-
Notifications
You must be signed in to change notification settings - Fork 72
/
Copy pathHTTPRequest.ahk
995 lines (925 loc) · 52.6 KB
/
HTTPRequest.ahk
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
/*
###############################################################################################################
### HTTPRequest. Version: 2.49 ###
###############################################################################################################
HTTPRequest. Copyright © 2011-2012 [VxE]. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that
the following conditions are met:
1. Redistributions of source code must retain the above copyright notice, this list of conditions and the
following disclaimer.
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the
following disclaimer in the documentation and/or other materials provided with the distribution.
3. The name "[VxE]" may not be used to endorse or promote products derived from this software without specific
prior written permission.
THIS SOFTWARE IS PROVIDED BY [VxE] "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
SHALL [VxE] BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
(INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR
TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
THE POSSIBILITY OF SUCH DAMAGE.
*/
HTTPRequest( URL, byref In_POST__Out_Data="", byref In_Out_HEADERS="", Options="" ) { ; -----------------------
; Function by [VxE], compatible with AHK v1.0.48.05 (basic), v1.1.00.00 (AHK-L ANSI, Unicode, x64) and later.
; Special thanks to derRaphael and everyone who reported bugs and/or suggested improvements.
; Source is freely available at: http://www.autohotkey.com/forum/viewtopic.php?t=73040
; Submits one request to the specified URL with optional POST data and custom headers. Upon success, returns
; the number of bytes downloaded OR the number of characters in the response. Otherwise, returns zero and a
; description of the error is placed in 'In_Out_HEADERS'. The response body and headers are placed into
; 'In_POST__Out_Data' and 'In_Out_HEADERS' respectively, and text data is converted from the codepage stated in
; the header to the script's ANSI codepage OR to UTF-16 for unicode versions of AHK.
; "ErrorLevel" is set to '0' if there is a problem, otherwise it is set to the HTTP response code (e.g: 404).
Static version := "2.49", Ptr, W_A, PtrSize := 0, DW := "UInt", IsUnicode, MyACP, MyCharset, Default_Agent
, sws := "`t`n`r ", swp := "There was a problem ", sel := ", ErrorLevel = ", sle := ", A_LastError = "
; The default accept types are geared towards webservice response streams, which tend to be XML.
, Default_Accept_Types := "text/xml, text/json; q=0.4, text/html; q=0.3, text/*; q=0.2, */*; q=0.1"
; If you prefer, the following accept types are what firefox wants when it requests a web page.
; , Default_Accept_Types := "text/html, application/xhtml+xml, application/xml; q=0.9, */*; q=0.8"
; This list of content subtypes is not official, I just globbed together a few MIME subtypes to use as a
; whitelist for converting downloaded text to the script's codepage. If the Content-Type response header IS
; "text/..." OR one of these subtypes follows the "/", then the data is treated as text. Otherwise, the data
; is treated as binary and the user must deal with it as binary.
, Text_Content_Subtypes := "/atom/html/json/rss/soap/xhtml/xml/x-www-form-urlencoded"
; The list of internet flags and values has been condensed and obfuscated for version (09-10-2011).
; Flag values may be found here > http://msdn.microsoft.com/en-us/library/aa383661%28v=vs.85%29.aspx
, internet_flags_list := "
( LTRIM JOIN|INTERNET_FLAG_
....
NEED_FILE
MUST_CACHE_REQUEST|.
FWD_BACK|.
FORMS_SUBMIT|..
PRAGMA_NOCACHE|.
NO_UI|.
HYPERLINK|.
RESYNCHRONIZE|.
IGNORE_CERT_CN_INVALID|.
IGNORE_CERT_DATE_INVALID|.
IGNORE_REDIRECT_TO_HTTPS|.
IGNORE_REDIRECT_TO_HTTP|..
RESTRICTED_ZONE|.
NO_AUTH|.
NO_COOKIES|.
READ_PREFETCH|.
NO_AUTO_REDIRECT|.
KEEP_CONNECTION|.
SECURE|.
FROM_CACHE
OFFLINE|.
MAKE_PERSISTENT|.
DONT_CACHE|...
NO_CACHE_WRITE|.
RAW_DATA|.
RELOAD|
)"
; Update (12-10-2011): The list of security flags and values is condensed and obfuscated.
; Flag values may be found here > http://msdn.microsoft.com/en-us/library/aa385328%28v=VS.85%29.aspx
, security_flags_list := "
( LTRIM JOIN|SECURITY_FLAG_
~
SECURE|.
SSL|.
SSL3|.
PCT|.
PCT4|.
IETFSSL4|..
IGNORE_REVOCATION|.
IGNORE_UNKNOWN_CA|.
IGNORE_WRONG_USAGE|...
IGNORE_CERT_CN_INVALID|.
IGNORE_CERT_DATE_INVALID|.
IGNORE_REDIRECT_TO_HTTPS|.
IGNORE_REDIRECT_TO_HTTP|............
FORTEZZA|.
40BIT
NORMALBITNESS
STRENGTH_WEAK|.
128BIT
STRENGTH_STRONG|.
56BIT
STRENGTH_MEDIUM|.
UNKNOWNBIT|
)"
, Codepage_Charsets := "|
; Codepage list taken from here (7-2011) > http://msdn.microsoft.com/en-us/library/dd317756%28v=vs.85%29.aspx
( LTRIM JOIN|
00037=IBM037|00437=IBM437|00500=IBM500|00708=ASMO-708|00720=DOS-720|00737=ibm737|00775=ibm775|00850=ibm850
00852=ibm852|00855=IBM855|00857=ibm857|00858=IBM00858|00860=IBM860|00861=ibm861|00862=DOS-862|00863=IBM863
00864=IBM864|00865=IBM865|00866=cp866|00869=ibm869|00870=IBM870|00874=windows-874|00875=cp875
00932=shift_jis|00936=gb2312|00949=ks_c_5601-1987|00950=big5|01026=IBM1026|01047=IBM01047|01140=IBM01140
01141=IBM01141|01142=IBM01142|01143=IBM01143|01144=IBM01144|01145=IBM01145|01146=IBM01146|01147=IBM01147
01148=IBM01148|01149=IBM01149|01200=utf-16|01201=unicodeFFFE|01250=windows-1250|01251=windows-1251
01252=Windows-1252|01253=windows-1253|01254=windows-1254|01255=windows-1255|01256=windows-1256
01257=windows-1257|01258=windows-1258|01361=Johab|10000=macintosh|10001=x-mac-japanese
10002=x-mac-chinesetrad|10003=x-mac-korean|10004=x-mac-arabic|10005=x-mac-hebrew|10006=x-mac-greek
10007=x-mac-cyrillic|10008=x-mac-chinesesimp|10010=x-mac-romanian|10017=x-mac-ukrainian|10021=x-mac-thai
10029=x-mac-ce|10079=x-mac-icelandic|10081=x-mac-turkish|10082=x-mac-croatian|12000=utf-32|12001=utf-32BE
20000=x-Chinese-CNS|20001=x-cp20001|20002=x-Chinese-Eten|20003=x-cp20003|20004=x-cp20004|20005=x-cp20005
20105=x-IA5|20106=x-IA5-German|20107=x-IA5-Swedish|20108=x-IA5-Norwegian|20127=us-ascii|20261=x-cp20261
20269=x-cp20269|20273=IBM273|20277=IBM277|20278=IBM278|20280=IBM280|20284=IBM284|20285=IBM285|20290=IBM290
20297=IBM297|20420=IBM420|20423=IBM423|20424=IBM424|20833=x-EBCDIC-KoreanExtended|20838=IBM-Thai
20866=koi8-r|20871=IBM871|20880=IBM880|20905=IBM905|20924=IBM00924|20932=EUC-JP|20936=x-cp20936
20949=x-cp20949|21025=cp1025|21866=koi8-u|28591=iso-8859-1|28592=iso-8859-2|28593=iso-8859-3|28594=iso-8859-4
28595=iso-8859-5|28596=iso-8859-6|28597=iso-8859-7|28598=iso-8859-8|28599=iso-8859-9|28603=iso-8859-13
28605=iso-8859-15|29001=x-Europa|38598=iso-8859-8-i|50220=iso-2022-jp|50221=csISO2022JP|50222=iso-2022-jp
50225=iso-2022-kr|50227=x-cp50227|51932=euc-jp|51936=EUC-CN|51949=euc-kr|52936=hz-gb-2312|54936=GB18030
57002=x-iscii-de|57003=x-iscii-be|57004=x-iscii-ta|57005=x-iscii-te|57006=x-iscii-as|57007=x-iscii-or
57008=x-iscii-ka|57009=x-iscii-ma|57010=x-iscii-gu|57011=x-iscii-pa|65000=utf-7|65001=utf-8|
)"
; Step 1: Initialize variables, first the static variables for unknown constants.
If !( PtrSize )
{
If ( "" = PtrSize := A_PtrSize ) ; Check for 64 bit environment and pointer type.
PtrSize := 4, Ptr := DW
Else Ptr := "Ptr"
If !( IsUnicode := 1 = A_IsUnicode ) ; Check for unicode (wide char) environment
; GetACP > http://msdn.microsoft.com/en-us/library/ms905215.aspx
W_A := "A", MyACP := SubStr( 100000.0 + DllCall("GetACP"), 2, 5 )
; There is no error check on GetACP because it's extraordinarily unlikely to fail.
Else W_A := "W", MyACP := "01200" ; UTF-16
; Detect the active codepage and look up the charset identifier for it (default = UTF-8)
MyCharset := ( 7 = pos := 7 + InStr( Codepage_Charsets, "|" MyACP "=" ) ) ? "UTF-8"
: SubStr( Codepage_Charsets, pos, InStr( Codepage_Charsets, "|", 0, pos ) - pos )
SplitPath, A_ScriptName,,,, Default_Agent
Default_Agent .= "/1.0 (Language=AutoHotkey/" A_AhkVersion "; Platform=" A_OSVersion ")"
}
; Initialize local variables
Internet_Open_Type := 1 ; INTERNET_OPEN_TYPE_DIRECT = 1 ; _PRECONFIG = 0 ; _PROXY = 3
Security_Flags := Security_Flags_Add := Security_Flags_Nix := 0
Response_Code := "0" ; despite being digits, always treat the response code as a string.
Do_Callback := 0
Do_NonBinary_Up := 0
Do_Binary_Down := 0
Do_Up_MD5_Hash := 0
Do_File_Upload := 0
Do_Multipart := 0
Do_Download_To_File := 0
Do_Download_Resume := 0
Do_Legacy_Dual_Output := 0 ; deprecated in v2.46+
Agent := Default_Agent
Accept_Types := Default_Accept_Types
Expected_Type := "text/plain; charset=utf-8"
Multipart_Boundary := ""
proxy_bypass := ""
Method_Verb := ""
MyErrors := ""
dbuffsz := 0
port := 0
dtsz := 0
hWinINet := hInternet := hConnection := hRequest := hProv := hHash := 0 ; init these as null handles
Convert_POST_To_Codepage := MyACP
; Initialize typical flags for a normal request. These can be modified with the 'Options' parameter.
Internet_Flags := 0
| 0x400000 ; INTERNET_FLAG_KEEP_CONNECTION
| 0x80000000 ; INTERNET_FLAG_RELOAD
| 0x20000000 ; INTERNET_FLAG_NO_CACHE_WRITE
StringLen, Content_Length, In_POST__Out_Data ; get the auto-content-length. this may get overwritten.
Content_Length <<= IsUnicode
; Step 2: Crack the url into its components. WinINet\InternetCrackURL limits the url to about 2060
; characters, which is unacceptable, especially for a function designed to service web APIs.
hbuffer := swp "parsing the URL: """ URL """`n" ; pre-generate the bad-url error
; Crack the scheme (setting it to 'http' if omitted, allowing a url like "www.***.com")
If ( pos := InStr( URL, "://" ) )
{
StringLeft, scheme, URL, pos - 1
StringLower, scheme, scheme
StringTrimLeft, URL, URL, pos + 2
If ( scheme = "https" ) ; Connect using SSL. Add the following internet flags:
Internet_Flags |= 0x1000 ; INTERNET_FLAG_IGNORE_CERT_CN_INVALID
| 0x2000 ; INTERNET_FLAG_IGNORE_CERT_DATE_INVALID
| 0x800000 ; INTERNET_FLAG_SECURE ; Technically, this is redundant for https
Else If ( scheme != "http" )
MyErrors .= swp "parsing the URL: HTTPRequest does not support '" scheme "' type connections.`n"
}
Else scheme := "http"
; Crack the path and query (leave them joined as one string because that's how HttpOpenRequest accepts them).
StringLeft, host, URL, pos := InStr( URL "/", "/" ) - 1
StringTrimLeft, URL, URL, pos
; Crack the username and password from the host (if present).
If ( pos := InStr( host, "@" ) )
{
StringLeft, user, host, pos - 1
StringTrimLeft, host, host, pos
If ( pos := InStr( user, ":" ) )
{
StringTrimLeft, pass, user, pos
StringLeft, user, user, pos - 1
}
Else pass := ""
}
Else user := pass := ""
; Crack the port from the host. If the host looks like a bracketed IP literal, look for the colon
; to the right of the close-bracket. Default port is 80 for HTTP and 443 for HTTPS
If ( pos := InStr( host, ":", 0, InStr( host, "[" ) = 1 ? InStr( host, "]" ) + 1 : 1 ) )
&& ( 0 < port := 0 | SubStr( host, pos + 1 ) ) && ( port < 65536 )
{
StringTrimLeft, port, host, pos
StringLeft, host, host, pos - 1
}
Else port := scheme = "https" ? 443 : 80
; Return error if the host is blank (don't check for other format errors).
If ( host = "" )
MyErrors .= hbuffer
; Step 3: Parse the request headers so we can copy them to an internal buffer, make them pretty, and
; handle special headers (like acceptable mime types, user agent and content specs).
StringLen, pos, In_Out_HEADERS
VarSetCapacity( hbuffer, 1 + pos << IsUnicode )
hbuffer := "`r`n"
Loop, Parse, In_Out_HEADERS, `n
{
pos := InStr( A_LoopField ":", ":" )
rbuffer := SubStr( A_LoopField, 1, pos - 1 ) "`n" SubStr( A_LoopField, pos + 1 )
Loop, Parse, rbuffer, `n, %sws%
If ( A_Index = 1 )
rbuffer := A_LoopField
Else If ( A_LoopField = "" )
{
If ( rbuffer != "Content-MD5" )
Continue
Else If !( Do_Up_MD5_Hash := DllCall( "LoadLibrary" W_A, "Str", "Advapi32.dll" ) )
MyErrors .= swp "loading Advapi32.dll to calculate the Content-MD5 header. 'LoadLibrary" W_A "' failed" sel ErrorLevel sle A_LastError "`n"
; CryptAcquireContext > http://msdn.microsoft.com/en-us/library/aa379886%28v=vs.85%29.aspx
Else If !DllCall( "Advapi32\CryptAcquireContext" W_A, Ptr "*", hProv := 0, Ptr, 0, Ptr, 0, DW, 1, DW, 0xF0000000 )
MyErrors .= swp "acquiring the key container to calculate the Content-MD5 header. 'CryptAcquireContext' failed" sel ErrorLevel sle A_LastError "`n"
; CryptCreateHash > http://msdn.microsoft.com/en-us/library/aa379908%28v=vs.85%29.aspx
Else If !DllCall( "Advapi32\CryptCreateHash", Ptr, hProv, DW, 0x8003, Ptr, 0, DW, 0, Ptr "*", hHash := 0 )
MyErrors .= swp "creating the hash object to calculate the Content-MD5 header. 'CryptCreateHash' failed" sel ErrorLevel sle A_LastError "`n"
; NOTE: If the user wants an auto-Content-MD5, but there is a problem, abort the entire request.
}
Else If ( rbuffer = "Accept" )
Accept_Types := A_LoopField
Else If ( rbuffer = "Content-Length" ) && ( 0 < 1 | A_LoopField )
Content_Length := A_LoopField
Else If ( rbuffer = "Content-Type" )
{
hbuffer .= "Content-Type: " A_LoopField "`r`n"
StringReplace, Multipart_Boundary, A_LoopField, % ",", % ";", A
If ( 7 != pos := 7 + InStr( Multipart_Boundary, "charset=" ) )
&& ( pos := InStr( Codepage_Charsets, SubStr( Multipart_Boundary, pos
, InStr( Multipart_Boundary ";" , ";", 0, pos ) - pos ) "|" ) )
StringMid, Convert_POST_To_Codepage, Codepage_Charsets, pos - 5, 5
; NOT YET IMPLEMENTED: detect multipart content and determine the boundary
Multipart_Boundary := ( InStr( A_LoopField, "Multipart/" ) != 1
|| 9 = pos := 9 + InStr( Multipart_Boundary, "boundary=" ) ) ? ""
: SubStr( Multipart_Boundary, pos, InStr( Multipart_Boundary ";", ";" ) - pos )
}
Else If ( rbuffer = "Referrer" )
hbuffer .= "Referer: " A_LoopField "`r`n"
Else If ( rbuffer = "User-Agent" )
Agent := A_LoopField
Else hbuffer .= rbuffer ": " A_LoopField "`r`n"
}
; Automatically add the 'no cookies' flag if the user specified a custom cookie. The flag actually tells
; wininet not to automatically handle cookies (which 'automatically' ignores custom cookie headers).
IfInString, hbuffer, % "`r`nCookie: "
options .= "`n+NO_COOKIES"
; Step 4: Extract the multipart envelope from the options parameter, then parse the options normally.
If ( 4 < dtsz := 4 + StrLen( Multipart_Boundary ) ) && ( pos := InStr( options, "--" Multipart_Boundary ) )
&& ( ( dtsz + 0 ) != ( dtsz += InStr( options, "--" Multipart_Boundary "--", 0, 0 ) ) )
{
StringMid, Multipart_Envelope, options, pos, dtsz - pos
options := SubStr( options, 1, pos - 1 ) SubStr( options, dtsz )
; Do_Multipart := 1 ; NOT YET IMPLEMENTED
}
Loop, Parse, options, `n
{
If InStr( A_LoopField, ">" ) + 3 >> 2 = 1
{
; Handle the legacy output-file syntax
Loop, Parse, A_LoopField, >, %sws%
If ( A_Index = 1 )
options := ( InStr( A_LoopField, "R" ) ? "RESUME`n" : "SAVEAS`n" )
;, Do_Legacy_Dual_Output := !!InStr( A_LoopField, "N" )
Else options .= A_LoopField
}
Else
{
If ( ( pos := InStr( A_LoopField, ":" ) ) && ( pos < InStr( A_LoopField ":\", ":\" ) ) )
|| ( pos := InStr( A_LoopField, "=" ) )
|| ( pos := InStr( A_LoopField, " ", 0, 1 + InStr( A_LoopField, " BYPASS" ) ) )
|| ( pos := 1 + StrLen( A_LoopField ) )
options := SubStr( A_LoopField, 1, pos - 1 ) "`n" SubStr( A_LoopField, pos + 1 )
}
Loop, Parse, options, `n, %sws%
If ( A_Index = 1 )
StringUpper, options, A_LoopField
; AutoProxy option: use IE's proxy configuration
Else If ( options = "AUTOPROXY" )
Internet_Open_Type := !!A_LoopField || A_LoopField = "" ? 0 : 1
; Binary option: do not attempt to convert downloaded data to the script's codepage.
Else If ( options = "BINARY" )
Do_Binary_Down := !!A_LoopField || A_LoopField = ""
; Callback option: inform a function in the script about the transaction progress
Else If ( options = "CALLBACK" )
{
If ( pos := InStr( A_LoopField, "," ) ) || ( pos := InStr( A_LoopField, ";" ) )
|| ( pos := InStr( A_LoopField, "`t" ) ) || ( pos := InStr( A_LoopField, " " ) )
{
Do_Callback_Func := SubStr( A_LoopField, 1, pos - 1 ) "`n" SubStr( A_LoopField, pos + 1 )
Loop, Parse, Do_Callback_Func, `n, %sws%
If ( A_Index = 1 )
Do_Callback_Func := A_LoopField
Else Do_Callback_3rdParam := A_LoopField
}
Else Do_Callback_Func := A_LoopField
Do_Callback := IsFunc( Do_Callback_Func ) + 3 >> 2 = 1 ; OK if 1, 2, 3, or 4
cfc := "The callback function """ Do_Callback_Func """ returned 'CANCEL' to cancel the transaction. "
}
; Charset option: convert POST text's codepage before uploading it
Else If ( options = "CHARSET" )
Do_NonBinary_Up := !( pos := InStr( Codepage_Charsets, "=" A_LoopField "|" ) ) ? Convert_POST_To_Codepage
: SubStr( Codepage_Charsets, pos - 5, 5 )
; CheckMD5 option: deprecated. The Advapi32-based MD5 calc happens in-line with the data download
; NOTE: the MD5 will be still be checked (as "Computed-MD5") if "Content-MD5" is in the response headers.
; Else If ( options = "CHECKMD5" ) || ( options = "CHECK MD5" )
; Do_Dn_MD5_Hash := 1
; Codepage option: convert POST text's codepage before uploading it
Else If ( options = "CODEPAGE" )
Do_NonBinary_Up := ( A_LoopField | 0 < 1 || A_LoopField >> 16 ) ? Convert_POST_To_Codepage
: ( Convert_POST_To_Codepage := SubStr( A_LoopField + 100000.0, 2, 5 ) )
; Expect option: declare the expected response content type. This only comes into play if the response
; headers don't contain the 'Content-Type' header, or if text-type response doesn't have the 'charset'
Else If ( options = "EXPECT" )
{
If InStr( A_LoopField, "charset=" ) = 1
Expected_Type := SubStr( Expected_Type, 1, InStr( Expected_Type, "charset" ) - 1 ) A_LoopField
Else Expected_Type := A_LoopField
}
; Flags option: add or remove flags
Else If InStr( options, "+" ) = 1 || InStr( options, "-" ) = 1
{
; When handling flag options, first determine whether the flag is being added or removed.
StringLeft, flag_plus_or_minus, options, 1
; For backwards compatibility, support the "+FLAG: <flag id>" syntax.
If ( options = "+FLAG" ) || ( options = "-FLAG" )
Loop, Parse, A_LoopField, `n, %sws%+-_
StringUpper, options, A_LoopField
Else
Loop, Parse, options, `n, %sws%+-_ ; trim whitespace and +, -, and _
StringUpper, options, A_LoopField
; Determine whether the flag is a security flag or a regular flag and get its value
If ( pos := InStr( internet_flags_list, "|" options "|" ) )
|| ( pos := InStr( internet_flags_list, "|INTERNET_FLAG_" options "|" ) )
{
StringLeft, options, internet_flags_list, pos
StringReplace, options, options, ., ., UseErrorLevel
If ( flag_plus_or_minus = "+" )
Internet_Flags |= 1 << ErrorLevel
Else Internet_Flags &= ~( 1 << ErrorLevel )
}
; Look in the security flags for one with this name (or this short name)
Else If ( pos := InStr( security_flags_list, "|" options "|" ) )
|| ( pos := InStr( security_flags_list, "|SECURITY_FLAG_" options "|" ) )
{
StringLeft, options, security_flags_list, pos
StringReplace, options, options, ., ., UseErrorLevel
If ( flag_plus_or_minus = "+" )
Security_Flags_Add |= 1 << ErrorLevel
Else Security_Flags_Nix |= 1 << ErrorLevel
}
; If the first letter is an 'S', and the rest is an INT power of 2, it's a security flag
Else If ( InStr( options, "S" ) = 1 ) && ( 0 < pos := Abs( SubStr( options, 2 ) ) )
&& ( pos = 1 << Round( Ln( pos ) / Ln(2) ) )
{
If ( flag_plus_or_minus = "+" )
Security_Flags_Add |= pos
Else Security_Flags_Nix |= pos
}
; If it is an INT power of 2, treat it as an internet flag
Else If ( 0 < pos := Abs( options ) ) && ( pos = 1 << Round( Ln( pos ) / Ln(2) ) )
If ( flag_plus_or_minus = "+" )
Internet_Flags |= pos
Else Internet_Flags &= ~pos
}
; Method option: use a different verb when creating the request
Else If ( options = "METHOD" ) && InStr( "|GET|HEAD|POST|PUT|DELETE|OPTIONS|TRACE|", "|" A_LoopField "|" )
StringUpper, Method_Verb, A_LoopField
; Proxy option: use the indicated URL as the proxy server for this request.
Else If ( options = "PROXY" )
Internet_Open_Type := 3, proxy_url := A_LoopField
; Proxy Bypass option: the URL should not beaccessed through the proxy.
Else If ( options = "PROXY BYPASS" ) || ( options = "BYPASS" )
proxy_bypass .= A_LoopField "`r`n"
; Resume OR SaveAs options: download the data to the hard drive and NOT to memory
Else If ( options = "RESUME" ) || ( options = "SAVEAS" ) || ( options = "SAVE AS" )
{
Do_Download_To_File := 1
file_ext := FileExist( output_file_path := A_LoopField )
If ( file_ext = "" )
{
; The file does not exist, so make sure the folder it belong to DOES exist
If ( pos := InStr( output_file_path, "\", 0, 0 ) )
&& ! FileExist( SubStr( output_file_path, 1, pos - 1 ) )
MyErrors .= "The file path """ output_file_path """ is not valid. The folder can't be found.`n"
}
Else If InStr( file_ext, "D" )
{
; The user only gave us a path to a folder. We'll have to figure out the filename from the url
file_ext := "V://x/E/" url
SplitPath, file_ext, file_ext
StringLeft, file_ext, file_ext, InStr( file_ext "?", "?" ) - 1
output_file_path .= ( SubStr( output_file_path, 0 ) = "\" ? "" : "\" )
. ( file_ext = "" ? "HTTPRequest " A_Year "-" A_MM "-" A_DD "_" SubStr( A_Now A_MSec, 9 ) ".txt" : file_ext )
}
Else If ( options = "RESUME" )
{
; The file exists, so the path is OK. Check if the user wants to resume a download.
FileGetSize, Do_Download_Resume, % output_file_path
hbuffer .= "Range: bytes=" Do_Download_Resume "-`r`n"
}
}
; Upload option: use a file on the disk as the data source for the file upload.
Else If ( options = "UPLOAD" ) && !( Do_File_Upload ) ; ignore 'extra' upload options
{
; Update (2-28-2012, v2.45) change how the upload file is handled. Upon resolving the option,
; attempt to open the file with GENERIC_READ permission (0x80000000) and receive a handle to it.
; If that is successful, then get its size. This is meant to streamline the upload process and
; is necessary for the overhauled Content-MD5.
Loop, % A_LoopField, 0, 0
{
Upload_File_Path := A_LoopFileFullPath ; the file loop verifies that the target is a FILE
; CreateFile > http://msdn.microsoft.com/en-us/library/aa363858%28v=vs.85%29.aspx
If !( Do_File_Upload := DllCall( "CreateFile" W_A, Ptr, &Upload_File_Path, DW, 0x80000000, DW, 0, Ptr, 0, DW, 4, DW, 0, Ptr, 0, Ptr ) )
MyErrors .= swp "opening the file to upload """ Upload_File_Path """. 'CreateFile" W_A "' failed" sel ErrorLevel sle A_LastError "`n"
; GetFileSizeEx > http://msdn.microsoft.com/en-us/library/aa364957%28v=vs.85%29.aspx
Else If !DllCall( "GetFileSizeEx", Ptr, Do_File_Upload, "Int64*", Content_Length )
MyErrors .= swp "determining the size of the file to upload """ Upload_File_Path """. 'GetFileSizeEx' failed" sel ErrorLevel sle A_LastError "`n"
Break
}
}
}
StringTrimRight, proxy_bypass, proxy_bypass, 2 ; chop trailing CRLF
; Step 5: copy the POST data from the input variable to a local buffer. This is to protect the data
; from being altered or released during the upload (which may take a while). Also check whether
; the user wants to change the character encoding of text-type data (e.g: from UTF-16 to UTF-8).
; Also, even if we're uploading from a file, 'dbuffsz' must be the number of bytes in the data.
If ( 0 < Content_Length ) && ( MyErrors = "" )
{
If ( Do_File_Upload )
{
; If we're doing a file upload, do NOT copy the files contents to a buffer yet. DO make
; sure the content-type header is present.
VarSetCapacity( dbuffer, 4096, 0 )
dbuffsz := Content_Length := SubStr( Content_Length + 0.0, 1, 1 + FLOOR( LOG( Content_Length )))
hbuffer .= "Content-Length: " Content_Length "`r`n"
SplitPath, Upload_File_Path,,, file_ext ; Only use the upload file's ext for the auto-type.
If !InStr( hbuffer, "`r`nContent-Type: " )
hbuffer .= "Content-Type: " ( file_ext = "xml" ? "text/xml"
: file_ext = "txt" ? "application/x-www-form-urlencoded"
: "application/octet-stream" ) "`r`n"
}
Else If !( Do_NonBinary_Up ) || ( Do_NonBinary_Up = MyACP ) || ( Do_Multipart )
{
; Either the POST is binary data or is already in the desired encoding, so just copy it.
VarSetCapacity( dbuffer, dbuffsz := Content_Length, 0 )
DllCall( "RtlMoveMemory", Ptr, &dbuffer, Ptr, &In_POST__Out_Data, DW, Content_Length )
Content_Length := SubStr( Content_Length + 0.0, 1, 1 + FLOOR( LOG( Content_Length )))
hbuffer .= "Content-Length: " Content_Length "`r`n"
IfNotInString, hbuffer, % "`r`nContent-Type: "
hbuffer .= "Content-Type: " ( InStr( dbuffer, "<?xml" ) + 3 >> 2 = 1 ? "text/xml"
: "application/x-www-form-urlencoded" ) "; charset=" MyCharset "`r`n"
}
Else
{
; Change the character encoding while copying the POST data into the local buffer.
IfNotInString, hbuffer, % "`r`nContent-Type: "
{
hbuffer .= "Content-Type: " ( InStr( dbuffer, "<?xml" ) + 3 >> 2 = 1 ? "text/xml"
: "application/x-www-form-urlencoded" )
If ( 7 != pos := 7 + InStr( Codepage_Charsets, "|" Do_NonBinary_Up "=" ) )
hbuffer .= "; charset=" SubStr( Codepage_Charsets, pos, InStr( Codepage_Charsets, "|", 0, pos ) - pos )
hbuffer .= "`r`n"
}
If ( IsUnicode )
pos := &In_POST__Out_Data, rbuffsz := Content_Length >> 1
Else
{
; If this isn't a UTF-16 environment, convert the POST data to UTF-16. rbuffsz = bytes
If ( 0 < rbuffsz := DllCall( "MultiByteToWideChar", DW, MyACP, DW, 0, Ptr, &In_POST__Out_Data, DW, Content_Length, Ptr, 0, DW, 0 ) )
{
VarSetCapacity( rbuffer, rbuffsz + 1 << 1, 0 )
; MultiByteToWideChar > http://msdn.microsoft.com/en-us/library/dd319072%28v=vs.85%29.aspx
DllCall( "MultiByteToWideChar", DW, MyACP, DW, 0, Ptr, &In_POST__Out_Data, DW, Content_Length, Ptr, pos := &rbuffer, DW, rbuffsz )
}
Else MyErrors .= swp "converting codepage " MyACP " to " Convert_POST_To_Codepage ". 'MultiByteToWideChar' failed: Return value = " rbuffsz sel ErrorLevel sle A_LastError "`n"
}
; Convert the UTF-16 string to a multi-byte string in the chosen codepage
If ( 0 < rbuffsz ) ; a zero or negative length here indicates a prior error
If ( 0 < dbuffsz := DllCall( "WideCharToMultiByte", DW, Do_NonBinary_Up, DW, 0, Ptr, pos, DW, rbuffsz, Ptr, 0, DW, 0, Ptr, 0, Ptr, 0 ) )
{
VarSetCapacity( dbuffer, dbuffsz + 1, 0 )
; WideCharToMultiByte > http://msdn.microsoft.com/en-us/library/dd374130%28v=vs.85%29.aspx
DllCall( "WideCharToMultiByte", DW, Do_NonBinary_Up, DW, 0, Ptr, pos, DW, rbuffsz, Ptr, &dbuffer, DW, dbuffsz, Ptr, 0, Ptr, 0 )
Content_Length := SubStr( dbuffsz + 0.0, 1, 1 + FLOOR( LOG( dbuffsz )))
hbuffer .= "Content-Length: " Content_Length "`r`n"
}
Else MyErrors .= swp "converting codepage " MyACP " to " Convert_POST_To_Codepage ". 'WideCharToMultiByte' failed: Return value = " dbuffsz sel ErrorLevel sle A_LastError "`n"
VarSetCapacity( rbuffer, 0 ) ; free this temporary buffer
}
If ( Do_Up_MD5_Hash ) ; The user wants HTTPRequest to auto-calculate the Content-MD5 header.
{
; Update (2-28-2012, v2.45) - use Advapi32.dll to calculate the MD5 hash.
VarSetCapacity( rbuffer, 20, 0 )
rbuffer := 0
If !( Do_File_Upload ) && !DllCall( "Advapi32\CryptHashData", Ptr, hHash, Ptr, &dbuffer, DW, Content_Length, DW, 0 )
MyErrors .= swp "adding data to the hash object. 'CryptHashData' failed" sel ErrorLevel sle A_LastError "`n"
If ( Do_File_Upload )
{
Loop
If !DllCall( "ReadFile", Ptr, Do_File_Upload, Ptr, &dbuffer, DW, Content_Length - rbuffer < 4096 ? Content_Length - rbuffer : 4096, DW "*", dtsz, Ptr, 0 )
{
MyErrors .= swp "reading from the file """ Upload_File_Path """. 'ReadFile' failed" sel ErrorLevel sle A_LastError "`n"
Break
}
Else If !DllCall( "Advapi32\CryptHashData", Ptr, hHash, Ptr, &dbuffer, DW, dtsz, DW, 0 )
{
MyErrors .= swp "adding data to the hash object. 'CryptHashData' failed" sel ErrorLevel sle A_LastError "`n"
Break
}
Else If ( Content_Length <= rbuffer += dtsz )
Break
If !DllCall( "SetFilePointerEx", Ptr, Do_File_Upload, "Int64", 0, Ptr, 0, DW, 0 )
MyErrors .= swp "resetting the pointer on the upload file. 'SetFilePointerEx' failed" sel ErrorLevel sle A_LastError "`n"
}
; Get the hash bytes and convert it to base 64, then set it as the Content-MD5 header's value
If !DllCall( "Advapi32\CryptGetHashParam", Ptr, hHash, DW, 2, Ptr, &rbuffer, DW "*", pos := 16, DW, 0 )
MyErrors .= swp "getting the hash value. 'CryptGetHashParam' failed" sel ErrorLevel sle A_LastError "`n"
hbuffer .= "Content-MD5: "
Loop, 18
{
pos := *( &rbuffer + A_Index - 1 ) | (( 0xFFFF & pos ) << 8 )
Loop % !Mod( A_Index, 3 ) * 4
dtsz := 63 & ( pos >> 24 - 6 * A_Index ), hbuffer .= Chr( dtsz < 26 ? dtsz
+ 65 : dtsz < 52 ? dtsz + 71 : dtsz < 62 ? dtsz - 4 : dtsz = 62 ? 43 : 47 )
}
StringTrimRight, hbuffer, hbuffer, 2
hbuffer .= "==`r`n"
}
; Set up an INTERNET_BUFFERS structure in preparation for calling HttpSendRequestEx
; Update 2.44 - the 'dswsructSize' member of the INTERNET_BUFFERS struct is padded on x64 systems to
; align the next parameter (a pointer) to 64-bits.
pos := 24 + PtrSize * 4 ; 40 bytes on x86 systems, 56 bytes on x64
VarSetCapacity( INTERNET_BUFFERS, pos, 0 )
NumPut( pos, INTERNET_BUFFERS, 0, DW )
NumPut( Content_Length, INTERNET_BUFFERS, pos - 12, DW )
}
; If needed, clean up the resources for the upload hash.
If ( Do_Up_MD5_Hash ) && !DllCall( "Advapi32\CryptDestroyHash", Ptr, hHash )
MyErrors .= swp "releasing the hash object. 'CryptDestroyHash' failed" sel ErrorLevel sle A_LastError "`n"
If ( Do_Up_MD5_Hash ) && !DllCall( "Advapi32\CryptReleaseContext", Ptr, hProv, DW, 0 )
MyErrors .= swp "releasing the key container. 'CryptReleaseContext' failed" sel ErrorLevel sle A_LastError "`n"
If ( Do_Up_MD5_Hash )
DllCall( "FreeLibrary", Ptr, Do_Up_MD5_Hash )
; Update (future): assemble multipart/form-data here by combining the text from 'options' with
; the data the user wants to upload. How it works: the text portion of the multipart data is split
; at the first instance of "<MY DATA GOES HERE>", and the data buffer is expanded to account for the
; length of the data plus the (codepage converted) lengths of the two portions. The, the first
; portion is copied or converted and placed into the front of the data buffer. The data is copied
; to the right of that, and finally, the second portion is copied or converted to the right of that.
/*
If ( Do_Multipart )
{
; The multipart envelope is baked here. The text is split at "<MY DATA GOES HERE>" and the two
; parts are converted to the desired codepage. When the upload begins, the first chunk(s) begin
; with the first part of the envelope, and the last chunk(s) end with the second. Doing it
; piecemeal like this is the simplest way to support disk and memory sources for the data.
; NOTE: when doing file-uploads WITH multipart/form-data, do NOT cache the file's data, instead
; modify the first and last chunk to begin and end with the respective parts of the envelope.
; Store the length of the first part of the envelope in "Do_Multipart"
; Don't forget to change the Content-Length to the real size of the eventual data.
StringGetPos, Do_Multipart, Multipart_Envelope, <MY DATA GOES HERE>
}
*/
; Step 6: Build the pointer array for the accept types string
; The trick to this step is actually leaving all of the accept types in one string, then building
; the pointer array using the address + position of each member, then inserting nulls to make it
; look like a collection of independent null-terminated strings.
; First thing is to replace delimiting commas with newlines (but not quoted literal commas).
Loop, Parse, Accept_Types, "
If ( A_Index = 1 )
StringReplace, Accept_Types, A_LoopField, `,, `n, A
Else If ( A_Index & 1 )
{
StringReplace, Accept_PtrArray, A_LoopField, `,, `n, A
Accept_Types .= Accept_PtrArray
}
Else Accept_Types .= """" A_LoopField """"
; Then trim whitespace around the delimiters and count how many accept-types there are
Loop, Parse, Accept_Types, `n, %sws%
If ( 1 = pos := A_Index )
Accept_Types := A_LoopField
Else Accept_Types .= "`n" A_LoopField
; Wipe the variable we'll use as the pointer array. The array itself should be null-terminated, so add an extra member.
VarSetCapacity( Accept_PtrArray, pos * PtrSize + PtrSize, 0 )
pos := 0
; For each member, put the address + offset into the pointer array, then end it with a null.
Loop, Parse, Accept_Types, `n
{
NumPut( &Accept_Types + pos, Accept_PtrArray, A_Index * PtrSize - PtrSize, Ptr )
pos += 1 + StrLen( A_LoopField ) << IsUnicode
NumPut( 0, Accept_Types, pos - 1 - IsUnicode, IsUnicode ? "UShort" : "UChar" )
}
; Set the default HTTP verb to 'POST' if there is data to upload, 'GET' otherwise.
Method_Verb := Method_Verb != "" ? Method_Verb : 0 < Content_Length ? "POST" : "GET"
; Trim the leading CRLF from the headers buffer.
StringTrimLeft, hbuffer, hbuffer, 2
; Do an error check before we load WinINet. If we have errors, don't continue.
; Afterwards, if we encounter errors, don't simply return but continue to the cleanup step.
If ( MyErrors != "" )
{
If ( Do_File_Upload ) && !DllCall( "CloseHandle", Ptr, Do_File_Upload )
MyErrors .= swp "closing the file """ Upload_File_Path """. 'CloseHandle' failed" sel ErrorLevel sle A_LastError "`n"
StringTrimRight, In_Out_HEADERS, MyErrors, 1
Return 0, ErrorLevel := Response_Code
}
; Step 7: Load WinINet.dll and initialize the internet connection and request.
; Kernel32.dll\LoadLibrary > http://msdn.microsoft.com/en-us/library/ms684175%28v=VS.85%29.aspx
If !( hWinINet := DllCall( "LoadLibrary" W_A, "Str", "WinINet.dll", Ptr ) )
MyErrors .= swp "loading WinINet.dll. 'LoadLibrary" W_A "' failed: Return value = " hWinINet sel ErrorLevel sle A_LastError "`n"
; Initialize WinINet. InternetOpen > http://msdn.microsoft.com/en-us/library/aa385096%28v=VS.85%29.aspx
Else If !( hInternet := Internet_Open_Type != 3 ? DllCall( "WinINet\InternetOpen" W_A, Ptr, &Agent, DW, Internet_Open_Type, Ptr, 0, Ptr, 0, DW, 0, Ptr )
: DllCall( "WinINet\InternetOpen" W_A, Ptr, &Agent, DW, 3, ptr, &proxy_url, Ptr, proxy_bypass = "" ? 0 : &proxy_bypass, DW, 0, Ptr ) )
MyErrors .= swp "initializing WinINet. 'WinINet\InternetOpen" W_A "' failed: Return value = " hInternet sel ErrorLevel sle A_LastError "`n"
; Open a HTTP session. InternetConnect > http://msdn.microsoft.com/en-us/library/aa384363%28v=VS.85%29.aspx
; dwService -> INTERNET_SERVICE_HTTP = 3
Else If !( hConnection := DllCall( "WinINet\InternetConnect" W_A, Ptr, hInternet, Ptr, &Host, DW, Port, Ptr, &User, Ptr, &Pass, DW, 3, DW, Internet_Flags, DW, 0, Ptr ) )
MyErrors .= swp "opening a HTTP session. 'WinINet\InternetConnect" W_A "' failed: Return value = " hConnection sel ErrorLevel sle A_LastError "`n"
; Create a HTTP request. HttpOpenRequest > http://msdn.microsoft.com/en-us/library/aa384233%28v=VS.85%29.aspx
Else If !( hRequest := DllCall( "WinINet\HttpOpenRequest" W_A, Ptr, hConnection, Ptr, &Method_Verb, Ptr, &URL, "Str", "HTTP/1.1", Ptr, 0, Ptr, &Accept_PtrArray, DW, Internet_Flags, Ptr ) )
MyErrors .= swp "creating a HTTP request. 'WinINet\HttpOpenRequest" W_A "' failed: Return value = " hRequest sel ErrorLevel sle A_LastError "`n"
; Add headers. HttpAddRequestHeaders > http://msdn.microsoft.com/en-us/library/aa384227%28v=VS.85%29.aspx
; dwModifiers = (HTTP_ADDREQ_FLAG_ADD = 0x20000000) + (HTTP_ADDREQ_FLAG_REPLACE = 0x80000000)
Else If ( hbuffer != "" ) && !DllCall( "WinINet\HttpAddRequestHeaders" W_A, Ptr, hRequest, Ptr, &hbuffer, DW, StrLen( hbuffer ), DW, 0xA0000000 )
MyErrors .= swp "adding one or more headers to the request. 'WinINet\HttpAddRequestHeaders" W_A "' failed" sel ErrorLevel sle A_LastError "`nHeaders:`n" hbuffer
; Update (12-28-2011): Added security flags support. Security flags may be added/removed like normal flags
; InternetQueryOption > http://msdn.microsoft.com/en-us/library/aa385101%28v=VS.85%29.aspx
Else If ( Security_Flags_Add || Security_Flags_Nix ) && !DllCall( "WinINet\InternetQueryOption" W_A, Ptr, hRequest, DW, 31, DW "*", Security_Flags, DW "*", 4 )
MyErrors .= swp "retrieving the security flags. 'WinINet\InternetQueryOption" W_A "' failed" sel ErrorLevel sle A_LastError "`n"
; InternetSetOption > http://msdn.microsoft.com/en-us/library/aa385114%28v=VS.85%29.aspx
Else If ( Security_Flags_Add || Security_Flags_Nix ) && !DllCall( "WinINet\InternetSetOption" W_A, Ptr, hRequest, DW, 31, DW "*", pos := ( ~Security_Flags_Nix & Security_Flags ) | Security_Flags_Add, DW "*", 4 )
MyErrors .= swp "setting the security flags. 'WinINet\InternetSetOption" W_A "' failed: Flags value = " pos sel ErrorLevel sle A_LastError "`n"
; Step 8a: If there is no data to upload, submit the request via HttpSendRequest.
; HttpSendRequest > http://msdn.microsoft.com/en-us/library/aa384247%28v=VS.85%29.aspx
Else If !( 0 < Content_Length ) && !DllCall( "WinINet\HttpSendRequest" W_A, Ptr, hRequest, Ptr, 0, DW, 0, Ptr, 0, DW, 0 )
MyErrors .= swp "sending the " Method_Verb " request. 'WinINet\HttpSendRequest" W_A "' failed" sel ErrorLevel sle A_LastError "`n"
; Step 8b: If there is data to upload, begin submitting the request via HttpSendRequestEx, upload the data
; using InternetWriteFile, then end the request with HttpEndRequest.
; HttpSendRequestEx > http://msdn.microsoft.com/en-us/library/aa384318%28v=VS.85%29.aspx
Else If ( 0 < Content_Length ) && !DllCall( "WinINet\HttpSendRequestEx" W_A, Ptr, hRequest, Ptr, &INTERNET_BUFFERS, Ptr, 0, DW, 0, Ptr, 0 )
MyErrors .= swp "sending the " Method_Verb " request. 'WinINet\HttpSendRequestEx" W_A "' failed" sel ErrorLevel sle A_LastError "`n"
Else If ( 0 < Content_Length )
{
; Here, we have a connection open to a remote resource and we should write data to it.
; But first, notfy the callback function that we are about to upload data by passing '-1' to it.
If ( Do_Callback ) && ( "CANCEL" = %Do_Callback_Func%( -1, Content_Length, Do_Callback_3rdParam ) )
MyErrors .= cfc "Zero bytes were uploaded.`n"
Else
{
; Loop until the size of the data uploaded is equal or greater than the Content-Length.
; Actually, 'equal to' is the end condition, the 'greater than' is just good programming.
size := 0 ; 'size' tracks the number of bytes actually uploaded so far.
Loop
{
If ( Content_Length <= size ) || ( MyErrors != "" )
Break
; Define the first data chunk of up to 4096 bytes (put the address into 'pos')
; NOTE: except with multipart data, 'dbuffsz' and 'Content-Length' are equal.
If ( size < Do_Multipart )
{
; Upload the first part of the multipart envelope.
pos := &rbuffer
dtsz := Do_Multipart - size < 4096 ? Do_Multipart - size : 4096
}
Else If ( Do_Multipart + dbuffsz <= size )
{
; Upload the second part of the multipart envelope.
pos := &rbuffer + Do_Multipart
dtsz := Content_Length - size < 4096 ? Content_Length - size : 4096
}
; ReadFile > http://msdn.microsoft.com/en-us/library/aa365467%28v=VS.85%29.aspx
Else If !( Do_File_Upload )
{
; Upload from memory
pos := &dbuffer + size
dtsz := dbuffsz - size < 4096 ? dbuffsz - size : 4096
}
Else If !DllCall( "ReadFile", Ptr, Do_File_Upload, Ptr, pos := &dbuffer, DW, dbuffsz - size < 4096 ? dbuffsz - size : 4096, DW "*", dtsz, Ptr, 0 )
{
; Upload from a file AND we couldn't read from the file
MyErrors .= swp "reading from the file """ Upload_File_Path """. 'ReadFile' failed" sel ErrorLevel sle A_LastError "`n"
Break
}
; Upload the chunk, and then increment 'size' by how many bytes were uploaded.
; InternetWriteFile > http://msdn.microsoft.com/en-us/library/aa385128%28v=VS.85%29.aspx
If !DllCall( "WinINet\InternetWriteFile", Ptr, hRequest, Ptr, pos, DW, dtsz + 0, DW "*", dtsz )
MyErrors .= swp "uploading the POST data. 'WinINet\InternetWriteFile' failed" sel ErrorLevel sle A_LastError "`n"
Else
{
size += dtsz
; If we have a callback function, tell it what percent has been uploaded
If ( Do_Callback ) && ( "CANCEL" = %Do_Callback_Func%( size / Content_Length - 1, Content_Length, Do_Callback_3rdParam ) )
MyErrors .= cfc size " bytes were uploaded.`n"
}
}
; Close the file handle (if the data was uploaded from a file).
; CloseHandle > http://msdn.microsoft.com/en-us/library/ms724211%28v=vs.85%29.aspx
If ( Do_File_Upload ) && !DllCall( "CloseHandle", Ptr, Do_File_Upload )
MyErrors .= swp "closing the file """ Upload_File_Path """. 'CloseHandle' failed" sel ErrorLevel sle A_LastError "`n"
}
; We're done uploading data, so end the request.
; HttpEndRequest > http://msdn.microsoft.com/en-us/library/aa384230%28v=VS.85%29.aspx
DllCall( "WinINet\HttpEndRequest" W_A, Ptr, hRequest, Ptr, 0, DW, 0, Ptr, 0 )
}
; Step 9: Wait until data is available, then get the response headers.
Content_Length := size := rbuffsz := 0
If ( MyErrors = "" )
{
If ( Method_Verb != "HEAD" )
; InternetQueryDataAvailable > http://msdn.microsoft.com/en-us/library/aa385100%28v=VS.85%29.aspx
DllCall( "WinINet\InternetQueryDataAvailable", Ptr, hRequest, DW "*", Content_Length, DW, 0, Ptr, 0 )
; Get the response headers separated by CRLF. The first line has the HTTP response code
; HttpQueryInfo > http://msdn.microsoft.com/en-us/library/aa384238%28v=VS.85%29.aspx
; HTTP_QUERY_RAW_HEADERS_CRLF = 22. First-try buffer size = 4K
If VarSetCapacity( hbuffer, hbuffsz := 4096, 0 )
&& !DllCall( "WinINet\HttpQueryInfo" W_A, Ptr, hRequest, DW, 22, Ptr, &hbuffer, DW "*", hbuffsz, Ptr, 0 )
&& VarSetCapacity( hbuffer, hbuffsz, 0 )
&& !DllCall( "WinINet\HttpQueryInfo" W_A, Ptr, hRequest, DW, 22, Ptr, &hbuffer, DW "*", hbuffsz, Ptr, 0 )
MyErrors .= swp "reading the response headers. 'WinINet\HttpQueryInfo" W_A "' failed" sel ErrorLevel sle A_LastError "`n"
Else
{
; We've got the response headers, but don't copy them to the output var yet.
; Replace CRLF with LF, get the response code, and see if there's a Content-Length.
VarSetCapacity( hbuffer, -1 )
StringReplace, hbuffer, hbuffer, `r`n, `n, A
StringMid, Response_Code, hbuffer, InStr( hbuffer, " " ) + 1, 3
If ( Method_Verb != "HEAD" ) && ( 17 != pos := 17 + InStr( hbuffer, "`nContent-Length: " ) )
StringMid, Content_Length, hbuffer, pos, InStr( hbuffer, "`n", 0, pos ) - pos
Do_Dn_MD5_Hash := InStr( hbuffer, "`nContent-MD5:" )
}
}
Else hbuffer := ""
; Step 10: Download the response data
If ( Content_Length ) && ( MyErrors = "" )
{
; If we're downloading to a file, try to open the target file with GENERIC_WRITE (0x40000000) permission.
If ( Do_Download_To_File ) && !( Do_Download_To_File := DllCall( "CreateFile" W_A, Ptr, &output_file_path, DW, 0xC0000000, DW, 0, Ptr, 0, DW, 4, DW, 0, Ptr, 0, Ptr ) )
MyErrors .= swp "opening/creating the output file for writing data: """ output_file_path """. 'CreateFile" W_A "' failed" sel ErrorLevel sle A_LastError "`n"
; Then, if we're resuming a download, move the write-pointer to the end of the file.
; SetFilePointerEx > http://msdn.microsoft.com/en-us/library/aa365542%28v=VS.85%29.aspx
Else If ( Do_Download_Resume ) && !DllCall( "SetFilePointerEx", Ptr, Do_Download_To_File, "Int64", Do_Download_Resume, Ptr, 0, DW, 0 )
MyErrors .= swp "seeking to the end of the output file for resuming the download. 'SetFilePointerEx' failed" sel ErrorLevel sle A_LastError "`n"
; If we have a callback function, inform it that we're about to begin downloading data.
Else If ( Do_Callback ) && ( "CANCEL" = %Do_Callback_Func%( Do_Download_Resume, Content_Length + Do_Download_Resume, Do_Callback_3rdParam ) )
MyErrors .= cfc "Zero bytes were downloaded.`n"
Else
{
; Update (2.46 2-29-2012) - The computed MD5 hash will be added if the response headers have a Content-MD5
If ( Do_Dn_MD5_Hash )
If !( Do_Dn_MD5_Hash := DllCall("LoadLibrary" W_A, "Str", "Advapi32.dll" ) )
MyErrors .= swp "loading Advapi32.dll to calculate the Content-MD5 header. 'LoadLibrary" W_A "' failed" sel ErrorLevel sle A_LastError "`n"
Else If !DllCall( "Advapi32\CryptAcquireContext" W_A, Ptr "*", hProv := 0, Ptr, 0, Ptr, 0, DW, 1, DW, 0xF0000000 )
MyErrors .= swp "acquiring the key container to calculate the Content-MD5 header. 'CryptAcquireContext' failed" sel ErrorLevel sle A_LastError "`n"
Else If !DllCall( "Advapi32\CryptCreateHash", Ptr, hProv, DW, 0x8003, Ptr, 0, DW, 0, Ptr "*", hHash := 0 )
MyErrors .= swp "creating the hash object to calculate the Content-MD5 header. 'CryptCreateHash' failed" sel ErrorLevel sle A_LastError "`n"
; Download the response data. Initialize the d-buffer to hold the reported content length plus 4K
VarSetCapacity( dbuffer, dbuffsz := Do_Download_To_File ? 4096 : 4096 + Content_Length, 0 )
Loop
{
; Update (1-8-2012): the data downloading loop no longer uses dynamic variables. Instead, if the d-buffer is
; too small, make space in the r-buffer to hold 4K plus the data in the d-buffer and download to the end of the
; r-buffer. If data was downloaded, copy the data from the d-buffer to the r-buffer, expand the d-buffer, and
; copy all of the data (old + new) back to the d-buffer. If ever InternetReadFile fails, or downloads zero
; bytes, that means we're done.
If ( MyErrors != "" )
Break
Else If ( Do_Download_To_File )
pos := &dbuffer
Else If ( size + 4096 < Content_Length )
pos := &dbuffer + size
Else
{
VarSetCapacity( rbuffer, rbuffsz := size + 4096 + 1, 0 )
pos := &rbuffer + size
}
; Now that the target buffer has been determined, download the next chunk.
; InternetReadFile > http://msdn.microsoft.com/en-us/library/aa385103%28v=VS.85%29.aspx
If !DllCall( "WinINet\InternetReadFile", Ptr, hRequest, Ptr, pos, DW, 4096, DW "*", dtsz )
MyErrors .= swp "downoading data. 'WinINet\InternetReadFile' failed" sel ErrorLevel sle A_LastError "`n"
Else If !dtsz
{
If ( Do_Callback )
%Do_Callback_Func%( 1, Content_Length + Do_Download_Resume, Do_Callback_3rdParam )
Break
}
; WriteFile > http://msdn.microsoft.com/en-us/library/aa365747%28v=vs.85%29.aspx
Else If ( Do_Download_To_File ) && !DllCall( "WriteFile", Ptr, Do_Download_To_File, Ptr, pos, DW, dtsz, DW "*", 0, Ptr, 0 )
MyErrors .= swp "writing data to the disk. 'WriteFile' failed" sel ErrorLevel sle A_LastError "`n"
Else If !( Do_Download_To_File ) && ( size < rbuffsz )
{
DllCall( "RtlMoveMemory", Ptr, &rbuffer, Ptr, &dbuffer, DW, size )
VarSetCapacity( dbuffer, Content_Length := 4096 + ( size += dtsz ), 0 )
DllCall( "RtlMoveMemory", Ptr, &dbuffer, Ptr, &rbuffer, DW, size )
rbuffsz := 0
}
Else size += dtsz
; Add data to the hash object if we're checking the MD5 hash
If ( Do_Dn_MD5_Hash ) && !DllCall( "Advapi32\CryptHashData", Ptr, hHash, Ptr, pos, DW, dtsz, DW, 0 )
MyErrors .= swp "adding data to the hash object. 'CryptHashData' failed" sel ErrorLevel sle A_LastError "`n"
If ( Do_Callback ) && ( "CANCEL" = %Do_Callback_Func%( ( size + Do_Download_Resume ) / ( Content_Length + Do_Download_Resume ), Content_Length + Do_Download_Resume, Do_Callback_3rdParam ) )
MyErrors .= cfc size " bytes were downloaded.`n"
}
If ( Do_Download_To_File ) && !DllCall( "CloseHandle", Ptr, Do_Download_To_File )
MyErrors .= swp "closing the file """ output_file_path """. 'CloseHandle' failed" sel ErrorLevel sle A_LastError "`n"
}
}
; Step 11: Close handles, free the dll, and add the MD5 hash check if called for.
; InternetCloseHandle > http://msdn.microsoft.com/en-us/library/aa384350%28v=VS.85%29.aspx
DllCall( "WinINet\InternetCloseHandle", Ptr, hRequest )
DllCall( "WinINet\InternetCloseHandle", Ptr, hConnection )
DllCall( "WinINet\InternetCloseHandle", Ptr, hInternet )
DllCall( "FreeLibrary", Ptr, hWinINet )
If ( Do_Dn_MD5_Hash )
{
; Get the hash bytes and convert it to base 64, then set it as the Content-MD5 header's value
VarSetCapacity( rbuffer, 20, 0 )
If !DllCall( "Advapi32\CryptGetHashParam", Ptr, hHash, DW, 2, Ptr, &rbuffer, DW "*", pos := 16, DW, 0 )
MyErrors .= swp "getting the hash value. 'CryptGetHashParam' failed" sel ErrorLevel sle A_LastError "`n"
If !DllCall( "Advapi32\CryptDestroyHash", Ptr, hHash )
MyErrors .= swp "releasing the hash object. 'CryptDestroyHash' failed" sel ErrorLevel sle A_LastError "`n"
If !DllCall( "Advapi32\CryptReleaseContext", Ptr, hProv, DW, 0 )
MyErrors .= swp "releasing the key container. 'CryptReleaseContext' failed" sel ErrorLevel sle A_LastError "`n"
DllCall( "FreeLibrary", Ptr, Do_Dn_MD5_Hash )
options := "`nComputed-MD5: "
Loop, 18
{
pos := *( &rbuffer + A_Index - 1 ) | (( 0xFFFF & pos ) << 8 )
Loop % !Mod( A_Index, 3 ) * 4
dtsz := 63 & ( pos >> 24 - 6 * A_Index ), options .= Chr( dtsz < 26 ? dtsz
+ 65 : dtsz < 52 ? dtsz + 71 : dtsz < 62 ? dtsz - 4 : dtsz = 62 ? 43 : 47 )
}
StringReplace, hbuffer, hbuffer, % "`nContent-MD5:", % SubStr( options, 1, -2 ) "==`nContent-MD5:"
}
; Step 12: Copy the response data and headers into the output buffers, respecting the pertinent options.
If ( size ) && !( Do_Download_To_File )
{
; First, detect the content type to see whether we CAN treat it like text.
If ( 15 != pos := 15 + InStr( hbuffer, "`nContent-Type: " ) )
Content_Type := SubStr( hbuffer, pos, InStr( hbuffer "`n", "`n", 0, pos ) - pos )
Else Content_Type := Expected_Type
; Extract the charset information, if it's present
If ( 7 != pos := 7 + InStr( Content_Type .= "`n" Expected_Type, "charset=" ) )
&& ( pos := InStr( Codepage_Charsets, SubStr( Content_Type, pos
, InStr( Content_Type ";" , ";", 0, pos ) - pos ) "|" ) )
StringMid, Convert_POST_To_Codepage, Codepage_Charsets, pos - 5, 5
Else Convert_POST_To_Codepage := IsUnicode ? "65001" : MyACP
; Then, determine whether we should convert the data to a different codepage or not.
StringLeft, Content_Type, Content_Type, InStr( Content_Type ";", ";" ) - 1
If !( pos := InStr( Content_Type, "text/" ) = 1 )
Loop, Parse, Text_Content_Subtypes, /
If ( pos |= 0 < InStr( Content_Type, "/" A_LoopField ) )
Break
; So, now we know whether or not to treat the data as text, or as binary
If ( Do_Binary_Down ) || !( pos ) || ( Convert_POST_To_Codepage = MyACP )
{
VarSetCapacity( In_POST__Out_Data, size + 2, 0 )
DllCall( "RtlMoveMemory", Ptr, &In_POST__Out_Data, Ptr, &dbuffer, DW, size )
If ( pos )
VarSetCapacity( In_POST__Out_Data, -1 )
}
Else
{
; convert the text data's codepage to whatever codepage the script is using.
If ( Convert_POST_To_Codepage = "01200" )
{
; the downloaded data is in UTF-16 already (I don't know if this ever happens IRL).
pos := &dbuffer
rbuffsz := size >> 1
}
Else If ( 0 < rbuffsz := DllCall( "MultiByteToWideChar", DW, Convert_POST_To_Codepage, DW, 0, Ptr, &dbuffer, DW, size, Ptr, 0, DW, 0 ) )
{
VarSetCapacity( rbuffer, rbuffsz + 1 << 1 )
DllCall( "MultiByteToWideChar", DW, Convert_POST_To_Codepage, DW, 0, Ptr, &dbuffer, DW, size, Ptr, pos := &rbuffer, DW, rbuffsz )
}
Else MyErrors .= swp "converting codepage " Convert_POST_To_Codepage " to " MyACP ". 'MultiByteToWideChar' failed: Return value = " rbuffsz sel ErrorLevel sle A_LastError "`n"
If ( IsUnicode )
{
VarSetCapacity( In_POST__Out_Data, rbuffsz + 1 << 1, 0 )
DllCall( "RtlMoveMemory", Ptr, &In_POST__Out_Data, Ptr, &rbuffer, DW, rbuffsz << 1 )
VarSetCapacity( In_POST__Out_Data, -1 )
}
Else If ( 0 < rbuffsz ) && ( 0 < dbuffsz := DllCall( "WideCharToMultiByte", DW, MyACP, DW, 0, Ptr, pos, DW, rbuffsz, Ptr, 0, DW, 0, Ptr, 0, Ptr, 0 ) )
{
VarSetCapacity( In_POST__Out_Data, dbuffsz + 1, 0 )
DllCall( "WideCharToMultiByte", DW, MyACP, DW, 0, Ptr, pos, DW, rbuffsz, Ptr, &In_POST__Out_Data, DW, dbuffsz, Ptr, 0, Ptr, 0 )
size := dbuffsz
VarSetCapacity( In_POST__Out_Data, -1 )
}
Else MyErrors .= swp "converting codepage " Convert_POST_To_Codepage " to " MyACP ". 'WideCharToMultiByte' failed: Return value = " dbuffsz sel ErrorLevel sle A_LastError "`n"
}
}
; If there was no data downloaded, AND there were no errors so far, clear the data output var.
Else If ( MyErrors = "" )
In_POST__Out_Data := ""
In_Out_HEADERS := SubStr( hbuffer, 1, -1 ) . SubStr( MyErrors, 1, -1 )
Return size, dbuffer := "", hbuffer := "", rbuffer := "", ErrorLevel := Response_Code
} ; HTTPRequest( URL, byref In_POST__Out_Data="", byref In_Out_HEADERS="", Options="" ) -----------------------