1 /*****************************************************************************
2 * http.c: HTTP input module
3 *****************************************************************************
4 * Copyright (C) 2001-2008 the VideoLAN team
7 * Authors: Laurent Aimar <fenrir@via.ecp.fr>
8 * Christophe Massiot <massiot@via.ecp.fr>
9 * RĂ©mi Denis-Courmont <rem # videolan.org>
10 * Antoine Cellerier <dionoea at videolan dot org>
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2 of the License, or
15 * (at your option) any later version.
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software
24 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
25 *****************************************************************************/
27 /*****************************************************************************
29 *****************************************************************************/
34 #include <vlc_common.h>
35 #include <vlc_plugin.h>
38 #include <vlc_access.h>
40 #include <vlc_dialog.h>
42 #include <vlc_network.h>
45 #include <vlc_strings.h>
46 #include <vlc_charset.h>
47 #include <vlc_input.h>
59 /*****************************************************************************
61 *****************************************************************************/
62 static int Open ( vlc_object_t * );
63 static void Close( vlc_object_t * );
65 #define PROXY_TEXT N_("HTTP proxy")
66 #define PROXY_LONGTEXT N_( \
67 "HTTP proxy to be used It must be of the form " \
68 "http://[user@]myproxy.mydomain:myport/ ; " \
69 "if empty, the http_proxy environment variable will be tried." )
71 #define PROXY_PASS_TEXT N_("HTTP proxy password")
72 #define PROXY_PASS_LONGTEXT N_( \
73 "If your HTTP proxy requires a password, set it here." )
75 #define CACHING_TEXT N_("Caching value in ms")
76 #define CACHING_LONGTEXT N_( \
77 "Caching value for HTTP streams. This " \
78 "value should be set in milliseconds." )
80 #define AGENT_TEXT N_("HTTP user agent")
81 #define AGENT_LONGTEXT N_("User agent that will be " \
82 "used for the connection.")
84 #define RECONNECT_TEXT N_("Auto re-connect")
85 #define RECONNECT_LONGTEXT N_( \
86 "Automatically try to reconnect to the stream in case of a sudden " \
89 #define CONTINUOUS_TEXT N_("Continuous stream")
90 #define CONTINUOUS_LONGTEXT N_("Read a file that is " \
91 "being constantly updated (for example, a JPG file on a server). " \
92 "You should not globally enable this option as it will break all other " \
93 "types of HTTP streams." )
95 #define FORWARD_COOKIES_TEXT N_("Forward Cookies")
96 #define FORWARD_COOKIES_LONGTEXT N_("Forward Cookies across http redirections ")
99 set_description( N_("HTTP input") )
100 set_capability( "access", 0 )
101 set_shortname( N_( "HTTP(S)" ) )
102 set_category( CAT_INPUT )
103 set_subcategory( SUBCAT_INPUT_ACCESS )
105 add_string( "http-proxy", NULL, NULL, PROXY_TEXT, PROXY_LONGTEXT,
107 add_password( "http-proxy-pwd", NULL, NULL,
108 PROXY_PASS_TEXT, PROXY_PASS_LONGTEXT, false )
109 add_integer( "http-caching", 4 * DEFAULT_PTS_DELAY / 1000, NULL,
110 CACHING_TEXT, CACHING_LONGTEXT, true )
112 add_string( "http-user-agent", COPYRIGHT_MESSAGE , NULL, AGENT_TEXT,
113 AGENT_LONGTEXT, true )
114 add_bool( "http-reconnect", 0, NULL, RECONNECT_TEXT,
115 RECONNECT_LONGTEXT, true )
116 add_bool( "http-continuous", 0, NULL, CONTINUOUS_TEXT,
117 CONTINUOUS_LONGTEXT, true )
119 add_bool( "http-forward-cookies", true, NULL, FORWARD_COOKIES_TEXT,
120 FORWARD_COOKIES_LONGTEXT, true )
121 add_obsolete_string("http-user")
122 add_obsolete_string("http-pwd")
123 add_shortcut( "http" )
124 add_shortcut( "https" )
125 add_shortcut( "unsv" )
126 add_shortcut( "itpc" ) /* iTunes Podcast */
127 add_shortcut( "icyx" )
128 set_callbacks( Open, Close )
131 /*****************************************************************************
133 *****************************************************************************/
135 /* RFC 2617: Basic and Digest Access Authentication */
136 typedef struct http_auth_t
147 char *psz_HA1; /* stored H(A1) value if algorithm = "MD5-sess" */
153 tls_session_t *p_tls;
158 char *psz_user_agent;
164 http_auth_t proxy_auth;
165 char *psz_proxy_passbuf;
169 const char *psz_protocol;
191 int64_t i_icy_offset;
204 vlc_array_t * cookies;
208 static int OpenWithCookies( vlc_object_t *p_this, vlc_array_t *cookies );
211 static ssize_t Read( access_t *, uint8_t *, size_t );
212 static ssize_t ReadCompressed( access_t *, uint8_t *, size_t );
213 static int Seek( access_t *, int64_t );
214 static int Control( access_t *, int, va_list );
217 static int Connect( access_t *, int64_t );
218 static int Request( access_t *p_access, int64_t i_tell );
219 static void Disconnect( access_t * );
221 /* Small Cookie utilities. Cookies support is partial. */
222 static char * cookie_get_content( const char * cookie );
223 static char * cookie_get_domain( const char * cookie );
224 static char * cookie_get_name( const char * cookie );
225 static void cookie_append( vlc_array_t * cookies, char * cookie );
228 static void AuthParseHeader( access_t *p_access, const char *psz_header,
229 http_auth_t *p_auth );
230 static void AuthReply( access_t *p_acces, const char *psz_prefix,
231 vlc_url_t *p_url, http_auth_t *p_auth );
232 static int AuthCheckReply( access_t *p_access, const char *psz_header,
233 vlc_url_t *p_url, http_auth_t *p_auth );
234 static void AuthReset( http_auth_t *p_auth );
236 /*****************************************************************************
238 *****************************************************************************/
239 static int Open( vlc_object_t *p_this )
241 return OpenWithCookies( p_this, NULL );
244 static int OpenWithCookies( vlc_object_t *p_this, vlc_array_t *cookies )
246 access_t *p_access = (access_t*)p_this;
249 /* Only forward an store cookies if the corresponding option is activated */
250 bool b_forward_cookies = var_CreateGetBool( p_access, "http-forward-cookies" );
251 vlc_array_t * saved_cookies = b_forward_cookies ? (cookies ? cookies : vlc_array_new()) : NULL;
253 /* Set up p_access */
254 STANDARD_READ_ACCESS_INIT;
256 p_access->pf_read = ReadCompressed;
259 p_sys->b_proxy = false;
260 p_sys->psz_proxy_passbuf = NULL;
261 p_sys->i_version = 1;
262 p_sys->b_seekable = true;
263 p_sys->psz_mime = NULL;
264 p_sys->psz_pragma = NULL;
265 p_sys->b_mms = false;
266 p_sys->b_icecast = false;
267 p_sys->psz_location = NULL;
268 p_sys->psz_user_agent = NULL;
269 p_sys->b_pace_control = true;
270 p_sys->b_ssl = false;
272 p_sys->b_compressed = false;
273 /* 15 is the max windowBits, +32 to enable optional gzip decoding */
274 if( inflateInit2( &p_sys->inflate.stream, 32+15 ) != Z_OK )
275 msg_Warn( p_access, "Error during zlib initialisation: %s",
276 p_sys->inflate.stream.msg );
277 if( zlibCompileFlags() & (1<<17) )
278 msg_Warn( p_access, "Your zlib was compiled without gzip support." );
279 p_sys->inflate.p_buffer = NULL;
283 p_sys->i_icy_meta = 0;
284 p_sys->i_icy_offset = 0;
285 p_sys->psz_icy_name = NULL;
286 p_sys->psz_icy_genre = NULL;
287 p_sys->psz_icy_title = NULL;
288 p_sys->i_remaining = 0;
289 p_sys->b_persist = false;
290 p_access->info.i_size = -1;
291 p_access->info.i_pos = 0;
292 p_access->info.b_eof = false;
294 p_sys->cookies = saved_cookies;
296 /* Parse URI - remove spaces */
297 p = psz = strdup( p_access->psz_path );
298 while( (p = strchr( p, ' ' )) != NULL )
300 vlc_UrlParse( &p_sys->url, psz, 0 );
303 if( p_sys->url.psz_host == NULL || *p_sys->url.psz_host == '\0' )
305 msg_Warn( p_access, "invalid host" );
308 if( !strncmp( p_access->psz_access, "https", 5 ) )
312 if( p_sys->url.i_port <= 0 )
313 p_sys->url.i_port = 443;
317 if( p_sys->url.i_port <= 0 )
318 p_sys->url.i_port = 80;
322 p_sys->psz_user_agent = var_CreateGetString( p_access, "http-user-agent" );
325 psz = var_CreateGetNonEmptyString( p_access, "http-proxy" );
328 p_sys->b_proxy = true;
329 vlc_UrlParse( &p_sys->proxy, psz, 0 );
335 pxProxyFactory *pf = px_proxy_factory_new();
340 i=asprintf(&buf, "%s://%s", p_access->psz_access, p_access->psz_path);
343 msg_Dbg(p_access, "asking libproxy about url '%s'", buf);
344 char **proxies = px_proxy_factory_get_proxies(pf, buf);
347 msg_Dbg(p_access, "libproxy suggest to use '%s'", proxies[0]);
348 if(strcmp(proxies[0],"direct://") != 0)
350 p_sys->b_proxy = true;
351 vlc_UrlParse( &p_sys->proxy, proxies[0], 0);
354 for(i=0;proxies[i];i++) free(proxies[i]);
358 px_proxy_factory_free(pf);
362 msg_Err(p_access, "Allocating memory for libproxy failed");
368 psz = getenv( "http_proxy" );
371 p_sys->b_proxy = true;
372 vlc_UrlParse( &p_sys->proxy, psz, 0 );
376 if( psz ) /* No, this is NOT a use-after-free error */
378 psz = var_CreateGetNonEmptyString( p_access, "http-proxy-pwd" );
380 p_sys->proxy.psz_password = p_sys->psz_proxy_passbuf = psz;
385 if( p_sys->proxy.psz_host == NULL || *p_sys->proxy.psz_host == '\0' )
387 msg_Warn( p_access, "invalid proxy host" );
390 if( p_sys->proxy.i_port <= 0 )
392 p_sys->proxy.i_port = 80;
396 msg_Dbg( p_access, "http: server='%s' port=%d file='%s",
397 p_sys->url.psz_host, p_sys->url.i_port, p_sys->url.psz_path );
400 msg_Dbg( p_access, " proxy %s:%d", p_sys->proxy.psz_host,
401 p_sys->proxy.i_port );
403 if( p_sys->url.psz_username && *p_sys->url.psz_username )
405 msg_Dbg( p_access, " user='%s'", p_sys->url.psz_username );
408 p_sys->b_reconnect = var_CreateGetBool( p_access, "http-reconnect" );
409 p_sys->b_continuous = var_CreateGetBool( p_access, "http-continuous" );
413 switch( Connect( p_access, 0 ) )
419 /* Retry with http 1.0 */
420 msg_Dbg( p_access, "switching to HTTP version 1.0" );
421 p_sys->i_version = 0;
422 p_sys->b_seekable = false;
424 if( !vlc_object_alive (p_access) || Connect( p_access, 0 ) )
432 msg_Err( p_access, "You should not be here" );
437 if( p_sys->i_code == 401 )
439 char *psz_login, *psz_password;
441 if( p_sys->url.psz_username && p_sys->url.psz_password &&
442 p_sys->auth.psz_nonce && p_sys->auth.i_nonce == 0 )
444 Disconnect( p_access );
447 msg_Dbg( p_access, "authentication failed for realm %s",
448 p_sys->auth.psz_realm );
449 dialog_Login( p_access, &psz_login, &psz_password,
450 _("HTTP authentication"),
451 _("Please enter a valid login name and a password for realm %s."),
452 p_sys->auth.psz_realm );
453 if( psz_login != NULL && psz_password != NULL )
455 msg_Dbg( p_access, "retrying with user=%s", psz_login );
456 p_sys->url.psz_username = psz_login;
457 p_sys->url.psz_password = psz_password;
458 Disconnect( p_access );
464 free( psz_password );
469 if( ( p_sys->i_code == 301 || p_sys->i_code == 302 ||
470 p_sys->i_code == 303 || p_sys->i_code == 307 ) &&
471 p_sys->psz_location && *p_sys->psz_location )
473 msg_Dbg( p_access, "redirection to %s", p_sys->psz_location );
475 /* Do not accept redirection outside of HTTP works */
476 if( strncmp( p_sys->psz_location, "http", 4 )
477 || ( ( p_sys->psz_location[4] != ':' ) /* HTTP */
478 && strncmp( p_sys->psz_location + 4, "s:", 2 ) /* HTTP/SSL */ ) )
480 msg_Err( p_access, "insecure redirection ignored" );
483 free( p_access->psz_path );
484 p_access->psz_path = strdup( p_sys->psz_location );
485 /* Clean up current Open() run */
486 vlc_UrlClean( &p_sys->url );
487 AuthReset( &p_sys->auth );
488 vlc_UrlClean( &p_sys->proxy );
489 free( p_sys->psz_proxy_passbuf );
490 AuthReset( &p_sys->proxy_auth );
491 free( p_sys->psz_mime );
492 free( p_sys->psz_pragma );
493 free( p_sys->psz_location );
494 free( p_sys->psz_user_agent );
496 Disconnect( p_access );
497 cookies = p_sys->cookies;
499 inflateEnd( &p_sys->inflate.stream );
503 /* Do new Open() run with new data */
504 return OpenWithCookies( p_this, cookies );
509 msg_Dbg( p_access, "this is actually a live mms server, BAIL" );
513 if( !strcmp( p_sys->psz_protocol, "ICY" ) || p_sys->b_icecast )
515 if( p_sys->psz_mime && strcasecmp( p_sys->psz_mime, "application/ogg" ) )
517 if( !strcasecmp( p_sys->psz_mime, "video/nsv" ) ||
518 !strcasecmp( p_sys->psz_mime, "video/nsa" ) )
520 free( p_access->psz_demux );
521 p_access->psz_demux = strdup( "nsv" );
523 else if( !strcasecmp( p_sys->psz_mime, "audio/aac" ) ||
524 !strcasecmp( p_sys->psz_mime, "audio/aacp" ) )
526 free( p_access->psz_demux );
527 p_access->psz_demux = strdup( "m4a" );
529 else if( !strcasecmp( p_sys->psz_mime, "audio/mpeg" ) )
531 free( p_access->psz_demux );
532 p_access->psz_demux = strdup( "mp3" );
535 msg_Info( p_access, "Raw-audio server found, %s demuxer selected",
536 p_access->psz_demux );
538 #if 0 /* Doesn't work really well because of the pre-buffering in
539 * shoutcast servers (the buffer content will be sent as fast as
541 p_sys->b_pace_control = false;
544 else if( !p_sys->psz_mime )
546 free( p_access->psz_demux );
548 p_access->psz_demux = strdup( "mp3" );
550 /* else probably Ogg Vorbis */
552 else if( !strcasecmp( p_access->psz_access, "unsv" ) &&
554 !strcasecmp( p_sys->psz_mime, "misc/ultravox" ) )
556 free( p_access->psz_demux );
557 /* Grrrr! detect ultravox server and force NSV demuxer */
558 p_access->psz_demux = strdup( "nsv" );
560 else if( !strcmp( p_access->psz_access, "itpc" ) )
562 free( p_access->psz_demux );
563 p_access->psz_demux = strdup( "podcast" );
565 else if( p_sys->psz_mime &&
566 !strncasecmp( p_sys->psz_mime, "application/xspf+xml", 20 ) &&
567 ( memchr( " ;\t", p_sys->psz_mime[20], 4 ) != NULL ) )
569 free( p_access->psz_demux );
570 p_access->psz_demux = strdup( "xspf-open" );
573 if( p_sys->b_reconnect ) msg_Dbg( p_access, "auto re-connect enabled" );
576 var_Create( p_access, "http-caching", VLC_VAR_INTEGER |VLC_VAR_DOINHERIT );
581 vlc_UrlClean( &p_sys->url );
582 vlc_UrlClean( &p_sys->proxy );
583 free( p_sys->psz_proxy_passbuf );
584 free( p_sys->psz_mime );
585 free( p_sys->psz_pragma );
586 free( p_sys->psz_location );
587 free( p_sys->psz_user_agent );
589 Disconnect( p_access );
594 for( i = 0; i < vlc_array_count( p_sys->cookies ); i++ )
595 free(vlc_array_item_at_index( p_sys->cookies, i ));
596 vlc_array_destroy( p_sys->cookies );
600 inflateEnd( &p_sys->inflate.stream );
606 /*****************************************************************************
608 *****************************************************************************/
609 static void Close( vlc_object_t *p_this )
611 access_t *p_access = (access_t*)p_this;
612 access_sys_t *p_sys = p_access->p_sys;
614 vlc_UrlClean( &p_sys->url );
615 AuthReset( &p_sys->auth );
616 vlc_UrlClean( &p_sys->proxy );
617 AuthReset( &p_sys->proxy_auth );
619 free( p_sys->psz_mime );
620 free( p_sys->psz_pragma );
621 free( p_sys->psz_location );
623 free( p_sys->psz_icy_name );
624 free( p_sys->psz_icy_genre );
625 free( p_sys->psz_icy_title );
627 free( p_sys->psz_user_agent );
629 Disconnect( p_access );
634 for( i = 0; i < vlc_array_count( p_sys->cookies ); i++ )
635 free(vlc_array_item_at_index( p_sys->cookies, i ));
636 vlc_array_destroy( p_sys->cookies );
640 inflateEnd( &p_sys->inflate.stream );
641 free( p_sys->inflate.p_buffer );
647 /*****************************************************************************
648 * Read: Read up to i_len bytes from the http connection and place in
649 * p_buffer. Return the actual number of bytes read
650 *****************************************************************************/
651 static int ReadICYMeta( access_t *p_access );
652 static ssize_t Read( access_t *p_access, uint8_t *p_buffer, size_t i_len )
654 access_sys_t *p_sys = p_access->p_sys;
657 if( p_sys->fd == -1 )
659 p_access->info.b_eof = true;
663 if( p_access->info.i_size >= 0 &&
664 i_len + p_access->info.i_pos > p_access->info.i_size )
666 if( ( i_len = p_access->info.i_size - p_access->info.i_pos ) == 0 )
668 p_access->info.b_eof = true;
673 if( p_sys->b_chunked )
675 if( p_sys->i_chunk < 0 )
677 p_access->info.b_eof = true;
681 if( p_sys->i_chunk <= 0 )
683 char *psz = net_Gets( VLC_OBJECT(p_access), p_sys->fd, p_sys->p_vs );
684 /* read the chunk header */
687 /* fatal error - end of file */
688 msg_Dbg( p_access, "failed reading chunk-header line" );
691 p_sys->i_chunk = strtoll( psz, NULL, 16 );
694 if( p_sys->i_chunk <= 0 ) /* eof */
697 p_access->info.b_eof = true;
702 if( i_len > p_sys->i_chunk )
704 i_len = p_sys->i_chunk;
707 else if( p_access->info.i_size != -1 && (int64_t)i_len > p_sys->i_remaining) {
708 /* Only ask for the remaining length */
709 i_len = (size_t)p_sys->i_remaining;
711 p_access->info.b_eof = true;
717 if( p_sys->i_icy_meta > 0 && p_access->info.i_pos-p_sys->i_icy_offset > 0 )
719 int64_t i_next = p_sys->i_icy_meta -
720 (p_access->info.i_pos - p_sys->i_icy_offset ) % p_sys->i_icy_meta;
722 if( i_next == p_sys->i_icy_meta )
724 if( ReadICYMeta( p_access ) )
726 p_access->info.b_eof = true;
734 i_read = net_Read( p_access, p_sys->fd, p_sys->p_vs, p_buffer, i_len, false );
738 p_access->info.i_pos += i_read;
740 if( p_sys->b_chunked )
742 p_sys->i_chunk -= i_read;
743 if( p_sys->i_chunk <= 0 )
745 /* read the empty line */
746 char *psz = net_Gets( VLC_OBJECT(p_access), p_sys->fd, p_sys->p_vs );
751 else if( i_read <= 0 )
754 * I very much doubt that this will work.
755 * If i_read == 0, the connection *IS* dead, so the only
756 * sensible thing to do is Disconnect() and then retry.
757 * Otherwise, I got recv() completely wrong. -- Courmisch
759 if( p_sys->b_continuous )
761 Request( p_access, 0 );
762 p_sys->b_continuous = false;
763 i_read = Read( p_access, p_buffer, i_len );
764 p_sys->b_continuous = true;
766 Disconnect( p_access );
767 if( p_sys->b_reconnect )
769 msg_Dbg( p_access, "got disconnected, trying to reconnect" );
770 if( Connect( p_access, p_access->info.i_pos ) )
772 msg_Dbg( p_access, "reconnection failed" );
776 p_sys->b_reconnect = false;
777 i_read = Read( p_access, p_buffer, i_len );
778 p_sys->b_reconnect = true;
783 p_access->info.b_eof = true;
784 else if( i_read < 0 )
785 p_access->b_error = true;
788 if( p_access->info.i_size != -1 )
790 p_sys->i_remaining -= i_read;
796 static int ReadICYMeta( access_t *p_access )
798 access_sys_t *p_sys = p_access->p_sys;
804 /* Read meta data length */
805 i_read = net_Read( p_access, p_sys->fd, p_sys->p_vs, &buffer, 1,
812 i_read = buffer << 4;
813 /* msg_Dbg( p_access, "ICY meta size=%u", i_read); */
815 psz_meta = malloc( i_read + 1 );
816 if( net_Read( p_access, p_sys->fd, p_sys->p_vs,
817 (uint8_t *)psz_meta, i_read, true ) != i_read )
823 psz_meta[i_read] = '\0'; /* Just in case */
825 /* msg_Dbg( p_access, "icy-meta=%s", psz_meta ); */
827 /* Now parse the meta */
828 /* Look for StreamTitle= */
829 p = strcasestr( (char *)psz_meta, "StreamTitle=" );
832 p += strlen( "StreamTitle=" );
833 if( *p == '\'' || *p == '"' )
835 char closing[] = { p[0], ';', '\0' };
836 char *psz = strstr( &p[1], closing );
838 psz = strchr( &p[1], ';' );
840 if( psz ) *psz = '\0';
844 char *psz = strchr( &p[1], ';' );
845 if( psz ) *psz = '\0';
848 if( !p_sys->psz_icy_title ||
849 strcmp( p_sys->psz_icy_title, &p[1] ) )
851 free( p_sys->psz_icy_title );
852 char *psz_tmp = strdup( &p[1] );
853 p_sys->psz_icy_title = EnsureUTF8( psz_tmp );
854 if( !p_sys->psz_icy_title )
856 p_access->info.i_update |= INPUT_UPDATE_META;
858 msg_Dbg( p_access, "New Title=%s", p_sys->psz_icy_title );
867 static ssize_t ReadCompressed( access_t *p_access, uint8_t *p_buffer,
870 access_sys_t *p_sys = p_access->p_sys;
872 if( p_sys->b_compressed )
876 if( !p_sys->inflate.p_buffer )
877 p_sys->inflate.p_buffer = malloc( 256 * 1024 );
879 if( p_sys->inflate.stream.avail_in == 0 )
881 ssize_t i_read = Read( p_access, p_sys->inflate.p_buffer + p_sys->inflate.stream.avail_in, 256 * 1024 );
882 if( i_read <= 0 ) return i_read;
883 p_sys->inflate.stream.next_in = p_sys->inflate.p_buffer;
884 p_sys->inflate.stream.avail_in = i_read;
887 p_sys->inflate.stream.avail_out = i_len;
888 p_sys->inflate.stream.next_out = p_buffer;
890 i_ret = inflate( &p_sys->inflate.stream, Z_SYNC_FLUSH );
891 msg_Warn( p_access, "inflate return value: %d, %s", i_ret, p_sys->inflate.stream.msg );
893 return i_len - p_sys->inflate.stream.avail_out;
897 return Read( p_access, p_buffer, i_len );
902 /*****************************************************************************
903 * Seek: close and re-open a connection at the right place
904 *****************************************************************************/
905 static int Seek( access_t *p_access, int64_t i_pos )
907 msg_Dbg( p_access, "trying to seek to %"PRId64, i_pos );
909 Disconnect( p_access );
911 if( p_access->info.i_size
912 && (uint64_t)i_pos >= (uint64_t)p_access->info.i_size ) {
913 msg_Err( p_access, "seek to far" );
914 int retval = Seek( p_access, p_access->info.i_size - 1 );
915 if( retval == VLC_SUCCESS ) {
917 Read( p_access, p_buffer, 1);
918 p_access->info.b_eof = false;
922 if( Connect( p_access, i_pos ) )
924 msg_Err( p_access, "seek failed" );
925 p_access->info.b_eof = true;
931 /*****************************************************************************
933 *****************************************************************************/
934 static int Control( access_t *p_access, int i_query, va_list args )
936 access_sys_t *p_sys = p_access->p_sys;
944 case ACCESS_CAN_SEEK:
945 pb_bool = (bool*)va_arg( args, bool* );
946 *pb_bool = p_sys->b_seekable;
948 case ACCESS_CAN_FASTSEEK:
949 pb_bool = (bool*)va_arg( args, bool* );
952 case ACCESS_CAN_PAUSE:
953 case ACCESS_CAN_CONTROL_PACE:
954 pb_bool = (bool*)va_arg( args, bool* );
956 #if 0 /* Disable for now until we have a clock synchro algo
957 * which works with something else than MPEG over UDP */
958 *pb_bool = p_sys->b_pace_control;
964 case ACCESS_GET_PTS_DELAY:
965 pi_64 = (int64_t*)va_arg( args, int64_t * );
966 *pi_64 = (int64_t)var_GetInteger( p_access, "http-caching" ) * 1000;
970 case ACCESS_SET_PAUSE_STATE:
973 case ACCESS_GET_META:
974 p_meta = (vlc_meta_t*)va_arg( args, vlc_meta_t* );
976 if( p_sys->psz_icy_name )
977 vlc_meta_Set( p_meta, vlc_meta_Title, p_sys->psz_icy_name );
978 if( p_sys->psz_icy_genre )
979 vlc_meta_Set( p_meta, vlc_meta_Genre, p_sys->psz_icy_genre );
980 if( p_sys->psz_icy_title )
981 vlc_meta_Set( p_meta, vlc_meta_NowPlaying, p_sys->psz_icy_title );
984 case ACCESS_GET_CONTENT_TYPE:
985 *va_arg( args, char ** ) =
986 p_sys->psz_mime ? strdup( p_sys->psz_mime ) : NULL;
989 case ACCESS_GET_TITLE_INFO:
990 case ACCESS_SET_TITLE:
991 case ACCESS_SET_SEEKPOINT:
992 case ACCESS_SET_PRIVATE_ID_STATE:
996 msg_Warn( p_access, "unimplemented query in control" );
1003 /*****************************************************************************
1005 *****************************************************************************/
1006 static int Connect( access_t *p_access, int64_t i_tell )
1008 access_sys_t *p_sys = p_access->p_sys;
1009 vlc_url_t srv = p_sys->b_proxy ? p_sys->proxy : p_sys->url;
1012 free( p_sys->psz_location );
1013 free( p_sys->psz_mime );
1014 free( p_sys->psz_pragma );
1016 free( p_sys->psz_icy_genre );
1017 free( p_sys->psz_icy_name );
1018 free( p_sys->psz_icy_title );
1021 p_sys->psz_location = NULL;
1022 p_sys->psz_mime = NULL;
1023 p_sys->psz_pragma = NULL;
1024 p_sys->b_mms = false;
1025 p_sys->b_chunked = false;
1027 p_sys->i_icy_meta = 0;
1028 p_sys->i_icy_offset = i_tell;
1029 p_sys->psz_icy_name = NULL;
1030 p_sys->psz_icy_genre = NULL;
1031 p_sys->psz_icy_title = NULL;
1032 p_sys->i_remaining = 0;
1033 p_sys->b_persist = false;
1035 p_access->info.i_size = -1;
1036 p_access->info.i_pos = i_tell;
1037 p_access->info.b_eof = false;
1039 /* Open connection */
1040 assert( p_sys->fd == -1 ); /* No open sockets (leaking fds is BAD) */
1041 p_sys->fd = net_ConnectTCP( p_access, srv.psz_host, srv.i_port );
1042 if( p_sys->fd == -1 )
1044 msg_Err( p_access, "cannot connect to %s:%d", srv.psz_host, srv.i_port );
1047 setsockopt (p_sys->fd, SOL_SOCKET, SO_KEEPALIVE, &(int){ 1 }, sizeof (int));
1049 /* Initialize TLS/SSL session */
1050 if( p_sys->b_ssl == true )
1052 /* CONNECT to establish TLS tunnel through HTTP proxy */
1053 if( p_sys->b_proxy )
1056 unsigned i_status = 0;
1058 if( p_sys->i_version == 0 )
1060 /* CONNECT is not in HTTP/1.0 */
1061 Disconnect( p_access );
1065 net_Printf( VLC_OBJECT(p_access), p_sys->fd, NULL,
1066 "CONNECT %s:%d HTTP/1.%d\r\nHost: %s:%d\r\n\r\n",
1067 p_sys->url.psz_host, p_sys->url.i_port,
1069 p_sys->url.psz_host, p_sys->url.i_port);
1071 psz = net_Gets( VLC_OBJECT(p_access), p_sys->fd, NULL );
1074 msg_Err( p_access, "cannot establish HTTP/TLS tunnel" );
1075 Disconnect( p_access );
1079 sscanf( psz, "HTTP/%*u.%*u %3u", &i_status );
1082 if( ( i_status / 100 ) != 2 )
1084 msg_Err( p_access, "HTTP/TLS tunnel through proxy denied" );
1085 Disconnect( p_access );
1091 psz = net_Gets( VLC_OBJECT(p_access), p_sys->fd, NULL );
1094 msg_Err( p_access, "HTTP proxy connection failed" );
1095 Disconnect( p_access );
1104 if( !vlc_object_alive (p_access) || p_access->b_error )
1106 Disconnect( p_access );
1113 /* TLS/SSL handshake */
1114 p_sys->p_tls = tls_ClientCreate( VLC_OBJECT(p_access), p_sys->fd,
1115 p_sys->url.psz_host );
1116 if( p_sys->p_tls == NULL )
1118 msg_Err( p_access, "cannot establish HTTP/TLS session" );
1119 Disconnect( p_access );
1122 p_sys->p_vs = &p_sys->p_tls->sock;
1125 return Request( p_access, i_tell ) ? -2 : 0;
1129 static int Request( access_t *p_access, int64_t i_tell )
1131 access_sys_t *p_sys = p_access->p_sys;
1133 v_socket_t *pvs = p_sys->p_vs;
1134 p_sys->b_persist = false;
1136 p_sys->i_remaining = 0;
1137 if( p_sys->b_proxy )
1139 if( p_sys->url.psz_path )
1141 net_Printf( VLC_OBJECT(p_access), p_sys->fd, NULL,
1142 "GET http://%s:%d%s HTTP/1.%d\r\n",
1143 p_sys->url.psz_host, p_sys->url.i_port,
1144 p_sys->url.psz_path, p_sys->i_version );
1148 net_Printf( VLC_OBJECT(p_access), p_sys->fd, NULL,
1149 "GET http://%s:%d/ HTTP/1.%d\r\n",
1150 p_sys->url.psz_host, p_sys->url.i_port,
1156 const char *psz_path = p_sys->url.psz_path;
1157 if( !psz_path || !*psz_path )
1161 if( p_sys->url.i_port != (pvs ? 443 : 80) )
1163 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs,
1164 "GET %s HTTP/1.%d\r\nHost: %s:%d\r\n",
1165 psz_path, p_sys->i_version, p_sys->url.psz_host,
1166 p_sys->url.i_port );
1170 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs,
1171 "GET %s HTTP/1.%d\r\nHost: %s\r\n",
1172 psz_path, p_sys->i_version, p_sys->url.psz_host );
1176 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs, "User-Agent: %s\r\n",
1177 p_sys->psz_user_agent );
1179 if( p_sys->i_version == 1 && ! p_sys->b_continuous )
1181 p_sys->b_persist = true;
1182 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs,
1183 "Range: bytes=%"PRIu64"-\r\n", i_tell );
1187 if( p_sys->cookies )
1190 for( i = 0; i < vlc_array_count( p_sys->cookies ); i++ )
1192 const char * cookie = vlc_array_item_at_index( p_sys->cookies, i );
1193 char * psz_cookie_content = cookie_get_content( cookie );
1194 char * psz_cookie_domain = cookie_get_domain( cookie );
1196 assert( psz_cookie_content );
1198 /* FIXME: This is clearly not conforming to the rfc */
1199 bool is_in_right_domain = (!psz_cookie_domain || strstr( p_sys->url.psz_host, psz_cookie_domain ));
1201 if( is_in_right_domain )
1203 msg_Dbg( p_access, "Sending Cookie %s", psz_cookie_content );
1204 if( net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs, "Cookie: %s\r\n", psz_cookie_content ) < 0 )
1205 msg_Err( p_access, "failed to send Cookie" );
1207 free( psz_cookie_content );
1208 free( psz_cookie_domain );
1212 /* Authentication */
1213 if( p_sys->url.psz_username || p_sys->url.psz_password )
1214 AuthReply( p_access, "", &p_sys->url, &p_sys->auth );
1216 /* Proxy Authentication */
1217 if( p_sys->proxy.psz_username || p_sys->proxy.psz_password )
1218 AuthReply( p_access, "Proxy-", &p_sys->proxy, &p_sys->proxy_auth );
1220 /* ICY meta data request */
1221 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs, "Icy-MetaData: 1\r\n" );
1224 if( net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs, "\r\n" ) < 0 )
1226 msg_Err( p_access, "failed to send request" );
1227 Disconnect( p_access );
1228 return VLC_EGENERIC;
1232 if( ( psz = net_Gets( VLC_OBJECT(p_access), p_sys->fd, pvs ) ) == NULL )
1234 msg_Err( p_access, "failed to read answer" );
1237 if( !strncmp( psz, "HTTP/1.", 7 ) )
1239 p_sys->psz_protocol = "HTTP";
1240 p_sys->i_code = atoi( &psz[9] );
1242 else if( !strncmp( psz, "ICY", 3 ) )
1244 p_sys->psz_protocol = "ICY";
1245 p_sys->i_code = atoi( &psz[4] );
1246 p_sys->b_reconnect = true;
1250 msg_Err( p_access, "invalid HTTP reply '%s'", psz );
1254 msg_Dbg( p_access, "protocol '%s' answer code %d",
1255 p_sys->psz_protocol, p_sys->i_code );
1256 if( !strcmp( p_sys->psz_protocol, "ICY" ) )
1258 p_sys->b_seekable = false;
1260 if( p_sys->i_code != 206 && p_sys->i_code != 401 )
1262 p_sys->b_seekable = false;
1264 /* Authentication error - We'll have to display the dialog */
1265 if( p_sys->i_code == 401 )
1269 /* Other fatal error */
1270 else if( p_sys->i_code >= 400 )
1272 msg_Err( p_access, "error: %s", psz );
1280 char *psz = net_Gets( VLC_OBJECT(p_access), p_sys->fd, pvs );
1285 msg_Err( p_access, "failed to read answer" );
1289 if( !vlc_object_alive (p_access) || p_access->b_error )
1295 /* msg_Dbg( p_input, "Line=%s", psz ); */
1302 if( ( p = strchr( psz, ':' ) ) == NULL )
1304 msg_Err( p_access, "malformed header line: %s", psz );
1309 while( *p == ' ' ) p++;
1311 if( !strcasecmp( psz, "Content-Length" ) )
1313 int64_t i_size = i_tell + (p_sys->i_remaining = atoll( p ));
1314 if(i_size > p_access->info.i_size) {
1315 p_access->info.i_size = i_size;
1317 msg_Dbg( p_access, "this frame size=%"PRId64, p_sys->i_remaining );
1319 else if( !strcasecmp( psz, "Content-Range" ) ) {
1320 int64_t i_ntell = i_tell;
1321 int64_t i_nend = (p_access->info.i_size > 0)?(p_access->info.i_size - 1):i_tell;
1322 int64_t i_nsize = p_access->info.i_size;
1323 sscanf(p,"bytes %"PRId64"-%"PRId64"/%"PRId64,&i_ntell,&i_nend,&i_nsize);
1324 if(i_nend > i_ntell ) {
1325 p_access->info.i_pos = i_ntell;
1326 p_sys->i_remaining = i_nend+1-i_ntell;
1327 int64_t i_size = (i_nsize > i_nend) ? i_nsize : (i_nend + 1);
1328 if(i_size > p_access->info.i_size) {
1329 p_access->info.i_size = i_size;
1331 msg_Dbg( p_access, "stream size=%"PRId64",pos=%"PRId64",remaining=%"PRId64,i_nsize,i_ntell,p_sys->i_remaining);
1334 else if( !strcasecmp( psz, "Connection" ) ) {
1335 msg_Dbg( p_access, "Connection: %s",p );
1337 sscanf(p, "close%n",&i);
1339 p_sys->b_persist = false;
1342 else if( !strcasecmp( psz, "Location" ) )
1346 /* This does not follow RFC 2068, but yet if the url is not absolute,
1347 * handle it as everyone does. */
1350 const char *psz_http_ext = p_sys->b_ssl ? "s" : "" ;
1352 if( p_sys->url.i_port == ( p_sys->b_ssl ? 443 : 80 ) )
1354 if( asprintf(&psz_new_loc, "http%s://%s%s", psz_http_ext,
1355 p_sys->url.psz_host, p) < 0 )
1360 if( asprintf(&psz_new_loc, "http%s://%s:%d%s", psz_http_ext,
1361 p_sys->url.psz_host, p_sys->url.i_port, p) < 0 )
1367 psz_new_loc = strdup( p );
1370 free( p_sys->psz_location );
1371 p_sys->psz_location = psz_new_loc;
1373 else if( !strcasecmp( psz, "Content-Type" ) )
1375 free( p_sys->psz_mime );
1376 p_sys->psz_mime = strdup( p );
1377 msg_Dbg( p_access, "Content-Type: %s", p_sys->psz_mime );
1379 else if( !strcasecmp( psz, "Content-Encoding" ) )
1381 msg_Dbg( p_access, "Content-Encoding: %s", p );
1382 if( strcasecmp( p, "identity" ) )
1384 p_sys->b_compressed = true;
1386 msg_Warn( p_access, "Compressed content not supported. Rebuild with zlib support." );
1389 else if( !strcasecmp( psz, "Pragma" ) )
1391 if( !strcasecmp( psz, "Pragma: features" ) )
1392 p_sys->b_mms = true;
1393 free( p_sys->psz_pragma );
1394 p_sys->psz_pragma = strdup( p );
1395 msg_Dbg( p_access, "Pragma: %s", p_sys->psz_pragma );
1397 else if( !strcasecmp( psz, "Server" ) )
1399 msg_Dbg( p_access, "Server: %s", p );
1400 if( !strncasecmp( p, "Icecast", 7 ) ||
1401 !strncasecmp( p, "Nanocaster", 10 ) )
1403 /* Remember if this is Icecast
1404 * we need to force demux in this case without breaking
1407 /* Let live 365 streams (nanocaster) piggyback on the icecast
1408 * routine. They look very similar */
1410 p_sys->b_reconnect = true;
1411 p_sys->b_pace_control = false;
1412 p_sys->b_icecast = true;
1415 else if( !strcasecmp( psz, "Transfer-Encoding" ) )
1417 msg_Dbg( p_access, "Transfer-Encoding: %s", p );
1418 if( !strncasecmp( p, "chunked", 7 ) )
1420 p_sys->b_chunked = true;
1423 else if( !strcasecmp( psz, "Icy-MetaInt" ) )
1425 msg_Dbg( p_access, "Icy-MetaInt: %s", p );
1426 p_sys->i_icy_meta = atoi( p );
1427 if( p_sys->i_icy_meta < 0 )
1428 p_sys->i_icy_meta = 0;
1429 if( p_sys->i_icy_meta > 0 )
1430 p_sys->b_icecast = true;
1432 msg_Warn( p_access, "ICY metaint=%d", p_sys->i_icy_meta );
1434 else if( !strcasecmp( psz, "Icy-Name" ) )
1436 free( p_sys->psz_icy_name );
1437 char *psz_tmp = strdup( p );
1438 p_sys->psz_icy_name = EnsureUTF8( psz_tmp );
1439 if( !p_sys->psz_icy_name )
1441 msg_Dbg( p_access, "Icy-Name: %s", p_sys->psz_icy_name );
1443 p_sys->b_icecast = true; /* be on the safeside. set it here as well. */
1444 p_sys->b_reconnect = true;
1445 p_sys->b_pace_control = false;
1447 else if( !strcasecmp( psz, "Icy-Genre" ) )
1449 free( p_sys->psz_icy_genre );
1450 char *psz_tmp = strdup( p );
1451 p_sys->psz_icy_genre = EnsureUTF8( psz_tmp );
1452 if( !p_sys->psz_icy_genre )
1454 msg_Dbg( p_access, "Icy-Genre: %s", p_sys->psz_icy_genre );
1456 else if( !strncasecmp( psz, "Icy-Notice", 10 ) )
1458 msg_Dbg( p_access, "Icy-Notice: %s", p );
1460 else if( !strncasecmp( psz, "icy-", 4 ) ||
1461 !strncasecmp( psz, "ice-", 4 ) ||
1462 !strncasecmp( psz, "x-audiocast", 11 ) )
1464 msg_Dbg( p_access, "Meta-Info: %s: %s", psz, p );
1466 else if( !strcasecmp( psz, "Set-Cookie" ) )
1468 if( p_sys->cookies )
1470 msg_Dbg( p_access, "Accepting Cookie: %s", p );
1471 cookie_append( p_sys->cookies, strdup(p) );
1474 msg_Dbg( p_access, "We have a Cookie we won't remember: %s", p );
1476 else if( !strcasecmp( psz, "www-authenticate" ) )
1478 msg_Dbg( p_access, "Authentication header: %s", p );
1479 AuthParseHeader( p_access, p, &p_sys->auth );
1481 else if( !strcasecmp( psz, "proxy-authenticate" ) )
1483 msg_Dbg( p_access, "Proxy authentication header: %s", p );
1484 AuthParseHeader( p_access, p, &p_sys->proxy_auth );
1486 else if( !strcasecmp( psz, "authentication-info" ) )
1488 msg_Dbg( p_access, "Authentication Info header: %s", p );
1489 if( AuthCheckReply( p_access, p, &p_sys->url, &p_sys->auth ) )
1492 else if( !strcasecmp( psz, "proxy-authentication-info" ) )
1494 msg_Dbg( p_access, "Proxy Authentication Info header: %s", p );
1495 if( AuthCheckReply( p_access, p, &p_sys->proxy, &p_sys->proxy_auth ) )
1501 /* We close the stream for zero length data, unless of course the
1502 * server has already promised to do this for us.
1504 if( p_access->info.i_size != -1 && p_sys->i_remaining == 0 && p_sys->b_persist ) {
1505 Disconnect( p_access );
1510 Disconnect( p_access );
1511 return VLC_EGENERIC;
1514 /*****************************************************************************
1516 *****************************************************************************/
1517 static void Disconnect( access_t *p_access )
1519 access_sys_t *p_sys = p_access->p_sys;
1521 if( p_sys->p_tls != NULL)
1523 tls_ClientDelete( p_sys->p_tls );
1524 p_sys->p_tls = NULL;
1527 if( p_sys->fd != -1)
1529 net_Close(p_sys->fd);
1535 /*****************************************************************************
1536 * Cookies (FIXME: we may want to rewrite that using a nice structure to hold
1537 * them) (FIXME: only support the "domain=" param)
1538 *****************************************************************************/
1540 /* Get the NAME=VALUE part of the Cookie */
1541 static char * cookie_get_content( const char * cookie )
1543 char * ret = strdup( cookie );
1544 if( !ret ) return NULL;
1546 /* Look for a ';' */
1547 while( *str && *str != ';' ) str++;
1548 /* Replace it by a end-char */
1549 if( *str == ';' ) *str = 0;
1553 /* Get the domain where the cookie is stored */
1554 static char * cookie_get_domain( const char * cookie )
1556 const char * str = cookie;
1557 static const char domain[] = "domain=";
1560 /* Look for a ';' */
1563 if( !strncmp( str, domain, sizeof(domain) - 1 /* minus \0 */ ) )
1565 str += sizeof(domain) - 1 /* minus \0 */;
1566 char * ret = strdup( str );
1567 /* Now remove the next ';' if present */
1568 char * ret_iter = ret;
1569 while( *ret_iter && *ret_iter != ';' ) ret_iter++;
1570 if( *ret_iter == ';' )
1574 /* Go to next ';' field */
1575 while( *str && *str != ';' ) str++;
1576 if( *str == ';' ) str++;
1578 while( *str && *str == ' ' ) str++;
1583 /* Get NAME in the NAME=VALUE field */
1584 static char * cookie_get_name( const char * cookie )
1586 char * ret = cookie_get_content( cookie ); /* NAME=VALUE */
1587 if( !ret ) return NULL;
1589 while( *str && *str != '=' ) str++;
1594 /* Add a cookie in cookies, checking to see how it should be added */
1595 static void cookie_append( vlc_array_t * cookies, char * cookie )
1602 char * cookie_name = cookie_get_name( cookie );
1604 /* Don't send invalid cookies */
1608 char * cookie_domain = cookie_get_domain( cookie );
1609 for( i = 0; i < vlc_array_count( cookies ); i++ )
1611 char * current_cookie = vlc_array_item_at_index( cookies, i );
1612 char * current_cookie_name = cookie_get_name( current_cookie );
1613 char * current_cookie_domain = cookie_get_domain( current_cookie );
1615 assert( current_cookie_name );
1617 bool is_domain_matching = ( cookie_domain && current_cookie_domain &&
1618 !strcmp( cookie_domain, current_cookie_domain ) );
1620 if( is_domain_matching && !strcmp( cookie_name, current_cookie_name ) )
1622 /* Remove previous value for this cookie */
1623 free( current_cookie );
1624 vlc_array_remove( cookies, i );
1627 free( current_cookie_name );
1628 free( current_cookie_domain );
1631 free( current_cookie_name );
1632 free( current_cookie_domain );
1634 free( cookie_name );
1635 free( cookie_domain );
1636 vlc_array_append( cookies, cookie );
1639 /*****************************************************************************
1640 * "RFC 2617: Basic and Digest Access Authentication" header parsing
1641 *****************************************************************************/
1642 static char *AuthGetParam( const char *psz_header, const char *psz_param )
1644 char psz_what[strlen(psz_param)+3];
1645 sprintf( psz_what, "%s=\"", psz_param );
1646 psz_header = strstr( psz_header, psz_what );
1649 const char *psz_end;
1650 psz_header += strlen( psz_what );
1651 psz_end = strchr( psz_header, '"' );
1652 if( !psz_end ) /* Invalid since we should have a closing quote */
1653 return strdup( psz_header );
1654 return strndup( psz_header, psz_end - psz_header );
1662 static char *AuthGetParamNoQuotes( const char *psz_header, const char *psz_param )
1664 char psz_what[strlen(psz_param)+2];
1665 sprintf( psz_what, "%s=", psz_param );
1666 psz_header = strstr( psz_header, psz_what );
1669 const char *psz_end;
1670 psz_header += strlen( psz_what );
1671 psz_end = strchr( psz_header, ',' );
1672 /* XXX: Do we need to filter out trailing space between the value and
1673 * the comma/end of line? */
1674 if( !psz_end ) /* Can be valid if this is the last parameter */
1675 return strdup( psz_header );
1676 return strndup( psz_header, psz_end - psz_header );
1684 static void AuthParseHeader( access_t *p_access, const char *psz_header,
1685 http_auth_t *p_auth )
1687 /* FIXME: multiple auth methods can be listed (comma seperated) */
1689 /* 2 Basic Authentication Scheme */
1690 if( !strncasecmp( psz_header, "Basic ", strlen( "Basic " ) ) )
1692 msg_Dbg( p_access, "Using Basic Authentication" );
1693 psz_header += strlen( "Basic " );
1694 p_auth->psz_realm = AuthGetParam( psz_header, "realm" );
1695 if( !p_auth->psz_realm )
1696 msg_Warn( p_access, "Basic Authentication: "
1697 "Mandatory 'realm' parameter is missing" );
1699 /* 3 Digest Access Authentication Scheme */
1700 else if( !strncasecmp( psz_header, "Digest ", strlen( "Digest " ) ) )
1702 msg_Dbg( p_access, "Using Digest Access Authentication" );
1703 if( p_auth->psz_nonce ) return; /* FIXME */
1704 psz_header += strlen( "Digest " );
1705 p_auth->psz_realm = AuthGetParam( psz_header, "realm" );
1706 p_auth->psz_domain = AuthGetParam( psz_header, "domain" );
1707 p_auth->psz_nonce = AuthGetParam( psz_header, "nonce" );
1708 p_auth->psz_opaque = AuthGetParam( psz_header, "opaque" );
1709 p_auth->psz_stale = AuthGetParamNoQuotes( psz_header, "stale" );
1710 p_auth->psz_algorithm = AuthGetParamNoQuotes( psz_header, "algorithm" );
1711 p_auth->psz_qop = AuthGetParam( psz_header, "qop" );
1712 p_auth->i_nonce = 0;
1713 /* printf("realm: |%s|\ndomain: |%s|\nnonce: |%s|\nopaque: |%s|\n"
1714 "stale: |%s|\nalgorithm: |%s|\nqop: |%s|\n",
1715 p_auth->psz_realm,p_auth->psz_domain,p_auth->psz_nonce,
1716 p_auth->psz_opaque,p_auth->psz_stale,p_auth->psz_algorithm,
1717 p_auth->psz_qop); */
1718 if( !p_auth->psz_realm )
1719 msg_Warn( p_access, "Digest Access Authentication: "
1720 "Mandatory 'realm' parameter is missing" );
1721 if( !p_auth->psz_nonce )
1722 msg_Warn( p_access, "Digest Access Authentication: "
1723 "Mandatory 'nonce' parameter is missing" );
1724 if( p_auth->psz_qop ) /* FIXME: parse the qop list */
1726 char *psz_tmp = strchr( p_auth->psz_qop, ',' );
1727 if( psz_tmp ) *psz_tmp = '\0';
1732 const char *psz_end = strchr( psz_header, ' ' );
1734 msg_Warn( p_access, "Unknown authentication scheme: '%*s'",
1735 (int)(psz_end - psz_header), psz_header );
1737 msg_Warn( p_access, "Unknown authentication scheme: '%s'",
1742 static char *AuthDigest( access_t *p_access, vlc_url_t *p_url,
1743 http_auth_t *p_auth, const char *psz_method )
1746 const char *psz_username = p_url->psz_username ? p_url->psz_username : "";
1747 const char *psz_password = p_url->psz_password ? p_url->psz_password : "";
1749 char *psz_HA1 = NULL;
1750 char *psz_HA2 = NULL;
1751 char *psz_response = NULL;
1755 if( p_auth->psz_HA1 )
1757 psz_HA1 = strdup( p_auth->psz_HA1 );
1758 if( !psz_HA1 ) goto error;
1763 AddMD5( &md5, psz_username, strlen( psz_username ) );
1764 AddMD5( &md5, ":", 1 );
1765 AddMD5( &md5, p_auth->psz_realm, strlen( p_auth->psz_realm ) );
1766 AddMD5( &md5, ":", 1 );
1767 AddMD5( &md5, psz_password, strlen( psz_password ) );
1770 psz_HA1 = psz_md5_hash( &md5 );
1771 if( !psz_HA1 ) goto error;
1773 if( p_auth->psz_algorithm
1774 && !strcmp( p_auth->psz_algorithm, "MD5-sess" ) )
1777 AddMD5( &md5, psz_HA1, 32 );
1779 AddMD5( &md5, ":", 1 );
1780 AddMD5( &md5, p_auth->psz_nonce, strlen( p_auth->psz_nonce ) );
1781 AddMD5( &md5, ":", 1 );
1782 AddMD5( &md5, p_auth->psz_cnonce, strlen( p_auth->psz_cnonce ) );
1785 psz_HA1 = psz_md5_hash( &md5 );
1786 if( !psz_HA1 ) goto error;
1787 p_auth->psz_HA1 = strdup( psz_HA1 );
1788 if( !p_auth->psz_HA1 ) goto error;
1795 AddMD5( &md5, psz_method, strlen( psz_method ) );
1796 AddMD5( &md5, ":", 1 );
1797 if( p_url->psz_path )
1798 AddMD5( &md5, p_url->psz_path, strlen( p_url->psz_path ) );
1800 AddMD5( &md5, "/", 1 );
1801 if( p_auth->psz_qop && !strcmp( p_auth->psz_qop, "auth-int" ) )
1806 AddMD5( &ent, "", 0 ); /* XXX: entity-body. should be ok for GET */
1808 psz_ent = psz_md5_hash( &ent );
1809 if( !psz_ent ) goto error;
1810 AddMD5( &md5, ":", 1 );
1811 AddMD5( &md5, psz_ent, 32 );
1815 psz_HA2 = psz_md5_hash( &md5 );
1816 if( !psz_HA2 ) goto error;
1818 /* Request digest */
1820 AddMD5( &md5, psz_HA1, 32 );
1821 AddMD5( &md5, ":", 1 );
1822 AddMD5( &md5, p_auth->psz_nonce, strlen( p_auth->psz_nonce ) );
1823 AddMD5( &md5, ":", 1 );
1825 && ( !strcmp( p_auth->psz_qop, "auth" )
1826 || !strcmp( p_auth->psz_qop, "auth-int" ) ) )
1829 snprintf( psz_inonce, 9, "%08x", p_auth->i_nonce );
1830 AddMD5( &md5, psz_inonce, 8 );
1831 AddMD5( &md5, ":", 1 );
1832 AddMD5( &md5, p_auth->psz_cnonce, strlen( p_auth->psz_cnonce ) );
1833 AddMD5( &md5, ":", 1 );
1834 AddMD5( &md5, p_auth->psz_qop, strlen( p_auth->psz_qop ) );
1835 AddMD5( &md5, ":", 1 );
1837 AddMD5( &md5, psz_HA2, 32 );
1839 psz_response = psz_md5_hash( &md5 );
1844 return psz_response;
1848 static void AuthReply( access_t *p_access, const char *psz_prefix,
1849 vlc_url_t *p_url, http_auth_t *p_auth )
1851 access_sys_t *p_sys = p_access->p_sys;
1852 v_socket_t *pvs = p_sys->p_vs;
1854 const char *psz_username = p_url->psz_username ? p_url->psz_username : "";
1855 const char *psz_password = p_url->psz_password ? p_url->psz_password : "";
1857 if( p_auth->psz_nonce )
1859 /* Digest Access Authentication */
1862 if( p_auth->psz_algorithm
1863 && strcmp( p_auth->psz_algorithm, "MD5" )
1864 && strcmp( p_auth->psz_algorithm, "MD5-sess" ) )
1866 msg_Err( p_access, "Digest Access Authentication: "
1867 "Unknown algorithm '%s'", p_auth->psz_algorithm );
1871 if( p_auth->psz_qop || !p_auth->psz_cnonce )
1873 /* FIXME: needs to be really random to prevent man in the middle
1875 free( p_auth->psz_cnonce );
1876 p_auth->psz_cnonce = strdup( "Some random string FIXME" );
1880 psz_response = AuthDigest( p_access, p_url, p_auth, "GET" );
1881 if( !psz_response ) return;
1883 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs,
1884 "%sAuthorization: Digest "
1885 /* Mandatory parameters */
1891 /* Optional parameters */
1892 "%s%s%s" /* algorithm */
1893 "%s%s%s" /* cnonce */
1894 "%s%s%s" /* opaque */
1895 "%s%s%s" /* message qop */
1896 "%s%08x%s" /* nonce count */
1898 /* Mandatory parameters */
1903 p_url->psz_path ? p_url->psz_path : "/",
1905 /* Optional parameters */
1906 p_auth->psz_algorithm ? "algorithm=\"" : "",
1907 p_auth->psz_algorithm ? p_auth->psz_algorithm : "",
1908 p_auth->psz_algorithm ? "\", " : "",
1909 p_auth->psz_cnonce ? "cnonce=\"" : "",
1910 p_auth->psz_cnonce ? p_auth->psz_cnonce : "",
1911 p_auth->psz_cnonce ? "\", " : "",
1912 p_auth->psz_opaque ? "opaque=\"" : "",
1913 p_auth->psz_opaque ? p_auth->psz_opaque : "",
1914 p_auth->psz_opaque ? "\", " : "",
1915 p_auth->psz_qop ? "qop=\"" : "",
1916 p_auth->psz_qop ? p_auth->psz_qop : "",
1917 p_auth->psz_qop ? "\", " : "",
1918 p_auth->i_nonce ? "nc=\"" : "uglyhack=\"", /* Will be parsed as an unhandled extension */
1920 p_auth->i_nonce ? "\"" : "\""
1923 free( psz_response );
1927 /* Basic Access Authentication */
1928 char buf[strlen( psz_username ) + strlen( psz_password ) + 2];
1931 snprintf( buf, sizeof( buf ), "%s:%s", psz_username, psz_password );
1932 b64 = vlc_b64_encode( buf );
1936 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs,
1937 "%sAuthorization: Basic %s\r\n", psz_prefix, b64 );
1943 static int AuthCheckReply( access_t *p_access, const char *psz_header,
1944 vlc_url_t *p_url, http_auth_t *p_auth )
1946 int i_ret = VLC_EGENERIC;
1947 char *psz_nextnonce = AuthGetParam( psz_header, "nextnonce" );
1948 char *psz_qop = AuthGetParamNoQuotes( psz_header, "qop" );
1949 char *psz_rspauth = AuthGetParam( psz_header, "rspauth" );
1950 char *psz_cnonce = AuthGetParam( psz_header, "cnonce" );
1951 char *psz_nc = AuthGetParamNoQuotes( psz_header, "nc" );
1957 if( strcmp( psz_cnonce, p_auth->psz_cnonce ) )
1959 msg_Err( p_access, "HTTP Digest Access Authentication: server replied with a different client nonce value." );
1966 i_nonce = strtol( psz_nc, NULL, 16 );
1967 if( i_nonce != p_auth->i_nonce )
1969 msg_Err( p_access, "HTTP Digest Access Authentication: server replied with a different nonce count value." );
1974 if( psz_qop && p_auth->psz_qop && strcmp( psz_qop, p_auth->psz_qop ) )
1975 msg_Warn( p_access, "HTTP Digest Access Authentication: server replied using a different 'quality of protection' option" );
1977 /* All the clear text values match, let's now check the response
1979 psz_digest = AuthDigest( p_access, p_url, p_auth, "" );
1980 if( strcmp( psz_digest, psz_rspauth ) )
1982 msg_Err( p_access, "HTTP Digest Access Authentication: server replied with an invalid response digest (expected value: %s).", psz_digest );
1991 free( p_auth->psz_nonce );
1992 p_auth->psz_nonce = psz_nextnonce;
1993 psz_nextnonce = NULL;
1996 i_ret = VLC_SUCCESS;
1998 free( psz_nextnonce );
2000 free( psz_rspauth );
2007 static void AuthReset( http_auth_t *p_auth )
2009 FREENULL( p_auth->psz_realm );
2010 FREENULL( p_auth->psz_domain );
2011 FREENULL( p_auth->psz_nonce );
2012 FREENULL( p_auth->psz_opaque );
2013 FREENULL( p_auth->psz_stale );
2014 FREENULL( p_auth->psz_algorithm );
2015 FREENULL( p_auth->psz_qop );
2016 p_auth->i_nonce = 0;
2017 FREENULL( p_auth->psz_cnonce );
2018 FREENULL( p_auth->psz_HA1 );