1 /*****************************************************************************
2 * http.c: HTTP input module
3 *****************************************************************************
4 * Copyright (C) 2001-2008 the VideoLAN team
7 * Authors: Laurent Aimar <fenrir@via.ecp.fr>
8 * Christophe Massiot <massiot@via.ecp.fr>
9 * RĂ©mi Denis-Courmont <rem # videolan.org>
10 * Antoine Cellerier <dionoea at videolan dot org>
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2 of the License, or
15 * (at your option) any later version.
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software
24 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
25 *****************************************************************************/
27 /*****************************************************************************
29 *****************************************************************************/
34 #include <vlc_common.h>
35 #include <vlc_plugin.h>
38 #include <vlc_access.h>
40 #include <vlc_interface.h>
42 #include <vlc_network.h>
45 #include <vlc_strings.h>
46 #include <vlc_input.h>
58 /*****************************************************************************
60 *****************************************************************************/
61 static int Open ( vlc_object_t * );
62 static void Close( vlc_object_t * );
64 #define PROXY_TEXT N_("HTTP proxy")
65 #define PROXY_LONGTEXT N_( \
66 "HTTP proxy to be used It must be of the form " \
67 "http://[user@]myproxy.mydomain:myport/ ; " \
68 "if empty, the http_proxy environment variable will be tried." )
70 #define PROXY_PASS_TEXT N_("HTTP proxy password")
71 #define PROXY_PASS_LONGTEXT N_( \
72 "If your HTTP proxy requires a password, set it here." )
74 #define CACHING_TEXT N_("Caching value in ms")
75 #define CACHING_LONGTEXT N_( \
76 "Caching value for HTTP streams. This " \
77 "value should be set in milliseconds." )
79 #define AGENT_TEXT N_("HTTP user agent")
80 #define AGENT_LONGTEXT N_("User agent that will be " \
81 "used for the connection.")
83 #define RECONNECT_TEXT N_("Auto re-connect")
84 #define RECONNECT_LONGTEXT N_( \
85 "Automatically try to reconnect to the stream in case of a sudden " \
88 #define CONTINUOUS_TEXT N_("Continuous stream")
89 #define CONTINUOUS_LONGTEXT N_("Read a file that is " \
90 "being constantly updated (for example, a JPG file on a server). " \
91 "You should not globally enable this option as it will break all other " \
92 "types of HTTP streams." )
94 #define FORWARD_COOKIES_TEXT N_("Forward Cookies")
95 #define FORWARD_COOKIES_LONGTEXT N_("Forward Cookies Across http redirections ")
98 set_description( N_("HTTP input") );
99 set_capability( "access", 0 );
100 set_shortname( N_( "HTTP(S)" ) );
101 set_category( CAT_INPUT );
102 set_subcategory( SUBCAT_INPUT_ACCESS );
104 add_string( "http-proxy", NULL, NULL, PROXY_TEXT, PROXY_LONGTEXT,
106 add_password( "http-proxy-pwd", NULL, NULL,
107 PROXY_PASS_TEXT, PROXY_PASS_LONGTEXT, false );
108 add_integer( "http-caching", 4 * DEFAULT_PTS_DELAY / 1000, NULL,
109 CACHING_TEXT, CACHING_LONGTEXT, true );
110 add_string( "http-user-agent", COPYRIGHT_MESSAGE , NULL, AGENT_TEXT,
111 AGENT_LONGTEXT, true );
112 add_bool( "http-reconnect", 0, NULL, RECONNECT_TEXT,
113 RECONNECT_LONGTEXT, true );
114 add_bool( "http-continuous", 0, NULL, CONTINUOUS_TEXT,
115 CONTINUOUS_LONGTEXT, true );
116 add_bool( "http-forward-cookies", 0, NULL, FORWARD_COOKIES_TEXT,
117 FORWARD_COOKIES_LONGTEXT, true );
118 add_obsolete_string("http-user");
119 add_obsolete_string("http-pwd");
120 add_shortcut( "http" );
121 add_shortcut( "https" );
122 add_shortcut( "unsv" );
123 add_shortcut( "itpc" ); /* iTunes Podcast */
124 set_callbacks( Open, Close );
127 /*****************************************************************************
129 *****************************************************************************/
131 /* RFC 2617: Basic and Digest Access Authentication */
132 typedef struct http_auth_t
143 char *psz_HA1; /* stored H(A1) value if algorithm = "MD5-sess" */
149 tls_session_t *p_tls;
154 char *psz_user_agent;
160 http_auth_t proxy_auth;
161 char *psz_proxy_passbuf;
165 const char *psz_protocol;
198 vlc_array_t * cookies;
202 static int OpenWithCookies( vlc_object_t *p_this, vlc_array_t *cookies );
205 static ssize_t Read( access_t *, uint8_t *, size_t );
206 static ssize_t ReadCompressed( access_t *, uint8_t *, size_t );
207 static int Seek( access_t *, int64_t );
208 static int Control( access_t *, int, va_list );
211 static int Connect( access_t *, int64_t );
212 static int Request( access_t *p_access, int64_t i_tell );
213 static void Disconnect( access_t * );
215 /* Small Cookie utilities. Cookies support is partial. */
216 static char * cookie_get_content( const char * cookie );
217 static char * cookie_get_domain( const char * cookie );
218 static char * cookie_get_name( const char * cookie );
219 static void cookie_append( vlc_array_t * cookies, char * cookie );
222 static void AuthParseHeader( access_t *p_access, const char *psz_header,
223 http_auth_t *p_auth );
224 static void AuthReply( access_t *p_acces, const char *psz_prefix,
225 vlc_url_t *p_url, http_auth_t *p_auth );
226 static int AuthCheckReply( access_t *p_access, const char *psz_header,
227 vlc_url_t *p_url, http_auth_t *p_auth );
228 static void AuthReset( http_auth_t *p_auth );
230 /*****************************************************************************
232 *****************************************************************************/
233 static int Open( vlc_object_t *p_this )
235 return OpenWithCookies( p_this, NULL );
238 static int OpenWithCookies( vlc_object_t *p_this, vlc_array_t *cookies )
240 access_t *p_access = (access_t*)p_this;
243 /* Only forward an store cookies if the corresponding option is activated */
244 bool b_forward_cookies = var_CreateGetBool( p_access, "http-forward-cookies" );
245 vlc_array_t * saved_cookies = b_forward_cookies ? (cookies ?: vlc_array_new()) : NULL;
247 /* Set up p_access */
248 STANDARD_READ_ACCESS_INIT;
250 p_access->pf_read = ReadCompressed;
253 p_sys->b_proxy = false;
254 p_sys->psz_proxy_passbuf = NULL;
255 p_sys->i_version = 1;
256 p_sys->b_seekable = true;
257 p_sys->psz_mime = NULL;
258 p_sys->psz_pragma = NULL;
259 p_sys->b_mms = false;
260 p_sys->b_icecast = false;
261 p_sys->psz_location = NULL;
262 p_sys->psz_user_agent = NULL;
263 p_sys->b_pace_control = true;
264 p_sys->b_ssl = false;
266 p_sys->b_compressed = false;
267 /* 15 is the max windowBits, +32 to enable optional gzip decoding */
268 if( inflateInit2( &p_sys->inflate.stream, 32+15 ) != Z_OK )
269 msg_Warn( p_access, "Error during zlib initialisation: %s",
270 p_sys->inflate.stream.msg );
271 if( zlibCompileFlags() & (1<<17) )
272 msg_Warn( p_access, "Your zlib was compiled without gzip support." );
273 p_sys->inflate.p_buffer = NULL;
277 p_sys->i_icy_meta = 0;
278 p_sys->psz_icy_name = NULL;
279 p_sys->psz_icy_genre = NULL;
280 p_sys->psz_icy_title = NULL;
281 p_sys->i_remaining = 0;
283 p_sys->cookies = saved_cookies;
285 /* Parse URI - remove spaces */
286 p = psz = strdup( p_access->psz_path );
287 while( (p = strchr( p, ' ' )) != NULL )
289 vlc_UrlParse( &p_sys->url, psz, 0 );
292 if( p_sys->url.psz_host == NULL || *p_sys->url.psz_host == '\0' )
294 msg_Warn( p_access, "invalid host" );
297 if( !strncmp( p_access->psz_access, "https", 5 ) )
301 if( p_sys->url.i_port <= 0 )
302 p_sys->url.i_port = 443;
306 if( p_sys->url.i_port <= 0 )
307 p_sys->url.i_port = 80;
311 p_sys->psz_user_agent = var_CreateGetString( p_access, "http-user-agent" );
314 psz = var_CreateGetNonEmptyString( p_access, "http-proxy" );
317 p_sys->b_proxy = true;
318 vlc_UrlParse( &p_sys->proxy, psz, 0 );
324 pxProxyFactory *pf = px_proxy_factory_new();
329 i=asprintf(&buf, "%s://%s", p_access->psz_access, p_access->psz_path);
332 msg_Dbg(p_access, "asking libproxy about url '%s'", buf);
333 char **proxies = px_proxy_factory_get_proxies(pf, buf);
336 msg_Dbg(p_access, "libproxy suggest to use '%s'", proxies[0]);
337 if(strcmp(proxies[0],"direct://") != 0)
339 p_sys->b_proxy = true;
340 vlc_UrlParse( &p_sys->proxy, proxies[0], 0);
343 for(i=0;proxies[i];i++) free(proxies[i]);
347 px_proxy_factory_free(pf);
351 msg_Err(p_access, "Allocating memory for libproxy failed");
357 psz = getenv( "http_proxy" );
360 p_sys->b_proxy = true;
361 vlc_UrlParse( &p_sys->proxy, psz, 0 );
365 if( psz ) /* No, this is NOT a use-after-free error */
367 psz = var_CreateGetNonEmptyString( p_access, "http-proxy-pwd" );
369 p_sys->proxy.psz_password = p_sys->psz_proxy_passbuf = psz;
374 if( p_sys->proxy.psz_host == NULL || *p_sys->proxy.psz_host == '\0' )
376 msg_Warn( p_access, "invalid proxy host" );
379 if( p_sys->proxy.i_port <= 0 )
381 p_sys->proxy.i_port = 80;
385 msg_Dbg( p_access, "http: server='%s' port=%d file='%s",
386 p_sys->url.psz_host, p_sys->url.i_port, p_sys->url.psz_path );
389 msg_Dbg( p_access, " proxy %s:%d", p_sys->proxy.psz_host,
390 p_sys->proxy.i_port );
392 if( p_sys->url.psz_username && *p_sys->url.psz_username )
394 msg_Dbg( p_access, " user='%s'", p_sys->url.psz_username );
397 p_sys->b_reconnect = var_CreateGetBool( p_access, "http-reconnect" );
398 p_sys->b_continuous = var_CreateGetBool( p_access, "http-continuous" );
402 switch( Connect( p_access, 0 ) )
408 /* Retry with http 1.0 */
409 msg_Dbg( p_access, "switching to HTTP version 1.0" );
410 p_sys->i_version = 0;
411 p_sys->b_seekable = false;
413 if( p_access->b_die || Connect( p_access, 0 ) )
421 msg_Err( p_access, "You should not be here" );
426 if( p_sys->i_code == 401 )
428 char *psz_login = NULL, *psz_password = NULL;
432 if( p_sys->url.psz_username && p_sys->url.psz_password &&
433 p_sys->auth.psz_nonce && p_sys->auth.i_nonce == 0 )
437 snprintf( psz_msg, 250,
438 _("Please enter a valid login name and a password for realm %s."),
439 p_sys->auth.psz_realm );
440 msg_Dbg( p_access, "authentication failed for realm %s",
441 p_sys->auth.psz_realm );
442 i_ret = intf_UserLoginPassword( p_access, _("HTTP authentication"),
443 psz_msg, &psz_login, &psz_password );
444 if( i_ret == DIALOG_OK_YES )
446 msg_Dbg( p_access, "retrying with user=%s, pwd=%s",
447 psz_login, psz_password );
448 if( psz_login ) p_sys->url.psz_username = strdup( psz_login );
449 if( psz_password ) p_sys->url.psz_password = strdup( psz_password );
451 free( psz_password );
457 free( psz_password );
462 if( ( p_sys->i_code == 301 || p_sys->i_code == 302 ||
463 p_sys->i_code == 303 || p_sys->i_code == 307 ) &&
464 p_sys->psz_location && *p_sys->psz_location )
466 msg_Dbg( p_access, "redirection to %s", p_sys->psz_location );
468 /* Do not accept redirection outside of HTTP works */
469 if( strncmp( p_sys->psz_location, "http", 4 )
470 || ( ( p_sys->psz_location[4] != ':' ) /* HTTP */
471 && strncmp( p_sys->psz_location + 4, "s:", 2 ) /* HTTP/SSL */ ) )
473 msg_Err( p_access, "insecure redirection ignored" );
476 free( p_access->psz_path );
477 p_access->psz_path = strdup( p_sys->psz_location );
478 /* Clean up current Open() run */
479 vlc_UrlClean( &p_sys->url );
480 AuthReset( &p_sys->auth );
481 vlc_UrlClean( &p_sys->proxy );
482 free( p_sys->psz_proxy_passbuf );
483 AuthReset( &p_sys->proxy_auth );
484 free( p_sys->psz_mime );
485 free( p_sys->psz_pragma );
486 free( p_sys->psz_location );
487 free( p_sys->psz_user_agent );
489 Disconnect( p_access );
490 cookies = p_sys->cookies;
493 /* Do new Open() run with new data */
494 return OpenWithCookies( p_this, cookies );
499 msg_Dbg( p_access, "this is actually a live mms server, BAIL" );
503 if( !strcmp( p_sys->psz_protocol, "ICY" ) || p_sys->b_icecast )
505 if( p_sys->psz_mime && strcasecmp( p_sys->psz_mime, "application/ogg" ) )
507 if( !strcasecmp( p_sys->psz_mime, "video/nsv" ) ||
508 !strcasecmp( p_sys->psz_mime, "video/nsa" ) )
510 free( p_access->psz_demux );
511 p_access->psz_demux = strdup( "nsv" );
513 else if( !strcasecmp( p_sys->psz_mime, "audio/aac" ) ||
514 !strcasecmp( p_sys->psz_mime, "audio/aacp" ) )
516 free( p_access->psz_demux );
517 p_access->psz_demux = strdup( "m4a" );
519 else if( !strcasecmp( p_sys->psz_mime, "audio/mpeg" ) )
521 free( p_access->psz_demux );
522 p_access->psz_demux = strdup( "mp3" );
525 msg_Info( p_access, "Raw-audio server found, %s demuxer selected",
526 p_access->psz_demux );
528 #if 0 /* Doesn't work really well because of the pre-buffering in
529 * shoutcast servers (the buffer content will be sent as fast as
531 p_sys->b_pace_control = false;
534 else if( !p_sys->psz_mime )
536 free( p_access->psz_demux );
538 p_access->psz_demux = strdup( "mp3" );
540 /* else probably Ogg Vorbis */
542 else if( !strcasecmp( p_access->psz_access, "unsv" ) &&
544 !strcasecmp( p_sys->psz_mime, "misc/ultravox" ) )
546 free( p_access->psz_demux );
547 /* Grrrr! detect ultravox server and force NSV demuxer */
548 p_access->psz_demux = strdup( "nsv" );
550 else if( !strcmp( p_access->psz_access, "itpc" ) )
552 free( p_access->psz_demux );
553 p_access->psz_demux = strdup( "podcast" );
555 else if( p_sys->psz_mime &&
556 !strncasecmp( p_sys->psz_mime, "application/xspf+xml", 20 ) &&
557 ( memchr( " ;\t", p_sys->psz_mime[20], 4 ) != NULL ) )
559 free( p_access->psz_demux );
560 p_access->psz_demux = strdup( "xspf-open" );
563 if( p_sys->b_reconnect ) msg_Dbg( p_access, "auto re-connect enabled" );
566 var_Create( p_access, "http-caching", VLC_VAR_INTEGER |VLC_VAR_DOINHERIT );
571 vlc_UrlClean( &p_sys->url );
572 vlc_UrlClean( &p_sys->proxy );
573 free( p_sys->psz_proxy_passbuf );
574 free( p_sys->psz_mime );
575 free( p_sys->psz_pragma );
576 free( p_sys->psz_location );
577 free( p_sys->psz_user_agent );
579 Disconnect( p_access );
584 /*****************************************************************************
586 *****************************************************************************/
587 static void Close( vlc_object_t *p_this )
589 access_t *p_access = (access_t*)p_this;
590 access_sys_t *p_sys = p_access->p_sys;
592 vlc_UrlClean( &p_sys->url );
593 AuthReset( &p_sys->auth );
594 vlc_UrlClean( &p_sys->proxy );
595 AuthReset( &p_sys->proxy_auth );
597 free( p_sys->psz_mime );
598 free( p_sys->psz_pragma );
599 free( p_sys->psz_location );
601 free( p_sys->psz_icy_name );
602 free( p_sys->psz_icy_genre );
603 free( p_sys->psz_icy_title );
605 free( p_sys->psz_user_agent );
607 Disconnect( p_access );
612 for( i = 0; i < vlc_array_count( p_sys->cookies ); i++ )
613 free(vlc_array_item_at_index( p_sys->cookies, i ));
614 vlc_array_destroy( p_sys->cookies );
618 inflateEnd( &p_sys->inflate.stream );
619 free( p_sys->inflate.p_buffer );
625 /*****************************************************************************
626 * Read: Read up to i_len bytes from the http connection and place in
627 * p_buffer. Return the actual number of bytes read
628 *****************************************************************************/
629 static int ReadICYMeta( access_t *p_access );
630 static ssize_t Read( access_t *p_access, uint8_t *p_buffer, size_t i_len )
632 access_sys_t *p_sys = p_access->p_sys;
637 p_access->info.b_eof = true;
641 if( p_access->info.i_size > 0 &&
642 i_len + p_access->info.i_pos > p_access->info.i_size )
644 if( ( i_len = p_access->info.i_size - p_access->info.i_pos ) == 0 )
646 p_access->info.b_eof = true;
651 if( p_sys->b_chunked )
653 if( p_sys->i_chunk < 0 )
655 p_access->info.b_eof = true;
659 if( p_sys->i_chunk <= 0 )
661 char *psz = net_Gets( VLC_OBJECT(p_access), p_sys->fd, p_sys->p_vs );
662 /* read the chunk header */
665 /* fatal error - end of file */
666 msg_Dbg( p_access, "failed reading chunk-header line" );
669 p_sys->i_chunk = strtoll( psz, NULL, 16 );
672 if( p_sys->i_chunk <= 0 ) /* eof */
675 p_access->info.b_eof = true;
680 if( i_len > p_sys->i_chunk )
682 i_len = p_sys->i_chunk;
686 if( p_sys->b_continuous && (ssize_t)i_len > p_sys->i_remaining )
688 /* Only ask for the remaining length */
689 int i_new_len = p_sys->i_remaining;
692 Request( p_access, 0 );
693 i_read = Read( p_access, p_buffer, i_len );
699 if( p_sys->i_icy_meta > 0 && p_access->info.i_pos > 0 )
701 int64_t i_next = p_sys->i_icy_meta -
702 p_access->info.i_pos % p_sys->i_icy_meta;
704 if( i_next == p_sys->i_icy_meta )
706 if( ReadICYMeta( p_access ) )
708 p_access->info.b_eof = true;
716 i_read = net_Read( p_access, p_sys->fd, p_sys->p_vs, p_buffer, i_len, false );
720 p_access->info.i_pos += i_read;
722 if( p_sys->b_chunked )
724 p_sys->i_chunk -= i_read;
725 if( p_sys->i_chunk <= 0 )
727 /* read the empty line */
728 char *psz = net_Gets( VLC_OBJECT(p_access), p_sys->fd, p_sys->p_vs );
733 else if( i_read == 0 )
736 * I very much doubt that this will work.
737 * If i_read == 0, the connection *IS* dead, so the only
738 * sensible thing to do is Disconnect() and then retry.
739 * Otherwise, I got recv() completely wrong. -- Courmisch
741 if( p_sys->b_continuous )
743 Request( p_access, 0 );
744 p_sys->b_continuous = false;
745 i_read = Read( p_access, p_buffer, i_len );
746 p_sys->b_continuous = true;
748 Disconnect( p_access );
749 if( p_sys->b_reconnect )
751 msg_Dbg( p_access, "got disconnected, trying to reconnect" );
752 if( Connect( p_access, p_access->info.i_pos ) )
754 msg_Dbg( p_access, "reconnection failed" );
758 p_sys->b_reconnect = false;
759 i_read = Read( p_access, p_buffer, i_len );
760 p_sys->b_reconnect = true;
764 if( i_read == 0 ) p_access->info.b_eof = true;
767 if( p_sys->b_continuous )
769 p_sys->i_remaining -= i_read;
775 static int ReadICYMeta( access_t *p_access )
777 access_sys_t *p_sys = p_access->p_sys;
783 /* Read meta data length */
784 i_read = net_Read( p_access, p_sys->fd, p_sys->p_vs, &buffer, 1,
791 i_read = buffer << 4;
792 /* msg_Dbg( p_access, "ICY meta size=%u", i_read); */
794 psz_meta = malloc( i_read + 1 );
795 if( net_Read( p_access, p_sys->fd, p_sys->p_vs,
796 (uint8_t *)psz_meta, i_read, true ) != i_read )
799 psz_meta[i_read] = '\0'; /* Just in case */
801 /* msg_Dbg( p_access, "icy-meta=%s", psz_meta ); */
803 /* Now parse the meta */
804 /* Look for StreamTitle= */
805 p = strcasestr( (char *)psz_meta, "StreamTitle=" );
808 p += strlen( "StreamTitle=" );
809 if( *p == '\'' || *p == '"' )
811 char closing[] = { p[0], ';', '\0' };
812 char *psz = strstr( &p[1], closing );
814 psz = strchr( &p[1], ';' );
816 if( psz ) *psz = '\0';
820 char *psz = strchr( &p[1], ';' );
821 if( psz ) *psz = '\0';
824 if( !p_sys->psz_icy_title ||
825 strcmp( p_sys->psz_icy_title, &p[1] ) )
827 free( p_sys->psz_icy_title );
828 p_sys->psz_icy_title = strdup( &p[1] );
829 p_access->info.i_update |= INPUT_UPDATE_META;
831 msg_Dbg( p_access, "New Title=%s", p_sys->psz_icy_title );
840 static ssize_t ReadCompressed( access_t *p_access, uint8_t *p_buffer,
843 access_sys_t *p_sys = p_access->p_sys;
845 if( p_sys->b_compressed )
849 if( !p_sys->inflate.p_buffer )
850 p_sys->inflate.p_buffer = malloc( 256 * 1024 );
852 if( p_sys->inflate.stream.avail_in == 0 )
854 ssize_t i_read = Read( p_access, p_sys->inflate.p_buffer + p_sys->inflate.stream.avail_in, 256 * 1024 );
855 if( i_read <= 0 ) return i_read;
856 p_sys->inflate.stream.next_in = p_sys->inflate.p_buffer;
857 p_sys->inflate.stream.avail_in = i_read;
860 p_sys->inflate.stream.avail_out = i_len;
861 p_sys->inflate.stream.next_out = p_buffer;
863 i_ret = inflate( &p_sys->inflate.stream, Z_SYNC_FLUSH );
864 msg_Warn( p_access, "inflate return value: %d, %s", i_ret, p_sys->inflate.stream.msg );
866 return i_len - p_sys->inflate.stream.avail_out;
870 return Read( p_access, p_buffer, i_len );
875 /*****************************************************************************
876 * Seek: close and re-open a connection at the right place
877 *****************************************************************************/
878 static int Seek( access_t *p_access, int64_t i_pos )
880 msg_Dbg( p_access, "trying to seek to %"PRId64, i_pos );
882 Disconnect( p_access );
884 if( p_access->info.i_size
885 && (uint64_t)i_pos >= (uint64_t)p_access->info.i_size ) {
886 msg_Err( p_access, "seek to far" );
887 int retval = Seek( p_access, p_access->info.i_size - 1 );
888 if( retval == VLC_SUCCESS ) {
890 Read( p_access, p_buffer, 1);
891 p_access->info.b_eof = false;
895 if( Connect( p_access, i_pos ) )
897 msg_Err( p_access, "seek failed" );
898 p_access->info.b_eof = true;
904 /*****************************************************************************
906 *****************************************************************************/
907 static int Control( access_t *p_access, int i_query, va_list args )
909 access_sys_t *p_sys = p_access->p_sys;
918 case ACCESS_CAN_SEEK:
919 pb_bool = (bool*)va_arg( args, bool* );
920 *pb_bool = p_sys->b_seekable;
922 case ACCESS_CAN_FASTSEEK:
923 pb_bool = (bool*)va_arg( args, bool* );
926 case ACCESS_CAN_PAUSE:
927 case ACCESS_CAN_CONTROL_PACE:
928 pb_bool = (bool*)va_arg( args, bool* );
930 #if 0 /* Disable for now until we have a clock synchro algo
931 * which works with something else than MPEG over UDP */
932 *pb_bool = p_sys->b_pace_control;
939 pi_int = (int*)va_arg( args, int * );
943 case ACCESS_GET_PTS_DELAY:
944 pi_64 = (int64_t*)va_arg( args, int64_t * );
945 *pi_64 = (int64_t)var_GetInteger( p_access, "http-caching" ) * 1000;
949 case ACCESS_SET_PAUSE_STATE:
952 case ACCESS_GET_META:
953 p_meta = (vlc_meta_t*)va_arg( args, vlc_meta_t* );
955 if( p_sys->psz_icy_name )
956 vlc_meta_Set( p_meta, vlc_meta_Title, p_sys->psz_icy_name );
957 if( p_sys->psz_icy_genre )
958 vlc_meta_Set( p_meta, vlc_meta_Genre, p_sys->psz_icy_genre );
959 if( p_sys->psz_icy_title )
960 vlc_meta_Set( p_meta, vlc_meta_NowPlaying, p_sys->psz_icy_title );
963 case ACCESS_GET_CONTENT_TYPE:
964 *va_arg( args, char ** ) =
965 p_sys->psz_mime ? strdup( p_sys->psz_mime ) : NULL;
968 case ACCESS_GET_TITLE_INFO:
969 case ACCESS_SET_TITLE:
970 case ACCESS_SET_SEEKPOINT:
971 case ACCESS_SET_PRIVATE_ID_STATE:
975 msg_Warn( p_access, "unimplemented query in control" );
982 /*****************************************************************************
984 *****************************************************************************/
985 static int Connect( access_t *p_access, int64_t i_tell )
987 access_sys_t *p_sys = p_access->p_sys;
988 vlc_url_t srv = p_sys->b_proxy ? p_sys->proxy : p_sys->url;
991 free( p_sys->psz_location );
992 free( p_sys->psz_mime );
993 free( p_sys->psz_pragma );
995 free( p_sys->psz_icy_genre );
996 free( p_sys->psz_icy_name );
997 free( p_sys->psz_icy_title );
1000 p_sys->psz_location = NULL;
1001 p_sys->psz_mime = NULL;
1002 p_sys->psz_pragma = NULL;
1003 p_sys->b_mms = false;
1004 p_sys->b_chunked = false;
1006 p_sys->i_icy_meta = 0;
1007 p_sys->psz_icy_name = NULL;
1008 p_sys->psz_icy_genre = NULL;
1009 p_sys->psz_icy_title = NULL;
1011 p_access->info.i_size = 0;
1012 p_access->info.i_pos = i_tell;
1013 p_access->info.b_eof = false;
1016 /* Open connection */
1017 p_sys->fd = net_ConnectTCP( p_access, srv.psz_host, srv.i_port );
1018 if( p_sys->fd == -1 )
1020 msg_Err( p_access, "cannot connect to %s:%d", srv.psz_host, srv.i_port );
1024 /* Initialize TLS/SSL session */
1025 if( p_sys->b_ssl == true )
1027 /* CONNECT to establish TLS tunnel through HTTP proxy */
1028 if( p_sys->b_proxy )
1031 unsigned i_status = 0;
1033 if( p_sys->i_version == 0 )
1035 /* CONNECT is not in HTTP/1.0 */
1036 Disconnect( p_access );
1040 net_Printf( VLC_OBJECT(p_access), p_sys->fd, NULL,
1041 "CONNECT %s:%d HTTP/1.%d\r\nHost: %s:%d\r\n\r\n",
1042 p_sys->url.psz_host, p_sys->url.i_port,
1044 p_sys->url.psz_host, p_sys->url.i_port);
1046 psz = net_Gets( VLC_OBJECT(p_access), p_sys->fd, NULL );
1049 msg_Err( p_access, "cannot establish HTTP/TLS tunnel" );
1050 Disconnect( p_access );
1054 sscanf( psz, "HTTP/%*u.%*u %3u", &i_status );
1057 if( ( i_status / 100 ) != 2 )
1059 msg_Err( p_access, "HTTP/TLS tunnel through proxy denied" );
1060 Disconnect( p_access );
1066 psz = net_Gets( VLC_OBJECT(p_access), p_sys->fd, NULL );
1069 msg_Err( p_access, "HTTP proxy connection failed" );
1070 Disconnect( p_access );
1079 if( p_access->b_die || p_access->b_error )
1081 Disconnect( p_access );
1088 /* TLS/SSL handshake */
1089 p_sys->p_tls = tls_ClientCreate( VLC_OBJECT(p_access), p_sys->fd,
1091 if( p_sys->p_tls == NULL )
1093 msg_Err( p_access, "cannot establish HTTP/TLS session" );
1094 Disconnect( p_access );
1097 p_sys->p_vs = &p_sys->p_tls->sock;
1100 return Request( p_access, i_tell ) ? -2 : 0;
1104 static int Request( access_t *p_access, int64_t i_tell )
1106 access_sys_t *p_sys = p_access->p_sys;
1108 v_socket_t *pvs = p_sys->p_vs;
1110 if( p_sys->b_proxy )
1112 if( p_sys->url.psz_path )
1114 net_Printf( VLC_OBJECT(p_access), p_sys->fd, NULL,
1115 "GET http://%s:%d%s HTTP/1.%d\r\n",
1116 p_sys->url.psz_host, p_sys->url.i_port,
1117 p_sys->url.psz_path, p_sys->i_version );
1121 net_Printf( VLC_OBJECT(p_access), p_sys->fd, NULL,
1122 "GET http://%s:%d/ HTTP/1.%d\r\n",
1123 p_sys->url.psz_host, p_sys->url.i_port,
1129 const char *psz_path = p_sys->url.psz_path;
1130 if( !psz_path || !*psz_path )
1134 if( p_sys->url.i_port != (pvs ? 443 : 80) )
1136 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs,
1137 "GET %s HTTP/1.%d\r\nHost: %s:%d\r\n",
1138 psz_path, p_sys->i_version, p_sys->url.psz_host,
1139 p_sys->url.i_port );
1143 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs,
1144 "GET %s HTTP/1.%d\r\nHost: %s\r\n",
1145 psz_path, p_sys->i_version, p_sys->url.psz_host );
1149 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs, "User-Agent: %s\r\n",
1150 p_sys->psz_user_agent );
1152 if( p_sys->i_version == 1 )
1154 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs,
1155 "Range: bytes=%"PRIu64"-\r\n", i_tell );
1159 if( p_sys->cookies )
1162 for( i = 0; i < vlc_array_count( p_sys->cookies ); i++ )
1164 const char * cookie = vlc_array_item_at_index( p_sys->cookies, i );
1165 char * psz_cookie_content = cookie_get_content( cookie );
1166 char * psz_cookie_domain = cookie_get_domain( cookie );
1168 assert( psz_cookie_content );
1170 /* FIXME: This is clearly not conforming to the rfc */
1171 bool is_in_right_domain = (!psz_cookie_domain || strstr( p_sys->url.psz_host, psz_cookie_domain ));
1173 if( is_in_right_domain )
1175 msg_Dbg( p_access, "Sending Cookie %s", psz_cookie_content );
1176 if( net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs, "Cookie: %s\r\n", psz_cookie_content ) < 0 )
1177 msg_Err( p_access, "failed to send Cookie" );
1179 free( psz_cookie_content );
1180 free( psz_cookie_domain );
1184 /* Authentication */
1185 if( p_sys->url.psz_username || p_sys->url.psz_password )
1186 AuthReply( p_access, "", &p_sys->url, &p_sys->auth );
1188 /* Proxy Authentication */
1189 if( p_sys->proxy.psz_username || p_sys->proxy.psz_password )
1190 AuthReply( p_access, "Proxy-", &p_sys->proxy, &p_sys->proxy_auth );
1192 /* ICY meta data request */
1193 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs, "Icy-MetaData: 1\r\n" );
1196 if( p_sys->b_continuous )
1198 net_Printf( VLC_OBJECT( p_access ), p_sys->fd, pvs,
1199 "Connection: Keep-Alive\r\n" );
1201 else if( p_sys->i_version == 1 )
1203 net_Printf( VLC_OBJECT( p_access ), p_sys->fd, pvs,
1204 "Connection: Close\r\n");
1207 if( net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs, "\r\n" ) < 0 )
1209 msg_Err( p_access, "failed to send request" );
1210 Disconnect( p_access );
1211 return VLC_EGENERIC;
1215 if( ( psz = net_Gets( VLC_OBJECT(p_access), p_sys->fd, pvs ) ) == NULL )
1217 msg_Err( p_access, "failed to read answer" );
1220 if( !strncmp( psz, "HTTP/1.", 7 ) )
1222 p_sys->psz_protocol = "HTTP";
1223 p_sys->i_code = atoi( &psz[9] );
1225 else if( !strncmp( psz, "ICY", 3 ) )
1227 p_sys->psz_protocol = "ICY";
1228 p_sys->i_code = atoi( &psz[4] );
1229 p_sys->b_reconnect = true;
1233 msg_Err( p_access, "invalid HTTP reply '%s'", psz );
1237 msg_Dbg( p_access, "protocol '%s' answer code %d",
1238 p_sys->psz_protocol, p_sys->i_code );
1239 if( !strcmp( p_sys->psz_protocol, "ICY" ) )
1241 p_sys->b_seekable = false;
1243 if( p_sys->i_code != 206 && p_sys->i_code != 401 )
1245 p_sys->b_seekable = false;
1247 /* Authentication error - We'll have to display the dialog */
1248 if( p_sys->i_code == 401 )
1252 /* Other fatal error */
1253 else if( p_sys->i_code >= 400 )
1255 msg_Err( p_access, "error: %s", psz );
1263 char *psz = net_Gets( VLC_OBJECT(p_access), p_sys->fd, pvs );
1268 msg_Err( p_access, "failed to read answer" );
1272 if( p_access->b_die || p_access->b_error )
1278 /* msg_Dbg( p_input, "Line=%s", psz ); */
1285 if( ( p = strchr( psz, ':' ) ) == NULL )
1287 msg_Err( p_access, "malformed header line: %s", psz );
1292 while( *p == ' ' ) p++;
1294 if( !strcasecmp( psz, "Content-Length" ) )
1296 if( p_sys->b_continuous )
1298 p_access->info.i_size = -1;
1299 msg_Dbg( p_access, "this frame size=%lld", atoll(p ) );
1300 p_sys->i_remaining = atoll( p );
1304 p_access->info.i_size = i_tell + atoll( p );
1305 msg_Dbg( p_access, "stream size=%"PRId64, p_access->info.i_size );
1308 else if( !strcasecmp( psz, "Location" ) )
1312 /* This does not follow RFC 2068, but yet if the url is not absolute,
1313 * handle it as everyone does. */
1316 const char *psz_http_ext = p_sys->b_ssl ? "s" : "" ;
1318 if( p_sys->url.i_port == ( p_sys->b_ssl ? 443 : 80 ) )
1320 if( asprintf(&psz_new_loc, "http%s://%s%s", psz_http_ext,
1321 p_sys->url.psz_host, p) < 0 )
1326 if( asprintf(&psz_new_loc, "http%s://%s:%d%s", psz_http_ext,
1327 p_sys->url.psz_host, p_sys->url.i_port, p) < 0 )
1333 psz_new_loc = strdup( p );
1336 free( p_sys->psz_location );
1337 p_sys->psz_location = psz_new_loc;
1339 else if( !strcasecmp( psz, "Content-Type" ) )
1341 free( p_sys->psz_mime );
1342 p_sys->psz_mime = strdup( p );
1343 msg_Dbg( p_access, "Content-Type: %s", p_sys->psz_mime );
1345 else if( !strcasecmp( psz, "Content-Encoding" ) )
1347 msg_Dbg( p_access, "Content-Encoding: %s", p );
1348 if( strcasecmp( p, "identity" ) )
1350 p_sys->b_compressed = true;
1352 msg_Warn( p_access, "Compressed content not supported. Rebuild with zlib support." );
1355 else if( !strcasecmp( psz, "Pragma" ) )
1357 if( !strcasecmp( psz, "Pragma: features" ) )
1358 p_sys->b_mms = true;
1359 free( p_sys->psz_pragma );
1360 p_sys->psz_pragma = strdup( p );
1361 msg_Dbg( p_access, "Pragma: %s", p_sys->psz_pragma );
1363 else if( !strcasecmp( psz, "Server" ) )
1365 msg_Dbg( p_access, "Server: %s", p );
1366 if( !strncasecmp( p, "Icecast", 7 ) ||
1367 !strncasecmp( p, "Nanocaster", 10 ) )
1369 /* Remember if this is Icecast
1370 * we need to force demux in this case without breaking
1373 /* Let live 365 streams (nanocaster) piggyback on the icecast
1374 * routine. They look very similar */
1376 p_sys->b_reconnect = true;
1377 p_sys->b_pace_control = false;
1378 p_sys->b_icecast = true;
1381 else if( !strcasecmp( psz, "Transfer-Encoding" ) )
1383 msg_Dbg( p_access, "Transfer-Encoding: %s", p );
1384 if( !strncasecmp( p, "chunked", 7 ) )
1386 p_sys->b_chunked = true;
1389 else if( !strcasecmp( psz, "Icy-MetaInt" ) )
1391 msg_Dbg( p_access, "Icy-MetaInt: %s", p );
1392 p_sys->i_icy_meta = atoi( p );
1393 if( p_sys->i_icy_meta < 0 )
1394 p_sys->i_icy_meta = 0;
1396 msg_Warn( p_access, "ICY metaint=%d", p_sys->i_icy_meta );
1398 else if( !strcasecmp( psz, "Icy-Name" ) )
1400 free( p_sys->psz_icy_name );
1401 p_sys->psz_icy_name = strdup( p );
1402 msg_Dbg( p_access, "Icy-Name: %s", p_sys->psz_icy_name );
1404 p_sys->b_icecast = true; /* be on the safeside. set it here as well. */
1405 p_sys->b_reconnect = true;
1406 p_sys->b_pace_control = false;
1408 else if( !strcasecmp( psz, "Icy-Genre" ) )
1410 free( p_sys->psz_icy_genre );
1411 p_sys->psz_icy_genre = strdup( p );
1412 msg_Dbg( p_access, "Icy-Genre: %s", p_sys->psz_icy_genre );
1414 else if( !strncasecmp( psz, "Icy-Notice", 10 ) )
1416 msg_Dbg( p_access, "Icy-Notice: %s", p );
1418 else if( !strncasecmp( psz, "icy-", 4 ) ||
1419 !strncasecmp( psz, "ice-", 4 ) ||
1420 !strncasecmp( psz, "x-audiocast", 11 ) )
1422 msg_Dbg( p_access, "Meta-Info: %s: %s", psz, p );
1424 else if( !strcasecmp( psz, "Set-Cookie" ) )
1426 if( p_sys->cookies )
1428 msg_Dbg( p_access, "Accepting Cookie: %s", p );
1429 cookie_append( p_sys->cookies, strdup(p) );
1432 msg_Dbg( p_access, "We have a Cookie we won't remember: %s", p );
1434 else if( !strcasecmp( psz, "www-authenticate" ) )
1436 msg_Dbg( p_access, "Authentication header: %s", p );
1437 AuthParseHeader( p_access, p, &p_sys->auth );
1439 else if( !strcasecmp( psz, "proxy-authenticate" ) )
1441 msg_Dbg( p_access, "Proxy authentication header: %s", p );
1442 AuthParseHeader( p_access, p, &p_sys->proxy_auth );
1444 else if( !strcasecmp( psz, "authentication-info" ) )
1446 msg_Dbg( p_access, "Authentication Info header: %s", p );
1447 if( AuthCheckReply( p_access, p, &p_sys->url, &p_sys->auth ) )
1450 else if( !strcasecmp( psz, "proxy-authentication-info" ) )
1452 msg_Dbg( p_access, "Proxy Authentication Info header: %s", p );
1453 if( AuthCheckReply( p_access, p, &p_sys->proxy, &p_sys->proxy_auth ) )
1462 Disconnect( p_access );
1463 return VLC_EGENERIC;
1466 /*****************************************************************************
1468 *****************************************************************************/
1469 static void Disconnect( access_t *p_access )
1471 access_sys_t *p_sys = p_access->p_sys;
1473 if( p_sys->p_tls != NULL)
1475 tls_ClientDelete( p_sys->p_tls );
1476 p_sys->p_tls = NULL;
1479 if( p_sys->fd != -1)
1481 net_Close(p_sys->fd);
1487 /*****************************************************************************
1488 * Cookies (FIXME: we may want to rewrite that using a nice structure to hold
1489 * them) (FIXME: only support the "domain=" param)
1490 *****************************************************************************/
1492 /* Get the NAME=VALUE part of the Cookie */
1493 static char * cookie_get_content( const char * cookie )
1495 char * ret = strdup( cookie );
1496 if( !ret ) return NULL;
1498 /* Look for a ';' */
1499 while( *str && *str != ';' ) str++;
1500 /* Replace it by a end-char */
1501 if( *str == ';' ) *str = 0;
1505 /* Get the domain where the cookie is stored */
1506 static char * cookie_get_domain( const char * cookie )
1508 const char * str = cookie;
1509 static const char domain[] = "domain=";
1512 /* Look for a ';' */
1515 if( !strncmp( str, domain, sizeof(domain) - 1 /* minus \0 */ ) )
1517 str += sizeof(domain) - 1 /* minus \0 */;
1518 char * ret = strdup( str );
1519 /* Now remove the next ';' if present */
1520 char * ret_iter = ret;
1521 while( *ret_iter && *ret_iter != ';' ) ret_iter++;
1522 if( *ret_iter == ';' )
1526 /* Go to next ';' field */
1527 while( *str && *str != ';' ) str++;
1528 if( *str == ';' ) str++;
1530 while( *str && *str == ' ' ) str++;
1535 /* Get NAME in the NAME=VALUE field */
1536 static char * cookie_get_name( const char * cookie )
1538 char * ret = cookie_get_content( cookie ); /* NAME=VALUE */
1539 if( !ret ) return NULL;
1541 while( *str && *str != '=' ) str++;
1546 /* Add a cookie in cookies, checking to see how it should be added */
1547 static void cookie_append( vlc_array_t * cookies, char * cookie )
1554 char * cookie_name = cookie_get_name( cookie );
1556 /* Don't send invalid cookies */
1560 char * cookie_domain = cookie_get_domain( cookie );
1561 for( i = 0; i < vlc_array_count( cookies ); i++ )
1563 char * current_cookie = vlc_array_item_at_index( cookies, i );
1564 char * current_cookie_name = cookie_get_name( current_cookie );
1565 char * current_cookie_domain = cookie_get_domain( current_cookie );
1567 assert( current_cookie_name );
1569 bool is_domain_matching = ( cookie_domain && current_cookie_domain &&
1570 !strcmp( cookie_domain, current_cookie_domain ) );
1572 if( is_domain_matching && !strcmp( cookie_name, current_cookie_name ) )
1574 /* Remove previous value for this cookie */
1575 free( current_cookie );
1576 vlc_array_remove( cookies, i );
1579 free( current_cookie_name );
1580 free( current_cookie_domain );
1583 free( current_cookie_name );
1584 free( current_cookie_domain );
1586 free( cookie_name );
1587 free( cookie_domain );
1588 vlc_array_append( cookies, cookie );
1591 /*****************************************************************************
1592 * "RFC 2617: Basic and Digest Access Authentication" header parsing
1593 *****************************************************************************/
1594 static char *AuthGetParam( const char *psz_header, const char *psz_param )
1596 char psz_what[strlen(psz_param)+3];
1597 sprintf( psz_what, "%s=\"", psz_param );
1598 psz_header = strstr( psz_header, psz_what );
1601 const char *psz_end;
1602 psz_header += strlen( psz_what );
1603 psz_end = strchr( psz_header, '"' );
1604 if( !psz_end ) /* Invalid since we should have a closing quote */
1605 return strdup( psz_header );
1606 return strndup( psz_header, psz_end - psz_header );
1614 static char *AuthGetParamNoQuotes( const char *psz_header, const char *psz_param )
1616 char psz_what[strlen(psz_param)+2];
1617 sprintf( psz_what, "%s=", psz_param );
1618 psz_header = strstr( psz_header, psz_what );
1621 const char *psz_end;
1622 psz_header += strlen( psz_what );
1623 psz_end = strchr( psz_header, ',' );
1624 /* XXX: Do we need to filter out trailing space between the value and
1625 * the comma/end of line? */
1626 if( !psz_end ) /* Can be valid if this is the last parameter */
1627 return strdup( psz_header );
1628 return strndup( psz_header, psz_end - psz_header );
1636 static void AuthParseHeader( access_t *p_access, const char *psz_header,
1637 http_auth_t *p_auth )
1639 /* FIXME: multiple auth methods can be listed (comma seperated) */
1641 /* 2 Basic Authentication Scheme */
1642 if( !strncasecmp( psz_header, "Basic ", strlen( "Basic " ) ) )
1644 msg_Dbg( p_access, "Using Basic Authentication" );
1645 psz_header += strlen( "Basic " );
1646 p_auth->psz_realm = AuthGetParam( psz_header, "realm" );
1647 if( !p_auth->psz_realm )
1648 msg_Warn( p_access, "Basic Authentication: "
1649 "Mandatory 'realm' parameter is missing" );
1651 /* 3 Digest Access Authentication Scheme */
1652 else if( !strncasecmp( psz_header, "Digest ", strlen( "Digest " ) ) )
1654 msg_Dbg( p_access, "Using Digest Access Authentication" );
1655 if( p_auth->psz_nonce ) return; /* FIXME */
1656 psz_header += strlen( "Digest " );
1657 p_auth->psz_realm = AuthGetParam( psz_header, "realm" );
1658 p_auth->psz_domain = AuthGetParam( psz_header, "domain" );
1659 p_auth->psz_nonce = AuthGetParam( psz_header, "nonce" );
1660 p_auth->psz_opaque = AuthGetParam( psz_header, "opaque" );
1661 p_auth->psz_stale = AuthGetParamNoQuotes( psz_header, "stale" );
1662 p_auth->psz_algorithm = AuthGetParamNoQuotes( psz_header, "algorithm" );
1663 p_auth->psz_qop = AuthGetParam( psz_header, "qop" );
1664 p_auth->i_nonce = 0;
1665 /* printf("realm: |%s|\ndomain: |%s|\nnonce: |%s|\nopaque: |%s|\n"
1666 "stale: |%s|\nalgorithm: |%s|\nqop: |%s|\n",
1667 p_auth->psz_realm,p_auth->psz_domain,p_auth->psz_nonce,
1668 p_auth->psz_opaque,p_auth->psz_stale,p_auth->psz_algorithm,
1669 p_auth->psz_qop); */
1670 if( !p_auth->psz_realm )
1671 msg_Warn( p_access, "Digest Access Authentication: "
1672 "Mandatory 'realm' parameter is missing" );
1673 if( !p_auth->psz_nonce )
1674 msg_Warn( p_access, "Digest Access Authentication: "
1675 "Mandatory 'nonce' parameter is missing" );
1676 if( p_auth->psz_qop ) /* FIXME: parse the qop list */
1678 char *psz_tmp = strchr( p_auth->psz_qop, ',' );
1679 if( psz_tmp ) *psz_tmp = '\0';
1684 const char *psz_end = strchr( psz_header, ' ' );
1686 msg_Warn( p_access, "Unknown authentication scheme: '%*s'",
1687 psz_end - psz_header, psz_header );
1689 msg_Warn( p_access, "Unknown authentication scheme: '%s'",
1694 static char *AuthDigest( access_t *p_access, vlc_url_t *p_url,
1695 http_auth_t *p_auth, const char *psz_method )
1698 const char *psz_username = p_url->psz_username ?: "";
1699 const char *psz_password = p_url->psz_password ?: "";
1701 char *psz_HA1 = NULL;
1702 char *psz_HA2 = NULL;
1703 char *psz_response = NULL;
1707 if( p_auth->psz_HA1 )
1709 psz_HA1 = strdup( p_auth->psz_HA1 );
1710 if( !psz_HA1 ) goto error;
1715 AddMD5( &md5, psz_username, strlen( psz_username ) );
1716 AddMD5( &md5, ":", 1 );
1717 AddMD5( &md5, p_auth->psz_realm, strlen( p_auth->psz_realm ) );
1718 AddMD5( &md5, ":", 1 );
1719 AddMD5( &md5, psz_password, strlen( psz_password ) );
1722 psz_HA1 = psz_md5_hash( &md5 );
1723 if( !psz_HA1 ) goto error;
1725 if( p_auth->psz_algorithm
1726 && !strcmp( p_auth->psz_algorithm, "MD5-sess" ) )
1729 AddMD5( &md5, psz_HA1, 32 );
1731 AddMD5( &md5, ":", 1 );
1732 AddMD5( &md5, p_auth->psz_nonce, strlen( p_auth->psz_nonce ) );
1733 AddMD5( &md5, ":", 1 );
1734 AddMD5( &md5, p_auth->psz_cnonce, strlen( p_auth->psz_cnonce ) );
1737 psz_HA1 = psz_md5_hash( &md5 );
1738 if( !psz_HA1 ) goto error;
1739 p_auth->psz_HA1 = strdup( psz_HA1 );
1740 if( !p_auth->psz_HA1 ) goto error;
1747 AddMD5( &md5, psz_method, strlen( psz_method ) );
1748 AddMD5( &md5, ":", 1 );
1749 if( p_url->psz_path )
1750 AddMD5( &md5, p_url->psz_path, strlen( p_url->psz_path ) );
1752 AddMD5( &md5, "/", 1 );
1753 if( p_auth->psz_qop && !strcmp( p_auth->psz_qop, "auth-int" ) )
1758 AddMD5( &ent, "", 0 ); /* XXX: entity-body. should be ok for GET */
1760 psz_ent = psz_md5_hash( &ent );
1761 if( !psz_ent ) goto error;
1762 AddMD5( &md5, ":", 1 );
1763 AddMD5( &md5, psz_ent, 32 );
1767 psz_HA2 = psz_md5_hash( &md5 );
1768 if( !psz_HA2 ) goto error;
1770 /* Request digest */
1772 AddMD5( &md5, psz_HA1, 32 );
1773 AddMD5( &md5, ":", 1 );
1774 AddMD5( &md5, p_auth->psz_nonce, strlen( p_auth->psz_nonce ) );
1775 AddMD5( &md5, ":", 1 );
1777 && ( !strcmp( p_auth->psz_qop, "auth" )
1778 || !strcmp( p_auth->psz_qop, "auth-int" ) ) )
1781 snprintf( psz_inonce, 9, "%08x", p_auth->i_nonce );
1782 AddMD5( &md5, psz_inonce, 8 );
1783 AddMD5( &md5, ":", 1 );
1784 AddMD5( &md5, p_auth->psz_cnonce, strlen( p_auth->psz_cnonce ) );
1785 AddMD5( &md5, ":", 1 );
1786 AddMD5( &md5, p_auth->psz_qop, strlen( p_auth->psz_qop ) );
1787 AddMD5( &md5, ":", 1 );
1789 AddMD5( &md5, psz_HA2, 32 );
1791 psz_response = psz_md5_hash( &md5 );
1796 return psz_response;
1800 static void AuthReply( access_t *p_access, const char *psz_prefix,
1801 vlc_url_t *p_url, http_auth_t *p_auth )
1803 access_sys_t *p_sys = p_access->p_sys;
1804 v_socket_t *pvs = p_sys->p_vs;
1806 const char *psz_username = p_url->psz_username ?: "";
1807 const char *psz_password = p_url->psz_password ?: "";
1809 if( p_auth->psz_nonce )
1811 /* Digest Access Authentication */
1814 if( p_auth->psz_algorithm
1815 && strcmp( p_auth->psz_algorithm, "MD5" )
1816 && strcmp( p_auth->psz_algorithm, "MD5-sess" ) )
1818 msg_Err( p_access, "Digest Access Authentication: "
1819 "Unknown algorithm '%s'", p_auth->psz_algorithm );
1823 if( p_auth->psz_qop || !p_auth->psz_cnonce )
1825 /* FIXME: needs to be really random to prevent man in the middle
1827 free( p_auth->psz_cnonce );
1828 p_auth->psz_cnonce = strdup( "Some random string FIXME" );
1832 psz_response = AuthDigest( p_access, p_url, p_auth, "GET" );
1833 if( !psz_response ) return;
1835 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs,
1836 "%sAuthorization: Digest "
1837 /* Mandatory parameters */
1843 /* Optional parameters */
1844 "%s%s%s" /* algorithm */
1845 "%s%s%s" /* cnonce */
1846 "%s%s%s" /* opaque */
1847 "%s%s%s" /* message qop */
1848 "%s%08x%s" /* nonce count */
1850 /* Mandatory parameters */
1855 p_url->psz_path ?: "/",
1857 /* Optional parameters */
1858 p_auth->psz_algorithm ? "algorithm=\"" : "",
1859 p_auth->psz_algorithm ?: "",
1860 p_auth->psz_algorithm ? "\", " : "",
1861 p_auth->psz_cnonce ? "cnonce=\"" : "",
1862 p_auth->psz_cnonce ?: "",
1863 p_auth->psz_cnonce ? "\", " : "",
1864 p_auth->psz_opaque ? "opaque=\"" : "",
1865 p_auth->psz_opaque ?: "",
1866 p_auth->psz_opaque ? "\", " : "",
1867 p_auth->psz_qop ? "qop=\"" : "",
1868 p_auth->psz_qop ?: "",
1869 p_auth->psz_qop ? "\", " : "",
1870 p_auth->i_nonce ? "nc=\"" : "uglyhack=\"", /* Will be parsed as an unhandled extension */
1872 p_auth->i_nonce ? "\"" : "\""
1875 free( psz_response );
1879 /* Basic Access Authentication */
1880 char buf[strlen( psz_username ) + strlen( psz_password ) + 2];
1883 snprintf( buf, sizeof( buf ), "%s:%s", psz_username, psz_password );
1884 b64 = vlc_b64_encode( buf );
1888 net_Printf( VLC_OBJECT(p_access), p_sys->fd, pvs,
1889 "%sAuthorization: Basic %s\r\n", psz_prefix, b64 );
1895 static int AuthCheckReply( access_t *p_access, const char *psz_header,
1896 vlc_url_t *p_url, http_auth_t *p_auth )
1898 int i_ret = VLC_EGENERIC;
1899 char *psz_nextnonce = AuthGetParam( psz_header, "nextnonce" );
1900 char *psz_qop = AuthGetParamNoQuotes( psz_header, "qop" );
1901 char *psz_rspauth = AuthGetParam( psz_header, "rspauth" );
1902 char *psz_cnonce = AuthGetParam( psz_header, "cnonce" );
1903 char *psz_nc = AuthGetParamNoQuotes( psz_header, "nc" );
1909 if( strcmp( psz_cnonce, p_auth->psz_cnonce ) )
1911 msg_Err( p_access, "HTTP Digest Access Authentication: server replied with a different client nonce value." );
1918 i_nonce = strtol( psz_nc, NULL, 16 );
1919 if( i_nonce != p_auth->i_nonce )
1921 msg_Err( p_access, "HTTP Digest Access Authentication: server replied with a different nonce count value." );
1926 if( psz_qop && p_auth->psz_qop && strcmp( psz_qop, p_auth->psz_qop ) )
1927 msg_Warn( p_access, "HTTP Digest Access Authentication: server replied using a different 'quality of protection' option" );
1929 /* All the clear text values match, let's now check the response
1931 psz_digest = AuthDigest( p_access, p_url, p_auth, "" );
1932 if( strcmp( psz_digest, psz_rspauth ) )
1934 msg_Err( p_access, "HTTP Digest Access Authentication: server replied with an invalid response digest (expected value: %s).", psz_digest );
1943 free( p_auth->psz_nonce );
1944 p_auth->psz_nonce = psz_nextnonce;
1945 psz_nextnonce = NULL;
1948 i_ret = VLC_SUCCESS;
1950 free( psz_nextnonce );
1952 free( psz_rspauth );
1959 static void AuthReset( http_auth_t *p_auth )
1961 FREENULL( p_auth->psz_realm );
1962 FREENULL( p_auth->psz_domain );
1963 FREENULL( p_auth->psz_nonce );
1964 FREENULL( p_auth->psz_opaque );
1965 FREENULL( p_auth->psz_stale );
1966 FREENULL( p_auth->psz_algorithm );
1967 FREENULL( p_auth->psz_qop );
1968 p_auth->i_nonce = 0;
1969 FREENULL( p_auth->psz_cnonce );
1970 FREENULL( p_auth->psz_HA1 );