On Thu, 21 May 2015 16:08:59 +0300
Martin Storsjö <[email protected]> wrote:

> This avoids hijacking the fd, by reading using the normal
> URLContext functions instead. This allowing reading data that has
> been buffered in the underlying URLContext.
> 
> This avoids using the libraries own send functions that can
> cause SIGPIPE.
> 
> The fd is still needed for polling the lowlevel socket, for
> waiting for retries.
> ---
> I realized I had an old patchset doing this lying around locally;
> it still seems to work after rebasing, but some thorough testing
> is welcome.
> ---
>  libavformat/tls.c | 105 
> ++++++++++++++++++++++++++++++++++++++++++++++++++++--
>  1 file changed, 103 insertions(+), 2 deletions(-)
> 
> diff --git a/libavformat/tls.c b/libavformat/tls.c
> index d5de5ee..7a08e1d 100644
> --- a/libavformat/tls.c
> +++ b/libavformat/tls.c
> @@ -36,6 +36,33 @@
>          if (c->cred) \
>              gnutls_certificate_free_credentials(c->cred); \
>      } while (0)
> +
> +static ssize_t gnutls_url_pull(gnutls_transport_ptr_t transport,
> +                               void *buf, size_t len)
> +{
> +    URLContext *h = (URLContext*) transport;
> +    int ret = ffurl_read(h, buf, len);
> +    if (ret >= 0)
> +        return ret;
> +    if (ret == AVERROR(EAGAIN))
> +        errno = EAGAIN;
> +    else
> +        errno = EIO;
> +    return -1;
> +}
> +static ssize_t gnutls_url_push(gnutls_transport_ptr_t transport,
> +                               const void *buf, size_t len)
> +{
> +    URLContext *h = (URLContext*) transport;
> +    int ret = ffurl_write(h, buf, len);
> +    if (ret >= 0)
> +        return ret;
> +    if (ret == AVERROR(EAGAIN))
> +        errno = EAGAIN;
> +    else
> +        errno = EIO;
> +    return -1;
> +}
>  #elif CONFIG_OPENSSL
>  #include <openssl/bio.h>
>  #include <openssl/ssl.h>
> @@ -49,6 +76,70 @@
>          if (c->ctx) \
>              SSL_CTX_free(c->ctx); \
>      } while (0)
> +
> +static int url_bio_create(BIO *b)
> +{
> +    b->init = 1;
> +    b->ptr = NULL;
> +    b->flags = 0;
> +    return 1;
> +}
> +
> +static int url_bio_destroy(BIO *b)
> +{
> +    return 1;
> +}
> +
> +static int url_bio_bread(BIO *b, char *buf, int len)
> +{
> +    URLContext *h = b->ptr;
> +    int ret = ffurl_read(h, buf, len);
> +    if (ret >= 0)
> +        return ret;
> +    BIO_clear_retry_flags(b);
> +    if (ret == AVERROR(EAGAIN))
> +        BIO_set_retry_read(b);
> +    return -1;
> +}
> +
> +static int url_bio_bwrite(BIO *b, const char *buf, int len)
> +{
> +    URLContext *h = b->ptr;
> +    int ret = ffurl_write(h, buf, len);
> +    if (ret >= 0)
> +        return ret;
> +    BIO_clear_retry_flags(b);
> +    if (ret == AVERROR(EAGAIN))
> +        BIO_set_retry_write(b);
> +    return -1;
> +}
> +
> +static long url_bio_ctrl(BIO *b, int cmd, long num, void *ptr)
> +{
> +    if (cmd == BIO_CTRL_FLUSH) {
> +        BIO_clear_retry_flags(b);
> +        return 1;
> +    }
> +    return 0;
> +}
> +
> +static int url_bio_bputs(BIO *b, const char *str)
> +{
> +    return url_bio_bwrite(b, str, strlen(str));
> +}
> +
> +static BIO_METHOD url_bio_method = {
> +    .type = BIO_TYPE_SOURCE_SINK,
> +    .name = "urlprotocol bio",
> +    .bwrite = url_bio_bwrite,
> +    .bread = url_bio_bread,
> +    .bputs = url_bio_bputs,
> +    .bgets = NULL,
> +    .ctrl = url_bio_ctrl,
> +    .create = url_bio_create,
> +    .destroy = url_bio_destroy,
> +};
> +
>  #endif
>  #include "network.h"
>  #include "os_support.h"
> @@ -148,6 +239,9 @@ static int tls_open(URLContext *h, const char *uri, int 
> flags, AVDictionary **op
>      struct addrinfo hints = { 0 }, *ai = NULL;
>      const char *proxy_path;
>      int use_proxy;
> +#if CONFIG_OPENSSL
> +    BIO *bio;
> +#endif
>  
>      ff_tls_init();
>  
> @@ -220,8 +314,12 @@ static int tls_open(URLContext *h, const char *uri, int 
> flags, AVDictionary **op
>          }
>      }
>      gnutls_credentials_set(c->session, GNUTLS_CRD_CERTIFICATE, c->cred);
> +    c->tcp->flags |= AVIO_FLAG_NONBLOCK;
> +    gnutls_transport_set_lowat(c->session, 0);
> +    gnutls_transport_set_pull_function(c->session, gnutls_url_pull);
> +    gnutls_transport_set_push_function(c->session, gnutls_url_push);
>      gnutls_transport_set_ptr(c->session, (gnutls_transport_ptr_t)
> -                                         (intptr_t) c->fd);
> +                                         (intptr_t) c->tcp);

The intptr_t extra cast can probably be removed.

>      gnutls_priority_set_direct(c->session, "NORMAL", NULL);
>      while (1) {
>          ret = gnutls_handshake(c->session);
> @@ -293,7 +391,10 @@ static int tls_open(URLContext *h, const char *uri, int 
> flags, AVDictionary **op
>          ret = AVERROR(EIO);
>          goto fail;
>      }
> -    SSL_set_fd(c->ssl, c->fd);
> +    bio = BIO_new(&url_bio_method);
> +    c->tcp->flags |= AVIO_FLAG_NONBLOCK;
> +    bio->ptr = c->tcp;
> +    SSL_set_bio(c->ssl, bio, bio);
>      if (!c->listen && !numerichost)
>          SSL_set_tlsext_host_name(c->ssl, host);
>      while (1) {

_______________________________________________
libav-devel mailing list
[email protected]
https://lists.libav.org/mailman/listinfo/libav-devel

Reply via email to