Blame src/transports/winhttp.c

Packit ae9e2a
/*
Packit ae9e2a
 * Copyright (C) the libgit2 contributors. All rights reserved.
Packit ae9e2a
 *
Packit ae9e2a
 * This file is part of libgit2, distributed under the GNU GPL v2 with
Packit ae9e2a
 * a Linking Exception. For full terms see the included COPYING file.
Packit ae9e2a
 */
Packit ae9e2a
Packit ae9e2a
#ifdef GIT_WINHTTP
Packit ae9e2a
Packit ae9e2a
#include "git2.h"
Packit ae9e2a
#include "git2/transport.h"
Packit ae9e2a
#include "buffer.h"
Packit ae9e2a
#include "posix.h"
Packit ae9e2a
#include "netops.h"
Packit ae9e2a
#include "smart.h"
Packit ae9e2a
#include "remote.h"
Packit ae9e2a
#include "repository.h"
Packit ae9e2a
#include "global.h"
Packit ae9e2a
Packit ae9e2a
#include <wincrypt.h>
Packit ae9e2a
#include <winhttp.h>
Packit ae9e2a
Packit ae9e2a
/* For IInternetSecurityManager zone check */
Packit ae9e2a
#include <objbase.h>
Packit ae9e2a
#include <urlmon.h>
Packit ae9e2a
Packit ae9e2a
#define WIDEN2(s) L ## s
Packit ae9e2a
#define WIDEN(s) WIDEN2(s)
Packit ae9e2a
Packit ae9e2a
#define MAX_CONTENT_TYPE_LEN	100
Packit ae9e2a
#define WINHTTP_OPTION_PEERDIST_EXTENSION_STATE	109
Packit ae9e2a
#define CACHED_POST_BODY_BUF_SIZE	4096
Packit ae9e2a
#define UUID_LENGTH_CCH	32
Packit ae9e2a
#define TIMEOUT_INFINITE -1
Packit ae9e2a
#define DEFAULT_CONNECT_TIMEOUT 60000
Packit ae9e2a
#ifndef WINHTTP_IGNORE_REQUEST_TOTAL_LENGTH
Packit ae9e2a
#define WINHTTP_IGNORE_REQUEST_TOTAL_LENGTH 0
Packit ae9e2a
#endif
Packit ae9e2a
Packit ae9e2a
#ifndef WINHTTP_FLAG_SECURE_PROTOCOL_TLS_1_1
Packit ae9e2a
# define WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_1 0x00000200
Packit ae9e2a
#endif
Packit ae9e2a
Packit ae9e2a
#ifndef WINHTTP_FLAG_SECURE_PROTOCOL_TLS_1_2
Packit ae9e2a
# define WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_2 0x00000800
Packit ae9e2a
#endif
Packit ae9e2a
Packit ae9e2a
static const char *prefix_https = "https://";
Packit ae9e2a
static const char *upload_pack_service = "upload-pack";
Packit ae9e2a
static const char *upload_pack_ls_service_url = "/info/refs?service=git-upload-pack";
Packit ae9e2a
static const char *upload_pack_service_url = "/git-upload-pack";
Packit ae9e2a
static const char *receive_pack_service = "receive-pack";
Packit ae9e2a
static const char *receive_pack_ls_service_url = "/info/refs?service=git-receive-pack";
Packit ae9e2a
static const char *receive_pack_service_url = "/git-receive-pack";
Packit ae9e2a
static const wchar_t *get_verb = L"GET";
Packit ae9e2a
static const wchar_t *post_verb = L"POST";
Packit ae9e2a
static const wchar_t *pragma_nocache = L"Pragma: no-cache";
Packit ae9e2a
static const wchar_t *transfer_encoding = L"Transfer-Encoding: chunked";
Packit ae9e2a
static const int no_check_cert_flags = SECURITY_FLAG_IGNORE_CERT_CN_INVALID |
Packit ae9e2a
	SECURITY_FLAG_IGNORE_CERT_DATE_INVALID |
Packit ae9e2a
	SECURITY_FLAG_IGNORE_UNKNOWN_CA;
Packit ae9e2a
Packit ae9e2a
#if defined(__MINGW32__)
Packit ae9e2a
static const CLSID CLSID_InternetSecurityManager_mingw =
Packit ae9e2a
	{ 0x7B8A2D94, 0x0AC9, 0x11D1,
Packit ae9e2a
	{ 0x89, 0x6C, 0x00, 0xC0, 0x4F, 0xB6, 0xBF, 0xC4 } };
Packit ae9e2a
static const IID IID_IInternetSecurityManager_mingw =
Packit ae9e2a
	{ 0x79EAC9EE, 0xBAF9, 0x11CE,
Packit ae9e2a
	{ 0x8C, 0x82, 0x00, 0xAA, 0x00, 0x4B, 0xA9, 0x0B } };
Packit ae9e2a
Packit ae9e2a
# define CLSID_InternetSecurityManager CLSID_InternetSecurityManager_mingw
Packit ae9e2a
# define IID_IInternetSecurityManager IID_IInternetSecurityManager_mingw
Packit ae9e2a
#endif
Packit ae9e2a
Packit ae9e2a
#define OWNING_SUBTRANSPORT(s) ((winhttp_subtransport *)(s)->parent.subtransport)
Packit ae9e2a
Packit ae9e2a
typedef enum {
Packit ae9e2a
	GIT_WINHTTP_AUTH_BASIC = 1,
Packit ae9e2a
	GIT_WINHTTP_AUTH_NTLM = 2,
Packit ae9e2a
	GIT_WINHTTP_AUTH_NEGOTIATE = 4,
Packit ae9e2a
	GIT_WINHTTP_AUTH_DIGEST = 8,
Packit ae9e2a
} winhttp_authmechanism_t;
Packit ae9e2a
Packit ae9e2a
typedef struct {
Packit ae9e2a
	git_smart_subtransport_stream parent;
Packit ae9e2a
	const char *service;
Packit ae9e2a
	const char *service_url;
Packit ae9e2a
	const wchar_t *verb;
Packit ae9e2a
	HINTERNET request;
Packit ae9e2a
	wchar_t *request_uri;
Packit ae9e2a
	char *chunk_buffer;
Packit ae9e2a
	unsigned chunk_buffer_len;
Packit ae9e2a
	HANDLE post_body;
Packit ae9e2a
	DWORD post_body_len;
Packit ae9e2a
	unsigned sent_request : 1,
Packit ae9e2a
		received_response : 1,
Packit ae9e2a
		chunked : 1;
Packit ae9e2a
} winhttp_stream;
Packit ae9e2a
Packit ae9e2a
typedef struct {
Packit ae9e2a
	git_smart_subtransport parent;
Packit ae9e2a
	transport_smart *owner;
Packit ae9e2a
	gitno_connection_data connection_data;
Packit ae9e2a
	gitno_connection_data proxy_connection_data;
Packit ae9e2a
	git_cred *cred;
Packit ae9e2a
	git_cred *url_cred;
Packit ae9e2a
	git_cred *proxy_cred;
Packit ae9e2a
	int auth_mechanisms;
Packit ae9e2a
	HINTERNET session;
Packit ae9e2a
	HINTERNET connection;
Packit ae9e2a
} winhttp_subtransport;
Packit ae9e2a
Packit ae9e2a
static int _apply_userpass_credential(HINTERNET request, DWORD target, DWORD scheme, git_cred *cred)
Packit ae9e2a
{
Packit ae9e2a
	git_cred_userpass_plaintext *c = (git_cred_userpass_plaintext *)cred;
Packit ae9e2a
	wchar_t *user, *pass;
Packit ae9e2a
	int user_len = 0, pass_len = 0, error = 0;
Packit ae9e2a
Packit ae9e2a
	if ((error = user_len = git__utf8_to_16_alloc(&user, c->username)) < 0)
Packit ae9e2a
		goto done;
Packit ae9e2a
Packit ae9e2a
	if ((error = pass_len = git__utf8_to_16_alloc(&pass, c->password)) < 0)
Packit ae9e2a
		goto done;
Packit ae9e2a
Packit ae9e2a
	if (!WinHttpSetCredentials(request, target, scheme, user, pass, NULL)) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to set credentials");
Packit ae9e2a
		error = -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
done:
Packit ae9e2a
	if (user_len > 0)
Packit ae9e2a
		git__memzero(user, user_len * sizeof(wchar_t));
Packit ae9e2a
Packit ae9e2a
	if (pass_len > 0)
Packit ae9e2a
		git__memzero(pass, pass_len * sizeof(wchar_t));
Packit ae9e2a
Packit ae9e2a
	git__free(user);
Packit ae9e2a
	git__free(pass);
Packit ae9e2a
Packit ae9e2a
	return error;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int apply_userpass_credential_proxy(HINTERNET request, git_cred *cred, int mechanisms)
Packit ae9e2a
{
Packit ae9e2a
	if (GIT_WINHTTP_AUTH_DIGEST & mechanisms) {
Packit ae9e2a
		return _apply_userpass_credential(request, WINHTTP_AUTH_TARGET_PROXY,
Packit ae9e2a
			WINHTTP_AUTH_SCHEME_DIGEST, cred);
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	return _apply_userpass_credential(request, WINHTTP_AUTH_TARGET_PROXY,
Packit ae9e2a
		WINHTTP_AUTH_SCHEME_BASIC, cred);
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int apply_userpass_credential(HINTERNET request, int mechanisms, git_cred *cred)
Packit ae9e2a
{
Packit ae9e2a
	DWORD native_scheme;
Packit ae9e2a
Packit ae9e2a
	if ((mechanisms & GIT_WINHTTP_AUTH_NTLM) ||
Packit ae9e2a
		(mechanisms & GIT_WINHTTP_AUTH_NEGOTIATE)) {
Packit ae9e2a
		native_scheme = WINHTTP_AUTH_SCHEME_NTLM;
Packit ae9e2a
	} else if (mechanisms & GIT_WINHTTP_AUTH_BASIC) {
Packit ae9e2a
		native_scheme = WINHTTP_AUTH_SCHEME_BASIC;
Packit ae9e2a
	} else {
Packit ae9e2a
		giterr_set(GITERR_NET, "invalid authentication scheme");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	return _apply_userpass_credential(request, WINHTTP_AUTH_TARGET_SERVER,
Packit ae9e2a
		native_scheme, cred);
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int apply_default_credentials(HINTERNET request, int mechanisms)
Packit ae9e2a
{
Packit ae9e2a
	/* Either the caller explicitly requested that default credentials be passed,
Packit ae9e2a
	 * or our fallback credential callback was invoked and checked that the target
Packit ae9e2a
	 * URI was in the appropriate Internet Explorer security zone. By setting this
Packit ae9e2a
	 * flag, we guarantee that the credentials are delivered by WinHTTP. The default
Packit ae9e2a
	 * is "medium" which applies to the intranet and sounds like it would correspond
Packit ae9e2a
	 * to Internet Explorer security zones, but in fact does not. */
Packit ae9e2a
	DWORD data = WINHTTP_AUTOLOGON_SECURITY_LEVEL_LOW;
Packit ae9e2a
Packit ae9e2a
	if ((mechanisms & GIT_WINHTTP_AUTH_NTLM) == 0 &&
Packit ae9e2a
		(mechanisms & GIT_WINHTTP_AUTH_NEGOTIATE) == 0) {
Packit ae9e2a
		giterr_set(GITERR_NET, "invalid authentication scheme");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (!WinHttpSetOption(request, WINHTTP_OPTION_AUTOLOGON_POLICY, &data, sizeof(DWORD)))
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int fallback_cred_acquire_cb(
Packit ae9e2a
	git_cred **cred,
Packit ae9e2a
	const char *url,
Packit ae9e2a
	const char *username_from_url,
Packit ae9e2a
	unsigned int allowed_types,
Packit ae9e2a
	void *payload)
Packit ae9e2a
{
Packit ae9e2a
	int error = 1;
Packit ae9e2a
Packit ae9e2a
	GIT_UNUSED(username_from_url);
Packit ae9e2a
	GIT_UNUSED(payload);
Packit ae9e2a
Packit ae9e2a
	/* If the target URI supports integrated Windows authentication
Packit ae9e2a
	 * as an authentication mechanism */
Packit ae9e2a
	if (GIT_CREDTYPE_DEFAULT & allowed_types) {
Packit ae9e2a
		wchar_t *wide_url;
Packit ae9e2a
Packit ae9e2a
		/* Convert URL to wide characters */
Packit ae9e2a
		if (git__utf8_to_16_alloc(&wide_url, url) < 0) {
Packit ae9e2a
			giterr_set(GITERR_OS, "failed to convert string to wide form");
Packit ae9e2a
			return -1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		if (SUCCEEDED(CoInitializeEx(NULL, COINIT_MULTITHREADED))) {
Packit ae9e2a
			IInternetSecurityManager* pISM;
Packit ae9e2a
Packit ae9e2a
			/* And if the target URI is in the My Computer, Intranet, or Trusted zones */
Packit ae9e2a
			if (SUCCEEDED(CoCreateInstance(&CLSID_InternetSecurityManager, NULL,
Packit ae9e2a
				CLSCTX_ALL, &IID_IInternetSecurityManager, (void **)&pISM))) {
Packit ae9e2a
				DWORD dwZone;
Packit ae9e2a
Packit ae9e2a
				if (SUCCEEDED(pISM->lpVtbl->MapUrlToZone(pISM, wide_url, &dwZone, 0)) &&
Packit ae9e2a
					(URLZONE_LOCAL_MACHINE == dwZone ||
Packit ae9e2a
					URLZONE_INTRANET == dwZone ||
Packit ae9e2a
					URLZONE_TRUSTED == dwZone)) {
Packit ae9e2a
					git_cred *existing = *cred;
Packit ae9e2a
Packit ae9e2a
					if (existing)
Packit ae9e2a
						existing->free(existing);
Packit ae9e2a
Packit ae9e2a
					/* Then use default Windows credentials to authenticate this request */
Packit ae9e2a
					error = git_cred_default_new(cred);
Packit ae9e2a
				}
Packit ae9e2a
Packit ae9e2a
				pISM->lpVtbl->Release(pISM);
Packit ae9e2a
			}
Packit ae9e2a
Packit ae9e2a
			CoUninitialize();
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		git__free(wide_url);
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	return error;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int certificate_check(winhttp_stream *s, int valid)
Packit ae9e2a
{
Packit ae9e2a
	int error;
Packit ae9e2a
	winhttp_subtransport *t = OWNING_SUBTRANSPORT(s);
Packit ae9e2a
	PCERT_CONTEXT cert_ctx;
Packit ae9e2a
	DWORD cert_ctx_size = sizeof(cert_ctx);
Packit ae9e2a
	git_cert_x509 cert;
Packit ae9e2a
Packit ae9e2a
	/* If there is no override, we should fail if WinHTTP doesn't think it's fine */
Packit ae9e2a
	if (t->owner->certificate_check_cb == NULL && !valid) {
Packit ae9e2a
		if (!giterr_last())
Packit ae9e2a
			giterr_set(GITERR_NET, "unknown certificate check failure");
Packit ae9e2a
Packit ae9e2a
		return GIT_ECERTIFICATE;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (t->owner->certificate_check_cb == NULL || !t->connection_data.use_ssl)
Packit ae9e2a
		return 0;
Packit ae9e2a
Packit ae9e2a
	if (!WinHttpQueryOption(s->request, WINHTTP_OPTION_SERVER_CERT_CONTEXT, &cert_ctx, &cert_ctx_size)) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to get server certificate");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	giterr_clear();
Packit ae9e2a
	cert.parent.cert_type = GIT_CERT_X509;
Packit ae9e2a
	cert.data = cert_ctx->pbCertEncoded;
Packit ae9e2a
	cert.len = cert_ctx->cbCertEncoded;
Packit ae9e2a
	error = t->owner->certificate_check_cb((git_cert *) &cert, valid, t->connection_data.host, t->owner->cred_acquire_payload);
Packit ae9e2a
	CertFreeCertificateContext(cert_ctx);
Packit ae9e2a
Packit ae9e2a
	if (error < 0 && !giterr_last())
Packit ae9e2a
		giterr_set(GITERR_NET, "user cancelled certificate check");
Packit ae9e2a
Packit ae9e2a
	return error;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static void winhttp_stream_close(winhttp_stream *s)
Packit ae9e2a
{
Packit ae9e2a
	if (s->chunk_buffer) {
Packit ae9e2a
		git__free(s->chunk_buffer);
Packit ae9e2a
		s->chunk_buffer = NULL;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (s->post_body) {
Packit ae9e2a
		CloseHandle(s->post_body);
Packit ae9e2a
		s->post_body = NULL;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (s->request_uri) {
Packit ae9e2a
		git__free(s->request_uri);
Packit ae9e2a
		s->request_uri = NULL;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (s->request) {
Packit ae9e2a
		WinHttpCloseHandle(s->request);
Packit ae9e2a
		s->request = NULL;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	s->sent_request = 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
/**
Packit ae9e2a
 * Extract the url and password from a URL. The outputs are pointers
Packit ae9e2a
 * into the input.
Packit ae9e2a
 */
Packit ae9e2a
static int userpass_from_url(wchar_t **user, int *user_len,
Packit ae9e2a
			     wchar_t **pass, int *pass_len,
Packit ae9e2a
			     const wchar_t *url, int url_len)
Packit ae9e2a
{
Packit ae9e2a
	URL_COMPONENTS components = { 0 };
Packit ae9e2a
Packit ae9e2a
	components.dwStructSize = sizeof(components);
Packit ae9e2a
	/* These tell WinHttpCrackUrl that we're interested in the fields */
Packit ae9e2a
	components.dwUserNameLength = 1;
Packit ae9e2a
	components.dwPasswordLength = 1;
Packit ae9e2a
Packit ae9e2a
	if (!WinHttpCrackUrl(url, url_len, 0, &components)) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to extract user/pass from url");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	*user     = components.lpszUserName;
Packit ae9e2a
	*user_len = components.dwUserNameLength;
Packit ae9e2a
	*pass     = components.lpszPassword;
Packit ae9e2a
	*pass_len = components.dwPasswordLength;
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
#define SCHEME_HTTP  "http://"
Packit ae9e2a
#define SCHEME_HTTPS "https://"
Packit ae9e2a
Packit ae9e2a
static int winhttp_stream_connect(winhttp_stream *s)
Packit ae9e2a
{
Packit ae9e2a
	winhttp_subtransport *t = OWNING_SUBTRANSPORT(s);
Packit ae9e2a
	git_buf buf = GIT_BUF_INIT;
Packit ae9e2a
	char *proxy_url = NULL;
Packit ae9e2a
	wchar_t ct[MAX_CONTENT_TYPE_LEN];
Packit ae9e2a
	LPCWSTR types[] = { L"*/*", NULL };
Packit ae9e2a
	BOOL peerdist = FALSE;
Packit ae9e2a
	int error = -1;
Packit ae9e2a
	unsigned long disable_redirects = WINHTTP_DISABLE_REDIRECTS;
Packit ae9e2a
	int default_timeout = TIMEOUT_INFINITE;
Packit ae9e2a
	int default_connect_timeout = DEFAULT_CONNECT_TIMEOUT;
Packit ae9e2a
	size_t i;
Packit ae9e2a
	const git_proxy_options *proxy_opts;
Packit ae9e2a
Packit ae9e2a
	/* Prepare URL */
Packit ae9e2a
	git_buf_printf(&buf, "%s%s", t->connection_data.path, s->service_url);
Packit ae9e2a
Packit ae9e2a
	if (git_buf_oom(&buf))
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	/* Convert URL to wide characters */
Packit ae9e2a
	if (git__utf8_to_16_alloc(&s->request_uri, git_buf_cstr(&buf)) < 0) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to convert string to wide form");
Packit ae9e2a
		goto on_error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	/* Establish request */
Packit ae9e2a
	s->request = WinHttpOpenRequest(
Packit ae9e2a
			t->connection,
Packit ae9e2a
			s->verb,
Packit ae9e2a
			s->request_uri,
Packit ae9e2a
			NULL,
Packit ae9e2a
			WINHTTP_NO_REFERER,
Packit ae9e2a
			types,
Packit ae9e2a
			t->connection_data.use_ssl ? WINHTTP_FLAG_SECURE : 0);
Packit ae9e2a
Packit ae9e2a
	if (!s->request) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to open request");
Packit ae9e2a
		goto on_error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (!WinHttpSetTimeouts(s->request, default_timeout, default_connect_timeout, default_timeout, default_timeout)) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to set timeouts for WinHTTP");
Packit ae9e2a
		goto on_error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	proxy_opts = &t->owner->proxy;
Packit ae9e2a
	if (proxy_opts->type == GIT_PROXY_AUTO) {
Packit ae9e2a
		/* Set proxy if necessary */
Packit ae9e2a
		if (git_remote__get_http_proxy(t->owner->owner, !!t->connection_data.use_ssl, &proxy_url) < 0)
Packit ae9e2a
			goto on_error;
Packit ae9e2a
	}
Packit ae9e2a
	else if (proxy_opts->type == GIT_PROXY_SPECIFIED) {
Packit ae9e2a
		proxy_url = git__strdup(proxy_opts->url);
Packit ae9e2a
		GITERR_CHECK_ALLOC(proxy_url);
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (proxy_url) {
Packit ae9e2a
		git_buf processed_url = GIT_BUF_INIT;
Packit ae9e2a
		WINHTTP_PROXY_INFO proxy_info;
Packit ae9e2a
		wchar_t *proxy_wide;
Packit ae9e2a
Packit ae9e2a
		if (!git__prefixcmp(proxy_url, SCHEME_HTTP)) {
Packit ae9e2a
			t->proxy_connection_data.use_ssl = false;
Packit ae9e2a
		} else if (!git__prefixcmp(proxy_url, SCHEME_HTTPS)) {
Packit ae9e2a
			t->proxy_connection_data.use_ssl = true;
Packit ae9e2a
		} else {
Packit ae9e2a
			giterr_set(GITERR_NET, "invalid URL: '%s'", proxy_url);
Packit ae9e2a
			return -1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		gitno_connection_data_free_ptrs(&t->proxy_connection_data);
Packit ae9e2a
Packit ae9e2a
		if ((error = gitno_extract_url_parts(&t->proxy_connection_data.host, &t->proxy_connection_data.port, NULL,
Packit ae9e2a
				&t->proxy_connection_data.user, &t->proxy_connection_data.pass, proxy_url, NULL)) < 0)
Packit ae9e2a
			goto on_error;
Packit ae9e2a
Packit ae9e2a
		if (t->proxy_connection_data.user && t->proxy_connection_data.pass) {
Packit ae9e2a
			if (t->proxy_cred) {
Packit ae9e2a
				t->proxy_cred->free(t->proxy_cred);
Packit ae9e2a
			}
Packit ae9e2a
Packit ae9e2a
			if ((error = git_cred_userpass_plaintext_new(&t->proxy_cred, t->proxy_connection_data.user, t->proxy_connection_data.pass)) < 0)
Packit ae9e2a
				goto on_error;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		if (t->proxy_connection_data.use_ssl)
Packit ae9e2a
			git_buf_PUTS(&processed_url, SCHEME_HTTPS);
Packit ae9e2a
		else
Packit ae9e2a
			git_buf_PUTS(&processed_url, SCHEME_HTTP);
Packit ae9e2a
Packit ae9e2a
		git_buf_puts(&processed_url, t->proxy_connection_data.host);
Packit ae9e2a
		if (t->proxy_connection_data.port)
Packit ae9e2a
			git_buf_printf(&processed_url, ":%s", t->proxy_connection_data.port);
Packit ae9e2a
Packit ae9e2a
		if (git_buf_oom(&processed_url)) {
Packit ae9e2a
			error = -1;
Packit ae9e2a
			goto on_error;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		/* Convert URL to wide characters */
Packit ae9e2a
		error = git__utf8_to_16_alloc(&proxy_wide, processed_url.ptr);
Packit ae9e2a
		git_buf_free(&processed_url);
Packit ae9e2a
		if (error < 0)
Packit ae9e2a
			goto on_error;
Packit ae9e2a
Packit ae9e2a
		proxy_info.dwAccessType = WINHTTP_ACCESS_TYPE_NAMED_PROXY;
Packit ae9e2a
		proxy_info.lpszProxy = proxy_wide;
Packit ae9e2a
		proxy_info.lpszProxyBypass = NULL;
Packit ae9e2a
Packit ae9e2a
		if (!WinHttpSetOption(s->request,
Packit ae9e2a
			WINHTTP_OPTION_PROXY,
Packit ae9e2a
			&proxy_info,
Packit ae9e2a
			sizeof(WINHTTP_PROXY_INFO))) {
Packit ae9e2a
			giterr_set(GITERR_OS, "failed to set proxy");
Packit ae9e2a
			git__free(proxy_wide);
Packit ae9e2a
			goto on_error;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		git__free(proxy_wide);
Packit ae9e2a
Packit ae9e2a
		if (t->proxy_cred) {
Packit ae9e2a
			if (t->proxy_cred->credtype == GIT_CREDTYPE_USERPASS_PLAINTEXT) {
Packit ae9e2a
				if ((error = apply_userpass_credential_proxy(s->request, t->proxy_cred, t->auth_mechanisms)) < 0)
Packit ae9e2a
					goto on_error;
Packit ae9e2a
			}
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	/* Disable WinHTTP redirects so we can handle them manually. Why, you ask?
Packit ae9e2a
	 * http://social.msdn.microsoft.com/Forums/windowsdesktop/en-US/b2ff8879-ab9f-4218-8f09-16d25dff87ae
Packit ae9e2a
	 */
Packit ae9e2a
	if (!WinHttpSetOption(s->request,
Packit ae9e2a
		WINHTTP_OPTION_DISABLE_FEATURE,
Packit ae9e2a
		&disable_redirects,
Packit ae9e2a
		sizeof(disable_redirects))) {
Packit ae9e2a
			giterr_set(GITERR_OS, "failed to disable redirects");
Packit ae9e2a
			goto on_error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	/* Strip unwanted headers (X-P2P-PeerDist, X-P2P-PeerDistEx) that WinHTTP
Packit ae9e2a
	 * adds itself. This option may not be supported by the underlying
Packit ae9e2a
	 * platform, so we do not error-check it */
Packit ae9e2a
	WinHttpSetOption(s->request,
Packit ae9e2a
		WINHTTP_OPTION_PEERDIST_EXTENSION_STATE,
Packit ae9e2a
		&peerdist,
Packit ae9e2a
		sizeof(peerdist));
Packit ae9e2a
Packit ae9e2a
	/* Send Pragma: no-cache header */
Packit ae9e2a
	if (!WinHttpAddRequestHeaders(s->request, pragma_nocache, (ULONG) -1L, WINHTTP_ADDREQ_FLAG_ADD)) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to add a header to the request");
Packit ae9e2a
		goto on_error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (post_verb == s->verb) {
Packit ae9e2a
		/* Send Content-Type and Accept headers -- only necessary on a POST */
Packit ae9e2a
		git_buf_clear(&buf;;
Packit ae9e2a
		if (git_buf_printf(&buf,
Packit ae9e2a
			"Content-Type: application/x-git-%s-request",
Packit ae9e2a
			s->service) < 0)
Packit ae9e2a
			goto on_error;
Packit ae9e2a
Packit ae9e2a
		if (git__utf8_to_16(ct, MAX_CONTENT_TYPE_LEN, git_buf_cstr(&buf)) < 0) {
Packit ae9e2a
			giterr_set(GITERR_OS, "failed to convert content-type to wide characters");
Packit ae9e2a
			goto on_error;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		if (!WinHttpAddRequestHeaders(s->request, ct, (ULONG)-1L,
Packit ae9e2a
			WINHTTP_ADDREQ_FLAG_ADD | WINHTTP_ADDREQ_FLAG_REPLACE)) {
Packit ae9e2a
			giterr_set(GITERR_OS, "failed to add a header to the request");
Packit ae9e2a
			goto on_error;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		git_buf_clear(&buf;;
Packit ae9e2a
		if (git_buf_printf(&buf,
Packit ae9e2a
			"Accept: application/x-git-%s-result",
Packit ae9e2a
			s->service) < 0)
Packit ae9e2a
			goto on_error;
Packit ae9e2a
Packit ae9e2a
		if (git__utf8_to_16(ct, MAX_CONTENT_TYPE_LEN, git_buf_cstr(&buf)) < 0) {
Packit ae9e2a
			giterr_set(GITERR_OS, "failed to convert accept header to wide characters");
Packit ae9e2a
			goto on_error;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		if (!WinHttpAddRequestHeaders(s->request, ct, (ULONG)-1L,
Packit ae9e2a
			WINHTTP_ADDREQ_FLAG_ADD | WINHTTP_ADDREQ_FLAG_REPLACE)) {
Packit ae9e2a
			giterr_set(GITERR_OS, "failed to add a header to the request");
Packit ae9e2a
			goto on_error;
Packit ae9e2a
		}
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	for (i = 0; i < t->owner->custom_headers.count; i++) {
Packit ae9e2a
		if (t->owner->custom_headers.strings[i]) {
Packit ae9e2a
			git_buf_clear(&buf;;
Packit ae9e2a
			git_buf_puts(&buf, t->owner->custom_headers.strings[i]);
Packit ae9e2a
			if (git__utf8_to_16(ct, MAX_CONTENT_TYPE_LEN, git_buf_cstr(&buf)) < 0) {
Packit ae9e2a
				giterr_set(GITERR_OS, "failed to convert custom header to wide characters");
Packit ae9e2a
				goto on_error;
Packit ae9e2a
			}
Packit ae9e2a
Packit ae9e2a
			if (!WinHttpAddRequestHeaders(s->request, ct, (ULONG)-1L,
Packit ae9e2a
				WINHTTP_ADDREQ_FLAG_ADD | WINHTTP_ADDREQ_FLAG_REPLACE)) {
Packit ae9e2a
				giterr_set(GITERR_OS, "failed to add a header to the request");
Packit ae9e2a
				goto on_error;
Packit ae9e2a
			}
Packit ae9e2a
		}
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	/* If requested, disable certificate validation */
Packit ae9e2a
	if (t->connection_data.use_ssl) {
Packit ae9e2a
		int flags;
Packit ae9e2a
Packit ae9e2a
		if (t->owner->parent.read_flags(&t->owner->parent, &flags) < 0)
Packit ae9e2a
			goto on_error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	/* If we have a credential on the subtransport, apply it to the request */
Packit ae9e2a
	if (t->cred &&
Packit ae9e2a
		t->cred->credtype == GIT_CREDTYPE_USERPASS_PLAINTEXT &&
Packit ae9e2a
		apply_userpass_credential(s->request, t->auth_mechanisms, t->cred) < 0)
Packit ae9e2a
		goto on_error;
Packit ae9e2a
	else if (t->cred &&
Packit ae9e2a
		t->cred->credtype == GIT_CREDTYPE_DEFAULT &&
Packit ae9e2a
		apply_default_credentials(s->request, t->auth_mechanisms) < 0)
Packit ae9e2a
		goto on_error;
Packit ae9e2a
Packit ae9e2a
	/* If no other credentials have been applied and the URL has username and
Packit ae9e2a
	 * password, use those */
Packit ae9e2a
	if (!t->cred && t->connection_data.user && t->connection_data.pass) {
Packit ae9e2a
		if (!t->url_cred &&
Packit ae9e2a
			git_cred_userpass_plaintext_new(&t->url_cred, t->connection_data.user, t->connection_data.pass) < 0)
Packit ae9e2a
			goto on_error;
Packit ae9e2a
		if (apply_userpass_credential(s->request, GIT_WINHTTP_AUTH_BASIC, t->url_cred) < 0)
Packit ae9e2a
			goto on_error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	/* We've done everything up to calling WinHttpSendRequest. */
Packit ae9e2a
Packit ae9e2a
	error = 0;
Packit ae9e2a
Packit ae9e2a
on_error:
Packit ae9e2a
	if (error < 0)
Packit ae9e2a
		winhttp_stream_close(s);
Packit ae9e2a
Packit ae9e2a
	git__free(proxy_url);
Packit ae9e2a
	git_buf_free(&buf;;
Packit ae9e2a
	return error;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int parse_unauthorized_response(
Packit ae9e2a
	HINTERNET request,
Packit ae9e2a
	int *allowed_types,
Packit ae9e2a
	int *allowed_mechanisms)
Packit ae9e2a
{
Packit ae9e2a
	DWORD supported, first, target;
Packit ae9e2a
Packit ae9e2a
	*allowed_types = 0;
Packit ae9e2a
	*allowed_mechanisms = 0;
Packit ae9e2a
Packit ae9e2a
	/* WinHttpQueryHeaders() must be called before WinHttpQueryAuthSchemes().
Packit ae9e2a
	 * We can assume this was already done, since we know we are unauthorized.
Packit ae9e2a
	 */
Packit ae9e2a
	if (!WinHttpQueryAuthSchemes(request, &supported, &first, &target)) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to parse supported auth schemes");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (WINHTTP_AUTH_SCHEME_NTLM & supported) {
Packit ae9e2a
		*allowed_types |= GIT_CREDTYPE_USERPASS_PLAINTEXT;
Packit ae9e2a
		*allowed_types |= GIT_CREDTYPE_DEFAULT;
Packit ae9e2a
		*allowed_mechanisms = GIT_WINHTTP_AUTH_NEGOTIATE;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (WINHTTP_AUTH_SCHEME_NEGOTIATE & supported) {
Packit ae9e2a
		*allowed_types |= GIT_CREDTYPE_DEFAULT;
Packit ae9e2a
		*allowed_mechanisms = GIT_WINHTTP_AUTH_NEGOTIATE;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (WINHTTP_AUTH_SCHEME_BASIC & supported) {
Packit ae9e2a
		*allowed_types |= GIT_CREDTYPE_USERPASS_PLAINTEXT;
Packit ae9e2a
		*allowed_mechanisms |= GIT_WINHTTP_AUTH_BASIC;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (WINHTTP_AUTH_SCHEME_DIGEST & supported) {
Packit ae9e2a
		*allowed_types |= GIT_CREDTYPE_USERPASS_PLAINTEXT;
Packit ae9e2a
		*allowed_mechanisms |= GIT_WINHTTP_AUTH_DIGEST;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int write_chunk(HINTERNET request, const char *buffer, size_t len)
Packit ae9e2a
{
Packit ae9e2a
	DWORD bytes_written;
Packit ae9e2a
	git_buf buf = GIT_BUF_INIT;
Packit ae9e2a
Packit ae9e2a
	/* Chunk header */
Packit ae9e2a
	git_buf_printf(&buf, "%X\r\n", len);
Packit ae9e2a
Packit ae9e2a
	if (git_buf_oom(&buf))
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	if (!WinHttpWriteData(request,
Packit ae9e2a
		git_buf_cstr(&buf),	(DWORD)git_buf_len(&buf),
Packit ae9e2a
		&bytes_written)) {
Packit ae9e2a
		git_buf_free(&buf;;
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to write chunk header");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	git_buf_free(&buf;;
Packit ae9e2a
Packit ae9e2a
	/* Chunk body */
Packit ae9e2a
	if (!WinHttpWriteData(request,
Packit ae9e2a
		buffer, (DWORD)len,
Packit ae9e2a
		&bytes_written)) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to write chunk");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	/* Chunk footer */
Packit ae9e2a
	if (!WinHttpWriteData(request,
Packit ae9e2a
		"\r\n", 2,
Packit ae9e2a
		&bytes_written)) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to write chunk footer");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_close_connection(winhttp_subtransport *t)
Packit ae9e2a
{
Packit ae9e2a
	int ret = 0;
Packit ae9e2a
Packit ae9e2a
	if (t->connection) {
Packit ae9e2a
		if (!WinHttpCloseHandle(t->connection)) {
Packit ae9e2a
			giterr_set(GITERR_OS, "unable to close connection");
Packit ae9e2a
			ret = -1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		t->connection = NULL;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (t->session) {
Packit ae9e2a
		if (!WinHttpCloseHandle(t->session)) {
Packit ae9e2a
			giterr_set(GITERR_OS, "unable to close session");
Packit ae9e2a
			ret = -1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		t->session = NULL;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	return ret;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int user_agent(git_buf *ua)
Packit ae9e2a
{
Packit ae9e2a
	const char *custom = git_libgit2__user_agent();
Packit ae9e2a
Packit ae9e2a
	git_buf_clear(ua);
Packit ae9e2a
	git_buf_PUTS(ua, "git/1.0 (");
Packit ae9e2a
Packit ae9e2a
	if (custom)
Packit ae9e2a
		git_buf_puts(ua, custom);
Packit ae9e2a
	else
Packit ae9e2a
		git_buf_PUTS(ua, "libgit2 " LIBGIT2_VERSION);
Packit ae9e2a
Packit ae9e2a
	return git_buf_putc(ua, ')');
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static void CALLBACK winhttp_status(
Packit ae9e2a
	HINTERNET connection,
Packit ae9e2a
	DWORD_PTR ctx,
Packit ae9e2a
	DWORD code,
Packit ae9e2a
	LPVOID info,
Packit ae9e2a
	DWORD info_len)
Packit ae9e2a
{
Packit ae9e2a
	DWORD status;
Packit ae9e2a
Packit ae9e2a
	if (code != WINHTTP_CALLBACK_STATUS_SECURE_FAILURE)
Packit ae9e2a
		return;
Packit ae9e2a
Packit ae9e2a
	status = *((DWORD *)info);
Packit ae9e2a
Packit ae9e2a
	if ((status & WINHTTP_CALLBACK_STATUS_FLAG_CERT_CN_INVALID))
Packit ae9e2a
		giterr_set(GITERR_NET, "SSL certificate issued for different common name");
Packit ae9e2a
	else if ((status & WINHTTP_CALLBACK_STATUS_FLAG_CERT_DATE_INVALID))
Packit ae9e2a
		giterr_set(GITERR_NET, "SSL certificate has expired");
Packit ae9e2a
	else if ((status & WINHTTP_CALLBACK_STATUS_FLAG_INVALID_CA))
Packit ae9e2a
		giterr_set(GITERR_NET, "SSL certificate signed by unknown CA");
Packit ae9e2a
	else if ((status & WINHTTP_CALLBACK_STATUS_FLAG_INVALID_CERT))
Packit ae9e2a
		giterr_set(GITERR_NET, "SSL certificate is invalid");
Packit ae9e2a
	else if ((status & WINHTTP_CALLBACK_STATUS_FLAG_CERT_REV_FAILED))
Packit ae9e2a
		giterr_set(GITERR_NET, "certificate revocation check failed");
Packit ae9e2a
	else if ((status & WINHTTP_CALLBACK_STATUS_FLAG_CERT_REVOKED))
Packit ae9e2a
		giterr_set(GITERR_NET, "SSL certificate was revoked");
Packit ae9e2a
	else if ((status & WINHTTP_CALLBACK_STATUS_FLAG_SECURITY_CHANNEL_ERROR))
Packit ae9e2a
		giterr_set(GITERR_NET, "security libraries could not be loaded");
Packit ae9e2a
	else
Packit ae9e2a
		giterr_set(GITERR_NET, "unknown security error %d", status);
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_connect(
Packit ae9e2a
	winhttp_subtransport *t)
Packit ae9e2a
{
Packit ae9e2a
	wchar_t *wide_host;
Packit ae9e2a
	int32_t port;
Packit ae9e2a
	wchar_t *wide_ua;
Packit ae9e2a
	git_buf ua = GIT_BUF_INIT;
Packit ae9e2a
	int error = -1;
Packit ae9e2a
	int default_timeout = TIMEOUT_INFINITE;
Packit ae9e2a
	int default_connect_timeout = DEFAULT_CONNECT_TIMEOUT;
Packit ae9e2a
	DWORD protocols =
Packit ae9e2a
		WINHTTP_FLAG_SECURE_PROTOCOL_TLS1 |
Packit ae9e2a
		WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_1 |
Packit ae9e2a
		WINHTTP_FLAG_SECURE_PROTOCOL_TLS1_2;
Packit ae9e2a
Packit ae9e2a
	t->session = NULL;
Packit ae9e2a
	t->connection = NULL;
Packit ae9e2a
Packit ae9e2a
	/* Prepare port */
Packit ae9e2a
	if (git__strntol32(&port, t->connection_data.port,
Packit ae9e2a
			   strlen(t->connection_data.port), NULL, 10) < 0)
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	/* Prepare host */
Packit ae9e2a
	if (git__utf8_to_16_alloc(&wide_host, t->connection_data.host) < 0) {
Packit ae9e2a
		giterr_set(GITERR_OS, "unable to convert host to wide characters");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if ((error = user_agent(&ua)) < 0) {
Packit ae9e2a
		git__free(wide_host);
Packit ae9e2a
		return error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (git__utf8_to_16_alloc(&wide_ua, git_buf_cstr(&ua)) < 0) {
Packit ae9e2a
		giterr_set(GITERR_OS, "unable to convert host to wide characters");
Packit ae9e2a
		git__free(wide_host);
Packit ae9e2a
		git_buf_free(&ua);
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	git_buf_free(&ua);
Packit ae9e2a
Packit ae9e2a
	/* Establish session */
Packit ae9e2a
	t->session = WinHttpOpen(
Packit ae9e2a
		wide_ua,
Packit ae9e2a
		WINHTTP_ACCESS_TYPE_DEFAULT_PROXY,
Packit ae9e2a
		WINHTTP_NO_PROXY_NAME,
Packit ae9e2a
		WINHTTP_NO_PROXY_BYPASS,
Packit ae9e2a
		0);
Packit ae9e2a
Packit ae9e2a
	if (!t->session) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to init WinHTTP");
Packit ae9e2a
		goto on_error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	/*
Packit ae9e2a
	 * Do a best-effort attempt to enable TLS 1.2 but allow this to
Packit ae9e2a
	 * fail; if TLS 1.2 support is not available for some reason,
Packit ae9e2a
	 * ignore the failure (it will keep the default protocols).
Packit ae9e2a
	 */
Packit ae9e2a
	WinHttpSetOption(t->session,
Packit ae9e2a
		WINHTTP_OPTION_SECURE_PROTOCOLS,
Packit ae9e2a
		&protocols,
Packit ae9e2a
		sizeof(protocols));
Packit ae9e2a
Packit ae9e2a
	if (!WinHttpSetTimeouts(t->session, default_timeout, default_connect_timeout, default_timeout, default_timeout)) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to set timeouts for WinHTTP");
Packit ae9e2a
		goto on_error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
Packit ae9e2a
	/* Establish connection */
Packit ae9e2a
	t->connection = WinHttpConnect(
Packit ae9e2a
		t->session,
Packit ae9e2a
		wide_host,
Packit ae9e2a
		(INTERNET_PORT) port,
Packit ae9e2a
		0);
Packit ae9e2a
Packit ae9e2a
	if (!t->connection) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to connect to host");
Packit ae9e2a
		goto on_error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (WinHttpSetStatusCallback(t->connection, winhttp_status, WINHTTP_CALLBACK_FLAG_SECURE_FAILURE, 0) == WINHTTP_INVALID_STATUS_CALLBACK) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to set status callback");
Packit ae9e2a
		goto on_error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	error = 0;
Packit ae9e2a
Packit ae9e2a
on_error:
Packit ae9e2a
	if (error < 0)
Packit ae9e2a
		winhttp_close_connection(t);
Packit ae9e2a
Packit ae9e2a
	git__free(wide_host);
Packit ae9e2a
	git__free(wide_ua);
Packit ae9e2a
Packit ae9e2a
	return error;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int do_send_request(winhttp_stream *s, size_t len, int ignore_length)
Packit ae9e2a
{
Packit ae9e2a
	if (ignore_length) {
Packit ae9e2a
		if (!WinHttpSendRequest(s->request,
Packit ae9e2a
			WINHTTP_NO_ADDITIONAL_HEADERS, 0,
Packit ae9e2a
			WINHTTP_NO_REQUEST_DATA, 0,
Packit ae9e2a
			WINHTTP_IGNORE_REQUEST_TOTAL_LENGTH, 0)) {
Packit ae9e2a
			return -1;
Packit ae9e2a
		}
Packit ae9e2a
	} else {
Packit ae9e2a
		if (!WinHttpSendRequest(s->request,
Packit ae9e2a
			WINHTTP_NO_ADDITIONAL_HEADERS, 0,
Packit ae9e2a
			WINHTTP_NO_REQUEST_DATA, 0,
Packit ae9e2a
			len, 0)) {
Packit ae9e2a
			return -1;
Packit ae9e2a
		}
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int send_request(winhttp_stream *s, size_t len, int ignore_length)
Packit ae9e2a
{
Packit ae9e2a
	int request_failed = 0, cert_valid = 1, error = 0;
Packit ae9e2a
	DWORD ignore_flags;
Packit ae9e2a
Packit ae9e2a
	giterr_clear();
Packit ae9e2a
	if ((error = do_send_request(s, len, ignore_length)) < 0) {
Packit ae9e2a
		if (GetLastError() != ERROR_WINHTTP_SECURE_FAILURE) {
Packit ae9e2a
			giterr_set(GITERR_OS, "failed to send request");
Packit ae9e2a
			return -1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		request_failed = 1;
Packit ae9e2a
		cert_valid = 0;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	giterr_clear();
Packit ae9e2a
	if ((error = certificate_check(s, cert_valid)) < 0) {
Packit ae9e2a
		if (!giterr_last())
Packit ae9e2a
			giterr_set(GITERR_OS, "user cancelled certificate check");
Packit ae9e2a
Packit ae9e2a
		return error;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	/* if neither the request nor the certificate check returned errors, we're done */
Packit ae9e2a
	if (!request_failed)
Packit ae9e2a
		return 0;
Packit ae9e2a
Packit ae9e2a
	ignore_flags = no_check_cert_flags;
Packit ae9e2a
Packit ae9e2a
	if (!WinHttpSetOption(s->request, WINHTTP_OPTION_SECURITY_FLAGS, &ignore_flags, sizeof(ignore_flags))) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to set security options");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if ((error = do_send_request(s, len, ignore_length)) < 0)
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to send request with unchecked certificate");
Packit ae9e2a
Packit ae9e2a
	return error;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_stream_read(
Packit ae9e2a
	git_smart_subtransport_stream *stream,
Packit ae9e2a
	char *buffer,
Packit ae9e2a
	size_t buf_size,
Packit ae9e2a
	size_t *bytes_read)
Packit ae9e2a
{
Packit ae9e2a
	winhttp_stream *s = (winhttp_stream *)stream;
Packit ae9e2a
	winhttp_subtransport *t = OWNING_SUBTRANSPORT(s);
Packit ae9e2a
	DWORD dw_bytes_read;
Packit ae9e2a
	char replay_count = 0;
Packit ae9e2a
	int error;
Packit ae9e2a
Packit ae9e2a
replay:
Packit ae9e2a
	/* Enforce a reasonable cap on the number of replays */
Packit ae9e2a
	if (++replay_count >= 7) {
Packit ae9e2a
		giterr_set(GITERR_NET, "too many redirects or authentication replays");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	/* Connect if necessary */
Packit ae9e2a
	if (!s->request && winhttp_stream_connect(s) < 0)
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	if (!s->received_response) {
Packit ae9e2a
		DWORD status_code, status_code_length, content_type_length, bytes_written;
Packit ae9e2a
		char expected_content_type_8[MAX_CONTENT_TYPE_LEN];
Packit ae9e2a
		wchar_t expected_content_type[MAX_CONTENT_TYPE_LEN], content_type[MAX_CONTENT_TYPE_LEN];
Packit ae9e2a
Packit ae9e2a
		if (!s->sent_request) {
Packit ae9e2a
Packit ae9e2a
			if ((error = send_request(s, s->post_body_len, 0)) < 0)
Packit ae9e2a
				return error;
Packit ae9e2a
Packit ae9e2a
			s->sent_request = 1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		if (s->chunked) {
Packit ae9e2a
			assert(s->verb == post_verb);
Packit ae9e2a
Packit ae9e2a
			/* Flush, if necessary */
Packit ae9e2a
			if (s->chunk_buffer_len > 0 &&
Packit ae9e2a
				write_chunk(s->request, s->chunk_buffer, s->chunk_buffer_len) < 0)
Packit ae9e2a
				return -1;
Packit ae9e2a
Packit ae9e2a
			s->chunk_buffer_len = 0;
Packit ae9e2a
Packit ae9e2a
			/* Write the final chunk. */
Packit ae9e2a
			if (!WinHttpWriteData(s->request,
Packit ae9e2a
				"0\r\n\r\n", 5,
Packit ae9e2a
				&bytes_written)) {
Packit ae9e2a
				giterr_set(GITERR_OS, "failed to write final chunk");
Packit ae9e2a
				return -1;
Packit ae9e2a
			}
Packit ae9e2a
		}
Packit ae9e2a
		else if (s->post_body) {
Packit ae9e2a
			char *buffer;
Packit ae9e2a
			DWORD len = s->post_body_len, bytes_read;
Packit ae9e2a
Packit ae9e2a
			if (INVALID_SET_FILE_POINTER == SetFilePointer(s->post_body,
Packit ae9e2a
					0, 0, FILE_BEGIN) &&
Packit ae9e2a
				NO_ERROR != GetLastError()) {
Packit ae9e2a
				giterr_set(GITERR_OS, "failed to reset file pointer");
Packit ae9e2a
				return -1;
Packit ae9e2a
			}
Packit ae9e2a
Packit ae9e2a
			buffer = git__malloc(CACHED_POST_BODY_BUF_SIZE);
Packit ae9e2a
Packit ae9e2a
			while (len > 0) {
Packit ae9e2a
				DWORD bytes_written;
Packit ae9e2a
Packit ae9e2a
				if (!ReadFile(s->post_body, buffer,
Packit ae9e2a
					min(CACHED_POST_BODY_BUF_SIZE, len),
Packit ae9e2a
					&bytes_read, NULL) ||
Packit ae9e2a
					!bytes_read) {
Packit ae9e2a
					git__free(buffer);
Packit ae9e2a
					giterr_set(GITERR_OS, "failed to read from temp file");
Packit ae9e2a
					return -1;
Packit ae9e2a
				}
Packit ae9e2a
Packit ae9e2a
				if (!WinHttpWriteData(s->request, buffer,
Packit ae9e2a
					bytes_read, &bytes_written)) {
Packit ae9e2a
					git__free(buffer);
Packit ae9e2a
					giterr_set(GITERR_OS, "failed to write data");
Packit ae9e2a
					return -1;
Packit ae9e2a
				}
Packit ae9e2a
Packit ae9e2a
				len -= bytes_read;
Packit ae9e2a
				assert(bytes_read == bytes_written);
Packit ae9e2a
			}
Packit ae9e2a
Packit ae9e2a
			git__free(buffer);
Packit ae9e2a
Packit ae9e2a
			/* Eagerly close the temp file */
Packit ae9e2a
			CloseHandle(s->post_body);
Packit ae9e2a
			s->post_body = NULL;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		if (!WinHttpReceiveResponse(s->request, 0)) {
Packit ae9e2a
			giterr_set(GITERR_OS, "failed to receive response");
Packit ae9e2a
			return -1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		/* Verify that we got a 200 back */
Packit ae9e2a
		status_code_length = sizeof(status_code);
Packit ae9e2a
Packit ae9e2a
		if (!WinHttpQueryHeaders(s->request,
Packit ae9e2a
			WINHTTP_QUERY_STATUS_CODE | WINHTTP_QUERY_FLAG_NUMBER,
Packit ae9e2a
			WINHTTP_HEADER_NAME_BY_INDEX,
Packit ae9e2a
			&status_code, &status_code_length,
Packit ae9e2a
			WINHTTP_NO_HEADER_INDEX)) {
Packit ae9e2a
				giterr_set(GITERR_OS, "failed to retrieve status code");
Packit ae9e2a
				return -1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		/* The implementation of WinHTTP prior to Windows 7 will not
Packit ae9e2a
		 * redirect to an identical URI. Some Git hosters use self-redirects
Packit ae9e2a
		 * as part of their DoS mitigation strategy. Check first to see if we
Packit ae9e2a
		 * have a redirect status code, and that we haven't already streamed
Packit ae9e2a
		 * a post body. (We can't replay a streamed POST.) */
Packit ae9e2a
		if (!s->chunked &&
Packit ae9e2a
			(HTTP_STATUS_MOVED == status_code ||
Packit ae9e2a
			 HTTP_STATUS_REDIRECT == status_code ||
Packit ae9e2a
			 (HTTP_STATUS_REDIRECT_METHOD == status_code &&
Packit ae9e2a
			  get_verb == s->verb) ||
Packit ae9e2a
			 HTTP_STATUS_REDIRECT_KEEP_VERB == status_code)) {
Packit ae9e2a
Packit ae9e2a
			/* Check for Windows 7. This workaround is only necessary on
Packit ae9e2a
			 * Windows Vista and earlier. Windows 7 is version 6.1. */
Packit ae9e2a
			wchar_t *location;
Packit ae9e2a
			DWORD location_length;
Packit ae9e2a
			char *location8;
Packit ae9e2a
Packit ae9e2a
			/* OK, fetch the Location header from the redirect. */
Packit ae9e2a
			if (WinHttpQueryHeaders(s->request,
Packit ae9e2a
				WINHTTP_QUERY_LOCATION,
Packit ae9e2a
				WINHTTP_HEADER_NAME_BY_INDEX,
Packit ae9e2a
				WINHTTP_NO_OUTPUT_BUFFER,
Packit ae9e2a
				&location_length,
Packit ae9e2a
				WINHTTP_NO_HEADER_INDEX) ||
Packit ae9e2a
				GetLastError() != ERROR_INSUFFICIENT_BUFFER) {
Packit ae9e2a
				giterr_set(GITERR_OS, "failed to read Location header");
Packit ae9e2a
				return -1;
Packit ae9e2a
			}
Packit ae9e2a
Packit ae9e2a
			location = git__malloc(location_length);
Packit ae9e2a
			GITERR_CHECK_ALLOC(location);
Packit ae9e2a
Packit ae9e2a
			if (!WinHttpQueryHeaders(s->request,
Packit ae9e2a
				WINHTTP_QUERY_LOCATION,
Packit ae9e2a
				WINHTTP_HEADER_NAME_BY_INDEX,
Packit ae9e2a
				location,
Packit ae9e2a
				&location_length,
Packit ae9e2a
				WINHTTP_NO_HEADER_INDEX)) {
Packit ae9e2a
				giterr_set(GITERR_OS, "failed to read Location header");
Packit ae9e2a
				git__free(location);
Packit ae9e2a
				return -1;
Packit ae9e2a
			}
Packit ae9e2a
Packit ae9e2a
			/* Convert the Location header to UTF-8 */
Packit ae9e2a
			if (git__utf16_to_8_alloc(&location8, location) < 0) {
Packit ae9e2a
				giterr_set(GITERR_OS, "failed to convert Location header to UTF-8");
Packit ae9e2a
				git__free(location);
Packit ae9e2a
				return -1;
Packit ae9e2a
			}
Packit ae9e2a
Packit ae9e2a
			git__free(location);
Packit ae9e2a
Packit ae9e2a
			/* Replay the request */
Packit ae9e2a
			winhttp_stream_close(s);
Packit ae9e2a
Packit ae9e2a
			if (!git__prefixcmp_icase(location8, prefix_https)) {
Packit ae9e2a
				/* Upgrade to secure connection; disconnect and start over */
Packit ae9e2a
				if (gitno_connection_data_from_url(&t->connection_data, location8, s->service_url) < 0) {
Packit ae9e2a
					git__free(location8);
Packit ae9e2a
					return -1;
Packit ae9e2a
				}
Packit ae9e2a
Packit ae9e2a
				winhttp_close_connection(t);
Packit ae9e2a
Packit ae9e2a
				if (winhttp_connect(t) < 0)
Packit ae9e2a
					return -1;
Packit ae9e2a
			}
Packit ae9e2a
Packit ae9e2a
			git__free(location8);
Packit ae9e2a
			goto replay;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		/* Handle proxy authentication failures */
Packit ae9e2a
		if (status_code == HTTP_STATUS_PROXY_AUTH_REQ) {
Packit ae9e2a
			int allowed_types;
Packit ae9e2a
Packit ae9e2a
			if (parse_unauthorized_response(s->request, &allowed_types, &t->auth_mechanisms) < 0)
Packit ae9e2a
				return -1;
Packit ae9e2a
Packit ae9e2a
			/* TODO: extract the username from the url, no payload? */
Packit ae9e2a
			if (t->owner->proxy.credentials) {
Packit ae9e2a
				int cred_error = 1;
Packit ae9e2a
				cred_error = t->owner->proxy.credentials(&t->proxy_cred, t->owner->proxy.url, NULL, allowed_types, t->owner->proxy.payload);
Packit ae9e2a
Packit ae9e2a
				if (cred_error < 0)
Packit ae9e2a
					return cred_error;
Packit ae9e2a
			}
Packit ae9e2a
Packit ae9e2a
			winhttp_stream_close(s);
Packit ae9e2a
			goto replay;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		/* Handle authentication failures */
Packit ae9e2a
		if (HTTP_STATUS_DENIED == status_code && get_verb == s->verb) {
Packit ae9e2a
			int allowed_types;
Packit ae9e2a
Packit ae9e2a
			if (parse_unauthorized_response(s->request, &allowed_types, &t->auth_mechanisms) < 0)
Packit ae9e2a
				return -1;
Packit ae9e2a
Packit ae9e2a
			if (allowed_types) {
Packit ae9e2a
				int cred_error = 1;
Packit ae9e2a
Packit ae9e2a
				git_cred_free(t->cred);
Packit ae9e2a
				t->cred = NULL;
Packit ae9e2a
				/* Start with the user-supplied credential callback, if present */
Packit ae9e2a
				if (t->owner->cred_acquire_cb) {
Packit ae9e2a
					cred_error = t->owner->cred_acquire_cb(&t->cred, t->owner->url,
Packit ae9e2a
						t->connection_data.user, allowed_types,	t->owner->cred_acquire_payload);
Packit ae9e2a
Packit ae9e2a
					/* Treat GIT_PASSTHROUGH as though git_cred_acquire_cb isn't set */
Packit ae9e2a
					if (cred_error == GIT_PASSTHROUGH)
Packit ae9e2a
						cred_error = 1;
Packit ae9e2a
					else if (cred_error < 0)
Packit ae9e2a
						return cred_error;
Packit ae9e2a
				}
Packit ae9e2a
Packit ae9e2a
				/* Invoke the fallback credentials acquisition callback if necessary */
Packit ae9e2a
				if (cred_error > 0) {
Packit ae9e2a
					cred_error = fallback_cred_acquire_cb(&t->cred, t->owner->url,
Packit ae9e2a
						t->connection_data.user, allowed_types, NULL);
Packit ae9e2a
Packit ae9e2a
					if (cred_error < 0)
Packit ae9e2a
						return cred_error;
Packit ae9e2a
				}
Packit ae9e2a
Packit ae9e2a
				if (!cred_error) {
Packit ae9e2a
					assert(t->cred);
Packit ae9e2a
Packit ae9e2a
					winhttp_stream_close(s);
Packit ae9e2a
Packit ae9e2a
					/* Successfully acquired a credential */
Packit ae9e2a
					goto replay;
Packit ae9e2a
				}
Packit ae9e2a
			}
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		if (HTTP_STATUS_OK != status_code) {
Packit ae9e2a
			giterr_set(GITERR_NET, "request failed with status code: %d", status_code);
Packit ae9e2a
			return -1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		/* Verify that we got the correct content-type back */
Packit ae9e2a
		if (post_verb == s->verb)
Packit ae9e2a
			p_snprintf(expected_content_type_8, MAX_CONTENT_TYPE_LEN, "application/x-git-%s-result", s->service);
Packit ae9e2a
		else
Packit ae9e2a
			p_snprintf(expected_content_type_8, MAX_CONTENT_TYPE_LEN, "application/x-git-%s-advertisement", s->service);
Packit ae9e2a
Packit ae9e2a
		if (git__utf8_to_16(expected_content_type, MAX_CONTENT_TYPE_LEN, expected_content_type_8) < 0) {
Packit ae9e2a
			giterr_set(GITERR_OS, "failed to convert expected content-type to wide characters");
Packit ae9e2a
			return -1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		content_type_length = sizeof(content_type);
Packit ae9e2a
Packit ae9e2a
		if (!WinHttpQueryHeaders(s->request,
Packit ae9e2a
			WINHTTP_QUERY_CONTENT_TYPE,
Packit ae9e2a
			WINHTTP_HEADER_NAME_BY_INDEX,
Packit ae9e2a
			&content_type, &content_type_length,
Packit ae9e2a
			WINHTTP_NO_HEADER_INDEX)) {
Packit ae9e2a
				giterr_set(GITERR_OS, "failed to retrieve response content-type");
Packit ae9e2a
				return -1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		if (wcscmp(expected_content_type, content_type)) {
Packit ae9e2a
			giterr_set(GITERR_NET, "received unexpected content-type");
Packit ae9e2a
			return -1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		s->received_response = 1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (!WinHttpReadData(s->request,
Packit ae9e2a
		(LPVOID)buffer,
Packit ae9e2a
		(DWORD)buf_size,
Packit ae9e2a
		&dw_bytes_read))
Packit ae9e2a
	{
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to read data");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	*bytes_read = dw_bytes_read;
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_stream_write_single(
Packit ae9e2a
	git_smart_subtransport_stream *stream,
Packit ae9e2a
	const char *buffer,
Packit ae9e2a
	size_t len)
Packit ae9e2a
{
Packit ae9e2a
	winhttp_stream *s = (winhttp_stream *)stream;
Packit ae9e2a
	DWORD bytes_written;
Packit ae9e2a
	int error;
Packit ae9e2a
Packit ae9e2a
	if (!s->request && winhttp_stream_connect(s) < 0)
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	/* This implementation of write permits only a single call. */
Packit ae9e2a
	if (s->sent_request) {
Packit ae9e2a
		giterr_set(GITERR_NET, "subtransport configured for only one write");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if ((error = send_request(s, len, 0)) < 0)
Packit ae9e2a
		return error;
Packit ae9e2a
Packit ae9e2a
	s->sent_request = 1;
Packit ae9e2a
Packit ae9e2a
	if (!WinHttpWriteData(s->request,
Packit ae9e2a
			(LPCVOID)buffer,
Packit ae9e2a
			(DWORD)len,
Packit ae9e2a
			&bytes_written)) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to write data");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	assert((DWORD)len == bytes_written);
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int put_uuid_string(LPWSTR buffer, size_t buffer_len_cch)
Packit ae9e2a
{
Packit ae9e2a
	UUID uuid;
Packit ae9e2a
	RPC_STATUS status = UuidCreate(&uuid);
Packit ae9e2a
	int result;
Packit ae9e2a
Packit ae9e2a
	if (RPC_S_OK != status &&
Packit ae9e2a
		RPC_S_UUID_LOCAL_ONLY != status &&
Packit ae9e2a
		RPC_S_UUID_NO_ADDRESS != status) {
Packit ae9e2a
		giterr_set(GITERR_NET, "unable to generate name for temp file");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (buffer_len_cch < UUID_LENGTH_CCH + 1) {
Packit ae9e2a
		giterr_set(GITERR_NET, "buffer too small for name of temp file");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
#if !defined(__MINGW32__) || defined(MINGW_HAS_SECURE_API)
Packit ae9e2a
	result = swprintf_s(buffer, buffer_len_cch,
Packit ae9e2a
#else
Packit ae9e2a
	result = wsprintfW(buffer,
Packit ae9e2a
#endif
Packit ae9e2a
		L"%08x%04x%04x%02x%02x%02x%02x%02x%02x%02x%02x",
Packit ae9e2a
		uuid.Data1, uuid.Data2, uuid.Data3,
Packit ae9e2a
		uuid.Data4[0], uuid.Data4[1], uuid.Data4[2], uuid.Data4[3],
Packit ae9e2a
		uuid.Data4[4], uuid.Data4[5], uuid.Data4[6], uuid.Data4[7]);
Packit ae9e2a
Packit ae9e2a
	if (result < UUID_LENGTH_CCH) {
Packit ae9e2a
		giterr_set(GITERR_OS, "unable to generate name for temp file");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int get_temp_file(LPWSTR buffer, DWORD buffer_len_cch)
Packit ae9e2a
{
Packit ae9e2a
	size_t len;
Packit ae9e2a
Packit ae9e2a
	if (!GetTempPathW(buffer_len_cch, buffer)) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to get temp path");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	len = wcslen(buffer);
Packit ae9e2a
Packit ae9e2a
	if (buffer[len - 1] != '\\' && len < buffer_len_cch)
Packit ae9e2a
		buffer[len++] = '\\';
Packit ae9e2a
Packit ae9e2a
	if (put_uuid_string(&buffer[len], (size_t)buffer_len_cch - len) < 0)
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_stream_write_buffered(
Packit ae9e2a
	git_smart_subtransport_stream *stream,
Packit ae9e2a
	const char *buffer,
Packit ae9e2a
	size_t len)
Packit ae9e2a
{
Packit ae9e2a
	winhttp_stream *s = (winhttp_stream *)stream;
Packit ae9e2a
	DWORD bytes_written;
Packit ae9e2a
Packit ae9e2a
	if (!s->request && winhttp_stream_connect(s) < 0)
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	/* Buffer the payload, using a temporary file so we delegate
Packit ae9e2a
	 * memory management of the data to the operating system. */
Packit ae9e2a
	if (!s->post_body) {
Packit ae9e2a
		wchar_t temp_path[MAX_PATH + 1];
Packit ae9e2a
Packit ae9e2a
		if (get_temp_file(temp_path, MAX_PATH + 1) < 0)
Packit ae9e2a
			return -1;
Packit ae9e2a
Packit ae9e2a
		s->post_body = CreateFileW(temp_path,
Packit ae9e2a
			GENERIC_READ | GENERIC_WRITE,
Packit ae9e2a
			FILE_SHARE_DELETE, NULL,
Packit ae9e2a
			CREATE_NEW,
Packit ae9e2a
			FILE_ATTRIBUTE_TEMPORARY | FILE_FLAG_DELETE_ON_CLOSE | FILE_FLAG_SEQUENTIAL_SCAN,
Packit ae9e2a
			NULL);
Packit ae9e2a
Packit ae9e2a
		if (INVALID_HANDLE_VALUE == s->post_body) {
Packit ae9e2a
			s->post_body = NULL;
Packit ae9e2a
			giterr_set(GITERR_OS, "failed to create temporary file");
Packit ae9e2a
			return -1;
Packit ae9e2a
		}
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (!WriteFile(s->post_body, buffer, (DWORD)len, &bytes_written, NULL)) {
Packit ae9e2a
		giterr_set(GITERR_OS, "failed to write to temporary file");
Packit ae9e2a
		return -1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	assert((DWORD)len == bytes_written);
Packit ae9e2a
Packit ae9e2a
	s->post_body_len += bytes_written;
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_stream_write_chunked(
Packit ae9e2a
	git_smart_subtransport_stream *stream,
Packit ae9e2a
	const char *buffer,
Packit ae9e2a
	size_t len)
Packit ae9e2a
{
Packit ae9e2a
	winhttp_stream *s = (winhttp_stream *)stream;
Packit ae9e2a
	int error;
Packit ae9e2a
Packit ae9e2a
	if (!s->request && winhttp_stream_connect(s) < 0)
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	if (!s->sent_request) {
Packit ae9e2a
		/* Send Transfer-Encoding: chunked header */
Packit ae9e2a
		if (!WinHttpAddRequestHeaders(s->request,
Packit ae9e2a
			transfer_encoding, (ULONG) -1L,
Packit ae9e2a
			WINHTTP_ADDREQ_FLAG_ADD)) {
Packit ae9e2a
			giterr_set(GITERR_OS, "failed to add a header to the request");
Packit ae9e2a
			return -1;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		if ((error = send_request(s, 0, 1)) < 0)
Packit ae9e2a
			return error;
Packit ae9e2a
Packit ae9e2a
		s->sent_request = 1;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (len > CACHED_POST_BODY_BUF_SIZE) {
Packit ae9e2a
		/* Flush, if necessary */
Packit ae9e2a
		if (s->chunk_buffer_len > 0) {
Packit ae9e2a
			if (write_chunk(s->request, s->chunk_buffer, s->chunk_buffer_len) < 0)
Packit ae9e2a
				return -1;
Packit ae9e2a
Packit ae9e2a
			s->chunk_buffer_len = 0;
Packit ae9e2a
		}
Packit ae9e2a
Packit ae9e2a
		/* Write chunk directly */
Packit ae9e2a
		if (write_chunk(s->request, buffer, len) < 0)
Packit ae9e2a
			return -1;
Packit ae9e2a
	}
Packit ae9e2a
	else {
Packit ae9e2a
		/* Append as much to the buffer as we can */
Packit ae9e2a
		int count = (int)min(CACHED_POST_BODY_BUF_SIZE - s->chunk_buffer_len, len);
Packit ae9e2a
Packit ae9e2a
		if (!s->chunk_buffer)
Packit ae9e2a
			s->chunk_buffer = git__malloc(CACHED_POST_BODY_BUF_SIZE);
Packit ae9e2a
Packit ae9e2a
		memcpy(s->chunk_buffer + s->chunk_buffer_len, buffer, count);
Packit ae9e2a
		s->chunk_buffer_len += count;
Packit ae9e2a
		buffer += count;
Packit ae9e2a
		len -= count;
Packit ae9e2a
Packit ae9e2a
		/* Is the buffer full? If so, then flush */
Packit ae9e2a
		if (CACHED_POST_BODY_BUF_SIZE == s->chunk_buffer_len) {
Packit ae9e2a
			if (write_chunk(s->request, s->chunk_buffer, s->chunk_buffer_len) < 0)
Packit ae9e2a
				return -1;
Packit ae9e2a
Packit ae9e2a
			s->chunk_buffer_len = 0;
Packit ae9e2a
Packit ae9e2a
			/* Is there any remaining data from the source? */
Packit ae9e2a
			if (len > 0) {
Packit ae9e2a
				memcpy(s->chunk_buffer, buffer, len);
Packit ae9e2a
				s->chunk_buffer_len = (unsigned int)len;
Packit ae9e2a
			}
Packit ae9e2a
		}
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static void winhttp_stream_free(git_smart_subtransport_stream *stream)
Packit ae9e2a
{
Packit ae9e2a
	winhttp_stream *s = (winhttp_stream *)stream;
Packit ae9e2a
Packit ae9e2a
	winhttp_stream_close(s);
Packit ae9e2a
	git__free(s);
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_stream_alloc(winhttp_subtransport *t, winhttp_stream **stream)
Packit ae9e2a
{
Packit ae9e2a
	winhttp_stream *s;
Packit ae9e2a
Packit ae9e2a
	if (!stream)
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	s = git__calloc(1, sizeof(winhttp_stream));
Packit ae9e2a
	GITERR_CHECK_ALLOC(s);
Packit ae9e2a
Packit ae9e2a
	s->parent.subtransport = &t->parent;
Packit ae9e2a
	s->parent.read = winhttp_stream_read;
Packit ae9e2a
	s->parent.write = winhttp_stream_write_single;
Packit ae9e2a
	s->parent.free = winhttp_stream_free;
Packit ae9e2a
Packit ae9e2a
	*stream = s;
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_uploadpack_ls(
Packit ae9e2a
	winhttp_subtransport *t,
Packit ae9e2a
	winhttp_stream *s)
Packit ae9e2a
{
Packit ae9e2a
	GIT_UNUSED(t);
Packit ae9e2a
Packit ae9e2a
	s->service = upload_pack_service;
Packit ae9e2a
	s->service_url = upload_pack_ls_service_url;
Packit ae9e2a
	s->verb = get_verb;
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_uploadpack(
Packit ae9e2a
	winhttp_subtransport *t,
Packit ae9e2a
	winhttp_stream *s)
Packit ae9e2a
{
Packit ae9e2a
	GIT_UNUSED(t);
Packit ae9e2a
Packit ae9e2a
	s->service = upload_pack_service;
Packit ae9e2a
	s->service_url = upload_pack_service_url;
Packit ae9e2a
	s->verb = post_verb;
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_receivepack_ls(
Packit ae9e2a
	winhttp_subtransport *t,
Packit ae9e2a
	winhttp_stream *s)
Packit ae9e2a
{
Packit ae9e2a
	GIT_UNUSED(t);
Packit ae9e2a
Packit ae9e2a
	s->service = receive_pack_service;
Packit ae9e2a
	s->service_url = receive_pack_ls_service_url;
Packit ae9e2a
	s->verb = get_verb;
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_receivepack(
Packit ae9e2a
	winhttp_subtransport *t,
Packit ae9e2a
	winhttp_stream *s)
Packit ae9e2a
{
Packit ae9e2a
	GIT_UNUSED(t);
Packit ae9e2a
Packit ae9e2a
	/* WinHTTP only supports Transfer-Encoding: chunked
Packit ae9e2a
	 * on Windows Vista (NT 6.0) and higher. */
Packit ae9e2a
	s->chunked = git_has_win32_version(6, 0, 0);
Packit ae9e2a
Packit ae9e2a
	if (s->chunked)
Packit ae9e2a
		s->parent.write = winhttp_stream_write_chunked;
Packit ae9e2a
	else
Packit ae9e2a
		s->parent.write = winhttp_stream_write_buffered;
Packit ae9e2a
Packit ae9e2a
	s->service = receive_pack_service;
Packit ae9e2a
	s->service_url = receive_pack_service_url;
Packit ae9e2a
	s->verb = post_verb;
Packit ae9e2a
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_action(
Packit ae9e2a
	git_smart_subtransport_stream **stream,
Packit ae9e2a
	git_smart_subtransport *subtransport,
Packit ae9e2a
	const char *url,
Packit ae9e2a
	git_smart_service_t action)
Packit ae9e2a
{
Packit ae9e2a
	winhttp_subtransport *t = (winhttp_subtransport *)subtransport;
Packit ae9e2a
	winhttp_stream *s;
Packit ae9e2a
	int ret = -1;
Packit ae9e2a
Packit ae9e2a
	if (!t->connection)
Packit ae9e2a
		if ((ret = gitno_connection_data_from_url(&t->connection_data, url, NULL)) < 0 ||
Packit ae9e2a
			 (ret = winhttp_connect(t)) < 0)
Packit ae9e2a
			return ret;
Packit ae9e2a
Packit ae9e2a
	if (winhttp_stream_alloc(t, &s) < 0)
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	if (!stream)
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	switch (action)
Packit ae9e2a
	{
Packit ae9e2a
		case GIT_SERVICE_UPLOADPACK_LS:
Packit ae9e2a
			ret = winhttp_uploadpack_ls(t, s);
Packit ae9e2a
			break;
Packit ae9e2a
Packit ae9e2a
		case GIT_SERVICE_UPLOADPACK:
Packit ae9e2a
			ret = winhttp_uploadpack(t, s);
Packit ae9e2a
			break;
Packit ae9e2a
Packit ae9e2a
		case GIT_SERVICE_RECEIVEPACK_LS:
Packit ae9e2a
			ret = winhttp_receivepack_ls(t, s);
Packit ae9e2a
			break;
Packit ae9e2a
Packit ae9e2a
		case GIT_SERVICE_RECEIVEPACK:
Packit ae9e2a
			ret = winhttp_receivepack(t, s);
Packit ae9e2a
			break;
Packit ae9e2a
Packit ae9e2a
		default:
Packit ae9e2a
			assert(0);
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (!ret)
Packit ae9e2a
		*stream = &s->parent;
Packit ae9e2a
Packit ae9e2a
	return ret;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static int winhttp_close(git_smart_subtransport *subtransport)
Packit ae9e2a
{
Packit ae9e2a
	winhttp_subtransport *t = (winhttp_subtransport *)subtransport;
Packit ae9e2a
Packit ae9e2a
	gitno_connection_data_free_ptrs(&t->connection_data);
Packit ae9e2a
	memset(&t->connection_data, 0x0, sizeof(gitno_connection_data));
Packit ae9e2a
	gitno_connection_data_free_ptrs(&t->proxy_connection_data);
Packit ae9e2a
	memset(&t->proxy_connection_data, 0x0, sizeof(gitno_connection_data));
Packit ae9e2a
Packit ae9e2a
	if (t->cred) {
Packit ae9e2a
		t->cred->free(t->cred);
Packit ae9e2a
		t->cred = NULL;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (t->proxy_cred) {
Packit ae9e2a
		t->proxy_cred->free(t->proxy_cred);
Packit ae9e2a
		t->proxy_cred = NULL;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	if (t->url_cred) {
Packit ae9e2a
		t->url_cred->free(t->url_cred);
Packit ae9e2a
		t->url_cred = NULL;
Packit ae9e2a
	}
Packit ae9e2a
Packit ae9e2a
	return winhttp_close_connection(t);
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
static void winhttp_free(git_smart_subtransport *subtransport)
Packit ae9e2a
{
Packit ae9e2a
	winhttp_subtransport *t = (winhttp_subtransport *)subtransport;
Packit ae9e2a
Packit ae9e2a
	winhttp_close(subtransport);
Packit ae9e2a
Packit ae9e2a
	git__free(t);
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
int git_smart_subtransport_http(git_smart_subtransport **out, git_transport *owner, void *param)
Packit ae9e2a
{
Packit ae9e2a
	winhttp_subtransport *t;
Packit ae9e2a
Packit ae9e2a
	GIT_UNUSED(param);
Packit ae9e2a
Packit ae9e2a
	if (!out)
Packit ae9e2a
		return -1;
Packit ae9e2a
Packit ae9e2a
	t = git__calloc(1, sizeof(winhttp_subtransport));
Packit ae9e2a
	GITERR_CHECK_ALLOC(t);
Packit ae9e2a
Packit ae9e2a
	t->owner = (transport_smart *)owner;
Packit ae9e2a
	t->parent.action = winhttp_action;
Packit ae9e2a
	t->parent.close = winhttp_close;
Packit ae9e2a
	t->parent.free = winhttp_free;
Packit ae9e2a
Packit ae9e2a
	*out = (git_smart_subtransport *) t;
Packit ae9e2a
	return 0;
Packit ae9e2a
}
Packit ae9e2a
Packit ae9e2a
#endif /* GIT_WINHTTP */