http.c 21.9 KB
Newer Older
1
/*
2
 * HTTP protocol for avconv client
3
 * Copyright (c) 2000, 2001 Fabrice Bellard
4
 *
5
 * This file is part of Libav.
6
 *
7
 * Libav is free software; you can redistribute it and/or
8 9 10 11
 * modify it under the terms of the GNU Lesser General Public
 * License as published by the Free Software Foundation; either
 * version 2.1 of the License, or (at your option) any later version.
 *
12
 * Libav is distributed in the hope that it will be useful,
13 14 15 16 17
 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 * Lesser General Public License for more details.
 *
 * You should have received a copy of the GNU Lesser General Public
18
 * License along with Libav; if not, write to the Free Software
19 20
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
 */
21 22

#include "libavutil/avstring.h"
23 24
#include "avformat.h"
#include <unistd.h>
25
#include "internal.h"
26
#include "network.h"
27
#include "http.h"
28
#include "os_support.h"
29
#include "httpauth.h"
30
#include "url.h"
31
#include "libavutil/opt.h"
32

33
/* XXX: POST protocol is not completely implemented because avconv uses
Diego Biurrun's avatar
Diego Biurrun committed
34
   only a subset of it. */
35 36 37 38 39 40

/* used for protocol handling */
#define BUFFER_SIZE 1024
#define MAX_REDIRECTS 8

typedef struct {
41
    const AVClass *class;
42 43 44 45
    URLContext *hd;
    unsigned char buffer[BUFFER_SIZE], *buf_ptr, *buf_end;
    int line_count;
    int http_code;
46
    int64_t chunksize;      /**< Used if "Transfer-Encoding: chunked" otherwise -1. */
47
    int64_t off, filesize;
48
    char location[MAX_URL_SIZE];
49
    HTTPAuthState auth_state;
50
    HTTPAuthState proxy_auth_state;
51
    char *headers;
52
    int willclose;          /**< Set if the server correctly handles Connection: close and will close the connection after feeding us the content. */
53
    int chunked_post;
54 55
} HTTPContext;

56
#define OFFSET(x) offsetof(HTTPContext, x)
57 58
#define D AV_OPT_FLAG_DECODING_PARAM
#define E AV_OPT_FLAG_ENCODING_PARAM
59
static const AVOption options[] = {
60
{"chunked_post", "use chunked transfer-encoding for posts", OFFSET(chunked_post), AV_OPT_TYPE_INT, {.dbl = 1}, 0, 1, E },
61
{"headers", "custom HTTP headers, can override built in default headers", OFFSET(headers), AV_OPT_TYPE_STRING, { 0 }, 0, 0, D|E },
62 63
{NULL}
};
64 65 66 67 68 69
#define HTTP_CLASS(flavor)\
static const AVClass flavor ## _context_class = {\
    .class_name     = #flavor,\
    .item_name      = av_default_item_name,\
    .option         = options,\
    .version        = LIBAVUTIL_VERSION_INT,\
Mans Rullgard's avatar
Mans Rullgard committed
70
}
71

72 73 74
HTTP_CLASS(http);
HTTP_CLASS(https);

75 76 77
static int http_connect(URLContext *h, const char *path, const char *local_path,
                        const char *hoststr, const char *auth,
                        const char *proxyauth, int *new_location);
78

79 80 81 82
void ff_http_init_auth_state(URLContext *dest, const URLContext *src)
{
    memcpy(&((HTTPContext*)dest->priv_data)->auth_state,
           &((HTTPContext*)src->priv_data)->auth_state, sizeof(HTTPAuthState));
83 84 85
    memcpy(&((HTTPContext*)dest->priv_data)->proxy_auth_state,
           &((HTTPContext*)src->priv_data)->proxy_auth_state,
           sizeof(HTTPAuthState));
86 87
}

88 89 90
/* return non zero if error */
static int http_open_cnx(URLContext *h)
{
91
    const char *path, *proxy_path, *lower_proto = "tcp", *local_path;
92
    char hostname[1024], hoststr[1024], proto[10];
93
    char auth[1024], proxyauth[1024] = "";
94
    char path1[1024];
95
    char buf[1024], urlbuf[1024];
96
    int port, use_proxy, err, location_changed = 0, redirects = 0, attempts = 0;
97
    HTTPAuthType cur_auth_type, cur_proxy_auth_type;
98 99 100 101 102
    HTTPContext *s = h->priv_data;
    URLContext *hd = NULL;

    proxy_path = getenv("http_proxy");
    use_proxy = (proxy_path != NULL) && !getenv("no_proxy") &&
103
        av_strstart(proxy_path, "http://", NULL);
104 105 106 107

    /* fill the dest addr */
 redo:
    /* needed in any case to build the host string */
108 109
    av_url_split(proto, sizeof(proto), auth, sizeof(auth),
                 hostname, sizeof(hostname), &port,
Martin Storsjö's avatar
Martin Storsjö committed
110
                 path1, sizeof(path1), s->location);
111
    ff_url_join(hoststr, sizeof(hoststr), NULL, NULL, hostname, port, NULL);
112

113 114
    if (!strcmp(proto, "https")) {
        lower_proto = "tls";
115
        use_proxy = 0;
116 117 118 119 120 121
        if (port < 0)
            port = 443;
    }
    if (port < 0)
        port = 80;

122 123 124 125 126
    if (path1[0] == '\0')
        path = "/";
    else
        path = path1;
    local_path = path;
127
    if (use_proxy) {
128 129 130 131 132 133 134
        /* Reassemble the request URL without auth string - we don't
         * want to leak the auth to the proxy. */
        ff_url_join(urlbuf, sizeof(urlbuf), proto, NULL, hostname, port, "%s",
                    path1);
        path = urlbuf;
        av_url_split(NULL, 0, proxyauth, sizeof(proxyauth),
                     hostname, sizeof(hostname), &port, NULL, 0, proxy_path);
135 136
    }

137
    ff_url_join(buf, sizeof(buf), lower_proto, NULL, hostname, port, NULL);
138 139
    err = ffurl_open(&hd, buf, AVIO_FLAG_READ_WRITE,
                     &h->interrupt_callback, NULL);
140 141 142 143
    if (err < 0)
        goto fail;

    s->hd = hd;
144
    cur_auth_type = s->auth_state.auth_type;
145 146
    cur_proxy_auth_type = s->auth_state.auth_type;
    if (http_connect(h, path, local_path, hoststr, auth, proxyauth, &location_changed) < 0)
147
        goto fail;
148
    attempts++;
149
    if (s->http_code == 401) {
150 151
        if ((cur_auth_type == HTTP_AUTH_NONE || s->auth_state.stale) &&
            s->auth_state.auth_type != HTTP_AUTH_NONE && attempts < 4) {
152
            ffurl_close(hd);
153 154 155 156
            goto redo;
        } else
            goto fail;
    }
157
    if (s->http_code == 407) {
158 159
        if ((cur_proxy_auth_type == HTTP_AUTH_NONE || s->proxy_auth_state.stale) &&
            s->proxy_auth_state.auth_type != HTTP_AUTH_NONE && attempts < 4) {
160 161 162 163 164
            ffurl_close(hd);
            goto redo;
        } else
            goto fail;
    }
165 166
    if ((s->http_code == 301 || s->http_code == 302 || s->http_code == 303 || s->http_code == 307)
        && location_changed == 1) {
167
        /* url moved, get next */
168
        ffurl_close(hd);
169
        if (redirects++ >= MAX_REDIRECTS)
170
            return AVERROR(EIO);
171 172 173
        /* Restart the authentication process with the new target, which
         * might use a different auth mechanism. */
        memset(&s->auth_state, 0, sizeof(s->auth_state));
174
        attempts = 0;
175 176 177 178 179 180
        location_changed = 0;
        goto redo;
    }
    return 0;
 fail:
    if (hd)
181
        ffurl_close(hd);
182
    s->hd = NULL;
183
    return AVERROR(EIO);
184 185 186 187
}

static int http_open(URLContext *h, const char *uri, int flags)
{
188
    HTTPContext *s = h->priv_data;
189 190 191 192

    h->is_streamed = 1;

    s->filesize = -1;
193
    av_strlcpy(s->location, uri, sizeof(s->location));
194

195 196 197
    if (s->headers) {
        int len = strlen(s->headers);
        if (len < 2 || strcmp("\r\n", s->headers + len - 2))
198
            av_log(h, AV_LOG_WARNING, "No trailing CRLF found in HTTP header.\n");
199 200
    }

201
    return http_open_cnx(h);
202 203 204 205 206
}
static int http_getc(HTTPContext *s)
{
    int len;
    if (s->buf_ptr >= s->buf_end) {
207
        len = ffurl_read(s->hd, s->buffer, BUFFER_SIZE);
208
        if (len < 0) {
209
            return AVERROR(EIO);
210 211 212 213 214 215 216 217 218 219
        } else if (len == 0) {
            return -1;
        } else {
            s->buf_ptr = s->buffer;
            s->buf_end = s->buffer + len;
        }
    }
    return *s->buf_ptr++;
}

220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243
static int http_get_line(HTTPContext *s, char *line, int line_size)
{
    int ch;
    char *q;

    q = line;
    for(;;) {
        ch = http_getc(s);
        if (ch < 0)
            return AVERROR(EIO);
        if (ch == '\n') {
            /* process line */
            if (q > line && q[-1] == '\r')
                q--;
            *q = '\0';

            return 0;
        } else {
            if ((q - line) < line_size - 1)
                *q++ = ch;
        }
    }
}

244 245 246 247
static int process_line(URLContext *h, char *line, int line_count,
                        int *new_location)
{
    HTTPContext *s = h->priv_data;
248
    char *tag, *p, *end;
249 250 251 252 253 254 255 256 257 258 259

    /* end of header */
    if (line[0] == '\0')
        return 0;

    p = line;
    if (line_count == 0) {
        while (!isspace(*p) && *p != '\0')
            p++;
        while (isspace(*p))
            p++;
260
        s->http_code = strtol(p, &end, 10);
261

Luca Barbato's avatar
Luca Barbato committed
262
        av_dlog(NULL, "http_code=%d\n", s->http_code);
263

264 265
        /* error codes are 4xx and 5xx, but regard 401 as a success, so we
         * don't abort until all headers have been parsed. */
266
        if (s->http_code >= 400 && s->http_code < 600 && (s->http_code != 401
267 268
            || s->auth_state.auth_type != HTTP_AUTH_NONE) &&
            (s->http_code != 407 || s->proxy_auth_state.auth_type != HTTP_AUTH_NONE)) {
269
            end += strspn(end, SPACE_CHARS);
270
            av_log(h, AV_LOG_WARNING, "HTTP error %d %s\n",
271
                   s->http_code, end);
Alex Beregszaszi's avatar
Alex Beregszaszi committed
272
            return -1;
273
        }
274 275 276 277 278 279 280 281 282 283 284
    } else {
        while (*p != '\0' && *p != ':')
            p++;
        if (*p != ':')
            return 1;

        *p = '\0';
        tag = line;
        p++;
        while (isspace(*p))
            p++;
285
        if (!av_strcasecmp(tag, "Location")) {
286 287
            strcpy(s->location, p);
            *new_location = 1;
288
        } else if (!av_strcasecmp (tag, "Content-Length") && s->filesize == -1) {
289
            s->filesize = atoll(p);
290
        } else if (!av_strcasecmp (tag, "Content-Range")) {
291 292 293 294 295 296 297 298 299
            /* "bytes $from-$to/$document_size" */
            const char *slash;
            if (!strncmp (p, "bytes ", 6)) {
                p += 6;
                s->off = atoll(p);
                if ((slash = strchr(p, '/')) && strlen(slash) > 0)
                    s->filesize = atoll(slash+1);
            }
            h->is_streamed = 0; /* we _can_ in fact seek */
300
        } else if (!av_strcasecmp(tag, "Accept-Ranges") && !strncmp(p, "bytes", 5)) {
301
            h->is_streamed = 0;
302
        } else if (!av_strcasecmp (tag, "Transfer-Encoding") && !av_strncasecmp(p, "chunked", 7)) {
303 304
            s->filesize = -1;
            s->chunksize = 0;
305
        } else if (!av_strcasecmp (tag, "WWW-Authenticate")) {
306
            ff_http_auth_handle_header(&s->auth_state, tag, p);
307
        } else if (!av_strcasecmp (tag, "Authentication-Info")) {
308
            ff_http_auth_handle_header(&s->auth_state, tag, p);
309 310
        } else if (!av_strcasecmp (tag, "Proxy-Authenticate")) {
            ff_http_auth_handle_header(&s->proxy_auth_state, tag, p);
311
        } else if (!av_strcasecmp (tag, "Connection")) {
312 313
            if (!strcmp(p, "close"))
                s->willclose = 1;
314 315 316 317 318
        }
    }
    return 1;
}

319 320 321
static inline int has_header(const char *str, const char *header)
{
    /* header + 2 to skip over CRLF prefix. (make sure you have one!) */
322 323
    if (!str)
        return 0;
324 325 326
    return av_stristart(str, header + 2, NULL) || av_stristr(str, header);
}

327 328 329
static int http_connect(URLContext *h, const char *path, const char *local_path,
                        const char *hoststr, const char *auth,
                        const char *proxyauth, int *new_location)
330 331
{
    HTTPContext *s = h->priv_data;
332 333
    int post, err;
    char line[1024];
334
    char headers[1024] = "";
335
    char *authstr = NULL, *proxyauthstr = NULL;
336
    int64_t off = s->off;
337
    int len = 0;
338
    const char *method;
339 340 341


    /* send http header */
342
    post = h->flags & AVIO_FLAG_WRITE;
343 344 345 346 347
    method = post ? "POST" : "GET";
    authstr = ff_http_auth_create_response(&s->auth_state, auth, local_path,
                                           method);
    proxyauthstr = ff_http_auth_create_response(&s->proxy_auth_state, proxyauth,
                                                local_path, method);
348 349 350 351 352 353 354 355

    /* set default headers if needed */
    if (!has_header(s->headers, "\r\nUser-Agent: "))
       len += av_strlcatf(headers + len, sizeof(headers) - len,
                          "User-Agent: %s\r\n", LIBAVFORMAT_IDENT);
    if (!has_header(s->headers, "\r\nAccept: "))
        len += av_strlcpy(headers + len, "Accept: */*\r\n",
                          sizeof(headers) - len);
356
    if (!has_header(s->headers, "\r\nRange: ") && !post)
357
        len += av_strlcatf(headers + len, sizeof(headers) - len,
358
                           "Range: bytes=%"PRId64"-\r\n", s->off);
359 360 361 362 363 364 365 366
    if (!has_header(s->headers, "\r\nConnection: "))
        len += av_strlcpy(headers + len, "Connection: close\r\n",
                          sizeof(headers)-len);
    if (!has_header(s->headers, "\r\nHost: "))
        len += av_strlcatf(headers + len, sizeof(headers) - len,
                           "Host: %s\r\n", hoststr);

    /* now add in custom headers */
367 368
    if (s->headers)
        av_strlcpy(headers + len, s->headers, sizeof(headers) - len);
369

370 371
    snprintf(s->buffer, sizeof(s->buffer),
             "%s %s HTTP/1.1\r\n"
372
             "%s"
373
             "%s"
374
             "%s"
375
             "%s%s"
376
             "\r\n",
377
             method,
378
             path,
379
             post && s->chunked_post ? "Transfer-Encoding: chunked\r\n" : "",
380
             headers,
381 382
             authstr ? authstr : "",
             proxyauthstr ? "Proxy-" : "", proxyauthstr ? proxyauthstr : "");
383

384
    av_freep(&authstr);
385
    av_freep(&proxyauthstr);
386
    if (ffurl_write(s->hd, s->buffer, strlen(s->buffer)) < 0)
387
        return AVERROR(EIO);
388 389 390 391 392 393

    /* init input buffer */
    s->buf_ptr = s->buffer;
    s->buf_end = s->buffer;
    s->line_count = 0;
    s->off = 0;
394
    s->filesize = -1;
395
    s->willclose = 0;
396
    if (post) {
397 398 399 400
        /* Pretend that it did work. We didn't read any header yet, since
         * we've still to send the POST data, but the code calling this
         * function will check http_code after we return. */
        s->http_code = 200;
401 402
        return 0;
    }
403
    s->chunksize = -1;
404 405 406

    /* wait for header */
    for(;;) {
407
        if (http_get_line(s, line, sizeof(line)) < 0)
408
            return AVERROR(EIO);
409

Luca Barbato's avatar
Luca Barbato committed
410
        av_dlog(NULL, "header='%s'\n", line);
411

412 413 414 415 416 417
        err = process_line(h, line, s->line_count, new_location);
        if (err < 0)
            return err;
        if (err == 0)
            break;
        s->line_count++;
418 419 420 421 422 423
    }

    return (off == s->off) ? 0 : -1;
}


424
static int http_buf_read(URLContext *h, uint8_t *buf, int size)
425 426 427
{
    HTTPContext *s = h->priv_data;
    int len;
428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450
    /* read bytes from input buffer first */
    len = s->buf_end - s->buf_ptr;
    if (len > 0) {
        if (len > size)
            len = size;
        memcpy(buf, s->buf_ptr, len);
        s->buf_ptr += len;
    } else {
        if (!s->willclose && s->filesize >= 0 && s->off >= s->filesize)
            return AVERROR_EOF;
        len = ffurl_read(s->hd, buf, size);
    }
    if (len > 0) {
        s->off += len;
        if (s->chunksize > 0)
            s->chunksize -= len;
    }
    return len;
}

static int http_read(URLContext *h, uint8_t *buf, int size)
{
    HTTPContext *s = h->priv_data;
451

452 453 454 455 456 457 458 459 460 461 462 463
    if (s->chunksize >= 0) {
        if (!s->chunksize) {
            char line[32];

            for(;;) {
                do {
                    if (http_get_line(s, line, sizeof(line)) < 0)
                        return AVERROR(EIO);
                } while (!*line);    /* skip CR LF from last chunk */

                s->chunksize = strtoll(line, NULL, 16);

Luca Barbato's avatar
Luca Barbato committed
464
                av_dlog(NULL, "Chunked encoding data size: %"PRId64"'\n", s->chunksize);
465 466 467 468 469 470 471 472

                if (!s->chunksize)
                    return 0;
                break;
            }
        }
        size = FFMIN(size, s->chunksize);
    }
473
    return http_buf_read(h, buf, size);
474 475 476
}

/* used only when posting data */
477
static int http_write(URLContext *h, const uint8_t *buf, int size)
478
{
479
    char temp[11] = "";  /* 32-bit hex + CRLF + nul */
480 481
    int ret;
    char crlf[] = "\r\n";
482
    HTTPContext *s = h->priv_data;
483

484
    if (!s->chunked_post) {
Martin Storsjö's avatar
Martin Storsjö committed
485
        /* non-chunked data is sent without any special encoding */
486
        return ffurl_write(s->hd, buf, size);
487 488 489 490 491 492
    }

    /* silently ignore zero-size data since chunk encoding that would
     * signal EOF */
    if (size > 0) {
        /* upload data using chunked encoding */
Martin Storsjö's avatar
Martin Storsjö committed
493
        snprintf(temp, sizeof(temp), "%x\r\n", size);
494

495 496 497
        if ((ret = ffurl_write(s->hd, temp, strlen(temp))) < 0 ||
            (ret = ffurl_write(s->hd, buf, size)) < 0 ||
            (ret = ffurl_write(s->hd, crlf, sizeof(crlf) - 1)) < 0)
498 499 500
            return ret;
    }
    return size;
501 502 503 504
}

static int http_close(URLContext *h)
{
505 506
    int ret = 0;
    char footer[] = "0\r\n\r\n";
507
    HTTPContext *s = h->priv_data;
508 509

    /* signal end of chunked encoding if used */
510
    if ((h->flags & AVIO_FLAG_WRITE) && s->chunked_post) {
511
        ret = ffurl_write(s->hd, footer, sizeof(footer) - 1);
512 513 514
        ret = ret > 0 ? 0 : ret;
    }

515
    if (s->hd)
516
        ffurl_close(s->hd);
517
    return ret;
518 519
}

520
static int64_t http_seek(URLContext *h, int64_t off, int whence)
521 522 523
{
    HTTPContext *s = h->priv_data;
    URLContext *old_hd = s->hd;
524
    int64_t old_off = s->off;
525 526
    uint8_t old_buf[BUFFER_SIZE];
    int old_buf_size;
527 528 529 530 531 532 533

    if (whence == AVSEEK_SIZE)
        return s->filesize;
    else if ((s->filesize == -1 && whence == SEEK_END) || h->is_streamed)
        return -1;

    /* we save the old context in case the seek fails */
534 535
    old_buf_size = s->buf_end - s->buf_ptr;
    memcpy(old_buf, s->buf_ptr, old_buf_size);
536 537 538 539 540 541 542 543 544
    s->hd = NULL;
    if (whence == SEEK_CUR)
        off += s->off;
    else if (whence == SEEK_END)
        off += s->filesize;
    s->off = off;

    /* if it fails, continue on old connection */
    if (http_open_cnx(h) < 0) {
545 546 547
        memcpy(s->buffer, old_buf, old_buf_size);
        s->buf_ptr = s->buffer;
        s->buf_end = s->buffer + old_buf_size;
548 549 550 551
        s->hd = old_hd;
        s->off = old_off;
        return -1;
    }
552
    ffurl_close(old_hd);
553 554 555
    return off;
}

556 557 558 559
static int
http_get_file_handle(URLContext *h)
{
    HTTPContext *s = h->priv_data;
560
    return ffurl_get_file_handle(s->hd);
561 562
}

563
#if CONFIG_HTTP_PROTOCOL
564
URLProtocol ff_http_protocol = {
565 566 567 568 569 570
    .name                = "http",
    .url_open            = http_open,
    .url_read            = http_read,
    .url_write           = http_write,
    .url_seek            = http_seek,
    .url_close           = http_close,
571
    .url_get_file_handle = http_get_file_handle,
572
    .priv_data_size      = sizeof(HTTPContext),
573
    .priv_data_class     = &http_context_class,
574
    .flags               = URL_PROTOCOL_FLAG_NETWORK,
575
};
576 577 578 579 580 581 582 583 584 585 586
#endif
#if CONFIG_HTTPS_PROTOCOL
URLProtocol ff_https_protocol = {
    .name                = "https",
    .url_open            = http_open,
    .url_read            = http_read,
    .url_write           = http_write,
    .url_seek            = http_seek,
    .url_close           = http_close,
    .url_get_file_handle = http_get_file_handle,
    .priv_data_size      = sizeof(HTTPContext),
587
    .priv_data_class     = &https_context_class,
588
    .flags               = URL_PROTOCOL_FLAG_NETWORK,
589 590
};
#endif
591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606

#if CONFIG_HTTPPROXY_PROTOCOL
static int http_proxy_close(URLContext *h)
{
    HTTPContext *s = h->priv_data;
    if (s->hd)
        ffurl_close(s->hd);
    return 0;
}

static int http_proxy_open(URLContext *h, const char *uri, int flags)
{
    HTTPContext *s = h->priv_data;
    char hostname[1024], hoststr[1024];
    char auth[1024], pathbuf[1024], *path;
    char line[1024], lower_url[100];
607
    int port, ret = 0, attempts = 0;
608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673
    HTTPAuthType cur_auth_type;
    char *authstr;

    h->is_streamed = 1;

    av_url_split(NULL, 0, auth, sizeof(auth), hostname, sizeof(hostname), &port,
                 pathbuf, sizeof(pathbuf), uri);
    ff_url_join(hoststr, sizeof(hoststr), NULL, NULL, hostname, port, NULL);
    path = pathbuf;
    if (*path == '/')
        path++;

    ff_url_join(lower_url, sizeof(lower_url), "tcp", NULL, hostname, port,
                NULL);
redo:
    ret = ffurl_open(&s->hd, lower_url, AVIO_FLAG_READ_WRITE,
                     &h->interrupt_callback, NULL);
    if (ret < 0)
        return ret;

    authstr = ff_http_auth_create_response(&s->proxy_auth_state, auth,
                                           path, "CONNECT");
    snprintf(s->buffer, sizeof(s->buffer),
             "CONNECT %s HTTP/1.1\r\n"
             "Host: %s\r\n"
             "Connection: close\r\n"
             "%s%s"
             "\r\n",
             path,
             hoststr,
             authstr ? "Proxy-" : "", authstr ? authstr : "");
    av_freep(&authstr);

    if ((ret = ffurl_write(s->hd, s->buffer, strlen(s->buffer))) < 0)
        goto fail;

    s->buf_ptr = s->buffer;
    s->buf_end = s->buffer;
    s->line_count = 0;
    s->filesize = -1;
    cur_auth_type = s->proxy_auth_state.auth_type;

    for (;;) {
        int new_loc;
        // Note: This uses buffering, potentially reading more than the
        // HTTP header. If tunneling a protocol where the server starts
        // the conversation, we might buffer part of that here, too.
        // Reading that requires using the proper ffurl_read() function
        // on this URLContext, not using the fd directly (as the tls
        // protocol does). This shouldn't be an issue for tls though,
        // since the client starts the conversation there, so there
        // is no extra data that we might buffer up here.
        if (http_get_line(s, line, sizeof(line)) < 0) {
            ret = AVERROR(EIO);
            goto fail;
        }

        av_dlog(h, "header='%s'\n", line);

        ret = process_line(h, line, s->line_count, &new_loc);
        if (ret < 0)
            goto fail;
        if (ret == 0)
            break;
        s->line_count++;
    }
674 675 676 677
    attempts++;
    if (s->http_code == 407 &&
        (cur_auth_type == HTTP_AUTH_NONE || s->proxy_auth_state.stale) &&
        s->proxy_auth_state.auth_type != HTTP_AUTH_NONE && attempts < 2) {
678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705
        ffurl_close(s->hd);
        s->hd = NULL;
        goto redo;
    }

    if (s->http_code < 400)
        return 0;
    ret = AVERROR(EIO);

fail:
    http_proxy_close(h);
    return ret;
}

static int http_proxy_write(URLContext *h, const uint8_t *buf, int size)
{
    HTTPContext *s = h->priv_data;
    return ffurl_write(s->hd, buf, size);
}

URLProtocol ff_httpproxy_protocol = {
    .name                = "httpproxy",
    .url_open            = http_proxy_open,
    .url_read            = http_buf_read,
    .url_write           = http_proxy_write,
    .url_close           = http_proxy_close,
    .url_get_file_handle = http_get_file_handle,
    .priv_data_size      = sizeof(HTTPContext),
706
    .flags               = URL_PROTOCOL_FLAG_NETWORK,
707 708
};
#endif