321   CtxtHandle *http_context;
322   /* copy of user/passwd used to make the identity for http_context.
323      either may be NULL. */
324   char *user;
325   char *passwd;
326 #else
327   char *nonce;
328   char *cnonce;
329   char *realm;
330   int algo;
331   char *opaque;
332   char *qop;
333   char *algorithm;
334   int nc; /* nounce count */
335   BIT(stale); /* set true for re-negotiation */
336   BIT(userhash);
337 #endif
338 };
339 
340 typedef enum {
341   NTLMSTATE_NONE,
342   NTLMSTATE_TYPE1,
343   NTLMSTATE_TYPE2,
344   NTLMSTATE_TYPE3,
345   NTLMSTATE_LAST
346 } curlntlm;
347 
348 typedef enum {
349   GSS_AUTHNONE,
350   GSS_AUTHRECV,
351   GSS_AUTHSENT,
352   GSS_AUTHDONE,
353   GSS_AUTHSUCC
354 } curlnegotiate;
355 
356 #if defined(CURL_DOES_CONVERSIONS) && defined(HAVE_ICONV)
357 #include <iconv.h>
358 #endif
359 
360 /* Struct used for GSSAPI (Kerberos V5) authentication */
361 #if defined(USE_KERBEROS5)
362 struct kerberos5data {
363 #if defined(USE_WINDOWS_SSPI)
364   CredHandle *credentials;
365   CtxtHandle *context;
366   TCHAR *spn;
367   SEC_WINNT_AUTH_IDENTITY identity;
368   SEC_WINNT_AUTH_IDENTITY *p_identity;
369   size_t token_max;
370   BYTE *output_token;
371 #else
372   gss_ctx_id_t context;
373   gss_name_t spn;
374 #endif
375 };
376 #endif
377 
378 /* Struct used for SCRAM-SHA-1 authentication */
379 #ifdef USE_GSASL
380 #include <gsasl.h>
381 struct gsasldata {
382   Gsasl *ctx;
383   Gsasl_session *client;
384 };
385 #endif
386 
387 /* Struct used for NTLM challenge-response authentication */
388 #if defined(USE_NTLM)
389 struct ntlmdata {
390 #ifdef USE_WINDOWS_SSPI
391 /* The sslContext is used for the Schannel bindings. The
392  * api is available on the Windows 7 SDK and later.
393  */
394 #ifdef SECPKG_ATTR_ENDPOINT_BINDINGS
395   CtxtHandle *sslContext;
396 #endif
397   CredHandle *credentials;
398   CtxtHandle *context;
399   SEC_WINNT_AUTH_IDENTITY identity;
400   SEC_WINNT_AUTH_IDENTITY *p_identity;
401   size_t token_max;
402   BYTE *output_token;
403   BYTE *input_token;
404   size_t input_token_len;
405   TCHAR *spn;
406 #else
407   unsigned int flags;
408   unsigned char nonce[8];
409   unsigned int target_info_len;
410   void *target_info; /* TargetInfo received in the ntlm type-2 message */
411 
412 #if defined(NTLM_WB_ENABLED)
413   /* used for communication with Samba's winbind daemon helper ntlm_auth */
414   curl_socket_t ntlm_auth_hlpr_socket;
415   pid_t ntlm_auth_hlpr_pid;
416   char *challenge; /* The received base64 encoded ntlm type-2 message */
417   char *response;  /* The generated base64 ntlm type-1/type-3 message */
418 #endif
419 #endif
420 };
421 #endif
422 
423 /* Struct used for Negotiate (SPNEGO) authentication */
424 #ifdef USE_SPNEGO
425 struct negotiatedata {
426 #ifdef HAVE_GSSAPI
427   OM_uint32 status;
428   gss_ctx_id_t context;
429   gss_name_t spn;
430   gss_buffer_desc output_token;
431 #else
432 #ifdef USE_WINDOWS_SSPI
433 #ifdef SECPKG_ATTR_ENDPOINT_BINDINGS
434   CtxtHandle *sslContext;
435 #endif
436   DWORD status;
437   CredHandle *credentials;
438   CtxtHandle *context;
439   SEC_WINNT_AUTH_IDENTITY identity;
440   SEC_WINNT_AUTH_IDENTITY *p_identity;
441   TCHAR *spn;
442   size_t token_max;
443   BYTE *output_token;
444   size_t output_token_length;
445 #endif
446 #endif
447   BIT(noauthpersist);
448   BIT(havenoauthpersist);
449   BIT(havenegdata);
450   BIT(havemultiplerequests);
451 };
452 #endif
453 
454 
455 /*
456  * Boolean values that concerns this connection.
457  */
458 struct ConnectBits {
459   bool tcpconnect[2]; /* the TCP layer (or similar) is connected, this is set
460                          the first time on the first connect function call */
461 #ifndef CURL_DISABLE_PROXY
462   bool proxy_ssl_connected[2]; /* TRUE when SSL initialization for HTTPS proxy
463                                   is complete */
464   BIT(httpproxy);  /* if set, this transfer is done through a http proxy */
465   BIT(socksproxy); /* if set, this transfer is done through a socks proxy */
466   BIT(proxy_user_passwd); /* user+password for the proxy? */
467   BIT(tunnel_proxy);  /* if CONNECT is used to "tunnel" through the proxy.
468                          This is implicit when SSL-protocols are used through
469                          proxies, but can also be enabled explicitly by
470                          apps */
471   BIT(proxy_connect_closed); /* TRUE if a proxy disconnected the connection
472                                 in a CONNECT request with auth, so that
473                                 libcurl should reconnect and continue. */
474 #endif
475   /* always modify bits.close with the connclose() and connkeep() macros! */
476   BIT(close); /* if set, we close the connection after this request */
477   BIT(reuse); /* if set, this is a re-used connection */
478   BIT(altused); /* this is an alt-svc "redirect" */
479   BIT(conn_to_host); /* if set, this connection has a "connect to host"
480                         that overrides the host in the URL */
481   BIT(conn_to_port); /* if set, this connection has a "connect to port"
482                         that overrides the port in the URL (remote port) */
483   BIT(proxy); /* if set, this transfer is done through a proxy - any type */
484   BIT(user_passwd); /* do we use user+password for this connection? */
485   BIT(ipv6_ip); /* we communicate with a remote site specified with pure IPv6
486                    IP address */
487   BIT(ipv6);    /* we communicate with a site using an IPv6 address */
488   BIT(do_more); /* this is set TRUE if the ->curl_do_more() function is
489                    supposed to be called, after ->curl_do() */
490   BIT(protoconnstart);/* the protocol layer has STARTED its operation after
491                          the TCP layer connect */
492   BIT(retry);         /* this connection is about to get closed and then
493                          re-attempted at another connection. */
494   BIT(authneg);       /* TRUE when the auth phase has started, which means
495                          that we are creating a request with an auth header,
496                          but it is not the final request in the auth
497                          negotiation. */
498   BIT(rewindaftersend);/* TRUE when the sending couldn't be stopped even
499                           though it will be discarded. When the whole send
500                           operation is done, we must call the data rewind
501                           callback. */
502 #ifndef CURL_DISABLE_FTP
503   BIT(ftp_use_epsv);  /* As set with CURLOPT_FTP_USE_EPSV, but if we find out
504                          EPSV doesn't work we disable it for the forthcoming
505                          requests */
506   BIT(ftp_use_eprt);  /* As set with CURLOPT_FTP_USE_EPRT, but if we find out
507                          EPRT doesn't work we disable it for the forthcoming
508                          requests */
509   BIT(ftp_use_data_ssl); /* Enabled SSL for the data connection */
510   BIT(ftp_use_control_ssl); /* Enabled SSL for the control connection */
511 #endif
512 #ifndef CURL_DISABLE_NETRC
513   BIT(netrc);         /* name+password provided by netrc */
514 #endif
515   BIT(bound); /* set true if bind() has already been done on this socket/
516                  connection */
517   BIT(multiplex); /* connection is multiplexed */
518   BIT(tcp_fastopen); /* use TCP Fast Open */
519   BIT(tls_enable_npn);  /* TLS NPN extension? */
520   BIT(tls_enable_alpn); /* TLS ALPN extension? */
521   BIT(connect_only);
522   BIT(doh);
523 #ifdef USE_UNIX_SOCKETS
524   BIT(abstract_unix_socket);
525 #endif
526   BIT(tls_upgraded);
527   BIT(sock_accepted); /* TRUE if the SECONDARYSOCKET was created with
528                          accept() */
529   BIT(parallel_connect); /* set TRUE when a parallel connect attempt has
530                             started (happy eyeballs) */
531 };
532 
533 struct hostname {
534   char *rawalloc; /* allocated "raw" version of the name */
535   char *encalloc; /* allocated IDN-encoded version of the name */
536   char *name;     /* name to use internally, might be encoded, might be raw */
537   const char *dispname; /* name to display, as 'name' might be encoded */
538 };
539 
540 /*
541  * Flags on the keepon member of the Curl_transfer_keeper
542  */
543 
544 #define KEEP_NONE  0
545 #define KEEP_RECV  (1<<0)     /* there is or may be data to read */
546 #define KEEP_SEND (1<<1)     /* there is or may be data to write */
547 #define KEEP_RECV_HOLD (1<<2) /* when set, no reading should be done but there
548                                  might still be data to read */
549 #define KEEP_SEND_HOLD (1<<3) /* when set, no writing should be done but there
550                                   might still be data to write */
551 #define KEEP_RECV_PAUSE (1<<4) /* reading is paused */
552 #define KEEP_SEND_PAUSE (1<<5) /* writing is paused */
553 
554 #define KEEP_RECVBITS (KEEP_RECV | KEEP_RECV_HOLD | KEEP_RECV_PAUSE)
555 #define KEEP_SENDBITS (KEEP_SEND | KEEP_SEND_HOLD | KEEP_SEND_PAUSE)
556 
557 #if defined(CURLRES_ASYNCH) || !defined(CURL_DISABLE_DOH)
558 #define USE_CURL_ASYNC
559 struct Curl_async {
560   char *hostname;
561   struct Curl_dns_entry *dns;
562   struct thread_data *tdata;
563   void *resolver; /* resolver state, if it is used in the URL state -
564                      ares_channel f.e. */
565   int port;
566   int status; /* if done is TRUE, this is the status from the callback */
567   BIT(done);  /* set TRUE when the lookup is complete */
568 };
569 
570 #endif
571 
572 #define FIRSTSOCKET     0
573 #define SECONDARYSOCKET 1
574 
575 enum expect100 {
576   EXP100_SEND_DATA,           /* enough waiting, just send the body now */
577   EXP100_AWAITING_CONTINUE,   /* waiting for the 100 Continue header */
578   EXP100_SENDING_REQUEST,     /* still sending the request but will wait for
579                                  the 100 header once done with the request */
580   EXP100_FAILED               /* used on 417 Expectation Failed */
581 };
582 
583 enum upgrade101 {
584   UPGR101_INIT,               /* default state */
585   UPGR101_REQUESTED,          /* upgrade requested */
586   UPGR101_RECEIVED,           /* response received */
587   UPGR101_WORKING             /* talking upgraded protocol */
588 };
589 
590 enum doh_slots {
591   /* Explicit values for first two symbols so as to match hard-coded
592    * constants in existing code
593    */
594   DOH_PROBE_SLOT_IPADDR_V4 = 0, /* make 'V4' stand out for readability */
595   DOH_PROBE_SLOT_IPADDR_V6 = 1, /* 'V6' likewise */
596 
597   /* Space here for (possibly build-specific) additional slot definitions */
598 
599   /* for example */
600   /* #ifdef WANT_DOH_FOOBAR_TXT */
601   /*   DOH_PROBE_SLOT_FOOBAR_TXT, */
602   /* #endif */
603 
604   /* AFTER all slot definitions, establish how many we have */
605   DOH_PROBE_SLOTS
606 };
607 
608 /* one of these for each DoH request */
609 struct dnsprobe {
610   CURL *easy;
611   int dnstype;
612   unsigned char dohbuffer[512];
613   size_t dohlen;
614   struct dynbuf serverdoh;
615 };
616 
617 struct dohdata {
618   struct curl_slist *headers;
619   struct dnsprobe probe[DOH_PROBE_SLOTS];
620   unsigned int pending; /* still outstanding requests */
621   int port;
622   const char *host;
623 };
624 
625 /*
626  * Request specific data in the easy handle (Curl_easy).  Previously,
627  * these members were on the connectdata struct but since a conn struct may
628  * now be shared between different Curl_easys, we store connection-specific
629  * data here. This struct only keeps stuff that's interesting for *this*
630  * request, as it will be cleared between multiple ones
631  */
632 struct SingleRequest {
633   curl_off_t size;        /* -1 if unknown at this point */
634   curl_off_t maxdownload; /* in bytes, the maximum amount of data to fetch,
635                              -1 means unlimited */
636   curl_off_t bytecount;         /* total number of bytes read */
637   curl_off_t writebytecount;    /* number of bytes written */
638 
639   curl_off_t headerbytecount;   /* only count received headers */
640   curl_off_t deductheadercount; /* this amount of bytes doesn't count when we
641                                    check if anything has been transferred at
642                                    the end of a connection. We use this
643                                    counter to make only a 100 reply (without a
644                                    following second response code) result in a
645                                    CURLE_GOT_NOTHING error code */
646 
647   curl_off_t pendingheader;      /* this many bytes left to send is actually
648                                     header and not body */
649   struct curltime start;         /* transfer started at this time */
650   struct curltime now;           /* current time */
651   enum {
652     HEADER_NORMAL,              /* no bad header at all */
653     HEADER_PARTHEADER,          /* part of the chunk is a bad header, the rest
654                                    is normal data */
655     HEADER_ALLBAD               /* all was believed to be header */
656   } badheader;                  /* the header was deemed bad and will be
657                                    written as body */
658   int headerline;               /* counts header lines to better track the
659                                    first one */
660   char *str;                    /* within buf */
661   curl_off_t offset;            /* possible resume offset read from the
662                                    Content-Range: header */
663   int httpcode;                 /* error code from the 'HTTP/1.? XXX' or
664                                    'RTSP/1.? XXX' line */
665   int keepon;
666   struct curltime start100;      /* time stamp to wait for the 100 code from */
667   enum expect100 exp100;        /* expect 100 continue state */
668   enum upgrade101 upgr101;      /* 101 upgrade state */
669 
670   /* Content unencoding stack. See sec 3.5, RFC2616. */
671   struct contenc_writer *writer_stack;
672   time_t timeofdoc;
673   long bodywrites;
674   char *location;   /* This points to an allocated version of the Location:
675                        header data */
676   char *newurl;     /* Set to the new URL to use when a redirect or a retry is
677                        wanted */
678 
679   /* 'upload_present' is used to keep a byte counter of how much data there is
680      still left in the buffer, aimed for upload. */
681   ssize_t upload_present;
682 
683   /* 'upload_fromhere' is used as a read-pointer when we uploaded parts of a
684      buffer, so the next read should read from where this pointer points to,
685      and the 'upload_present' contains the number of bytes available at this
686      position */
687   char *upload_fromhere;
688 
689   /* Allocated protocol-specific data. Each protocol handler makes sure this
690      points to data it needs. */
691   union {
692     struct FILEPROTO *file;
693     struct FTP *ftp;
694     struct HTTP *http;
695     struct IMAP *imap;
696     struct ldapreqinfo *ldap;
697     struct MQTT *mqtt;
698     struct POP3 *pop3;
699     struct RTSP *rtsp;
700     struct smb_request *smb;
701     struct SMTP *smtp;
702     struct SSHPROTO *ssh;
703     struct TELNET *telnet;
704   } p;
705 #ifndef CURL_DISABLE_DOH
706   struct dohdata *doh; /* DoH specific data for this request */
707 #endif
708   unsigned char setcookies;
709   BIT(header);       /* incoming data has HTTP header */
710   BIT(content_range); /* set TRUE if Content-Range: was found */
711   BIT(upload_done);  /* set to TRUE when doing chunked transfer-encoding
712                         upload and we're uploading the last chunk */
713   BIT(ignorebody);   /* we read a response-body but we ignore it! */
714   BIT(http_bodyless); /* HTTP response status code is between 100 and 199,
715                          204 or 304 */
716   BIT(chunk); /* if set, this is a chunked transfer-encoding */
717   BIT(upload_chunky); /* set TRUE if we are doing chunked transfer-encoding
718                          on upload */
719   BIT(getheader);    /* TRUE if header parsing is wanted */
720   BIT(forbidchunk);  /* used only to explicitly forbid chunk-upload for
721                         specific upload buffers. See readmoredata() in http.c
722                         for details. */
723 };
724 
725 /*
726  * Specific protocol handler.
727  */
728 
729 struct Curl_handler {
730   const char *scheme;        /* URL scheme name. */
731 
732   /* Complement to setup_connection_internals(). This is done before the
733      transfer "owns" the connection. */
734   CURLcode (*setup_connection)(struct Curl_easy *data,
735                                struct connectdata *conn);
736 
737   /* These two functions MUST be set to be protocol dependent */
738   CURLcode (*do_it)(struct Curl_easy *data, bool *done);
739   CURLcode (*done)(struct Curl_easy *, CURLcode, bool);
740 
741   /* If the curl_do() function is better made in two halves, this
742    * curl_do_more() function will be called afterwards, if set. For example
743    * for doing the FTP stuff after the PASV/PORT command.
744    */
745   CURLcode (*do_more)(struct Curl_easy *, int *);
746 
747   /* This function *MAY* be set to a protocol-dependent function that is run
748    * after the connect() and everything is done, as a step in the connection.
749    * The 'done' pointer points to a bool that should be set to TRUE if the
750    * function completes before return. If it doesn't complete, the caller
751    * should call the curl_connecting() function until it is.
752    */
753   CURLcode (*connect_it)(struct Curl_easy *data, bool *done);
754 
755   /* See above. */
756   CURLcode (*connecting)(struct Curl_easy *data, bool *done);
757   CURLcode (*doing)(struct Curl_easy *data, bool *done);
758 
759   /* Called from the multi interface during the PROTOCONNECT phase, and it
760      should then return a proper fd set */
761   int (*proto_getsock)(struct Curl_easy *data,
762                        struct connectdata *conn, curl_socket_t *socks);
763 
764   /* Called from the multi interface during the DOING phase, and it should
765      then return a proper fd set */
766   int (*doing_getsock)(struct Curl_easy *data,
767                        struct connectdata *conn, curl_socket_t *socks);
768 
769   /* Called from the multi interface during the DO_MORE phase, and it should
770      then return a proper fd set */
771   int (*domore_getsock)(struct Curl_easy *data,
772                         struct connectdata *conn, curl_socket_t *socks);
773 
774   /* Called from the multi interface during the DO_DONE, PERFORM and
775      WAITPERFORM phases, and it should then return a proper fd set. Not setting
776      this will make libcurl use the generic default one. */
777   int (*perform_getsock)(struct Curl_easy *data,
778                          struct connectdata *conn, curl_socket_t *socks);
779 
780   /* This function *MAY* be set to a protocol-dependent function that is run
781    * by the curl_disconnect(), as a step in the disconnection.  If the handler
782    * is called because the connection has been considered dead,
783    * dead_connection is set to TRUE. The connection is already disassociated
784    * from the transfer here.
785    */
786   CURLcode (*disconnect)(struct Curl_easy *, struct connectdata *,
787                          bool dead_connection);
788 
789   /* If used, this function gets called from transfer.c:readwrite_data() to
790      allow the protocol to do extra reads/writes */
791   CURLcode (*readwrite)(struct Curl_easy *data, struct connectdata *conn,
792                         ssize_t *nread, bool *readmore);
793 
794   /* This function can perform various checks on the connection. See
795      CONNCHECK_* for more information about the checks that can be performed,
796      and CONNRESULT_* for the results that can be returned. */
797   unsigned int (*connection_check)(struct Curl_easy *data,
798                                    struct connectdata *conn,
799                                    unsigned int checks_to_perform);
800 
801   /* attach() attaches this transfer to this connection */
802   void (*attach)(struct Curl_easy *data, struct connectdata *conn);
803 
804   int defport;            /* Default port. */
805   unsigned int protocol;  /* See CURLPROTO_* - this needs to be the single
806                              specific protocol bit */
807   unsigned int family;    /* single bit for protocol family; basically the
808                              non-TLS name of the protocol this is */
809   unsigned int flags;     /* Extra particular characteristics, see PROTOPT_* */
810 
811 };
812 
813 #define PROTOPT_NONE 0             /* nothing extra */
814 #define PROTOPT_SSL (1<<0)         /* uses SSL */
815 #define PROTOPT_DUAL (1<<1)        /* this protocol uses two connections */
816 #define PROTOPT_CLOSEACTION (1<<2) /* need action before socket close */
817 /* some protocols will have to call the underlying functions without regard to
818    what exact state the socket signals. IE even if the socket says "readable",
819    the send function might need to be called while uploading, or vice versa.
820 */
821 #define PROTOPT_DIRLOCK (1<<3)
822 #define PROTOPT_NONETWORK (1<<4)   /* protocol doesn't use the network! */
823 #define PROTOPT_NEEDSPWD (1<<5)    /* needs a password, and if none is set it
824                                       gets a default */
825 #define PROTOPT_NOURLQUERY (1<<6)   /* protocol can't handle
826                                         url query strings (?foo=bar) ! */
827 #define PROTOPT_CREDSPERREQUEST (1<<7) /* requires login credentials per
828                                           request instead of per connection */
829 #define PROTOPT_ALPN_NPN (1<<8) /* set ALPN and/or NPN for this */
830 #define PROTOPT_STREAM (1<<9) /* a protocol with individual logical streams */
831 #define PROTOPT_URLOPTIONS (1<<10) /* allow options part in the userinfo field
832                                       of the URL */
833 #define PROTOPT_PROXY_AS_HTTP (1<<11) /* allow this non-HTTP scheme over a
834                                          HTTP proxy as HTTP proxies may know
835                                          this protocol and act as a gateway */
836 #define PROTOPT_WILDCARD (1<<12) /* protocol supports wildcard matching */
837 #define PROTOPT_USERPWDCTRL (1<<13) /* Allow "control bytes" (< 32 ascii) in
838                                        user name and password */
839 
840 #define CONNCHECK_NONE 0                 /* No checks */
841 #define CONNCHECK_ISDEAD (1<<0)          /* Check if the connection is dead. */
842 #define CONNCHECK_KEEPALIVE (1<<1)       /* Perform any keepalive function. */
843 
844 #define CONNRESULT_NONE 0                /* No extra information. */
845 #define CONNRESULT_DEAD (1<<0)           /* The connection is dead. */
846 
847 #ifdef USE_RECV_BEFORE_SEND_WORKAROUND
848 struct postponed_data {
849   char *buffer;          /* Temporal store for received data during
850                             sending, must be freed */
851   size_t allocated_size; /* Size of temporal store */
852   size_t recv_size;      /* Size of received data during sending */
853   size_t recv_processed; /* Size of processed part of postponed data */
854 #ifdef DEBUGBUILD
855   curl_socket_t bindsock;/* Structure must be bound to specific socket,
856                             used only for DEBUGASSERT */
857 #endif /* DEBUGBUILD */
858 };
859 #endif /* USE_RECV_BEFORE_SEND_WORKAROUND */
860 
861 struct proxy_info {
862   struct hostname host;
863   long port;
864   curl_proxytype proxytype; /* what kind of proxy that is in use */
865   char *user;    /* proxy user name string, allocated */
866   char *passwd;  /* proxy password string, allocated */
867 };
868 
869 struct ldapconninfo;
870 struct http_connect_state;
871 
872 /* for the (SOCKS) connect state machine */
873 enum connect_t {
874   CONNECT_INIT,
875   CONNECT_SOCKS_INIT, /* 1 */
876   CONNECT_SOCKS_SEND, /* 2 waiting to send more first data */
877   CONNECT_SOCKS_READ_INIT, /* 3 set up read */
878   CONNECT_SOCKS_READ, /* 4 read server response */
879   CONNECT_GSSAPI_INIT, /* 5 */
880   CONNECT_AUTH_INIT, /* 6 setup outgoing auth buffer */
881   CONNECT_AUTH_SEND, /* 7 send auth */
882   CONNECT_AUTH_READ, /* 8 read auth response */
883   CONNECT_REQ_INIT,  /* 9 init SOCKS "request" */
884   CONNECT_RESOLVING, /* 10 */
885   CONNECT_RESOLVED,  /* 11 */
886   CONNECT_RESOLVE_REMOTE, /* 12 */
887   CONNECT_REQ_SEND,  /* 13 */
888   CONNECT_REQ_SENDING, /* 14 */
889   CONNECT_REQ_READ,  /* 15 */
890   CONNECT_REQ_READ_MORE, /* 16 */
891   CONNECT_DONE /* 17 connected fine to the remote or the SOCKS proxy */
892 };
893 
894 #define SOCKS_STATE(x) (((x) >= CONNECT_SOCKS_INIT) &&  \
895                         ((x) < CONNECT_DONE))
896 
897 struct connstate {
898   enum connect_t state;
899   ssize_t outstanding;  /* send this many bytes more */
900   unsigned char *outp; /* send from this pointer */
901 };
902 
903 /*
904  * The connectdata struct contains all fields and variables that should be
905  * unique for an entire connection.
906  */
907 struct connectdata {
908   struct connstate cnnct;
909   struct Curl_llist_element bundle_node; /* conncache */
910 
911   /* chunk is for HTTP chunked encoding, but is in the general connectdata
912      struct only because we can do just about any protocol through a HTTP proxy
913      and a HTTP proxy may in fact respond using chunked encoding */
914   struct Curl_chunker chunk;
915 
916   curl_closesocket_callback fclosesocket; /* function closing the socket(s) */
917   void *closesocket_client;
918 
919   /* This is used by the connection cache logic. If this returns TRUE, this
920      handle is still used by one or more easy handles and can only used by any
921      other easy handle without careful consideration (== only for
922      multiplexing) and it cannot be used by another multi handle! */
923 #define CONN_INUSE(c) ((c)->easyq.size)
924 
925   /**** Fields set when inited and not modified again */
926   long connection_id; /* Contains a unique number to make it easier to
927                          track the connections in the log output */
928 
929   /* 'dns_entry' is the particular host we use. This points to an entry in the
930      DNS cache and it will not get pruned while locked. It gets unlocked in
931      multi_done(). This entry will be NULL if the connection is re-used as then
932      there is no name resolve done. */
933   struct Curl_dns_entry *dns_entry;
934 
935   /* 'ip_addr' is the particular IP we connected to. It points to a struct
936      within the DNS cache, so this pointer is only valid as long as the DNS
937      cache entry remains locked. It gets unlocked in multi_done() */
938   struct Curl_addrinfo *ip_addr;
939   struct Curl_addrinfo *tempaddr[2]; /* for happy eyeballs */
940 
941   unsigned int scope_id;  /* Scope id for IPv6 */
942 
943   enum {
944     TRNSPRT_TCP = 3,
945     TRNSPRT_UDP = 4,
946     TRNSPRT_QUIC = 5
947   } transport;
948 
949 #ifdef ENABLE_QUIC
950   struct quicsocket hequic[2]; /* two, for happy eyeballs! */
951   struct quicsocket *quic;
952 #endif
953 
954   struct hostname host;
955   char *hostname_resolve; /* host name to resolve to address, allocated */
956   char *secondaryhostname; /* secondary socket host name (ftp) */
957   struct hostname conn_to_host; /* the host to connect to. valid only if
958                                    bits.conn_to_host is set */
959 #ifndef CURL_DISABLE_PROXY
960   struct proxy_info socks_proxy;
961   struct proxy_info http_proxy;
962 #endif
963   int port;        /* which port to use locally - to connect to */
964   int remote_port; /* the remote port, not the proxy port! */
965   int conn_to_port; /* the remote port to connect to. valid only if
966                        bits.conn_to_port is set */
967   unsigned short secondary_port; /* secondary socket remote port to connect to
968                                     (ftp) */
969 
970   /* 'primary_ip' and 'primary_port' get filled with peer's numerical
971      ip address and port number whenever an outgoing connection is
972      *attempted* from the primary socket to a remote address. When more
973      than one address is tried for a connection these will hold data
974      for the last attempt. When the connection is actually established
975      these are updated with data which comes directly from the socket. */
976 
977   char primary_ip[MAX_IPADR_LEN];
978   unsigned char ip_version; /* copied from the Curl_easy at creation time */
979 
980   char *user;    /* user name string, allocated */
981   char *passwd;  /* password string, allocated */
982   char *options; /* options string, allocated */
983   char *sasl_authzid;     /* authorisation identity string, allocated */
984   char *oauth_bearer; /* OAUTH2 bearer, allocated */
985   unsigned char httpversion; /* the HTTP version*10 reported by the server */
986   struct curltime now;     /* "current" time */
987   struct curltime created; /* creation time */
988   struct curltime lastused; /* when returned to the connection cache */
989   curl_socket_t sock[2]; /* two sockets, the second is used for the data
990                             transfer when doing FTP */
991   curl_socket_t tempsock[2]; /* temporary sockets for happy eyeballs */
992   int tempfamily[2]; /* family used for the temp sockets */
993   Curl_recv *recv[2];
994   Curl_send *send[2];
995 
996 #ifdef USE_RECV_BEFORE_SEND_WORKAROUND
997   struct postponed_data postponed[2]; /* two buffers for two sockets */
998 #endif /* USE_RECV_BEFORE_SEND_WORKAROUND */
999   struct ssl_connect_data ssl[2]; /* this is for ssl-stuff */
1000 #ifndef CURL_DISABLE_PROXY
1001   struct ssl_connect_data proxy_ssl[2]; /* this is for proxy ssl-stuff */
1002 #endif
1003 #ifdef USE_SSL
1004   void *ssl_extra; /* separately allocated backend-specific data */
1005 #endif
1006   struct ssl_primary_config ssl_config;
1007 #ifndef CURL_DISABLE_PROXY
1008   struct ssl_primary_config proxy_ssl_config;
1009 #endif
1010   struct ConnectBits bits;    /* various state-flags for this connection */
1011 
1012   /* The field below gets set in Curl_connecthost */
1013   int num_addr; /* number of addresses to try to connect to */
1014  /* connecttime: when connect() is called on the current IP address. Used to
1015     be able to track when to move on to try next IP - but only when the multi
1016     interface is used. */
1017   struct curltime connecttime;
1018 
1019   /* The field below gets set in Curl_connecthost */
1020   /* how long time in milliseconds to spend on trying to connect to each IP
1021      address, per family */
1022   timediff_t timeoutms_per_addr[2];
1023 
1024   const struct Curl_handler *handler; /* Connection's protocol handler */
1025   const struct Curl_handler *given;   /* The protocol first given */
1026 
1027   /* Protocols can use a custom keepalive mechanism to keep connections alive.
1028      This allows those protocols to track the last time the keepalive mechanism
1029      was used on this connection. */
1030   struct curltime keepalive;
1031 
1032   /**** curl_get() phase fields */
1033 
1034   curl_socket_t sockfd;   /* socket to read from or CURL_SOCKET_BAD */
1035   curl_socket_t writesockfd; /* socket to write to, it may very
1036                                 well be the same we read from.
1037                                 CURL_SOCKET_BAD disables */
1038 
1039 #ifdef HAVE_GSSAPI
1040   BIT(sec_complete); /* if Kerberos is enabled for this connection */
1041   enum protection_level command_prot;
1042   enum protection_level data_prot;
1043   enum protection_level request_data_prot;
1044   size_t buffer_size;
1045   struct krb5buffer in_buffer;
1046   void *app_data;
1047   const struct Curl_sec_client_mech *mech;
1048   struct sockaddr_in local_addr;
1049 #endif
1050 
1051 #if defined(USE_KERBEROS5)    /* Consider moving some of the above GSS-API */
1052   struct kerberos5data krb5;  /* variables into the structure definition, */
1053 #endif                        /* however, some of them are ftp specific. */
1054 
1055   struct Curl_llist easyq;    /* List of easy handles using this connection */
1056   curl_seek_callback seek_func; /* function that seeks the input */
1057   void *seek_client;            /* pointer to pass to the seek() above */
1058 
1059   /*************** Request - specific items ************/
1060 #if defined(USE_WINDOWS_SSPI) && defined(SECPKG_ATTR_ENDPOINT_BINDINGS)
1061   CtxtHandle *sslContext;
1062 #endif
1063 
1064 #ifdef USE_GSASL
1065   struct gsasldata gsasl;
1066 #endif
1067 
1068 #if defined(USE_NTLM)
1069   curlntlm http_ntlm_state;
1070   curlntlm proxy_ntlm_state;
1071 
1072   struct ntlmdata ntlm;     /* NTLM differs from other authentication schemes
1073                                because it authenticates connections, not
1074                                single requests! */
1075   struct ntlmdata proxyntlm; /* NTLM data for proxy */
1076 #endif
1077 
1078 #ifdef USE_SPNEGO
1079   curlnegotiate http_negotiate_state;
1080   curlnegotiate proxy_negotiate_state;
1081 
1082   struct negotiatedata negotiate; /* state data for host Negotiate auth */
1083   struct negotiatedata proxyneg; /* state data for proxy Negotiate auth */
1084 #endif
1085 
1086   /* for chunked-encoded trailer */
1087   struct dynbuf trailer;
1088 
1089   union {
1090     struct ftp_conn ftpc;
1091     struct http_conn httpc;
1092     struct ssh_conn sshc;
1093     struct tftp_state_data *tftpc;
1094     struct imap_conn imapc;
1095     struct pop3_conn pop3c;
1096     struct smtp_conn smtpc;
1097     struct rtsp_conn rtspc;
1098     struct smb_conn smbc;
1099     void *rtmp;
1100     struct ldapconninfo *ldapc;
1101     struct mqtt_conn mqtt;
1102   } proto;
1103 
1104   struct http_connect_state *connect_state; /* for HTTP CONNECT */
1105   struct connectbundle *bundle; /* The bundle we are member of */
1106 #ifdef USE_UNIX_SOCKETS
1107   char *unix_domain_socket;
1108 #endif
1109 #ifdef USE_HYPER
1110   /* if set, an alternative data transfer function */
1111   Curl_datastream datastream;
1112 #endif
1113   /* When this connection is created, store the conditions for the local end
1114      bind. This is stored before the actual bind and before any connection is
1115      made and will serve the purpose of being used for comparison reasons so
1116      that subsequent bound-requested connections aren't accidentally re-using
1117      wrong connections. */
1118   char *localdev;
1119   int localportrange;
1120   int cselect_bits; /* bitmask of socket events */
1121   int waitfor;      /* current READ/WRITE bits to wait for */
1122   int negnpn; /* APLN or NPN TLS negotiated protocol, CURL_HTTP_VERSION* */
1123 
1124 #if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)
1125   int socks5_gssapi_enctype;
1126 #endif
1127   unsigned short localport;
1128 };
1129 
1130 /* The end of connectdata. */
1131 
1132 /*
1133  * Struct to keep statistical and informational data.
1134  * All variables in this struct must be initialized/reset in Curl_initinfo().
1135  */
1136 struct PureInfo {
1137   int httpcode;  /* Recent HTTP, FTP, RTSP or SMTP response code */
1138   int httpproxycode; /* response code from proxy when received separate */
1139   int httpversion; /* the http version number X.Y = X*10+Y */
1140   time_t filetime; /* If requested, this is might get set. Set to -1 if the
1141                       time was unretrievable. */
1142   curl_off_t header_size;  /* size of read header(s) in bytes */
1143   curl_off_t request_size; /* the amount of bytes sent in the request(s) */
1144   unsigned long proxyauthavail; /* what proxy auth types were announced */
1145   unsigned long httpauthavail;  /* what host auth types were announced */
1146   long numconnects; /* how many new connection did libcurl created */
1147   char *contenttype; /* the content type of the object */
1148   char *wouldredirect; /* URL this would've been redirected to if asked to */
1149   curl_off_t retry_after; /* info from Retry-After: header */
1150 
1151   /* PureInfo members 'conn_primary_ip', 'conn_primary_port', 'conn_local_ip'
1152      and, 'conn_local_port' are copied over from the connectdata struct in
1153      order to allow curl_easy_getinfo() to return this information even when
1154      the session handle is no longer associated with a connection, and also
1155      allow curl_easy_reset() to clear this information from the session handle
1156      without disturbing information which is still alive, and that might be
1157      reused, in the connection cache. */
1158 
1159   char conn_primary_ip[MAX_IPADR_LEN];
1160   int conn_primary_port; /* this is the destination port to the connection,
1161                             which might have been a proxy */
1162   int conn_remote_port;  /* this is the "remote port", which is the port
1163                             number of the used URL, independent of proxy or
1164                             not */
1165   char conn_local_ip[MAX_IPADR_LEN];
1166   int conn_local_port;
1167   const char *conn_scheme;
1168   unsigned int conn_protocol;
1169   struct curl_certinfo certs; /* info about the certs, only populated in
1170                                  OpenSSL, GnuTLS, Schannel, NSS and GSKit
1171                                  builds. Asked for with CURLOPT_CERTINFO
1172                                  / CURLINFO_CERTINFO */
1173   CURLproxycode pxcode;
1174   BIT(timecond);  /* set to TRUE if the time condition didn't match, which
1175                      thus made the document NOT get fetched */
1176 };
1177 
1178 
1179 struct Progress {
1180   time_t lastshow; /* time() of the last displayed progress meter or NULL to
1181                       force redraw at next call */
1182   curl_off_t size_dl; /* total expected size */
1183   curl_off_t size_ul; /* total expected size */
1184   curl_off_t downloaded; /* transferred so far */
1185   curl_off_t uploaded; /* transferred so far */
1186 
1187   curl_off_t current_speed; /* uses the currently fastest transfer */
1188 
1189   int width; /* screen width at download start */
1190   int flags; /* see progress.h */
1191 
1192   timediff_t timespent;
1193 
1194   curl_off_t dlspeed;
1195   curl_off_t ulspeed;
1196 
1197   timediff_t t_nslookup;
1198   timediff_t t_connect;
1199   timediff_t t_appconnect;
1200   timediff_t t_pretransfer;
1201   timediff_t t_starttransfer;
1202   timediff_t t_redirect;
1203 
1204   struct curltime start;
1205   struct curltime t_startsingle;
1206   struct curltime t_startop;
1207   struct curltime t_acceptdata;
1208 
1209 
1210   /* upload speed limit */
1211   struct curltime ul_limit_start;
1212   curl_off_t ul_limit_size;
1213   /* download speed limit */
1214   struct curltime dl_limit_start;
1215   curl_off_t dl_limit_size;
1216 
1217 #define CURR_TIME (5 + 1) /* 6 entries for 5 seconds */
1218 
1219   curl_off_t speeder[ CURR_TIME ];
1220   struct curltime speeder_time[ CURR_TIME ];
1221   int speeder_c;
1222   BIT(callback);  /* set when progress callback is used */
1223   BIT(is_t_startransfer_set);
1224 };
1225 
1226 typedef enum {
1227     RTSPREQ_NONE, /* first in list */
1228     RTSPREQ_OPTIONS,
1229     RTSPREQ_DESCRIBE,
1230     RTSPREQ_ANNOUNCE,
1231     RTSPREQ_SETUP,
1232     RTSPREQ_PLAY,
1233     RTSPREQ_PAUSE,
1234     RTSPREQ_TEARDOWN,
1235     RTSPREQ_GET_PARAMETER,
1236     RTSPREQ_SET_PARAMETER,
1237     RTSPREQ_RECORD,
1238     RTSPREQ_RECEIVE,
1239     RTSPREQ_LAST /* last in list */
1240 } Curl_RtspReq;
1241 
1242 struct auth {
1243   unsigned long want;  /* Bitmask set to the authentication methods wanted by
1244                           app (with CURLOPT_HTTPAUTH or CURLOPT_PROXYAUTH). */
1245   unsigned long picked;
1246   unsigned long avail; /* Bitmask for what the server reports to support for
1247                           this resource */
1248   BIT(done);  /* TRUE when the auth phase is done and ready to do the
1249                  actual request */
1250   BIT(multipass); /* TRUE if this is not yet authenticated but within the
1251                      auth multipass negotiation */
1252   BIT(iestyle); /* TRUE if digest should be done IE-style or FALSE if it
1253                    should be RFC compliant */
1254 };
1255 
1256 struct Curl_http2_dep {
1257   struct Curl_http2_dep *next;
1258   struct Curl_easy *data;
1259 };
1260 
1261 /*
1262  * This struct is for holding data that was attempted to get sent to the user's
1263  * callback but is held due to pausing. One instance per type (BOTH, HEADER,
1264  * BODY).
1265  */
1266 struct tempbuf {
1267   struct dynbuf b;
1268   int type;   /* type of the 'tempwrite' buffer as a bitmask that is used with
1269                  Curl_client_write() */
1270 };
1271 
1272 /* Timers */
1273 typedef enum {
1274   EXPIRE_100_TIMEOUT,
1275   EXPIRE_ASYNC_NAME,
1276   EXPIRE_CONNECTTIMEOUT,
1277   EXPIRE_DNS_PER_NAME, /* family1 */
1278   EXPIRE_DNS_PER_NAME2, /* family2 */
1279   EXPIRE_HAPPY_EYEBALLS_DNS, /* See asyn-ares.c */
1280   EXPIRE_HAPPY_EYEBALLS,
1281   EXPIRE_MULTI_PENDING,
1282   EXPIRE_RUN_NOW,
1283   EXPIRE_SPEEDCHECK,
1284   EXPIRE_TIMEOUT,
1285   EXPIRE_TOOFAST,
1286   EXPIRE_QUIC,
1287   EXPIRE_LAST /* not an actual timer, used as a marker only */
1288 } expire_id;
1289 
1290 
1291 typedef enum {
1292   TRAILERS_NONE,
1293   TRAILERS_INITIALIZED,
1294   TRAILERS_SENDING,
1295   TRAILERS_DONE
1296 } trailers_state;
1297 
1298 
1299 /*
1300  * One instance for each timeout an easy handle can set.
1301  */
1302 struct time_node {
1303   struct Curl_llist_element list;
1304   struct curltime time;
1305   expire_id eid;
1306 };
1307 
1308 /* individual pieces of the URL */
1309 struct urlpieces {
1310   char *scheme;
1311   char *hostname;
1312   char *port;
1313   char *user;
1314   char *password;
1315   char *options;
1316   char *path;
1317   char *query;
1318 };
1319 
1320 struct UrlState {
1321   /* Points to the connection cache */
1322   struct conncache *conn_cache;
1323   /* buffers to store authentication data in, as parsed from input options */
1324   struct curltime keeps_speed; /* for the progress meter really */
1325 
1326   long lastconnect_id; /* The last connection, -1 if undefined */
1327   struct dynbuf headerb; /* buffer to store headers in */
1328 
1329   char *buffer; /* download buffer */
1330   char *ulbuf; /* allocated upload buffer or NULL */
1331   curl_off_t current_speed;  /* the ProgressShow() function sets this,
1332                                 bytes / second */
1333 
1334   /* host name, port number and protocol of the first (not followed) request.
1335      if set, this should be the host name that we will sent authorization to,
1336      no else. Used to make Location: following not keep sending user+password.
1337      This is strdup()ed data. */
1338   char *first_host;
1339   int first_remote_port;
1340   unsigned int first_remote_protocol;
1341 
1342   int retrycount; /* number of retries on a new connection */
1343   struct Curl_ssl_session *session; /* array of 'max_ssl_sessions' size */
1344   long sessionage;                  /* number of the most recent session */
1345   struct tempbuf tempwrite[3]; /* BOTH, HEADER, BODY */
1346   unsigned int tempcount; /* number of entries in use in tempwrite, 0 - 3 */
1347   int os_errno;  /* filled in with errno whenever an error occurs */
1348   char *scratch; /* huge buffer[set.buffer_size*2] for upload CRLF replacing */
1349   long followlocation; /* redirect counter */
1350 #ifdef HAVE_SIGNAL
1351   /* storage for the previous bag^H^H^HSIGPIPE signal handler :-) */
1352   void (*prev_signal)(int sig);
1353 #endif
1354   struct digestdata digest;      /* state data for host Digest auth */
1355   struct digestdata proxydigest; /* state data for proxy Digest auth */
1356 
1357   struct auth authhost;  /* auth details for host */
1358   struct auth authproxy; /* auth details for proxy */
1359 #ifdef USE_CURL_ASYNC
1360   struct Curl_async async;  /* asynchronous name resolver data */
1361 #endif
1362 
1363 #if defined(USE_OPENSSL)
1364   /* void instead of ENGINE to avoid bleeding OpenSSL into this header */
1365   void *engine;
1366 #endif /* USE_OPENSSL */
1367   struct curltime expiretime; /* set this with Curl_expire() only */
1368   struct Curl_tree timenode; /* for the splay stuff */
1369   struct Curl_llist timeoutlist; /* list of pending timeouts */
1370   struct time_node expires[EXPIRE_LAST]; /* nodes for each expire type */
1371 
1372   /* a place to store the most recently set FTP entrypath */
1373   char *most_recent_ftp_entrypath;
1374   unsigned char httpwant; /* when non-zero, a specific HTTP version requested
1375                              to be used in the library's request(s) */
1376   unsigned char httpversion; /* the lowest HTTP version*10 reported by any
1377                                 server involved in this request */
1378 
1379 #if !defined(WIN32) && !defined(MSDOS) && !defined(__EMX__)
1380 /* do FTP line-end conversions on most platforms */
1381 #define CURL_DO_LINEEND_CONV
1382   /* for FTP downloads: track CRLF sequences that span blocks */
1383   BIT(prev_block_had_trailing_cr);
1384   /* for FTP downloads: how many CRLFs did we converted to LFs? */
1385   curl_off_t crlf_conversions;
1386 #endif
1387   char *range; /* range, if used. See README for detailed specification on
1388                   this syntax. */
1389   curl_off_t resume_from; /* continue [ftp] transfer from here */
1390 
1391   /* This RTSP state information survives requests and connections */
1392   long rtsp_next_client_CSeq; /* the session's next client CSeq */
1393   long rtsp_next_server_CSeq; /* the session's next server CSeq */
1394   long rtsp_CSeq_recv; /* most recent CSeq received */
1395 
1396   curl_off_t infilesize; /* size of file to upload, -1 means unknown.
1397                             Copied from set.filesize at start of operation */
1398 
1399   size_t drain; /* Increased when this stream has data to read, even if its
1400                    socket is not necessarily is readable. Decreased when
1401                    checked. */
1402 
1403   curl_read_callback fread_func; /* read callback/function */
1404   void *in;                      /* CURLOPT_READDATA */
1405 
1406   struct Curl_easy *stream_depends_on;
1407   int stream_weight;
1408   CURLU *uh; /* URL handle for the current parsed URL */
1409   struct urlpieces up;
1410   Curl_HttpReq httpreq; /* what kind of HTTP request (if any) is this */
1411   char *url;        /* work URL, copied from UserDefined */
1412   char *referer;    /* referer string */
1413   struct curl_slist *cookielist; /* list of cookie files set by
1414                                     curl_easy_setopt(COOKIEFILE) calls */
1415   struct curl_slist *resolve; /* set to point to the set.resolve list when
1416                                  this should be dealt with in pretransfer */
1417 #ifndef CURL_DISABLE_HTTP
1418   size_t trailers_bytes_sent;
1419   struct dynbuf trailers_buf; /* a buffer containing the compiled trailing
1420                                  headers */
1421 #endif
1422   trailers_state trailers_state; /* whether we are sending trailers
1423                                        and what stage are we at */
1424 #ifdef USE_HYPER
1425   bool hconnect;  /* set if a CONNECT request */
1426   CURLcode hresult; /* used to pass return codes back from hyper callbacks */
1427 #endif
1428 
1429   /* Dynamically allocated strings, MUST be freed before this struct is
1430      killed. */
1431   struct dynamically_allocated_data {
1432     char *proxyuserpwd;
1433     char *uagent;
1434     char *accept_encoding;
1435     char *userpwd;
1436     char *rangeline;
1437     char *ref;
1438     char *host;
1439     char *cookiehost;
1440     char *rtsp_transport;
1441     char *te; /* TE: request header */
1442 
1443     /* transfer credentials */
1444     char *user;
1445     char *passwd;
1446     char *proxyuser;
1447     char *proxypasswd;
1448   } aptr;
1449 
1450 #ifdef CURLDEBUG
1451   BIT(conncache_lock);
1452 #endif
1453   /* when curl_easy_perform() is called, the multi handle is "owned" by
1454      the easy handle so curl_easy_cleanup() on such an easy handle will
1455      also close the multi handle! */
1456   BIT(multi_owned_by_easy);
1457 
1458   BIT(this_is_a_follow); /* this is a followed Location: request */
1459   BIT(refused_stream); /* this was refused, try again */
1460   BIT(errorbuf); /* Set to TRUE if the error buffer is already filled in.
1461                     This must be set to FALSE every time _easy_perform() is
1462                     called. */
1463   BIT(allow_port); /* Is set.use_port allowed to take effect or not. This
1464                       is always set TRUE when curl_easy_perform() is called. */
1465   BIT(authproblem); /* TRUE if there's some problem authenticating */
1466   /* set after initial USER failure, to prevent an authentication loop */
1467   BIT(ftp_trying_alternative);
1468   BIT(wildcardmatch); /* enable wildcard matching */
1469   BIT(expect100header);  /* TRUE if we added Expect: 100-continue */
1470   BIT(disableexpect);    /* TRUE if Expect: is disabled due to a previous
1471                             417 response */
1472   BIT(use_range);
1473   BIT(rangestringalloc); /* the range string is malloc()'ed */
1474   BIT(done); /* set to FALSE when Curl_init_do() is called and set to TRUE
1475                 when multi_done() is called, to prevent multi_done() to get
1476                 invoked twice when the multi interface is used. */
1477   BIT(stream_depends_e); /* set or don't set the Exclusive bit */
1478   BIT(previouslypending); /* this transfer WAS in the multi->pending queue */
1479   BIT(cookie_engine);
1480   BIT(prefer_ascii);   /* ASCII rather than binary */
1481   BIT(list_only);      /* list directory contents */
1482   BIT(url_alloc);   /* URL string is malloc()'ed */
1483   BIT(referer_alloc); /* referer string is malloc()ed */
1484   BIT(wildcard_resolve); /* Set to true if any resolve change is a wildcard */
1485 };
1486 
1487 /*
1488  * This 'UserDefined' struct must only contain data that is set once to go
1489  * for many (perhaps) independent connections. Values that are generated or
1490  * calculated internally for the "session handle" MUST be defined within the
1491  * 'struct UrlState' instead. The only exceptions MUST note the changes in
1492  * the 'DynamicStatic' struct.
1493  * Character pointer fields point to dynamic storage, unless otherwise stated.
1494  */
1495 
1496 struct Curl_multi;    /* declared and used only in multi.c */
1497 
1498 /*
1499  * This enumeration MUST not use conditional directives (#ifdefs), new
1500  * null terminated strings MUST be added to the enumeration immediately
1501  * before STRING_LASTZEROTERMINATED, binary fields immediately before
1502  * STRING_LAST. When doing so, ensure that the packages/OS400/chkstring.c
1503  * test is updated and applicable changes for EBCDIC to ASCII conversion
1504  * are catered for in curl_easy_setopt_ccsid()
1505  */
1506 enum dupstring {
1507   STRING_CERT,            /* client certificate file name */
1508   STRING_CERT_PROXY,      /* client certificate file name */
1509   STRING_CERT_TYPE,       /* format for certificate (default: PEM)*/
1510   STRING_CERT_TYPE_PROXY, /* format for certificate (default: PEM)*/
1511   STRING_COOKIE,          /* HTTP cookie string to send */
1512   STRING_COOKIEJAR,       /* dump all cookies to this file */
1513   STRING_CUSTOMREQUEST,   /* HTTP/FTP/RTSP request/method to use */
1514   STRING_DEFAULT_PROTOCOL, /* Protocol to use when the URL doesn't specify */
1515   STRING_DEVICE,          /* local network interface/address to use */
1516   STRING_ENCODING,        /* Accept-Encoding string */
1517   STRING_FTP_ACCOUNT,     /* ftp account data */
1518   STRING_FTP_ALTERNATIVE_TO_USER, /* command to send if USER/PASS fails */
1519   STRING_FTPPORT,         /* port to send with the FTP PORT command */
1520   STRING_KEY,             /* private key file name */
1521   STRING_KEY_PROXY,       /* private key file name */
1522   STRING_KEY_PASSWD,      /* plain text private key password */
1523   STRING_KEY_PASSWD_PROXY, /* plain text private key password */
1524   STRING_KEY_TYPE,        /* format for private key (default: PEM) */
1525   STRING_KEY_TYPE_PROXY,  /* format for private key (default: PEM) */
1526   STRING_KRB_LEVEL,       /* krb security level */
1527   STRING_NETRC_FILE,      /* if not NULL, use this instead of trying to find
1528                              $HOME/.netrc */
1529   STRING_PROXY,           /* proxy to use */
1530   STRING_PRE_PROXY,       /* pre socks proxy to use */
1531   STRING_SET_RANGE,       /* range, if used */
1532   STRING_SET_REFERER,     /* custom string for the HTTP referer field */
1533   STRING_SET_URL,         /* what original URL to work on */
1534   STRING_SSL_CAPATH,      /* CA directory name (doesn't work on windows) */
1535   STRING_SSL_CAPATH_PROXY, /* CA directory name (doesn't work on windows) */
1536   STRING_SSL_CAFILE,      /* certificate file to verify peer against */
1537   STRING_SSL_CAFILE_PROXY, /* certificate file to verify peer against */
1538   STRING_SSL_PINNEDPUBLICKEY, /* public key file to verify peer against */
1539   STRING_SSL_PINNEDPUBLICKEY_PROXY, /* public key file to verify proxy */
1540   STRING_SSL_CIPHER_LIST, /* list of ciphers to use */
1541   STRING_SSL_CIPHER_LIST_PROXY, /* list of ciphers to use */
1542   STRING_SSL_CIPHER13_LIST, /* list of TLS 1.3 ciphers to use */
1543   STRING_SSL_CIPHER13_LIST_PROXY, /* list of TLS 1.3 ciphers to use */
1544   STRING_SSL_EGDSOCKET,   /* path to file containing the EGD daemon socket */
1545   STRING_SSL_RANDOM_FILE, /* path to file containing "random" data */
1546   STRING_USERAGENT,       /* User-Agent string */
1547   STRING_SSL_CRLFILE,     /* crl file to check certificate */
1548   STRING_SSL_CRLFILE_PROXY, /* crl file to check certificate */
1549   STRING_SSL_ISSUERCERT, /* issuer cert file to check certificate */
1550   STRING_SSL_ISSUERCERT_PROXY, /* issuer cert file to check certificate */
1551   STRING_SSL_ENGINE,      /* name of ssl engine */
1552   STRING_USERNAME,        /* <username>, if used */
1553   STRING_PASSWORD,        /* <password>, if used */
1554   STRING_OPTIONS,         /* <options>, if used */
1555   STRING_PROXYUSERNAME,   /* Proxy <username>, if used */
1556   STRING_PROXYPASSWORD,   /* Proxy <password>, if used */
1557   STRING_NOPROXY,         /* List of hosts which should not use the proxy, if
1558                              used */
1559   STRING_RTSP_SESSION_ID, /* Session ID to use */
1560   STRING_RTSP_STREAM_URI, /* Stream URI for this request */
1561   STRING_RTSP_TRANSPORT,  /* Transport for this session */
1562   STRING_SSH_PRIVATE_KEY, /* path to the private key file for auth */
1563   STRING_SSH_PUBLIC_KEY,  /* path to the public key file for auth */
1564   STRING_SSH_HOST_PUBLIC_KEY_MD5, /* md5 of host public key in ascii hex */
1565   STRING_SSH_KNOWNHOSTS,  /* file name of knownhosts file */
1566   STRING_PROXY_SERVICE_NAME, /* Proxy service name */
1567   STRING_SERVICE_NAME,    /* Service name */
1568   STRING_MAIL_FROM,
1569   STRING_MAIL_AUTH,
1570   STRING_TLSAUTH_USERNAME,  /* TLS auth <username> */
1571   STRING_TLSAUTH_USERNAME_PROXY, /* TLS auth <username> */
1572   STRING_TLSAUTH_PASSWORD,  /* TLS auth <password> */
1573   STRING_TLSAUTH_PASSWORD_PROXY, /* TLS auth <password> */
1574   STRING_BEARER,                /* <bearer>, if used */
1575   STRING_UNIX_SOCKET_PATH,      /* path to Unix socket, if used */
1576   STRING_TARGET,                /* CURLOPT_REQUEST_TARGET */
1577   STRING_DOH,                   /* CURLOPT_DOH_URL */
1578   STRING_ALTSVC,                /* CURLOPT_ALTSVC */
1579   STRING_HSTS,                  /* CURLOPT_HSTS */
1580   STRING_SASL_AUTHZID,          /* CURLOPT_SASL_AUTHZID */
1581   STRING_DNS_SERVERS,
1582   STRING_DNS_INTERFACE,
1583   STRING_DNS_LOCAL_IP4,
1584   STRING_DNS_LOCAL_IP6,
1585   STRING_SSL_EC_CURVES,
1586 
1587   /* -- end of null-terminated strings -- */
1588 
1589   STRING_LASTZEROTERMINATED,
1590 
1591   /* -- below this are pointers to binary data that cannot be strdup'ed. --- */
1592 
1593   STRING_COPYPOSTFIELDS,  /* if POST, set the fields' values here */
1594 
1595   STRING_AWS_SIGV4, /* Parameters for V4 signature */
1596 
1597   STRING_LAST /* not used, just an end-of-list marker */
1598 };
1599 
1600 enum dupblob {
1601   BLOB_CERT,
1602   BLOB_CERT_PROXY,
1603   BLOB_KEY,
1604   BLOB_KEY_PROXY,
1605   BLOB_SSL_ISSUERCERT,
1606   BLOB_SSL_ISSUERCERT_PROXY,
1607   BLOB_CAINFO,
1608   BLOB_CAINFO_PROXY,
1609   BLOB_LAST
1610 };
1611 
1612 /* callback that gets called when this easy handle is completed within a multi
1613    handle.  Only used for internally created transfers, like for example
1614    DoH. */
1615 typedef int (*multidone_func)(struct Curl_easy *easy, CURLcode result);
1616 
1617 struct UserDefined {
1618   FILE *err;         /* the stderr user data goes here */
1619   void *debugdata;   /* the data that will be passed to fdebug */
1620   char *errorbuffer; /* (Static) store failure messages in here */
1621   long proxyport; /* If non-zero, use this port number by default. If the
1622                      proxy string features a ":[port]" that one will override
1623                      this. */
1624   void *out;         /* CURLOPT_WRITEDATA */
1625   void *in_set;      /* CURLOPT_READDATA */
1626   void *writeheader; /* write the header to this if non-NULL */
1627   void *rtp_out;     /* write RTP to this if non-NULL */
1628   long use_port;     /* which port to use (when not using default) */
1629   unsigned long httpauth;  /* kind of HTTP authentication to use (bitmask) */
1630   unsigned long proxyauth; /* kind of proxy authentication to use (bitmask) */
1631   unsigned long socks5auth;/* kind of SOCKS5 authentication to use (bitmask) */
1632   long maxredirs;    /* maximum no. of http(s) redirects to follow, set to -1
1633                         for infinity */
1634 
1635   int keep_post;     /* keep POSTs as POSTs after a 30x request; each
1636                         bit represents a request, from 301 to 303 */
1637   void *postfields;  /* if POST, set the fields' values here */
1638   curl_seek_callback seek_func;      /* function that seeks the input */
1639   curl_off_t postfieldsize; /* if POST, this might have a size to use instead
1640                                of strlen(), and then the data *may* be binary
1641                                (contain zero bytes) */
1642   unsigned short localport; /* local port number to bind to */
1643   int localportrange; /* number of additional port numbers to test in case the
1644                          'localport' one can't be bind()ed */
1645   curl_write_callback fwrite_func;   /* function that stores the output */
1646   curl_write_callback fwrite_header; /* function that stores headers */
1647   curl_write_callback fwrite_rtp;    /* function that stores interleaved RTP */
1648   curl_read_callback fread_func_set; /* function that reads the input */
1649   curl_progress_callback fprogress; /* OLD and deprecated progress callback  */
1650   curl_xferinfo_callback fxferinfo; /* progress callback */
1651   curl_debug_callback fdebug;      /* function that write informational data */
1652   curl_ioctl_callback ioctl_func;  /* function for I/O control */
1653   curl_sockopt_callback fsockopt;  /* function for setting socket options */
1654   void *sockopt_client; /* pointer to pass to the socket options callback */
1655   curl_opensocket_callback fopensocket; /* function for checking/translating
1656                                            the address and opening the
1657                                            socket */
1658   void *opensocket_client;
1659   curl_closesocket_callback fclosesocket; /* function for closing the
1660                                              socket */
1661   void *closesocket_client;
1662 
1663   void *seek_client;    /* pointer to pass to the seek callback */
1664   /* the 3 curl_conv_callback functions below are used on non-ASCII hosts */
1665   /* function to convert from the network encoding: */
1666   curl_conv_callback convfromnetwork;
1667   /* function to convert to the network encoding: */
1668   curl_conv_callback convtonetwork;
1669   /* function to convert from UTF-8 encoding: */
1670   curl_conv_callback convfromutf8;
1671 #ifndef CURL_DISABLE_HSTS
1672   curl_hstsread_callback hsts_read;
1673   void *hsts_read_userp;
1674   curl_hstswrite_callback hsts_write;
1675   void *hsts_write_userp;
1676 #endif
1677   void *progress_client; /* pointer to pass to the progress callback */
1678   void *ioctl_client;   /* pointer to pass to the ioctl callback */
1679   long timeout;         /* in milliseconds, 0 means no timeout */
1680   long connecttimeout;  /* in milliseconds, 0 means no timeout */
1681   long accepttimeout;   /* in milliseconds, 0 means no timeout */
1682   long happy_eyeballs_timeout; /* in milliseconds, 0 is a valid value */
1683   long server_response_timeout; /* in milliseconds, 0 means no timeout */
1684   long maxage_conn;     /* in seconds, max idle time to allow a connection that
1685                            is to be reused */
1686   long tftp_blksize;    /* in bytes, 0 means use default */
1687   curl_off_t filesize;  /* size of file to upload, -1 means unknown */
1688   long low_speed_limit; /* bytes/second */
1689   long low_speed_time;  /* number of seconds */
1690   curl_off_t max_send_speed; /* high speed limit in bytes/second for upload */
1691   curl_off_t max_recv_speed; /* high speed limit in bytes/second for
1692                                 download */
1693   curl_off_t set_resume_from;  /* continue [ftp] transfer from here */
1694   struct curl_slist *headers; /* linked list of extra headers */
1695   struct curl_slist *proxyheaders; /* linked list of extra CONNECT headers */
1696   struct curl_httppost *httppost;  /* linked list of old POST data */
1697   curl_mimepart mimepost;  /* MIME/POST data. */
1698   struct curl_slist *quote;     /* after connection is established */
1699   struct curl_slist *postquote; /* after the transfer */
1700   struct curl_slist *prequote; /* before the transfer, after type */
1701   struct curl_slist *source_quote;  /* 3rd party quote */
1702   struct curl_slist *source_prequote;  /* in 3rd party transfer mode - before
1703                                           the transfer on source host */
1704   struct curl_slist *source_postquote; /* in 3rd party transfer mode - after
1705                                           the transfer on source host */
1706   struct curl_slist *telnet_options; /* linked list of telnet options */
1707   struct curl_slist *resolve;     /* list of names to add/remove from
1708                                      DNS cache */
1709   struct curl_slist *connect_to; /* list of host:port mappings to override
1710                                     the hostname and port to connect to */
1711   curl_TimeCond timecondition; /* kind of time/date comparison */
1712   curl_proxytype proxytype; /* what kind of proxy that is in use */
1713   time_t timevalue;       /* what time to compare with */
1714   Curl_HttpReq method;   /* what kind of HTTP request (if any) is this */
1715   unsigned char httpwant; /* when non-zero, a specific HTTP version requested
1716                              to be used in the library's request(s) */
1717   struct ssl_config_data ssl;  /* user defined SSL stuff */
1718 #ifndef CURL_DISABLE_PROXY
1719   struct ssl_config_data proxy_ssl;  /* user defined SSL stuff for proxy */
1720 #endif
1721   struct ssl_general_config general_ssl; /* general user defined SSL stuff */
1722   long dns_cache_timeout; /* DNS cache timeout */
1723   long buffer_size;      /* size of receive buffer to use */
1724   unsigned int upload_buffer_size; /* size of upload buffer to use,
1725                                       keep it >= CURL_MAX_WRITE_SIZE */
1726   void *private_data; /* application-private data */
1727   struct curl_slist *http200aliases; /* linked list of aliases for http200 */
1728   unsigned char ipver; /* the CURL_IPRESOLVE_* defines in the public header
1729                           file 0 - whatever, 1 - v2, 2 - v6 */
1730   curl_off_t max_filesize; /* Maximum file size to download */
1731 #ifndef CURL_DISABLE_FTP
1732   curl_ftpfile ftp_filemethod; /* how to get to a file when FTP is used  */
1733   curl_ftpauth ftpsslauth; /* what AUTH XXX to be attempted */
1734   curl_ftpccc ftp_ccc;   /* FTP CCC options */
1735 #endif
1736   int ftp_create_missing_dirs; /* 1 - create directories that don't exist
1737                                   2 - the same but also allow MKD to fail once
1738                                */
1739   curl_sshkeycallback ssh_keyfunc; /* key matching callback */
1740   void *ssh_keyfunc_userp;         /* custom pointer to callback */
1741 #ifndef CURL_DISABLE_NETRC
1742   enum CURL_NETRC_OPTION
1743        use_netrc;        /* defined in include/curl.h */
1744 #endif
1745   curl_usessl use_ssl;   /* if AUTH TLS is to be attempted etc, for FTP or
1746                             IMAP or POP3 or others! */
1747   long new_file_perms;    /* Permissions to use when creating remote files */
1748   long new_directory_perms; /* Permissions to use when creating remote dirs */
1749   long ssh_auth_types;   /* allowed SSH auth types */
1750   char *str[STRING_LAST]; /* array of strings, pointing to allocated memory */
1751   struct curl_blob *blobs[BLOB_LAST];
1752   unsigned int scope_id;  /* Scope id for IPv6 */
1753   long allowed_protocols;
1754   long redir_protocols;
1755   struct curl_slist *mail_rcpt; /* linked list of mail recipients */
1756   /* Common RTSP header options */
1757   Curl_RtspReq rtspreq; /* RTSP request type */
1758   long rtspversion; /* like httpversion, for RTSP */
1759   curl_chunk_bgn_callback chunk_bgn; /* called before part of transfer
1760                                         starts */
1761   curl_chunk_end_callback chunk_end; /* called after part transferring
1762                                         stopped */
1763   curl_fnmatch_callback fnmatch; /* callback to decide which file corresponds
1764                                     to pattern (e.g. if WILDCARDMATCH is on) */
1765   void *fnmatch_data;
1766 
1767   long gssapi_delegation; /* GSS-API credential delegation, see the
1768                              documentation of CURLOPT_GSSAPI_DELEGATION */
1769 
1770   long tcp_keepidle;     /* seconds in idle before sending keepalive probe */
1771   long tcp_keepintvl;    /* seconds between TCP keepalive probes */
1772 
1773   size_t maxconnects;    /* Max idle connections in the connection cache */
1774 
1775   long expect_100_timeout; /* in milliseconds */
1776   struct Curl_easy *stream_depends_on;
1777   int stream_weight;
1778   struct Curl_http2_dep *stream_dependents;
1779 
1780   curl_resolver_start_callback resolver_start; /* optional callback called
1781                                                   before resolver start */
1782   void *resolver_start_client; /* pointer to pass to resolver start callback */
1783   long upkeep_interval_ms;      /* Time between calls for connection upkeep. */
1784   multidone_func fmultidone;
1785   struct Curl_easy *dohfor; /* this is a DoH request for that transfer */
1786   CURLU *uh; /* URL handle for the current parsed URL */
1787   void *trailer_data; /* pointer to pass to trailer data callback */
1788   curl_trailer_callback trailer_callback; /* trailing data callback */
1789   BIT(is_fread_set); /* has read callback been set to non-NULL? */
1790   BIT(is_fwrite_set); /* has write callback been set to non-NULL? */
1791   BIT(free_referer); /* set TRUE if 'referer' points to a string we
1792                         allocated */
1793   BIT(tftp_no_options); /* do not send TFTP options requests */
1794   BIT(sep_headers);     /* handle host and proxy headers separately */
1795   BIT(cookiesession);   /* new cookie session? */
1796   BIT(crlf);            /* convert crlf on ftp upload(?) */
1797   BIT(strip_path_slash); /* strip off initial slash from path */
1798   BIT(ssh_compression);            /* enable SSH compression */
1799 
1800 /* Here follows boolean settings that define how to behave during
1801    this session. They are STATIC, set by libcurl users or at least initially
1802    and they don't change during operations. */
1803   BIT(get_filetime);     /* get the time and get of the remote file */
1804   BIT(tunnel_thru_httpproxy); /* use CONNECT through a HTTP proxy */
1805   BIT(prefer_ascii);     /* ASCII rather than binary */
1806   BIT(remote_append);    /* append, not overwrite, on upload */
1807   BIT(list_only);        /* list directory */
1808 #ifndef CURL_DISABLE_FTP
1809   BIT(ftp_use_port);     /* use the FTP PORT command */
1810   BIT(ftp_use_epsv);     /* if EPSV is to be attempted or not */
1811   BIT(ftp_use_eprt);     /* if EPRT is to be attempted or not */
1812   BIT(ftp_use_pret);     /* if PRET is to be used before PASV or not */
1813   BIT(ftp_skip_ip);      /* skip the IP address the FTP server passes on to
1814                             us */
1815 #endif
1816   BIT(hide_progress);    /* don't use the progress meter */
1817   BIT(http_fail_on_error);  /* fail on HTTP error codes >= 400 */
1818   BIT(http_keep_sending_on_error); /* for HTTP status codes >= 300 */
1819   BIT(http_follow_location); /* follow HTTP redirects */
1820   BIT(http_transfer_encoding); /* request compressed HTTP transfer-encoding */
1821   BIT(allow_auth_to_other_hosts);
1822   BIT(include_header); /* include received protocol headers in data output */
1823   BIT(http_set_referer); /* is a custom referer used */
1824   BIT(http_auto_referer); /* set "correct" referer when following
1825                              location: */
1826   BIT(opt_no_body);    /* as set with CURLOPT_NOBODY */
1827   BIT(upload);         /* upload request */
1828   BIT(verbose);        /* output verbosity */
1829   BIT(krb);            /* Kerberos connection requested */
1830   BIT(reuse_forbid);   /* forbidden to be reused, close after use */
1831   BIT(reuse_fresh);    /* do not re-use an existing connection  */
1832   BIT(no_signal);      /* do not use any signal/alarm handler */
1833   BIT(tcp_nodelay);    /* whether to enable TCP_NODELAY or not */
1834   BIT(ignorecl);       /* ignore content length */
1835   BIT(connect_only);   /* make connection, let application use the socket */
1836   BIT(http_te_skip);   /* pass the raw body data to the user, even when
1837                           transfer-encoded (chunked, compressed) */
1838   BIT(http_ce_skip);   /* pass the raw body data to the user, even when
1839                           content-encoded (chunked, compressed) */
1840   BIT(proxy_transfer_mode); /* set transfer mode (;type=<a|i>) when doing
1841                                FTP via an HTTP proxy */
1842 #if defined(HAVE_GSSAPI) || defined(USE_WINDOWS_SSPI)
1843   BIT(socks5_gssapi_nec); /* Flag to support NEC SOCKS5 server */
1844 #endif
1845   BIT(sasl_ir);         /* Enable/disable SASL initial response */
1846   BIT(wildcard_enabled); /* enable wildcard matching */
1847   BIT(tcp_keepalive);  /* use TCP keepalives */
1848   BIT(tcp_fastopen);   /* use TCP Fast Open */
1849   BIT(ssl_enable_npn); /* TLS NPN extension? */
1850   BIT(ssl_enable_alpn);/* TLS ALPN extension? */
1851   BIT(path_as_is);     /* allow dotdots? */
1852   BIT(pipewait);       /* wait for multiplex status before starting a new
1853                           connection */
1854   BIT(suppress_connect_headers); /* suppress proxy CONNECT response headers
1855                                     from user callbacks */
1856   BIT(dns_shuffle_addresses); /* whether to shuffle addresses before use */
1857   BIT(stream_depends_e); /* set or don't set the Exclusive bit */
1858   BIT(haproxyprotocol); /* whether to send HAProxy PROXY protocol v1
1859                            header */
1860   BIT(abstract_unix_socket);
1861   BIT(disallow_username_in_url); /* disallow username in url */
1862   BIT(doh); /* DNS-over-HTTPS enabled */
1863   BIT(doh_get); /* use GET for DoH requests, instead of POST */
1864   BIT(doh_verifypeer);     /* DoH certificate peer verification */
1865   BIT(doh_verifyhost);     /* DoH certificate hostname verification */
1866   BIT(doh_verifystatus);   /* DoH certificate status verification */
1867   BIT(http09_allowed); /* allow HTTP/0.9 responses */
1868   BIT(mail_rcpt_allowfails); /* allow RCPT TO command to fail for some
1869                                 recipients */
1870 };
1871 
1872 struct Names {
1873   struct Curl_hash *hostcache;
1874   enum {
1875     HCACHE_NONE,    /* not pointing to anything */
1876     HCACHE_MULTI,   /* points to a shared one in the multi handle */
1877     HCACHE_SHARED   /* points to a shared one in a shared object */
1878   } hostcachetype;
1879 };
1880 
1881 /*
1882  * The 'connectdata' struct MUST have all the connection oriented stuff as we
1883  * may have several simultaneous connections and connection structs in memory.
1884  *
1885  * The 'struct UserDefined' must only contain data that is set once to go for
1886  * many (perhaps) independent connections. Values that are generated or
1887  * calculated internally for the "session handle" must be defined within the
1888  * 'struct UrlState' instead.
1889  */
1890 
1891 struct Curl_easy {
1892   /* First a simple identifier to easier detect if a user mix up this easy
1893      handle with a multi handle. Set this to CURLEASY_MAGIC_NUMBER */
1894   unsigned int magic;
1895 
1896   /* first, two fields for the linked list of these */
1897   struct Curl_easy *next;
1898   struct Curl_easy *prev;
1899 
1900   struct connectdata *conn;
1901   struct Curl_llist_element connect_queue;
1902   struct Curl_llist_element conn_queue; /* list per connectdata */
1903 
1904   CURLMstate mstate;  /* the handle's state */
1905   CURLcode result;   /* previous result */
1906 
1907   struct Curl_message msg; /* A single posted message. */
1908 
1909   /* Array with the plain socket numbers this handle takes care of, in no
1910      particular order. Note that all sockets are added to the sockhash, where
1911      the state etc are also kept. This array is mostly used to detect when a
1912      socket is to be removed from the hash. See singlesocket(). */
1913   curl_socket_t sockets[MAX_SOCKSPEREASYHANDLE];
1914   unsigned char actions[MAX_SOCKSPEREASYHANDLE]; /* action for each socket in
1915                                                     sockets[] */
1916   int numsocks;
1917 
1918   struct Names dns;
1919   struct Curl_multi *multi;    /* if non-NULL, points to the multi handle
1920                                   struct to which this "belongs" when used by
1921                                   the multi interface */
1922   struct Curl_multi *multi_easy; /* if non-NULL, points to the multi handle
1923                                     struct to which this "belongs" when used
1924                                     by the easy interface */
1925   struct Curl_share *share;    /* Share, handles global variable mutexing */
1926 #ifdef USE_LIBPSL
1927   struct PslCache *psl;        /* The associated PSL cache. */
1928 #endif
1929   struct SingleRequest req;    /* Request-specific data */
1930   struct UserDefined set;      /* values set by the libcurl user */
1931   struct CookieInfo *cookies;  /* the cookies, read from files and servers.
1932                                   NOTE that the 'cookie' field in the
1933                                   UserDefined struct defines if the "engine"
1934                                   is to be used or not. */
1935 #ifndef CURL_DISABLE_HSTS
1936   struct hsts *hsts;
1937 #endif
1938 #ifndef CURL_DISABLE_ALTSVC
1939   struct altsvcinfo *asi;      /* the alt-svc cache */
1940 #endif
1941   struct Progress progress;    /* for all the progress meter data */
1942   struct UrlState state;       /* struct for fields used for state info and
1943                                   other dynamic purposes */
1944 #ifndef CURL_DISABLE_FTP
1945   struct WildcardData wildcard; /* wildcard download state info */
1946 #endif
1947   struct PureInfo info;        /* stats, reports and info data */
1948   struct curl_tlssessioninfo tsi; /* Information about the TLS session, only
1949                                      valid after a client has asked for it */
1950 #if defined(CURL_DOES_CONVERSIONS) && defined(HAVE_ICONV)
1951   iconv_t outbound_cd;         /* for translating to the network encoding */
1952   iconv_t inbound_cd;          /* for translating from the network encoding */
1953   iconv_t utf8_cd;             /* for translating to UTF8 */
1954 #endif /* CURL_DOES_CONVERSIONS && HAVE_ICONV */
1955 #ifdef USE_HYPER
1956   struct hyptransfer hyp;
1957 #endif
1958 };
1959 
1960 #define LIBCURL_NAME "libcurl"
1961 
1962 #endif /* HEADER_CURL_URLDATA_H */
1963