FFmpeg coverage


Directory: ../../../ffmpeg/
File: src/libavformat/network.c
Date: 2024-09-07 18:49:03
Exec Total Coverage
Lines: 46 290 15.9%
Functions: 6 21 28.6%
Branches: 24 178 13.5%

Line Branch Exec Source
1 /*
2 * Copyright (c) 2007 The FFmpeg Project
3 *
4 * This file is part of FFmpeg.
5 *
6 * FFmpeg is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
10 *
11 * FFmpeg is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with FFmpeg; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
19 */
20
21 #include "config.h"
22 #include "config_components.h"
23
24 #if CONFIG_TLS_PROTOCOL && CONFIG_OPENSSL
25 #include <openssl/opensslv.h>
26 #endif
27
28 #include <fcntl.h>
29 #include "network.h"
30 #include "tls.h"
31 #include "url.h"
32 #include "libavutil/avassert.h"
33 #include "libavutil/mem.h"
34 #include "libavutil/time.h"
35
36 6942 int ff_tls_init(void)
37 {
38 #if CONFIG_TLS_PROTOCOL
39 #if CONFIG_OPENSSL && OPENSSL_VERSION_NUMBER < 0x10100000L
40 int ret;
41 if ((ret = ff_openssl_init()) < 0)
42 return ret;
43 #endif
44 #if CONFIG_GNUTLS
45 ff_gnutls_init();
46 #endif
47 #endif
48 6942 return 0;
49 }
50
51 6942 void ff_tls_deinit(void)
52 {
53 #if CONFIG_TLS_PROTOCOL
54 #if CONFIG_OPENSSL && OPENSSL_VERSION_NUMBER < 0x10100000L
55 ff_openssl_deinit();
56 #endif
57 #if CONFIG_GNUTLS
58 ff_gnutls_deinit();
59 #endif
60 #endif
61 6942 }
62
63 6942 int ff_network_init(void)
64 {
65 #if HAVE_WINSOCK2_H
66 WSADATA wsaData;
67
68 if (WSAStartup(MAKEWORD(1,1), &wsaData))
69 return 0;
70 #endif
71 6942 return 1;
72 }
73
74 int ff_network_wait_fd(int fd, int write)
75 {
76 int ev = write ? POLLOUT : POLLIN;
77 struct pollfd p = { .fd = fd, .events = ev, .revents = 0 };
78 int ret;
79 ret = poll(&p, 1, POLLING_TIME);
80 return ret < 0 ? ff_neterrno() : p.revents & (ev | POLLERR | POLLHUP) ? 0 : AVERROR(EAGAIN);
81 }
82
83 int ff_network_wait_fd_timeout(int fd, int write, int64_t timeout, AVIOInterruptCB *int_cb)
84 {
85 int ret;
86 int64_t wait_start = 0;
87
88 while (1) {
89 if (ff_check_interrupt(int_cb))
90 return AVERROR_EXIT;
91 ret = ff_network_wait_fd(fd, write);
92 if (ret != AVERROR(EAGAIN))
93 return ret;
94 if (timeout > 0) {
95 if (!wait_start)
96 wait_start = av_gettime_relative();
97 else if (av_gettime_relative() - wait_start > timeout)
98 return AVERROR(ETIMEDOUT);
99 }
100 }
101 }
102
103 int ff_network_sleep_interruptible(int64_t timeout, AVIOInterruptCB *int_cb)
104 {
105 int64_t wait_start = av_gettime_relative();
106
107 while (1) {
108 int64_t time_left;
109
110 if (ff_check_interrupt(int_cb))
111 return AVERROR_EXIT;
112
113 time_left = timeout - (av_gettime_relative() - wait_start);
114 if (time_left <= 0)
115 return AVERROR(ETIMEDOUT);
116
117 av_usleep(FFMIN(time_left, POLLING_TIME * 1000));
118 }
119 }
120
121 6942 void ff_network_close(void)
122 {
123 #if HAVE_WINSOCK2_H
124 WSACleanup();
125 #endif
126 6942 }
127
128 #if HAVE_WINSOCK2_H
129 int ff_neterrno(void)
130 {
131 int err = WSAGetLastError();
132 switch (err) {
133 case WSAEWOULDBLOCK:
134 return AVERROR(EAGAIN);
135 case WSAEINTR:
136 return AVERROR(EINTR);
137 case WSAEPROTONOSUPPORT:
138 return AVERROR(EPROTONOSUPPORT);
139 case WSAETIMEDOUT:
140 return AVERROR(ETIMEDOUT);
141 case WSAECONNREFUSED:
142 return AVERROR(ECONNREFUSED);
143 case WSAEINPROGRESS:
144 return AVERROR(EINPROGRESS);
145 }
146 return -err;
147 }
148 #endif
149
150 int ff_is_multicast_address(struct sockaddr *addr)
151 {
152 if (addr->sa_family == AF_INET) {
153 return IN_MULTICAST(ntohl(((struct sockaddr_in *)addr)->sin_addr.s_addr));
154 }
155 #if HAVE_STRUCT_SOCKADDR_IN6
156 if (addr->sa_family == AF_INET6) {
157 return IN6_IS_ADDR_MULTICAST(&((struct sockaddr_in6 *)addr)->sin6_addr);
158 }
159 #endif
160
161 return 0;
162 }
163
164 static int ff_poll_interrupt(struct pollfd *p, nfds_t nfds, int timeout,
165 AVIOInterruptCB *cb)
166 {
167 int runs = timeout / POLLING_TIME;
168 int ret = 0;
169
170 do {
171 if (ff_check_interrupt(cb))
172 return AVERROR_EXIT;
173 ret = poll(p, nfds, POLLING_TIME);
174 if (ret != 0) {
175 if (ret < 0)
176 ret = ff_neterrno();
177 if (ret == AVERROR(EINTR))
178 continue;
179 break;
180 }
181 } while (timeout <= 0 || runs-- > 0);
182
183 if (!ret)
184 return AVERROR(ETIMEDOUT);
185 return ret;
186 }
187
188 int ff_socket(int af, int type, int proto, void *logctx)
189 {
190 int fd;
191
192 #ifdef SOCK_CLOEXEC
193 fd = socket(af, type | SOCK_CLOEXEC, proto);
194 if (fd == -1 && errno == EINVAL)
195 #endif
196 {
197 fd = socket(af, type, proto);
198 #if HAVE_FCNTL
199 if (fd != -1) {
200 if (fcntl(fd, F_SETFD, FD_CLOEXEC) == -1)
201 av_log(logctx, AV_LOG_DEBUG, "Failed to set close on exec\n");
202 }
203 #endif
204 }
205 #ifdef SO_NOSIGPIPE
206 if (fd != -1) {
207 if (setsockopt(fd, SOL_SOCKET, SO_NOSIGPIPE, &(int){1}, sizeof(int))) {
208 av_log(logctx, AV_LOG_WARNING, "setsockopt(SO_NOSIGPIPE) failed\n");
209 }
210 }
211 #endif
212 return fd;
213 }
214
215 int ff_listen(int fd, const struct sockaddr *addr,
216 socklen_t addrlen, void *logctx)
217 {
218 int ret;
219 int reuse = 1;
220 if (setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &reuse, sizeof(reuse))) {
221 av_log(logctx, AV_LOG_WARNING, "setsockopt(SO_REUSEADDR) failed\n");
222 }
223 ret = bind(fd, addr, addrlen);
224 if (ret)
225 return ff_neterrno();
226
227 ret = listen(fd, 1);
228 if (ret)
229 return ff_neterrno();
230 return ret;
231 }
232
233 int ff_accept(int fd, int timeout, URLContext *h)
234 {
235 int ret;
236 struct pollfd lp = { fd, POLLIN, 0 };
237
238 ret = ff_poll_interrupt(&lp, 1, timeout, &h->interrupt_callback);
239 if (ret < 0)
240 return ret;
241
242 ret = accept(fd, NULL, NULL);
243 if (ret < 0)
244 return ff_neterrno();
245 if (ff_socket_nonblock(ret, 1) < 0)
246 av_log(h, AV_LOG_DEBUG, "ff_socket_nonblock failed\n");
247
248 return ret;
249 }
250
251 int ff_listen_bind(int fd, const struct sockaddr *addr,
252 socklen_t addrlen, int timeout, URLContext *h)
253 {
254 int ret;
255 if ((ret = ff_listen(fd, addr, addrlen, h)) < 0)
256 return ret;
257 if ((ret = ff_accept(fd, timeout, h)) < 0)
258 return ret;
259 closesocket(fd);
260 return ret;
261 }
262
263 int ff_listen_connect(int fd, const struct sockaddr *addr,
264 socklen_t addrlen, int timeout, URLContext *h,
265 int will_try_next)
266 {
267 struct pollfd p = {fd, POLLOUT, 0};
268 int ret;
269 socklen_t optlen;
270
271 if (ff_socket_nonblock(fd, 1) < 0)
272 av_log(h, AV_LOG_DEBUG, "ff_socket_nonblock failed\n");
273
274 while ((ret = connect(fd, addr, addrlen))) {
275 ret = ff_neterrno();
276 switch (ret) {
277 case AVERROR(EINTR):
278 if (ff_check_interrupt(&h->interrupt_callback))
279 return AVERROR_EXIT;
280 continue;
281 case AVERROR(EINPROGRESS):
282 case AVERROR(EAGAIN):
283 ret = ff_poll_interrupt(&p, 1, timeout, &h->interrupt_callback);
284 if (ret < 0)
285 return ret;
286 optlen = sizeof(ret);
287 if (getsockopt (fd, SOL_SOCKET, SO_ERROR, &ret, &optlen))
288 ret = AVUNERROR(ff_neterrno());
289 if (ret != 0) {
290 char errbuf[100];
291 ret = AVERROR(ret);
292 av_strerror(ret, errbuf, sizeof(errbuf));
293 if (will_try_next)
294 av_log(h, AV_LOG_WARNING,
295 "Connection to %s failed (%s), trying next address\n",
296 h->filename, errbuf);
297 else
298 av_log(h, AV_LOG_ERROR, "Connection to %s failed: %s\n",
299 h->filename, errbuf);
300 }
301 default:
302 return ret;
303 }
304 }
305 return ret;
306 }
307
308 static void interleave_addrinfo(struct addrinfo *base)
309 {
310 struct addrinfo **next = &base->ai_next;
311 while (*next) {
312 struct addrinfo *cur = *next;
313 // Iterate forward until we find an entry of a different family.
314 if (cur->ai_family == base->ai_family) {
315 next = &cur->ai_next;
316 continue;
317 }
318 if (cur == base->ai_next) {
319 // If the first one following base is of a different family, just
320 // move base forward one step and continue.
321 base = cur;
322 next = &base->ai_next;
323 continue;
324 }
325 // Unchain cur from the rest of the list from its current spot.
326 *next = cur->ai_next;
327 // Hook in cur directly after base.
328 cur->ai_next = base->ai_next;
329 base->ai_next = cur;
330 // Restart with a new base. We know that before moving the cur element,
331 // everything between the previous base and cur had the same family,
332 // different from cur->ai_family. Therefore, we can keep next pointing
333 // where it was, and continue from there with base at the one after
334 // cur.
335 base = cur->ai_next;
336 }
337 }
338
339 static void print_address_list(void *ctx, const struct addrinfo *addr,
340 const char *title)
341 {
342 char hostbuf[100], portbuf[20];
343 av_log(ctx, AV_LOG_DEBUG, "%s:\n", title);
344 while (addr) {
345 getnameinfo(addr->ai_addr, addr->ai_addrlen,
346 hostbuf, sizeof(hostbuf), portbuf, sizeof(portbuf),
347 NI_NUMERICHOST | NI_NUMERICSERV);
348 av_log(ctx, AV_LOG_DEBUG, "Address %s port %s\n", hostbuf, portbuf);
349 addr = addr->ai_next;
350 }
351 }
352
353 struct ConnectionAttempt {
354 int fd;
355 int64_t deadline_us;
356 struct addrinfo *addr;
357 };
358
359 // Returns < 0 on error, 0 on successfully started connection attempt,
360 // > 0 for a connection that succeeded already.
361 static int start_connect_attempt(struct ConnectionAttempt *attempt,
362 struct addrinfo **ptr, int timeout_ms,
363 URLContext *h,
364 int (*customize_fd)(void *, int, int), void *customize_ctx)
365 {
366 struct addrinfo *ai = *ptr;
367 int ret;
368
369 *ptr = ai->ai_next;
370
371 attempt->fd = ff_socket(ai->ai_family, ai->ai_socktype, ai->ai_protocol, h);
372 if (attempt->fd < 0)
373 return ff_neterrno();
374 attempt->deadline_us = av_gettime_relative() + timeout_ms * 1000;
375 attempt->addr = ai;
376
377 ff_socket_nonblock(attempt->fd, 1);
378
379 if (customize_fd) {
380 ret = customize_fd(customize_ctx, attempt->fd, ai->ai_family);
381 if (ret) {
382 closesocket(attempt->fd);
383 attempt->fd = -1;
384 return ret;
385 }
386 }
387
388 while ((ret = connect(attempt->fd, ai->ai_addr, ai->ai_addrlen))) {
389 ret = ff_neterrno();
390 switch (ret) {
391 case AVERROR(EINTR):
392 if (ff_check_interrupt(&h->interrupt_callback)) {
393 closesocket(attempt->fd);
394 attempt->fd = -1;
395 return AVERROR_EXIT;
396 }
397 continue;
398 case AVERROR(EINPROGRESS):
399 case AVERROR(EAGAIN):
400 return 0;
401 default:
402 closesocket(attempt->fd);
403 attempt->fd = -1;
404 return ret;
405 }
406 }
407 return 1;
408 }
409
410 // Try a new connection to another address after 200 ms, as suggested in
411 // RFC 8305 (or sooner if an earlier attempt fails).
412 #define NEXT_ATTEMPT_DELAY_MS 200
413
414 int ff_connect_parallel(struct addrinfo *addrs, int timeout_ms_per_address,
415 int parallel, URLContext *h, int *fd,
416 int (*customize_fd)(void *, int, int), void *customize_ctx)
417 {
418 struct ConnectionAttempt attempts[3];
419 struct pollfd pfd[3];
420 int nb_attempts = 0, i, j;
421 int64_t next_attempt_us = av_gettime_relative(), next_deadline_us;
422 int last_err = AVERROR(EIO);
423 socklen_t optlen;
424 char errbuf[100], hostbuf[100], portbuf[20];
425
426 if (parallel > FF_ARRAY_ELEMS(attempts))
427 parallel = FF_ARRAY_ELEMS(attempts);
428
429 print_address_list(h, addrs, "Original list of addresses");
430 // This mutates the list, but the head of the list is still the same
431 // element, so the caller, who owns the list, doesn't need to get
432 // an updated pointer.
433 interleave_addrinfo(addrs);
434 print_address_list(h, addrs, "Interleaved list of addresses");
435
436 while (nb_attempts > 0 || addrs) {
437 // Start a new connection attempt, if possible.
438 if (nb_attempts < parallel && addrs) {
439 getnameinfo(addrs->ai_addr, addrs->ai_addrlen,
440 hostbuf, sizeof(hostbuf), portbuf, sizeof(portbuf),
441 NI_NUMERICHOST | NI_NUMERICSERV);
442 av_log(h, AV_LOG_VERBOSE, "Starting connection attempt to %s port %s\n",
443 hostbuf, portbuf);
444 last_err = start_connect_attempt(&attempts[nb_attempts], &addrs,
445 timeout_ms_per_address, h,
446 customize_fd, customize_ctx);
447 if (last_err < 0) {
448 av_strerror(last_err, errbuf, sizeof(errbuf));
449 av_log(h, AV_LOG_VERBOSE, "Connected attempt failed: %s\n",
450 errbuf);
451 continue;
452 }
453 if (last_err > 0) {
454 for (i = 0; i < nb_attempts; i++)
455 closesocket(attempts[i].fd);
456 *fd = attempts[nb_attempts].fd;
457 return 0;
458 }
459 pfd[nb_attempts].fd = attempts[nb_attempts].fd;
460 pfd[nb_attempts].events = POLLOUT;
461 next_attempt_us = av_gettime_relative() + NEXT_ATTEMPT_DELAY_MS * 1000;
462 nb_attempts++;
463 }
464
465 av_assert0(nb_attempts > 0);
466 // The connection attempts are sorted from oldest to newest, so the
467 // first one will have the earliest deadline.
468 next_deadline_us = attempts[0].deadline_us;
469 // If we can start another attempt in parallel, wait until that time.
470 if (nb_attempts < parallel && addrs)
471 next_deadline_us = FFMIN(next_deadline_us, next_attempt_us);
472 last_err = ff_poll_interrupt(pfd, nb_attempts,
473 (next_deadline_us - av_gettime_relative())/1000,
474 &h->interrupt_callback);
475 if (last_err < 0 && last_err != AVERROR(ETIMEDOUT))
476 break;
477
478 // Check the status from the poll output.
479 for (i = 0; i < nb_attempts; i++) {
480 last_err = 0;
481 if (pfd[i].revents) {
482 // Some sort of action for this socket, check its status (either
483 // a successful connection or an error).
484 optlen = sizeof(last_err);
485 if (getsockopt(attempts[i].fd, SOL_SOCKET, SO_ERROR, &last_err, &optlen))
486 last_err = ff_neterrno();
487 else if (last_err != 0)
488 last_err = AVERROR(last_err);
489 if (last_err == 0) {
490 // Everything is ok, we seem to have a successful
491 // connection. Close other sockets and return this one.
492 for (j = 0; j < nb_attempts; j++)
493 if (j != i)
494 closesocket(attempts[j].fd);
495 *fd = attempts[i].fd;
496 getnameinfo(attempts[i].addr->ai_addr, attempts[i].addr->ai_addrlen,
497 hostbuf, sizeof(hostbuf), portbuf, sizeof(portbuf),
498 NI_NUMERICHOST | NI_NUMERICSERV);
499 av_log(h, AV_LOG_VERBOSE, "Successfully connected to %s port %s\n",
500 hostbuf, portbuf);
501 return 0;
502 }
503 }
504 if (attempts[i].deadline_us < av_gettime_relative() && !last_err)
505 last_err = AVERROR(ETIMEDOUT);
506 if (!last_err)
507 continue;
508 // Error (or timeout) for this socket; close the socket and remove
509 // it from the attempts/pfd arrays, to let a new attempt start
510 // directly.
511 getnameinfo(attempts[i].addr->ai_addr, attempts[i].addr->ai_addrlen,
512 hostbuf, sizeof(hostbuf), portbuf, sizeof(portbuf),
513 NI_NUMERICHOST | NI_NUMERICSERV);
514 av_strerror(last_err, errbuf, sizeof(errbuf));
515 av_log(h, AV_LOG_VERBOSE, "Connection attempt to %s port %s "
516 "failed: %s\n", hostbuf, portbuf, errbuf);
517 closesocket(attempts[i].fd);
518 memmove(&attempts[i], &attempts[i + 1],
519 (nb_attempts - i - 1) * sizeof(*attempts));
520 memmove(&pfd[i], &pfd[i + 1],
521 (nb_attempts - i - 1) * sizeof(*pfd));
522 i--;
523 nb_attempts--;
524 }
525 }
526 for (i = 0; i < nb_attempts; i++)
527 closesocket(attempts[i].fd);
528 if (last_err >= 0)
529 last_err = AVERROR(ECONNREFUSED);
530 if (last_err != AVERROR_EXIT) {
531 av_strerror(last_err, errbuf, sizeof(errbuf));
532 av_log(h, AV_LOG_ERROR, "Connection to %s failed: %s\n",
533 h->filename, errbuf);
534 }
535 return last_err;
536 }
537
538 15 static int match_host_pattern(const char *pattern, const char *hostname)
539 {
540 int len_p, len_h;
541
2/2
✓ Branch 0 taken 1 times.
✓ Branch 1 taken 14 times.
15 if (!strcmp(pattern, "*"))
542 1 return 1;
543 // Skip a possible *. at the start of the pattern
544
2/2
✓ Branch 0 taken 2 times.
✓ Branch 1 taken 12 times.
14 if (pattern[0] == '*')
545 2 pattern++;
546
2/2
✓ Branch 0 taken 3 times.
✓ Branch 1 taken 11 times.
14 if (pattern[0] == '.')
547 3 pattern++;
548 14 len_p = strlen(pattern);
549 14 len_h = strlen(hostname);
550
2/2
✓ Branch 0 taken 5 times.
✓ Branch 1 taken 9 times.
14 if (len_p > len_h)
551 5 return 0;
552 // Simply check if the end of hostname is equal to 'pattern'
553
2/2
✓ Branch 0 taken 6 times.
✓ Branch 1 taken 3 times.
9 if (!strcmp(pattern, &hostname[len_h - len_p])) {
554
2/2
✓ Branch 0 taken 4 times.
✓ Branch 1 taken 2 times.
6 if (len_h == len_p)
555 4 return 1; // Exact match
556
2/2
✓ Branch 0 taken 1 times.
✓ Branch 1 taken 1 times.
2 if (hostname[len_h - len_p - 1] == '.')
557 1 return 1; // The matched substring is a domain and not just a substring of a domain
558 }
559 4 return 0;
560 }
561
562 9 int ff_http_match_no_proxy(const char *no_proxy, const char *hostname)
563 {
564 char *buf, *start;
565 9 int ret = 0;
566
2/2
✓ Branch 0 taken 1 times.
✓ Branch 1 taken 8 times.
9 if (!no_proxy)
567 1 return 0;
568
1/2
✗ Branch 0 not taken.
✓ Branch 1 taken 8 times.
8 if (!hostname)
569 return 0;
570 8 buf = av_strdup(no_proxy);
571
1/2
✗ Branch 0 not taken.
✓ Branch 1 taken 8 times.
8 if (!buf)
572 return 0;
573 8 start = buf;
574
2/2
✓ Branch 0 taken 15 times.
✓ Branch 1 taken 2 times.
17 while (start) {
575 15 char *sep, *next = NULL;
576 15 start += strspn(start, " ,");
577 15 sep = start + strcspn(start, " ,");
578
2/2
✓ Branch 0 taken 7 times.
✓ Branch 1 taken 8 times.
15 if (*sep) {
579 7 next = sep + 1;
580 7 *sep = '\0';
581 }
582
2/2
✓ Branch 1 taken 6 times.
✓ Branch 2 taken 9 times.
15 if (match_host_pattern(start, hostname)) {
583 6 ret = 1;
584 6 break;
585 }
586 9 start = next;
587 }
588 8 av_free(buf);
589 8 return ret;
590 }
591
592 void ff_log_net_error(void *ctx, int level, const char* prefix)
593 {
594 char errbuf[100];
595 av_strerror(ff_neterrno(), errbuf, sizeof(errbuf));
596 av_log(ctx, level, "%s: %s\n", prefix, errbuf);
597 }
598