2 * Copyright (c) 2007 The FFmpeg Project
4 * This file is part of FFmpeg.
6 * FFmpeg is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * FFmpeg is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with FFmpeg; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
24 #include "libavcodec/internal.h"
25 #include "libavutil/avutil.h"
26 #include "libavutil/mem.h"
27 #include "libavutil/time.h"
33 #include "compat/os2threads.h"
35 #include "compat/w32pthreads.h"
40 #include <openssl/ssl.h>
41 static int openssl_init
;
43 #include <openssl/crypto.h>
44 pthread_mutex_t
*openssl_mutexes
;
45 static void openssl_lock(int mode
, int type
, const char *file
, int line
)
47 if (mode
& CRYPTO_LOCK
)
48 pthread_mutex_lock(&openssl_mutexes
[type
]);
50 pthread_mutex_unlock(&openssl_mutexes
[type
]);
52 #if !defined(WIN32) && OPENSSL_VERSION_NUMBER < 0x10000000
53 static unsigned long openssl_thread_id(void)
55 return (intptr_t) pthread_self();
61 #include <gnutls/gnutls.h>
62 #if HAVE_THREADS && GNUTLS_VERSION_NUMBER <= 0x020b00
65 GCRY_THREAD_OPTION_PTHREAD_IMPL
;
69 void ff_tls_init(void)
71 avpriv_lock_avformat();
75 SSL_load_error_strings();
77 if (!CRYPTO_get_locking_callback()) {
79 openssl_mutexes
= av_malloc_array(sizeof(pthread_mutex_t
), CRYPTO_num_locks());
80 for (i
= 0; i
< CRYPTO_num_locks(); i
++)
81 pthread_mutex_init(&openssl_mutexes
[i
], NULL
);
82 CRYPTO_set_locking_callback(openssl_lock
);
83 #if !defined(WIN32) && OPENSSL_VERSION_NUMBER < 0x10000000
84 CRYPTO_set_id_callback(openssl_thread_id
);
92 #if HAVE_THREADS && GNUTLS_VERSION_NUMBER < 0x020b00
93 if (gcry_control(GCRYCTL_ANY_INITIALIZATION_P
) == 0)
94 gcry_control(GCRYCTL_SET_THREAD_CBS
, &gcry_threads_pthread
);
98 avpriv_unlock_avformat();
101 void ff_tls_deinit(void)
103 avpriv_lock_avformat();
108 if (CRYPTO_get_locking_callback() == openssl_lock
) {
110 CRYPTO_set_locking_callback(NULL
);
111 for (i
= 0; i
< CRYPTO_num_locks(); i
++)
112 pthread_mutex_destroy(&openssl_mutexes
[i
]);
113 av_free(openssl_mutexes
);
119 gnutls_global_deinit();
121 avpriv_unlock_avformat();
124 int ff_network_inited_globally
;
126 int ff_network_init(void)
132 if (!ff_network_inited_globally
)
133 av_log(NULL
, AV_LOG_WARNING
, "Using network protocols without global "
134 "network initialization. Please use "
135 "avformat_network_init(), this will "
136 "become mandatory later.\n");
138 if (WSAStartup(MAKEWORD(1,1), &wsaData
))
144 int ff_network_wait_fd(int fd
, int write
)
146 int ev
= write
? POLLOUT
: POLLIN
;
147 struct pollfd p
= { .fd
= fd
, .events
= ev
, .revents
= 0 };
149 ret
= poll(&p
, 1, 100);
150 return ret
< 0 ? ff_neterrno() : p
.revents
& (ev
| POLLERR
| POLLHUP
) ? 0 : AVERROR(EAGAIN
);
153 int ff_network_wait_fd_timeout(int fd
, int write
, int64_t timeout
, AVIOInterruptCB
*int_cb
)
156 int64_t wait_start
= 0;
159 if (ff_check_interrupt(int_cb
))
161 ret
= ff_network_wait_fd(fd
, write
);
162 if (ret
!= AVERROR(EAGAIN
))
166 wait_start
= av_gettime_relative();
167 else if (av_gettime_relative() - wait_start
> timeout
)
168 return AVERROR(ETIMEDOUT
);
173 void ff_network_close(void)
181 int ff_neterrno(void)
183 int err
= WSAGetLastError();
186 return AVERROR(EAGAIN
);
188 return AVERROR(EINTR
);
189 case WSAEPROTONOSUPPORT
:
190 return AVERROR(EPROTONOSUPPORT
);
192 return AVERROR(ETIMEDOUT
);
193 case WSAECONNREFUSED
:
194 return AVERROR(ECONNREFUSED
);
196 return AVERROR(EINPROGRESS
);
202 int ff_is_multicast_address(struct sockaddr
*addr
)
204 if (addr
->sa_family
== AF_INET
) {
205 return IN_MULTICAST(ntohl(((struct sockaddr_in
*)addr
)->sin_addr
.s_addr
));
207 #if HAVE_STRUCT_SOCKADDR_IN6
208 if (addr
->sa_family
== AF_INET6
) {
209 return IN6_IS_ADDR_MULTICAST(&((struct sockaddr_in6
*)addr
)->sin6_addr
);
216 static int ff_poll_interrupt(struct pollfd
*p
, nfds_t nfds
, int timeout
,
219 int runs
= timeout
/ POLLING_TIME
;
223 if (ff_check_interrupt(cb
))
225 ret
= poll(p
, nfds
, POLLING_TIME
);
228 } while (timeout
<= 0 || runs
-- > 0);
231 return AVERROR(ETIMEDOUT
);
233 return AVERROR(errno
);
237 int ff_socket(int af
, int type
, int proto
)
242 fd
= socket(af
, type
| SOCK_CLOEXEC
, proto
);
243 if (fd
== -1 && errno
== EINVAL
)
246 fd
= socket(af
, type
, proto
);
249 if (fcntl(fd
, F_SETFD
, FD_CLOEXEC
) == -1)
250 av_log(NULL
, AV_LOG_DEBUG
, "Failed to set close on exec\n");
257 int ff_listen_bind(int fd
, const struct sockaddr
*addr
,
258 socklen_t addrlen
, int timeout
, URLContext
*h
)
262 struct pollfd lp
= { fd
, POLLIN
, 0 };
263 if (setsockopt(fd
, SOL_SOCKET
, SO_REUSEADDR
, &reuse
, sizeof(reuse
))) {
264 av_log(NULL
, AV_LOG_WARNING
, "setsockopt(SO_REUSEADDR) failed\n");
266 ret
= bind(fd
, addr
, addrlen
);
268 return ff_neterrno();
272 return ff_neterrno();
274 ret
= ff_poll_interrupt(&lp
, 1, timeout
, &h
->interrupt_callback
);
278 ret
= accept(fd
, NULL
, NULL
);
280 return ff_neterrno();
284 if (ff_socket_nonblock(ret
, 1) < 0)
285 av_log(NULL
, AV_LOG_DEBUG
, "ff_socket_nonblock failed\n");
290 int ff_listen_connect(int fd
, const struct sockaddr
*addr
,
291 socklen_t addrlen
, int timeout
, URLContext
*h
,
294 struct pollfd p
= {fd
, POLLOUT
, 0};
298 if (ff_socket_nonblock(fd
, 1) < 0)
299 av_log(NULL
, AV_LOG_DEBUG
, "ff_socket_nonblock failed\n");
301 while ((ret
= connect(fd
, addr
, addrlen
))) {
305 if (ff_check_interrupt(&h
->interrupt_callback
))
308 case AVERROR(EINPROGRESS
):
309 case AVERROR(EAGAIN
):
310 ret
= ff_poll_interrupt(&p
, 1, timeout
, &h
->interrupt_callback
);
313 optlen
= sizeof(ret
);
314 if (getsockopt (fd
, SOL_SOCKET
, SO_ERROR
, &ret
, &optlen
))
315 ret
= AVUNERROR(ff_neterrno());
319 av_strerror(ret
, errbuf
, sizeof(errbuf
));
321 av_log(h
, AV_LOG_WARNING
,
322 "Connection to %s failed (%s), trying next address\n",
323 h
->filename
, errbuf
);
325 av_log(h
, AV_LOG_ERROR
, "Connection to %s failed: %s\n",
326 h
->filename
, errbuf
);
335 static int match_host_pattern(const char *pattern
, const char *hostname
)
338 if (!strcmp(pattern
, "*"))
340 // Skip a possible *. at the start of the pattern
341 if (pattern
[0] == '*')
343 if (pattern
[0] == '.')
345 len_p
= strlen(pattern
);
346 len_h
= strlen(hostname
);
349 // Simply check if the end of hostname is equal to 'pattern'
350 if (!strcmp(pattern
, &hostname
[len_h
- len_p
])) {
352 return 1; // Exact match
353 if (hostname
[len_h
- len_p
- 1] == '.')
354 return 1; // The matched substring is a domain and not just a substring of a domain
359 int ff_http_match_no_proxy(const char *no_proxy
, const char *hostname
)
367 buf
= av_strdup(no_proxy
);
372 char *sep
, *next
= NULL
;
373 start
+= strspn(start
, " ,");
374 sep
= start
+ strcspn(start
, " ,");
379 if (match_host_pattern(start
, hostname
)) {