network: Don't redefine error codes if they already exist in errno.h
[libav.git] / libavformat / network.c
1 /*
2 * Copyright (c) 2007 The Libav Project
3 *
4 * This file is part of Libav.
5 *
6 * Libav is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
10 *
11 * Libav is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with Libav; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
19 */
20
21 #include "network.h"
22 #include "libavcodec/internal.h"
23
24 #define THREADS (HAVE_PTHREADS || (defined(WIN32) && !defined(__MINGW32CE__)))
25
26 #if THREADS
27 #if HAVE_PTHREADS
28 #include <pthread.h>
29 #else
30 #include "libavcodec/w32pthreads.h"
31 #endif
32 #endif
33
34 #if CONFIG_OPENSSL
35 #include <openssl/ssl.h>
36 static int openssl_init;
37 #if THREADS
38 #include <openssl/crypto.h>
39 #include "libavutil/avutil.h"
40 pthread_mutex_t *openssl_mutexes;
41 static void openssl_lock(int mode, int type, const char *file, int line)
42 {
43 if (mode & CRYPTO_LOCK)
44 pthread_mutex_lock(&openssl_mutexes[type]);
45 else
46 pthread_mutex_unlock(&openssl_mutexes[type]);
47 }
48 #if !defined(WIN32) && OPENSSL_VERSION_NUMBER < 0x10000000
49 static unsigned long openssl_thread_id(void)
50 {
51 return (intptr_t) pthread_self();
52 }
53 #endif
54 #endif
55 #endif
56 #if CONFIG_GNUTLS
57 #include <gnutls/gnutls.h>
58 #if THREADS && GNUTLS_VERSION_NUMBER <= 0x020b00
59 #include <gcrypt.h>
60 #include <errno.h>
61 #undef malloc
62 #undef free
63 GCRY_THREAD_OPTION_PTHREAD_IMPL;
64 #endif
65 #endif
66
67 void ff_tls_init(void)
68 {
69 avpriv_lock_avformat();
70 #if CONFIG_OPENSSL
71 if (!openssl_init) {
72 SSL_library_init();
73 SSL_load_error_strings();
74 #if THREADS
75 if (!CRYPTO_get_locking_callback()) {
76 int i;
77 openssl_mutexes = av_malloc(sizeof(pthread_mutex_t) * CRYPTO_num_locks());
78 for (i = 0; i < CRYPTO_num_locks(); i++)
79 pthread_mutex_init(&openssl_mutexes[i], NULL);
80 CRYPTO_set_locking_callback(openssl_lock);
81 #if !defined(WIN32) && OPENSSL_VERSION_NUMBER < 0x10000000
82 CRYPTO_set_id_callback(openssl_thread_id);
83 #endif
84 }
85 #endif
86 }
87 openssl_init++;
88 #endif
89 #if CONFIG_GNUTLS
90 #if THREADS && GNUTLS_VERSION_NUMBER < 0x020b00
91 if (gcry_control(GCRYCTL_ANY_INITIALIZATION_P) == 0)
92 gcry_control(GCRYCTL_SET_THREAD_CBS, &gcry_threads_pthread);
93 #endif
94 gnutls_global_init();
95 #endif
96 avpriv_unlock_avformat();
97 }
98
99 void ff_tls_deinit(void)
100 {
101 avpriv_lock_avformat();
102 #if CONFIG_OPENSSL
103 openssl_init--;
104 if (!openssl_init) {
105 #if THREADS
106 if (CRYPTO_get_locking_callback() == openssl_lock) {
107 int i;
108 CRYPTO_set_locking_callback(NULL);
109 for (i = 0; i < CRYPTO_num_locks(); i++)
110 pthread_mutex_destroy(&openssl_mutexes[i]);
111 av_free(openssl_mutexes);
112 }
113 #endif
114 }
115 #endif
116 #if CONFIG_GNUTLS
117 gnutls_global_deinit();
118 #endif
119 avpriv_unlock_avformat();
120 }
121
122 int ff_network_inited_globally;
123
124 int ff_network_init(void)
125 {
126 #if HAVE_WINSOCK2_H
127 WSADATA wsaData;
128 #endif
129
130 if (!ff_network_inited_globally)
131 av_log(NULL, AV_LOG_WARNING, "Using network protocols without global "
132 "network initialization. Please use "
133 "avformat_network_init(), this will "
134 "become mandatory later.\n");
135 #if HAVE_WINSOCK2_H
136 if (WSAStartup(MAKEWORD(1,1), &wsaData))
137 return 0;
138 #endif
139 return 1;
140 }
141
142 int ff_network_wait_fd(int fd, int write)
143 {
144 int ev = write ? POLLOUT : POLLIN;
145 struct pollfd p = { .fd = fd, .events = ev, .revents = 0 };
146 int ret;
147 ret = poll(&p, 1, 100);
148 return ret < 0 ? ff_neterrno() : p.revents & (ev | POLLERR | POLLHUP) ? 0 : AVERROR(EAGAIN);
149 }
150
151 void ff_network_close(void)
152 {
153 #if HAVE_WINSOCK2_H
154 WSACleanup();
155 #endif
156 }
157
158 #if HAVE_WINSOCK2_H
159 int ff_neterrno(void)
160 {
161 int err = WSAGetLastError();
162 switch (err) {
163 case WSAEWOULDBLOCK:
164 return AVERROR(EAGAIN);
165 case WSAEINTR:
166 return AVERROR(EINTR);
167 case WSAEPROTONOSUPPORT:
168 return AVERROR(EPROTONOSUPPORT);
169 case WSAETIMEDOUT:
170 return AVERROR(ETIMEDOUT);
171 case WSAECONNREFUSED:
172 return AVERROR(ECONNREFUSED);
173 case WSAEINPROGRESS:
174 return AVERROR(EINPROGRESS);
175 }
176 return -err;
177 }
178 #endif
179
180 int ff_is_multicast_address(struct sockaddr *addr)
181 {
182 if (addr->sa_family == AF_INET) {
183 return IN_MULTICAST(ntohl(((struct sockaddr_in *)addr)->sin_addr.s_addr));
184 }
185 #if HAVE_STRUCT_SOCKADDR_IN6
186 if (addr->sa_family == AF_INET6) {
187 return IN6_IS_ADDR_MULTICAST(&((struct sockaddr_in6 *)addr)->sin6_addr);
188 }
189 #endif
190
191 return 0;
192 }