2 * Copyright (c) 2007 The FFmpeg Project
4 * This file is part of FFmpeg.
6 * FFmpeg is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * FFmpeg is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with FFmpeg; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
24 #include "libavcodec/internal.h"
25 #include "libavutil/avutil.h"
26 #include "libavutil/mem.h"
27 #include "libavutil/time.h"
33 #include "compat/os2threads.h"
35 #include "compat/w32pthreads.h"
40 #include <openssl/ssl.h>
41 static int openssl_init;
43 #include <openssl/crypto.h>
44 pthread_mutex_t *openssl_mutexes;
45 static void openssl_lock(int mode, int type, const char *file, int line)
47 if (mode & CRYPTO_LOCK)
48 pthread_mutex_lock(&openssl_mutexes[type]);
50 pthread_mutex_unlock(&openssl_mutexes[type]);
52 #if !defined(WIN32) && OPENSSL_VERSION_NUMBER < 0x10000000
53 static unsigned long openssl_thread_id(void)
55 return (intptr_t) pthread_self();
61 #include <gnutls/gnutls.h>
62 #if HAVE_THREADS && GNUTLS_VERSION_NUMBER <= 0x020b00
65 GCRY_THREAD_OPTION_PTHREAD_IMPL;
71 avpriv_lock_avformat();
75 SSL_load_error_strings();
77 if (!CRYPTO_get_locking_callback()) {
79 openssl_mutexes = av_malloc_array(sizeof(pthread_mutex_t), CRYPTO_num_locks());
80 if (!openssl_mutexes) {
81 avpriv_unlock_avformat();
82 return AVERROR(ENOMEM);
84 for (i = 0; i < CRYPTO_num_locks(); i++)
85 pthread_mutex_init(&openssl_mutexes[i], NULL);
86 CRYPTO_set_locking_callback(openssl_lock);
87 #if !defined(WIN32) && OPENSSL_VERSION_NUMBER < 0x10000000
88 CRYPTO_set_id_callback(openssl_thread_id);
96 #if HAVE_THREADS && GNUTLS_VERSION_NUMBER < 0x020b00
97 if (gcry_control(GCRYCTL_ANY_INITIALIZATION_P) == 0)
98 gcry_control(GCRYCTL_SET_THREAD_CBS, &gcry_threads_pthread);
100 gnutls_global_init();
102 avpriv_unlock_avformat();
107 void ff_tls_deinit(void)
109 avpriv_lock_avformat();
114 if (CRYPTO_get_locking_callback() == openssl_lock) {
116 CRYPTO_set_locking_callback(NULL);
117 for (i = 0; i < CRYPTO_num_locks(); i++)
118 pthread_mutex_destroy(&openssl_mutexes[i]);
119 av_free(openssl_mutexes);
125 gnutls_global_deinit();
127 avpriv_unlock_avformat();
130 int ff_network_inited_globally;
132 int ff_network_init(void)
138 if (!ff_network_inited_globally)
139 av_log(NULL, AV_LOG_WARNING, "Using network protocols without global "
140 "network initialization. Please use "
141 "avformat_network_init(), this will "
142 "become mandatory later.\n");
144 if (WSAStartup(MAKEWORD(1,1), &wsaData))
150 int ff_network_wait_fd(int fd, int write)
152 int ev = write ? POLLOUT : POLLIN;
153 struct pollfd p = { .fd = fd, .events = ev, .revents = 0 };
155 ret = poll(&p, 1, 100);
156 return ret < 0 ? ff_neterrno() : p.revents & (ev | POLLERR | POLLHUP) ? 0 : AVERROR(EAGAIN);
159 int ff_network_wait_fd_timeout(int fd, int write, int64_t timeout, AVIOInterruptCB *int_cb)
162 int64_t wait_start = 0;
165 if (ff_check_interrupt(int_cb))
167 ret = ff_network_wait_fd(fd, write);
168 if (ret != AVERROR(EAGAIN))
172 wait_start = av_gettime_relative();
173 else if (av_gettime_relative() - wait_start > timeout)
174 return AVERROR(ETIMEDOUT);
179 void ff_network_close(void)
187 int ff_neterrno(void)
189 int err = WSAGetLastError();
192 return AVERROR(EAGAIN);
194 return AVERROR(EINTR);
195 case WSAEPROTONOSUPPORT:
196 return AVERROR(EPROTONOSUPPORT);
198 return AVERROR(ETIMEDOUT);
199 case WSAECONNREFUSED:
200 return AVERROR(ECONNREFUSED);
202 return AVERROR(EINPROGRESS);
208 int ff_is_multicast_address(struct sockaddr *addr)
210 if (addr->sa_family == AF_INET) {
211 return IN_MULTICAST(ntohl(((struct sockaddr_in *)addr)->sin_addr.s_addr));
213 #if HAVE_STRUCT_SOCKADDR_IN6
214 if (addr->sa_family == AF_INET6) {
215 return IN6_IS_ADDR_MULTICAST(&((struct sockaddr_in6 *)addr)->sin6_addr);
222 static int ff_poll_interrupt(struct pollfd *p, nfds_t nfds, int timeout,
225 int runs = timeout / POLLING_TIME;
229 if (ff_check_interrupt(cb))
231 ret = poll(p, nfds, POLLING_TIME);
234 } while (timeout <= 0 || runs-- > 0);
237 return AVERROR(ETIMEDOUT);
239 return AVERROR(errno);
243 int ff_socket(int af, int type, int proto)
248 fd = socket(af, type | SOCK_CLOEXEC, proto);
249 if (fd == -1 && errno == EINVAL)
252 fd = socket(af, type, proto);
255 if (fcntl(fd, F_SETFD, FD_CLOEXEC) == -1)
256 av_log(NULL, AV_LOG_DEBUG, "Failed to set close on exec\n");
263 int ff_listen_bind(int fd, const struct sockaddr *addr,
264 socklen_t addrlen, int timeout, URLContext *h)
268 struct pollfd lp = { fd, POLLIN, 0 };
269 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &reuse, sizeof(reuse))) {
270 av_log(NULL, AV_LOG_WARNING, "setsockopt(SO_REUSEADDR) failed\n");
272 ret = bind(fd, addr, addrlen);
274 return ff_neterrno();
278 return ff_neterrno();
280 ret = ff_poll_interrupt(&lp, 1, timeout, &h->interrupt_callback);
284 ret = accept(fd, NULL, NULL);
286 return ff_neterrno();
290 if (ff_socket_nonblock(ret, 1) < 0)
291 av_log(NULL, AV_LOG_DEBUG, "ff_socket_nonblock failed\n");
296 int ff_listen_connect(int fd, const struct sockaddr *addr,
297 socklen_t addrlen, int timeout, URLContext *h,
300 struct pollfd p = {fd, POLLOUT, 0};
304 if (ff_socket_nonblock(fd, 1) < 0)
305 av_log(NULL, AV_LOG_DEBUG, "ff_socket_nonblock failed\n");
307 while ((ret = connect(fd, addr, addrlen))) {
311 if (ff_check_interrupt(&h->interrupt_callback))
314 case AVERROR(EINPROGRESS):
315 case AVERROR(EAGAIN):
316 ret = ff_poll_interrupt(&p, 1, timeout, &h->interrupt_callback);
319 optlen = sizeof(ret);
320 if (getsockopt (fd, SOL_SOCKET, SO_ERROR, &ret, &optlen))
321 ret = AVUNERROR(ff_neterrno());
325 av_strerror(ret, errbuf, sizeof(errbuf));
327 av_log(h, AV_LOG_WARNING,
328 "Connection to %s failed (%s), trying next address\n",
329 h->filename, errbuf);
331 av_log(h, AV_LOG_ERROR, "Connection to %s failed: %s\n",
332 h->filename, errbuf);
341 static int match_host_pattern(const char *pattern, const char *hostname)
344 if (!strcmp(pattern, "*"))
346 // Skip a possible *. at the start of the pattern
347 if (pattern[0] == '*')
349 if (pattern[0] == '.')
351 len_p = strlen(pattern);
352 len_h = strlen(hostname);
355 // Simply check if the end of hostname is equal to 'pattern'
356 if (!strcmp(pattern, &hostname[len_h - len_p])) {
358 return 1; // Exact match
359 if (hostname[len_h - len_p - 1] == '.')
360 return 1; // The matched substring is a domain and not just a substring of a domain
365 int ff_http_match_no_proxy(const char *no_proxy, const char *hostname)
373 buf = av_strdup(no_proxy);
378 char *sep, *next = NULL;
379 start += strspn(start, " ,");
380 sep = start + strcspn(start, " ,");
385 if (match_host_pattern(start, hostname)) {