summaryrefslogtreecommitdiff
path: root/src/transports/winhttp.c
diff options
context:
space:
mode:
Diffstat (limited to 'src/transports/winhttp.c')
-rw-r--r--src/transports/winhttp.c1692
1 files changed, 0 insertions, 1692 deletions
diff --git a/src/transports/winhttp.c b/src/transports/winhttp.c
deleted file mode 100644
index f4801a451..000000000
--- a/src/transports/winhttp.c
+++ /dev/null
@@ -1,1692 +0,0 @@
-/*
- * Copyright (C) the libgit2 contributors. All rights reserved.
- *
- * This file is part of libgit2, distributed under the GNU GPL v2 with
- * a Linking Exception. For full terms see the included COPYING file.
- */
-
-#include "common.h"
-
-#ifdef GIT_WINHTTP
-
-#include "git2.h"
-#include "git2/transport.h"
-#include "buffer.h"
-#include "posix.h"
-#include "netops.h"
-#include "smart.h"
-#include "remote.h"
-#include "repository.h"
-#include "http.h"
-#include "git2/sys/credential.h"
-
-#include <wincrypt.h>
-#include <winhttp.h>
-
-/* For IInternetSecurityManager zone check */
-#include <objbase.h>
-#include <urlmon.h>
-
-#define WIDEN2(s) L ## s
-#define WIDEN(s) WIDEN2(s)
-
-#define MAX_CONTENT_TYPE_LEN 100
-#define WINHTTP_OPTION_PEERDIST_EXTENSION_STATE 109
-#define CACHED_POST_BODY_BUF_SIZE 4096
-#define UUID_LENGTH_CCH 32
-#define TIMEOUT_INFINITE -1
-#define DEFAULT_CONNECT_TIMEOUT 60000
-#ifndef WINHTTP_IGNORE_REQUEST_TOTAL_LENGTH
-#define WINHTTP_IGNORE_REQUEST_TOTAL_LENGTH 0
-#endif
-
-#ifndef WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_1
-# define WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_1 0x00000200
-#endif
-
-#ifndef WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_2
-# define WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_2 0x00000800
-#endif
-
-#ifndef WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_3
-# define WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_3 0x00002000
-#endif
-
-#ifndef WINHTTP_NO_CLIENT_CERT_CONTEXT
-# define WINHTTP_NO_CLIENT_CERT_CONTEXT NULL
-#endif
-
-#ifndef HTTP_STATUS_PERMANENT_REDIRECT
-# define HTTP_STATUS_PERMANENT_REDIRECT 308
-#endif
-
-#ifndef DWORD_MAX
-# define DWORD_MAX 0xffffffff
-#endif
-
-bool git_http__expect_continue = false;
-
-static const char *prefix_https = "https://";
-static const char *upload_pack_service = "upload-pack";
-static const char *upload_pack_ls_service_url = "/info/refs?service=git-upload-pack";
-static const char *upload_pack_service_url = "/git-upload-pack";
-static const char *receive_pack_service = "receive-pack";
-static const char *receive_pack_ls_service_url = "/info/refs?service=git-receive-pack";
-static const char *receive_pack_service_url = "/git-receive-pack";
-static const wchar_t *get_verb = L"GET";
-static const wchar_t *post_verb = L"POST";
-static const wchar_t *pragma_nocache = L"Pragma: no-cache";
-static const wchar_t *transfer_encoding = L"Transfer-Encoding: chunked";
-static const int no_check_cert_flags = SECURITY_FLAG_IGNORE_CERT_CN_INVALID |
- SECURITY_FLAG_IGNORE_CERT_DATE_INVALID |
- SECURITY_FLAG_IGNORE_UNKNOWN_CA;
-
-#if defined(__MINGW32__)
-static const CLSID CLSID_InternetSecurityManager_mingw =
- { 0x7B8A2D94, 0x0AC9, 0x11D1,
- { 0x89, 0x6C, 0x00, 0xC0, 0x4F, 0xB6, 0xBF, 0xC4 } };
-static const IID IID_IInternetSecurityManager_mingw =
- { 0x79EAC9EE, 0xBAF9, 0x11CE,
- { 0x8C, 0x82, 0x00, 0xAA, 0x00, 0x4B, 0xA9, 0x0B } };
-
-# define CLSID_InternetSecurityManager CLSID_InternetSecurityManager_mingw
-# define IID_IInternetSecurityManager IID_IInternetSecurityManager_mingw
-#endif
-
-#define OWNING_SUBTRANSPORT(s) ((winhttp_subtransport *)(s)->parent.subtransport)
-
-typedef enum {
- GIT_WINHTTP_AUTH_BASIC = 1,
- GIT_WINHTTP_AUTH_NTLM = 2,
- GIT_WINHTTP_AUTH_NEGOTIATE = 4,
- GIT_WINHTTP_AUTH_DIGEST = 8,
-} winhttp_authmechanism_t;
-
-typedef struct {
- git_smart_subtransport_stream parent;
- const char *service;
- const char *service_url;
- const wchar_t *verb;
- HINTERNET request;
- wchar_t *request_uri;
- char *chunk_buffer;
- unsigned chunk_buffer_len;
- HANDLE post_body;
- DWORD post_body_len;
- unsigned sent_request : 1,
- received_response : 1,
- chunked : 1,
- status_sending_request_reached: 1;
-} winhttp_stream;
-
-typedef struct {
- git_net_url url;
- git_credential *cred;
- int auth_mechanisms;
- bool url_cred_presented;
-} winhttp_server;
-
-typedef struct {
- git_smart_subtransport parent;
- transport_smart *owner;
-
- winhttp_server server;
- winhttp_server proxy;
-
- HINTERNET session;
- HINTERNET connection;
-} winhttp_subtransport;
-
-static int apply_userpass_credentials(HINTERNET request, DWORD target, int mechanisms, git_credential *cred)
-{
- git_credential_userpass_plaintext *c = (git_credential_userpass_plaintext *)cred;
- wchar_t *user = NULL, *pass = NULL;
- int user_len = 0, pass_len = 0, error = 0;
- DWORD native_scheme;
-
- if (mechanisms & GIT_WINHTTP_AUTH_NEGOTIATE) {
- native_scheme = WINHTTP_AUTH_SCHEME_NEGOTIATE;
- } else if (mechanisms & GIT_WINHTTP_AUTH_NTLM) {
- native_scheme = WINHTTP_AUTH_SCHEME_NTLM;
- } else if (mechanisms & GIT_WINHTTP_AUTH_DIGEST) {
- native_scheme = WINHTTP_AUTH_SCHEME_DIGEST;
- } else if (mechanisms & GIT_WINHTTP_AUTH_BASIC) {
- native_scheme = WINHTTP_AUTH_SCHEME_BASIC;
- } else {
- git_error_set(GIT_ERROR_HTTP, "invalid authentication scheme");
- error = GIT_EAUTH;
- goto done;
- }
-
- if ((error = user_len = git__utf8_to_16_alloc(&user, c->username)) < 0)
- goto done;
-
- if ((error = pass_len = git__utf8_to_16_alloc(&pass, c->password)) < 0)
- goto done;
-
- if (!WinHttpSetCredentials(request, target, native_scheme, user, pass, NULL)) {
- git_error_set(GIT_ERROR_OS, "failed to set credentials");
- error = -1;
- }
-
-done:
- if (user_len > 0)
- git__memzero(user, user_len * sizeof(wchar_t));
-
- if (pass_len > 0)
- git__memzero(pass, pass_len * sizeof(wchar_t));
-
- git__free(user);
- git__free(pass);
-
- return error;
-}
-
-static int apply_default_credentials(HINTERNET request, DWORD target, int mechanisms)
-{
- DWORD autologon_level = WINHTTP_AUTOLOGON_SECURITY_LEVEL_LOW;
- DWORD native_scheme = 0;
-
- if ((mechanisms & GIT_WINHTTP_AUTH_NEGOTIATE) != 0) {
- native_scheme = WINHTTP_AUTH_SCHEME_NEGOTIATE;
- } else if ((mechanisms & GIT_WINHTTP_AUTH_NTLM) != 0) {
- native_scheme = WINHTTP_AUTH_SCHEME_NTLM;
- } else {
- git_error_set(GIT_ERROR_HTTP, "invalid authentication scheme");
- return GIT_EAUTH;
- }
-
- /*
- * Autologon policy must be "low" to use default creds.
- * This is safe as the user has explicitly requested it.
- */
- if (!WinHttpSetOption(request, WINHTTP_OPTION_AUTOLOGON_POLICY, &autologon_level, sizeof(DWORD))) {
- git_error_set(GIT_ERROR_OS, "could not configure logon policy");
- return -1;
- }
-
- if (!WinHttpSetCredentials(request, target, native_scheme, NULL, NULL, NULL)) {
- git_error_set(GIT_ERROR_OS, "could not configure credentials");
- return -1;
- }
-
- return 0;
-}
-
-static int acquire_url_cred(
- git_credential **cred,
- unsigned int allowed_types,
- const char *username,
- const char *password)
-{
- if (allowed_types & GIT_CREDENTIAL_USERPASS_PLAINTEXT)
- return git_credential_userpass_plaintext_new(cred, username, password);
-
- if ((allowed_types & GIT_CREDENTIAL_DEFAULT) && *username == '\0' && *password == '\0')
- return git_credential_default_new(cred);
-
- return 1;
-}
-
-static int acquire_fallback_cred(
- git_credential **cred,
- const char *url,
- unsigned int allowed_types)
-{
- int error = 1;
-
- /* If the target URI supports integrated Windows authentication
- * as an authentication mechanism */
- if (GIT_CREDENTIAL_DEFAULT & allowed_types) {
- wchar_t *wide_url;
- HRESULT hCoInitResult;
-
- /* Convert URL to wide characters */
- if (git__utf8_to_16_alloc(&wide_url, url) < 0) {
- git_error_set(GIT_ERROR_OS, "failed to convert string to wide form");
- return -1;
- }
-
- hCoInitResult = CoInitializeEx(NULL, COINIT_MULTITHREADED);
-
- if (SUCCEEDED(hCoInitResult) || hCoInitResult == RPC_E_CHANGED_MODE) {
- IInternetSecurityManager *pISM;
-
- /* And if the target URI is in the My Computer, Intranet, or Trusted zones */
- if (SUCCEEDED(CoCreateInstance(&CLSID_InternetSecurityManager, NULL,
- CLSCTX_ALL, &IID_IInternetSecurityManager, (void **)&pISM))) {
- DWORD dwZone;
-
- if (SUCCEEDED(pISM->lpVtbl->MapUrlToZone(pISM, wide_url, &dwZone, 0)) &&
- (URLZONE_LOCAL_MACHINE == dwZone ||
- URLZONE_INTRANET == dwZone ||
- URLZONE_TRUSTED == dwZone)) {
- git_credential *existing = *cred;
-
- if (existing)
- existing->free(existing);
-
- /* Then use default Windows credentials to authenticate this request */
- error = git_credential_default_new(cred);
- }
-
- pISM->lpVtbl->Release(pISM);
- }
-
- /* Only uninitialize if the call to CoInitializeEx was successful. */
- if (SUCCEEDED(hCoInitResult))
- CoUninitialize();
- }
-
- git__free(wide_url);
- }
-
- return error;
-}
-
-static int certificate_check(winhttp_stream *s, int valid)
-{
- int error;
- winhttp_subtransport *t = OWNING_SUBTRANSPORT(s);
- PCERT_CONTEXT cert_ctx;
- DWORD cert_ctx_size = sizeof(cert_ctx);
- git_cert_x509 cert;
-
- /* If there is no override, we should fail if WinHTTP doesn't think it's fine */
- if (t->owner->certificate_check_cb == NULL && !valid) {
- if (!git_error_last())
- git_error_set(GIT_ERROR_HTTP, "unknown certificate check failure");
-
- return GIT_ECERTIFICATE;
- }
-
- if (t->owner->certificate_check_cb == NULL || git__strcmp(t->server.url.scheme, "https") != 0)
- return 0;
-
- if (!WinHttpQueryOption(s->request, WINHTTP_OPTION_SERVER_CERT_CONTEXT, &cert_ctx, &cert_ctx_size)) {
- git_error_set(GIT_ERROR_OS, "failed to get server certificate");
- return -1;
- }
-
- git_error_clear();
- cert.parent.cert_type = GIT_CERT_X509;
- cert.data = cert_ctx->pbCertEncoded;
- cert.len = cert_ctx->cbCertEncoded;
- error = t->owner->certificate_check_cb((git_cert *) &cert, valid, t->server.url.host, t->owner->message_cb_payload);
- CertFreeCertificateContext(cert_ctx);
-
- if (error == GIT_PASSTHROUGH)
- error = valid ? 0 : GIT_ECERTIFICATE;
-
- if (error < 0 && !git_error_last())
- git_error_set(GIT_ERROR_HTTP, "user cancelled certificate check");
-
- return error;
-}
-
-static void winhttp_stream_close(winhttp_stream *s)
-{
- if (s->chunk_buffer) {
- git__free(s->chunk_buffer);
- s->chunk_buffer = NULL;
- }
-
- if (s->post_body) {
- CloseHandle(s->post_body);
- s->post_body = NULL;
- }
-
- if (s->request_uri) {
- git__free(s->request_uri);
- s->request_uri = NULL;
- }
-
- if (s->request) {
- WinHttpCloseHandle(s->request);
- s->request = NULL;
- }
-
- s->sent_request = 0;
-}
-
-static int apply_credentials(
- HINTERNET request,
- git_net_url *url,
- int target,
- git_credential *creds,
- int mechanisms)
-{
- int error = 0;
-
- GIT_UNUSED(url);
-
- /* If we have creds, just apply them */
- if (creds && creds->credtype == GIT_CREDENTIAL_USERPASS_PLAINTEXT)
- error = apply_userpass_credentials(request, target, mechanisms, creds);
- else if (creds && creds->credtype == GIT_CREDENTIAL_DEFAULT)
- error = apply_default_credentials(request, target, mechanisms);
-
- return error;
-}
-
-static int winhttp_stream_connect(winhttp_stream *s)
-{
- winhttp_subtransport *t = OWNING_SUBTRANSPORT(s);
- git_buf buf = GIT_BUF_INIT;
- char *proxy_url = NULL;
- wchar_t ct[MAX_CONTENT_TYPE_LEN];
- LPCWSTR types[] = { L"*/*", NULL };
- BOOL peerdist = FALSE;
- int error = -1;
- unsigned long disable_redirects = WINHTTP_DISABLE_REDIRECTS;
- int default_timeout = TIMEOUT_INFINITE;
- int default_connect_timeout = DEFAULT_CONNECT_TIMEOUT;
- DWORD autologon_policy = WINHTTP_AUTOLOGON_SECURITY_LEVEL_HIGH;
-
- const char *service_url = s->service_url;
- size_t i;
- const git_proxy_options *proxy_opts;
-
- /* If path already ends in /, remove the leading slash from service_url */
- if ((git__suffixcmp(t->server.url.path, "/") == 0) && (git__prefixcmp(service_url, "/") == 0))
- service_url++;
- /* Prepare URL */
- git_buf_printf(&buf, "%s%s", t->server.url.path, service_url);
-
- if (git_buf_oom(&buf))
- return -1;
-
- /* Convert URL to wide characters */
- if (git__utf8_to_16_alloc(&s->request_uri, git_buf_cstr(&buf)) < 0) {
- git_error_set(GIT_ERROR_OS, "failed to convert string to wide form");
- goto on_error;
- }
-
- /* Establish request */
- s->request = WinHttpOpenRequest(
- t->connection,
- s->verb,
- s->request_uri,
- NULL,
- WINHTTP_NO_REFERER,
- types,
- git__strcmp(t->server.url.scheme, "https") == 0 ? WINHTTP_FLAG_SECURE : 0);
-
- if (!s->request) {
- git_error_set(GIT_ERROR_OS, "failed to open request");
- goto on_error;
- }
-
- /* Never attempt default credentials; we'll provide them explicitly. */
- if (!WinHttpSetOption(s->request, WINHTTP_OPTION_AUTOLOGON_POLICY, &autologon_policy, sizeof(DWORD)))
- return -1;
-
- if (!WinHttpSetTimeouts(s->request, default_timeout, default_connect_timeout, default_timeout, default_timeout)) {
- git_error_set(GIT_ERROR_OS, "failed to set timeouts for WinHTTP");
- goto on_error;
- }
-
- proxy_opts = &t->owner->proxy;
- if (proxy_opts->type == GIT_PROXY_AUTO) {
- /* Set proxy if necessary */
- if (git_remote__http_proxy(&proxy_url, t->owner->owner, &t->server.url) < 0)
- goto on_error;
- }
- else if (proxy_opts->type == GIT_PROXY_SPECIFIED) {
- proxy_url = git__strdup(proxy_opts->url);
- GIT_ERROR_CHECK_ALLOC(proxy_url);
- }
-
- if (proxy_url) {
- git_buf processed_url = GIT_BUF_INIT;
- WINHTTP_PROXY_INFO proxy_info;
- wchar_t *proxy_wide;
-
- git_net_url_dispose(&t->proxy.url);
-
- if ((error = git_net_url_parse(&t->proxy.url, proxy_url)) < 0)
- goto on_error;
-
- if (strcmp(t->proxy.url.scheme, "http") != 0 && strcmp(t->proxy.url.scheme, "https") != 0) {
- git_error_set(GIT_ERROR_HTTP, "invalid URL: '%s'", proxy_url);
- error = -1;
- goto on_error;
- }
-
- git_buf_puts(&processed_url, t->proxy.url.scheme);
- git_buf_PUTS(&processed_url, "://");
-
- if (git_net_url_is_ipv6(&t->proxy.url))
- git_buf_putc(&processed_url, '[');
-
- git_buf_puts(&processed_url, t->proxy.url.host);
-
- if (git_net_url_is_ipv6(&t->proxy.url))
- git_buf_putc(&processed_url, ']');
-
- if (!git_net_url_is_default_port(&t->proxy.url))
- git_buf_printf(&processed_url, ":%s", t->proxy.url.port);
-
- if (git_buf_oom(&processed_url)) {
- error = -1;
- goto on_error;
- }
-
- /* Convert URL to wide characters */
- error = git__utf8_to_16_alloc(&proxy_wide, processed_url.ptr);
- git_buf_dispose(&processed_url);
- if (error < 0)
- goto on_error;
-
- proxy_info.dwAccessType = WINHTTP_ACCESS_TYPE_NAMED_PROXY;
- proxy_info.lpszProxy = proxy_wide;
- proxy_info.lpszProxyBypass = NULL;
-
- if (!WinHttpSetOption(s->request,
- WINHTTP_OPTION_PROXY,
- &proxy_info,
- sizeof(WINHTTP_PROXY_INFO))) {
- git_error_set(GIT_ERROR_OS, "failed to set proxy");
- git__free(proxy_wide);
- goto on_error;
- }
-
- git__free(proxy_wide);
-
- if ((error = apply_credentials(s->request, &t->proxy.url, WINHTTP_AUTH_TARGET_PROXY, t->proxy.cred, t->proxy.auth_mechanisms)) < 0)
- goto on_error;
- }
-
- /* Disable WinHTTP redirects so we can handle them manually. Why, you ask?
- * http://social.msdn.microsoft.com/Forums/windowsdesktop/en-US/b2ff8879-ab9f-4218-8f09-16d25dff87ae
- */
- if (!WinHttpSetOption(s->request,
- WINHTTP_OPTION_DISABLE_FEATURE,
- &disable_redirects,
- sizeof(disable_redirects))) {
- git_error_set(GIT_ERROR_OS, "failed to disable redirects");
- error = -1;
- goto on_error;
- }
-
- /* Strip unwanted headers (X-P2P-PeerDist, X-P2P-PeerDistEx) that WinHTTP
- * adds itself. This option may not be supported by the underlying
- * platform, so we do not error-check it */
- WinHttpSetOption(s->request,
- WINHTTP_OPTION_PEERDIST_EXTENSION_STATE,
- &peerdist,
- sizeof(peerdist));
-
- /* Send Pragma: no-cache header */
- if (!WinHttpAddRequestHeaders(s->request, pragma_nocache, (ULONG) -1L, WINHTTP_ADDREQ_FLAG_ADD)) {
- git_error_set(GIT_ERROR_OS, "failed to add a header to the request");
- goto on_error;
- }
-
- if (post_verb == s->verb) {
- /* Send Content-Type and Accept headers -- only necessary on a POST */
- git_buf_clear(&buf);
- if (git_buf_printf(&buf,
- "Content-Type: application/x-git-%s-request",
- s->service) < 0)
- goto on_error;
-
- if (git__utf8_to_16(ct, MAX_CONTENT_TYPE_LEN, git_buf_cstr(&buf)) < 0) {
- git_error_set(GIT_ERROR_OS, "failed to convert content-type to wide characters");
- goto on_error;
- }
-
- if (!WinHttpAddRequestHeaders(s->request, ct, (ULONG)-1L,
- WINHTTP_ADDREQ_FLAG_ADD | WINHTTP_ADDREQ_FLAG_REPLACE)) {
- git_error_set(GIT_ERROR_OS, "failed to add a header to the request");
- goto on_error;
- }
-
- git_buf_clear(&buf);
- if (git_buf_printf(&buf,
- "Accept: application/x-git-%s-result",
- s->service) < 0)
- goto on_error;
-
- if (git__utf8_to_16(ct, MAX_CONTENT_TYPE_LEN, git_buf_cstr(&buf)) < 0) {
- git_error_set(GIT_ERROR_OS, "failed to convert accept header to wide characters");
- goto on_error;
- }
-
- if (!WinHttpAddRequestHeaders(s->request, ct, (ULONG)-1L,
- WINHTTP_ADDREQ_FLAG_ADD | WINHTTP_ADDREQ_FLAG_REPLACE)) {
- git_error_set(GIT_ERROR_OS, "failed to add a header to the request");
- goto on_error;
- }
- }
-
- for (i = 0; i < t->owner->custom_headers.count; i++) {
- if (t->owner->custom_headers.strings[i]) {
- git_buf_clear(&buf);
- git_buf_puts(&buf, t->owner->custom_headers.strings[i]);
- if (git__utf8_to_16(ct, MAX_CONTENT_TYPE_LEN, git_buf_cstr(&buf)) < 0) {
- git_error_set(GIT_ERROR_OS, "failed to convert custom header to wide characters");
- goto on_error;
- }
-
- if (!WinHttpAddRequestHeaders(s->request, ct, (ULONG)-1L,
- WINHTTP_ADDREQ_FLAG_ADD | WINHTTP_ADDREQ_FLAG_REPLACE)) {
- git_error_set(GIT_ERROR_OS, "failed to add a header to the request");
- goto on_error;
- }
- }
- }
-
- /* If requested, disable certificate validation */
- if (strcmp(t->server.url.scheme, "https") == 0) {
- int flags;
-
- if (t->owner->parent.read_flags(&t->owner->parent, &flags) < 0)
- goto on_error;
- }
-
- if ((error = apply_credentials(s->request, &t->server.url, WINHTTP_AUTH_TARGET_SERVER, t->server.cred, t->server.auth_mechanisms)) < 0)
- goto on_error;
-
- /* We've done everything up to calling WinHttpSendRequest. */
-
- error = 0;
-
-on_error:
- if (error < 0)
- winhttp_stream_close(s);
-
- git__free(proxy_url);
- git_buf_dispose(&buf);
- return error;
-}
-
-static int parse_unauthorized_response(
- int *allowed_types,
- int *allowed_mechanisms,
- HINTERNET request)
-{
- DWORD supported, first, target;
-
- *allowed_types = 0;
- *allowed_mechanisms = 0;
-
- /* WinHttpQueryHeaders() must be called before WinHttpQueryAuthSchemes().
- * We can assume this was already done, since we know we are unauthorized.
- */
- if (!WinHttpQueryAuthSchemes(request, &supported, &first, &target)) {
- git_error_set(GIT_ERROR_OS, "failed to parse supported auth schemes");
- return GIT_EAUTH;
- }
-
- if (WINHTTP_AUTH_SCHEME_NTLM & supported) {
- *allowed_types |= GIT_CREDENTIAL_USERPASS_PLAINTEXT;
- *allowed_types |= GIT_CREDENTIAL_DEFAULT;
- *allowed_mechanisms |= GIT_WINHTTP_AUTH_NTLM;
- }
-
- if (WINHTTP_AUTH_SCHEME_NEGOTIATE & supported) {
- *allowed_types |= GIT_CREDENTIAL_DEFAULT;
- *allowed_mechanisms |= GIT_WINHTTP_AUTH_NEGOTIATE;
- }
-
- if (WINHTTP_AUTH_SCHEME_BASIC & supported) {
- *allowed_types |= GIT_CREDENTIAL_USERPASS_PLAINTEXT;
- *allowed_mechanisms |= GIT_WINHTTP_AUTH_BASIC;
- }
-
- if (WINHTTP_AUTH_SCHEME_DIGEST & supported) {
- *allowed_types |= GIT_CREDENTIAL_USERPASS_PLAINTEXT;
- *allowed_mechanisms |= GIT_WINHTTP_AUTH_DIGEST;
- }
-
- return 0;
-}
-
-static int write_chunk(HINTERNET request, const char *buffer, size_t len)
-{
- DWORD bytes_written;
- git_buf buf = GIT_BUF_INIT;
-
- /* Chunk header */
- git_buf_printf(&buf, "%"PRIXZ"\r\n", len);
-
- if (git_buf_oom(&buf))
- return -1;
-
- if (!WinHttpWriteData(request,
- git_buf_cstr(&buf), (DWORD)git_buf_len(&buf),
- &bytes_written)) {
- git_buf_dispose(&buf);
- git_error_set(GIT_ERROR_OS, "failed to write chunk header");
- return -1;
- }
-
- git_buf_dispose(&buf);
-
- /* Chunk body */
- if (!WinHttpWriteData(request,
- buffer, (DWORD)len,
- &bytes_written)) {
- git_error_set(GIT_ERROR_OS, "failed to write chunk");
- return -1;
- }
-
- /* Chunk footer */
- if (!WinHttpWriteData(request,
- "\r\n", 2,
- &bytes_written)) {
- git_error_set(GIT_ERROR_OS, "failed to write chunk footer");
- return -1;
- }
-
- return 0;
-}
-
-static int winhttp_close_connection(winhttp_subtransport *t)
-{
- int ret = 0;
-
- if (t->connection) {
- if (!WinHttpCloseHandle(t->connection)) {
- git_error_set(GIT_ERROR_OS, "unable to close connection");
- ret = -1;
- }
-
- t->connection = NULL;
- }
-
- if (t->session) {
- if (!WinHttpCloseHandle(t->session)) {
- git_error_set(GIT_ERROR_OS, "unable to close session");
- ret = -1;
- }
-
- t->session = NULL;
- }
-
- return ret;
-}
-
-static void CALLBACK winhttp_status(
- HINTERNET connection,
- DWORD_PTR ctx,
- DWORD code,
- LPVOID info,
- DWORD info_len)
-{
- DWORD status;
-
- GIT_UNUSED(connection);
- GIT_UNUSED(info_len);
-
- switch (code) {
- case WINHTTP_CALLBACK_STATUS_SECURE_FAILURE:
- status = *((DWORD *)info);
-
- if ((status & WINHTTP_CALLBACK_STATUS_FLAG_CERT_CN_INVALID))
- git_error_set(GIT_ERROR_HTTP, "SSL certificate issued for different common name");
- else if ((status & WINHTTP_CALLBACK_STATUS_FLAG_CERT_DATE_INVALID))
- git_error_set(GIT_ERROR_HTTP, "SSL certificate has expired");
- else if ((status & WINHTTP_CALLBACK_STATUS_FLAG_INVALID_CA))
- git_error_set(GIT_ERROR_HTTP, "SSL certificate signed by unknown CA");
- else if ((status & WINHTTP_CALLBACK_STATUS_FLAG_INVALID_CERT))
- git_error_set(GIT_ERROR_HTTP, "SSL certificate is invalid");
- else if ((status & WINHTTP_CALLBACK_STATUS_FLAG_CERT_REV_FAILED))
- git_error_set(GIT_ERROR_HTTP, "certificate revocation check failed");
- else if ((status & WINHTTP_CALLBACK_STATUS_FLAG_CERT_REVOKED))
- git_error_set(GIT_ERROR_HTTP, "SSL certificate was revoked");
- else if ((status & WINHTTP_CALLBACK_STATUS_FLAG_SECURITY_CHANNEL_ERROR))
- git_error_set(GIT_ERROR_HTTP, "security libraries could not be loaded");
- else
- git_error_set(GIT_ERROR_HTTP, "unknown security error %lu", status);
-
- break;
-
- case WINHTTP_CALLBACK_STATUS_SENDING_REQUEST:
- ((winhttp_stream *) ctx)->status_sending_request_reached = 1;
-
- break;
- }
-}
-
-static int winhttp_connect(
- winhttp_subtransport *t)
-{
- wchar_t *wide_host = NULL;
- int32_t port;
- wchar_t *wide_ua = NULL;
- git_buf ipv6 = GIT_BUF_INIT, ua = GIT_BUF_INIT;
- const char *host;
- int error = -1;
- int default_timeout = TIMEOUT_INFINITE;
- int default_connect_timeout = DEFAULT_CONNECT_TIMEOUT;
- DWORD protocols =
- WINHTTP_FLAG_SECURE_PROTOCOL_TLS1 |
- WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_1 |
- WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_2 |
- WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_3;
-
- t->session = NULL;
- t->connection = NULL;
-
- /* Prepare port */
- if (git__strntol32(&port, t->server.url.port,
- strlen(t->server.url.port), NULL, 10) < 0)
- goto on_error;
-
- /* IPv6? Add braces around the host. */
- if (git_net_url_is_ipv6(&t->server.url)) {
- if (git_buf_printf(&ipv6, "[%s]", t->server.url.host) < 0)
- goto on_error;
-
- host = ipv6.ptr;
- } else {
- host = t->server.url.host;
- }
-
- /* Prepare host */
- if (git__utf8_to_16_alloc(&wide_host, host) < 0) {
- git_error_set(GIT_ERROR_OS, "unable to convert host to wide characters");
- goto on_error;
- }
-
-
- if (git_http__user_agent(&ua) < 0)
- goto on_error;
-
- if (git__utf8_to_16_alloc(&wide_ua, git_buf_cstr(&ua)) < 0) {
- git_error_set(GIT_ERROR_OS, "unable to convert host to wide characters");
- goto on_error;
- }
-
- /* Establish session */
- t->session = WinHttpOpen(
- wide_ua,
- WINHTTP_ACCESS_TYPE_DEFAULT_PROXY,
- WINHTTP_NO_PROXY_NAME,
- WINHTTP_NO_PROXY_BYPASS,
- 0);
-
- if (!t->session) {
- git_error_set(GIT_ERROR_OS, "failed to init WinHTTP");
- goto on_error;
- }
-
- /*
- * Do a best-effort attempt to enable TLS 1.3 and 1.2 but allow this to
- * fail; if TLS 1.2 or 1.3 support is not available for some reason,
- * ignore the failure (it will keep the default protocols).
- */
- if (WinHttpSetOption(t->session,
- WINHTTP_OPTION_SECURE_PROTOCOLS,
- &protocols,
- sizeof(protocols)) == FALSE) {
- protocols &= ~WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_3;
- WinHttpSetOption(t->session,
- WINHTTP_OPTION_SECURE_PROTOCOLS,
- &protocols,
- sizeof(protocols));
- }
-
- if (!WinHttpSetTimeouts(t->session, default_timeout, default_connect_timeout, default_timeout, default_timeout)) {
- git_error_set(GIT_ERROR_OS, "failed to set timeouts for WinHTTP");
- goto on_error;
- }
-
-
- /* Establish connection */
- t->connection = WinHttpConnect(
- t->session,
- wide_host,
- (INTERNET_PORT) port,
- 0);
-
- if (!t->connection) {
- git_error_set(GIT_ERROR_OS, "failed to connect to host");
- goto on_error;
- }
-
- if (WinHttpSetStatusCallback(
- t->connection,
- winhttp_status,
- WINHTTP_CALLBACK_FLAG_SECURE_FAILURE | WINHTTP_CALLBACK_FLAG_SEND_REQUEST,
- 0
- ) == WINHTTP_INVALID_STATUS_CALLBACK) {
- git_error_set(GIT_ERROR_OS, "failed to set status callback");
- goto on_error;
- }
-
- error = 0;
-
-on_error:
- if (error < 0)
- winhttp_close_connection(t);
-
- git_buf_dispose(&ua);
- git_buf_dispose(&ipv6);
- git__free(wide_host);
- git__free(wide_ua);
-
- return error;
-}
-
-static int do_send_request(winhttp_stream *s, size_t len, bool chunked)
-{
- int attempts;
- bool success;
-
- if (len > DWORD_MAX) {
- SetLastError(ERROR_NOT_ENOUGH_MEMORY);
- return -1;
- }
-
- for (attempts = 0; attempts < 5; attempts++) {
- if (chunked) {
- success = WinHttpSendRequest(s->request,
- WINHTTP_NO_ADDITIONAL_HEADERS, 0,
- WINHTTP_NO_REQUEST_DATA, 0,
- WINHTTP_IGNORE_REQUEST_TOTAL_LENGTH, (DWORD_PTR)s);
- } else {
- success = WinHttpSendRequest(s->request,
- WINHTTP_NO_ADDITIONAL_HEADERS, 0,
- WINHTTP_NO_REQUEST_DATA, 0,
- (DWORD)len, (DWORD_PTR)s);
- }
-
- if (success || GetLastError() != (DWORD)SEC_E_BUFFER_TOO_SMALL)
- break;
- }
-
- return success ? 0 : -1;
-}
-
-static int send_request(winhttp_stream *s, size_t len, bool chunked)
-{
- int request_failed = 1, error, attempts = 0;
- DWORD ignore_flags, send_request_error;
-
- git_error_clear();
-
- while (request_failed && attempts++ < 3) {
- int cert_valid = 1;
- int client_cert_requested = 0;
- request_failed = 0;
- if ((error = do_send_request(s, len, chunked)) < 0) {
- send_request_error = GetLastError();
- request_failed = 1;
- switch (send_request_error) {
- case ERROR_WINHTTP_SECURE_FAILURE:
- cert_valid = 0;
- break;
- case ERROR_WINHTTP_CLIENT_AUTH_CERT_NEEDED:
- client_cert_requested = 1;
- break;
- default:
- git_error_set(GIT_ERROR_OS, "failed to send request");
- return -1;
- }
- }
-
- /*
- * Only check the certificate if we were able to reach the sending request phase, or
- * received a secure failure error. Otherwise, the server certificate won't be available
- * since the request wasn't able to complete (e.g. proxy auth required)
- */
- if (!cert_valid ||
- (!request_failed && s->status_sending_request_reached)) {
- git_error_clear();
- if ((error = certificate_check(s, cert_valid)) < 0) {
- if (!git_error_last())
- git_error_set(GIT_ERROR_OS, "user cancelled certificate check");
-
- return error;
- }
- }
-
- /* if neither the request nor the certificate check returned errors, we're done */
- if (!request_failed)
- return 0;
-
- if (!cert_valid) {
- ignore_flags = no_check_cert_flags;
- if (!WinHttpSetOption(s->request, WINHTTP_OPTION_SECURITY_FLAGS, &ignore_flags, sizeof(ignore_flags))) {
- git_error_set(GIT_ERROR_OS, "failed to set security options");
- return -1;
- }
- }
-
- if (client_cert_requested) {
- /*
- * Client certificates are not supported, explicitly tell the server that
- * (it's possible a client certificate was requested but is not required)
- */
- if (!WinHttpSetOption(s->request, WINHTTP_OPTION_CLIENT_CERT_CONTEXT, WINHTTP_NO_CLIENT_CERT_CONTEXT, 0)) {
- git_error_set(GIT_ERROR_OS, "failed to set client cert context");
- return -1;
- }
- }
- }
-
- return error;
-}
-
-static int acquire_credentials(
- HINTERNET request,
- winhttp_server *server,
- const char *url_str,
- git_credential_acquire_cb cred_cb,
- void *cred_cb_payload)
-{
- int allowed_types;
- int error = 1;
-
- if (parse_unauthorized_response(&allowed_types, &server->auth_mechanisms, request) < 0)
- return -1;
-
- if (allowed_types) {
- git_credential_free(server->cred);
- server->cred = NULL;
-
- /* Start with URL-specified credentials, if there were any. */
- if (!server->url_cred_presented && server->url.username && server->url.password) {
- error = acquire_url_cred(&server->cred, allowed_types, server->url.username, server->url.password);
- server->url_cred_presented = 1;
-
- if (error < 0)
- return error;
- }
-
- /* Next use the user-defined callback, if there is one. */
- if (error > 0 && cred_cb) {
- error = cred_cb(&server->cred, url_str, server->url.username, allowed_types, cred_cb_payload);
-
- /* Treat GIT_PASSTHROUGH as though git_credential_acquire_cb isn't set */
- if (error == GIT_PASSTHROUGH)
- error = 1;
- else if (error < 0)
- return error;
- }
-
- /* Finally, invoke the fallback default credential lookup. */
- if (error > 0) {
- error = acquire_fallback_cred(&server->cred, url_str, allowed_types);
-
- if (error < 0)
- return error;
- }
- }
-
- /*
- * No error occurred but we could not find appropriate credentials.
- * This behaves like a pass-through.
- */
- return error;
-}
-
-static int winhttp_stream_read(
- git_smart_subtransport_stream *stream,
- char *buffer,
- size_t buf_size,
- size_t *bytes_read)
-{
- winhttp_stream *s = (winhttp_stream *)stream;
- winhttp_subtransport *t = OWNING_SUBTRANSPORT(s);
- DWORD dw_bytes_read;
- char replay_count = 0;
- int error;
-
-replay:
- /* Enforce a reasonable cap on the number of replays */
- if (replay_count++ >= GIT_HTTP_REPLAY_MAX) {
- git_error_set(GIT_ERROR_HTTP, "too many redirects or authentication replays");
- return GIT_ERROR; /* not GIT_EAUTH because the exact cause is not clear */
- }
-
- /* Connect if necessary */
- if (!s->request && winhttp_stream_connect(s) < 0)
- return -1;
-
- if (!s->received_response) {
- DWORD status_code, status_code_length, content_type_length, bytes_written;
- char expected_content_type_8[MAX_CONTENT_TYPE_LEN];
- wchar_t expected_content_type[MAX_CONTENT_TYPE_LEN], content_type[MAX_CONTENT_TYPE_LEN];
-
- if (!s->sent_request) {
-
- if ((error = send_request(s, s->post_body_len, false)) < 0)
- return error;
-
- s->sent_request = 1;
- }
-
- if (s->chunked) {
- GIT_ASSERT(s->verb == post_verb);
-
- /* Flush, if necessary */
- if (s->chunk_buffer_len > 0 &&
- write_chunk(s->request, s->chunk_buffer, s->chunk_buffer_len) < 0)
- return -1;
-
- s->chunk_buffer_len = 0;
-
- /* Write the final chunk. */
- if (!WinHttpWriteData(s->request,
- "0\r\n\r\n", 5,
- &bytes_written)) {
- git_error_set(GIT_ERROR_OS, "failed to write final chunk");
- return -1;
- }
- }
- else if (s->post_body) {
- char *buffer;
- DWORD len = s->post_body_len, bytes_read;
-
- if (INVALID_SET_FILE_POINTER == SetFilePointer(s->post_body,
- 0, 0, FILE_BEGIN) &&
- NO_ERROR != GetLastError()) {
- git_error_set(GIT_ERROR_OS, "failed to reset file pointer");
- return -1;
- }
-
- buffer = git__malloc(CACHED_POST_BODY_BUF_SIZE);
- GIT_ERROR_CHECK_ALLOC(buffer);
-
- while (len > 0) {
- DWORD bytes_written;
-
- if (!ReadFile(s->post_body, buffer,
- min(CACHED_POST_BODY_BUF_SIZE, len),
- &bytes_read, NULL) ||
- !bytes_read) {
- git__free(buffer);
- git_error_set(GIT_ERROR_OS, "failed to read from temp file");
- return -1;
- }
-
- if (!WinHttpWriteData(s->request, buffer,
- bytes_read, &bytes_written)) {
- git__free(buffer);
- git_error_set(GIT_ERROR_OS, "failed to write data");
- return -1;
- }
-
- len -= bytes_read;
- GIT_ASSERT(bytes_read == bytes_written);
- }
-
- git__free(buffer);
-
- /* Eagerly close the temp file */
- CloseHandle(s->post_body);
- s->post_body = NULL;
- }
-
- if (!WinHttpReceiveResponse(s->request, 0)) {
- git_error_set(GIT_ERROR_OS, "failed to receive response");
- return -1;
- }
-
- /* Verify that we got a 200 back */
- status_code_length = sizeof(status_code);
-
- if (!WinHttpQueryHeaders(s->request,
- WINHTTP_QUERY_STATUS_CODE | WINHTTP_QUERY_FLAG_NUMBER,
- WINHTTP_HEADER_NAME_BY_INDEX,
- &status_code, &status_code_length,
- WINHTTP_NO_HEADER_INDEX)) {
- git_error_set(GIT_ERROR_OS, "failed to retrieve status code");
- return -1;
- }
-
- /* The implementation of WinHTTP prior to Windows 7 will not
- * redirect to an identical URI. Some Git hosters use self-redirects
- * as part of their DoS mitigation strategy. Check first to see if we
- * have a redirect status code, and that we haven't already streamed
- * a post body. (We can't replay a streamed POST.) */
- if (!s->chunked &&
- (HTTP_STATUS_MOVED == status_code ||
- HTTP_STATUS_REDIRECT == status_code ||
- (HTTP_STATUS_REDIRECT_METHOD == status_code &&
- get_verb == s->verb) ||
- HTTP_STATUS_REDIRECT_KEEP_VERB == status_code ||
- HTTP_STATUS_PERMANENT_REDIRECT == status_code)) {
-
- /* Check for Windows 7. This workaround is only necessary on
- * Windows Vista and earlier. Windows 7 is version 6.1. */
- wchar_t *location;
- DWORD location_length;
- char *location8;
-
- /* OK, fetch the Location header from the redirect. */
- if (WinHttpQueryHeaders(s->request,
- WINHTTP_QUERY_LOCATION,
- WINHTTP_HEADER_NAME_BY_INDEX,
- WINHTTP_NO_OUTPUT_BUFFER,
- &location_length,
- WINHTTP_NO_HEADER_INDEX) ||
- GetLastError() != ERROR_INSUFFICIENT_BUFFER) {
- git_error_set(GIT_ERROR_OS, "failed to read Location header");
- return -1;
- }
-
- location = git__malloc(location_length);
- GIT_ERROR_CHECK_ALLOC(location);
-
- if (!WinHttpQueryHeaders(s->request,
- WINHTTP_QUERY_LOCATION,
- WINHTTP_HEADER_NAME_BY_INDEX,
- location,
- &location_length,
- WINHTTP_NO_HEADER_INDEX)) {
- git_error_set(GIT_ERROR_OS, "failed to read Location header");
- git__free(location);
- return -1;
- }
-
- /* Convert the Location header to UTF-8 */
- if (git__utf16_to_8_alloc(&location8, location) < 0) {
- git_error_set(GIT_ERROR_OS, "failed to convert Location header to UTF-8");
- git__free(location);
- return -1;
- }
-
- git__free(location);
-
- /* Replay the request */
- winhttp_stream_close(s);
-
- if (!git__prefixcmp_icase(location8, prefix_https)) {
- /* Upgrade to secure connection; disconnect and start over */
- if (git_net_url_apply_redirect(&t->server.url, location8, s->service_url) < 0) {
- git__free(location8);
- return -1;
- }
-
- winhttp_close_connection(t);
-
- if (winhttp_connect(t) < 0)
- return -1;
- }
-
- git__free(location8);
- goto replay;
- }
-
- /* Handle authentication failures */
- if (status_code == HTTP_STATUS_DENIED) {
- int error = acquire_credentials(s->request,
- &t->server,
- t->owner->url,
- t->owner->cred_acquire_cb,
- t->owner->cred_acquire_payload);
-
- if (error < 0) {
- return error;
- } else if (!error) {
- GIT_ASSERT(t->server.cred);
- winhttp_stream_close(s);
- goto replay;
- }
- } else if (status_code == HTTP_STATUS_PROXY_AUTH_REQ) {
- int error = acquire_credentials(s->request,
- &t->proxy,
- t->owner->proxy.url,
- t->owner->proxy.credentials,
- t->owner->proxy.payload);
-
- if (error < 0) {
- return error;
- } else if (!error) {
- GIT_ASSERT(t->proxy.cred);
- winhttp_stream_close(s);
- goto replay;
- }
- }
-
- if (HTTP_STATUS_OK != status_code) {
- git_error_set(GIT_ERROR_HTTP, "request failed with status code: %lu", status_code);
- return -1;
- }
-
- /* Verify that we got the correct content-type back */
- if (post_verb == s->verb)
- p_snprintf(expected_content_type_8, MAX_CONTENT_TYPE_LEN, "application/x-git-%s-result", s->service);
- else
- p_snprintf(expected_content_type_8, MAX_CONTENT_TYPE_LEN, "application/x-git-%s-advertisement", s->service);
-
- if (git__utf8_to_16(expected_content_type, MAX_CONTENT_TYPE_LEN, expected_content_type_8) < 0) {
- git_error_set(GIT_ERROR_OS, "failed to convert expected content-type to wide characters");
- return -1;
- }
-
- content_type_length = sizeof(content_type);
-
- if (!WinHttpQueryHeaders(s->request,
- WINHTTP_QUERY_CONTENT_TYPE,
- WINHTTP_HEADER_NAME_BY_INDEX,
- &content_type, &content_type_length,
- WINHTTP_NO_HEADER_INDEX)) {
- git_error_set(GIT_ERROR_OS, "failed to retrieve response content-type");
- return -1;
- }
-
- if (wcscmp(expected_content_type, content_type)) {
- git_error_set(GIT_ERROR_HTTP, "received unexpected content-type");
- return -1;
- }
-
- s->received_response = 1;
- }
-
- if (!WinHttpReadData(s->request,
- (LPVOID)buffer,
- (DWORD)buf_size,
- &dw_bytes_read))
- {
- git_error_set(GIT_ERROR_OS, "failed to read data");
- return -1;
- }
-
- *bytes_read = dw_bytes_read;
-
- return 0;
-}
-
-static int winhttp_stream_write_single(
- git_smart_subtransport_stream *stream,
- const char *buffer,
- size_t len)
-{
- winhttp_stream *s = (winhttp_stream *)stream;
- DWORD bytes_written;
- int error;
-
- if (!s->request && winhttp_stream_connect(s) < 0)
- return -1;
-
- /* This implementation of write permits only a single call. */
- if (s->sent_request) {
- git_error_set(GIT_ERROR_HTTP, "subtransport configured for only one write");
- return -1;
- }
-
- if ((error = send_request(s, len, false)) < 0)
- return error;
-
- s->sent_request = 1;
-
- if (!WinHttpWriteData(s->request,
- (LPCVOID)buffer,
- (DWORD)len,
- &bytes_written)) {
- git_error_set(GIT_ERROR_OS, "failed to write data");
- return -1;
- }
-
- GIT_ASSERT((DWORD)len == bytes_written);
-
- return 0;
-}
-
-static int put_uuid_string(LPWSTR buffer, size_t buffer_len_cch)
-{
- UUID uuid;
- RPC_STATUS status = UuidCreate(&uuid);
- int result;
-
- if (RPC_S_OK != status &&
- RPC_S_UUID_LOCAL_ONLY != status &&
- RPC_S_UUID_NO_ADDRESS != status) {
- git_error_set(GIT_ERROR_HTTP, "unable to generate name for temp file");
- return -1;
- }
-
- if (buffer_len_cch < UUID_LENGTH_CCH + 1) {
- git_error_set(GIT_ERROR_HTTP, "buffer too small for name of temp file");
- return -1;
- }
-
-#if !defined(__MINGW32__) || defined(MINGW_HAS_SECURE_API)
- result = swprintf_s(buffer, buffer_len_cch,
-#else
- result = wsprintfW(buffer,
-#endif
- L"%08x%04x%04x%02x%02x%02x%02x%02x%02x%02x%02x",
- uuid.Data1, uuid.Data2, uuid.Data3,
- uuid.Data4[0], uuid.Data4[1], uuid.Data4[2], uuid.Data4[3],
- uuid.Data4[4], uuid.Data4[5], uuid.Data4[6], uuid.Data4[7]);
-
- if (result < UUID_LENGTH_CCH) {
- git_error_set(GIT_ERROR_OS, "unable to generate name for temp file");
- return -1;
- }
-
- return 0;
-}
-
-static int get_temp_file(LPWSTR buffer, DWORD buffer_len_cch)
-{
- size_t len;
-
- if (!GetTempPathW(buffer_len_cch, buffer)) {
- git_error_set(GIT_ERROR_OS, "failed to get temp path");
- return -1;
- }
-
- len = wcslen(buffer);
-
- if (buffer[len - 1] != '\\' && len < buffer_len_cch)
- buffer[len++] = '\\';
-
- if (put_uuid_string(&buffer[len], (size_t)buffer_len_cch - len) < 0)
- return -1;
-
- return 0;
-}
-
-static int winhttp_stream_write_buffered(
- git_smart_subtransport_stream *stream,
- const char *buffer,
- size_t len)
-{
- winhttp_stream *s = (winhttp_stream *)stream;
- DWORD bytes_written;
-
- if (!s->request && winhttp_stream_connect(s) < 0)
- return -1;
-
- /* Buffer the payload, using a temporary file so we delegate
- * memory management of the data to the operating system. */
- if (!s->post_body) {
- wchar_t temp_path[MAX_PATH + 1];
-
- if (get_temp_file(temp_path, MAX_PATH + 1) < 0)
- return -1;
-
- s->post_body = CreateFileW(temp_path,
- GENERIC_READ | GENERIC_WRITE,
- FILE_SHARE_DELETE, NULL,
- CREATE_NEW,
- FILE_ATTRIBUTE_TEMPORARY | FILE_FLAG_DELETE_ON_CLOSE | FILE_FLAG_SEQUENTIAL_SCAN,
- NULL);
-
- if (INVALID_HANDLE_VALUE == s->post_body) {
- s->post_body = NULL;
- git_error_set(GIT_ERROR_OS, "failed to create temporary file");
- return -1;
- }
- }
-
- if (!WriteFile(s->post_body, buffer, (DWORD)len, &bytes_written, NULL)) {
- git_error_set(GIT_ERROR_OS, "failed to write to temporary file");
- return -1;
- }
-
- GIT_ASSERT((DWORD)len == bytes_written);
-
- s->post_body_len += bytes_written;
-
- return 0;
-}
-
-static int winhttp_stream_write_chunked(
- git_smart_subtransport_stream *stream,
- const char *buffer,
- size_t len)
-{
- winhttp_stream *s = (winhttp_stream *)stream;
- int error;
-
- if (!s->request && winhttp_stream_connect(s) < 0)
- return -1;
-
- if (!s->sent_request) {
- /* Send Transfer-Encoding: chunked header */
- if (!WinHttpAddRequestHeaders(s->request,
- transfer_encoding, (ULONG) -1L,
- WINHTTP_ADDREQ_FLAG_ADD)) {
- git_error_set(GIT_ERROR_OS, "failed to add a header to the request");
- return -1;
- }
-
- if ((error = send_request(s, 0, true)) < 0)
- return error;
-
- s->sent_request = 1;
- }
-
- if (len > CACHED_POST_BODY_BUF_SIZE) {
- /* Flush, if necessary */
- if (s->chunk_buffer_len > 0) {
- if (write_chunk(s->request, s->chunk_buffer, s->chunk_buffer_len) < 0)
- return -1;
-
- s->chunk_buffer_len = 0;
- }
-
- /* Write chunk directly */
- if (write_chunk(s->request, buffer, len) < 0)
- return -1;
- }
- else {
- /* Append as much to the buffer as we can */
- int count = (int)min(CACHED_POST_BODY_BUF_SIZE - s->chunk_buffer_len, len);
-
- if (!s->chunk_buffer) {
- s->chunk_buffer = git__malloc(CACHED_POST_BODY_BUF_SIZE);
- GIT_ERROR_CHECK_ALLOC(s->chunk_buffer);
- }
-
- memcpy(s->chunk_buffer + s->chunk_buffer_len, buffer, count);
- s->chunk_buffer_len += count;
- buffer += count;
- len -= count;
-
- /* Is the buffer full? If so, then flush */
- if (CACHED_POST_BODY_BUF_SIZE == s->chunk_buffer_len) {
- if (write_chunk(s->request, s->chunk_buffer, s->chunk_buffer_len) < 0)
- return -1;
-
- s->chunk_buffer_len = 0;
-
- /* Is there any remaining data from the source? */
- if (len > 0) {
- memcpy(s->chunk_buffer, buffer, len);
- s->chunk_buffer_len = (unsigned int)len;
- }
- }
- }
-
- return 0;
-}
-
-static void winhttp_stream_free(git_smart_subtransport_stream *stream)
-{
- winhttp_stream *s = (winhttp_stream *)stream;
-
- winhttp_stream_close(s);
- git__free(s);
-}
-
-static int winhttp_stream_alloc(winhttp_subtransport *t, winhttp_stream **stream)
-{
- winhttp_stream *s;
-
- if (!stream)
- return -1;
-
- s = git__calloc(1, sizeof(winhttp_stream));
- GIT_ERROR_CHECK_ALLOC(s);
-
- s->parent.subtransport = &t->parent;
- s->parent.read = winhttp_stream_read;
- s->parent.write = winhttp_stream_write_single;
- s->parent.free = winhttp_stream_free;
-
- *stream = s;
-
- return 0;
-}
-
-static int winhttp_uploadpack_ls(
- winhttp_subtransport *t,
- winhttp_stream *s)
-{
- GIT_UNUSED(t);
-
- s->service = upload_pack_service;
- s->service_url = upload_pack_ls_service_url;
- s->verb = get_verb;
-
- return 0;
-}
-
-static int winhttp_uploadpack(
- winhttp_subtransport *t,
- winhttp_stream *s)
-{
- GIT_UNUSED(t);
-
- s->service = upload_pack_service;
- s->service_url = upload_pack_service_url;
- s->verb = post_verb;
-
- return 0;
-}
-
-static int winhttp_receivepack_ls(
- winhttp_subtransport *t,
- winhttp_stream *s)
-{
- GIT_UNUSED(t);
-
- s->service = receive_pack_service;
- s->service_url = receive_pack_ls_service_url;
- s->verb = get_verb;
-
- return 0;
-}
-
-static int winhttp_receivepack(
- winhttp_subtransport *t,
- winhttp_stream *s)
-{
- GIT_UNUSED(t);
-
- /* WinHTTP only supports Transfer-Encoding: chunked
- * on Windows Vista (NT 6.0) and higher. */
- s->chunked = git_has_win32_version(6, 0, 0);
-
- if (s->chunked)
- s->parent.write = winhttp_stream_write_chunked;
- else
- s->parent.write = winhttp_stream_write_buffered;
-
- s->service = receive_pack_service;
- s->service_url = receive_pack_service_url;
- s->verb = post_verb;
-
- return 0;
-}
-
-static int winhttp_action(
- git_smart_subtransport_stream **stream,
- git_smart_subtransport *subtransport,
- const char *url,
- git_smart_service_t action)
-{
- winhttp_subtransport *t = (winhttp_subtransport *)subtransport;
- winhttp_stream *s;
- int ret = -1;
-
- if (!t->connection)
- if ((ret = git_net_url_parse(&t->server.url, url)) < 0 ||
- (ret = winhttp_connect(t)) < 0)
- return ret;
-
- if (winhttp_stream_alloc(t, &s) < 0)
- return -1;
-
- if (!stream)
- return -1;
-
- switch (action)
- {
- case GIT_SERVICE_UPLOADPACK_LS:
- ret = winhttp_uploadpack_ls(t, s);
- break;
-
- case GIT_SERVICE_UPLOADPACK:
- ret = winhttp_uploadpack(t, s);
- break;
-
- case GIT_SERVICE_RECEIVEPACK_LS:
- ret = winhttp_receivepack_ls(t, s);
- break;
-
- case GIT_SERVICE_RECEIVEPACK:
- ret = winhttp_receivepack(t, s);
- break;
-
- default:
- GIT_ASSERT(0);
- }
-
- if (!ret)
- *stream = &s->parent;
-
- return ret;
-}
-
-static int winhttp_close(git_smart_subtransport *subtransport)
-{
- winhttp_subtransport *t = (winhttp_subtransport *)subtransport;
-
- git_net_url_dispose(&t->server.url);
- git_net_url_dispose(&t->proxy.url);
-
- if (t->server.cred) {
- t->server.cred->free(t->server.cred);
- t->server.cred = NULL;
- }
-
- if (t->proxy.cred) {
- t->proxy.cred->free(t->proxy.cred);
- t->proxy.cred = NULL;
- }
-
- return winhttp_close_connection(t);
-}
-
-static void winhttp_free(git_smart_subtransport *subtransport)
-{
- winhttp_subtransport *t = (winhttp_subtransport *)subtransport;
-
- winhttp_close(subtransport);
-
- git__free(t);
-}
-
-int git_smart_subtransport_http(git_smart_subtransport **out, git_transport *owner, void *param)
-{
- winhttp_subtransport *t;
-
- GIT_UNUSED(param);
-
- if (!out)
- return -1;
-
- t = git__calloc(1, sizeof(winhttp_subtransport));
- GIT_ERROR_CHECK_ALLOC(t);
-
- t->owner = (transport_smart *)owner;
- t->parent.action = winhttp_action;
- t->parent.close = winhttp_close;
- t->parent.free = winhttp_free;
-
- *out = (git_smart_subtransport *) t;
- return 0;
-}
-
-#endif /* GIT_WINHTTP */