Libav
http.c
Go to the documentation of this file.
1 /*
2  * HTTP protocol for avconv client
3  * Copyright (c) 2000, 2001 Fabrice Bellard
4  *
5  * This file is part of Libav.
6  *
7  * Libav is free software; you can redistribute it and/or
8  * modify it under the terms of the GNU Lesser General Public
9  * License as published by the Free Software Foundation; either
10  * version 2.1 of the License, or (at your option) any later version.
11  *
12  * Libav is distributed in the hope that it will be useful,
13  * but WITHOUT ANY WARRANTY; without even the implied warranty of
14  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15  * Lesser General Public License for more details.
16  *
17  * You should have received a copy of the GNU Lesser General Public
18  * License along with Libav; if not, write to the Free Software
19  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20  */
21 
22 #include "config.h"
23 
24 #if CONFIG_ZLIB
25 #include <zlib.h>
26 #endif /* CONFIG_ZLIB */
27 
28 #include "libavutil/avstring.h"
29 #include "libavutil/opt.h"
30 
31 #include "avformat.h"
32 #include "http.h"
33 #include "httpauth.h"
34 #include "internal.h"
35 #include "network.h"
36 #include "os_support.h"
37 #include "url.h"
38 
39 /* XXX: POST protocol is not completely implemented because avconv uses
40  * only a subset of it. */
41 
42 /* The IO buffer size is unrelated to the max URL size in itself, but needs
43  * to be large enough to fit the full request headers (including long
44  * path names). */
45 #define BUFFER_SIZE MAX_URL_SIZE
46 #define MAX_REDIRECTS 8
47 
48 typedef struct HTTPContext {
49  const AVClass *class;
51  unsigned char buffer[BUFFER_SIZE], *buf_ptr, *buf_end;
53  int http_code;
54  /* Used if "Transfer-Encoding: chunked" otherwise -1. */
55  int64_t chunksize;
56  int64_t off, end_off, filesize;
57  char *location;
60  char *headers;
61  char *mime_type;
62  char *user_agent;
63  char *content_type;
64  /* Set if the server correctly handles Connection: close and will close
65  * the connection after feeding us the content. */
66  int willclose;
68  /* A flag which indicates if the end of chunked encoding has been sent. */
70  /* A flag which indicates we have finished to read POST reply. */
72  /* A flag which indicates if we use persistent connections. */
76  int icy;
77  /* how much data was read since the last ICY metadata packet */
79  /* after how many bytes of read data a new metadata packet will be found */
84 #if CONFIG_ZLIB
85  int compressed;
86  z_stream inflate_stream;
87  uint8_t *inflate_buffer;
88 #endif /* CONFIG_ZLIB */
91  char *method;
92 } HTTPContext;
93 
94 #define OFFSET(x) offsetof(HTTPContext, x)
95 #define D AV_OPT_FLAG_DECODING_PARAM
96 #define E AV_OPT_FLAG_ENCODING_PARAM
97 #define DEFAULT_USER_AGENT "Lavf/" AV_STRINGIFY(LIBAVFORMAT_VERSION)
98 
99 static const AVOption options[] = {
100  { "chunked_post", "use chunked transfer-encoding for posts", OFFSET(chunked_post), AV_OPT_TYPE_INT, { .i64 = 1 }, 0, 1, E },
101  { "headers", "set custom HTTP headers, can override built in default headers", OFFSET(headers), AV_OPT_TYPE_STRING, { 0 }, 0, 0, D | E },
102  { "content_type", "set a specific content type for the POST messages", OFFSET(content_type), AV_OPT_TYPE_STRING, { 0 }, 0, 0, D | E },
103  { "user_agent", "override User-Agent header", OFFSET(user_agent), AV_OPT_TYPE_STRING, { .str = DEFAULT_USER_AGENT }, 0, 0, D },
104  { "user-agent", "override User-Agent header, for compatibility with ffmpeg", OFFSET(user_agent), AV_OPT_TYPE_STRING, { .str = DEFAULT_USER_AGENT }, 0, 0, D },
105  { "multiple_requests", "use persistent connections", OFFSET(multiple_requests), AV_OPT_TYPE_INT, { .i64 = 0 }, 0, 1, D | E },
106  { "post_data", "set custom HTTP post data", OFFSET(post_data), AV_OPT_TYPE_BINARY, .flags = D | E },
107  { "mime_type", "export the MIME type", OFFSET(mime_type), AV_OPT_TYPE_STRING, { 0 }, 0, 0, AV_OPT_FLAG_EXPORT | AV_OPT_FLAG_READONLY },
108  { "icy", "request ICY metadata", OFFSET(icy), AV_OPT_TYPE_INT, { .i64 = 1 }, 0, 1, D },
109  { "icy_metadata_headers", "return ICY metadata headers", OFFSET(icy_metadata_headers), AV_OPT_TYPE_STRING, { 0 }, 0, 0, AV_OPT_FLAG_EXPORT },
110  { "icy_metadata_packet", "return current ICY metadata packet", OFFSET(icy_metadata_packet), AV_OPT_TYPE_STRING, { 0 }, 0, 0, AV_OPT_FLAG_EXPORT },
111  { "metadata", "metadata read from the bitstream", OFFSET(metadata), AV_OPT_TYPE_DICT, {0}, 0, 0, AV_OPT_FLAG_EXPORT },
112  { "auth_type", "HTTP authentication type", OFFSET(auth_state.auth_type), AV_OPT_TYPE_INT, { .i64 = HTTP_AUTH_NONE }, HTTP_AUTH_NONE, HTTP_AUTH_BASIC, D | E, "auth_type"},
113  { "none", "No auth method set, autodetect", 0, AV_OPT_TYPE_CONST, { .i64 = HTTP_AUTH_NONE }, 0, 0, D | E, "auth_type"},
114  { "basic", "HTTP basic authentication", 0, AV_OPT_TYPE_CONST, { .i64 = HTTP_AUTH_BASIC }, 0, 0, D | E, "auth_type"},
115  { "send_expect_100", "Force sending an Expect: 100-continue header for POST", OFFSET(send_expect_100), AV_OPT_TYPE_INT, { .i64 = 0 }, 0, 1, E },
116  { "location", "The actual location of the data received", OFFSET(location), AV_OPT_TYPE_STRING, { 0 }, 0, 0, D | E },
117  { "offset", "initial byte offset", OFFSET(off), AV_OPT_TYPE_INT64, { .i64 = 0 }, 0, INT64_MAX, D },
118  { "end_offset", "try to limit the request to bytes preceding this offset", OFFSET(end_off), AV_OPT_TYPE_INT64, { .i64 = 0 }, 0, INT64_MAX, D },
119  { "method", "Override the HTTP method", OFFSET(method), AV_OPT_TYPE_STRING, { .str = NULL }, 0, 0, E },
120  { NULL }
121 };
122 
123 static int http_connect(URLContext *h, const char *path, const char *local_path,
124  const char *hoststr, const char *auth,
125  const char *proxyauth, int *new_location);
126 
128 {
129  memcpy(&((HTTPContext *)dest->priv_data)->auth_state,
130  &((HTTPContext *)src->priv_data)->auth_state,
131  sizeof(HTTPAuthState));
132  memcpy(&((HTTPContext *)dest->priv_data)->proxy_auth_state,
133  &((HTTPContext *)src->priv_data)->proxy_auth_state,
134  sizeof(HTTPAuthState));
135 }
136 
138 {
139  const char *path, *proxy_path, *lower_proto = "tcp", *local_path;
140  char hostname[1024], hoststr[1024], proto[10];
141  char auth[1024], proxyauth[1024] = "";
142  char path1[MAX_URL_SIZE];
143  char buf[1024], urlbuf[MAX_URL_SIZE];
144  int port, use_proxy, err, location_changed = 0;
145  HTTPContext *s = h->priv_data;
146 
147  av_url_split(proto, sizeof(proto), auth, sizeof(auth),
148  hostname, sizeof(hostname), &port,
149  path1, sizeof(path1), s->location);
150  ff_url_join(hoststr, sizeof(hoststr), NULL, NULL, hostname, port, NULL);
151 
152  proxy_path = getenv("http_proxy");
153  use_proxy = !ff_http_match_no_proxy(getenv("no_proxy"), hostname) &&
154  proxy_path && av_strstart(proxy_path, "http://", NULL);
155 
156  if (!strcmp(proto, "https")) {
157  lower_proto = "tls";
158  use_proxy = 0;
159  if (port < 0)
160  port = 443;
161  }
162  if (port < 0)
163  port = 80;
164 
165  if (path1[0] == '\0')
166  path = "/";
167  else
168  path = path1;
169  local_path = path;
170  if (use_proxy) {
171  /* Reassemble the request URL without auth string - we don't
172  * want to leak the auth to the proxy. */
173  ff_url_join(urlbuf, sizeof(urlbuf), proto, NULL, hostname, port, "%s",
174  path1);
175  path = urlbuf;
176  av_url_split(NULL, 0, proxyauth, sizeof(proxyauth),
177  hostname, sizeof(hostname), &port, NULL, 0, proxy_path);
178  }
179 
180  ff_url_join(buf, sizeof(buf), lower_proto, NULL, hostname, port, NULL);
181 
182  if (!s->hd) {
183  err = ffurl_open(&s->hd, buf, AVIO_FLAG_READ_WRITE,
184  &h->interrupt_callback, options, h->protocols, h);
185  if (err < 0)
186  return err;
187  }
188 
189  err = http_connect(h, path, local_path, hoststr,
190  auth, proxyauth, &location_changed);
191  if (err < 0)
192  return err;
193 
194  return location_changed;
195 }
196 
197 /* return non zero if error */
198 static int http_open_cnx(URLContext *h, AVDictionary **options)
199 {
200  HTTPAuthType cur_auth_type, cur_proxy_auth_type;
201  HTTPContext *s = h->priv_data;
202  int location_changed, attempts = 0, redirects = 0;
203 redo:
204  cur_auth_type = s->auth_state.auth_type;
205  cur_proxy_auth_type = s->auth_state.auth_type;
206 
207  location_changed = http_open_cnx_internal(h, options);
208  if (location_changed < 0)
209  goto fail;
210 
211  attempts++;
212  if (s->http_code == 401) {
213  if ((cur_auth_type == HTTP_AUTH_NONE || s->auth_state.stale) &&
214  s->auth_state.auth_type != HTTP_AUTH_NONE && attempts < 4) {
215  ffurl_close(s->hd);
216  s->hd = NULL;
217  goto redo;
218  } else
219  goto fail;
220  }
221  if (s->http_code == 407) {
222  if ((cur_proxy_auth_type == HTTP_AUTH_NONE || s->proxy_auth_state.stale) &&
223  s->proxy_auth_state.auth_type != HTTP_AUTH_NONE && attempts < 4) {
224  ffurl_close(s->hd);
225  s->hd = NULL;
226  goto redo;
227  } else
228  goto fail;
229  }
230  if ((s->http_code == 301 || s->http_code == 302 ||
231  s->http_code == 303 || s->http_code == 307) &&
232  location_changed == 1) {
233  /* url moved, get next */
234  ffurl_close(s->hd);
235  s->hd = NULL;
236  if (redirects++ >= MAX_REDIRECTS)
237  return AVERROR(EIO);
238  /* Restart the authentication process with the new target, which
239  * might use a different auth mechanism. */
240  memset(&s->auth_state, 0, sizeof(s->auth_state));
241  attempts = 0;
242  location_changed = 0;
243  goto redo;
244  }
245  return 0;
246 
247 fail:
248  if (s->hd)
249  ffurl_close(s->hd);
250  s->hd = NULL;
251  return AVERROR(EIO);
252 }
253 
254 int ff_http_do_new_request(URLContext *h, const char *uri)
255 {
256  HTTPContext *s = h->priv_data;
257  AVDictionary *options = NULL;
258  int ret;
259 
260  s->off = 0;
261  s->icy_data_read = 0;
262  av_free(s->location);
263  s->location = av_strdup(uri);
264  if (!s->location)
265  return AVERROR(ENOMEM);
266 
267  av_dict_copy(&options, s->chained_options, 0);
268  ret = http_open_cnx(h, &options);
269  av_dict_free(&options);
270  return ret;
271 }
272 
273 static int http_open(URLContext *h, const char *uri, int flags,
274  AVDictionary **options)
275 {
276  HTTPContext *s = h->priv_data;
277  int ret;
278 
279  h->is_streamed = 1;
280 
281  s->filesize = -1;
282  s->location = av_strdup(uri);
283  if (!s->location)
284  return AVERROR(ENOMEM);
285  if (options)
286  av_dict_copy(&s->chained_options, *options, 0);
287 
288  if (s->headers) {
289  int len = strlen(s->headers);
290  if (len < 2 || strcmp("\r\n", s->headers + len - 2)) {
292  "No trailing CRLF found in HTTP header.\n");
293  ret = av_reallocp(&s->headers, len + 3);
294  if (ret < 0)
295  return ret;
296  s->headers[len] = '\r';
297  s->headers[len + 1] = '\n';
298  s->headers[len + 2] = '\0';
299  }
300  }
301 
302  ret = http_open_cnx(h, options);
303  if (ret < 0)
305  return ret;
306 }
307 
308 static int http_getc(HTTPContext *s)
309 {
310  int len;
311  if (s->buf_ptr >= s->buf_end) {
312  len = ffurl_read(s->hd, s->buffer, BUFFER_SIZE);
313  if (len < 0) {
314  return len;
315  } else if (len == 0) {
316  return AVERROR_EOF;
317  } else {
318  s->buf_ptr = s->buffer;
319  s->buf_end = s->buffer + len;
320  }
321  }
322  return *s->buf_ptr++;
323 }
324 
325 static int http_get_line(HTTPContext *s, char *line, int line_size)
326 {
327  int ch;
328  char *q;
329 
330  q = line;
331  for (;;) {
332  ch = http_getc(s);
333  if (ch < 0)
334  return ch;
335  if (ch == '\n') {
336  /* process line */
337  if (q > line && q[-1] == '\r')
338  q--;
339  *q = '\0';
340 
341  return 0;
342  } else {
343  if ((q - line) < line_size - 1)
344  *q++ = ch;
345  }
346  }
347 }
348 
349 static int check_http_code(URLContext *h, int http_code, const char *end)
350 {
351  HTTPContext *s = h->priv_data;
352  /* error codes are 4xx and 5xx, but regard 401 as a success, so we
353  * don't abort until all headers have been parsed. */
354  if (http_code >= 400 && http_code < 600 &&
355  (http_code != 401 || s->auth_state.auth_type != HTTP_AUTH_NONE) &&
356  (http_code != 407 || s->proxy_auth_state.auth_type != HTTP_AUTH_NONE)) {
357  end += strspn(end, SPACE_CHARS);
358  av_log(h, AV_LOG_WARNING, "HTTP error %d %s\n", http_code, end);
359  return AVERROR(EIO);
360  }
361  return 0;
362 }
363 
364 static int parse_location(HTTPContext *s, const char *p)
365 {
366  char redirected_location[MAX_URL_SIZE], *new_loc;
367  ff_make_absolute_url(redirected_location, sizeof(redirected_location),
368  s->location, p);
369  new_loc = av_strdup(redirected_location);
370  if (!new_loc)
371  return AVERROR(ENOMEM);
372  av_free(s->location);
373  s->location = new_loc;
374  return 0;
375 }
376 
377 /* "bytes $from-$to/$document_size" */
378 static void parse_content_range(URLContext *h, const char *p)
379 {
380  HTTPContext *s = h->priv_data;
381  const char *slash;
382 
383  if (!strncmp(p, "bytes ", 6)) {
384  p += 6;
385  s->off = strtoll(p, NULL, 10);
386  if ((slash = strchr(p, '/')) && strlen(slash) > 0)
387  s->filesize = strtoll(slash + 1, NULL, 10);
388  }
389  h->is_streamed = 0; /* we _can_ in fact seek */
390 }
391 
392 static int parse_content_encoding(URLContext *h, const char *p)
393 {
394  if (!av_strncasecmp(p, "gzip", 4) ||
395  !av_strncasecmp(p, "deflate", 7)) {
396 #if CONFIG_ZLIB
397  HTTPContext *s = h->priv_data;
398 
399  s->compressed = 1;
400  inflateEnd(&s->inflate_stream);
401  if (inflateInit2(&s->inflate_stream, 32 + 15) != Z_OK) {
402  av_log(h, AV_LOG_WARNING, "Error during zlib initialisation: %s\n",
403  s->inflate_stream.msg);
404  return AVERROR(ENOSYS);
405  }
406  if (zlibCompileFlags() & (1 << 17)) {
408  "Your zlib was compiled without gzip support.\n");
409  return AVERROR(ENOSYS);
410  }
411 #else
413  "Compressed (%s) content, need zlib with gzip support\n", p);
414  return AVERROR(ENOSYS);
415 #endif /* CONFIG_ZLIB */
416  } else if (!av_strncasecmp(p, "identity", 8)) {
417  // The normal, no-encoding case (although servers shouldn't include
418  // the header at all if this is the case).
419  } else {
420  av_log(h, AV_LOG_WARNING, "Unknown content coding: %s\n", p);
421  return AVERROR(ENOSYS);
422  }
423  return 0;
424 }
425 
426 // Concat all Icy- header lines
427 static int parse_icy(HTTPContext *s, const char *tag, const char *p)
428 {
429  int len = 4 + strlen(p) + strlen(tag);
430  int is_first = !s->icy_metadata_headers;
431  int ret;
432 
433  av_dict_set(&s->metadata, tag, p, 0);
434 
435  if (s->icy_metadata_headers)
436  len += strlen(s->icy_metadata_headers);
437 
438  if ((ret = av_reallocp(&s->icy_metadata_headers, len)) < 0)
439  return ret;
440 
441  if (is_first)
442  *s->icy_metadata_headers = '\0';
443 
444  av_strlcatf(s->icy_metadata_headers, len, "%s: %s\n", tag, p);
445 
446  return 0;
447 }
448 
449 static int process_line(URLContext *h, char *line, int line_count,
450  int *new_location)
451 {
452  HTTPContext *s = h->priv_data;
453  char *tag, *p, *end;
454  int ret;
455 
456  /* end of header */
457  if (line[0] == '\0') {
458  s->end_header = 1;
459  return 0;
460  }
461 
462  p = line;
463  if (line_count == 0) {
464  while (!av_isspace(*p) && *p != '\0')
465  p++;
466  while (av_isspace(*p))
467  p++;
468  s->http_code = strtol(p, &end, 10);
469 
470  av_log(NULL, AV_LOG_TRACE, "http_code=%d\n", s->http_code);
471 
472  if ((ret = check_http_code(h, s->http_code, end)) < 0)
473  return ret;
474  } else {
475  while (*p != '\0' && *p != ':')
476  p++;
477  if (*p != ':')
478  return 1;
479 
480  *p = '\0';
481  tag = line;
482  p++;
483  while (av_isspace(*p))
484  p++;
485  if (!av_strcasecmp(tag, "Location")) {
486  if ((ret = parse_location(s, p)) < 0)
487  return ret;
488  *new_location = 1;
489  } else if (!av_strcasecmp(tag, "Content-Length") && s->filesize == -1) {
490  s->filesize = strtoll(p, NULL, 10);
491  } else if (!av_strcasecmp(tag, "Content-Range")) {
492  parse_content_range(h, p);
493  } else if (!av_strcasecmp(tag, "Accept-Ranges") &&
494  !strncmp(p, "bytes", 5)) {
495  h->is_streamed = 0;
496  } else if (!av_strcasecmp(tag, "Transfer-Encoding") &&
497  !av_strncasecmp(p, "chunked", 7)) {
498  s->filesize = -1;
499  s->chunksize = 0;
500  } else if (!av_strcasecmp(tag, "WWW-Authenticate")) {
502  } else if (!av_strcasecmp(tag, "Authentication-Info")) {
504  } else if (!av_strcasecmp(tag, "Proxy-Authenticate")) {
506  } else if (!av_strcasecmp(tag, "Connection")) {
507  if (!strcmp(p, "close"))
508  s->willclose = 1;
509  } else if (!av_strcasecmp(tag, "Content-Type")) {
510  av_free(s->mime_type);
511  s->mime_type = av_strdup(p);
512  } else if (!av_strcasecmp(tag, "Icy-MetaInt")) {
513  s->icy_metaint = strtoll(p, NULL, 10);
514  } else if (!av_strncasecmp(tag, "Icy-", 4)) {
515  if ((ret = parse_icy(s, tag, p)) < 0)
516  return ret;
517  } else if (!av_strcasecmp(tag, "Content-Encoding")) {
518  if ((ret = parse_content_encoding(h, p)) < 0)
519  return ret;
520  }
521  }
522  return 1;
523 }
524 
525 static inline int has_header(const char *str, const char *header)
526 {
527  /* header + 2 to skip over CRLF prefix. (make sure you have one!) */
528  if (!str)
529  return 0;
530  return av_stristart(str, header + 2, NULL) || av_stristr(str, header);
531 }
532 
533 static int http_read_header(URLContext *h, int *new_location)
534 {
535  HTTPContext *s = h->priv_data;
536  char line[MAX_URL_SIZE];
537  int err = 0;
538 
539  s->chunksize = -1;
540 
541  for (;;) {
542  if ((err = http_get_line(s, line, sizeof(line))) < 0)
543  return err;
544 
545  av_log(NULL, AV_LOG_TRACE, "header='%s'\n", line);
546 
547  err = process_line(h, line, s->line_count, new_location);
548  if (err < 0)
549  return err;
550  if (err == 0)
551  break;
552  s->line_count++;
553  }
554 
555  return err;
556 }
557 
558 static int http_connect(URLContext *h, const char *path, const char *local_path,
559  const char *hoststr, const char *auth,
560  const char *proxyauth, int *new_location)
561 {
562  HTTPContext *s = h->priv_data;
563  int post, err;
564  char headers[HTTP_HEADERS_SIZE] = "";
565  char *authstr = NULL, *proxyauthstr = NULL;
566  int64_t off = s->off;
567  int len = 0;
568  const char *method;
569  int send_expect_100 = 0;
570 
571  /* send http header */
572  post = h->flags & AVIO_FLAG_WRITE;
573 
574  if (s->post_data) {
575  /* force POST method and disable chunked encoding when
576  * custom HTTP post data is set */
577  post = 1;
578  s->chunked_post = 0;
579  }
580 
581  if (s->method)
582  method = s->method;
583  else
584  method = post ? "POST" : "GET";
585 
586  authstr = ff_http_auth_create_response(&s->auth_state, auth,
587  local_path, method);
588  proxyauthstr = ff_http_auth_create_response(&s->proxy_auth_state, proxyauth,
589  local_path, method);
590  if (post && !s->post_data) {
591  send_expect_100 = s->send_expect_100;
592  /* The user has supplied authentication but we don't know the auth type,
593  * send Expect: 100-continue to get the 401 response including the
594  * WWW-Authenticate header, or an 100 continue if no auth actually
595  * is needed. */
596  if (auth && *auth &&
598  s->http_code != 401)
599  send_expect_100 = 1;
600  }
601 
602  /* set default headers if needed */
603  if (!has_header(s->headers, "\r\nUser-Agent: "))
604  len += av_strlcatf(headers + len, sizeof(headers) - len,
605  "User-Agent: %s\r\n", s->user_agent);
606  if (!has_header(s->headers, "\r\nAccept: "))
607  len += av_strlcpy(headers + len, "Accept: */*\r\n",
608  sizeof(headers) - len);
609  // Note: we send this on purpose even when s->off is 0 when we're probing,
610  // since it allows us to detect more reliably if a (non-conforming)
611  // server supports seeking by analysing the reply headers.
612  if (!has_header(s->headers, "\r\nRange: ") && !post) {
613  len += av_strlcatf(headers + len, sizeof(headers) - len,
614  "Range: bytes=%"PRId64"-", s->off);
615  if (s->end_off)
616  len += av_strlcatf(headers + len, sizeof(headers) - len,
617  "%"PRId64, s->end_off - 1);
618  len += av_strlcpy(headers + len, "\r\n",
619  sizeof(headers) - len);
620  }
621  if (send_expect_100 && !has_header(s->headers, "\r\nExpect: "))
622  len += av_strlcatf(headers + len, sizeof(headers) - len,
623  "Expect: 100-continue\r\n");
624 
625  if (!has_header(s->headers, "\r\nConnection: ")) {
626  if (s->multiple_requests)
627  len += av_strlcpy(headers + len, "Connection: keep-alive\r\n",
628  sizeof(headers) - len);
629  else
630  len += av_strlcpy(headers + len, "Connection: close\r\n",
631  sizeof(headers) - len);
632  }
633 
634  if (!has_header(s->headers, "\r\nHost: "))
635  len += av_strlcatf(headers + len, sizeof(headers) - len,
636  "Host: %s\r\n", hoststr);
637  if (!has_header(s->headers, "\r\nContent-Length: ") && s->post_data)
638  len += av_strlcatf(headers + len, sizeof(headers) - len,
639  "Content-Length: %d\r\n", s->post_datalen);
640 
641  if (!has_header(s->headers, "\r\nContent-Type: ") && s->content_type)
642  len += av_strlcatf(headers + len, sizeof(headers) - len,
643  "Content-Type: %s\r\n", s->content_type);
644  if (!has_header(s->headers, "\r\nIcy-MetaData: ") && s->icy)
645  len += av_strlcatf(headers + len, sizeof(headers) - len,
646  "Icy-MetaData: %d\r\n", 1);
647 
648  /* now add in custom headers */
649  if (s->headers)
650  av_strlcpy(headers + len, s->headers, sizeof(headers) - len);
651 
652  snprintf(s->buffer, sizeof(s->buffer),
653  "%s %s HTTP/1.1\r\n"
654  "%s"
655  "%s"
656  "%s"
657  "%s%s"
658  "\r\n",
659  method,
660  path,
661  post && s->chunked_post ? "Transfer-Encoding: chunked\r\n" : "",
662  headers,
663  authstr ? authstr : "",
664  proxyauthstr ? "Proxy-" : "", proxyauthstr ? proxyauthstr : "");
665 
666  av_freep(&authstr);
667  av_freep(&proxyauthstr);
668  if ((err = ffurl_write(s->hd, s->buffer, strlen(s->buffer))) < 0)
669  return err;
670 
671  if (s->post_data)
672  if ((err = ffurl_write(s->hd, s->post_data, s->post_datalen)) < 0)
673  return err;
674 
675  /* init input buffer */
676  s->buf_ptr = s->buffer;
677  s->buf_end = s->buffer;
678  s->line_count = 0;
679  s->off = 0;
680  s->icy_data_read = 0;
681  s->filesize = -1;
682  s->willclose = 0;
683  s->end_chunked_post = 0;
684  s->end_header = 0;
685  if (post && !s->post_data && !send_expect_100) {
686  /* Pretend that it did work. We didn't read any header yet, since
687  * we've still to send the POST data, but the code calling this
688  * function will check http_code after we return. */
689  s->http_code = 200;
690  return 0;
691  }
692 
693  /* wait for header */
694  err = http_read_header(h, new_location);
695  if (err < 0)
696  return err;
697 
698  return (off == s->off) ? 0 : -1;
699 }
700 
701 static int http_buf_read(URLContext *h, uint8_t *buf, int size)
702 {
703  HTTPContext *s = h->priv_data;
704  int len;
705  /* read bytes from input buffer first */
706  len = s->buf_end - s->buf_ptr;
707  if (len > 0) {
708  if (len > size)
709  len = size;
710  memcpy(buf, s->buf_ptr, len);
711  s->buf_ptr += len;
712  } else {
713  if ((!s->willclose || s->chunksize < 0) &&
714  s->filesize >= 0 && s->off >= s->filesize)
715  return AVERROR_EOF;
716  len = ffurl_read(s->hd, buf, size);
717  }
718  if (len > 0) {
719  s->off += len;
720  if (s->chunksize > 0)
721  s->chunksize -= len;
722  }
723  return len;
724 }
725 
726 #if CONFIG_ZLIB
727 #define DECOMPRESS_BUF_SIZE (256 * 1024)
728 static int http_buf_read_compressed(URLContext *h, uint8_t *buf, int size)
729 {
730  HTTPContext *s = h->priv_data;
731  int ret;
732 
733  if (!s->inflate_buffer) {
734  s->inflate_buffer = av_malloc(DECOMPRESS_BUF_SIZE);
735  if (!s->inflate_buffer)
736  return AVERROR(ENOMEM);
737  }
738 
739  if (s->inflate_stream.avail_in == 0) {
740  int read = http_buf_read(h, s->inflate_buffer, DECOMPRESS_BUF_SIZE);
741  if (read <= 0)
742  return read;
743  s->inflate_stream.next_in = s->inflate_buffer;
744  s->inflate_stream.avail_in = read;
745  }
746 
747  s->inflate_stream.avail_out = size;
748  s->inflate_stream.next_out = buf;
749 
750  ret = inflate(&s->inflate_stream, Z_SYNC_FLUSH);
751  if (ret != Z_OK && ret != Z_STREAM_END)
752  av_log(h, AV_LOG_WARNING, "inflate return value: %d, %s\n",
753  ret, s->inflate_stream.msg);
754 
755  return size - s->inflate_stream.avail_out;
756 }
757 #endif /* CONFIG_ZLIB */
758 
759 static int http_read_stream(URLContext *h, uint8_t *buf, int size)
760 {
761  HTTPContext *s = h->priv_data;
762  int err, new_location;
763 
764  if (!s->hd)
765  return AVERROR_EOF;
766 
767  if (s->end_chunked_post && !s->end_header) {
768  err = http_read_header(h, &new_location);
769  if (err < 0)
770  return err;
771  }
772 
773  if (s->chunksize >= 0) {
774  if (!s->chunksize) {
775  char line[32];
776 
777  for (;;) {
778  do {
779  if ((err = http_get_line(s, line, sizeof(line))) < 0)
780  return err;
781  } while (!*line); /* skip CR LF from last chunk */
782 
783  s->chunksize = strtoll(line, NULL, 16);
784 
785  av_log(NULL, AV_LOG_TRACE, "Chunked encoding data size: %"PRId64"'\n",
786  s->chunksize);
787  if (s->chunksize < 0)
788  return AVERROR_INVALIDDATA;
789  else if (!s->chunksize)
790  return 0;
791  break;
792  }
793  }
794  size = FFMIN(size, s->chunksize);
795  }
796 #if CONFIG_ZLIB
797  if (s->compressed)
798  return http_buf_read_compressed(h, buf, size);
799 #endif /* CONFIG_ZLIB */
800  return http_buf_read(h, buf, size);
801 }
802 
803 static int http_read_stream_all(URLContext *h, uint8_t *buf, int size)
804 {
805  int pos = 0;
806  while (pos < size) {
807  int len = http_read_stream(h, buf + pos, size - pos);
808  if (len < 0)
809  return len;
810  pos += len;
811  }
812  return pos;
813 }
814 
815 static void update_metadata(HTTPContext *s, char *data)
816 {
817  char *key;
818  char *val;
819  char *end;
820  char *next = data;
821 
822  while (*next) {
823  key = next;
824  val = strstr(key, "='");
825  if (!val)
826  break;
827  end = strstr(val, "';");
828  if (!end)
829  break;
830 
831  *val = '\0';
832  *end = '\0';
833  val += 2;
834 
835  av_dict_set(&s->metadata, key, val, 0);
836 
837  next = end + 2;
838  }
839 }
840 
841 static int store_icy(URLContext *h, int size)
842 {
843  HTTPContext *s = h->priv_data;
844  /* until next metadata packet */
845  int remaining = s->icy_metaint - s->icy_data_read;
846 
847  if (remaining < 0)
848  return AVERROR_INVALIDDATA;
849 
850  if (!remaining) {
851  /* The metadata packet is variable sized. It has a 1 byte header
852  * which sets the length of the packet (divided by 16). If it's 0,
853  * the metadata doesn't change. After the packet, icy_metaint bytes
854  * of normal data follows. */
855  uint8_t ch;
856  int len = http_read_stream_all(h, &ch, 1);
857  if (len < 0)
858  return len;
859  if (ch > 0) {
860  char data[255 * 16 + 1];
861  int ret;
862  len = ch * 16;
863  ret = http_read_stream_all(h, data, len);
864  if (ret < 0)
865  return ret;
866  data[len + 1] = 0;
867  if ((ret = av_opt_set(s, "icy_metadata_packet", data, 0)) < 0)
868  return ret;
869  update_metadata(s, data);
870  }
871  s->icy_data_read = 0;
872  remaining = s->icy_metaint;
873  }
874 
875  return FFMIN(size, remaining);
876 }
877 
878 static int http_read(URLContext *h, uint8_t *buf, int size)
879 {
880  HTTPContext *s = h->priv_data;
881 
882  if (s->icy_metaint > 0) {
883  size = store_icy(h, size);
884  if (size < 0)
885  return size;
886  }
887 
888  size = http_read_stream(h, buf, size);
889  if (size > 0)
890  s->icy_data_read += size;
891  return size;
892 }
893 
894 /* used only when posting data */
895 static int http_write(URLContext *h, const uint8_t *buf, int size)
896 {
897  char temp[11] = ""; /* 32-bit hex + CRLF + nul */
898  int ret;
899  char crlf[] = "\r\n";
900  HTTPContext *s = h->priv_data;
901 
902  if (!s->chunked_post) {
903  /* non-chunked data is sent without any special encoding */
904  return ffurl_write(s->hd, buf, size);
905  }
906 
907  /* silently ignore zero-size data since chunk encoding that would
908  * signal EOF */
909  if (size > 0) {
910  /* upload data using chunked encoding */
911  snprintf(temp, sizeof(temp), "%x\r\n", size);
912 
913  if ((ret = ffurl_write(s->hd, temp, strlen(temp))) < 0 ||
914  (ret = ffurl_write(s->hd, buf, size)) < 0 ||
915  (ret = ffurl_write(s->hd, crlf, sizeof(crlf) - 1)) < 0)
916  return ret;
917  }
918  return size;
919 }
920 
921 static int http_shutdown(URLContext *h, int flags)
922 {
923  int ret = 0;
924  char footer[] = "0\r\n\r\n";
925  HTTPContext *s = h->priv_data;
926 
927  /* signal end of chunked encoding if used */
928  if ((flags & AVIO_FLAG_WRITE) && s->chunked_post) {
929  ret = ffurl_write(s->hd, footer, sizeof(footer) - 1);
930  ret = ret > 0 ? 0 : ret;
931  s->end_chunked_post = 1;
932  }
933 
934  return ret;
935 }
936 
937 static int http_close(URLContext *h)
938 {
939  int ret = 0;
940  HTTPContext *s = h->priv_data;
941 
942 #if CONFIG_ZLIB
943  inflateEnd(&s->inflate_stream);
944  av_freep(&s->inflate_buffer);
945 #endif /* CONFIG_ZLIB */
946 
947  if (!s->end_chunked_post)
948  /* Close the write direction by sending the end of chunked encoding. */
949  ret = http_shutdown(h, h->flags);
950 
951  if (s->hd)
952  ffurl_close(s->hd);
954  return ret;
955 }
956 
957 static int64_t http_seek(URLContext *h, int64_t off, int whence)
958 {
959  HTTPContext *s = h->priv_data;
960  URLContext *old_hd = s->hd;
961  int64_t old_off = s->off;
962  uint8_t old_buf[BUFFER_SIZE];
963  int old_buf_size, ret;
964  AVDictionary *options = NULL;
965 
966  if (whence == AVSEEK_SIZE)
967  return s->filesize;
968  else if ((whence == SEEK_CUR && off == 0) ||
969  (whence == SEEK_SET && off == s->off))
970  return s->off;
971  else if ((s->filesize == -1 && whence == SEEK_END) || h->is_streamed)
972  return AVERROR(ENOSYS);
973 
974  /* we save the old context in case the seek fails */
975  old_buf_size = s->buf_end - s->buf_ptr;
976  memcpy(old_buf, s->buf_ptr, old_buf_size);
977  s->hd = NULL;
978  if (whence == SEEK_CUR)
979  off += s->off;
980  else if (whence == SEEK_END)
981  off += s->filesize;
982  s->off = off;
983 
984  /* if it fails, continue on old connection */
985  av_dict_copy(&options, s->chained_options, 0);
986  if ((ret = http_open_cnx(h, &options)) < 0) {
987  av_dict_free(&options);
988  memcpy(s->buffer, old_buf, old_buf_size);
989  s->buf_ptr = s->buffer;
990  s->buf_end = s->buffer + old_buf_size;
991  s->hd = old_hd;
992  s->off = old_off;
993  return ret;
994  }
995  av_dict_free(&options);
996  ffurl_close(old_hd);
997  return off;
998 }
999 
1001 {
1002  HTTPContext *s = h->priv_data;
1003  return ffurl_get_file_handle(s->hd);
1004 }
1005 
1006 #define HTTP_CLASS(flavor) \
1007 static const AVClass flavor ## _context_class = { \
1008  .class_name = # flavor, \
1009  .item_name = av_default_item_name, \
1010  .option = options, \
1011  .version = LIBAVUTIL_VERSION_INT, \
1012 }
1013 
1014 #if CONFIG_HTTP_PROTOCOL
1015 HTTP_CLASS(http);
1016 
1017 const URLProtocol ff_http_protocol = {
1018  .name = "http",
1019  .url_open2 = http_open,
1020  .url_read = http_read,
1021  .url_write = http_write,
1022  .url_seek = http_seek,
1023  .url_close = http_close,
1024  .url_get_file_handle = http_get_file_handle,
1025  .url_shutdown = http_shutdown,
1026  .priv_data_size = sizeof(HTTPContext),
1027  .priv_data_class = &http_context_class,
1029 };
1030 #endif /* CONFIG_HTTP_PROTOCOL */
1031 
1032 #if CONFIG_HTTPS_PROTOCOL
1033 HTTP_CLASS(https);
1034 
1036  .name = "https",
1037  .url_open2 = http_open,
1038  .url_read = http_read,
1039  .url_write = http_write,
1040  .url_seek = http_seek,
1041  .url_close = http_close,
1042  .url_get_file_handle = http_get_file_handle,
1043  .url_shutdown = http_shutdown,
1044  .priv_data_size = sizeof(HTTPContext),
1045  .priv_data_class = &https_context_class,
1047 };
1048 #endif /* CONFIG_HTTPS_PROTOCOL */
1049 
1050 #if CONFIG_HTTPPROXY_PROTOCOL
1051 static int http_proxy_close(URLContext *h)
1052 {
1053  HTTPContext *s = h->priv_data;
1054  if (s->hd)
1055  ffurl_close(s->hd);
1056  return 0;
1057 }
1058 
1059 static int http_proxy_open(URLContext *h, const char *uri, int flags)
1060 {
1061  HTTPContext *s = h->priv_data;
1062  char hostname[1024], hoststr[1024];
1063  char auth[1024], pathbuf[1024], *path;
1064  char lower_url[100];
1065  int port, ret = 0, attempts = 0;
1066  HTTPAuthType cur_auth_type;
1067  char *authstr;
1068  int new_loc;
1069 
1070  h->is_streamed = 1;
1071 
1072  av_url_split(NULL, 0, auth, sizeof(auth), hostname, sizeof(hostname), &port,
1073  pathbuf, sizeof(pathbuf), uri);
1074  ff_url_join(hoststr, sizeof(hoststr), NULL, NULL, hostname, port, NULL);
1075  path = pathbuf;
1076  if (*path == '/')
1077  path++;
1078 
1079  ff_url_join(lower_url, sizeof(lower_url), "tcp", NULL, hostname, port,
1080  NULL);
1081 redo:
1082  ret = ffurl_open(&s->hd, lower_url, AVIO_FLAG_READ_WRITE,
1083  &h->interrupt_callback, NULL, h->protocols, h);
1084  if (ret < 0)
1085  return ret;
1086 
1087  authstr = ff_http_auth_create_response(&s->proxy_auth_state, auth,
1088  path, "CONNECT");
1089  snprintf(s->buffer, sizeof(s->buffer),
1090  "CONNECT %s HTTP/1.1\r\n"
1091  "Host: %s\r\n"
1092  "Connection: close\r\n"
1093  "%s%s"
1094  "\r\n",
1095  path,
1096  hoststr,
1097  authstr ? "Proxy-" : "", authstr ? authstr : "");
1098  av_freep(&authstr);
1099 
1100  if ((ret = ffurl_write(s->hd, s->buffer, strlen(s->buffer))) < 0)
1101  goto fail;
1102 
1103  s->buf_ptr = s->buffer;
1104  s->buf_end = s->buffer;
1105  s->line_count = 0;
1106  s->filesize = -1;
1107  cur_auth_type = s->proxy_auth_state.auth_type;
1108 
1109  /* Note: This uses buffering, potentially reading more than the
1110  * HTTP header. If tunneling a protocol where the server starts
1111  * the conversation, we might buffer part of that here, too.
1112  * Reading that requires using the proper ffurl_read() function
1113  * on this URLContext, not using the fd directly (as the tls
1114  * protocol does). This shouldn't be an issue for tls though,
1115  * since the client starts the conversation there, so there
1116  * is no extra data that we might buffer up here.
1117  */
1118  ret = http_read_header(h, &new_loc);
1119  if (ret < 0)
1120  goto fail;
1121 
1122  attempts++;
1123  if (s->http_code == 407 &&
1124  (cur_auth_type == HTTP_AUTH_NONE || s->proxy_auth_state.stale) &&
1125  s->proxy_auth_state.auth_type != HTTP_AUTH_NONE && attempts < 2) {
1126  ffurl_close(s->hd);
1127  s->hd = NULL;
1128  goto redo;
1129  }
1130 
1131  if (s->http_code < 400)
1132  return 0;
1133  ret = AVERROR(EIO);
1134 
1135 fail:
1136  http_proxy_close(h);
1137  return ret;
1138 }
1139 
1140 static int http_proxy_write(URLContext *h, const uint8_t *buf, int size)
1141 {
1142  HTTPContext *s = h->priv_data;
1143  return ffurl_write(s->hd, buf, size);
1144 }
1145 
1147  .name = "httpproxy",
1148  .url_open = http_proxy_open,
1149  .url_read = http_buf_read,
1150  .url_write = http_proxy_write,
1151  .url_close = http_proxy_close,
1152  .url_get_file_handle = http_get_file_handle,
1153  .priv_data_size = sizeof(HTTPContext),
1154  .flags = URL_PROTOCOL_FLAG_NETWORK,
1155 };
1156 #endif /* CONFIG_HTTPPROXY_PROTOCOL */
static int http_get_line(HTTPContext *s, char *line, int line_size)
Definition: http.c:325
void av_url_split(char *proto, int proto_size, char *authorization, int authorization_size, char *hostname, int hostname_size, int *port_ptr, char *path, int path_size, const char *url)
Split a URL string into components.
Definition: utils.c:2870
static void parse_content_range(URLContext *h, const char *p)
Definition: http.c:378
AVDictionary * metadata
Definition: http.c:83
void * av_malloc(size_t size)
Allocate a block of size bytes with alignment suitable for all memory accesses (including vectors if ...
Definition: mem.c:62
static int http_connect(URLContext *h, const char *path, const char *local_path, const char *hoststr, const char *auth, const char *proxyauth, int *new_location)
Definition: http.c:558
void ff_make_absolute_url(char *buf, int size, const char *base, const char *rel)
Definition: url.c:80
#define AVERROR_INVALIDDATA
Invalid data found when processing input.
Definition: error.h:54
int icy_data_read
Definition: http.c:78
int size
#define URL_PROTOCOL_FLAG_NETWORK
Definition: url.h:34
uint8_t * post_data
Definition: http.c:74
AVOption.
Definition: opt.h:234
#define AV_OPT_FLAG_EXPORT
The option is intended for exporting values to the caller.
Definition: opt.h:275
HTTPAuthType
Authentication types, ordered from weakest to strongest.
Definition: httpauth.h:28
#define BUFFER_SIZE
Definition: http.c:45
#define AV_LOG_WARNING
Something somehow does not look correct.
Definition: log.h:130
static int http_close(URLContext *h)
Definition: http.c:937
int ffurl_write(URLContext *h, const unsigned char *buf, int size)
Write size bytes from buf to the resource accessed by h.
Definition: avio.c:257
char * av_stristr(const char *s1, const char *s2)
Locate the first case-independent occurrence in the string haystack of the string needle...
Definition: avstring.c:54
int is_streamed
true if streamed (no seek possible), default = false
Definition: url.h:49
AVIOInterruptCB interrupt_callback
Definition: url.h:51
HTTPAuthState proxy_auth_state
Definition: http.c:59
av_log(ac->avr, AV_LOG_TRACE, "%d samples - audio_convert: %s to %s (%s)\, len, av_get_sample_fmt_name(ac->in_fmt), av_get_sample_fmt_name(ac->out_fmt), use_generic ? ac->func_descr_generic :ac->func_descr)
char * icy_metadata_headers
Definition: http.c:81
static av_const int av_isspace(int c)
Locale-independent conversion of ASCII isspace.
Definition: avstring.h:173
const URLProtocol ff_http_protocol
#define AVIO_FLAG_WRITE
write-only
Definition: avio.h:369
int av_strncasecmp(const char *a, const char *b, size_t n)
Locale-independent case-insensitive compare.
Definition: avstring.c:166
int av_dict_copy(AVDictionary **dst, const AVDictionary *src, int flags)
Copy entries from one AVDictionary struct into another.
Definition: dict.c:189
int flags
Definition: url.h:47
char * content_type
Definition: http.c:63
static int http_getc(HTTPContext *s)
Definition: http.c:308
HTTP Authentication state structure.
Definition: httpauth.h:55
void av_freep(void *arg)
Free a memory block which has been allocated with av_malloc(z)() or av_realloc() and set the pointer ...
Definition: mem.c:202
#define MAX_URL_SIZE
Definition: internal.h:28
int end_chunked_post
Definition: http.c:69
int av_stristart(const char *str, const char *pfx, const char **ptr)
Return non-zero if pfx is a prefix of str independent of case.
Definition: avstring.c:43
static int http_get_file_handle(URLContext *h)
Definition: http.c:1000
static int http_buf_read(URLContext *h, uint8_t *buf, int size)
Definition: http.c:701
uint8_t
int post_datalen
Definition: http.c:75
AVOptions.
miscellaneous OS support macros and functions.
#define AV_LOG_TRACE
Extremely verbose debugging, useful for libav* development.
Definition: log.h:150
static int http_read_header(URLContext *h, int *new_location)
Definition: http.c:533
#define HTTP_HEADERS_SIZE
Definition: http.h:27
static int http_open_cnx(URLContext *h, AVDictionary **options)
Definition: http.c:198
const char data[16]
Definition: mxf.c:70
int av_reallocp(void *ptr, size_t size)
Allocate or reallocate a block of memory.
Definition: mem.c:140
static int flags
Definition: log.c:50
uint32_t tag
Definition: movenc.c:854
#define DEFAULT_USER_AGENT
Definition: http.c:97
#define AVERROR_EOF
End of file.
Definition: error.h:51
void ff_http_init_auth_state(URLContext *dest, const URLContext *src)
Initialize the authentication state based on another HTTP URLContext.
Definition: http.c:127
int ffurl_open(URLContext **puc, const char *filename, int flags, const AVIOInterruptCB *int_cb, AVDictionary **options, const URLProtocol **protocols, URLContext *parent)
Create an URLContext for accessing to the resource indicated by url, and open it. ...
Definition: avio.c:175
HTTP 1.0 Basic auth from RFC 1945 (also in RFC 2617)
Definition: httpauth.h:30
static int http_open_cnx_internal(URLContext *h, AVDictionary **options)
Definition: http.c:137
int line_count
Definition: http.c:52
unsigned char * buf_end
Definition: http.c:51
static void update_metadata(HTTPContext *s, char *data)
Definition: http.c:815
#define src
Definition: vp8dsp.c:254
int chunked_post
Definition: http.c:67
void av_free(void *ptr)
Free a memory block which has been allocated with av_malloc(z)() or av_realloc(). ...
Definition: mem.c:190
#define E
Definition: http.c:96
#define AVERROR(e)
Definition: error.h:43
static int http_write(URLContext *h, const uint8_t *buf, int size)
Definition: http.c:895
static const AVOption options[]
Definition: http.c:99
void av_dict_free(AVDictionary **pm)
Free all the memory allocated for an AVDictionary struct and all keys and values. ...
Definition: dict.c:175
Definition: graph2dot.c:48
#define OFFSET(x)
Definition: http.c:94
size_t av_strlcpy(char *dst, const char *src, size_t size)
Copy the string src to dst, but no more than size - 1 bytes, and null-terminate dst.
Definition: avstring.c:81
#define fail()
Definition: checkasm.h:80
AVDictionary * chained_options
Definition: http.c:89
static int store_icy(URLContext *h, int size)
Definition: http.c:841
char * headers
Definition: http.c:60
char * user_agent
Definition: http.c:62
char * icy_metadata_packet
Definition: http.c:82
#define FFMIN(a, b)
Definition: common.h:66
const URLProtocol ff_httpproxy_protocol
int64_t off
Definition: http.c:56
int av_strcasecmp(const char *a, const char *b)
Definition: avstring.c:156
int64_t end_off
Definition: http.c:56
int send_expect_100
Definition: http.c:90
int willclose
Definition: http.c:66
int ff_http_match_no_proxy(const char *no_proxy, const char *hostname)
Definition: network.c:260
int ffurl_get_file_handle(URLContext *h)
Return the file descriptor associated with this URL.
Definition: avio.c:345
int stale
Auth ok, but needs to be resent with a new nonce.
Definition: httpauth.h:71
offset must point to a pointer immediately followed by an int for the length
Definition: opt.h:226
int ff_url_join(char *str, int size, const char *proto, const char *authorization, const char *hostname, int port, const char *fmt,...)
Definition: url.c:36
NULL
Definition: eval.c:55
static int http_read(URLContext *h, uint8_t *buf, int size)
Definition: http.c:878
char * av_strdup(const char *s)
Duplicate the string s.
Definition: mem.c:219
Definition: url.h:38
#define AVIO_FLAG_READ_WRITE
read-write pseudo flag
Definition: avio.h:370
int av_dict_set(AVDictionary **pm, const char *key, const char *value, int flags)
Set the given entry in *pm, overwriting an existing entry.
Definition: dict.c:68
unsigned char buffer[BUFFER_SIZE]
Definition: http.c:51
Describe the class of an AVClass context structure.
Definition: log.h:34
#define SPACE_CHARS
Definition: internal.h:230
void * priv_data
Definition: url.h:45
size_t av_strlcatf(char *dst, size_t size, const char *fmt,...)
Definition: avstring.c:99
int icy
Definition: http.c:76
char * ff_http_auth_create_response(HTTPAuthState *state, const char *auth, const char *path, const char *method)
Definition: httpauth.c:243
const char * name
Definition: url.h:56
URLContext * hd
Definition: http.c:50
static int has_header(const char *str, const char *header)
Definition: http.c:525
char * mime_type
Definition: http.c:61
int ffurl_close(URLContext *h)
Close the resource accessed by the URLContext h, and free the memory used by it.
Definition: avio.c:280
static int process_line(URLContext *h, char *line, int line_count, int *new_location)
Definition: http.c:449
int ff_http_do_new_request(URLContext *h, const char *uri)
Send a new HTTP request, reusing the old connection.
Definition: http.c:254
int av_strstart(const char *str, const char *pfx, const char **ptr)
Return non-zero if pfx is a prefix of str.
Definition: avstring.c:32
const struct URLProtocol ** protocols
A NULL-terminated list of protocols usable by the child contexts.
Definition: url.h:44
Main libavformat public API header.
#define MAX_REDIRECTS
Definition: http.c:46
static int parse_content_encoding(URLContext *h, const char *p)
Definition: http.c:392
int http_code
Definition: http.c:53
static int http_open(URLContext *h, const char *uri, int flags, AVDictionary **options)
Definition: http.c:273
#define AVSEEK_SIZE
ORing this as the "whence" parameter to a seek function causes it to return the filesize without seek...
Definition: avio.h:266
void ff_http_auth_handle_header(HTTPAuthState *state, const char *key, const char *value)
Definition: httpauth.c:90
int multiple_requests
Definition: http.c:73
HTTPAuthState auth_state
Definition: http.c:58
const URLProtocol ff_https_protocol
int len
static int parse_location(HTTPContext *s, const char *p)
Definition: http.c:364
int64_t filesize
Definition: http.c:56
char * location
Definition: http.c:57
static int http_shutdown(URLContext *h, int flags)
Definition: http.c:921
int icy_metaint
Definition: http.c:80
#define AV_OPT_FLAG_READONLY
The option may not be set through the AVOptions API, only read.
Definition: opt.h:280
int end_header
Definition: http.c:71
unsigned char * buf_ptr
Definition: http.c:51
#define D
Definition: http.c:95
char * method
Definition: http.c:91
static int parse_icy(HTTPContext *s, const char *tag, const char *p)
Definition: http.c:427
HTTPAuthType auth_type
The currently chosen auth type.
Definition: httpauth.h:59
static int http_read_stream(URLContext *h, uint8_t *buf, int size)
Definition: http.c:759
static int http_read_stream_all(URLContext *h, uint8_t *buf, int size)
Definition: http.c:803
unbuffered private I/O API
static int64_t http_seek(URLContext *h, int64_t off, int whence)
Definition: http.c:957
int av_opt_set(void *obj, const char *name, const char *val, int search_flags)
Definition: opt.c:247
int ffurl_read(URLContext *h, unsigned char *buf, int size)
Read up to size bytes from the resource accessed by h, and store the read bytes in buf...
Definition: avio.c:243
int64_t chunksize
Definition: http.c:55
#define HTTP_CLASS(flavor)
Definition: http.c:1006
No authentication specified.
Definition: httpauth.h:29
static int check_http_code(URLContext *h, int http_code, const char *end)
Definition: http.c:349