45 #define BUFFER_SIZE MAX_URL_SIZE
46 #define MAX_REDIRECTS 8
56 int64_t
off, end_off, filesize;
90 z_stream inflate_stream;
98 #define OFFSET(x) offsetof(HTTPContext, x)
99 #define D AV_OPT_FLAG_DECODING_PARAM
100 #define E AV_OPT_FLAG_ENCODING_PARAM
101 #define DEFAULT_USER_AGENT "Lavf/" AV_STRINGIFY(LIBAVFORMAT_VERSION)
104 {
"seekable",
"control seekability of connection",
OFFSET(seekable),
AV_OPT_TYPE_INT, { .i64 = -1 }, -1, 1,
D },
105 {
"chunked_post",
"use chunked transfer-encoding for posts",
OFFSET(chunked_post),
AV_OPT_TYPE_INT, { .i64 = 1 }, 0, 1,
E },
106 {
"headers",
"set custom HTTP headers, can override built in default headers",
OFFSET(headers),
AV_OPT_TYPE_STRING, { 0 }, 0, 0,
D |
E },
107 {
"content_type",
"set a specific content type for the POST messages",
OFFSET(content_type),
AV_OPT_TYPE_STRING, { 0 }, 0, 0,
D |
E },
110 {
"multiple_requests",
"use persistent connections",
OFFSET(multiple_requests),
AV_OPT_TYPE_INT, { .i64 = 0 }, 0, 1,
D |
E },
113 {
"cookies",
"set cookies to be sent in applicable future requests, use newline delimited Set-Cookie HTTP field value syntax",
OFFSET(cookies),
AV_OPT_TYPE_STRING, { 0 }, 0, 0,
D },
119 {
"none",
"No auth method set, autodetect", 0,
AV_OPT_TYPE_CONST, { .i64 =
HTTP_AUTH_NONE }, 0, 0,
D |
E,
"auth_type"},
121 {
"send_expect_100",
"Force sending an Expect: 100-continue header for POST",
OFFSET(send_expect_100),
AV_OPT_TYPE_INT, { .i64 = 0 }, 0, 1,
E },
124 {
"end_offset",
"try to limit the request to bytes preceding this offset",
OFFSET(end_off),
AV_OPT_TYPE_INT64, { .i64 = 0 }, 0, INT64_MAX,
D },
130 const char *hoststr,
const char *auth,
131 const char *proxyauth,
int *new_location);
145 const char *path, *proxy_path, *lower_proto =
"tcp", *local_path;
146 char hostname[1024], hoststr[1024], proto[10];
147 char auth[1024], proxyauth[1024] =
"";
150 int port, use_proxy, err, location_changed = 0;
154 hostname,
sizeof(hostname), &port,
156 ff_url_join(hoststr,
sizeof(hoststr), NULL, NULL, hostname, port, NULL);
158 proxy_path = getenv(
"http_proxy");
160 proxy_path &&
av_strstart(proxy_path,
"http://", NULL);
162 if (!strcmp(proto,
"https")) {
171 if (path1[0] ==
'\0')
179 ff_url_join(urlbuf,
sizeof(urlbuf), proto, NULL, hostname, port,
"%s",
183 hostname,
sizeof(hostname), &port, NULL, 0, proxy_path);
186 ff_url_join(buf,
sizeof(buf), lower_proto, NULL, hostname, port, NULL);
196 auth, proxyauth, &location_changed);
200 return location_changed;
208 int location_changed, attempts = 0, redirects = 0;
216 if (location_changed < 0)
238 location_changed == 1) {
247 location_changed = 0;
255 if (location_changed < 0)
256 return location_changed;
280 switch (status_code) {
287 if (status_code >= 400 && status_code <= 499)
289 else if (status_code >= 500)
292 return default_averror;
315 if (len < 2 || strcmp(
"\r\n", s->
headers + len - 2))
317 "No trailing CRLF found in HTTP header.\n");
333 }
else if (len == 0) {
355 if (q > line && q[-1] ==
'\r')
361 if ((q - line) < line_size - 1)
372 if (http_code >= 400 && http_code < 600 &&
387 new_loc =
av_strdup(redirected_location);
401 if (!strncmp(p,
"bytes ", 6)) {
403 s->
off = strtoll(p, NULL, 10);
404 if ((slash = strchr(p,
'/')) && strlen(slash) > 0)
405 s->
filesize = strtoll(slash + 1, NULL, 10);
419 inflateEnd(&s->inflate_stream);
420 if (inflateInit2(&s->inflate_stream, 32 + 15) != Z_OK) {
422 s->inflate_stream.msg);
425 if (zlibCompileFlags() & (1 << 17)) {
427 "Your zlib was compiled without gzip support.\n");
432 "Compressed (%s) content, need zlib with gzip support\n", p);
447 int len = 4 + strlen(p) + strlen(tag);
475 if (line[0] ==
'\0') {
481 if (line_count == 0) {
493 while (*p !=
'\0' && *p !=
':')
512 !strncmp(p,
"bytes", 5) &&
526 if (!strcmp(p,
"close"))
543 size_t str_size = strlen(tmp) + strlen(p) + 2;
577 char *next, *cookie, *set_cookies =
av_strdup(s->
cookies), *cset_cookies = set_cookies;
579 if (!set_cookies)
return AVERROR(EINVAL);
582 while ((cookie =
av_strtok(set_cookies,
"\n", &next))) {
583 int domain_offset = 0;
584 char *param, *next_param, *cdomain = NULL, *cpath = NULL, *cvalue = NULL;
587 while ((param =
av_strtok(cookie,
"; ", &next_param))) {
598 int leading_dot = (param[7] ==
'.');
600 cdomain =
av_strdup(¶m[7+leading_dot]);
609 if (!cdomain || !cpath || !cvalue) {
611 "Invalid cookie found, no value, path or domain specified\n");
620 domain_offset = strlen(domain) - strlen(cdomain);
621 if (domain_offset < 0)
635 char *tmp = *cookies;
636 size_t str_size = strlen(cvalue) + strlen(*cookies) + 3;
641 snprintf(*cookies, str_size,
"%s; %s", tmp, cvalue);
698 const char *hoststr,
const char *auth,
699 const char *proxyauth,
int *new_location)
704 char *authstr = NULL, *proxyauthstr = NULL;
705 int64_t off = s->
off;
708 int send_expect_100 = 0;
723 method = post ?
"POST" :
"GET";
743 len +=
av_strlcatf(headers + len,
sizeof(headers) - len,
746 len +=
av_strlcpy(headers + len,
"Accept: */*\r\n",
747 sizeof(headers) - len);
752 len +=
av_strlcatf(headers + len,
sizeof(headers) - len,
753 "Range: bytes=%"PRId64
"-", s->
off);
755 len +=
av_strlcatf(headers + len,
sizeof(headers) - len,
758 sizeof(headers) - len);
761 len +=
av_strlcatf(headers + len,
sizeof(headers) - len,
762 "Expect: 100-continue\r\n");
766 len +=
av_strlcpy(headers + len,
"Connection: keep-alive\r\n",
767 sizeof(headers) - len);
769 len +=
av_strlcpy(headers + len,
"Connection: close\r\n",
770 sizeof(headers) - len);
774 len +=
av_strlcatf(headers + len,
sizeof(headers) - len,
775 "Host: %s\r\n", hoststr);
777 len +=
av_strlcatf(headers + len,
sizeof(headers) - len,
781 len +=
av_strlcatf(headers + len,
sizeof(headers) - len,
784 char *cookies = NULL;
785 if (!
get_cookies(s, &cookies, path, hoststr) && cookies) {
786 len +=
av_strlcatf(headers + len,
sizeof(headers) - len,
787 "Cookie: %s\r\n", cookies);
792 len +=
av_strlcatf(headers + len,
sizeof(headers) - len,
793 "Icy-MetaData: %d\r\n", 1);
808 post && s->
chunked_post ?
"Transfer-Encoding: chunked\r\n" :
"",
810 authstr ? authstr :
"",
811 proxyauthstr ?
"Proxy-" :
"", proxyauthstr ? proxyauthstr :
"");
832 if (post && !s->
post_data && !send_expect_100) {
846 err = (off == s->
off) ? 0 : -1;
879 #define DECOMPRESS_BUF_SIZE (256 * 1024)
885 if (!s->inflate_buffer) {
886 s->inflate_buffer =
av_malloc(DECOMPRESS_BUF_SIZE);
887 if (!s->inflate_buffer)
891 if (s->inflate_stream.avail_in == 0) {
892 int read =
http_buf_read(h, s->inflate_buffer, DECOMPRESS_BUF_SIZE);
895 s->inflate_stream.next_in = s->inflate_buffer;
896 s->inflate_stream.avail_in = read;
899 s->inflate_stream.avail_out =
size;
900 s->inflate_stream.next_out =
buf;
902 ret = inflate(&s->inflate_stream, Z_SYNC_FLUSH);
903 if (ret != Z_OK && ret != Z_STREAM_END)
905 ret, s->inflate_stream.msg);
907 return size - s->inflate_stream.avail_out;
914 int err, new_location;
936 av_dlog(NULL,
"Chunked encoding data size: %"PRId64
"'\n",
946 return http_buf_read_compressed(h, buf, size);
974 val = strstr(key,
"='");
977 end = strstr(val,
"';");
1010 char data[255 * 16 + 1];
1017 if ((ret =
av_opt_set(s,
"icy_metadata_packet", data, 0)) < 0)
1025 return FFMIN(size, remaining);
1049 char crlf[] =
"\r\n";
1061 snprintf(temp,
sizeof(temp),
"%x\r\n", size);
1074 char footer[] =
"0\r\n\r\n";
1080 ret = ret > 0 ? 0 :
ret;
1093 inflateEnd(&s->inflate_stream);
1111 int64_t old_off = s->
off;
1113 int old_buf_size,
ret;
1118 else if ((whence == SEEK_CUR && off == 0) ||
1119 (whence == SEEK_SET && off == s->
off))
1124 if (whence == SEEK_CUR)
1126 else if (whence == SEEK_END)
1128 else if (whence != SEEK_SET)
1136 memcpy(old_buf, s->
buf_ptr, old_buf_size);
1142 memcpy(s->
buffer, old_buf, old_buf_size);
1160 #define HTTP_CLASS(flavor) \
1161 static const AVClass flavor ## _context_class = { \
1162 .class_name = # flavor, \
1163 .item_name = av_default_item_name, \
1164 .option = options, \
1165 .version = LIBAVUTIL_VERSION_INT, \
1168 #if CONFIG_HTTP_PROTOCOL
1181 .priv_data_class = &http_context_class,
1186 #if CONFIG_HTTPS_PROTOCOL
1199 .priv_data_class = &https_context_class,
1204 #if CONFIG_HTTPPROXY_PROTOCOL
1216 char hostname[1024], hoststr[1024];
1217 char auth[1024], pathbuf[1024], *path;
1218 char lower_url[100];
1219 int port, ret = 0, attempts = 0;
1229 av_url_split(NULL, 0, auth,
sizeof(auth), hostname,
sizeof(hostname), &port,
1230 pathbuf,
sizeof(pathbuf), uri);
1231 ff_url_join(hoststr,
sizeof(hoststr), NULL, NULL, hostname, port, NULL);
1236 ff_url_join(lower_url,
sizeof(lower_url),
"tcp", NULL, hostname, port,
1247 "CONNECT %s HTTP/1.1\r\n"
1249 "Connection: close\r\n"
1254 authstr ?
"Proxy-" :
"", authstr ? authstr :
"");
1292 http_proxy_close(h);
1303 .
name =
"httpproxy",
1304 .url_open = http_proxy_open,
1306 .url_write = http_proxy_write,
1307 .url_close = http_proxy_close,