| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590 | /*  *  Squeezelite - lightweight headless squeezebox emulator * *  (c) Adrian Smith 2012-2015, triode1@btinternet.com *      Ralph Irving 2015-2017, ralph_irving@hotmail.com *   * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation, either version 3 of the License, or * (at your option) any later version. *  * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program.  If not, see <http://www.gnu.org/licenses/>. * */// stream thread#define _GNU_SOURCE#include "squeezelite.h"#include <fcntl.h>#if USE_SSL#include "openssl/ssl.h"#include "openssl/err.h"#endif#if SUN#include <signal.h>#endifstatic log_level loglevel;static struct buffer buf;struct buffer *streambuf = &buf;#define LOCK   mutex_lock(streambuf->mutex)#define UNLOCK mutex_unlock(streambuf->mutex)static sockfd fd;struct streamstate stream;#if USE_SSLstatic SSL_CTX *SSLctx;SSL *ssl;#endif#if !USE_SSL#define _recv(ssl, fc, buf, n, opt) recv(fd, buf, n, opt)#define _send(ssl, fd, buf, n, opt) send(fd, buf, n, opt)#define _poll(ssl, pollinfo, timeout) poll(pollinfo, 1, timeout)#define _last_error() last_error()#else#define _last_error() ERROR_WOULDBLOCKstatic int _recv(SSL *ssl, int fd, void *buffer, size_t bytes, int options) {	int n;	if (!ssl) return recv(fd, buffer, bytes, options);	n = SSL_read(ssl, (u8_t*) buffer, bytes);	if (n <= 0 && SSL_get_error(ssl, n) == SSL_ERROR_ZERO_RETURN) return 0;	return n;}static int _send(SSL *ssl, int fd, void *buffer, size_t bytes, int options) {	int n;	if (!ssl) return send(fd, buffer, bytes, options);	while (1) {		int err;		ERR_clear_error();		if ((n = SSL_write(ssl, (u8_t*) buffer, bytes)) >= 0) return n;		err = SSL_get_error(ssl, n);		if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) continue;		LOG_INFO("SSL write error %d", err );		return n;	}}/*can't mimic exactly poll as SSL is a real pain. Even if SSL_pending returns0, there might be bytes to read but when select (poll) return > 0, there mightbe no frame available. As well select (poll) < 0 does not mean that there isno data pending*/static int _poll(SSL *ssl, struct pollfd *pollinfo, int timeout) {	if (!ssl) return poll(pollinfo, 1, timeout);	if (pollinfo->events & POLLIN && SSL_pending(ssl)) {		if (pollinfo->events & POLLOUT) poll(pollinfo, 1, 0);		pollinfo->revents = POLLIN;		return 1;	}	return poll(pollinfo, 1, timeout);}#endifstatic bool send_header(void) {	char *ptr = stream.header;	int len = stream.header_len;	unsigned try = 0;	ssize_t n;		while (len) {		n = _send(ssl, fd, ptr, len, MSG_NOSIGNAL);		if (n <= 0) {			if (n < 0 && _last_error() == ERROR_WOULDBLOCK && try < 10) {				LOG_SDEBUG("retrying (%d) writing to socket", ++try);				usleep(1000);				continue;			}			LOG_INFO("failed writing to socket: %s", strerror(last_error()));			stream.disconnect = LOCAL_DISCONNECT;			stream.state = DISCONNECT;			wake_controller();			return false;		}		LOG_SDEBUG("wrote %d bytes to socket", n);		ptr += n;		len -= n;	}	LOG_SDEBUG("wrote header");	return true;}static bool running = true;static void _disconnect(stream_state state, disconnect_code disconnect) {	stream.state = state;	stream.disconnect = disconnect;#if USE_SSL	if (ssl) {		SSL_shutdown(ssl);		SSL_free(ssl);		ssl = NULL;	}#endif	closesocket(fd);	fd = -1;	wake_controller();}static void *stream_thread() {	while (running) {		struct pollfd pollinfo;		size_t space;		LOCK;		space = min(_buf_space(streambuf), _buf_cont_write(streambuf));		if (fd < 0 || !space || stream.state <= STREAMING_WAIT) {			UNLOCK;			usleep(space ? 100000 : 25000);			continue;		}		if (stream.state == STREAMING_FILE) {			int n = read(fd, streambuf->writep, space);			if (n == 0) {				LOG_INFO("end of stream");				_disconnect(DISCONNECT, DISCONNECT_OK);			}			if (n > 0) {				_buf_inc_writep(streambuf, n);				stream.bytes += n;				LOG_SDEBUG("streambuf read %d bytes", n);			}			if (n < 0) {				LOG_WARN("error reading: %s", strerror(last_error()));				_disconnect(DISCONNECT, REMOTE_DISCONNECT);			}			UNLOCK;			continue;		} else {			pollinfo.fd = fd;			pollinfo.events = POLLIN;			if (stream.state == SEND_HEADERS) {				pollinfo.events |= POLLOUT;			}		}		UNLOCK;		if (_poll(ssl, &pollinfo, 100)) {			LOCK;			// check socket has not been closed while in poll			if (fd < 0) {				UNLOCK;				continue;			}			if ((pollinfo.revents & POLLOUT) && stream.state == SEND_HEADERS) {				if (send_header()) stream.state = RECV_HEADERS;				stream.header_len = 0;				UNLOCK;				continue;			}								if (pollinfo.revents & (POLLIN | POLLHUP)) {				// get response headers				if (stream.state == RECV_HEADERS) {					// read one byte at a time to catch end of header					char c;					static int endtok;					int n = _recv(ssl, fd, &c, 1, 0);					if (n <= 0) {						if (n < 0 && _last_error() == ERROR_WOULDBLOCK) {							UNLOCK;							continue;						}						LOG_INFO("error reading headers: %s", n ? strerror(last_error()) : "closed");						_disconnect(STOPPED, LOCAL_DISCONNECT);						UNLOCK;						continue;					}					*(stream.header + stream.header_len) = c;					stream.header_len++;					if (stream.header_len > MAX_HEADER - 1) {						LOG_ERROR("received headers too long: %u", stream.header_len);						_disconnect(DISCONNECT, LOCAL_DISCONNECT);					}					if (stream.header_len > 1 && (c == '\r' || c == '\n')) {						endtok++;						if (endtok == 4) {							*(stream.header + stream.header_len) = '\0';							LOG_INFO("headers: len: %d\n%s", stream.header_len, stream.header);							stream.state = stream.cont_wait ? STREAMING_WAIT : STREAMING_BUFFERING;							wake_controller();						}					} else {						endtok = 0;					}									UNLOCK;					continue;				}								// receive icy meta data				if (stream.meta_interval && stream.meta_next == 0) {					if (stream.meta_left == 0) {						// read meta length						u8_t c;						int n = _recv(ssl, fd, &c, 1, 0);						if (n <= 0) {							if (n < 0 && _last_error() == ERROR_WOULDBLOCK) {								UNLOCK;								continue;							}							LOG_INFO("error reading icy meta: %s", n ? strerror(last_error()) : "closed");							_disconnect(STOPPED, LOCAL_DISCONNECT);							UNLOCK;							continue;						}						stream.meta_left = 16 * c;						stream.header_len = 0; // amount of received meta data						// MAX_HEADER must be more than meta max of 16 * 255					}					if (stream.meta_left) {						int n = _recv(ssl, fd, stream.header + stream.header_len, stream.meta_left, 0);						if (n <= 0) {							if (n < 0 && _last_error() == ERROR_WOULDBLOCK) {								UNLOCK;								continue;							}							LOG_INFO("error reading icy meta: %s", n ? strerror(last_error()) : "closed");							_disconnect(STOPPED, LOCAL_DISCONNECT);							UNLOCK;							continue;						}						stream.meta_left -= n;						stream.header_len += n;					}										if (stream.meta_left == 0) {						if (stream.header_len) {							*(stream.header + stream.header_len) = '\0';							LOG_INFO("icy meta: len: %u\n%s", stream.header_len, stream.header);							stream.meta_send = true;							wake_controller();						}						stream.meta_next = stream.meta_interval;						UNLOCK;						continue;					}				// stream body into streambuf				} else {					int n;					space = min(_buf_space(streambuf), _buf_cont_write(streambuf));					if (stream.meta_interval) {						space = min(space, stream.meta_next);					}										n = _recv(ssl, fd, streambuf->writep, space, 0);					if (n == 0) {						LOG_INFO("end of stream");						_disconnect(DISCONNECT, DISCONNECT_OK);					}					if (n < 0 && _last_error() != ERROR_WOULDBLOCK) {						LOG_INFO("error reading: %s", strerror(last_error()));						_disconnect(DISCONNECT, REMOTE_DISCONNECT);					}										if (n > 0) {						_buf_inc_writep(streambuf, n);						stream.bytes += n;						if (stream.meta_interval) {							stream.meta_next -= n;						}					} else {						UNLOCK;						continue;					}					if (stream.state == STREAMING_BUFFERING && stream.bytes > stream.threshold) {						stream.state = STREAMING_HTTP;						wake_controller();					}									LOG_SDEBUG("streambuf read %d bytes", n);				}			}			UNLOCK;					} else {						LOG_SDEBUG("poll timeout");		}	}	#if USE_SSL		if (SSLctx) {		SSL_CTX_free(SSLctx);	}	#endif		return 0;}static thread_type thread;void stream_init(log_level level, unsigned stream_buf_size) {	loglevel = level;	LOG_INFO("init stream");	LOG_DEBUG("streambuf size: %u", stream_buf_size);	buf_init(streambuf, stream_buf_size);	if (streambuf->buf == NULL) {		LOG_ERROR("unable to malloc buffer");		exit(0);	}	#if USE_SSL#if !LINKALL	if (ssl_loaded) {#endif	SSL_library_init();	SSLctx = SSL_CTX_new(SSLv23_client_method());	if (SSLctx == NULL) {		LOG_ERROR("unable to allocate SSL context");		exit(0);	}		SSL_CTX_set_options(SSLctx, SSL_OP_NO_SSLv2);#if !LINKALL	}#endif		ssl = NULL;#endif	#if SUN	signal(SIGPIPE, SIG_IGN);	/* Force sockets to return -1 with EPIPE on pipe signal */#endif	stream.state = STOPPED;	stream.header = malloc(MAX_HEADER);	*stream.header = '\0';	fd = -1;#if LINUX || FREEBSD	touch_memory(streambuf->buf, streambuf->size);#endif#if LINUX || OSX || FREEBSD || POSIX	pthread_attr_t attr;	pthread_attr_init(&attr);#ifdef PTHREAD_STACK_MIN		pthread_attr_setstacksize(&attr, PTHREAD_STACK_MIN + STREAM_THREAD_STACK_SIZE);#endif	pthread_create(&thread, &attr, stream_thread, NULL);	pthread_attr_destroy(&attr);#endif#if WIN	thread = CreateThread(NULL, STREAM_THREAD_STACK_SIZE, (LPTHREAD_START_ROUTINE)&stream_thread, NULL, 0, NULL);#endif}void stream_close(void) {	LOG_INFO("close stream");	LOCK;	running = false;	UNLOCK;#if LINUX || OSX || FREEBSD || POSIX	pthread_join(thread, NULL);#endif	free(stream.header);	buf_destroy(streambuf);}void stream_file(const char *header, size_t header_len, unsigned threshold) {	buf_flush(streambuf);	LOCK;	stream.header_len = header_len;	memcpy(stream.header, header, header_len);	*(stream.header+header_len) = '\0';	LOG_INFO("opening local file: %s", stream.header);#if WIN	fd = open(stream.header, O_RDONLY | O_BINARY);#else	fd = open(stream.header, O_RDONLY);#endif	stream.state = STREAMING_FILE;	if (fd < 0) {		LOG_INFO("can't open file: %s", stream.header);		stream.state = DISCONNECT;	}	wake_controller();		stream.cont_wait = false;	stream.meta_interval = 0;	stream.meta_next = 0;	stream.meta_left = 0;	stream.meta_send = false;	stream.sent_headers = false;	stream.bytes = 0;	stream.threshold = threshold;	UNLOCK;}void stream_sock(u32_t ip, u16_t port, const char *header, size_t header_len, unsigned threshold, bool cont_wait) {	struct sockaddr_in addr;	int sock = socket(AF_INET, SOCK_STREAM, 0);	if (sock < 0) {		LOG_ERROR("failed to create socket");		return;	}	memset(&addr, 0, sizeof(addr));	addr.sin_family = AF_INET;	addr.sin_addr.s_addr = ip;	addr.sin_port = port;	LOG_INFO("connecting to %s:%d", inet_ntoa(addr.sin_addr), ntohs(addr.sin_port));	set_nonblock(sock);	set_nosigpipe(sock);	if (connect_timeout(sock, (struct sockaddr *) &addr, sizeof(addr), 10) < 0) {		LOG_INFO("unable to connect to server");		LOCK;		stream.state = DISCONNECT;		stream.disconnect = UNREACHABLE;		UNLOCK;		return;	}	#if USE_SSL	if (ntohs(port) == 443) {		char *server = strcasestr(header, "Host:");		ssl = SSL_new(SSLctx);		SSL_set_fd(ssl, sock);		// add SNI		if (server) {			char *p, *servername = malloc(1024);			sscanf(server, "Host:%255[^:]s", servername);			for (p = servername; *p == ' '; p++);			SSL_set_tlsext_host_name(ssl, p);			free(servername);		}				while (1) {			int status, err = 0;			ERR_clear_error();			status = SSL_connect(ssl);			// successful negotiation			if (status == 1) break;			// error or non-blocking requires more time			if (status < 0) {				err = SSL_get_error(ssl, status);				if (err == SSL_ERROR_WANT_READ || err == SSL_ERROR_WANT_WRITE) continue;			}			LOG_WARN("unable to open SSL socket %d (%d)", status, err);			closesocket(sock);			SSL_free(ssl);			ssl = NULL;			LOCK;			stream.state = DISCONNECT;			stream.disconnect = UNREACHABLE;			UNLOCK;			return;		}	} else {		ssl = NULL;		}#endif	buf_flush(streambuf);	LOCK;	fd = sock;	stream.state = SEND_HEADERS;	stream.cont_wait = cont_wait;	stream.meta_interval = 0;	stream.meta_next = 0;	stream.meta_left = 0;	stream.meta_send = false;	stream.header_len = header_len;	memcpy(stream.header, header, header_len);	*(stream.header+header_len) = '\0';	LOG_INFO("header: %s", stream.header);	stream.sent_headers = false;	stream.bytes = 0;	stream.threshold = threshold;	UNLOCK;}bool stream_disconnect(void) {	bool disc = false;	LOCK;#if USE_SSL	if (ssl) {		SSL_shutdown(ssl);		SSL_free(ssl);		ssl = NULL;	}#endif	if (fd != -1) {		closesocket(fd);		fd = -1;		disc = true;	}	stream.state = STOPPED;	UNLOCK;	return disc;}
 |