1 /*****************************************************************************
2 * http.c: HTTP input module
3 *****************************************************************************
4 * Copyright (C) 2001-2008 the VideoLAN team
7 * Authors: Laurent Aimar <fenrir@via.ecp.fr>
8 * Christophe Massiot <massiot@via.ecp.fr>
9 * RĂ©mi Denis-Courmont <rem # videolan.org>
10 * Antoine Cellerier <dionoea at videolan dot org>
12 * This program is free software; you can redistribute it and/or modify
13 * it under the terms of the GNU General Public License as published by
14 * the Free Software Foundation; either version 2 of the License, or
15 * (at your option) any later version.
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software
24 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
25 *****************************************************************************/
27 /*****************************************************************************
29 *****************************************************************************/
35 #include <vlc_plugin.h>
38 #include <vlc_access.h>
40 #include <vlc_interface.h>
42 #include <vlc_network.h>
45 #include <vlc_strings.h>
46 #include <vlc_input.h>
55 /*****************************************************************************
57 *****************************************************************************/
58 static int Open ( vlc_object_t
* );
59 static void Close( vlc_object_t
* );
61 #define PROXY_TEXT N_("HTTP proxy")
62 #define PROXY_LONGTEXT N_( \
63 "HTTP proxy to be used It must be of the form " \
64 "http://[user[:pass]@]myproxy.mydomain:myport/ ; " \
65 "if empty, the http_proxy environment variable will be tried." )
67 #define CACHING_TEXT N_("Caching value in ms")
68 #define CACHING_LONGTEXT N_( \
69 "Caching value for HTTP streams. This " \
70 "value should be set in milliseconds." )
72 #define AGENT_TEXT N_("HTTP user agent")
73 #define AGENT_LONGTEXT N_("User agent that will be " \
74 "used for the connection.")
76 #define RECONNECT_TEXT N_("Auto re-connect")
77 #define RECONNECT_LONGTEXT N_( \
78 "Automatically try to reconnect to the stream in case of a sudden " \
81 #define CONTINUOUS_TEXT N_("Continuous stream")
82 #define CONTINUOUS_LONGTEXT N_("Read a file that is " \
83 "being constantly updated (for example, a JPG file on a server). " \
84 "You should not globally enable this option as it will break all other " \
85 "types of HTTP streams." )
87 #define FORWARD_COOKIES_TEXT N_("Forward Cookies")
88 #define FORWARD_COOKIES_LONGTEXT N_("Forward Cookies Across http redirections ")
91 set_description( N_("HTTP input") );
92 set_capability( "access", 0 );
93 set_shortname( N_( "HTTP(S)" ) );
94 set_category( CAT_INPUT
);
95 set_subcategory( SUBCAT_INPUT_ACCESS
);
97 add_string( "http-proxy", NULL
, NULL
, PROXY_TEXT
, PROXY_LONGTEXT
,
99 add_integer( "http-caching", 4 * DEFAULT_PTS_DELAY
/ 1000, NULL
,
100 CACHING_TEXT
, CACHING_LONGTEXT
, true );
101 add_string( "http-user-agent", COPYRIGHT_MESSAGE
, NULL
, AGENT_TEXT
,
102 AGENT_LONGTEXT
, true );
103 add_bool( "http-reconnect", 0, NULL
, RECONNECT_TEXT
,
104 RECONNECT_LONGTEXT
, true );
105 add_bool( "http-continuous", 0, NULL
, CONTINUOUS_TEXT
,
106 CONTINUOUS_LONGTEXT
, true );
107 add_bool( "http-forward-cookies", 0, NULL
, FORWARD_COOKIES_TEXT
,
108 FORWARD_COOKIES_LONGTEXT
, true );
109 add_obsolete_string("http-user");
110 add_obsolete_string("http-pwd");
111 add_shortcut( "http" );
112 add_shortcut( "https" );
113 add_shortcut( "unsv" );
114 add_shortcut( "itpc" ); /* iTunes Podcast */
115 set_callbacks( Open
, Close
);
118 /*****************************************************************************
120 *****************************************************************************/
122 /* RFC 2617: Basic and Digest Access Authentication */
123 typedef struct http_auth_t
134 char *psz_HA1
; /* stored H(A1) value if algorithm = "MD5-sess" */
140 tls_session_t
*p_tls
;
145 char *psz_user_agent
;
151 http_auth_t proxy_auth
;
155 const char *psz_protocol
;
188 vlc_array_t
* cookies
;
192 static int OpenWithCookies( vlc_object_t
*p_this
, vlc_array_t
*cookies
);
195 static ssize_t
Read( access_t
*, uint8_t *, size_t );
196 static ssize_t
ReadCompressed( access_t
*, uint8_t *, size_t );
197 static int Seek( access_t
*, int64_t );
198 static int Control( access_t
*, int, va_list );
201 static int Connect( access_t
*, int64_t );
202 static int Request( access_t
*p_access
, int64_t i_tell
);
203 static void Disconnect( access_t
* );
205 /* Small Cookie utilities. Cookies support is partial. */
206 static char * cookie_get_content( const char * cookie
);
207 static char * cookie_get_domain( const char * cookie
);
208 static char * cookie_get_name( const char * cookie
);
209 static void cookie_append( vlc_array_t
* cookies
, char * cookie
);
212 static void AuthParseHeader( access_t
*p_access
, const char *psz_header
,
213 http_auth_t
*p_auth
);
214 static void AuthReply( access_t
*p_acces
, const char *psz_prefix
,
215 vlc_url_t
*p_url
, http_auth_t
*p_auth
);
216 static int AuthCheckReply( access_t
*p_access
, const char *psz_header
,
217 vlc_url_t
*p_url
, http_auth_t
*p_auth
);
218 static void AuthReset( http_auth_t
*p_auth
);
220 /*****************************************************************************
222 *****************************************************************************/
223 static int Open( vlc_object_t
*p_this
)
225 return OpenWithCookies( p_this
, NULL
);
228 static int OpenWithCookies( vlc_object_t
*p_this
, vlc_array_t
*cookies
)
230 access_t
*p_access
= (access_t
*)p_this
;
233 /* Only forward an store cookies if the corresponding option is activated */
234 bool b_forward_cookies
= var_CreateGetBool( p_access
, "http-forward-cookies" );
235 vlc_array_t
* saved_cookies
= b_forward_cookies
? (cookies
?: vlc_array_new()) : NULL
;
237 /* Set up p_access */
238 STANDARD_READ_ACCESS_INIT
;
240 p_access
->pf_read
= ReadCompressed
;
243 p_sys
->b_proxy
= false;
244 p_sys
->i_version
= 1;
245 p_sys
->b_seekable
= true;
246 p_sys
->psz_mime
= NULL
;
247 p_sys
->psz_pragma
= NULL
;
248 p_sys
->b_mms
= false;
249 p_sys
->b_icecast
= false;
250 p_sys
->psz_location
= NULL
;
251 p_sys
->psz_user_agent
= NULL
;
252 p_sys
->b_pace_control
= true;
253 p_sys
->b_ssl
= false;
255 p_sys
->b_compressed
= false;
256 /* 15 is the max windowBits, +32 to enable optional gzip decoding */
257 if( inflateInit2( &p_sys
->inflate
.stream
, 32+15 ) != Z_OK
)
258 msg_Warn( p_access
, "Error during zlib initialisation: %s",
259 p_sys
->inflate
.stream
.msg
);
260 if( zlibCompileFlags() & (1<<17) )
261 msg_Warn( p_access
, "Your zlib was compiled without gzip support." );
262 p_sys
->inflate
.p_buffer
= NULL
;
266 p_sys
->i_icy_meta
= 0;
267 p_sys
->psz_icy_name
= NULL
;
268 p_sys
->psz_icy_genre
= NULL
;
269 p_sys
->psz_icy_title
= NULL
;
270 p_sys
->i_remaining
= 0;
272 p_sys
->cookies
= saved_cookies
;
274 /* Parse URI - remove spaces */
275 p
= psz
= strdup( p_access
->psz_path
);
276 while( (p
= strchr( p
, ' ' )) != NULL
)
278 vlc_UrlParse( &p_sys
->url
, psz
, 0 );
281 if( p_sys
->url
.psz_host
== NULL
|| *p_sys
->url
.psz_host
== '\0' )
283 msg_Warn( p_access
, "invalid host" );
286 if( !strncmp( p_access
->psz_access
, "https", 5 ) )
290 if( p_sys
->url
.i_port
<= 0 )
291 p_sys
->url
.i_port
= 443;
295 if( p_sys
->url
.i_port
<= 0 )
296 p_sys
->url
.i_port
= 80;
300 p_sys
->psz_user_agent
= var_CreateGetString( p_access
, "http-user-agent" );
303 psz
= var_CreateGetString( p_access
, "http-proxy" );
306 p_sys
->b_proxy
= true;
307 vlc_UrlParse( &p_sys
->proxy
, psz
, 0 );
312 char *psz_proxy
= getenv( "http_proxy" );
313 if( psz_proxy
&& *psz_proxy
)
315 p_sys
->b_proxy
= true;
316 vlc_UrlParse( &p_sys
->proxy
, psz_proxy
, 0 );
324 if( p_sys
->proxy
.psz_host
== NULL
|| *p_sys
->proxy
.psz_host
== '\0' )
326 msg_Warn( p_access
, "invalid proxy host" );
329 if( p_sys
->proxy
.i_port
<= 0 )
331 p_sys
->proxy
.i_port
= 80;
335 msg_Dbg( p_access
, "http: server='%s' port=%d file='%s",
336 p_sys
->url
.psz_host
, p_sys
->url
.i_port
, p_sys
->url
.psz_path
);
339 msg_Dbg( p_access
, " proxy %s:%d", p_sys
->proxy
.psz_host
,
340 p_sys
->proxy
.i_port
);
342 if( p_sys
->url
.psz_username
&& *p_sys
->url
.psz_username
)
344 msg_Dbg( p_access
, " user='%s', pwd='%s'",
345 p_sys
->url
.psz_username
, p_sys
->url
.psz_password
);
348 p_sys
->b_reconnect
= var_CreateGetBool( p_access
, "http-reconnect" );
349 p_sys
->b_continuous
= var_CreateGetBool( p_access
, "http-continuous" );
353 switch( Connect( p_access
, 0 ) )
359 /* Retry with http 1.0 */
360 msg_Dbg( p_access
, "switching to HTTP version 1.0" );
361 p_sys
->i_version
= 0;
362 p_sys
->b_seekable
= false;
364 if( p_access
->b_die
|| Connect( p_access
, 0 ) )
372 msg_Err( p_access
, "You should not be here" );
377 if( p_sys
->i_code
== 401 )
379 char *psz_login
= NULL
; char *psz_password
= NULL
;
383 if( p_sys
->url
.psz_username
&& p_sys
->url
.psz_password
&&
384 p_sys
->auth
.psz_nonce
&& p_sys
->auth
.i_nonce
== 0 )
388 snprintf( psz_msg
, 250,
389 _("Please enter a valid login name and a password for realm %s."),
390 p_sys
->auth
.psz_realm
);
391 msg_Dbg( p_access
, "authentication failed for realm %s",
392 p_sys
->auth
.psz_realm
);
393 i_ret
= intf_UserLoginPassword( p_access
, _("HTTP authentication"),
394 psz_msg
, &psz_login
, &psz_password
);
395 if( i_ret
== DIALOG_OK_YES
)
397 msg_Dbg( p_access
, "retrying with user=%s, pwd=%s",
398 psz_login
, psz_password
);
399 if( psz_login
) p_sys
->url
.psz_username
= strdup( psz_login
);
400 if( psz_password
) p_sys
->url
.psz_password
= strdup( psz_password
);
402 free( psz_password
);
408 free( psz_password
);
413 if( ( p_sys
->i_code
== 301 || p_sys
->i_code
== 302 ||
414 p_sys
->i_code
== 303 || p_sys
->i_code
== 307 ) &&
415 p_sys
->psz_location
&& *p_sys
->psz_location
)
417 msg_Dbg( p_access
, "redirection to %s", p_sys
->psz_location
);
419 /* Do not accept redirection outside of HTTP works */
420 if( strncmp( p_sys
->psz_location
, "http", 4 )
421 || ( ( p_sys
->psz_location
[4] != ':' ) /* HTTP */
422 && strncmp( p_sys
->psz_location
+ 4, "s:", 2 ) /* HTTP/SSL */ ) )
424 msg_Err( p_access
, "insecure redirection ignored" );
427 free( p_access
->psz_path
);
428 p_access
->psz_path
= strdup( p_sys
->psz_location
);
429 /* Clean up current Open() run */
430 vlc_UrlClean( &p_sys
->url
);
431 AuthReset( &p_sys
->auth
);
432 vlc_UrlClean( &p_sys
->proxy
);
433 AuthReset( &p_sys
->proxy_auth
);
434 free( p_sys
->psz_mime
);
435 free( p_sys
->psz_pragma
);
436 free( p_sys
->psz_location
);
437 free( p_sys
->psz_user_agent
);
439 Disconnect( p_access
);
440 cookies
= p_sys
->cookies
;
443 /* Do new Open() run with new data */
444 return OpenWithCookies( p_this
, cookies
);
449 msg_Dbg( p_access
, "this is actually a live mms server, BAIL" );
453 if( !strcmp( p_sys
->psz_protocol
, "ICY" ) || p_sys
->b_icecast
)
455 if( p_sys
->psz_mime
&& strcasecmp( p_sys
->psz_mime
, "application/ogg" ) )
457 if( !strcasecmp( p_sys
->psz_mime
, "video/nsv" ) ||
458 !strcasecmp( p_sys
->psz_mime
, "video/nsa" ) )
460 free( p_access
->psz_demux
);
461 p_access
->psz_demux
= strdup( "nsv" );
463 else if( !strcasecmp( p_sys
->psz_mime
, "audio/aac" ) ||
464 !strcasecmp( p_sys
->psz_mime
, "audio/aacp" ) )
466 free( p_access
->psz_demux
);
467 p_access
->psz_demux
= strdup( "m4a" );
469 else if( !strcasecmp( p_sys
->psz_mime
, "audio/mpeg" ) )
471 free( p_access
->psz_demux
);
472 p_access
->psz_demux
= strdup( "mp3" );
475 msg_Info( p_access
, "Raw-audio server found, %s demuxer selected",
476 p_access
->psz_demux
);
478 #if 0 /* Doesn't work really well because of the pre-buffering in
479 * shoutcast servers (the buffer content will be sent as fast as
481 p_sys
->b_pace_control
= false;
484 else if( !p_sys
->psz_mime
)
486 free( p_access
->psz_demux
);
488 p_access
->psz_demux
= strdup( "mp3" );
490 /* else probably Ogg Vorbis */
492 else if( !strcasecmp( p_access
->psz_access
, "unsv" ) &&
494 !strcasecmp( p_sys
->psz_mime
, "misc/ultravox" ) )
496 free( p_access
->psz_demux
);
497 /* Grrrr! detect ultravox server and force NSV demuxer */
498 p_access
->psz_demux
= strdup( "nsv" );
500 else if( !strcmp( p_access
->psz_access
, "itpc" ) )
502 free( p_access
->psz_demux
);
503 p_access
->psz_demux
= strdup( "podcast" );
505 else if( p_sys
->psz_mime
&&
506 !strncasecmp( p_sys
->psz_mime
, "application/xspf+xml", 20 ) &&
507 ( memchr( " ;\t", p_sys
->psz_mime
[20], 4 ) != NULL
) )
509 free( p_access
->psz_demux
);
510 p_access
->psz_demux
= strdup( "xspf-open" );
513 if( p_sys
->b_reconnect
) msg_Dbg( p_access
, "auto re-connect enabled" );
516 var_Create( p_access
, "http-caching", VLC_VAR_INTEGER
|VLC_VAR_DOINHERIT
);
521 vlc_UrlClean( &p_sys
->url
);
522 vlc_UrlClean( &p_sys
->proxy
);
523 free( p_sys
->psz_mime
);
524 free( p_sys
->psz_pragma
);
525 free( p_sys
->psz_location
);
526 free( p_sys
->psz_user_agent
);
528 Disconnect( p_access
);
533 /*****************************************************************************
535 *****************************************************************************/
536 static void Close( vlc_object_t
*p_this
)
538 access_t
*p_access
= (access_t
*)p_this
;
539 access_sys_t
*p_sys
= p_access
->p_sys
;
541 vlc_UrlClean( &p_sys
->url
);
542 AuthReset( &p_sys
->auth
);
543 vlc_UrlClean( &p_sys
->proxy
);
544 AuthReset( &p_sys
->proxy_auth
);
546 free( p_sys
->psz_mime
);
547 free( p_sys
->psz_pragma
);
548 free( p_sys
->psz_location
);
550 free( p_sys
->psz_icy_name
);
551 free( p_sys
->psz_icy_genre
);
552 free( p_sys
->psz_icy_title
);
554 free( p_sys
->psz_user_agent
);
556 Disconnect( p_access
);
561 for( i
= 0; i
< vlc_array_count( p_sys
->cookies
); i
++ )
562 free(vlc_array_item_at_index( p_sys
->cookies
, i
));
563 vlc_array_destroy( p_sys
->cookies
);
567 inflateEnd( &p_sys
->inflate
.stream
);
568 free( p_sys
->inflate
.p_buffer
);
574 /*****************************************************************************
575 * Read: Read up to i_len bytes from the http connection and place in
576 * p_buffer. Return the actual number of bytes read
577 *****************************************************************************/
578 static int ReadICYMeta( access_t
*p_access
);
579 static ssize_t
Read( access_t
*p_access
, uint8_t *p_buffer
, size_t i_len
)
581 access_sys_t
*p_sys
= p_access
->p_sys
;
586 p_access
->info
.b_eof
= true;
590 if( p_access
->info
.i_size
> 0 &&
591 i_len
+ p_access
->info
.i_pos
> p_access
->info
.i_size
)
593 if( ( i_len
= p_access
->info
.i_size
- p_access
->info
.i_pos
) == 0 )
595 p_access
->info
.b_eof
= true;
600 if( p_sys
->b_chunked
)
602 if( p_sys
->i_chunk
< 0 )
604 p_access
->info
.b_eof
= true;
608 if( p_sys
->i_chunk
<= 0 )
610 char *psz
= net_Gets( VLC_OBJECT(p_access
), p_sys
->fd
, p_sys
->p_vs
);
611 /* read the chunk header */
614 /* fatal error - end of file */
615 msg_Dbg( p_access
, "failed reading chunk-header line" );
618 p_sys
->i_chunk
= strtoll( psz
, NULL
, 16 );
621 if( p_sys
->i_chunk
<= 0 ) /* eof */
624 p_access
->info
.b_eof
= true;
629 if( i_len
> p_sys
->i_chunk
)
631 i_len
= p_sys
->i_chunk
;
635 if( p_sys
->b_continuous
&& (ssize_t
)i_len
> p_sys
->i_remaining
)
637 /* Only ask for the remaining length */
638 int i_new_len
= p_sys
->i_remaining
;
641 Request( p_access
, 0 );
642 i_read
= Read( p_access
, p_buffer
, i_len
);
648 if( p_sys
->i_icy_meta
> 0 && p_access
->info
.i_pos
> 0 )
650 int64_t i_next
= p_sys
->i_icy_meta
-
651 p_access
->info
.i_pos
% p_sys
->i_icy_meta
;
653 if( i_next
== p_sys
->i_icy_meta
)
655 if( ReadICYMeta( p_access
) )
657 p_access
->info
.b_eof
= true;
665 i_read
= net_Read( p_access
, p_sys
->fd
, p_sys
->p_vs
, p_buffer
, i_len
, false );
669 p_access
->info
.i_pos
+= i_read
;
671 if( p_sys
->b_chunked
)
673 p_sys
->i_chunk
-= i_read
;
674 if( p_sys
->i_chunk
<= 0 )
676 /* read the empty line */
677 char *psz
= net_Gets( VLC_OBJECT(p_access
), p_sys
->fd
, p_sys
->p_vs
);
682 else if( i_read
== 0 )
685 * I very much doubt that this will work.
686 * If i_read == 0, the connection *IS* dead, so the only
687 * sensible thing to do is Disconnect() and then retry.
688 * Otherwise, I got recv() completely wrong. -- Courmisch
690 if( p_sys
->b_continuous
)
692 Request( p_access
, 0 );
693 p_sys
->b_continuous
= false;
694 i_read
= Read( p_access
, p_buffer
, i_len
);
695 p_sys
->b_continuous
= true;
697 Disconnect( p_access
);
698 if( p_sys
->b_reconnect
)
700 msg_Dbg( p_access
, "got disconnected, trying to reconnect" );
701 if( Connect( p_access
, p_access
->info
.i_pos
) )
703 msg_Dbg( p_access
, "reconnection failed" );
707 p_sys
->b_reconnect
= false;
708 i_read
= Read( p_access
, p_buffer
, i_len
);
709 p_sys
->b_reconnect
= true;
713 if( i_read
== 0 ) p_access
->info
.b_eof
= true;
716 if( p_sys
->b_continuous
)
718 p_sys
->i_remaining
-= i_read
;
724 static int ReadICYMeta( access_t
*p_access
)
726 access_sys_t
*p_sys
= p_access
->p_sys
;
732 /* Read meta data length */
733 i_read
= net_Read( p_access
, p_sys
->fd
, p_sys
->p_vs
, &buffer
, 1,
740 i_read
= buffer
<< 4;
741 /* msg_Dbg( p_access, "ICY meta size=%u", i_read); */
743 psz_meta
= malloc( i_read
+ 1 );
744 if( net_Read( p_access
, p_sys
->fd
, p_sys
->p_vs
,
745 (uint8_t *)psz_meta
, i_read
, true ) != i_read
)
748 psz_meta
[i_read
] = '\0'; /* Just in case */
750 /* msg_Dbg( p_access, "icy-meta=%s", psz_meta ); */
752 /* Now parse the meta */
753 /* Look for StreamTitle= */
754 p
= strcasestr( (char *)psz_meta
, "StreamTitle=" );
757 p
+= strlen( "StreamTitle=" );
758 if( *p
== '\'' || *p
== '"' )
760 char closing
[] = { p
[0], ';', '\0' };
761 char *psz
= strstr( &p
[1], closing
);
763 psz
= strchr( &p
[1], ';' );
765 if( psz
) *psz
= '\0';
769 char *psz
= strchr( &p
[1], ';' );
770 if( psz
) *psz
= '\0';
773 if( !p_sys
->psz_icy_title
||
774 strcmp( p_sys
->psz_icy_title
, &p
[1] ) )
776 free( p_sys
->psz_icy_title
);
777 p_sys
->psz_icy_title
= strdup( &p
[1] );
778 p_access
->info
.i_update
|= INPUT_UPDATE_META
;
780 msg_Dbg( p_access
, "New Title=%s", p_sys
->psz_icy_title
);
789 static ssize_t
ReadCompressed( access_t
*p_access
, uint8_t *p_buffer
,
792 access_sys_t
*p_sys
= p_access
->p_sys
;
794 if( p_sys
->b_compressed
)
798 if( !p_sys
->inflate
.p_buffer
)
799 p_sys
->inflate
.p_buffer
= malloc( 256 * 1024 );
801 if( p_sys
->inflate
.stream
.avail_in
== 0 )
803 ssize_t i_read
= Read( p_access
, p_sys
->inflate
.p_buffer
+ p_sys
->inflate
.stream
.avail_in
, 256 * 1024 );
804 if( i_read
<= 0 ) return i_read
;
805 p_sys
->inflate
.stream
.next_in
= p_sys
->inflate
.p_buffer
;
806 p_sys
->inflate
.stream
.avail_in
= i_read
;
809 p_sys
->inflate
.stream
.avail_out
= i_len
;
810 p_sys
->inflate
.stream
.next_out
= p_buffer
;
812 i_ret
= inflate( &p_sys
->inflate
.stream
, Z_SYNC_FLUSH
);
813 msg_Warn( p_access
, "inflate return value: %d, %s", i_ret
, p_sys
->inflate
.stream
.msg
);
815 return i_len
- p_sys
->inflate
.stream
.avail_out
;
819 return Read( p_access
, p_buffer
, i_len
);
824 /*****************************************************************************
825 * Seek: close and re-open a connection at the right place
826 *****************************************************************************/
827 static int Seek( access_t
*p_access
, int64_t i_pos
)
829 msg_Dbg( p_access
, "trying to seek to %"PRId64
, i_pos
);
831 Disconnect( p_access
);
833 if( Connect( p_access
, i_pos
) )
835 msg_Err( p_access
, "seek failed" );
836 p_access
->info
.b_eof
= true;
842 /*****************************************************************************
844 *****************************************************************************/
845 static int Control( access_t
*p_access
, int i_query
, va_list args
)
847 access_sys_t
*p_sys
= p_access
->p_sys
;
856 case ACCESS_CAN_SEEK
:
857 pb_bool
= (bool*)va_arg( args
, bool* );
858 *pb_bool
= p_sys
->b_seekable
;
860 case ACCESS_CAN_FASTSEEK
:
861 pb_bool
= (bool*)va_arg( args
, bool* );
864 case ACCESS_CAN_PAUSE
:
865 case ACCESS_CAN_CONTROL_PACE
:
866 pb_bool
= (bool*)va_arg( args
, bool* );
868 #if 0 /* Disable for now until we have a clock synchro algo
869 * which works with something else than MPEG over UDP */
870 *pb_bool
= p_sys
->b_pace_control
;
877 pi_int
= (int*)va_arg( args
, int * );
881 case ACCESS_GET_PTS_DELAY
:
882 pi_64
= (int64_t*)va_arg( args
, int64_t * );
883 *pi_64
= (int64_t)var_GetInteger( p_access
, "http-caching" ) * 1000;
887 case ACCESS_SET_PAUSE_STATE
:
890 case ACCESS_GET_META
:
891 p_meta
= (vlc_meta_t
*)va_arg( args
, vlc_meta_t
* );
893 if( p_sys
->psz_icy_name
)
894 vlc_meta_Set( p_meta
, vlc_meta_Title
, p_sys
->psz_icy_name
);
895 if( p_sys
->psz_icy_genre
)
896 vlc_meta_Set( p_meta
, vlc_meta_Genre
, p_sys
->psz_icy_genre
);
897 if( p_sys
->psz_icy_title
)
898 vlc_meta_Set( p_meta
, vlc_meta_NowPlaying
, p_sys
->psz_icy_title
);
901 case ACCESS_GET_CONTENT_TYPE
:
902 *va_arg( args
, char ** ) =
903 p_sys
->psz_mime
? strdup( p_sys
->psz_mime
) : NULL
;
906 case ACCESS_GET_TITLE_INFO
:
907 case ACCESS_SET_TITLE
:
908 case ACCESS_SET_SEEKPOINT
:
909 case ACCESS_SET_PRIVATE_ID_STATE
:
913 msg_Warn( p_access
, "unimplemented query in control" );
920 /*****************************************************************************
922 *****************************************************************************/
923 static int Connect( access_t
*p_access
, int64_t i_tell
)
925 access_sys_t
*p_sys
= p_access
->p_sys
;
926 vlc_url_t srv
= p_sys
->b_proxy
? p_sys
->proxy
: p_sys
->url
;
929 free( p_sys
->psz_location
);
930 free( p_sys
->psz_mime
);
931 free( p_sys
->psz_pragma
);
933 free( p_sys
->psz_icy_genre
);
934 free( p_sys
->psz_icy_name
);
935 free( p_sys
->psz_icy_title
);
938 p_sys
->psz_location
= NULL
;
939 p_sys
->psz_mime
= NULL
;
940 p_sys
->psz_pragma
= NULL
;
941 p_sys
->b_mms
= false;
942 p_sys
->b_chunked
= false;
944 p_sys
->i_icy_meta
= 0;
945 p_sys
->psz_icy_name
= NULL
;
946 p_sys
->psz_icy_genre
= NULL
;
947 p_sys
->psz_icy_title
= NULL
;
949 p_access
->info
.i_size
= 0;
950 p_access
->info
.i_pos
= i_tell
;
951 p_access
->info
.b_eof
= false;
954 /* Open connection */
955 p_sys
->fd
= net_ConnectTCP( p_access
, srv
.psz_host
, srv
.i_port
);
956 if( p_sys
->fd
== -1 )
958 msg_Err( p_access
, "cannot connect to %s:%d", srv
.psz_host
, srv
.i_port
);
962 /* Initialize TLS/SSL session */
963 if( p_sys
->b_ssl
== true )
965 /* CONNECT to establish TLS tunnel through HTTP proxy */
969 unsigned i_status
= 0;
971 if( p_sys
->i_version
== 0 )
973 /* CONNECT is not in HTTP/1.0 */
974 Disconnect( p_access
);
978 net_Printf( VLC_OBJECT(p_access
), p_sys
->fd
, NULL
,
979 "CONNECT %s:%d HTTP/1.%d\r\nHost: %s:%d\r\n\r\n",
980 p_sys
->url
.psz_host
, p_sys
->url
.i_port
,
982 p_sys
->url
.psz_host
, p_sys
->url
.i_port
);
984 psz
= net_Gets( VLC_OBJECT(p_access
), p_sys
->fd
, NULL
);
987 msg_Err( p_access
, "cannot establish HTTP/TLS tunnel" );
988 Disconnect( p_access
);
992 sscanf( psz
, "HTTP/%*u.%*u %3u", &i_status
);
995 if( ( i_status
/ 100 ) != 2 )
997 msg_Err( p_access
, "HTTP/TLS tunnel through proxy denied" );
998 Disconnect( p_access
);
1004 psz
= net_Gets( VLC_OBJECT(p_access
), p_sys
->fd
, NULL
);
1007 msg_Err( p_access
, "HTTP proxy connection failed" );
1008 Disconnect( p_access
);
1017 if( p_access
->b_die
|| p_access
->b_error
)
1019 Disconnect( p_access
);
1026 /* TLS/SSL handshake */
1027 p_sys
->p_tls
= tls_ClientCreate( VLC_OBJECT(p_access
), p_sys
->fd
,
1029 if( p_sys
->p_tls
== NULL
)
1031 msg_Err( p_access
, "cannot establish HTTP/TLS session" );
1032 Disconnect( p_access
);
1035 p_sys
->p_vs
= &p_sys
->p_tls
->sock
;
1038 return Request( p_access
, i_tell
) ? -2 : 0;
1042 static int Request( access_t
*p_access
, int64_t i_tell
)
1044 access_sys_t
*p_sys
= p_access
->p_sys
;
1046 v_socket_t
*pvs
= p_sys
->p_vs
;
1048 if( p_sys
->b_proxy
)
1050 if( p_sys
->url
.psz_path
)
1052 net_Printf( VLC_OBJECT(p_access
), p_sys
->fd
, NULL
,
1053 "GET http://%s:%d%s HTTP/1.%d\r\n",
1054 p_sys
->url
.psz_host
, p_sys
->url
.i_port
,
1055 p_sys
->url
.psz_path
, p_sys
->i_version
);
1059 net_Printf( VLC_OBJECT(p_access
), p_sys
->fd
, NULL
,
1060 "GET http://%s:%d/ HTTP/1.%d\r\n",
1061 p_sys
->url
.psz_host
, p_sys
->url
.i_port
,
1067 const char *psz_path
= p_sys
->url
.psz_path
;
1068 if( !psz_path
|| !*psz_path
)
1072 if( p_sys
->url
.i_port
!= (pvs
? 443 : 80) )
1074 net_Printf( VLC_OBJECT(p_access
), p_sys
->fd
, pvs
,
1075 "GET %s HTTP/1.%d\r\nHost: %s:%d\r\n",
1076 psz_path
, p_sys
->i_version
, p_sys
->url
.psz_host
,
1077 p_sys
->url
.i_port
);
1081 net_Printf( VLC_OBJECT(p_access
), p_sys
->fd
, pvs
,
1082 "GET %s HTTP/1.%d\r\nHost: %s\r\n",
1083 psz_path
, p_sys
->i_version
, p_sys
->url
.psz_host
);
1087 net_Printf( VLC_OBJECT(p_access
), p_sys
->fd
, pvs
, "User-Agent: %s\r\n",
1088 p_sys
->psz_user_agent
);
1090 if( p_sys
->i_version
== 1 )
1092 net_Printf( VLC_OBJECT(p_access
), p_sys
->fd
, pvs
,
1093 "Range: bytes=%"PRId64
"-\r\n", i_tell
);
1097 if( p_sys
->cookies
)
1100 for( i
= 0; i
< vlc_array_count( p_sys
->cookies
); i
++ )
1102 const char * cookie
= vlc_array_item_at_index( p_sys
->cookies
, i
);
1103 char * psz_cookie_content
= cookie_get_content( cookie
);
1104 char * psz_cookie_domain
= cookie_get_domain( cookie
);
1106 assert( psz_cookie_content
);
1108 /* FIXME: This is clearly not conforming to the rfc */
1109 bool is_in_right_domain
= (!psz_cookie_domain
|| strstr( p_sys
->url
.psz_host
, psz_cookie_domain
));
1111 if( is_in_right_domain
)
1113 msg_Dbg( p_access
, "Sending Cookie %s", psz_cookie_content
);
1114 if( net_Printf( VLC_OBJECT(p_access
), p_sys
->fd
, pvs
, "Cookie: %s\r\n", psz_cookie_content
) < 0 )
1115 msg_Err( p_access
, "failed to send Cookie" );
1117 free( psz_cookie_content
);
1118 free( psz_cookie_domain
);
1122 /* Authentication */
1123 if( p_sys
->url
.psz_username
|| p_sys
->url
.psz_password
)
1124 AuthReply( p_access
, "", &p_sys
->url
, &p_sys
->auth
);
1126 /* Proxy Authentication */
1127 if( p_sys
->proxy
.psz_username
|| p_sys
->proxy
.psz_password
)
1128 AuthReply( p_access
, "Proxy-", &p_sys
->proxy
, &p_sys
->proxy_auth
);
1130 /* ICY meta data request */
1131 net_Printf( VLC_OBJECT(p_access
), p_sys
->fd
, pvs
, "Icy-MetaData: 1\r\n" );
1134 if( p_sys
->b_continuous
)
1136 net_Printf( VLC_OBJECT( p_access
), p_sys
->fd
, pvs
,
1137 "Connection: Keep-Alive\r\n" );
1139 else if( p_sys
->i_version
== 1 )
1141 net_Printf( VLC_OBJECT( p_access
), p_sys
->fd
, pvs
,
1142 "Connection: Close\r\n");
1145 if( net_Printf( VLC_OBJECT(p_access
), p_sys
->fd
, pvs
, "\r\n" ) < 0 )
1147 msg_Err( p_access
, "failed to send request" );
1148 Disconnect( p_access
);
1149 return VLC_EGENERIC
;
1153 if( ( psz
= net_Gets( VLC_OBJECT(p_access
), p_sys
->fd
, pvs
) ) == NULL
)
1155 msg_Err( p_access
, "failed to read answer" );
1158 if( !strncmp( psz
, "HTTP/1.", 7 ) )
1160 p_sys
->psz_protocol
= "HTTP";
1161 p_sys
->i_code
= atoi( &psz
[9] );
1163 else if( !strncmp( psz
, "ICY", 3 ) )
1165 p_sys
->psz_protocol
= "ICY";
1166 p_sys
->i_code
= atoi( &psz
[4] );
1167 p_sys
->b_reconnect
= true;
1171 msg_Err( p_access
, "invalid HTTP reply '%s'", psz
);
1175 msg_Dbg( p_access
, "protocol '%s' answer code %d",
1176 p_sys
->psz_protocol
, p_sys
->i_code
);
1177 if( !strcmp( p_sys
->psz_protocol
, "ICY" ) )
1179 p_sys
->b_seekable
= false;
1181 if( p_sys
->i_code
!= 206 && p_sys
->i_code
!= 401 )
1183 p_sys
->b_seekable
= false;
1185 /* Authentication error - We'll have to display the dialog */
1186 if( p_sys
->i_code
== 401 )
1190 /* Other fatal error */
1191 else if( p_sys
->i_code
>= 400 )
1193 msg_Err( p_access
, "error: %s", psz
);
1201 char *psz
= net_Gets( VLC_OBJECT(p_access
), p_sys
->fd
, pvs
);
1206 msg_Err( p_access
, "failed to read answer" );
1210 if( p_access
->b_die
|| p_access
->b_error
)
1216 /* msg_Dbg( p_input, "Line=%s", psz ); */
1223 if( ( p
= strchr( psz
, ':' ) ) == NULL
)
1225 msg_Err( p_access
, "malformed header line: %s", psz
);
1230 while( *p
== ' ' ) p
++;
1232 if( !strcasecmp( psz
, "Content-Length" ) )
1234 if( p_sys
->b_continuous
)
1236 p_access
->info
.i_size
= -1;
1237 msg_Dbg( p_access
, "this frame size=%lld", atoll(p
) );
1238 p_sys
->i_remaining
= atoll( p
);
1242 p_access
->info
.i_size
= i_tell
+ atoll( p
);
1243 msg_Dbg( p_access
, "stream size=%"PRId64
, p_access
->info
.i_size
);
1246 else if( !strcasecmp( psz
, "Location" ) )
1250 /* This does not follow RFC 2068, but yet if the url is not absolute,
1251 * handle it as everyone does. */
1254 const char *psz_http_ext
= p_sys
->b_ssl
? "s" : "" ;
1256 if( p_sys
->url
.i_port
== ( p_sys
->b_ssl
? 443 : 80 ) )
1258 if( asprintf(&psz_new_loc
, "http%s://%s%s", psz_http_ext
,
1259 p_sys
->url
.psz_host
, p
) < 0 )
1264 if( asprintf(&psz_new_loc
, "http%s://%s:%d%s", psz_http_ext
,
1265 p_sys
->url
.psz_host
, p_sys
->url
.i_port
, p
) < 0 )
1271 psz_new_loc
= strdup( p
);
1274 free( p_sys
->psz_location
);
1275 p_sys
->psz_location
= psz_new_loc
;
1277 else if( !strcasecmp( psz
, "Content-Type" ) )
1279 free( p_sys
->psz_mime
);
1280 p_sys
->psz_mime
= strdup( p
);
1281 msg_Dbg( p_access
, "Content-Type: %s", p_sys
->psz_mime
);
1283 else if( !strcasecmp( psz
, "Content-Encoding" ) )
1285 msg_Dbg( p_access
, "Content-Encoding: %s", p
);
1286 if( strcasecmp( p
, "identity" ) )
1288 p_sys
->b_compressed
= true;
1290 msg_Warn( p_access
, "Compressed content not supported. Rebuild with zlib support." );
1293 else if( !strcasecmp( psz
, "Pragma" ) )
1295 if( !strcasecmp( psz
, "Pragma: features" ) )
1296 p_sys
->b_mms
= true;
1297 free( p_sys
->psz_pragma
);
1298 p_sys
->psz_pragma
= strdup( p
);
1299 msg_Dbg( p_access
, "Pragma: %s", p_sys
->psz_pragma
);
1301 else if( !strcasecmp( psz
, "Server" ) )
1303 msg_Dbg( p_access
, "Server: %s", p
);
1304 if( !strncasecmp( p
, "Icecast", 7 ) ||
1305 !strncasecmp( p
, "Nanocaster", 10 ) )
1307 /* Remember if this is Icecast
1308 * we need to force demux in this case without breaking
1311 /* Let live 365 streams (nanocaster) piggyback on the icecast
1312 * routine. They look very similar */
1314 p_sys
->b_reconnect
= true;
1315 p_sys
->b_pace_control
= false;
1316 p_sys
->b_icecast
= true;
1319 else if( !strcasecmp( psz
, "Transfer-Encoding" ) )
1321 msg_Dbg( p_access
, "Transfer-Encoding: %s", p
);
1322 if( !strncasecmp( p
, "chunked", 7 ) )
1324 p_sys
->b_chunked
= true;
1327 else if( !strcasecmp( psz
, "Icy-MetaInt" ) )
1329 msg_Dbg( p_access
, "Icy-MetaInt: %s", p
);
1330 p_sys
->i_icy_meta
= atoi( p
);
1331 if( p_sys
->i_icy_meta
< 0 )
1332 p_sys
->i_icy_meta
= 0;
1334 msg_Warn( p_access
, "ICY metaint=%d", p_sys
->i_icy_meta
);
1336 else if( !strcasecmp( psz
, "Icy-Name" ) )
1338 free( p_sys
->psz_icy_name
);
1339 p_sys
->psz_icy_name
= strdup( p
);
1340 msg_Dbg( p_access
, "Icy-Name: %s", p_sys
->psz_icy_name
);
1342 p_sys
->b_icecast
= true; /* be on the safeside. set it here as well. */
1343 p_sys
->b_reconnect
= true;
1344 p_sys
->b_pace_control
= false;
1346 else if( !strcasecmp( psz
, "Icy-Genre" ) )
1348 free( p_sys
->psz_icy_genre
);
1349 p_sys
->psz_icy_genre
= strdup( p
);
1350 msg_Dbg( p_access
, "Icy-Genre: %s", p_sys
->psz_icy_genre
);
1352 else if( !strncasecmp( psz
, "Icy-Notice", 10 ) )
1354 msg_Dbg( p_access
, "Icy-Notice: %s", p
);
1356 else if( !strncasecmp( psz
, "icy-", 4 ) ||
1357 !strncasecmp( psz
, "ice-", 4 ) ||
1358 !strncasecmp( psz
, "x-audiocast", 11 ) )
1360 msg_Dbg( p_access
, "Meta-Info: %s: %s", psz
, p
);
1362 else if( !strcasecmp( psz
, "Set-Cookie" ) )
1364 if( p_sys
->cookies
)
1366 msg_Dbg( p_access
, "Accepting Cookie: %s", p
);
1367 cookie_append( p_sys
->cookies
, strdup(p
) );
1370 msg_Dbg( p_access
, "We have a Cookie we won't remember: %s", p
);
1372 else if( !strcasecmp( psz
, "www-authenticate" ) )
1374 msg_Dbg( p_access
, "Authentication header: %s", p
);
1375 AuthParseHeader( p_access
, p
, &p_sys
->auth
);
1377 else if( !strcasecmp( psz
, "proxy-authenticate" ) )
1379 msg_Dbg( p_access
, "Proxy authentication header: %s", p
);
1380 AuthParseHeader( p_access
, p
, &p_sys
->proxy_auth
);
1382 else if( !strcasecmp( psz
, "authentication-info" ) )
1384 msg_Dbg( p_access
, "Authentication Info header: %s", p
);
1385 if( AuthCheckReply( p_access
, p
, &p_sys
->url
, &p_sys
->auth
) )
1388 else if( !strcasecmp( psz
, "proxy-authentication-info" ) )
1390 msg_Dbg( p_access
, "Proxy Authentication Info header: %s", p
);
1391 if( AuthCheckReply( p_access
, p
, &p_sys
->proxy
, &p_sys
->proxy_auth
) )
1400 Disconnect( p_access
);
1401 return VLC_EGENERIC
;
1404 /*****************************************************************************
1406 *****************************************************************************/
1407 static void Disconnect( access_t
*p_access
)
1409 access_sys_t
*p_sys
= p_access
->p_sys
;
1411 if( p_sys
->p_tls
!= NULL
)
1413 tls_ClientDelete( p_sys
->p_tls
);
1414 p_sys
->p_tls
= NULL
;
1417 if( p_sys
->fd
!= -1)
1419 net_Close(p_sys
->fd
);
1425 /*****************************************************************************
1426 * Cookies (FIXME: we may want to rewrite that using a nice structure to hold
1427 * them) (FIXME: only support the "domain=" param)
1428 *****************************************************************************/
1430 /* Get the NAME=VALUE part of the Cookie */
1431 static char * cookie_get_content( const char * cookie
)
1433 char * ret
= strdup( cookie
);
1434 if( !ret
) return NULL
;
1436 /* Look for a ';' */
1437 while( *str
&& *str
!= ';' ) str
++;
1438 /* Replace it by a end-char */
1439 if( *str
== ';' ) *str
= 0;
1443 /* Get the domain where the cookie is stored */
1444 static char * cookie_get_domain( const char * cookie
)
1446 const char * str
= cookie
;
1447 static const char domain
[] = "domain=";
1450 /* Look for a ';' */
1453 if( !strncmp( str
, domain
, sizeof(domain
) - 1 /* minus \0 */ ) )
1455 str
+= sizeof(domain
) - 1 /* minus \0 */;
1456 char * ret
= strdup( str
);
1457 /* Now remove the next ';' if present */
1458 char * ret_iter
= ret
;
1459 while( *ret_iter
&& *ret_iter
!= ';' ) ret_iter
++;
1460 if( *ret_iter
== ';' )
1464 /* Go to next ';' field */
1465 while( *str
&& *str
!= ';' ) str
++;
1466 if( *str
== ';' ) str
++;
1468 while( *str
&& *str
== ' ' ) str
++;
1473 /* Get NAME in the NAME=VALUE field */
1474 static char * cookie_get_name( const char * cookie
)
1476 char * ret
= cookie_get_content( cookie
); /* NAME=VALUE */
1477 if( !ret
) return NULL
;
1479 while( *str
&& *str
!= '=' ) str
++;
1484 /* Add a cookie in cookies, checking to see how it should be added */
1485 static void cookie_append( vlc_array_t
* cookies
, char * cookie
)
1492 char * cookie_name
= cookie_get_name( cookie
);
1494 /* Don't send invalid cookies */
1498 char * cookie_domain
= cookie_get_domain( cookie
);
1499 for( i
= 0; i
< vlc_array_count( cookies
); i
++ )
1501 char * current_cookie
= vlc_array_item_at_index( cookies
, i
);
1502 char * current_cookie_name
= cookie_get_name( current_cookie
);
1503 char * current_cookie_domain
= cookie_get_domain( current_cookie
);
1505 assert( current_cookie_name
);
1507 bool is_domain_matching
= ( cookie_domain
&& current_cookie_domain
&&
1508 !strcmp( cookie_domain
, current_cookie_domain
) );
1510 if( is_domain_matching
&& !strcmp( cookie_name
, current_cookie_name
) )
1512 /* Remove previous value for this cookie */
1513 free( current_cookie
);
1514 vlc_array_remove( cookies
, i
);
1517 free( current_cookie_name
);
1518 free( current_cookie_domain
);
1521 free( current_cookie_name
);
1522 free( current_cookie_domain
);
1524 free( cookie_name
);
1525 free( cookie_domain
);
1526 vlc_array_append( cookies
, cookie
);
1529 /*****************************************************************************
1530 * "RFC 2617: Basic and Digest Access Authentication" header parsing
1531 *****************************************************************************/
1532 static char *AuthGetParam( const char *psz_header
, const char *psz_param
)
1534 char psz_what
[strlen(psz_param
)+3];
1535 sprintf( psz_what
, "%s=\"", psz_param
);
1536 psz_header
= strstr( psz_header
, psz_what
);
1539 const char *psz_end
;
1540 psz_header
+= strlen( psz_what
);
1541 psz_end
= strchr( psz_header
, '"' );
1542 if( !psz_end
) /* Invalid since we should have a closing quote */
1543 return strdup( psz_header
);
1544 return strndup( psz_header
, psz_end
- psz_header
);
1552 static char *AuthGetParamNoQuotes( const char *psz_header
, const char *psz_param
)
1554 char psz_what
[strlen(psz_param
)+2];
1555 sprintf( psz_what
, "%s=", psz_param
);
1556 psz_header
= strstr( psz_header
, psz_what
);
1559 const char *psz_end
;
1560 psz_header
+= strlen( psz_what
);
1561 psz_end
= strchr( psz_header
, ',' );
1562 /* XXX: Do we need to filter out trailing space between the value and
1563 * the comma/end of line? */
1564 if( !psz_end
) /* Can be valid if this is the last parameter */
1565 return strdup( psz_header
);
1566 return strndup( psz_header
, psz_end
- psz_header
);
1574 static void AuthParseHeader( access_t
*p_access
, const char *psz_header
,
1575 http_auth_t
*p_auth
)
1577 /* FIXME: multiple auth methods can be listed (comma seperated) */
1579 /* 2 Basic Authentication Scheme */
1580 if( !strncasecmp( psz_header
, "Basic ", strlen( "Basic " ) ) )
1582 msg_Dbg( p_access
, "Using Basic Authentication" );
1583 psz_header
+= strlen( "Basic " );
1584 p_auth
->psz_realm
= AuthGetParam( psz_header
, "realm" );
1585 if( !p_auth
->psz_realm
)
1586 msg_Warn( p_access
, "Basic Authentication: "
1587 "Mandatory 'realm' parameter is missing" );
1589 /* 3 Digest Access Authentication Scheme */
1590 else if( !strncasecmp( psz_header
, "Digest ", strlen( "Digest " ) ) )
1592 msg_Dbg( p_access
, "Using Digest Access Authentication" );
1593 if( p_auth
->psz_nonce
) return; /* FIXME */
1594 psz_header
+= strlen( "Digest " );
1595 p_auth
->psz_realm
= AuthGetParam( psz_header
, "realm" );
1596 p_auth
->psz_domain
= AuthGetParam( psz_header
, "domain" );
1597 p_auth
->psz_nonce
= AuthGetParam( psz_header
, "nonce" );
1598 p_auth
->psz_opaque
= AuthGetParam( psz_header
, "opaque" );
1599 p_auth
->psz_stale
= AuthGetParamNoQuotes( psz_header
, "stale" );
1600 p_auth
->psz_algorithm
= AuthGetParamNoQuotes( psz_header
, "algorithm" );
1601 p_auth
->psz_qop
= AuthGetParam( psz_header
, "qop" );
1602 p_auth
->i_nonce
= 0;
1603 /* printf("realm: |%s|\ndomain: |%s|\nnonce: |%s|\nopaque: |%s|\n"
1604 "stale: |%s|\nalgorithm: |%s|\nqop: |%s|\n",
1605 p_auth->psz_realm,p_auth->psz_domain,p_auth->psz_nonce,
1606 p_auth->psz_opaque,p_auth->psz_stale,p_auth->psz_algorithm,
1607 p_auth->psz_qop); */
1608 if( !p_auth
->psz_realm
)
1609 msg_Warn( p_access
, "Digest Access Authentication: "
1610 "Mandatory 'realm' parameter is missing" );
1611 if( !p_auth
->psz_nonce
)
1612 msg_Warn( p_access
, "Digest Access Authentication: "
1613 "Mandatory 'nonce' parameter is missing" );
1614 if( p_auth
->psz_qop
) /* FIXME: parse the qop list */
1616 char *psz_tmp
= strchr( p_auth
->psz_qop
, ',' );
1617 if( psz_tmp
) *psz_tmp
= '\0';
1622 const char *psz_end
= strchr( psz_header
, ' ' );
1624 msg_Warn( p_access
, "Unknown authentication scheme: '%*s'",
1625 psz_end
- psz_header
, psz_header
);
1627 msg_Warn( p_access
, "Unknown authentication scheme: '%s'",
1632 static char *AuthDigest( access_t
*p_access
, vlc_url_t
*p_url
,
1633 http_auth_t
*p_auth
, const char *psz_method
)
1636 const char *psz_username
= p_url
->psz_username
?: "";
1637 const char *psz_password
= p_url
->psz_password
?: "";
1639 char *psz_HA1
= NULL
;
1640 char *psz_HA2
= NULL
;
1641 char *psz_response
= NULL
;
1645 if( p_auth
->psz_HA1
)
1647 psz_HA1
= strdup( p_auth
->psz_HA1
);
1648 if( !psz_HA1
) goto error
;
1653 AddMD5( &md5
, psz_username
, strlen( psz_username
) );
1654 AddMD5( &md5
, ":", 1 );
1655 AddMD5( &md5
, p_auth
->psz_realm
, strlen( p_auth
->psz_realm
) );
1656 AddMD5( &md5
, ":", 1 );
1657 AddMD5( &md5
, psz_password
, strlen( psz_password
) );
1660 psz_HA1
= psz_md5_hash( &md5
);
1661 if( !psz_HA1
) goto error
;
1663 if( p_auth
->psz_algorithm
1664 && !strcmp( p_auth
->psz_algorithm
, "MD5-sess" ) )
1667 AddMD5( &md5
, psz_HA1
, 32 );
1669 AddMD5( &md5
, ":", 1 );
1670 AddMD5( &md5
, p_auth
->psz_nonce
, strlen( p_auth
->psz_nonce
) );
1671 AddMD5( &md5
, ":", 1 );
1672 AddMD5( &md5
, p_auth
->psz_cnonce
, strlen( p_auth
->psz_cnonce
) );
1675 psz_HA1
= psz_md5_hash( &md5
);
1676 if( !psz_HA1
) goto error
;
1677 p_auth
->psz_HA1
= strdup( psz_HA1
);
1678 if( !p_auth
->psz_HA1
) goto error
;
1685 AddMD5( &md5
, psz_method
, strlen( psz_method
) );
1686 AddMD5( &md5
, ":", 1 );
1687 if( p_url
->psz_path
)
1688 AddMD5( &md5
, p_url
->psz_path
, strlen( p_url
->psz_path
) );
1690 AddMD5( &md5
, "/", 1 );
1691 if( p_auth
->psz_qop
&& !strcmp( p_auth
->psz_qop
, "auth-int" ) )
1696 AddMD5( &ent
, "", 0 ); /* XXX: entity-body. should be ok for GET */
1698 psz_ent
= psz_md5_hash( &ent
);
1699 if( !psz_ent
) goto error
;
1700 AddMD5( &md5
, ":", 1 );
1701 AddMD5( &md5
, psz_ent
, 32 );
1705 psz_HA2
= psz_md5_hash( &md5
);
1706 if( !psz_HA2
) goto error
;
1708 /* Request digest */
1710 AddMD5( &md5
, psz_HA1
, 32 );
1711 AddMD5( &md5
, ":", 1 );
1712 AddMD5( &md5
, p_auth
->psz_nonce
, strlen( p_auth
->psz_nonce
) );
1713 AddMD5( &md5
, ":", 1 );
1715 && ( !strcmp( p_auth
->psz_qop
, "auth" )
1716 || !strcmp( p_auth
->psz_qop
, "auth-int" ) ) )
1719 snprintf( psz_inonce
, 9, "%08x", p_auth
->i_nonce
);
1720 AddMD5( &md5
, psz_inonce
, 8 );
1721 AddMD5( &md5
, ":", 1 );
1722 AddMD5( &md5
, p_auth
->psz_cnonce
, strlen( p_auth
->psz_cnonce
) );
1723 AddMD5( &md5
, ":", 1 );
1724 AddMD5( &md5
, p_auth
->psz_qop
, strlen( p_auth
->psz_qop
) );
1725 AddMD5( &md5
, ":", 1 );
1727 AddMD5( &md5
, psz_HA2
, 32 );
1729 psz_response
= psz_md5_hash( &md5
);
1734 return psz_response
;
1738 static void AuthReply( access_t
*p_access
, const char *psz_prefix
,
1739 vlc_url_t
*p_url
, http_auth_t
*p_auth
)
1741 access_sys_t
*p_sys
= p_access
->p_sys
;
1742 v_socket_t
*pvs
= p_sys
->p_vs
;
1744 const char *psz_username
= p_url
->psz_username
?: "";
1745 const char *psz_password
= p_url
->psz_password
?: "";
1747 if( p_auth
->psz_nonce
)
1749 /* Digest Access Authentication */
1752 if( p_auth
->psz_algorithm
1753 && strcmp( p_auth
->psz_algorithm
, "MD5" )
1754 && strcmp( p_auth
->psz_algorithm
, "MD5-sess" ) )
1756 msg_Err( p_access
, "Digest Access Authentication: "
1757 "Unknown algorithm '%s'", p_auth
->psz_algorithm
);
1761 if( p_auth
->psz_qop
|| !p_auth
->psz_cnonce
)
1763 /* FIXME: needs to be really random to prevent man in the middle
1765 free( p_auth
->psz_cnonce
);
1766 p_auth
->psz_cnonce
= strdup( "Some random string FIXME" );
1770 psz_response
= AuthDigest( p_access
, p_url
, p_auth
, "GET" );
1771 if( !psz_response
) return;
1773 net_Printf( VLC_OBJECT(p_access
), p_sys
->fd
, pvs
,
1774 "%sAuthorization: Digest "
1775 /* Mandatory parameters */
1781 /* Optional parameters */
1782 "%s%s%s" /* algorithm */
1783 "%s%s%s" /* cnonce */
1784 "%s%s%s" /* opaque */
1785 "%s%s%s" /* message qop */
1786 "%s%08x%s" /* nonce count */
1788 /* Mandatory parameters */
1793 p_url
->psz_path
?: "/",
1795 /* Optional parameters */
1796 p_auth
->psz_algorithm
? "algorithm=\"" : "",
1797 p_auth
->psz_algorithm
?: "",
1798 p_auth
->psz_algorithm
? "\", " : "",
1799 p_auth
->psz_cnonce
? "cnonce=\"" : "",
1800 p_auth
->psz_cnonce
?: "",
1801 p_auth
->psz_cnonce
? "\", " : "",
1802 p_auth
->psz_opaque
? "opaque=\"" : "",
1803 p_auth
->psz_opaque
?: "",
1804 p_auth
->psz_opaque
? "\", " : "",
1805 p_auth
->psz_qop
? "qop=\"" : "",
1806 p_auth
->psz_qop
?: "",
1807 p_auth
->psz_qop
? "\", " : "",
1808 p_auth
->i_nonce
? "nc=\"" : "uglyhack=\"", /* Will be parsed as an unhandled extension */
1810 p_auth
->i_nonce
? "\"" : "\""
1813 free( psz_response
);
1817 /* Basic Access Authentication */
1818 char buf
[strlen( psz_username
) + strlen( psz_password
) + 2];
1821 snprintf( buf
, sizeof( buf
), "%s:%s", psz_username
, psz_password
);
1822 b64
= vlc_b64_encode( buf
);
1826 net_Printf( VLC_OBJECT(p_access
), p_sys
->fd
, pvs
,
1827 "%sAuthorization: Basic %s\r\n", psz_prefix
, b64
);
1833 static int AuthCheckReply( access_t
*p_access
, const char *psz_header
,
1834 vlc_url_t
*p_url
, http_auth_t
*p_auth
)
1836 int i_ret
= VLC_EGENERIC
;
1837 char *psz_nextnonce
= AuthGetParam( psz_header
, "nextnonce" );
1838 char *psz_qop
= AuthGetParamNoQuotes( psz_header
, "qop" );
1839 char *psz_rspauth
= AuthGetParam( psz_header
, "rspauth" );
1840 char *psz_cnonce
= AuthGetParam( psz_header
, "cnonce" );
1841 char *psz_nc
= AuthGetParamNoQuotes( psz_header
, "nc" );
1847 if( strcmp( psz_cnonce
, p_auth
->psz_cnonce
) )
1849 msg_Err( p_access
, "HTTP Digest Access Authentication: server replied with a different client nonce value." );
1856 i_nonce
= strtol( psz_nc
, NULL
, 16 );
1857 if( i_nonce
!= p_auth
->i_nonce
)
1859 msg_Err( p_access
, "HTTP Digest Access Authentication: server replied with a different nonce count value." );
1864 if( psz_qop
&& p_auth
->psz_qop
&& strcmp( psz_qop
, p_auth
->psz_qop
) )
1865 msg_Warn( p_access
, "HTTP Digest Access Authentication: server replied using a different 'quality of protection' option" );
1867 /* All the clear text values match, let's now check the response
1869 psz_digest
= AuthDigest( p_access
, p_url
, p_auth
, "" );
1870 if( strcmp( psz_digest
, psz_rspauth
) )
1872 msg_Err( p_access
, "HTTP Digest Access Authentication: server replied with an invalid response digest (expected value: %s).", psz_digest
);
1881 free( p_auth
->psz_nonce
);
1882 p_auth
->psz_nonce
= psz_nextnonce
;
1883 psz_nextnonce
= NULL
;
1886 i_ret
= VLC_SUCCESS
;
1888 free( psz_nextnonce
);
1890 free( psz_rspauth
);
1897 static void AuthReset( http_auth_t
*p_auth
)
1899 FREENULL( p_auth
->psz_realm
);
1900 FREENULL( p_auth
->psz_domain
);
1901 FREENULL( p_auth
->psz_nonce
);
1902 FREENULL( p_auth
->psz_opaque
);
1903 FREENULL( p_auth
->psz_stale
);
1904 FREENULL( p_auth
->psz_algorithm
);
1905 FREENULL( p_auth
->psz_qop
);
1906 p_auth
->i_nonce
= 0;
1907 FREENULL( p_auth
->psz_cnonce
);
1908 FREENULL( p_auth
->psz_HA1
);