2011-02-07 11:59:50 +01:00
|
|
|
/*
|
2013-08-15 23:12:51 +02:00
|
|
|
* Copyright (c) 2007 The FFmpeg Project
|
2011-02-07 11:59:50 +01:00
|
|
|
*
|
2013-08-15 23:12:51 +02:00
|
|
|
* This file is part of FFmpeg.
|
2011-02-07 11:59:50 +01:00
|
|
|
*
|
2013-08-15 23:12:51 +02:00
|
|
|
* FFmpeg is free software; you can redistribute it and/or
|
2011-02-07 11:59:50 +01:00
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
2013-08-15 23:12:51 +02:00
|
|
|
* FFmpeg is distributed in the hope that it will be useful,
|
2011-02-07 11:59:50 +01:00
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
2013-08-15 23:12:51 +02:00
|
|
|
* License along with FFmpeg; if not, write to the Free Software
|
2011-02-07 11:59:50 +01:00
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
|
|
*/
|
|
|
|
|
2013-08-08 21:26:42 +02:00
|
|
|
#include <fcntl.h>
|
2011-02-07 11:59:50 +01:00
|
|
|
#include "network.h"
|
2015-05-27 12:57:51 +02:00
|
|
|
#include "tls.h"
|
2013-05-31 03:05:13 +02:00
|
|
|
#include "url.h"
|
2011-02-04 23:25:07 +01:00
|
|
|
#include "libavcodec/internal.h"
|
2013-08-10 10:18:18 +02:00
|
|
|
#include "libavutil/avutil.h"
|
2012-08-15 22:27:52 +02:00
|
|
|
#include "libavutil/mem.h"
|
2012-10-09 14:26:02 +02:00
|
|
|
#include "libavutil/time.h"
|
2011-02-04 23:25:07 +01:00
|
|
|
|
2015-01-22 15:50:48 +01:00
|
|
|
int ff_tls_init(void)
|
2011-02-04 23:25:07 +01:00
|
|
|
{
|
2015-05-27 12:57:51 +02:00
|
|
|
#if CONFIG_TLS_OPENSSL_PROTOCOL
|
2015-05-28 01:39:55 +02:00
|
|
|
int ret;
|
2015-05-27 12:57:51 +02:00
|
|
|
if ((ret = ff_openssl_init()) < 0)
|
|
|
|
return ret;
|
2011-02-06 00:06:49 +01:00
|
|
|
#endif
|
2015-05-27 12:57:51 +02:00
|
|
|
#if CONFIG_TLS_GNUTLS_PROTOCOL
|
|
|
|
ff_gnutls_init();
|
2011-02-04 23:25:07 +01:00
|
|
|
#endif
|
2015-01-22 15:50:48 +01:00
|
|
|
return 0;
|
2011-02-04 23:25:07 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
void ff_tls_deinit(void)
|
|
|
|
{
|
2015-05-27 12:57:51 +02:00
|
|
|
#if CONFIG_TLS_OPENSSL_PROTOCOL
|
|
|
|
ff_openssl_deinit();
|
2011-02-06 00:06:49 +01:00
|
|
|
#endif
|
2015-05-27 12:57:51 +02:00
|
|
|
#if CONFIG_TLS_GNUTLS_PROTOCOL
|
|
|
|
ff_gnutls_deinit();
|
2011-02-04 23:25:07 +01:00
|
|
|
#endif
|
|
|
|
}
|
2011-02-07 11:59:50 +01:00
|
|
|
|
2011-11-07 12:57:33 +01:00
|
|
|
int ff_network_inited_globally;
|
|
|
|
|
2011-02-07 11:59:50 +01:00
|
|
|
int ff_network_init(void)
|
|
|
|
{
|
2011-12-21 03:19:10 +01:00
|
|
|
#if HAVE_WINSOCK2_H
|
|
|
|
WSADATA wsaData;
|
|
|
|
#endif
|
|
|
|
|
2011-11-07 12:57:33 +01:00
|
|
|
if (!ff_network_inited_globally)
|
|
|
|
av_log(NULL, AV_LOG_WARNING, "Using network protocols without global "
|
|
|
|
"network initialization. Please use "
|
|
|
|
"avformat_network_init(), this will "
|
|
|
|
"become mandatory later.\n");
|
2011-02-07 11:59:50 +01:00
|
|
|
#if HAVE_WINSOCK2_H
|
|
|
|
if (WSAStartup(MAKEWORD(1,1), &wsaData))
|
|
|
|
return 0;
|
|
|
|
#endif
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
int ff_network_wait_fd(int fd, int write)
|
|
|
|
{
|
|
|
|
int ev = write ? POLLOUT : POLLIN;
|
|
|
|
struct pollfd p = { .fd = fd, .events = ev, .revents = 0 };
|
|
|
|
int ret;
|
|
|
|
ret = poll(&p, 1, 100);
|
|
|
|
return ret < 0 ? ff_neterrno() : p.revents & (ev | POLLERR | POLLHUP) ? 0 : AVERROR(EAGAIN);
|
|
|
|
}
|
|
|
|
|
2012-10-09 14:26:02 +02:00
|
|
|
int ff_network_wait_fd_timeout(int fd, int write, int64_t timeout, AVIOInterruptCB *int_cb)
|
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
int64_t wait_start = 0;
|
|
|
|
|
|
|
|
while (1) {
|
2013-07-12 09:35:51 +02:00
|
|
|
if (ff_check_interrupt(int_cb))
|
|
|
|
return AVERROR_EXIT;
|
2012-10-09 14:26:02 +02:00
|
|
|
ret = ff_network_wait_fd(fd, write);
|
|
|
|
if (ret != AVERROR(EAGAIN))
|
|
|
|
return ret;
|
2013-07-06 01:31:37 +02:00
|
|
|
if (timeout > 0) {
|
2012-10-09 14:26:02 +02:00
|
|
|
if (!wait_start)
|
2014-05-06 23:16:51 +02:00
|
|
|
wait_start = av_gettime_relative();
|
|
|
|
else if (av_gettime_relative() - wait_start > timeout)
|
2012-10-09 14:26:02 +02:00
|
|
|
return AVERROR(ETIMEDOUT);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2011-02-07 11:59:50 +01:00
|
|
|
void ff_network_close(void)
|
|
|
|
{
|
|
|
|
#if HAVE_WINSOCK2_H
|
|
|
|
WSACleanup();
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
#if HAVE_WINSOCK2_H
|
|
|
|
int ff_neterrno(void)
|
|
|
|
{
|
|
|
|
int err = WSAGetLastError();
|
|
|
|
switch (err) {
|
|
|
|
case WSAEWOULDBLOCK:
|
|
|
|
return AVERROR(EAGAIN);
|
|
|
|
case WSAEINTR:
|
|
|
|
return AVERROR(EINTR);
|
2012-06-23 14:00:17 +02:00
|
|
|
case WSAEPROTONOSUPPORT:
|
|
|
|
return AVERROR(EPROTONOSUPPORT);
|
|
|
|
case WSAETIMEDOUT:
|
|
|
|
return AVERROR(ETIMEDOUT);
|
|
|
|
case WSAECONNREFUSED:
|
|
|
|
return AVERROR(ECONNREFUSED);
|
|
|
|
case WSAEINPROGRESS:
|
|
|
|
return AVERROR(EINPROGRESS);
|
2011-02-07 11:59:50 +01:00
|
|
|
}
|
|
|
|
return -err;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
int ff_is_multicast_address(struct sockaddr *addr)
|
|
|
|
{
|
|
|
|
if (addr->sa_family == AF_INET) {
|
|
|
|
return IN_MULTICAST(ntohl(((struct sockaddr_in *)addr)->sin_addr.s_addr));
|
|
|
|
}
|
|
|
|
#if HAVE_STRUCT_SOCKADDR_IN6
|
|
|
|
if (addr->sa_family == AF_INET6) {
|
|
|
|
return IN6_IS_ADDR_MULTICAST(&((struct sockaddr_in6 *)addr)->sin6_addr);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
2013-05-30 01:08:51 +02:00
|
|
|
|
2013-06-01 19:38:57 +02:00
|
|
|
static int ff_poll_interrupt(struct pollfd *p, nfds_t nfds, int timeout,
|
|
|
|
AVIOInterruptCB *cb)
|
|
|
|
{
|
|
|
|
int runs = timeout / POLLING_TIME;
|
|
|
|
int ret = 0;
|
|
|
|
|
|
|
|
do {
|
|
|
|
if (ff_check_interrupt(cb))
|
|
|
|
return AVERROR_EXIT;
|
|
|
|
ret = poll(p, nfds, POLLING_TIME);
|
|
|
|
if (ret != 0)
|
|
|
|
break;
|
2013-06-05 11:56:56 +02:00
|
|
|
} while (timeout <= 0 || runs-- > 0);
|
2013-06-01 19:38:57 +02:00
|
|
|
|
|
|
|
if (!ret)
|
|
|
|
return AVERROR(ETIMEDOUT);
|
|
|
|
if (ret < 0)
|
|
|
|
return AVERROR(errno);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
2013-08-08 21:26:42 +02:00
|
|
|
int ff_socket(int af, int type, int proto)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
#ifdef SOCK_CLOEXEC
|
|
|
|
fd = socket(af, type | SOCK_CLOEXEC, proto);
|
|
|
|
if (fd == -1 && errno == EINVAL)
|
|
|
|
#endif
|
|
|
|
{
|
|
|
|
fd = socket(af, type, proto);
|
|
|
|
#if HAVE_FCNTL
|
2013-10-20 16:34:32 +02:00
|
|
|
if (fd != -1) {
|
|
|
|
if (fcntl(fd, F_SETFD, FD_CLOEXEC) == -1)
|
|
|
|
av_log(NULL, AV_LOG_DEBUG, "Failed to set close on exec\n");
|
|
|
|
}
|
2013-08-08 21:26:42 +02:00
|
|
|
#endif
|
|
|
|
}
|
2015-05-30 20:50:43 +02:00
|
|
|
#ifdef SO_NOSIGPIPE
|
|
|
|
if (fd != -1)
|
|
|
|
setsockopt(fd, SOL_SOCKET, SO_NOSIGPIPE, &(int){1}, sizeof(int));
|
|
|
|
#endif
|
2013-08-08 21:26:42 +02:00
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
2013-05-30 01:08:51 +02:00
|
|
|
int ff_listen_bind(int fd, const struct sockaddr *addr,
|
2013-06-01 19:38:57 +02:00
|
|
|
socklen_t addrlen, int timeout, URLContext *h)
|
2013-05-30 01:08:51 +02:00
|
|
|
{
|
|
|
|
int ret;
|
|
|
|
int reuse = 1;
|
|
|
|
struct pollfd lp = { fd, POLLIN, 0 };
|
2013-06-03 16:11:29 +02:00
|
|
|
if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &reuse, sizeof(reuse))) {
|
|
|
|
av_log(NULL, AV_LOG_WARNING, "setsockopt(SO_REUSEADDR) failed\n");
|
|
|
|
}
|
2013-05-30 01:08:51 +02:00
|
|
|
ret = bind(fd, addr, addrlen);
|
|
|
|
if (ret)
|
|
|
|
return ff_neterrno();
|
|
|
|
|
|
|
|
ret = listen(fd, 1);
|
|
|
|
if (ret)
|
|
|
|
return ff_neterrno();
|
|
|
|
|
2013-06-01 19:38:57 +02:00
|
|
|
ret = ff_poll_interrupt(&lp, 1, timeout, &h->interrupt_callback);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
2013-05-30 01:08:51 +02:00
|
|
|
|
|
|
|
ret = accept(fd, NULL, NULL);
|
|
|
|
if (ret < 0)
|
|
|
|
return ff_neterrno();
|
|
|
|
|
|
|
|
closesocket(fd);
|
|
|
|
|
2013-10-21 17:23:35 +02:00
|
|
|
if (ff_socket_nonblock(ret, 1) < 0)
|
|
|
|
av_log(NULL, AV_LOG_DEBUG, "ff_socket_nonblock failed\n");
|
|
|
|
|
2013-05-30 01:08:51 +02:00
|
|
|
return ret;
|
|
|
|
}
|
2013-05-31 03:05:13 +02:00
|
|
|
|
|
|
|
int ff_listen_connect(int fd, const struct sockaddr *addr,
|
2013-08-05 18:44:20 +02:00
|
|
|
socklen_t addrlen, int timeout, URLContext *h,
|
|
|
|
int will_try_next)
|
2013-05-31 03:05:13 +02:00
|
|
|
{
|
|
|
|
struct pollfd p = {fd, POLLOUT, 0};
|
|
|
|
int ret;
|
|
|
|
socklen_t optlen;
|
|
|
|
|
2013-10-21 17:23:35 +02:00
|
|
|
if (ff_socket_nonblock(fd, 1) < 0)
|
|
|
|
av_log(NULL, AV_LOG_DEBUG, "ff_socket_nonblock failed\n");
|
2013-05-31 03:05:13 +02:00
|
|
|
|
|
|
|
while ((ret = connect(fd, addr, addrlen))) {
|
|
|
|
ret = ff_neterrno();
|
|
|
|
switch (ret) {
|
|
|
|
case AVERROR(EINTR):
|
|
|
|
if (ff_check_interrupt(&h->interrupt_callback))
|
|
|
|
return AVERROR_EXIT;
|
|
|
|
continue;
|
|
|
|
case AVERROR(EINPROGRESS):
|
|
|
|
case AVERROR(EAGAIN):
|
2013-06-01 19:38:57 +02:00
|
|
|
ret = ff_poll_interrupt(&p, 1, timeout, &h->interrupt_callback);
|
|
|
|
if (ret < 0)
|
|
|
|
return ret;
|
2013-05-31 03:05:13 +02:00
|
|
|
optlen = sizeof(ret);
|
|
|
|
if (getsockopt (fd, SOL_SOCKET, SO_ERROR, &ret, &optlen))
|
|
|
|
ret = AVUNERROR(ff_neterrno());
|
|
|
|
if (ret != 0) {
|
|
|
|
char errbuf[100];
|
|
|
|
ret = AVERROR(ret);
|
|
|
|
av_strerror(ret, errbuf, sizeof(errbuf));
|
2013-08-05 18:44:20 +02:00
|
|
|
if (will_try_next)
|
|
|
|
av_log(h, AV_LOG_WARNING,
|
|
|
|
"Connection to %s failed (%s), trying next address\n",
|
|
|
|
h->filename, errbuf);
|
|
|
|
else
|
|
|
|
av_log(h, AV_LOG_ERROR, "Connection to %s failed: %s\n",
|
|
|
|
h->filename, errbuf);
|
2013-05-31 03:05:13 +02:00
|
|
|
}
|
|
|
|
default:
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return ret;
|
|
|
|
}
|
2013-06-15 11:41:36 +02:00
|
|
|
|
|
|
|
static int match_host_pattern(const char *pattern, const char *hostname)
|
|
|
|
{
|
|
|
|
int len_p, len_h;
|
|
|
|
if (!strcmp(pattern, "*"))
|
|
|
|
return 1;
|
|
|
|
// Skip a possible *. at the start of the pattern
|
|
|
|
if (pattern[0] == '*')
|
|
|
|
pattern++;
|
|
|
|
if (pattern[0] == '.')
|
|
|
|
pattern++;
|
|
|
|
len_p = strlen(pattern);
|
|
|
|
len_h = strlen(hostname);
|
|
|
|
if (len_p > len_h)
|
|
|
|
return 0;
|
|
|
|
// Simply check if the end of hostname is equal to 'pattern'
|
|
|
|
if (!strcmp(pattern, &hostname[len_h - len_p])) {
|
|
|
|
if (len_h == len_p)
|
|
|
|
return 1; // Exact match
|
|
|
|
if (hostname[len_h - len_p - 1] == '.')
|
|
|
|
return 1; // The matched substring is a domain and not just a substring of a domain
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
int ff_http_match_no_proxy(const char *no_proxy, const char *hostname)
|
|
|
|
{
|
|
|
|
char *buf, *start;
|
|
|
|
int ret = 0;
|
|
|
|
if (!no_proxy)
|
|
|
|
return 0;
|
|
|
|
if (!hostname)
|
|
|
|
return 0;
|
|
|
|
buf = av_strdup(no_proxy);
|
|
|
|
if (!buf)
|
|
|
|
return 0;
|
|
|
|
start = buf;
|
|
|
|
while (start) {
|
|
|
|
char *sep, *next = NULL;
|
|
|
|
start += strspn(start, " ,");
|
|
|
|
sep = start + strcspn(start, " ,");
|
|
|
|
if (*sep) {
|
|
|
|
next = sep + 1;
|
|
|
|
*sep = '\0';
|
|
|
|
}
|
|
|
|
if (match_host_pattern(start, hostname)) {
|
|
|
|
ret = 1;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
start = next;
|
|
|
|
}
|
|
|
|
av_free(buf);
|
|
|
|
return ret;
|
|
|
|
}
|