Mercurial > mplayer.hg
annotate stream/http.c @ 31230:0a182f029587
Reindent.
author | reimar |
---|---|
date | Mon, 31 May 2010 21:16:02 +0000 |
parents | fb3bde3ec3a8 |
children | 9494acd724a9 |
rev | line source |
---|---|
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
1 /* |
902 | 2 * HTTP Helper |
30426
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
3 * |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
4 * Copyright (C) 2001 Bertrand Baudet <bertrand_baudet@yahoo.com> |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
5 * |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
6 * This file is part of MPlayer. |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
7 * |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
8 * MPlayer is free software; you can redistribute it and/or modify |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
9 * it under the terms of the GNU General Public License as published by |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
10 * the Free Software Foundation; either version 2 of the License, or |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
11 * (at your option) any later version. |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
12 * |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
13 * MPlayer is distributed in the hope that it will be useful, |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
16 * GNU General Public License for more details. |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
17 * |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
18 * You should have received a copy of the GNU General Public License along |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
19 * with MPlayer; if not, write to the Free Software Foundation, Inc., |
ce0122361a39
Add license header to all files missing it in the stream subdirectory.
diego
parents:
30357
diff
changeset
|
20 * 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. |
902 | 21 */ |
22 | |
15614
a4a46131ee71
Change header order to avoid compile error because of STREAM_SEEK
reimar
parents:
15585
diff
changeset
|
23 #include "config.h" |
a4a46131ee71
Change header order to avoid compile error because of STREAM_SEEK
reimar
parents:
15585
diff
changeset
|
24 |
870 | 25 #include <stdio.h> |
26 #include <stdlib.h> | |
27 #include <string.h> | |
15585 | 28 #include <unistd.h> |
870 | 29 |
28402 | 30 #if !HAVE_WINSOCK2_H |
27472
c0b233cd30ca
Revert moving closesocket definition and network headers to network.h.
diego
parents:
27464
diff
changeset
|
31 #else |
c0b233cd30ca
Revert moving closesocket definition and network headers to network.h.
diego
parents:
27464
diff
changeset
|
32 #include <winsock2.h> |
c0b233cd30ca
Revert moving closesocket definition and network headers to network.h.
diego
parents:
27464
diff
changeset
|
33 #include <ws2tcpip.h> |
c0b233cd30ca
Revert moving closesocket definition and network headers to network.h.
diego
parents:
27464
diff
changeset
|
34 #endif |
c0b233cd30ca
Revert moving closesocket definition and network headers to network.h.
diego
parents:
27464
diff
changeset
|
35 |
c0b233cd30ca
Revert moving closesocket definition and network headers to network.h.
diego
parents:
27464
diff
changeset
|
36 #include "http.h" |
4816
f1dea39a50bb
Fixed the http response parser when the http header only has the HTTP
bertrand
parents:
4311
diff
changeset
|
37 #include "url.h" |
5915 | 38 #include "mp_msg.h" |
870 | 39 |
15585 | 40 #include "stream.h" |
19312
ab8d6b6deb63
proper inclusion of demuxer.h (including libmpdemux in Makefile only was to make previous split easier)
ben
parents:
19271
diff
changeset
|
41 #include "libmpdemux/demuxer.h" |
15585 | 42 #include "network.h" |
43 #include "help_mp.h" | |
44 | |
45 | |
25246 | 46 extern const mime_struct_t mime_type_table[]; |
15585 | 47 extern int stream_cache_size; |
48 extern int network_bandwidth; | |
49 | |
16013 | 50 typedef struct { |
51 unsigned metaint; | |
52 unsigned metapos; | |
53 int is_ultravox; | |
54 } scast_data_t; | |
55 | |
56 /** | |
57 * \brief first read any data from sc->buffer then from fd | |
58 * \param fd file descriptor to read data from | |
59 * \param buffer buffer to read into | |
60 * \param len how many bytes to read | |
61 * \param sc streaming control containing buffer to read from first | |
62 * \return len unless there is a read error or eof | |
63 */ | |
64 static unsigned my_read(int fd, char *buffer, int len, streaming_ctrl_t *sc) { | |
65 unsigned pos = 0; | |
66 unsigned cp_len = sc->buffer_size - sc->buffer_pos; | |
67 if (cp_len > len) | |
68 cp_len = len; | |
69 memcpy(buffer, &sc->buffer[sc->buffer_pos], cp_len); | |
70 sc->buffer_pos += cp_len; | |
71 pos += cp_len; | |
72 while (pos < len) { | |
16070 | 73 int ret = recv(fd, &buffer[pos], len - pos, 0); |
16013 | 74 if (ret <= 0) |
75 break; | |
76 pos += ret; | |
77 } | |
78 return pos; | |
79 } | |
80 | |
16032 | 81 /** |
82 * \brief read and process (i.e. discard *g*) a block of ultravox metadata | |
83 * \param fd file descriptor to read from | |
84 * \param sc streaming_ctrl_t whose buffer is consumed before reading from fd | |
85 * \return number of real data before next metadata block starts or 0 on error | |
86 */ | |
16013 | 87 static unsigned uvox_meta_read(int fd, streaming_ctrl_t *sc) { |
88 unsigned metaint; | |
16070 | 89 unsigned char info[6] = {0, 0, 0, 0, 0, 0}; |
90 int info_read; | |
16013 | 91 do { |
16070 | 92 info_read = my_read(fd, info, 1, sc); |
16013 | 93 if (info[0] == 0x00) |
16070 | 94 info_read = my_read(fd, info, 6, sc); |
16013 | 95 else |
16070 | 96 info_read += my_read(fd, &info[1], 5, sc); |
97 if (info_read != 6) // read error or eof | |
98 return 0; | |
16031
c2e78215f0d9
Ultravox improvements according to specs (didn't know they existed *g*)
reimar
parents:
16013
diff
changeset
|
99 // sync byte and reserved flags |
c2e78215f0d9
Ultravox improvements according to specs (didn't know they existed *g*)
reimar
parents:
16013
diff
changeset
|
100 if (info[0] != 0x5a || (info[1] & 0xfc) != 0x00) { |
16013 | 101 mp_msg(MSGT_DEMUXER, MSGL_ERR, "Invalid or unknown uvox metadata\n"); |
102 return 0; | |
103 } | |
16031
c2e78215f0d9
Ultravox improvements according to specs (didn't know they existed *g*)
reimar
parents:
16013
diff
changeset
|
104 if (info[1] & 0x01) |
c2e78215f0d9
Ultravox improvements according to specs (didn't know they existed *g*)
reimar
parents:
16013
diff
changeset
|
105 mp_msg(MSGT_DEMUXER, MSGL_WARN, "Encrypted ultravox data\n"); |
16013 | 106 metaint = info[4] << 8 | info[5]; |
16031
c2e78215f0d9
Ultravox improvements according to specs (didn't know they existed *g*)
reimar
parents:
16013
diff
changeset
|
107 if ((info[3] & 0xf) < 0x07) { // discard any metadata nonsense |
16013 | 108 char *metabuf = malloc(metaint); |
109 my_read(fd, metabuf, metaint, sc); | |
110 free(metabuf); | |
111 } | |
16031
c2e78215f0d9
Ultravox improvements according to specs (didn't know they existed *g*)
reimar
parents:
16013
diff
changeset
|
112 } while ((info[3] & 0xf) < 0x07); |
16013 | 113 return metaint; |
114 } | |
115 | |
116 /** | |
117 * \brief read one scast meta data entry and print it | |
16032 | 118 * \param fd file descriptor to read from |
119 * \param sc streaming_ctrl_t whose buffer is consumed before reading from fd | |
16013 | 120 */ |
121 static void scast_meta_read(int fd, streaming_ctrl_t *sc) { | |
122 unsigned char tmp = 0; | |
123 unsigned metalen; | |
124 my_read(fd, &tmp, 1, sc); | |
125 metalen = tmp * 16; | |
126 if (metalen > 0) { | |
30938 | 127 int i; |
30941
fb3bde3ec3a8
Change type to uint8_t to avoid checks depending on char signedness.
reimar
parents:
30938
diff
changeset
|
128 uint8_t *info = malloc(metalen + 1); |
16013 | 129 unsigned nlen = my_read(fd, info, metalen, sc); |
30938 | 130 // avoid breaking the user's terminal too much |
131 if (nlen > 256) nlen = 256; | |
132 for (i = 0; i < nlen; i++) | |
133 if (info[i] && info[i] < 32) info[i] = '?'; | |
16013 | 134 info[nlen] = 0; |
135 mp_msg(MSGT_DEMUXER, MSGL_INFO, "\nICY Info: %s\n", info); | |
136 free(info); | |
137 } | |
138 } | |
139 | |
16032 | 140 /** |
141 * \brief read data from scast/ultravox stream without any metadata | |
142 * \param fd file descriptor to read from | |
143 * \param buffer buffer to read data into | |
144 * \param size number of bytes to read | |
145 * \param sc streaming_ctrl_t whose buffer is consumed before reading from fd | |
146 */ | |
16013 | 147 static int scast_streaming_read(int fd, char *buffer, int size, |
148 streaming_ctrl_t *sc) { | |
149 scast_data_t *sd = (scast_data_t *)sc->data; | |
150 unsigned block, ret; | |
151 unsigned done = 0; | |
152 | |
153 // first read remaining data up to next metadata | |
154 block = sd->metaint - sd->metapos; | |
155 if (block > size) | |
156 block = size; | |
157 ret = my_read(fd, buffer, block, sc); | |
158 sd->metapos += ret; | |
159 done += ret; | |
160 if (ret != block) // read problems or eof | |
161 size = done; | |
162 | |
163 while (done < size) { // now comes the metadata | |
164 if (sd->is_ultravox) | |
16070 | 165 { |
16013 | 166 sd->metaint = uvox_meta_read(fd, sc); |
16070 | 167 if (!sd->metaint) |
168 size = done; | |
169 } | |
16013 | 170 else |
171 scast_meta_read(fd, sc); // read and display metadata | |
172 sd->metapos = 0; | |
173 block = size - done; | |
174 if (block > sd->metaint) | |
175 block = sd->metaint; | |
176 ret = my_read(fd, &buffer[done], block, sc); | |
177 sd->metapos += ret; | |
178 done += ret; | |
179 if (ret != block) // read problems or eof | |
180 size = done; | |
181 } | |
182 return done; | |
183 } | |
184 | |
185 static int scast_streaming_start(stream_t *stream) { | |
186 int metaint; | |
187 scast_data_t *scast_data; | |
188 HTTP_header_t *http_hdr = stream->streaming_ctrl->data; | |
16070 | 189 int is_ultravox = strcasecmp(stream->streaming_ctrl->url->protocol, "unsv") == 0; |
16013 | 190 if (!stream || stream->fd < 0 || !http_hdr) |
191 return -1; | |
192 if (is_ultravox) | |
193 metaint = 0; | |
194 else { | |
195 metaint = atoi(http_get_field(http_hdr, "Icy-MetaInt")); | |
196 if (metaint <= 0) | |
197 return -1; | |
198 } | |
199 stream->streaming_ctrl->buffer = malloc(http_hdr->body_size); | |
200 stream->streaming_ctrl->buffer_size = http_hdr->body_size; | |
201 stream->streaming_ctrl->buffer_pos = 0; | |
202 memcpy(stream->streaming_ctrl->buffer, http_hdr->body, http_hdr->body_size); | |
203 scast_data = malloc(sizeof(scast_data_t)); | |
204 scast_data->metaint = metaint; | |
205 scast_data->metapos = 0; | |
206 scast_data->is_ultravox = is_ultravox; | |
207 http_free(http_hdr); | |
208 stream->streaming_ctrl->data = scast_data; | |
209 stream->streaming_ctrl->streaming_read = scast_streaming_read; | |
210 stream->streaming_ctrl->streaming_seek = NULL; | |
211 stream->streaming_ctrl->prebuffer_size = 64 * 1024; // 64 KBytes | |
212 stream->streaming_ctrl->buffering = 1; | |
213 stream->streaming_ctrl->status = streaming_playing_e; | |
214 return 0; | |
215 } | |
216 | |
15585 | 217 static int nop_streaming_start( stream_t *stream ) { |
218 HTTP_header_t *http_hdr = NULL; | |
219 char *next_url=NULL; | |
220 URL_t *rd_url=NULL; | |
221 int fd,ret; | |
222 if( stream==NULL ) return -1; | |
223 | |
224 fd = stream->fd; | |
225 if( fd<0 ) { | |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
226 fd = http_send_request( stream->streaming_ctrl->url, 0 ); |
15585 | 227 if( fd<0 ) return -1; |
228 http_hdr = http_read_response( fd ); | |
229 if( http_hdr==NULL ) return -1; | |
230 | |
231 switch( http_hdr->status_code ) { | |
232 case 200: // OK | |
233 mp_msg(MSGT_NETWORK,MSGL_V,"Content-Type: [%s]\n", http_get_field(http_hdr, "Content-Type") ); | |
234 mp_msg(MSGT_NETWORK,MSGL_V,"Content-Length: [%s]\n", http_get_field(http_hdr, "Content-Length") ); | |
235 if( http_hdr->body_size>0 ) { | |
236 if( streaming_bufferize( stream->streaming_ctrl, http_hdr->body, http_hdr->body_size )<0 ) { | |
237 http_free( http_hdr ); | |
238 return -1; | |
239 } | |
240 } | |
241 break; | |
242 // Redirect | |
243 case 301: // Permanently | |
244 case 302: // Temporarily | |
19459
6dad4b1efb82
Handle 303 (See Other) redirect, part of a patch by Benjamin Zores (ben at geexbox org)
reimar
parents:
19312
diff
changeset
|
245 case 303: // See Other |
15585 | 246 ret=-1; |
247 next_url = http_get_field( http_hdr, "Location" ); | |
248 | |
249 if (next_url != NULL) | |
250 rd_url=url_new(next_url); | |
251 | |
252 if (next_url != NULL && rd_url != NULL) { | |
253 mp_msg(MSGT_NETWORK,MSGL_STATUS,"Redirected: Using this url instead %s\n",next_url); | |
254 stream->streaming_ctrl->url=check4proxies(rd_url); | |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
255 ret=nop_streaming_start(stream); //recursively get streaming started |
15585 | 256 } else { |
257 mp_msg(MSGT_NETWORK,MSGL_ERR,"Redirection failed\n"); | |
258 closesocket( fd ); | |
259 fd = -1; | |
260 } | |
261 return ret; | |
262 break; | |
263 case 401: //Authorization required | |
264 case 403: //Forbidden | |
265 case 404: //Not found | |
266 case 500: //Server Error | |
267 default: | |
268 mp_msg(MSGT_NETWORK,MSGL_ERR,"Server returned code %d: %s\n", http_hdr->status_code, http_hdr->reason_phrase ); | |
269 closesocket( fd ); | |
270 fd = -1; | |
271 return -1; | |
272 break; | |
273 } | |
274 stream->fd = fd; | |
275 } else { | |
276 http_hdr = (HTTP_header_t*)stream->streaming_ctrl->data; | |
277 if( http_hdr->body_size>0 ) { | |
278 if( streaming_bufferize( stream->streaming_ctrl, http_hdr->body, http_hdr->body_size )<0 ) { | |
279 http_free( http_hdr ); | |
280 stream->streaming_ctrl->data = NULL; | |
281 return -1; | |
282 } | |
283 } | |
284 } | |
285 | |
286 if( http_hdr ) { | |
287 http_free( http_hdr ); | |
288 stream->streaming_ctrl->data = NULL; | |
289 } | |
290 | |
291 stream->streaming_ctrl->streaming_read = nop_streaming_read; | |
292 stream->streaming_ctrl->streaming_seek = nop_streaming_seek; | |
293 stream->streaming_ctrl->prebuffer_size = 64*1024; // 64 KBytes | |
294 stream->streaming_ctrl->buffering = 1; | |
295 stream->streaming_ctrl->status = streaming_playing_e; | |
296 return 0; | |
297 } | |
298 | |
870 | 299 HTTP_header_t * |
17566
f580a7755ac5
Patch by Stefan Huehner / stefan % huehner ! org \
rathann
parents:
16948
diff
changeset
|
300 http_new_header(void) { |
870 | 301 HTTP_header_t *http_hdr; |
302 | |
18879 | 303 http_hdr = malloc(sizeof(HTTP_header_t)); |
870 | 304 if( http_hdr==NULL ) return NULL; |
305 memset( http_hdr, 0, sizeof(HTTP_header_t) ); | |
306 | |
307 return http_hdr; | |
308 } | |
309 | |
310 void | |
311 http_free( HTTP_header_t *http_hdr ) { | |
3039 | 312 HTTP_field_t *field, *field2free; |
870 | 313 if( http_hdr==NULL ) return; |
314 if( http_hdr->protocol!=NULL ) free( http_hdr->protocol ); | |
315 if( http_hdr->uri!=NULL ) free( http_hdr->uri ); | |
316 if( http_hdr->reason_phrase!=NULL ) free( http_hdr->reason_phrase ); | |
317 if( http_hdr->field_search!=NULL ) free( http_hdr->field_search ); | |
902 | 318 if( http_hdr->method!=NULL ) free( http_hdr->method ); |
319 if( http_hdr->buffer!=NULL ) free( http_hdr->buffer ); | |
3039 | 320 field = http_hdr->first_field; |
321 while( field!=NULL ) { | |
322 field2free = field; | |
14460 | 323 if (field->field_name) |
324 free(field->field_name); | |
3039 | 325 field = field->next; |
326 free( field2free ); | |
327 } | |
870 | 328 free( http_hdr ); |
3039 | 329 http_hdr = NULL; |
870 | 330 } |
331 | |
902 | 332 int |
333 http_response_append( HTTP_header_t *http_hdr, char *response, int length ) { | |
1027 | 334 if( http_hdr==NULL || response==NULL || length<0 ) return -1; |
7304
7da2c2a68547
Check if realloc failed on http_hdr->buffer instead of ptr in http_response_append,
bertrand
parents:
7293
diff
changeset
|
335 |
18558
4928dd61f136
Fix potential integer overflows in memory allocation.
rtogni
parents:
18094
diff
changeset
|
336 if( (unsigned)length > SIZE_MAX - http_hdr->buffer_size - 1) { |
4928dd61f136
Fix potential integer overflows in memory allocation.
rtogni
parents:
18094
diff
changeset
|
337 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Bad size in memory (re)allocation\n"); |
4928dd61f136
Fix potential integer overflows in memory allocation.
rtogni
parents:
18094
diff
changeset
|
338 return -1; |
4928dd61f136
Fix potential integer overflows in memory allocation.
rtogni
parents:
18094
diff
changeset
|
339 } |
30702 | 340 http_hdr->buffer = realloc( http_hdr->buffer, http_hdr->buffer_size+length+1 ); |
7304
7da2c2a68547
Check if realloc failed on http_hdr->buffer instead of ptr in http_response_append,
bertrand
parents:
7293
diff
changeset
|
341 if( http_hdr->buffer==NULL ) { |
7293 | 342 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Memory (re)allocation failed\n"); |
902 | 343 return -1; |
344 } | |
7293 | 345 memcpy( http_hdr->buffer+http_hdr->buffer_size, response, length ); |
346 http_hdr->buffer_size += length; | |
347 http_hdr->buffer[http_hdr->buffer_size]=0; // close the string! | |
902 | 348 return http_hdr->buffer_size; |
349 } | |
350 | |
351 int | |
2489
0ecc1b4f7cf8
Added ASF http server streaming (Not mms streaming).
bertrand
parents:
2310
diff
changeset
|
352 http_is_header_entire( HTTP_header_t *http_hdr ) { |
902 | 353 if( http_hdr==NULL ) return -1; |
7293 | 354 if( http_hdr->buffer==NULL ) return 0; // empty |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
355 |
3784 | 356 if( strstr(http_hdr->buffer, "\r\n\r\n")==NULL && |
357 strstr(http_hdr->buffer, "\n\n")==NULL ) return 0; | |
358 return 1; | |
902 | 359 } |
360 | |
361 int | |
362 http_response_parse( HTTP_header_t *http_hdr ) { | |
870 | 363 char *hdr_ptr, *ptr; |
364 char *field=NULL; | |
18558
4928dd61f136
Fix potential integer overflows in memory allocation.
rtogni
parents:
18094
diff
changeset
|
365 int pos_hdr_sep, hdr_sep_len; |
4928dd61f136
Fix potential integer overflows in memory allocation.
rtogni
parents:
18094
diff
changeset
|
366 size_t len; |
902 | 367 if( http_hdr==NULL ) return -1; |
368 if( http_hdr->is_parsed ) return 0; | |
870 | 369 |
370 // Get the protocol | |
902 | 371 hdr_ptr = strstr( http_hdr->buffer, " " ); |
870 | 372 if( hdr_ptr==NULL ) { |
5915 | 373 mp_msg(MSGT_NETWORK,MSGL_ERR,"Malformed answer. No space separator found.\n"); |
902 | 374 return -1; |
870 | 375 } |
902 | 376 len = hdr_ptr-http_hdr->buffer; |
18879 | 377 http_hdr->protocol = malloc(len+1); |
870 | 378 if( http_hdr->protocol==NULL ) { |
5915 | 379 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Memory allocation failed\n"); |
902 | 380 return -1; |
870 | 381 } |
902 | 382 strncpy( http_hdr->protocol, http_hdr->buffer, len ); |
383 http_hdr->protocol[len]='\0'; | |
870 | 384 if( !strncasecmp( http_hdr->protocol, "HTTP", 4) ) { |
385 if( sscanf( http_hdr->protocol+5,"1.%d", &(http_hdr->http_minor_version) )!=1 ) { | |
5915 | 386 mp_msg(MSGT_NETWORK,MSGL_ERR,"Malformed answer. Unable to get HTTP minor version.\n"); |
902 | 387 return -1; |
870 | 388 } |
389 } | |
390 | |
391 // Get the status code | |
392 if( sscanf( ++hdr_ptr, "%d", &(http_hdr->status_code) )!=1 ) { | |
5915 | 393 mp_msg(MSGT_NETWORK,MSGL_ERR,"Malformed answer. Unable to get status code.\n"); |
902 | 394 return -1; |
870 | 395 } |
396 hdr_ptr += 4; | |
397 | |
398 // Get the reason phrase | |
3514
43518985def8
Handle broken server that doesn't send CRLF but jusr LF.
bertrand
parents:
3497
diff
changeset
|
399 ptr = strstr( hdr_ptr, "\n" ); |
870 | 400 if( hdr_ptr==NULL ) { |
5915 | 401 mp_msg(MSGT_NETWORK,MSGL_ERR,"Malformed answer. Unable to get the reason phrase.\n"); |
902 | 402 return -1; |
870 | 403 } |
404 len = ptr-hdr_ptr; | |
18879 | 405 http_hdr->reason_phrase = malloc(len+1); |
870 | 406 if( http_hdr->reason_phrase==NULL ) { |
5915 | 407 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Memory allocation failed\n"); |
902 | 408 return -1; |
870 | 409 } |
410 strncpy( http_hdr->reason_phrase, hdr_ptr, len ); | |
4311 | 411 if( http_hdr->reason_phrase[len-1]=='\r' ) { |
412 len--; | |
413 } | |
870 | 414 http_hdr->reason_phrase[len]='\0'; |
415 | |
416 // Set the position of the header separator: \r\n\r\n | |
8179
63a5e03f4346
Removed hard coded value for the length of the header separator.
bertrand
parents:
7304
diff
changeset
|
417 hdr_sep_len = 4; |
902 | 418 ptr = strstr( http_hdr->buffer, "\r\n\r\n" ); |
870 | 419 if( ptr==NULL ) { |
3514
43518985def8
Handle broken server that doesn't send CRLF but jusr LF.
bertrand
parents:
3497
diff
changeset
|
420 ptr = strstr( http_hdr->buffer, "\n\n" ); |
43518985def8
Handle broken server that doesn't send CRLF but jusr LF.
bertrand
parents:
3497
diff
changeset
|
421 if( ptr==NULL ) { |
5915 | 422 mp_msg(MSGT_NETWORK,MSGL_ERR,"Header may be incomplete. No CRLF CRLF found.\n"); |
3514
43518985def8
Handle broken server that doesn't send CRLF but jusr LF.
bertrand
parents:
3497
diff
changeset
|
423 return -1; |
43518985def8
Handle broken server that doesn't send CRLF but jusr LF.
bertrand
parents:
3497
diff
changeset
|
424 } |
8179
63a5e03f4346
Removed hard coded value for the length of the header separator.
bertrand
parents:
7304
diff
changeset
|
425 hdr_sep_len = 2; |
870 | 426 } |
902 | 427 pos_hdr_sep = ptr-http_hdr->buffer; |
870 | 428 |
3514
43518985def8
Handle broken server that doesn't send CRLF but jusr LF.
bertrand
parents:
3497
diff
changeset
|
429 // Point to the first line after the method line. |
43518985def8
Handle broken server that doesn't send CRLF but jusr LF.
bertrand
parents:
3497
diff
changeset
|
430 hdr_ptr = strstr( http_hdr->buffer, "\n" )+1; |
870 | 431 do { |
3514
43518985def8
Handle broken server that doesn't send CRLF but jusr LF.
bertrand
parents:
3497
diff
changeset
|
432 ptr = hdr_ptr; |
43518985def8
Handle broken server that doesn't send CRLF but jusr LF.
bertrand
parents:
3497
diff
changeset
|
433 while( *ptr!='\r' && *ptr!='\n' ) ptr++; |
870 | 434 len = ptr-hdr_ptr; |
4816
f1dea39a50bb
Fixed the http response parser when the http header only has the HTTP
bertrand
parents:
4311
diff
changeset
|
435 if( len==0 ) break; |
30702 | 436 field = realloc(field, len+1); |
870 | 437 if( field==NULL ) { |
5915 | 438 mp_msg(MSGT_NETWORK,MSGL_ERR,"Memory allocation failed\n"); |
902 | 439 return -1; |
870 | 440 } |
441 strncpy( field, hdr_ptr, len ); | |
442 field[len]='\0'; | |
443 http_set_field( http_hdr, field ); | |
3514
43518985def8
Handle broken server that doesn't send CRLF but jusr LF.
bertrand
parents:
3497
diff
changeset
|
444 hdr_ptr = ptr+((*ptr=='\r')?2:1); |
902 | 445 } while( hdr_ptr<(http_hdr->buffer+pos_hdr_sep) ); |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
446 |
870 | 447 if( field!=NULL ) free( field ); |
448 | |
8179
63a5e03f4346
Removed hard coded value for the length of the header separator.
bertrand
parents:
7304
diff
changeset
|
449 if( pos_hdr_sep+hdr_sep_len<http_hdr->buffer_size ) { |
870 | 450 // Response has data! |
8179
63a5e03f4346
Removed hard coded value for the length of the header separator.
bertrand
parents:
7304
diff
changeset
|
451 http_hdr->body = http_hdr->buffer+pos_hdr_sep+hdr_sep_len; |
63a5e03f4346
Removed hard coded value for the length of the header separator.
bertrand
parents:
7304
diff
changeset
|
452 http_hdr->body_size = http_hdr->buffer_size-(pos_hdr_sep+hdr_sep_len); |
870 | 453 } |
454 | |
902 | 455 http_hdr->is_parsed = 1; |
456 return 0; | |
870 | 457 } |
458 | |
459 char * | |
902 | 460 http_build_request( HTTP_header_t *http_hdr ) { |
3497 | 461 char *ptr, *uri=NULL; |
902 | 462 int len; |
3039 | 463 HTTP_field_t *field; |
870 | 464 if( http_hdr==NULL ) return NULL; |
465 | |
466 if( http_hdr->method==NULL ) http_set_method( http_hdr, "GET"); | |
467 if( http_hdr->uri==NULL ) http_set_uri( http_hdr, "/"); | |
3497 | 468 else { |
18879 | 469 uri = malloc(strlen(http_hdr->uri) + 1); |
3497 | 470 if( uri==NULL ) { |
5915 | 471 mp_msg(MSGT_NETWORK,MSGL_ERR,"Memory allocation failed\n"); |
3497 | 472 return NULL; |
473 } | |
12391 | 474 strcpy(uri,http_hdr->uri); |
3497 | 475 } |
870 | 476 |
3497 | 477 //**** Compute the request length |
478 // Add the Method line | |
479 len = strlen(http_hdr->method)+strlen(uri)+12; | |
480 // Add the fields | |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
481 field = http_hdr->first_field; |
3039 | 482 while( field!=NULL ) { |
483 len += strlen(field->field_name)+2; | |
484 field = field->next; | |
485 } | |
3497 | 486 // Add the CRLF |
487 len += 2; | |
488 // Add the body | |
902 | 489 if( http_hdr->body!=NULL ) { |
490 len += http_hdr->body_size; | |
491 } | |
3497 | 492 // Free the buffer if it was previously used |
902 | 493 if( http_hdr->buffer!=NULL ) { |
494 free( http_hdr->buffer ); | |
495 http_hdr->buffer = NULL; | |
496 } | |
18879 | 497 http_hdr->buffer = malloc(len+1); |
902 | 498 if( http_hdr->buffer==NULL ) { |
5915 | 499 mp_msg(MSGT_NETWORK,MSGL_ERR,"Memory allocation failed\n"); |
902 | 500 return NULL; |
501 } | |
502 http_hdr->buffer_size = len; | |
503 | |
3497 | 504 //*** Building the request |
902 | 505 ptr = http_hdr->buffer; |
3497 | 506 // Add the method line |
507 ptr += sprintf( ptr, "%s %s HTTP/1.%d\r\n", http_hdr->method, uri, http_hdr->http_minor_version ); | |
3039 | 508 field = http_hdr->first_field; |
3497 | 509 // Add the field |
3039 | 510 while( field!=NULL ) { |
511 ptr += sprintf( ptr, "%s\r\n", field->field_name ); | |
512 field = field->next; | |
513 } | |
870 | 514 ptr += sprintf( ptr, "\r\n" ); |
3497 | 515 // Add the body |
870 | 516 if( http_hdr->body!=NULL ) { |
517 memcpy( ptr, http_hdr->body, http_hdr->body_size ); | |
518 } | |
3497 | 519 |
520 if( uri ) free( uri ); | |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
521 return http_hdr->buffer; |
870 | 522 } |
523 | |
524 char * | |
525 http_get_field( HTTP_header_t *http_hdr, const char *field_name ) { | |
526 if( http_hdr==NULL || field_name==NULL ) return NULL; | |
3039 | 527 http_hdr->field_search_pos = http_hdr->first_field; |
30702 | 528 http_hdr->field_search = realloc( http_hdr->field_search, strlen(field_name)+1 ); |
870 | 529 if( http_hdr->field_search==NULL ) { |
5915 | 530 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Memory allocation failed\n"); |
870 | 531 return NULL; |
532 } | |
533 strcpy( http_hdr->field_search, field_name ); | |
534 return http_get_next_field( http_hdr ); | |
535 } | |
536 | |
537 char * | |
538 http_get_next_field( HTTP_header_t *http_hdr ) { | |
539 char *ptr; | |
3039 | 540 HTTP_field_t *field; |
870 | 541 if( http_hdr==NULL ) return NULL; |
542 | |
3039 | 543 field = http_hdr->field_search_pos; |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
544 while( field!=NULL ) { |
3039 | 545 ptr = strstr( field->field_name, ":" ); |
870 | 546 if( ptr==NULL ) return NULL; |
3039 | 547 if( !strncasecmp( field->field_name, http_hdr->field_search, ptr-(field->field_name) ) ) { |
870 | 548 ptr++; // Skip the column |
549 while( ptr[0]==' ' ) ptr++; // Skip the spaces if there is some | |
3039 | 550 http_hdr->field_search_pos = field->next; |
870 | 551 return ptr; // return the value without the field name |
552 } | |
3039 | 553 field = field->next; |
870 | 554 } |
555 return NULL; | |
556 } | |
557 | |
558 void | |
3039 | 559 http_set_field( HTTP_header_t *http_hdr, const char *field_name ) { |
560 HTTP_field_t *new_field; | |
561 if( http_hdr==NULL || field_name==NULL ) return; | |
870 | 562 |
18879 | 563 new_field = malloc(sizeof(HTTP_field_t)); |
3039 | 564 if( new_field==NULL ) { |
5915 | 565 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Memory allocation failed\n"); |
870 | 566 return; |
567 } | |
3039 | 568 new_field->next = NULL; |
18879 | 569 new_field->field_name = malloc(strlen(field_name)+1); |
3039 | 570 if( new_field->field_name==NULL ) { |
5915 | 571 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Memory allocation failed\n"); |
27834
d35bcab9833b
Avoid a memleak if allocation of field_name fails, fixes bug #1319.
reimar
parents:
27473
diff
changeset
|
572 free(new_field); |
3039 | 573 return; |
574 } | |
575 strcpy( new_field->field_name, field_name ); | |
576 | |
577 if( http_hdr->last_field==NULL ) { | |
578 http_hdr->first_field = new_field; | |
579 } else { | |
580 http_hdr->last_field->next = new_field; | |
581 } | |
582 http_hdr->last_field = new_field; | |
870 | 583 http_hdr->field_nb++; |
584 } | |
585 | |
586 void | |
587 http_set_method( HTTP_header_t *http_hdr, const char *method ) { | |
588 if( http_hdr==NULL || method==NULL ) return; | |
589 | |
18879 | 590 http_hdr->method = malloc(strlen(method)+1); |
870 | 591 if( http_hdr->method==NULL ) { |
5915 | 592 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Memory allocation failed\n"); |
870 | 593 return; |
594 } | |
595 strcpy( http_hdr->method, method ); | |
596 } | |
597 | |
598 void | |
599 http_set_uri( HTTP_header_t *http_hdr, const char *uri ) { | |
600 if( http_hdr==NULL || uri==NULL ) return; | |
601 | |
18879 | 602 http_hdr->uri = malloc(strlen(uri)+1); |
870 | 603 if( http_hdr->uri==NULL ) { |
5915 | 604 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Memory allocation failed\n"); |
870 | 605 return; |
606 } | |
607 strcpy( http_hdr->uri, uri ); | |
608 } | |
609 | |
6514 | 610 int |
611 http_add_basic_authentication( HTTP_header_t *http_hdr, const char *username, const char *password ) { | |
18094
16f2bcd5d148
free memory on error in http_add_basic_authentication
reimar
parents:
17932
diff
changeset
|
612 char *auth = NULL, *usr_pass = NULL, *b64_usr_pass = NULL; |
6514 | 613 int encoded_len, pass_len=0, out_len; |
18094
16f2bcd5d148
free memory on error in http_add_basic_authentication
reimar
parents:
17932
diff
changeset
|
614 int res = -1; |
6514 | 615 if( http_hdr==NULL || username==NULL ) return -1; |
616 | |
617 if( password!=NULL ) { | |
618 pass_len = strlen(password); | |
619 } | |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
620 |
18879 | 621 usr_pass = malloc(strlen(username)+pass_len+2); |
6514 | 622 if( usr_pass==NULL ) { |
623 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Memory allocation failed\n"); | |
18094
16f2bcd5d148
free memory on error in http_add_basic_authentication
reimar
parents:
17932
diff
changeset
|
624 goto out; |
6514 | 625 } |
626 | |
627 sprintf( usr_pass, "%s:%s", username, (password==NULL)?"":password ); | |
628 | |
629 // Base 64 encode with at least 33% more data than the original size | |
630 encoded_len = strlen(usr_pass)*2; | |
18879 | 631 b64_usr_pass = malloc(encoded_len); |
6514 | 632 if( b64_usr_pass==NULL ) { |
633 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Memory allocation failed\n"); | |
18094
16f2bcd5d148
free memory on error in http_add_basic_authentication
reimar
parents:
17932
diff
changeset
|
634 goto out; |
6514 | 635 } |
636 | |
637 out_len = base64_encode( usr_pass, strlen(usr_pass), b64_usr_pass, encoded_len); | |
638 if( out_len<0 ) { | |
639 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Base64 out overflow\n"); | |
18094
16f2bcd5d148
free memory on error in http_add_basic_authentication
reimar
parents:
17932
diff
changeset
|
640 goto out; |
6514 | 641 } |
642 | |
643 b64_usr_pass[out_len]='\0'; | |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
644 |
18879 | 645 auth = malloc(encoded_len+22); |
6514 | 646 if( auth==NULL ) { |
647 mp_msg(MSGT_NETWORK,MSGL_FATAL,"Memory allocation failed\n"); | |
18094
16f2bcd5d148
free memory on error in http_add_basic_authentication
reimar
parents:
17932
diff
changeset
|
648 goto out; |
6514 | 649 } |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
650 |
6514 | 651 sprintf( auth, "Authorization: Basic %s", b64_usr_pass); |
652 http_set_field( http_hdr, auth ); | |
18094
16f2bcd5d148
free memory on error in http_add_basic_authentication
reimar
parents:
17932
diff
changeset
|
653 res = 0; |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
654 |
18094
16f2bcd5d148
free memory on error in http_add_basic_authentication
reimar
parents:
17932
diff
changeset
|
655 out: |
6514 | 656 free( usr_pass ); |
657 free( b64_usr_pass ); | |
658 free( auth ); | |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
659 |
18094
16f2bcd5d148
free memory on error in http_add_basic_authentication
reimar
parents:
17932
diff
changeset
|
660 return res; |
6514 | 661 } |
662 | |
870 | 663 void |
664 http_debug_hdr( HTTP_header_t *http_hdr ) { | |
3039 | 665 HTTP_field_t *field; |
666 int i = 0; | |
902 | 667 if( http_hdr==NULL ) return; |
870 | 668 |
5915 | 669 mp_msg(MSGT_NETWORK,MSGL_V,"--- HTTP DEBUG HEADER --- START ---\n"); |
670 mp_msg(MSGT_NETWORK,MSGL_V,"protocol: [%s]\n", http_hdr->protocol ); | |
671 mp_msg(MSGT_NETWORK,MSGL_V,"http minor version: [%d]\n", http_hdr->http_minor_version ); | |
672 mp_msg(MSGT_NETWORK,MSGL_V,"uri: [%s]\n", http_hdr->uri ); | |
673 mp_msg(MSGT_NETWORK,MSGL_V,"method: [%s]\n", http_hdr->method ); | |
674 mp_msg(MSGT_NETWORK,MSGL_V,"status code: [%d]\n", http_hdr->status_code ); | |
675 mp_msg(MSGT_NETWORK,MSGL_V,"reason phrase: [%s]\n", http_hdr->reason_phrase ); | |
676 mp_msg(MSGT_NETWORK,MSGL_V,"body size: [%d]\n", http_hdr->body_size ); | |
870 | 677 |
5915 | 678 mp_msg(MSGT_NETWORK,MSGL_V,"Fields:\n"); |
3039 | 679 field = http_hdr->first_field; |
680 while( field!=NULL ) { | |
5915 | 681 mp_msg(MSGT_NETWORK,MSGL_V," %d - %s\n", i++, field->field_name ); |
3039 | 682 field = field->next; |
683 } | |
5915 | 684 mp_msg(MSGT_NETWORK,MSGL_V,"--- HTTP DEBUG HEADER --- END ---\n"); |
870 | 685 } |
6514 | 686 |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
687 int |
6514 | 688 base64_encode(const void *enc, int encLen, char *out, int outMax) { |
17778
37bfcf89c89c
Fix base64 encoding for basic auth according to RFC.
reimar
parents:
17566
diff
changeset
|
689 static const char b64[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/"; |
6514 | 690 |
691 unsigned char *encBuf; | |
692 int outLen; | |
693 unsigned int bits; | |
694 unsigned int shift; | |
695 | |
696 encBuf = (unsigned char*)enc; | |
697 outLen = 0; | |
698 bits = 0; | |
699 shift = 0; | |
17778
37bfcf89c89c
Fix base64 encoding for basic auth according to RFC.
reimar
parents:
17566
diff
changeset
|
700 outMax &= ~3; |
6514 | 701 |
22031 | 702 while(1) { |
6514 | 703 if( encLen>0 ) { |
704 // Shift in byte | |
705 bits <<= 8; | |
706 bits |= *encBuf; | |
707 shift += 8; | |
708 // Next byte | |
709 encBuf++; | |
710 encLen--; | |
711 } else if( shift>0 ) { | |
712 // Pad last bits to 6 bits - will end next loop | |
713 bits <<= 6 - shift; | |
714 shift = 6; | |
715 } else { | |
17778
37bfcf89c89c
Fix base64 encoding for basic auth according to RFC.
reimar
parents:
17566
diff
changeset
|
716 // As per RFC 2045, section 6.8, |
37bfcf89c89c
Fix base64 encoding for basic auth according to RFC.
reimar
parents:
17566
diff
changeset
|
717 // pad output as necessary: 0 to 2 '=' chars. |
37bfcf89c89c
Fix base64 encoding for basic auth according to RFC.
reimar
parents:
17566
diff
changeset
|
718 while( outLen & 3 ){ |
37bfcf89c89c
Fix base64 encoding for basic auth according to RFC.
reimar
parents:
17566
diff
changeset
|
719 *out++ = '='; |
37bfcf89c89c
Fix base64 encoding for basic auth according to RFC.
reimar
parents:
17566
diff
changeset
|
720 outLen++; |
37bfcf89c89c
Fix base64 encoding for basic auth according to RFC.
reimar
parents:
17566
diff
changeset
|
721 } |
6514 | 722 |
723 return outLen; | |
724 } | |
725 | |
726 // Encode 6 bit segments | |
727 while( shift>=6 ) { | |
22031 | 728 if (outLen >= outMax) |
729 return -1; | |
6514 | 730 shift -= 6; |
731 *out = b64[ (bits >> shift) & 0x3F ]; | |
732 out++; | |
733 outLen++; | |
734 } | |
735 } | |
736 } | |
737 | |
25970
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
738 static void print_icy_metadata(HTTP_header_t *http_hdr) { |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
739 const char *field_data; |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
740 // note: I skip icy-notice1 and 2, as they contain html <BR> |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
741 // and are IMHO useless info ::atmos |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
742 if( (field_data = http_get_field(http_hdr, "icy-name")) != NULL ) |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
743 mp_msg(MSGT_NETWORK,MSGL_INFO,"Name : %s\n", field_data); |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
744 if( (field_data = http_get_field(http_hdr, "icy-genre")) != NULL ) |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
745 mp_msg(MSGT_NETWORK,MSGL_INFO,"Genre : %s\n", field_data); |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
746 if( (field_data = http_get_field(http_hdr, "icy-url")) != NULL ) |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
747 mp_msg(MSGT_NETWORK,MSGL_INFO,"Website: %s\n", field_data); |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
748 // XXX: does this really mean public server? ::atmos |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
749 if( (field_data = http_get_field(http_hdr, "icy-pub")) != NULL ) |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
750 mp_msg(MSGT_NETWORK,MSGL_INFO,"Public : %s\n", atoi(field_data)?"yes":"no"); |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
751 if( (field_data = http_get_field(http_hdr, "icy-br")) != NULL ) |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
752 mp_msg(MSGT_NETWORK,MSGL_INFO,"Bitrate: %skbit/s\n", field_data); |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
753 } |
c6ec51cc3b13
Move printing of Icy-Metadata into an extra function
reimar
parents:
25969
diff
changeset
|
754 |
21567 | 755 //! If this function succeeds you must closesocket stream->fd |
15585 | 756 static int http_streaming_start(stream_t *stream, int* file_format) { |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
757 HTTP_header_t *http_hdr = NULL; |
15585 | 758 unsigned int i; |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
759 int fd = stream->fd; |
25135
66f628d13442
Support stream redirection from http to mms, fix bug #927.
ulion
parents:
24257
diff
changeset
|
760 int res = STREAM_UNSUPPORTED; |
15585 | 761 int redirect = 0; |
762 int auth_retry=0; | |
763 int seekable=0; | |
764 char *content_type; | |
30357
3fdf04500df2
Handle Content-Length also when Content-Type is not set.
reimar
parents:
30356
diff
changeset
|
765 const char *content_length; |
15585 | 766 char *next_url; |
767 URL_t *url = stream->streaming_ctrl->url; | |
6514 | 768 |
15585 | 769 do |
770 { | |
21541
3b4ed8857b38
Fix potential endless loop in http_streaming_start due
reimar
parents:
21540
diff
changeset
|
771 redirect = 0; |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
772 if (fd > 0) closesocket(fd); |
15585 | 773 fd = http_send_request( url, 0 ); |
774 if( fd<0 ) { | |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
775 goto err_out; |
15585 | 776 } |
777 | |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
778 http_free(http_hdr); |
15585 | 779 http_hdr = http_read_response( fd ); |
780 if( http_hdr==NULL ) { | |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
781 goto err_out; |
15585 | 782 } |
783 | |
17932 | 784 if( mp_msg_test(MSGT_NETWORK,MSGL_V) ) { |
15585 | 785 http_debug_hdr( http_hdr ); |
786 } | |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
787 |
15585 | 788 // Check if we can make partial content requests and thus seek in http-streams |
789 if( http_hdr!=NULL && http_hdr->status_code==200 ) { | |
30106 | 790 const char *accept_ranges = http_get_field(http_hdr,"Accept-Ranges"); |
30105
31b7d4637b50
Fix crash if http reply contains neither "Accept-Ranges" nor "Server" fields.
reimar
parents:
30103
diff
changeset
|
791 const char *server = http_get_field(http_hdr, "Server"); |
30106 | 792 if (accept_ranges) |
15585 | 793 seekable = strncmp(accept_ranges,"bytes",5)==0; |
30105
31b7d4637b50
Fix crash if http reply contains neither "Accept-Ranges" nor "Server" fields.
reimar
parents:
30103
diff
changeset
|
794 else if (server && strcmp(server, "gvs 1.0") == 0) |
30103
f7af93ece976
Add a hack for broken youtube servers not returning Accept-Ranges.
reimar
parents:
29920
diff
changeset
|
795 seekable = 1; // HACK for youtube incorrectly claiming not to support seeking |
15585 | 796 } |
797 | |
25971
64b1e4ea04fc
Always display Icy-Metadata if available, whether we recognize an ICY-Server
reimar
parents:
25970
diff
changeset
|
798 print_icy_metadata(http_hdr); |
64b1e4ea04fc
Always display Icy-Metadata if available, whether we recognize an ICY-Server
reimar
parents:
25970
diff
changeset
|
799 |
15585 | 800 // Check if the response is an ICY status_code reason_phrase |
25968
c7f41f9e2eb8
Detect IceCast also by Icy-MetaInt header part in http_streaming_start(),
reimar
parents:
25246
diff
changeset
|
801 if( !strcasecmp(http_hdr->protocol, "ICY") || |
c7f41f9e2eb8
Detect IceCast also by Icy-MetaInt header part in http_streaming_start(),
reimar
parents:
25246
diff
changeset
|
802 http_get_field(http_hdr, "Icy-MetaInt") ) { |
15585 | 803 switch( http_hdr->status_code ) { |
804 case 200: { // OK | |
25969 | 805 char *field_data; |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
806 // If content-type == video/nsv we most likely have a winamp video stream |
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
807 // otherwise it should be mp3. if there are more types consider adding mime type |
15585 | 808 // handling like later |
809 if ( (field_data = http_get_field(http_hdr, "content-type")) != NULL && (!strcmp(field_data, "video/nsv") || !strcmp(field_data, "misc/ultravox"))) | |
810 *file_format = DEMUXER_TYPE_NSV; | |
16948
9b7925705f5b
Add another content-type for aac audio in shoutcast streams
rtognimp
parents:
16932
diff
changeset
|
811 else if ( (field_data = http_get_field(http_hdr, "content-type")) != NULL && (!strcmp(field_data, "audio/aacp") || !strcmp(field_data, "audio/aac"))) |
16917
c45409728a9d
Use correct demuxer type for aac in shoutcast streams
rtognimp
parents:
16614
diff
changeset
|
812 *file_format = DEMUXER_TYPE_AAC; |
15585 | 813 else |
814 *file_format = DEMUXER_TYPE_AUDIO; | |
25135
66f628d13442
Support stream redirection from http to mms, fix bug #927.
ulion
parents:
24257
diff
changeset
|
815 res = STREAM_ERROR; |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
816 goto out; |
15585 | 817 } |
818 case 400: // Server Full | |
819 mp_msg(MSGT_NETWORK,MSGL_ERR,"Error: ICY-Server is full, skipping!\n"); | |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
820 goto err_out; |
15585 | 821 case 401: // Service Unavailable |
822 mp_msg(MSGT_NETWORK,MSGL_ERR,"Error: ICY-Server return service unavailable, skipping!\n"); | |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
823 goto err_out; |
15585 | 824 case 403: // Service Forbidden |
825 mp_msg(MSGT_NETWORK,MSGL_ERR,"Error: ICY-Server return 'Service Forbidden'\n"); | |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
826 goto err_out; |
15585 | 827 case 404: // Resource Not Found |
828 mp_msg(MSGT_NETWORK,MSGL_ERR,"Error: ICY-Server couldn't find requested stream, skipping!\n"); | |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
829 goto err_out; |
15585 | 830 default: |
831 mp_msg(MSGT_NETWORK,MSGL_ERR,"Error: unhandled ICY-Errorcode, contact MPlayer developers!\n"); | |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
832 goto err_out; |
15585 | 833 } |
834 } | |
835 | |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
836 // Assume standard http if not ICY |
15585 | 837 switch( http_hdr->status_code ) { |
838 case 200: // OK | |
30357
3fdf04500df2
Handle Content-Length also when Content-Type is not set.
reimar
parents:
30356
diff
changeset
|
839 content_length = http_get_field(http_hdr, "Content-Length"); |
3fdf04500df2
Handle Content-Length also when Content-Type is not set.
reimar
parents:
30356
diff
changeset
|
840 if (content_length) { |
3fdf04500df2
Handle Content-Length also when Content-Type is not set.
reimar
parents:
30356
diff
changeset
|
841 mp_msg(MSGT_NETWORK,MSGL_V,"Content-Length: [%s]\n", content_length); |
3fdf04500df2
Handle Content-Length also when Content-Type is not set.
reimar
parents:
30356
diff
changeset
|
842 stream->end_pos = atoll(content_length); |
3fdf04500df2
Handle Content-Length also when Content-Type is not set.
reimar
parents:
30356
diff
changeset
|
843 } |
15585 | 844 // Look if we can use the Content-Type |
845 content_type = http_get_field( http_hdr, "Content-Type" ); | |
846 if( content_type!=NULL ) { | |
847 mp_msg(MSGT_NETWORK,MSGL_V,"Content-Type: [%s]\n", content_type ); | |
848 // Check in the mime type table for a demuxer type | |
849 i = 0; | |
850 while(mime_type_table[i].mime_type != NULL) { | |
851 if( !strcasecmp( content_type, mime_type_table[i].mime_type ) ) { | |
852 *file_format = mime_type_table[i].demuxer_type; | |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
853 res = seekable; |
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
854 goto out; |
15585 | 855 } |
856 i++; | |
857 } | |
858 } | |
859 // Not found in the mime type table, don't fail, | |
860 // we should try raw HTTP | |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
861 res = seekable; |
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
862 goto out; |
15585 | 863 // Redirect |
864 case 301: // Permanently | |
865 case 302: // Temporarily | |
19459
6dad4b1efb82
Handle 303 (See Other) redirect, part of a patch by Benjamin Zores (ben at geexbox org)
reimar
parents:
19312
diff
changeset
|
866 case 303: // See Other |
15585 | 867 // TODO: RFC 2616, recommand to detect infinite redirection loops |
868 next_url = http_get_field( http_hdr, "Location" ); | |
869 if( next_url!=NULL ) { | |
25238
f42b8e689416
Preserve unsv:// protocol specifier over http redirects.
reimar
parents:
25211
diff
changeset
|
870 int is_ultravox = strcasecmp(stream->streaming_ctrl->url->protocol, "unsv") == 0; |
20784
720206eef78b
Support URL redirections that do not specify full URL.
reimar
parents:
20185
diff
changeset
|
871 stream->streaming_ctrl->url = url_redirect( &url, next_url ); |
25135
66f628d13442
Support stream redirection from http to mms, fix bug #927.
ulion
parents:
24257
diff
changeset
|
872 if (!strcasecmp(url->protocol, "mms")) { |
66f628d13442
Support stream redirection from http to mms, fix bug #927.
ulion
parents:
24257
diff
changeset
|
873 res = STREAM_REDIRECTED; |
66f628d13442
Support stream redirection from http to mms, fix bug #927.
ulion
parents:
24257
diff
changeset
|
874 goto err_out; |
66f628d13442
Support stream redirection from http to mms, fix bug #927.
ulion
parents:
24257
diff
changeset
|
875 } |
66f628d13442
Support stream redirection from http to mms, fix bug #927.
ulion
parents:
24257
diff
changeset
|
876 if (strcasecmp(url->protocol, "http")) { |
66f628d13442
Support stream redirection from http to mms, fix bug #927.
ulion
parents:
24257
diff
changeset
|
877 mp_msg(MSGT_NETWORK,MSGL_ERR,"Unsupported http %d redirect to %s protocol\n", http_hdr->status_code, url->protocol); |
66f628d13442
Support stream redirection from http to mms, fix bug #927.
ulion
parents:
24257
diff
changeset
|
878 goto err_out; |
66f628d13442
Support stream redirection from http to mms, fix bug #927.
ulion
parents:
24257
diff
changeset
|
879 } |
25238
f42b8e689416
Preserve unsv:// protocol specifier over http redirects.
reimar
parents:
25211
diff
changeset
|
880 if (is_ultravox) { |
f42b8e689416
Preserve unsv:// protocol specifier over http redirects.
reimar
parents:
25211
diff
changeset
|
881 free(url->protocol); |
f42b8e689416
Preserve unsv:// protocol specifier over http redirects.
reimar
parents:
25211
diff
changeset
|
882 url->protocol = strdup("unsv"); |
f42b8e689416
Preserve unsv:// protocol specifier over http redirects.
reimar
parents:
25211
diff
changeset
|
883 } |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
884 redirect = 1; |
15585 | 885 } |
886 break; | |
887 case 401: // Authentication required | |
21566
79d969f9eec0
STREAM_UNSUPPORTED is -1, so use the former for return value in all places.
reimar
parents:
21565
diff
changeset
|
888 if( http_authenticate(http_hdr, url, &auth_retry)<0 ) |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
889 goto err_out; |
15585 | 890 redirect = 1; |
891 break; | |
892 default: | |
893 mp_msg(MSGT_NETWORK,MSGL_ERR,"Server returned %d: %s\n", http_hdr->status_code, http_hdr->reason_phrase ); | |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
894 goto err_out; |
15585 | 895 } |
896 } while( redirect ); | |
897 | |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
898 err_out: |
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
899 if (fd > 0) closesocket( fd ); |
21565
546cf4a6377a
Make sure stream->fd is set correct (esp. to -1 on error when fd is closed)
reimar
parents:
21542
diff
changeset
|
900 fd = -1; |
21542 | 901 http_free( http_hdr ); |
21776 | 902 http_hdr = NULL; |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
903 out: |
21776 | 904 stream->streaming_ctrl->data = (void*)http_hdr; |
21565
546cf4a6377a
Make sure stream->fd is set correct (esp. to -1 on error when fd is closed)
reimar
parents:
21542
diff
changeset
|
905 stream->fd = fd; |
21540
147c1c305f21
Fix lots and lots of potential memory/fd leaks in http_streaming_start
reimar
parents:
20784
diff
changeset
|
906 return res; |
15585 | 907 } |
908 | |
909 static int fixup_open(stream_t *stream,int seekable) { | |
16013 | 910 HTTP_header_t *http_hdr = stream->streaming_ctrl->data; |
16078
095e980cf7c0
Some ICY servers (e.g. http://broadcast.spnet.net:8000/darikhigh) do not set
reimar
parents:
16070
diff
changeset
|
911 int is_icy = http_hdr && http_get_field(http_hdr, "Icy-MetaInt"); |
16070 | 912 int is_ultravox = strcasecmp(stream->streaming_ctrl->url->protocol, "unsv") == 0; |
15585 | 913 |
914 stream->type = STREAMTYPE_STREAM; | |
16013 | 915 if(!is_icy && !is_ultravox && seekable) |
15585 | 916 { |
29920
4f740437ed2b
Finally rename the STREAM_SEEK define to MP_STREAM_SEEK, there are just too many
reimar
parents:
29263
diff
changeset
|
917 stream->flags |= MP_STREAM_SEEK; |
15585 | 918 stream->seek = http_seek; |
919 } | |
920 stream->streaming_ctrl->bandwidth = network_bandwidth; | |
16013 | 921 if ((!is_icy && !is_ultravox) || scast_streaming_start(stream)) |
15585 | 922 if(nop_streaming_start( stream )) { |
923 mp_msg(MSGT_NETWORK,MSGL_ERR,"nop_streaming_start failed\n"); | |
21567 | 924 if (stream->fd >= 0) |
925 closesocket(stream->fd); | |
926 stream->fd = -1; | |
15585 | 927 streaming_ctrl_free(stream->streaming_ctrl); |
928 stream->streaming_ctrl = NULL; | |
24257 | 929 return STREAM_UNSUPPORTED; |
15585 | 930 } |
931 | |
932 fixup_network_stream_cache(stream); | |
933 return STREAM_OK; | |
934 } | |
935 | |
936 static int open_s1(stream_t *stream,int mode, void* opts, int* file_format) { | |
937 int seekable=0; | |
938 URL_t *url; | |
939 | |
940 stream->streaming_ctrl = streaming_ctrl_new(); | |
941 if( stream->streaming_ctrl==NULL ) { | |
942 return STREAM_ERROR; | |
943 } | |
944 stream->streaming_ctrl->bandwidth = network_bandwidth; | |
945 url = url_new(stream->url); | |
946 stream->streaming_ctrl->url = check4proxies(url); | |
16417 | 947 url_free(url); |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
948 |
20185 | 949 mp_msg(MSGT_OPEN, MSGL_V, "STREAM_HTTP(1), URL: %s\n", stream->url); |
15585 | 950 seekable = http_streaming_start(stream, file_format); |
951 if((seekable < 0) || (*file_format == DEMUXER_TYPE_ASF)) { | |
21567 | 952 if (stream->fd >= 0) |
953 closesocket(stream->fd); | |
954 stream->fd = -1; | |
25135
66f628d13442
Support stream redirection from http to mms, fix bug #927.
ulion
parents:
24257
diff
changeset
|
955 if (seekable == STREAM_REDIRECTED) |
66f628d13442
Support stream redirection from http to mms, fix bug #927.
ulion
parents:
24257
diff
changeset
|
956 return seekable; |
15585 | 957 streaming_ctrl_free(stream->streaming_ctrl); |
958 stream->streaming_ctrl = NULL; | |
24257 | 959 return STREAM_UNSUPPORTED; |
15585 | 960 } |
961 | |
962 return fixup_open(stream, seekable); | |
963 } | |
964 | |
965 static int open_s2(stream_t *stream,int mode, void* opts, int* file_format) { | |
966 int seekable=0; | |
967 URL_t *url; | |
968 | |
969 stream->streaming_ctrl = streaming_ctrl_new(); | |
970 if( stream->streaming_ctrl==NULL ) { | |
971 return STREAM_ERROR; | |
972 } | |
973 stream->streaming_ctrl->bandwidth = network_bandwidth; | |
974 url = url_new(stream->url); | |
975 stream->streaming_ctrl->url = check4proxies(url); | |
16614 | 976 url_free(url); |
29263
0f1b5b68af32
whitespace cosmetics: Remove all trailing whitespace.
diego
parents:
28402
diff
changeset
|
977 |
20185 | 978 mp_msg(MSGT_OPEN, MSGL_V, "STREAM_HTTP(2), URL: %s\n", stream->url); |
15585 | 979 seekable = http_streaming_start(stream, file_format); |
980 if(seekable < 0) { | |
21567 | 981 if (stream->fd >= 0) |
982 closesocket(stream->fd); | |
983 stream->fd = -1; | |
15585 | 984 streaming_ctrl_free(stream->streaming_ctrl); |
985 stream->streaming_ctrl = NULL; | |
24257 | 986 return STREAM_UNSUPPORTED; |
15585 | 987 } |
988 | |
989 return fixup_open(stream, seekable); | |
990 } | |
991 | |
992 | |
25211 | 993 const stream_info_t stream_info_http1 = { |
15585 | 994 "http streaming", |
995 "null", | |
996 "Bertrand, Albeau, Reimar Doeffinger, Arpi?", | |
997 "plain http", | |
998 open_s1, | |
27847
28deb37052cd
Add a noicyx:// protocol to allow easier testing for misconfigured servers.
reimar
parents:
27834
diff
changeset
|
999 {"http", "http_proxy", "unsv", "icyx", "noicyx", NULL}, |
15585 | 1000 NULL, |
1001 0 // Urls are an option string | |
1002 }; | |
1003 | |
25211 | 1004 const stream_info_t stream_info_http2 = { |
15585 | 1005 "http streaming", |
1006 "null", | |
1007 "Bertrand, Albeu, Arpi? who?", | |
16932
c30e0970250c
fix typos: aslo->also, falback->fallback (they were just too annoying *g*)
reimar
parents:
16917
diff
changeset
|
1008 "plain http, also used as fallback for many other protocols", |
15585 | 1009 open_s2, |
1010 {"http", "http_proxy", "pnm", "mms", "mmsu", "mmst", "rtsp", NULL}, //all the others as fallback | |
1011 NULL, | |
1012 0 // Urls are an option string | |
1013 }; |