file_http.cpp revision 1.6 1 /* $NetBSD: file_http.cpp,v 1.6 2002/02/04 17:32:02 uch Exp $ */
2
3 /*-
4 * Copyright (c) 2001, 2002 The NetBSD Foundation, Inc.
5 * All rights reserved.
6 *
7 * This code is derived from software contributed to The NetBSD Foundation
8 * by UCHIYAMA Yasushi.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 * must display the following acknowledgement:
20 * This product includes software developed by the NetBSD
21 * Foundation, Inc. and its contributors.
22 * 4. Neither the name of The NetBSD Foundation nor the names of its
23 * contributors may be used to endorse or promote products derived
24 * from this software without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
27 * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
28 * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
29 * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
30 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
31 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
32 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
33 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
34 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
35 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
36 * POSSIBILITY OF SUCH DAMAGE.
37 */
38
39 #include <file.h>
40 #include <file_http.h>
41 #include <console.h>
42
43 #if _WIN32_WCE < 210
44 #define tolower(c) ((c) - 'A' + 'a')
45 #define wcsicmp _wcsicmp
46 #endif
47
48 static int __stricmp(const char *, const char *);
49
50 HttpFile::HttpFile(Console *&cons)
51 : File(cons),
52 _req_get("GET "),
53 _req_head("HEAD "),
54 _req_host(" HTTP/1.0\r\nHOST: "),
55 _req_ua("\r\nUser-Agent: HPCBOOT/ZERO(1st impact; Windows CE; "
56 #if defined MIPS
57 "MIPS"
58 #elif defined ARM
59 "ARM"
60 #elif defined SH3
61 "SH3"
62 #elif defined SH4
63 "SH4"
64 #else
65 "Unknown"
66 #endif
67 ")\r\n\r\n")
68 {
69 _server_name[0] = '\0';
70 _debug = TRUE;
71 _memory_cache = TRUE;
72 // _memory_cache = FALSE; // not recomended.
73 _buffer = 0;
74 _reset_state();
75 DPRINTF((TEXT("FileManager: HTTP\n")));
76 }
77
78 HttpFile::~HttpFile(void)
79 {
80 if (_buffer)
81 free(_buffer);
82 WSACleanup();
83 }
84
85 void
86 HttpFile::_reset_state(void)
87 {
88 _ascii_filename[0] = '\0';
89 _cached = FALSE;
90 if (_buffer)
91 free(_buffer);
92 _buffer = 0;
93 _header_size = 0;
94 _cur_pos = 0;
95 }
96
97 BOOL
98 HttpFile::setRoot(TCHAR *server)
99 {
100 SOCKET h;
101 int ret, port;
102
103 // parse server name and its port #
104 TCHAR sep[] = TEXT(":/");
105 TCHAR *token = wcstok(server, sep);
106 for (int i = 0; i < 3 && token; i++, token = wcstok(0, sep)) {
107 switch(i) {
108 case 0:
109 if (wcsicmp(token, TEXT("http"))) {
110 return FALSE;
111 }
112 break;
113 case 1:
114 if (!_to_ascii(_server_name, token, MAX_PATH))
115 return FALSE;
116 port = 80;
117 break;
118 case 2:
119 port = _wtoi(token);
120 break;
121 }
122 }
123
124 ret = WSAStartup(MAKEWORD(1, 1), &_winsock);
125 if (ret != 0) {
126 DPRINTF((TEXT("WinSock initialize failed.\n")));
127 return FALSE;
128 }
129 if (LOBYTE(_winsock.wVersion) != 1 ||
130 HIBYTE(_winsock.wVersion) != 1) {
131 DPRINTF((TEXT("can't use WinSock DLL.\n")));
132 return FALSE;
133 }
134
135 h = socket(AF_INET, SOCK_STREAM, 0);
136 if (h == INVALID_SOCKET) {
137 DPRINTF((TEXT("can't open socket. cause=%d\n"),
138 WSAGetLastError()));
139 return FALSE;
140 }
141
142 memset(&_sockaddr, 0, sizeof(sockaddr_in));
143 _sockaddr.sin_family = AF_INET;
144 _sockaddr.sin_port = htons(port);
145
146 struct hostent *entry = gethostbyname(_server_name);
147 if (entry == 0) {
148 _sockaddr.sin_addr.S_un.S_addr = inet_addr(_server_name);
149 if (_sockaddr.sin_addr.S_un.S_addr == INADDR_NONE) {
150 DPRINTF((TEXT("can't get host by name.\n")));
151 return FALSE;
152 }
153 u_int8_t *b = &_sockaddr.sin_addr.S_un.S_un_b.s_b1;
154 DPRINTF((TEXT("%d.%d.%d.%d "), b[0], b[1], b[2], b[3]));
155 if (connect(h,(const struct sockaddr *)&_sockaddr,
156 sizeof(struct sockaddr_in)) == 0)
157 goto connected;
158 } else {
159 for (u_int8_t **addr_list =(u_int8_t **)entry->h_addr_list;
160 *addr_list; addr_list++) {
161 u_int8_t *b = &_sockaddr.sin_addr.S_un.S_un_b.s_b1;
162 for (int i = 0; i < 4; i++)
163 b[i] = addr_list[0][i];
164
165 DPRINTF((TEXT("%d.%d.%d.%d "), b[0], b[1], b[2],b[3]));
166 if (connect(h,(const struct sockaddr *)&_sockaddr,
167 sizeof(struct sockaddr_in)) == 0)
168 goto connected;
169 }
170 }
171 DPRINTF((TEXT("can't connect server.\n")));
172 return FALSE;
173
174 connected:
175 DPRINTF((TEXT("(%S) connected.\n"), _server_name));
176 closesocket(h);
177
178 return TRUE;
179 }
180
181 BOOL
182 HttpFile::open(const TCHAR *name, u_int32_t flag)
183 {
184
185 _reset_state();
186
187 return _to_ascii(_ascii_filename, name, MAX_PATH);
188 }
189
190 size_t
191 HttpFile::_read_from_cache(void *buf, size_t bytes, off_t ofs)
192 {
193 size_t transfer;
194
195 if (ofs >= _buffer_size)
196 return 0;
197
198 transfer = ofs + bytes > _buffer_size ? _buffer_size - ofs : bytes;
199
200 memcpy(buf, &_buffer[ofs], transfer);
201
202 return transfer;
203 }
204
205 BOOL
206 HttpFile::seek(off_t offset)
207 {
208 _cur_pos = offset;
209
210 return TRUE;
211 }
212
213 size_t
214 HttpFile::read(void *buf, size_t bytes, off_t offset)
215 {
216 char *b;
217 off_t ofs;
218
219 if (offset != -1) {
220 ofs = offset;
221 } else {
222 ofs = _cur_pos;
223 _cur_pos += bytes;
224 }
225
226 if (_memory_cache && _cached)
227 return _read_from_cache(buf, bytes, ofs);
228
229 // HEAD request(get header size).
230 if (_header_size == 0)
231 _buffer_size = _parse_header(_header_size);
232
233 // reconnect
234 Socket sock(_sockaddr);
235 SOCKET h;
236 if ((h = sock) == INVALID_SOCKET)
237 return 0;
238
239 // GET request
240 strcpy(_request, _req_get);
241 _set_request();
242 send(h, _request, strlen(_request), 0);
243
244 // skip header.
245 b = static_cast <char *>(malloc(_header_size));
246 _recv_buffer(h, b, _header_size);
247 free(b);
248
249 // read contents.
250 size_t readed;
251 if (_memory_cache) {
252 _buffer = static_cast <char *>(malloc(_buffer_size));
253 _recv_buffer(h, _buffer, _buffer_size);
254 _cached = TRUE;
255 return _read_from_cache(buf, bytes, ofs);
256 } else {
257 int i, n = ofs / bytes;
258 b = static_cast <char *>(buf);
259
260 for (readed = 0, i = 0; i < n; i++)
261 readed += _recv_buffer(h, b, bytes);
262 if ((n =(ofs % bytes)))
263 readed += _recv_buffer(h, b, n);
264 DPRINTF((TEXT("skip contents %d byte.\n"), readed));
265
266 readed = _recv_buffer(h, b, bytes);
267 }
268 return readed;
269 }
270
271 size_t
272 HttpFile::_parse_header(size_t &header_size)
273 {
274 size_t sz = 0;
275 // reconnect.
276 Socket sock(_sockaddr);
277 SOCKET h;
278 if ((h = sock) == INVALID_SOCKET)
279 return 0;
280
281 // HEAD request
282 strcpy(_request, _req_head);
283 _set_request();
284 send(h, _request, strlen(_request), 0);
285
286 // receive.
287 char __buf[TMP_BUFFER_SIZE];
288 int cnt, ret;
289
290 for (cnt = 0;
291 ret = _recv_buffer(h, __buf, TMP_BUFFER_SIZE); cnt += ret) {
292 char sep[] = " :\r\n";
293 char *token = strtok(__buf, sep);
294 while (token) {
295 if (__stricmp(token, "content-length") == 0) {
296 token = strtok(0, sep);
297 sz = atoi(token);
298 DPRINTFN(1, (TEXT("content-length=%d\n"), sz));
299 } else
300 token = strtok(0, sep);
301 }
302 }
303 header_size = cnt;
304
305 DPRINTF((TEXT
306 ("open file http://%S%S - header %d byte contents %d byte\n"),
307 _server_name, _ascii_filename, header_size, sz));
308
309 return sz;
310 }
311
312 size_t
313 HttpFile::_recv_buffer(SOCKET h, char *buf, size_t size)
314 {
315 size_t cnt, total = 0;
316
317 do {
318 cnt = recv(h, buf + total, size - total, 0);
319 total += cnt;
320 DPRINTFN(2,(TEXT("size %d readed %d byte(+%d)\n"),
321 size, total, cnt));
322 } while (total < size && cnt > 0);
323
324
325 DPRINTFN(1,(TEXT("total read %d byte\n"), total));
326 return total;
327 }
328
329 void
330 HttpFile::_set_request(void)
331 {
332
333 strcat(_request, _ascii_filename);
334 strcat(_request, _req_host);
335 strcat(_request, _server_name);
336 strcat(_request, _req_ua);
337 }
338
339 static int
340 __stricmp(const char *s1, const char *s2)
341 {
342 const unsigned char *us1 =
343 reinterpret_cast <const unsigned char *>(s1);
344 const unsigned char *us2 =
345 reinterpret_cast <const unsigned char *>(s2);
346
347 while (tolower(*us1) == tolower(*us2++))
348 if (*us1++ == '\0')
349 return 0;
350 return tolower(*us1) - tolower(*--us2);
351 }
352
353 Socket::Socket(struct sockaddr_in &sock)
354 : _sockaddr(sock)
355 {
356
357 _socket = socket(AF_INET, SOCK_STREAM, 0);
358 if (_socket != INVALID_SOCKET)
359 connect(_socket,
360 reinterpret_cast <const struct sockaddr *>(&_sockaddr),
361 sizeof(struct sockaddr_in));
362 }
363
364 Socket::~Socket(void)
365 {
366
367 if (_socket != INVALID_SOCKET)
368 closesocket(_socket);
369 }
370