2009-07-31 06:49:36 +00:00
/*
* RTMP network protocol
2013-06-01 08:38:56 +00:00
* Copyright ( c ) 2009 Konstantin Shishkov
2009-07-31 06:49:36 +00:00
*
2011-03-18 17:35:10 +00:00
* This file is part of Libav .
2009-07-31 06:49:36 +00:00
*
2011-03-18 17:35:10 +00:00
* Libav is free software ; you can redistribute it and / or
2009-07-31 06:49:36 +00:00
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation ; either
* version 2.1 of the License , or ( at your option ) any later version .
*
2011-03-18 17:35:10 +00:00
* Libav is distributed in the hope that it will be useful ,
2009-07-31 06:49:36 +00:00
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the GNU
* Lesser General Public License for more details .
*
* You should have received a copy of the GNU Lesser General Public
2011-03-18 17:35:10 +00:00
* License along with Libav ; if not , write to the Free Software
2009-07-31 06:49:36 +00:00
* Foundation , Inc . , 51 Franklin Street , Fifth Floor , Boston , MA 02110 - 1301 USA
*/
/**
2010-04-20 14:45:34 +00:00
* @ file
2009-07-31 06:49:36 +00:00
* RTMP protocol
*/
# include "libavcodec/bytestream.h"
# include "libavutil/avstring.h"
2012-12-30 20:39:38 +00:00
# include "libavutil/base64.h"
2011-11-27 14:04:16 +00:00
# include "libavutil/intfloat.h"
2009-07-31 06:49:36 +00:00
# include "libavutil/lfg.h"
2012-12-30 20:39:38 +00:00
# include "libavutil/md5.h"
2012-04-15 19:49:48 +00:00
# include "libavutil/opt.h"
2012-08-16 14:04:48 +00:00
# include "libavutil/random_seed.h"
2009-07-31 06:49:36 +00:00
# include "libavutil/sha.h"
# include "avformat.h"
2010-03-14 23:59:48 +00:00
# include "internal.h"
2009-07-31 06:49:36 +00:00
# include "network.h"
# include "flv.h"
# include "rtmp.h"
2012-07-19 12:13:58 +00:00
# include "rtmpcrypt.h"
2009-07-31 06:49:36 +00:00
# include "rtmppkt.h"
2011-03-31 14:25:10 +00:00
# include "url.h"
2009-07-31 06:49:36 +00:00
2012-08-15 14:11:50 +00:00
# if CONFIG_ZLIB
# include <zlib.h>
# endif
2012-04-15 19:49:48 +00:00
# define APP_MAX_LENGTH 128
2012-04-15 19:50:50 +00:00
# define PLAYPATH_MAX_LENGTH 256
2012-05-09 00:12:14 +00:00
# define TCURL_MAX_LENGTH 512
2012-05-09 00:12:15 +00:00
# define FLASHVER_MAX_LENGTH 64
2012-08-16 14:04:48 +00:00
# define RTMP_PKTDATA_DEFAULT_SIZE 4096
2013-09-21 19:16:04 +00:00
# define RTMP_HEADER 11
2012-04-15 19:49:48 +00:00
2009-07-31 06:49:36 +00:00
/** RTMP protocol handler state */
typedef enum {
STATE_START , ///< client has not done anything yet
STATE_HANDSHAKED , ///< client has performed handshake
2009-12-04 16:52:16 +00:00
STATE_FCPUBLISH , ///< client FCPublishing stream (for output)
2009-07-31 06:49:36 +00:00
STATE_PLAYING , ///< client has started receiving multimedia data from server
2013-08-02 09:29:23 +00:00
STATE_SEEKING , ///< client has started the seek operation. Back on STATE_PLAYING when the time comes
2009-12-04 16:52:16 +00:00
STATE_PUBLISHING , ///< client has started sending multimedia data to server (for output)
2012-08-16 14:04:48 +00:00
STATE_RECEIVING , ///< received a publish command (for input)
2013-09-15 14:52:33 +00:00
STATE_SENDING , ///< received a play command (for output)
2009-12-11 11:37:21 +00:00
STATE_STOPPED , ///< the broadcast has been stopped
2009-07-31 06:49:36 +00:00
} ClientState ;
2012-08-08 12:36:39 +00:00
typedef struct TrackedMethod {
char * name ;
int id ;
} TrackedMethod ;
2009-07-31 06:49:36 +00:00
/** protocol handler context */
typedef struct RTMPContext {
2012-04-15 19:49:48 +00:00
const AVClass * class ;
2009-07-31 06:49:36 +00:00
URLContext * stream ; ///< TCP stream used in interactions with RTMP server
2013-09-17 14:43:48 +00:00
RTMPPacket prev_pkt [ 2 ] [ RTMP_CHANNELS ] ; ///< packet history used when reading and sending packets ([0] for reading, [1] for writing)
2012-08-10 17:03:22 +00:00
int in_chunk_size ; ///< size of the chunks incoming RTMP packets are divided into
int out_chunk_size ; ///< size of the chunks outgoing RTMP packets are divided into
2009-12-02 12:55:10 +00:00
int is_input ; ///< input/output flag
2012-04-15 19:50:50 +00:00
char * playpath ; ///< stream identifier to play (with possible "mp4:" prefix)
2012-05-05 17:33:26 +00:00
int live ; ///< 0: recorded, -1: live, -2: both
2012-04-15 19:49:48 +00:00
char * app ; ///< name of application
2012-06-08 11:16:34 +00:00
char * conn ; ///< append arbitrary AMF data to the Connect message
2009-07-31 06:49:36 +00:00
ClientState state ; ///< current state
2013-09-16 20:20:58 +00:00
int stream_id ; ///< ID assigned by the server for the stream
2009-07-31 06:49:36 +00:00
uint8_t * flv_data ; ///< buffer with data for demuxer
int flv_size ; ///< current buffer size
int flv_off ; ///< number of bytes read from current buffer
2012-06-18 12:55:55 +00:00
int flv_nb_packets ; ///< number of flv packets published
2009-12-04 16:52:16 +00:00
RTMPPacket out_pkt ; ///< rtmp packet, created from flv a/v or metadata (for output)
2010-02-18 16:27:18 +00:00
uint32_t client_report_size ; ///< number of bytes after which client should report to server
uint32_t bytes_read ; ///< number of bytes read from server
uint32_t last_bytes_read ; ///< number of bytes read last reported to server
2011-09-20 13:00:52 +00:00
int skip_bytes ; ///< number of bytes to skip from the input FLV stream in the next write call
2013-09-21 19:16:04 +00:00
uint8_t flv_header [ RTMP_HEADER ] ; ///< partial incoming flv packet header
2011-09-21 20:21:30 +00:00
int flv_header_bytes ; ///< number of initialized bytes in flv_header
2011-11-12 21:28:58 +00:00
int nb_invokes ; ///< keeps track of invoke messages
2012-05-09 00:12:14 +00:00
char * tcurl ; ///< url of the target stream
2012-05-09 00:12:15 +00:00
char * flashver ; ///< version of the flash plugin
2012-08-13 15:05:00 +00:00
char * swfhash ; ///< SHA256 hash of the decompressed SWF file (32 bytes)
int swfhash_len ; ///< length of the SHA256 hash
int swfsize ; ///< size of the decompressed SWF file
2012-05-09 00:12:16 +00:00
char * swfurl ; ///< url of the swf player
2012-08-15 14:11:50 +00:00
char * swfverify ; ///< URL to player swf file, compute hash/size automatically
2012-08-13 15:05:00 +00:00
char swfverification [ 42 ] ; ///< hash of the SWF verification
2012-07-24 14:29:40 +00:00
char * pageurl ; ///< url of the web page
2012-08-07 20:02:27 +00:00
char * subscribe ; ///< name of live stream to subscribe
2012-06-13 12:47:26 +00:00
int server_bw ; ///< server bandwidth
2012-06-13 12:48:02 +00:00
int client_buffer_time ; ///< client buffer time in ms
2012-06-18 12:55:55 +00:00
int flush_interval ; ///< number of packets flushed in the same request (RTMPT only)
2012-07-19 12:13:58 +00:00
int encrypted ; ///< use an encrypted connection (RTMPE only)
2012-08-08 12:36:39 +00:00
TrackedMethod * tracked_methods ; ///< tracked methods buffer
int nb_tracked_methods ; ///< number of tracked methods
int tracked_methods_size ; ///< size of the tracked methods buffer
2012-08-16 14:04:48 +00:00
int listen ; ///< listen mode flag
int listen_timeout ; ///< listen timeout to wait for new connections
int nb_streamid ; ///< The next stream id to return on createStream calls
2012-12-30 20:39:38 +00:00
char username [ 50 ] ;
char password [ 50 ] ;
char auth_params [ 500 ] ;
int do_reconnect ;
int auth_tried ;
2009-07-31 06:49:36 +00:00
} RTMPContext ;
# define PLAYER_KEY_OPEN_PART_LEN 30 ///< length of partial key used for first client digest signing
/** Client key used for digest signing */
static const uint8_t rtmp_player_key [ ] = {
' G ' , ' e ' , ' n ' , ' u ' , ' i ' , ' n ' , ' e ' , ' ' , ' A ' , ' d ' , ' o ' , ' b ' , ' e ' , ' ' ,
' F ' , ' l ' , ' a ' , ' s ' , ' h ' , ' ' , ' P ' , ' l ' , ' a ' , ' y ' , ' e ' , ' r ' , ' ' , ' 0 ' , ' 0 ' , ' 1 ' ,
0xF0 , 0xEE , 0xC2 , 0x4A , 0x80 , 0x68 , 0xBE , 0xE8 , 0x2E , 0x00 , 0xD0 , 0xD1 , 0x02 ,
0x9E , 0x7E , 0x57 , 0x6E , 0xEC , 0x5D , 0x2D , 0x29 , 0x80 , 0x6F , 0xAB , 0x93 , 0xB8 ,
0xE6 , 0x36 , 0xCF , 0xEB , 0x31 , 0xAE
} ;
# define SERVER_KEY_OPEN_PART_LEN 36 ///< length of partial key used for first server digest signing
/** Key used for RTMP server digest signing */
static const uint8_t rtmp_server_key [ ] = {
' G ' , ' e ' , ' n ' , ' u ' , ' i ' , ' n ' , ' e ' , ' ' , ' A ' , ' d ' , ' o ' , ' b ' , ' e ' , ' ' ,
' F ' , ' l ' , ' a ' , ' s ' , ' h ' , ' ' , ' M ' , ' e ' , ' d ' , ' i ' , ' a ' , ' ' ,
' S ' , ' e ' , ' r ' , ' v ' , ' e ' , ' r ' , ' ' , ' 0 ' , ' 0 ' , ' 1 ' ,
0xF0 , 0xEE , 0xC2 , 0x4A , 0x80 , 0x68 , 0xBE , 0xE8 , 0x2E , 0x00 , 0xD0 , 0xD1 , 0x02 ,
0x9E , 0x7E , 0x57 , 0x6E , 0xEC , 0x5D , 0x2D , 0x29 , 0x80 , 0x6F , 0xAB , 0x93 , 0xB8 ,
0xE6 , 0x36 , 0xCF , 0xEB , 0x31 , 0xAE
} ;
2012-08-08 12:36:39 +00:00
static int add_tracked_method ( RTMPContext * rt , const char * name , int id )
{
2013-09-18 16:12:36 +00:00
int err ;
2012-08-08 12:36:39 +00:00
if ( rt - > nb_tracked_methods + 1 > rt - > tracked_methods_size ) {
rt - > tracked_methods_size = ( rt - > nb_tracked_methods + 1 ) * 2 ;
2013-09-18 16:12:36 +00:00
if ( ( err = av_reallocp ( & rt - > tracked_methods , rt - > tracked_methods_size *
2013-09-26 13:37:02 +00:00
sizeof ( * rt - > tracked_methods ) ) ) < 0 ) {
rt - > nb_tracked_methods = 0 ;
rt - > tracked_methods_size = 0 ;
2013-09-18 16:12:36 +00:00
return err ;
2013-09-26 13:37:02 +00:00
}
2012-08-08 12:36:39 +00:00
}
rt - > tracked_methods [ rt - > nb_tracked_methods ] . name = av_strdup ( name ) ;
if ( ! rt - > tracked_methods [ rt - > nb_tracked_methods ] . name )
return AVERROR ( ENOMEM ) ;
rt - > tracked_methods [ rt - > nb_tracked_methods ] . id = id ;
rt - > nb_tracked_methods + + ;
return 0 ;
}
static void del_tracked_method ( RTMPContext * rt , int index )
{
memmove ( & rt - > tracked_methods [ index ] , & rt - > tracked_methods [ index + 1 ] ,
sizeof ( * rt - > tracked_methods ) * ( rt - > nb_tracked_methods - index - 1 ) ) ;
rt - > nb_tracked_methods - - ;
}
2012-08-11 10:41:32 +00:00
static int find_tracked_method ( URLContext * s , RTMPPacket * pkt , int offset ,
char * * tracked_method )
{
RTMPContext * rt = s - > priv_data ;
GetByteContext gbc ;
double pkt_id ;
int ret ;
int i ;
2013-08-08 16:52:11 +00:00
bytestream2_init ( & gbc , pkt - > data + offset , pkt - > size - offset ) ;
2012-08-11 10:41:32 +00:00
if ( ( ret = ff_amf_read_number ( & gbc , & pkt_id ) ) < 0 )
return ret ;
for ( i = 0 ; i < rt - > nb_tracked_methods ; i + + ) {
if ( rt - > tracked_methods [ i ] . id ! = pkt_id )
continue ;
* tracked_method = rt - > tracked_methods [ i ] . name ;
del_tracked_method ( rt , i ) ;
break ;
}
return 0 ;
}
2012-08-08 12:36:39 +00:00
static void free_tracked_methods ( RTMPContext * rt )
{
int i ;
for ( i = 0 ; i < rt - > nb_tracked_methods ; i + + )
av_free ( rt - > tracked_methods [ i ] . name ) ;
av_free ( rt - > tracked_methods ) ;
2012-12-30 20:39:38 +00:00
rt - > tracked_methods = NULL ;
rt - > tracked_methods_size = 0 ;
rt - > nb_tracked_methods = 0 ;
2012-08-08 12:36:39 +00:00
}
static int rtmp_send_packet ( RTMPContext * rt , RTMPPacket * pkt , int track )
{
int ret ;
if ( pkt - > type = = RTMP_PT_INVOKE & & track ) {
GetByteContext gbc ;
char name [ 128 ] ;
double pkt_id ;
int len ;
2013-08-08 16:52:11 +00:00
bytestream2_init ( & gbc , pkt - > data , pkt - > size ) ;
2012-08-08 12:36:39 +00:00
if ( ( ret = ff_amf_read_string ( & gbc , name , sizeof ( name ) , & len ) ) < 0 )
goto fail ;
if ( ( ret = ff_amf_read_number ( & gbc , & pkt_id ) ) < 0 )
goto fail ;
if ( ( ret = add_tracked_method ( rt , name , pkt_id ) ) < 0 )
goto fail ;
}
2012-08-10 17:03:22 +00:00
ret = ff_rtmp_packet_write ( rt - > stream , pkt , rt - > out_chunk_size ,
2012-08-08 12:36:39 +00:00
rt - > prev_pkt [ 1 ] ) ;
fail :
ff_rtmp_packet_destroy ( pkt ) ;
return ret ;
}
2012-06-08 11:16:34 +00:00
static int rtmp_write_amf_data ( URLContext * s , char * param , uint8_t * * p )
{
2012-06-13 07:51:22 +00:00
char * field , * value ;
2012-06-08 11:16:34 +00:00
char type ;
/* The type must be B for Boolean, N for number, S for string, O for
* object , or Z for null . For Booleans the data must be either 0 or 1 for
* FALSE or TRUE , respectively . Likewise for Objects the data must be
* 0 or 1 to end or begin an object , respectively . Data items in subobjects
* may be named , by prefixing the type with ' N ' and specifying the name
* before the value ( ie . NB : myFlag : 1 ) . This option may be used multiple times
* to construct arbitrary AMF sequences . */
if ( param [ 0 ] & & param [ 1 ] = = ' : ' ) {
type = param [ 0 ] ;
value = param + 2 ;
} else if ( param [ 0 ] = = ' N ' & & param [ 1 ] & & param [ 2 ] = = ' : ' ) {
type = param [ 1 ] ;
2012-06-13 07:51:22 +00:00
field = param + 3 ;
value = strchr ( field , ' : ' ) ;
if ( ! value )
goto fail ;
* value = ' \0 ' ;
value + + ;
2012-06-08 11:16:34 +00:00
if ( ! field | | ! value )
goto fail ;
ff_amf_write_field_name ( p , field ) ;
} else {
goto fail ;
}
switch ( type ) {
case ' B ' :
ff_amf_write_bool ( p , value [ 0 ] ! = ' 0 ' ) ;
break ;
case ' S ' :
ff_amf_write_string ( p , value ) ;
break ;
case ' N ' :
ff_amf_write_number ( p , strtod ( value , NULL ) ) ;
break ;
case ' Z ' :
ff_amf_write_null ( p ) ;
break ;
case ' O ' :
if ( value [ 0 ] ! = ' 0 ' )
ff_amf_write_object_start ( p ) ;
else
ff_amf_write_object_end ( p ) ;
break ;
default :
goto fail ;
break ;
}
return 0 ;
fail :
av_log ( s , AV_LOG_ERROR , " Invalid AMF parameter: %s \n " , param ) ;
return AVERROR ( EINVAL ) ;
}
2009-07-31 06:49:36 +00:00
/**
2010-06-30 15:38:06 +00:00
* Generate ' connect ' call and send it to the server .
2009-07-31 06:49:36 +00:00
*/
2012-05-23 20:45:03 +00:00
static int gen_connect ( URLContext * s , RTMPContext * rt )
2009-07-31 06:49:36 +00:00
{
RTMPPacket pkt ;
2012-05-09 00:12:15 +00:00
uint8_t * p ;
2012-05-23 20:45:03 +00:00
int ret ;
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SYSTEM_CHANNEL , RTMP_PT_INVOKE ,
0 , 4096 ) ) < 0 )
return ret ;
2009-07-31 06:49:36 +00:00
p = pkt . data ;
ff_amf_write_string ( & p , " connect " ) ;
2011-12-05 10:35:06 +00:00
ff_amf_write_number ( & p , + + rt - > nb_invokes ) ;
2009-07-31 06:49:36 +00:00
ff_amf_write_object_start ( & p ) ;
ff_amf_write_field_name ( & p , " app " ) ;
2012-12-30 20:39:38 +00:00
ff_amf_write_string2 ( & p , rt - > app , rt - > auth_params ) ;
2009-07-31 06:49:36 +00:00
2012-05-09 00:12:15 +00:00
if ( ! rt - > is_input ) {
2009-12-04 16:52:16 +00:00
ff_amf_write_field_name ( & p , " type " ) ;
ff_amf_write_string ( & p , " nonprivate " ) ;
}
2009-07-31 06:49:36 +00:00
ff_amf_write_field_name ( & p , " flashVer " ) ;
2012-05-09 00:12:15 +00:00
ff_amf_write_string ( & p , rt - > flashver ) ;
2012-05-09 00:12:16 +00:00
if ( rt - > swfurl ) {
ff_amf_write_field_name ( & p , " swfUrl " ) ;
ff_amf_write_string ( & p , rt - > swfurl ) ;
}
2009-07-31 06:49:36 +00:00
ff_amf_write_field_name ( & p , " tcUrl " ) ;
2012-12-30 20:39:38 +00:00
ff_amf_write_string2 ( & p , rt - > tcurl , rt - > auth_params ) ;
2009-12-04 16:52:16 +00:00
if ( rt - > is_input ) {
2009-12-04 16:52:42 +00:00
ff_amf_write_field_name ( & p , " fpad " ) ;
ff_amf_write_bool ( & p , 0 ) ;
ff_amf_write_field_name ( & p , " capabilities " ) ;
ff_amf_write_number ( & p , 15.0 ) ;
2012-04-02 20:50:38 +00:00
/* Tell the server we support all the audio codecs except
* SUPPORT_SND_INTEL ( 0x0008 ) and SUPPORT_SND_UNUSED ( 0x0010 )
* which are unused in the RTMP protocol implementation . */
2009-12-04 16:52:42 +00:00
ff_amf_write_field_name ( & p , " audioCodecs " ) ;
2012-04-02 20:50:38 +00:00
ff_amf_write_number ( & p , 4071.0 ) ;
2009-12-04 16:52:42 +00:00
ff_amf_write_field_name ( & p , " videoCodecs " ) ;
ff_amf_write_number ( & p , 252.0 ) ;
ff_amf_write_field_name ( & p , " videoFunction " ) ;
ff_amf_write_number ( & p , 1.0 ) ;
2012-07-24 14:29:40 +00:00
if ( rt - > pageurl ) {
ff_amf_write_field_name ( & p , " pageUrl " ) ;
ff_amf_write_string ( & p , rt - > pageurl ) ;
}
2009-12-04 16:52:16 +00:00
}
2009-07-31 06:49:36 +00:00
ff_amf_write_object_end ( & p ) ;
2012-06-08 11:16:34 +00:00
if ( rt - > conn ) {
2012-06-13 07:51:22 +00:00
char * param = rt - > conn ;
2012-06-08 11:16:34 +00:00
// Write arbitrary AMF data to the Connect message.
while ( param ! = NULL ) {
2012-06-13 07:51:22 +00:00
char * sep ;
param + = strspn ( param , " " ) ;
if ( ! * param )
break ;
sep = strchr ( param , ' ' ) ;
if ( sep )
* sep = ' \0 ' ;
2012-06-08 11:16:34 +00:00
if ( ( ret = rtmp_write_amf_data ( s , param , & p ) ) < 0 ) {
// Invalid AMF parameter.
ff_rtmp_packet_destroy ( & pkt ) ;
return ret ;
}
2012-06-13 07:51:22 +00:00
if ( sep )
param = sep + 1 ;
else
break ;
2012-06-08 11:16:34 +00:00
}
}
2013-08-08 16:52:11 +00:00
pkt . size = p - pkt . data ;
2009-07-31 06:49:36 +00:00
2012-08-08 12:36:39 +00:00
return rtmp_send_packet ( rt , & pkt , 1 ) ;
2009-07-31 06:49:36 +00:00
}
2012-08-16 14:04:48 +00:00
static int read_connect ( URLContext * s , RTMPContext * rt )
{
RTMPPacket pkt = { 0 } ;
uint8_t * p ;
const uint8_t * cp ;
int ret ;
char command [ 64 ] ;
int stringlen ;
double seqnum ;
uint8_t tmpstr [ 256 ] ;
GetByteContext gbc ;
if ( ( ret = ff_rtmp_packet_read ( rt - > stream , & pkt , rt - > in_chunk_size ,
2013-09-17 13:53:11 +00:00
rt - > prev_pkt [ 0 ] ) ) < 0 )
2012-08-16 14:04:48 +00:00
return ret ;
cp = pkt . data ;
2013-08-08 16:52:11 +00:00
bytestream2_init ( & gbc , cp , pkt . size ) ;
2012-08-16 14:04:48 +00:00
if ( ff_amf_read_string ( & gbc , command , sizeof ( command ) , & stringlen ) ) {
av_log ( s , AV_LOG_ERROR , " Unable to read command string \n " ) ;
ff_rtmp_packet_destroy ( & pkt ) ;
return AVERROR_INVALIDDATA ;
}
if ( strcmp ( command , " connect " ) ) {
av_log ( s , AV_LOG_ERROR , " Expecting connect, got %s \n " , command ) ;
ff_rtmp_packet_destroy ( & pkt ) ;
return AVERROR_INVALIDDATA ;
}
ret = ff_amf_read_number ( & gbc , & seqnum ) ;
if ( ret )
av_log ( s , AV_LOG_WARNING , " SeqNum not found \n " ) ;
/* Here one could parse an AMF Object with data as flashVers and others. */
ret = ff_amf_get_field_value ( gbc . buffer ,
gbc . buffer + bytestream2_get_bytes_left ( & gbc ) ,
" app " , tmpstr , sizeof ( tmpstr ) ) ;
if ( ret )
av_log ( s , AV_LOG_WARNING , " App field not found in connect \n " ) ;
if ( ! ret & & strcmp ( tmpstr , rt - > app ) )
av_log ( s , AV_LOG_WARNING , " App field don't match up: %s <-> %s \n " ,
tmpstr , rt - > app ) ;
ff_rtmp_packet_destroy ( & pkt ) ;
// Send Window Acknowledgement Size (as defined in speficication)
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_NETWORK_CHANNEL ,
RTMP_PT_SERVER_BW , 0 , 4 ) ) < 0 )
return ret ;
p = pkt . data ;
bytestream_put_be32 ( & p , rt - > server_bw ) ;
2013-08-08 16:52:11 +00:00
pkt . size = p - pkt . data ;
2012-08-16 14:04:48 +00:00
ret = ff_rtmp_packet_write ( rt - > stream , & pkt , rt - > out_chunk_size ,
rt - > prev_pkt [ 1 ] ) ;
ff_rtmp_packet_destroy ( & pkt ) ;
if ( ret < 0 )
return ret ;
// Send Peer Bandwidth
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_NETWORK_CHANNEL ,
RTMP_PT_CLIENT_BW , 0 , 5 ) ) < 0 )
return ret ;
p = pkt . data ;
bytestream_put_be32 ( & p , rt - > server_bw ) ;
bytestream_put_byte ( & p , 2 ) ; // dynamic
2013-08-08 16:52:11 +00:00
pkt . size = p - pkt . data ;
2012-08-16 14:04:48 +00:00
ret = ff_rtmp_packet_write ( rt - > stream , & pkt , rt - > out_chunk_size ,
rt - > prev_pkt [ 1 ] ) ;
ff_rtmp_packet_destroy ( & pkt ) ;
if ( ret < 0 )
return ret ;
// Ping request
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_NETWORK_CHANNEL ,
RTMP_PT_PING , 0 , 6 ) ) < 0 )
return ret ;
p = pkt . data ;
bytestream_put_be16 ( & p , 0 ) ; // 0 -> Stream Begin
bytestream_put_be32 ( & p , 0 ) ;
ret = ff_rtmp_packet_write ( rt - > stream , & pkt , rt - > out_chunk_size ,
rt - > prev_pkt [ 1 ] ) ;
ff_rtmp_packet_destroy ( & pkt ) ;
if ( ret < 0 )
return ret ;
// Chunk size
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SYSTEM_CHANNEL ,
RTMP_PT_CHUNK_SIZE , 0 , 4 ) ) < 0 )
return ret ;
p = pkt . data ;
bytestream_put_be32 ( & p , rt - > out_chunk_size ) ;
ret = ff_rtmp_packet_write ( rt - > stream , & pkt , rt - > out_chunk_size ,
rt - > prev_pkt [ 1 ] ) ;
ff_rtmp_packet_destroy ( & pkt ) ;
if ( ret < 0 )
return ret ;
// Send result_ NetConnection.Connect.Success to connect
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SYSTEM_CHANNEL ,
RTMP_PT_INVOKE , 0 ,
RTMP_PKTDATA_DEFAULT_SIZE ) ) < 0 )
return ret ;
p = pkt . data ;
ff_amf_write_string ( & p , " _result " ) ;
ff_amf_write_number ( & p , seqnum ) ;
ff_amf_write_object_start ( & p ) ;
ff_amf_write_field_name ( & p , " fmsVer " ) ;
ff_amf_write_string ( & p , " FMS/3,0,1,123 " ) ;
ff_amf_write_field_name ( & p , " capabilities " ) ;
ff_amf_write_number ( & p , 31 ) ;
ff_amf_write_object_end ( & p ) ;
ff_amf_write_object_start ( & p ) ;
ff_amf_write_field_name ( & p , " level " ) ;
ff_amf_write_string ( & p , " status " ) ;
ff_amf_write_field_name ( & p , " code " ) ;
ff_amf_write_string ( & p , " NetConnection.Connect.Success " ) ;
ff_amf_write_field_name ( & p , " description " ) ;
ff_amf_write_string ( & p , " Connection succeeded. " ) ;
ff_amf_write_field_name ( & p , " objectEncoding " ) ;
ff_amf_write_number ( & p , 0 ) ;
ff_amf_write_object_end ( & p ) ;
2013-08-08 16:52:11 +00:00
pkt . size = p - pkt . data ;
2012-08-16 14:04:48 +00:00
ret = ff_rtmp_packet_write ( rt - > stream , & pkt , rt - > out_chunk_size ,
rt - > prev_pkt [ 1 ] ) ;
ff_rtmp_packet_destroy ( & pkt ) ;
if ( ret < 0 )
return ret ;
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SYSTEM_CHANNEL ,
RTMP_PT_INVOKE , 0 , 30 ) ) < 0 )
return ret ;
p = pkt . data ;
ff_amf_write_string ( & p , " onBWDone " ) ;
ff_amf_write_number ( & p , 0 ) ;
ff_amf_write_null ( & p ) ;
ff_amf_write_number ( & p , 8192 ) ;
2013-08-08 16:52:11 +00:00
pkt . size = p - pkt . data ;
2012-08-16 14:04:48 +00:00
ret = ff_rtmp_packet_write ( rt - > stream , & pkt , rt - > out_chunk_size ,
rt - > prev_pkt [ 1 ] ) ;
ff_rtmp_packet_destroy ( & pkt ) ;
return ret ;
}
2009-12-04 16:52:16 +00:00
/**
2010-06-30 15:38:06 +00:00
* Generate ' releaseStream ' call and send it to the server . It should make
2009-12-04 16:52:16 +00:00
* the server release some channel for media streams .
*/
2012-05-23 20:45:03 +00:00
static int gen_release_stream ( URLContext * s , RTMPContext * rt )
2009-12-04 16:52:16 +00:00
{
RTMPPacket pkt ;
uint8_t * p ;
2012-05-23 20:45:03 +00:00
int ret ;
2009-12-04 16:52:16 +00:00
2012-05-23 20:45:03 +00:00
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SYSTEM_CHANNEL , RTMP_PT_INVOKE ,
0 , 29 + strlen ( rt - > playpath ) ) ) < 0 )
return ret ;
2009-12-04 16:52:16 +00:00
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_DEBUG , " Releasing stream... \n " ) ;
2009-12-04 16:52:16 +00:00
p = pkt . data ;
ff_amf_write_string ( & p , " releaseStream " ) ;
2011-11-12 21:28:58 +00:00
ff_amf_write_number ( & p , + + rt - > nb_invokes ) ;
2009-12-04 16:52:16 +00:00
ff_amf_write_null ( & p ) ;
ff_amf_write_string ( & p , rt - > playpath ) ;
2012-08-19 11:02:23 +00:00
return rtmp_send_packet ( rt , & pkt , 1 ) ;
2009-12-04 16:52:16 +00:00
}
/**
2010-06-30 15:38:06 +00:00
* Generate ' FCPublish ' call and send it to the server . It should make
2009-12-04 16:52:16 +00:00
* the server preapare for receiving media streams .
*/
2012-05-23 20:45:03 +00:00
static int gen_fcpublish_stream ( URLContext * s , RTMPContext * rt )
2009-12-04 16:52:16 +00:00
{
RTMPPacket pkt ;
uint8_t * p ;
2012-05-23 20:45:03 +00:00
int ret ;
2009-12-04 16:52:16 +00:00
2012-05-23 20:45:03 +00:00
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SYSTEM_CHANNEL , RTMP_PT_INVOKE ,
0 , 25 + strlen ( rt - > playpath ) ) ) < 0 )
return ret ;
2009-12-04 16:52:16 +00:00
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_DEBUG , " FCPublish stream... \n " ) ;
2009-12-04 16:52:16 +00:00
p = pkt . data ;
ff_amf_write_string ( & p , " FCPublish " ) ;
2011-11-12 21:28:58 +00:00
ff_amf_write_number ( & p , + + rt - > nb_invokes ) ;
2009-12-04 16:52:16 +00:00
ff_amf_write_null ( & p ) ;
ff_amf_write_string ( & p , rt - > playpath ) ;
2012-08-19 11:02:23 +00:00
return rtmp_send_packet ( rt , & pkt , 1 ) ;
2009-12-04 16:52:16 +00:00
}
/**
2010-06-30 15:38:06 +00:00
* Generate ' FCUnpublish ' call and send it to the server . It should make
2009-12-04 16:52:16 +00:00
* the server destroy stream .
*/
2012-05-23 20:45:03 +00:00
static int gen_fcunpublish_stream ( URLContext * s , RTMPContext * rt )
2009-12-04 16:52:16 +00:00
{
RTMPPacket pkt ;
uint8_t * p ;
2012-05-23 20:45:03 +00:00
int ret ;
2009-12-04 16:52:16 +00:00
2012-05-23 20:45:03 +00:00
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SYSTEM_CHANNEL , RTMP_PT_INVOKE ,
0 , 27 + strlen ( rt - > playpath ) ) ) < 0 )
return ret ;
2009-12-04 16:52:16 +00:00
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_DEBUG , " UnPublishing stream... \n " ) ;
2009-12-04 16:52:16 +00:00
p = pkt . data ;
ff_amf_write_string ( & p , " FCUnpublish " ) ;
2011-11-12 21:28:58 +00:00
ff_amf_write_number ( & p , + + rt - > nb_invokes ) ;
2009-12-04 16:52:16 +00:00
ff_amf_write_null ( & p ) ;
ff_amf_write_string ( & p , rt - > playpath ) ;
2012-08-08 12:36:39 +00:00
return rtmp_send_packet ( rt , & pkt , 0 ) ;
2009-12-04 16:52:16 +00:00
}
2009-07-31 06:49:36 +00:00
/**
2010-06-30 15:38:06 +00:00
* Generate ' createStream ' call and send it to the server . It should make
2009-07-31 06:49:36 +00:00
* the server allocate some channel for media streams .
*/
2012-05-23 20:45:03 +00:00
static int gen_create_stream ( URLContext * s , RTMPContext * rt )
2009-07-31 06:49:36 +00:00
{
RTMPPacket pkt ;
uint8_t * p ;
2012-05-23 20:45:03 +00:00
int ret ;
2009-07-31 06:49:36 +00:00
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_DEBUG , " Creating stream... \n " ) ;
2012-05-23 20:45:03 +00:00
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SYSTEM_CHANNEL , RTMP_PT_INVOKE ,
0 , 25 ) ) < 0 )
return ret ;
2009-07-31 06:49:36 +00:00
p = pkt . data ;
ff_amf_write_string ( & p , " createStream " ) ;
2011-11-12 21:28:58 +00:00
ff_amf_write_number ( & p , + + rt - > nb_invokes ) ;
2009-12-04 16:52:16 +00:00
ff_amf_write_null ( & p ) ;
2012-08-08 12:36:39 +00:00
return rtmp_send_packet ( rt , & pkt , 1 ) ;
2009-12-04 16:52:16 +00:00
}
/**
2010-06-30 15:38:06 +00:00
* Generate ' deleteStream ' call and send it to the server . It should make
2009-12-04 16:52:16 +00:00
* the server remove some channel for media streams .
*/
2012-05-23 20:45:03 +00:00
static int gen_delete_stream ( URLContext * s , RTMPContext * rt )
2009-12-04 16:52:16 +00:00
{
RTMPPacket pkt ;
uint8_t * p ;
2012-05-23 20:45:03 +00:00
int ret ;
2009-12-04 16:52:16 +00:00
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_DEBUG , " Deleting stream... \n " ) ;
2012-05-23 20:45:03 +00:00
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SYSTEM_CHANNEL , RTMP_PT_INVOKE ,
0 , 34 ) ) < 0 )
return ret ;
2009-12-04 16:52:16 +00:00
p = pkt . data ;
ff_amf_write_string ( & p , " deleteStream " ) ;
2011-12-05 10:35:06 +00:00
ff_amf_write_number ( & p , + + rt - > nb_invokes ) ;
2009-07-31 06:49:36 +00:00
ff_amf_write_null ( & p ) ;
2013-09-16 20:20:58 +00:00
ff_amf_write_number ( & p , rt - > stream_id ) ;
2009-07-31 06:49:36 +00:00
2012-08-08 12:36:39 +00:00
return rtmp_send_packet ( rt , & pkt , 0 ) ;
2009-07-31 06:49:36 +00:00
}
2012-06-13 12:48:02 +00:00
/**
* Generate client buffer time and send it to the server .
*/
static int gen_buffer_time ( URLContext * s , RTMPContext * rt )
{
RTMPPacket pkt ;
uint8_t * p ;
int ret ;
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_NETWORK_CHANNEL , RTMP_PT_PING ,
1 , 10 ) ) < 0 )
return ret ;
p = pkt . data ;
bytestream_put_be16 ( & p , 3 ) ;
2013-09-16 20:20:58 +00:00
bytestream_put_be32 ( & p , rt - > stream_id ) ;
2012-06-13 12:48:02 +00:00
bytestream_put_be32 ( & p , rt - > client_buffer_time ) ;
2012-08-08 12:36:39 +00:00
return rtmp_send_packet ( rt , & pkt , 0 ) ;
2012-06-13 12:48:02 +00:00
}
2009-07-31 06:49:36 +00:00
/**
2010-06-30 15:38:06 +00:00
* Generate ' play ' call and send it to the server , then ping the server
2009-07-31 06:49:36 +00:00
* to start actual playing .
*/
2012-05-23 20:45:03 +00:00
static int gen_play ( URLContext * s , RTMPContext * rt )
2009-07-31 06:49:36 +00:00
{
RTMPPacket pkt ;
uint8_t * p ;
2012-05-23 20:45:03 +00:00
int ret ;
2009-07-31 06:49:36 +00:00
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_DEBUG , " Sending play command for '%s' \n " , rt - > playpath ) ;
2012-05-23 20:45:03 +00:00
2013-09-16 20:20:57 +00:00
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SOURCE_CHANNEL , RTMP_PT_INVOKE ,
2012-05-23 20:45:03 +00:00
0 , 29 + strlen ( rt - > playpath ) ) ) < 0 )
return ret ;
2013-09-16 20:20:58 +00:00
pkt . extra = rt - > stream_id ;
2009-07-31 06:49:36 +00:00
p = pkt . data ;
ff_amf_write_string ( & p , " play " ) ;
2011-12-05 10:35:06 +00:00
ff_amf_write_number ( & p , + + rt - > nb_invokes ) ;
2009-07-31 06:49:36 +00:00
ff_amf_write_null ( & p ) ;
ff_amf_write_string ( & p , rt - > playpath ) ;
2013-10-03 07:09:56 +00:00
ff_amf_write_number ( & p , rt - > live * 1000 ) ;
2009-07-31 06:49:36 +00:00
2012-08-08 12:36:39 +00:00
return rtmp_send_packet ( rt , & pkt , 1 ) ;
2009-07-31 06:49:36 +00:00
}
2013-08-02 09:29:23 +00:00
static int gen_seek ( URLContext * s , RTMPContext * rt , int64_t timestamp )
{
RTMPPacket pkt ;
uint8_t * p ;
int ret ;
2013-08-08 15:43:15 +00:00
av_log ( s , AV_LOG_DEBUG , " Sending seek command for timestamp % " PRId64 " \n " ,
timestamp ) ;
2013-08-02 09:29:23 +00:00
if ( ( ret = ff_rtmp_packet_create ( & pkt , 3 , RTMP_PT_INVOKE , 0 , 26 ) ) < 0 )
return ret ;
2013-09-16 20:20:58 +00:00
pkt . extra = rt - > stream_id ;
2013-08-02 09:29:23 +00:00
p = pkt . data ;
ff_amf_write_string ( & p , " seek " ) ;
ff_amf_write_number ( & p , 0 ) ; //no tracking back responses
ff_amf_write_null ( & p ) ; //as usual, the first null param
ff_amf_write_number ( & p , timestamp ) ; //where we want to jump
return rtmp_send_packet ( rt , & pkt , 1 ) ;
}
2009-12-04 16:52:16 +00:00
/**
2010-06-30 15:38:06 +00:00
* Generate ' publish ' call and send it to the server .
2009-12-04 16:52:16 +00:00
*/
2012-05-23 20:45:03 +00:00
static int gen_publish ( URLContext * s , RTMPContext * rt )
2009-12-04 16:52:16 +00:00
{
RTMPPacket pkt ;
uint8_t * p ;
2012-05-23 20:45:03 +00:00
int ret ;
2009-12-04 16:52:16 +00:00
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_DEBUG , " Sending publish command for '%s' \n " , rt - > playpath ) ;
2012-05-23 20:45:03 +00:00
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SOURCE_CHANNEL , RTMP_PT_INVOKE ,
0 , 30 + strlen ( rt - > playpath ) ) ) < 0 )
return ret ;
2013-09-16 20:20:58 +00:00
pkt . extra = rt - > stream_id ;
2009-12-04 16:52:16 +00:00
p = pkt . data ;
ff_amf_write_string ( & p , " publish " ) ;
2011-12-05 10:35:06 +00:00
ff_amf_write_number ( & p , + + rt - > nb_invokes ) ;
2009-12-04 16:52:16 +00:00
ff_amf_write_null ( & p ) ;
ff_amf_write_string ( & p , rt - > playpath ) ;
ff_amf_write_string ( & p , " live " ) ;
2012-08-08 12:36:39 +00:00
return rtmp_send_packet ( rt , & pkt , 1 ) ;
2009-12-04 16:52:16 +00:00
}
2009-07-31 06:49:36 +00:00
/**
2010-06-30 15:38:06 +00:00
* Generate ping reply and send it to the server .
2009-07-31 06:49:36 +00:00
*/
2012-05-23 20:45:03 +00:00
static int gen_pong ( URLContext * s , RTMPContext * rt , RTMPPacket * ppkt )
2009-07-31 06:49:36 +00:00
{
RTMPPacket pkt ;
uint8_t * p ;
2012-05-23 20:45:03 +00:00
int ret ;
2013-08-08 16:52:11 +00:00
if ( ppkt - > size < 6 ) {
2012-07-26 18:45:42 +00:00
av_log ( s , AV_LOG_ERROR , " Too short ping packet (%d) \n " ,
2013-08-08 16:52:11 +00:00
ppkt - > size ) ;
2012-07-26 18:45:42 +00:00
return AVERROR_INVALIDDATA ;
}
2012-05-23 20:45:03 +00:00
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_NETWORK_CHANNEL , RTMP_PT_PING ,
ppkt - > timestamp + 1 , 6 ) ) < 0 )
return ret ;
2009-07-31 06:49:36 +00:00
p = pkt . data ;
bytestream_put_be16 ( & p , 7 ) ;
2009-12-16 12:49:38 +00:00
bytestream_put_be32 ( & p , AV_RB32 ( ppkt - > data + 2 ) ) ;
2012-05-23 20:45:03 +00:00
2012-08-08 12:36:39 +00:00
return rtmp_send_packet ( rt , & pkt , 0 ) ;
2009-07-31 06:49:36 +00:00
}
2012-08-13 15:05:00 +00:00
/**
* Generate SWF verification message and send it to the server .
*/
static int gen_swf_verification ( URLContext * s , RTMPContext * rt )
{
RTMPPacket pkt ;
uint8_t * p ;
int ret ;
av_log ( s , AV_LOG_DEBUG , " Sending SWF verification... \n " ) ;
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_NETWORK_CHANNEL , RTMP_PT_PING ,
0 , 44 ) ) < 0 )
return ret ;
p = pkt . data ;
bytestream_put_be16 ( & p , 27 ) ;
memcpy ( p , rt - > swfverification , 42 ) ;
return rtmp_send_packet ( rt , & pkt , 0 ) ;
}
2012-03-07 18:21:16 +00:00
/**
* Generate server bandwidth message and send it to the server .
*/
2012-05-23 20:45:03 +00:00
static int gen_server_bw ( URLContext * s , RTMPContext * rt )
2012-03-07 18:21:16 +00:00
{
RTMPPacket pkt ;
uint8_t * p ;
2012-05-23 20:45:03 +00:00
int ret ;
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_NETWORK_CHANNEL , RTMP_PT_SERVER_BW ,
0 , 4 ) ) < 0 )
return ret ;
2012-03-07 18:21:16 +00:00
p = pkt . data ;
2012-06-13 12:47:26 +00:00
bytestream_put_be32 ( & p , rt - > server_bw ) ;
2012-05-23 20:45:03 +00:00
2012-08-08 12:36:39 +00:00
return rtmp_send_packet ( rt , & pkt , 0 ) ;
2012-03-07 18:21:16 +00:00
}
2012-05-08 22:58:09 +00:00
/**
* Generate check bandwidth message and send it to the server .
*/
2012-05-23 20:45:03 +00:00
static int gen_check_bw ( URLContext * s , RTMPContext * rt )
2012-05-08 22:58:09 +00:00
{
RTMPPacket pkt ;
uint8_t * p ;
2012-05-23 20:45:03 +00:00
int ret ;
2012-05-08 22:58:09 +00:00
2012-05-23 20:45:03 +00:00
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SYSTEM_CHANNEL , RTMP_PT_INVOKE ,
0 , 21 ) ) < 0 )
return ret ;
2012-05-08 22:58:09 +00:00
p = pkt . data ;
ff_amf_write_string ( & p , " _checkbw " ) ;
2012-08-11 10:41:33 +00:00
ff_amf_write_number ( & p , + + rt - > nb_invokes ) ;
2012-05-08 22:58:09 +00:00
ff_amf_write_null ( & p ) ;
2012-08-11 10:42:17 +00:00
return rtmp_send_packet ( rt , & pkt , 1 ) ;
2012-05-08 22:58:09 +00:00
}
2010-02-18 16:27:18 +00:00
/**
2010-06-30 15:38:06 +00:00
* Generate report on bytes read so far and send it to the server .
2010-02-18 16:27:18 +00:00
*/
2012-05-23 20:45:03 +00:00
static int gen_bytes_read ( URLContext * s , RTMPContext * rt , uint32_t ts )
2010-02-18 16:27:18 +00:00
{
RTMPPacket pkt ;
uint8_t * p ;
2012-05-23 20:45:03 +00:00
int ret ;
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_NETWORK_CHANNEL , RTMP_PT_BYTES_READ ,
ts , 4 ) ) < 0 )
return ret ;
2010-02-18 16:27:18 +00:00
p = pkt . data ;
bytestream_put_be32 ( & p , rt - > bytes_read ) ;
2012-05-23 20:45:03 +00:00
2012-08-08 12:36:39 +00:00
return rtmp_send_packet ( rt , & pkt , 0 ) ;
2010-02-18 16:27:18 +00:00
}
2012-08-07 20:02:27 +00:00
static int gen_fcsubscribe_stream ( URLContext * s , RTMPContext * rt ,
const char * subscribe )
2012-08-07 19:51:46 +00:00
{
RTMPPacket pkt ;
uint8_t * p ;
int ret ;
if ( ( ret = ff_rtmp_packet_create ( & pkt , RTMP_SYSTEM_CHANNEL , RTMP_PT_INVOKE ,
2012-08-07 20:02:27 +00:00
0 , 27 + strlen ( subscribe ) ) ) < 0 )
2012-08-07 19:51:46 +00:00
return ret ;
p = pkt . data ;
ff_amf_write_string ( & p , " FCSubscribe " ) ;
ff_amf_write_number ( & p , + + rt - > nb_invokes ) ;
ff_amf_write_null ( & p ) ;
2012-08-07 20:02:27 +00:00
ff_amf_write_string ( & p , subscribe ) ;
2012-08-07 19:51:46 +00:00
2012-08-08 12:36:39 +00:00
return rtmp_send_packet ( rt , & pkt , 1 ) ;
2012-08-07 19:51:46 +00:00
}
2012-07-05 11:05:46 +00:00
int ff_rtmp_calc_digest ( const uint8_t * src , int len , int gap ,
const uint8_t * key , int keylen , uint8_t * dst )
2009-07-31 06:49:36 +00:00
{
struct AVSHA * sha ;
uint8_t hmac_buf [ 64 + 32 ] = { 0 } ;
int i ;
2012-10-11 12:10:45 +00:00
sha = av_sha_alloc ( ) ;
2012-05-23 16:55:34 +00:00
if ( ! sha )
return AVERROR ( ENOMEM ) ;
2009-07-31 06:49:36 +00:00
if ( keylen < 64 ) {
memcpy ( hmac_buf , key , keylen ) ;
} else {
av_sha_init ( sha , 256 ) ;
av_sha_update ( sha , key , keylen ) ;
av_sha_final ( sha , hmac_buf ) ;
}
for ( i = 0 ; i < 64 ; i + + )
hmac_buf [ i ] ^ = HMAC_IPAD_VAL ;
av_sha_init ( sha , 256 ) ;
av_sha_update ( sha , hmac_buf , 64 ) ;
if ( gap < = 0 ) {
av_sha_update ( sha , src , len ) ;
} else { //skip 32 bytes used for storing digest
av_sha_update ( sha , src , gap ) ;
av_sha_update ( sha , src + gap + 32 , len - gap - 32 ) ;
}
av_sha_final ( sha , hmac_buf + 64 ) ;
for ( i = 0 ; i < 64 ; i + + )
hmac_buf [ i ] ^ = HMAC_IPAD_VAL ^ HMAC_OPAD_VAL ; //reuse XORed key for opad
av_sha_init ( sha , 256 ) ;
av_sha_update ( sha , hmac_buf , 64 + 32 ) ;
av_sha_final ( sha , dst ) ;
av_free ( sha ) ;
2012-05-23 16:55:34 +00:00
return 0 ;
2009-07-31 06:49:36 +00:00
}
2012-07-05 11:06:07 +00:00
int ff_rtmp_calc_digest_pos ( const uint8_t * buf , int off , int mod_val ,
int add_val )
{
int i , digest_pos = 0 ;
for ( i = 0 ; i < 4 ; i + + )
digest_pos + = buf [ i + off ] ;
digest_pos = digest_pos % mod_val + add_val ;
return digest_pos ;
}
2009-07-31 06:49:36 +00:00
/**
2010-06-30 15:38:06 +00:00
* Put HMAC - SHA2 digest of packet data ( except for the bytes where this digest
2009-07-31 06:49:36 +00:00
* will be stored ) into that packet .
*
* @ param buf handshake data ( 1536 bytes )
2012-07-19 12:13:58 +00:00
* @ param encrypted use an encrypted connection ( RTMPE )
2009-07-31 06:49:36 +00:00
* @ return offset to the digest inside input data
*/
2012-07-19 12:13:58 +00:00
static int rtmp_handshake_imprint_with_digest ( uint8_t * buf , int encrypted )
2009-07-31 06:49:36 +00:00
{
2012-07-05 11:06:07 +00:00
int ret , digest_pos ;
2009-07-31 06:49:36 +00:00
2012-07-19 12:13:58 +00:00
if ( encrypted )
digest_pos = ff_rtmp_calc_digest_pos ( buf , 772 , 728 , 776 ) ;
else
digest_pos = ff_rtmp_calc_digest_pos ( buf , 8 , 728 , 12 ) ;
2009-07-31 06:49:36 +00:00
2012-07-05 11:05:46 +00:00
ret = ff_rtmp_calc_digest ( buf , RTMP_HANDSHAKE_PACKET_SIZE , digest_pos ,
rtmp_player_key , PLAYER_KEY_OPEN_PART_LEN ,
buf + digest_pos ) ;
2012-05-23 16:55:34 +00:00
if ( ret < 0 )
return ret ;
2009-07-31 06:49:36 +00:00
return digest_pos ;
}
/**
2010-06-30 15:38:06 +00:00
* Verify that the received server response has the expected digest value .
2009-07-31 06:49:36 +00:00
*
* @ param buf handshake data received from the server ( 1536 bytes )
* @ param off position to search digest offset from
* @ return 0 if digest is valid , digest position otherwise
*/
static int rtmp_validate_digest ( uint8_t * buf , int off )
{
uint8_t digest [ 32 ] ;
2012-07-05 11:06:07 +00:00
int ret , digest_pos ;
2009-07-31 06:49:36 +00:00
2012-07-05 11:06:07 +00:00
digest_pos = ff_rtmp_calc_digest_pos ( buf , off , 728 , off + 4 ) ;
2009-07-31 06:49:36 +00:00
2012-07-05 11:05:46 +00:00
ret = ff_rtmp_calc_digest ( buf , RTMP_HANDSHAKE_PACKET_SIZE , digest_pos ,
rtmp_server_key , SERVER_KEY_OPEN_PART_LEN ,
digest ) ;
2012-05-23 16:55:34 +00:00
if ( ret < 0 )
return ret ;
2009-07-31 06:49:36 +00:00
if ( ! memcmp ( digest , buf + digest_pos , 32 ) )
return digest_pos ;
return 0 ;
}
2012-08-13 15:05:00 +00:00
static int rtmp_calc_swf_verification ( URLContext * s , RTMPContext * rt ,
uint8_t * buf )
{
uint8_t * p ;
int ret ;
if ( rt - > swfhash_len ! = 32 ) {
av_log ( s , AV_LOG_ERROR ,
" Hash of the decompressed SWF file is not 32 bytes long. \n " ) ;
return AVERROR ( EINVAL ) ;
}
p = & rt - > swfverification [ 0 ] ;
bytestream_put_byte ( & p , 1 ) ;
bytestream_put_byte ( & p , 1 ) ;
bytestream_put_be32 ( & p , rt - > swfsize ) ;
bytestream_put_be32 ( & p , rt - > swfsize ) ;
if ( ( ret = ff_rtmp_calc_digest ( rt - > swfhash , 32 , 0 , buf , 32 , p ) ) < 0 )
return ret ;
return 0 ;
}
2012-08-15 14:11:50 +00:00
# if CONFIG_ZLIB
static int rtmp_uncompress_swfplayer ( uint8_t * in_data , int64_t in_size ,
uint8_t * * out_data , int64_t * out_size )
{
z_stream zs = { 0 } ;
void * ptr ;
int size ;
int ret = 0 ;
zs . avail_in = in_size ;
zs . next_in = in_data ;
ret = inflateInit ( & zs ) ;
if ( ret ! = Z_OK )
return AVERROR_UNKNOWN ;
do {
uint8_t tmp_buf [ 16384 ] ;
zs . avail_out = sizeof ( tmp_buf ) ;
zs . next_out = tmp_buf ;
ret = inflate ( & zs , Z_NO_FLUSH ) ;
if ( ret ! = Z_OK & & ret ! = Z_STREAM_END ) {
ret = AVERROR_UNKNOWN ;
goto fail ;
}
size = sizeof ( tmp_buf ) - zs . avail_out ;
if ( ! ( ptr = av_realloc ( * out_data , * out_size + size ) ) ) {
ret = AVERROR ( ENOMEM ) ;
goto fail ;
}
* out_data = ptr ;
memcpy ( * out_data + * out_size , tmp_buf , size ) ;
* out_size + = size ;
} while ( zs . avail_out = = 0 ) ;
fail :
inflateEnd ( & zs ) ;
return ret ;
}
# endif
static int rtmp_calc_swfhash ( URLContext * s )
{
RTMPContext * rt = s - > priv_data ;
uint8_t * in_data = NULL , * out_data = NULL , * swfdata ;
int64_t in_size , out_size ;
URLContext * stream ;
char swfhash [ 32 ] ;
int swfsize ;
int ret = 0 ;
/* Get the SWF player file. */
if ( ( ret = ffurl_open ( & stream , rt - > swfverify , AVIO_FLAG_READ ,
& s - > interrupt_callback , NULL ) ) < 0 ) {
av_log ( s , AV_LOG_ERROR , " Cannot open connection %s. \n " , rt - > swfverify ) ;
goto fail ;
}
if ( ( in_size = ffurl_seek ( stream , 0 , AVSEEK_SIZE ) ) < 0 ) {
ret = AVERROR ( EIO ) ;
goto fail ;
}
if ( ! ( in_data = av_malloc ( in_size ) ) ) {
ret = AVERROR ( ENOMEM ) ;
goto fail ;
}
if ( ( ret = ffurl_read_complete ( stream , in_data , in_size ) ) < 0 )
goto fail ;
if ( in_size < 3 ) {
ret = AVERROR_INVALIDDATA ;
goto fail ;
}
if ( ! memcmp ( in_data , " CWS " , 3 ) ) {
/* Decompress the SWF player file using Zlib. */
if ( ! ( out_data = av_malloc ( 8 ) ) ) {
ret = AVERROR ( ENOMEM ) ;
goto fail ;
}
* in_data = ' F ' ; // magic stuff
memcpy ( out_data , in_data , 8 ) ;
out_size = 8 ;
# if CONFIG_ZLIB
if ( ( ret = rtmp_uncompress_swfplayer ( in_data + 8 , in_size - 8 ,
& out_data , & out_size ) ) < 0 )
goto fail ;
# else
av_log ( s , AV_LOG_ERROR ,
" Zlib is required for decompressing the SWF player file. \n " ) ;
ret = AVERROR ( EINVAL ) ;
goto fail ;
# endif
swfsize = out_size ;
swfdata = out_data ;
} else {
swfsize = in_size ;
swfdata = in_data ;
}
/* Compute the SHA256 hash of the SWF player file. */
if ( ( ret = ff_rtmp_calc_digest ( swfdata , swfsize , 0 ,
" Genuine Adobe Flash Player 001 " , 30 ,
swfhash ) ) < 0 )
goto fail ;
/* Set SWFVerification parameters. */
av_opt_set_bin ( rt , " rtmp_swfhash " , swfhash , 32 , 0 ) ;
rt - > swfsize = swfsize ;
fail :
av_freep ( & in_data ) ;
av_freep ( & out_data ) ;
ffurl_close ( stream ) ;
return ret ;
}
2009-07-31 06:49:36 +00:00
/**
2010-06-30 15:38:06 +00:00
* Perform handshake with the server by means of exchanging pseudorandom data
2009-07-31 06:49:36 +00:00
* signed with HMAC - SHA2 digest .
*
* @ return 0 if handshake succeeds , negative value otherwise
*/
static int rtmp_handshake ( URLContext * s , RTMPContext * rt )
{
AVLFG rnd ;
uint8_t tosend [ RTMP_HANDSHAKE_PACKET_SIZE + 1 ] = {
3 , // unencrypted data
0 , 0 , 0 , 0 , // client uptime
RTMP_CLIENT_VER1 ,
RTMP_CLIENT_VER2 ,
RTMP_CLIENT_VER3 ,
RTMP_CLIENT_VER4 ,
} ;
uint8_t clientdata [ RTMP_HANDSHAKE_PACKET_SIZE ] ;
uint8_t serverdata [ RTMP_HANDSHAKE_PACKET_SIZE + 1 ] ;
int i ;
int server_pos , client_pos ;
2012-07-19 12:13:58 +00:00
uint8_t digest [ 32 ] , signature [ 32 ] ;
int ret , type = 0 ;
2009-07-31 06:49:36 +00:00
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_DEBUG , " Handshaking... \n " ) ;
2009-07-31 06:49:36 +00:00
av_lfg_init ( & rnd , 0xDEADC0DE ) ;
// generate handshake packet - 1536 bytes of pseudorandom data
for ( i = 9 ; i < = RTMP_HANDSHAKE_PACKET_SIZE ; i + + )
tosend [ i ] = av_lfg_get ( & rnd ) > > 24 ;
2012-07-19 12:13:58 +00:00
2012-07-24 11:46:28 +00:00
if ( rt - > encrypted & & CONFIG_FFRTMPCRYPT_PROTOCOL ) {
2012-07-19 12:13:58 +00:00
/* When the client wants to use RTMPE, we have to change the command
* byte to 0x06 which means to use encrypted data and we have to set
* the flash version to at least 9.0 .115 .0 . */
tosend [ 0 ] = 6 ;
tosend [ 5 ] = 128 ;
tosend [ 6 ] = 0 ;
tosend [ 7 ] = 3 ;
tosend [ 8 ] = 2 ;
/* Initialize the Diffie-Hellmann context and generate the public key
* to send to the server . */
if ( ( ret = ff_rtmpe_gen_pub_key ( rt - > stream , tosend + 1 ) ) < 0 )
return ret ;
}
2012-07-24 11:46:28 +00:00
client_pos = rtmp_handshake_imprint_with_digest ( tosend + 1 , rt - > encrypted ) ;
2012-05-23 16:55:34 +00:00
if ( client_pos < 0 )
return client_pos ;
2009-07-31 06:49:36 +00:00
2012-05-24 11:48:25 +00:00
if ( ( ret = ffurl_write ( rt - > stream , tosend ,
RTMP_HANDSHAKE_PACKET_SIZE + 1 ) ) < 0 ) {
av_log ( s , AV_LOG_ERROR , " Cannot write RTMP handshake request \n " ) ;
return ret ;
}
2012-05-24 11:48:42 +00:00
if ( ( ret = ffurl_read_complete ( rt - > stream , serverdata ,
RTMP_HANDSHAKE_PACKET_SIZE + 1 ) ) < 0 ) {
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_ERROR , " Cannot read RTMP handshake response \n " ) ;
2012-05-24 11:48:42 +00:00
return ret ;
2009-07-31 06:49:36 +00:00
}
2012-05-24 11:48:42 +00:00
if ( ( ret = ffurl_read_complete ( rt - > stream , clientdata ,
RTMP_HANDSHAKE_PACKET_SIZE ) ) < 0 ) {
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_ERROR , " Cannot read RTMP handshake response \n " ) ;
2012-05-24 11:48:42 +00:00
return ret ;
2009-07-31 06:49:36 +00:00
}
2012-07-19 12:13:58 +00:00
av_log ( s , AV_LOG_DEBUG , " Type answer %d \n " , serverdata [ 0 ] ) ;
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_DEBUG , " Server version %d.%d.%d.%d \n " ,
2009-07-31 06:49:36 +00:00
serverdata [ 5 ] , serverdata [ 6 ] , serverdata [ 7 ] , serverdata [ 8 ] ) ;
2010-01-12 06:44:49 +00:00
if ( rt - > is_input & & serverdata [ 5 ] > = 3 ) {
2009-12-04 16:52:42 +00:00
server_pos = rtmp_validate_digest ( serverdata + 1 , 772 ) ;
2012-05-23 16:55:34 +00:00
if ( server_pos < 0 )
return server_pos ;
2009-07-31 06:49:36 +00:00
if ( ! server_pos ) {
2012-07-19 12:13:58 +00:00
type = 1 ;
2009-12-04 16:52:42 +00:00
server_pos = rtmp_validate_digest ( serverdata + 1 , 8 ) ;
2012-05-23 16:55:34 +00:00
if ( server_pos < 0 )
return server_pos ;
2009-12-04 16:52:42 +00:00
if ( ! server_pos ) {
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_ERROR , " Server response validating failed \n " ) ;
2012-05-23 16:55:52 +00:00
return AVERROR ( EIO ) ;
2009-12-04 16:52:42 +00:00
}
2009-07-31 06:49:36 +00:00
}
2012-08-13 15:05:00 +00:00
/* Generate SWFVerification token (SHA256 HMAC hash of decompressed SWF,
* key are the last 32 bytes of the server handshake . */
if ( rt - > swfsize ) {
if ( ( ret = rtmp_calc_swf_verification ( s , rt , serverdata + 1 +
RTMP_HANDSHAKE_PACKET_SIZE - 32 ) ) < 0 )
return ret ;
}
2012-07-05 11:05:46 +00:00
ret = ff_rtmp_calc_digest ( tosend + 1 + client_pos , 32 , 0 ,
rtmp_server_key , sizeof ( rtmp_server_key ) ,
digest ) ;
2012-05-23 16:55:34 +00:00
if ( ret < 0 )
return ret ;
2012-07-05 11:05:46 +00:00
ret = ff_rtmp_calc_digest ( clientdata , RTMP_HANDSHAKE_PACKET_SIZE - 32 ,
2012-07-19 12:13:58 +00:00
0 , digest , 32 , signature ) ;
2012-05-23 16:55:34 +00:00
if ( ret < 0 )
return ret ;
2012-07-24 11:46:28 +00:00
if ( rt - > encrypted & & CONFIG_FFRTMPCRYPT_PROTOCOL ) {
2012-07-19 12:13:58 +00:00
/* Compute the shared secret key sent by the server and initialize
* the RC4 encryption . */
if ( ( ret = ff_rtmpe_compute_secret_key ( rt - > stream , serverdata + 1 ,
tosend + 1 , type ) ) < 0 )
return ret ;
/* Encrypt the signature received by the server. */
ff_rtmpe_encrypt_sig ( rt - > stream , signature , digest , serverdata [ 0 ] ) ;
}
if ( memcmp ( signature , clientdata + RTMP_HANDSHAKE_PACKET_SIZE - 32 , 32 ) ) {
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_ERROR , " Signature mismatch \n " ) ;
2012-05-23 16:55:52 +00:00
return AVERROR ( EIO ) ;
2009-12-04 16:52:42 +00:00
}
2009-07-31 06:49:36 +00:00
2009-12-04 16:52:42 +00:00
for ( i = 0 ; i < RTMP_HANDSHAKE_PACKET_SIZE ; i + + )
tosend [ i ] = av_lfg_get ( & rnd ) > > 24 ;
2012-07-05 11:05:46 +00:00
ret = ff_rtmp_calc_digest ( serverdata + 1 + server_pos , 32 , 0 ,
rtmp_player_key , sizeof ( rtmp_player_key ) ,
digest ) ;
2012-05-23 16:55:34 +00:00
if ( ret < 0 )
return ret ;
2012-07-05 11:05:46 +00:00
ret = ff_rtmp_calc_digest ( tosend , RTMP_HANDSHAKE_PACKET_SIZE - 32 , 0 ,
digest , 32 ,
tosend + RTMP_HANDSHAKE_PACKET_SIZE - 32 ) ;
2012-05-23 16:55:34 +00:00
if ( ret < 0 )
return ret ;
2009-12-04 16:52:42 +00:00
2012-07-24 11:46:28 +00:00
if ( rt - > encrypted & & CONFIG_FFRTMPCRYPT_PROTOCOL ) {
2012-07-19 12:13:58 +00:00
/* Encrypt the signature to be send to the server. */
ff_rtmpe_encrypt_sig ( rt - > stream , tosend +
RTMP_HANDSHAKE_PACKET_SIZE - 32 , digest ,
serverdata [ 0 ] ) ;
}
2009-12-04 16:52:42 +00:00
// write reply back to the server
2012-05-24 11:48:25 +00:00
if ( ( ret = ffurl_write ( rt - > stream , tosend ,
RTMP_HANDSHAKE_PACKET_SIZE ) ) < 0 )
return ret ;
2012-07-19 12:13:58 +00:00
2012-07-24 11:46:28 +00:00
if ( rt - > encrypted & & CONFIG_FFRTMPCRYPT_PROTOCOL ) {
2012-07-19 12:13:58 +00:00
/* Set RC4 keys for encryption and update the keystreams. */
if ( ( ret = ff_rtmpe_update_keystream ( rt - > stream ) ) < 0 )
return ret ;
}
2009-12-04 16:52:16 +00:00
} else {
2012-07-24 11:46:28 +00:00
if ( rt - > encrypted & & CONFIG_FFRTMPCRYPT_PROTOCOL ) {
2012-07-19 12:13:58 +00:00
/* Compute the shared secret key sent by the server and initialize
* the RC4 encryption . */
if ( ( ret = ff_rtmpe_compute_secret_key ( rt - > stream , serverdata + 1 ,
tosend + 1 , 1 ) ) < 0 )
return ret ;
if ( serverdata [ 0 ] = = 9 ) {
/* Encrypt the signature received by the server. */
ff_rtmpe_encrypt_sig ( rt - > stream , signature , digest ,
serverdata [ 0 ] ) ;
}
}
2012-05-24 11:48:25 +00:00
if ( ( ret = ffurl_write ( rt - > stream , serverdata + 1 ,
RTMP_HANDSHAKE_PACKET_SIZE ) ) < 0 )
return ret ;
2012-07-19 12:13:58 +00:00
2012-07-24 11:46:28 +00:00
if ( rt - > encrypted & & CONFIG_FFRTMPCRYPT_PROTOCOL ) {
2012-07-19 12:13:58 +00:00
/* Set RC4 keys for encryption and update the keystreams. */
if ( ( ret = ff_rtmpe_update_keystream ( rt - > stream ) ) < 0 )
return ret ;
}
2009-12-04 16:52:16 +00:00
}
2009-07-31 06:49:36 +00:00
return 0 ;
}
2012-08-16 14:04:48 +00:00
static int rtmp_receive_hs_packet ( RTMPContext * rt , uint32_t * first_int ,
uint32_t * second_int , char * arraydata ,
int size )
{
2012-08-16 19:11:13 +00:00
int inoutsize ;
2012-08-16 14:04:48 +00:00
inoutsize = ffurl_read_complete ( rt - > stream , arraydata ,
RTMP_HANDSHAKE_PACKET_SIZE ) ;
if ( inoutsize < = 0 )
return AVERROR ( EIO ) ;
if ( inoutsize ! = RTMP_HANDSHAKE_PACKET_SIZE ) {
av_log ( rt , AV_LOG_ERROR , " Erroneous Message size %d "
" not following standard \n " , ( int ) inoutsize ) ;
return AVERROR ( EINVAL ) ;
}
* first_int = AV_RB32 ( arraydata ) ;
* second_int = AV_RB32 ( arraydata + 4 ) ;
return 0 ;
}
static int rtmp_send_hs_packet ( RTMPContext * rt , uint32_t first_int ,
uint32_t second_int , char * arraydata , int size )
{
2012-08-16 19:11:13 +00:00
int inoutsize ;
2012-08-16 14:04:48 +00:00
AV_WB32 ( arraydata , first_int ) ;
2013-09-16 09:39:45 +00:00
AV_WB32 ( arraydata + 4 , second_int ) ;
2012-08-16 14:04:48 +00:00
inoutsize = ffurl_write ( rt - > stream , arraydata ,
RTMP_HANDSHAKE_PACKET_SIZE ) ;
if ( inoutsize ! = RTMP_HANDSHAKE_PACKET_SIZE ) {
av_log ( rt , AV_LOG_ERROR , " Unable to write answer \n " ) ;
return AVERROR ( EIO ) ;
}
return 0 ;
}
/**
* rtmp handshake server side
*/
static int rtmp_server_handshake ( URLContext * s , RTMPContext * rt )
{
uint8_t buffer [ RTMP_HANDSHAKE_PACKET_SIZE ] ;
uint32_t hs_epoch ;
uint32_t hs_my_epoch ;
uint8_t hs_c1 [ RTMP_HANDSHAKE_PACKET_SIZE ] ;
uint8_t hs_s1 [ RTMP_HANDSHAKE_PACKET_SIZE ] ;
uint32_t zeroes ;
uint32_t temp = 0 ;
int randomidx = 0 ;
2012-08-16 19:11:13 +00:00
int inoutsize = 0 ;
2012-08-16 14:04:48 +00:00
int ret ;
inoutsize = ffurl_read_complete ( rt - > stream , buffer , 1 ) ; // Receive C0
if ( inoutsize < = 0 ) {
av_log ( s , AV_LOG_ERROR , " Unable to read handshake \n " ) ;
return AVERROR ( EIO ) ;
}
// Check Version
if ( buffer [ 0 ] ! = 3 ) {
av_log ( s , AV_LOG_ERROR , " RTMP protocol version mismatch \n " ) ;
return AVERROR ( EIO ) ;
}
if ( ffurl_write ( rt - > stream , buffer , 1 ) < = 0 ) { // Send S0
av_log ( s , AV_LOG_ERROR ,
" Unable to write answer - RTMP S0 \n " ) ;
return AVERROR ( EIO ) ;
}
/* Receive C1 */
ret = rtmp_receive_hs_packet ( rt , & hs_epoch , & zeroes , hs_c1 ,
RTMP_HANDSHAKE_PACKET_SIZE ) ;
if ( ret ) {
av_log ( s , AV_LOG_ERROR , " RTMP Handshake C1 Error \n " ) ;
return ret ;
}
/* Send S1 */
/* By now same epoch will be sent */
hs_my_epoch = hs_epoch ;
/* Generate random */
2012-10-12 00:06:51 +00:00
for ( randomidx = 8 ; randomidx < ( RTMP_HANDSHAKE_PACKET_SIZE ) ;
2012-08-16 14:04:48 +00:00
randomidx + = 4 )
2012-10-12 00:06:51 +00:00
AV_WB32 ( hs_s1 + randomidx , av_get_random_seed ( ) ) ;
2012-08-16 14:04:48 +00:00
ret = rtmp_send_hs_packet ( rt , hs_my_epoch , 0 , hs_s1 ,
RTMP_HANDSHAKE_PACKET_SIZE ) ;
if ( ret ) {
av_log ( s , AV_LOG_ERROR , " RTMP Handshake S1 Error \n " ) ;
return ret ;
}
/* Send S2 */
ret = rtmp_send_hs_packet ( rt , hs_epoch , 0 , hs_c1 ,
RTMP_HANDSHAKE_PACKET_SIZE ) ;
if ( ret ) {
av_log ( s , AV_LOG_ERROR , " RTMP Handshake S2 Error \n " ) ;
return ret ;
}
/* Receive C2 */
ret = rtmp_receive_hs_packet ( rt , & temp , & zeroes , buffer ,
RTMP_HANDSHAKE_PACKET_SIZE ) ;
if ( ret ) {
av_log ( s , AV_LOG_ERROR , " RTMP Handshake C2 Error \n " ) ;
return ret ;
}
if ( temp ! = hs_my_epoch )
av_log ( s , AV_LOG_WARNING ,
" Erroneous C2 Message epoch does not match up with C1 epoch \n " ) ;
if ( memcmp ( buffer + 8 , hs_s1 + 8 ,
RTMP_HANDSHAKE_PACKET_SIZE - 8 ) )
av_log ( s , AV_LOG_WARNING ,
" Erroneous C2 Message random does not match up \n " ) ;
return 0 ;
}
2012-07-21 10:59:52 +00:00
static int handle_chunk_size ( URLContext * s , RTMPPacket * pkt )
{
RTMPContext * rt = s - > priv_data ;
int ret ;
2013-08-08 16:52:11 +00:00
if ( pkt - > size < 4 ) {
2012-07-21 10:59:52 +00:00
av_log ( s , AV_LOG_ERROR ,
2012-07-26 12:05:58 +00:00
" Too short chunk size change packet (%d) \n " ,
2013-08-08 16:52:11 +00:00
pkt - > size ) ;
2012-07-25 18:51:08 +00:00
return AVERROR_INVALIDDATA ;
2012-07-21 10:59:52 +00:00
}
if ( ! rt - > is_input ) {
2012-08-10 17:03:22 +00:00
/* Send the same chunk size change packet back to the server,
* setting the outgoing chunk size to the same as the incoming one . */
if ( ( ret = ff_rtmp_packet_write ( rt - > stream , pkt , rt - > out_chunk_size ,
2012-07-21 10:59:52 +00:00
rt - > prev_pkt [ 1 ] ) ) < 0 )
return ret ;
2012-08-10 17:03:22 +00:00
rt - > out_chunk_size = AV_RB32 ( pkt - > data ) ;
2012-07-21 10:59:52 +00:00
}
2012-08-10 17:03:22 +00:00
rt - > in_chunk_size = AV_RB32 ( pkt - > data ) ;
if ( rt - > in_chunk_size < = 0 ) {
av_log ( s , AV_LOG_ERROR , " Incorrect chunk size %d \n " ,
rt - > in_chunk_size ) ;
2012-07-25 18:51:08 +00:00
return AVERROR_INVALIDDATA ;
2012-07-21 10:59:52 +00:00
}
2012-08-10 17:03:22 +00:00
av_log ( s , AV_LOG_DEBUG , " New incoming chunk size = %d \n " ,
rt - > in_chunk_size ) ;
2012-07-21 10:59:52 +00:00
return 0 ;
}
2012-07-21 10:59:51 +00:00
static int handle_ping ( URLContext * s , RTMPPacket * pkt )
{
RTMPContext * rt = s - > priv_data ;
int t , ret ;
2013-08-08 16:52:11 +00:00
if ( pkt - > size < 2 ) {
2012-07-26 18:45:42 +00:00
av_log ( s , AV_LOG_ERROR , " Too short ping packet (%d) \n " ,
2013-08-08 16:52:11 +00:00
pkt - > size ) ;
2012-07-26 18:45:42 +00:00
return AVERROR_INVALIDDATA ;
}
2012-07-21 10:59:51 +00:00
t = AV_RB16 ( pkt - > data ) ;
if ( t = = 6 ) {
if ( ( ret = gen_pong ( s , rt , pkt ) ) < 0 )
return ret ;
2012-08-13 15:05:00 +00:00
} else if ( t = = 26 ) {
if ( rt - > swfsize ) {
if ( ( ret = gen_swf_verification ( s , rt ) ) < 0 )
return ret ;
} else {
av_log ( s , AV_LOG_WARNING , " Ignoring SWFVerification request. \n " ) ;
}
2012-07-21 10:59:51 +00:00
}
return 0 ;
}
2012-07-21 10:59:50 +00:00
static int handle_client_bw ( URLContext * s , RTMPPacket * pkt )
{
RTMPContext * rt = s - > priv_data ;
2013-08-08 16:52:11 +00:00
if ( pkt - > size < 4 ) {
2012-07-21 10:59:50 +00:00
av_log ( s , AV_LOG_ERROR ,
" Client bandwidth report packet is less than 4 bytes long (%d) \n " ,
2013-08-08 16:52:11 +00:00
pkt - > size ) ;
2012-07-25 18:51:09 +00:00
return AVERROR_INVALIDDATA ;
2012-07-21 10:59:50 +00:00
}
2012-07-25 18:51:11 +00:00
rt - > client_report_size = AV_RB32 ( pkt - > data ) ;
if ( rt - > client_report_size < = 0 ) {
av_log ( s , AV_LOG_ERROR , " Incorrect client bandwidth %d \n " ,
rt - > client_report_size ) ;
return AVERROR_INVALIDDATA ;
}
av_log ( s , AV_LOG_DEBUG , " Client bandwidth = %d \n " , rt - > client_report_size ) ;
rt - > client_report_size > > = 1 ;
2012-07-21 10:59:50 +00:00
return 0 ;
}
2012-07-21 10:59:49 +00:00
static int handle_server_bw ( URLContext * s , RTMPPacket * pkt )
{
RTMPContext * rt = s - > priv_data ;
2013-08-08 16:52:11 +00:00
if ( pkt - > size < 4 ) {
2012-07-26 12:05:18 +00:00
av_log ( s , AV_LOG_ERROR ,
" Too short server bandwidth report packet (%d) \n " ,
2013-08-08 16:52:11 +00:00
pkt - > size ) ;
2012-07-26 12:05:18 +00:00
return AVERROR_INVALIDDATA ;
}
2012-07-21 10:59:49 +00:00
rt - > server_bw = AV_RB32 ( pkt - > data ) ;
if ( rt - > server_bw < = 0 ) {
av_log ( s , AV_LOG_ERROR , " Incorrect server bandwidth %d \n " ,
rt - > server_bw ) ;
2012-07-25 18:51:10 +00:00
return AVERROR_INVALIDDATA ;
2012-07-21 10:59:49 +00:00
}
av_log ( s , AV_LOG_DEBUG , " Server bandwidth = %d \n " , rt - > server_bw ) ;
return 0 ;
}
2012-12-30 20:39:38 +00:00
static int do_adobe_auth ( RTMPContext * rt , const char * user , const char * salt ,
const char * opaque , const char * challenge )
{
uint8_t hash [ 16 ] ;
char hashstr [ AV_BASE64_SIZE ( sizeof ( hash ) ) ] , challenge2 [ 10 ] ;
struct AVMD5 * md5 = av_md5_alloc ( ) ;
if ( ! md5 )
return AVERROR ( ENOMEM ) ;
snprintf ( challenge2 , sizeof ( challenge2 ) , " %08x " , av_get_random_seed ( ) ) ;
av_md5_init ( md5 ) ;
av_md5_update ( md5 , user , strlen ( user ) ) ;
av_md5_update ( md5 , salt , strlen ( salt ) ) ;
av_md5_update ( md5 , rt - > password , strlen ( rt - > password ) ) ;
av_md5_final ( md5 , hash ) ;
av_base64_encode ( hashstr , sizeof ( hashstr ) , hash ,
sizeof ( hash ) ) ;
av_md5_init ( md5 ) ;
av_md5_update ( md5 , hashstr , strlen ( hashstr ) ) ;
if ( opaque )
av_md5_update ( md5 , opaque , strlen ( opaque ) ) ;
else if ( challenge )
av_md5_update ( md5 , challenge , strlen ( challenge ) ) ;
av_md5_update ( md5 , challenge2 , strlen ( challenge2 ) ) ;
av_md5_final ( md5 , hash ) ;
av_base64_encode ( hashstr , sizeof ( hashstr ) , hash ,
sizeof ( hash ) ) ;
snprintf ( rt - > auth_params , sizeof ( rt - > auth_params ) ,
" ?authmod=%s&user=%s&challenge=%s&response=%s " ,
" adobe " , user , challenge2 , hashstr ) ;
if ( opaque )
av_strlcatf ( rt - > auth_params , sizeof ( rt - > auth_params ) ,
" &opaque=%s " , opaque ) ;
av_free ( md5 ) ;
return 0 ;
}
2012-12-30 22:46:14 +00:00
static int do_llnw_auth ( RTMPContext * rt , const char * user , const char * nonce )
{
uint8_t hash [ 16 ] ;
char hashstr1 [ 33 ] , hashstr2 [ 33 ] ;
const char * realm = " live " ;
const char * method = " publish " ;
const char * qop = " auth " ;
const char * nc = " 00000001 " ;
char cnonce [ 10 ] ;
struct AVMD5 * md5 = av_md5_alloc ( ) ;
if ( ! md5 )
return AVERROR ( ENOMEM ) ;
snprintf ( cnonce , sizeof ( cnonce ) , " %08x " , av_get_random_seed ( ) ) ;
av_md5_init ( md5 ) ;
av_md5_update ( md5 , user , strlen ( user ) ) ;
av_md5_update ( md5 , " : " , 1 ) ;
av_md5_update ( md5 , realm , strlen ( realm ) ) ;
av_md5_update ( md5 , " : " , 1 ) ;
av_md5_update ( md5 , rt - > password , strlen ( rt - > password ) ) ;
av_md5_final ( md5 , hash ) ;
ff_data_to_hex ( hashstr1 , hash , 16 , 1 ) ;
hashstr1 [ 32 ] = ' \0 ' ;
av_md5_init ( md5 ) ;
av_md5_update ( md5 , method , strlen ( method ) ) ;
av_md5_update ( md5 , " :/ " , 2 ) ;
av_md5_update ( md5 , rt - > app , strlen ( rt - > app ) ) ;
2013-08-15 10:17:15 +00:00
if ( ! strchr ( rt - > app , ' / ' ) )
av_md5_update ( md5 , " /_definst_ " , strlen ( " /_definst_ " ) ) ;
2012-12-30 22:46:14 +00:00
av_md5_final ( md5 , hash ) ;
ff_data_to_hex ( hashstr2 , hash , 16 , 1 ) ;
hashstr2 [ 32 ] = ' \0 ' ;
av_md5_init ( md5 ) ;
av_md5_update ( md5 , hashstr1 , strlen ( hashstr1 ) ) ;
av_md5_update ( md5 , " : " , 1 ) ;
if ( nonce )
av_md5_update ( md5 , nonce , strlen ( nonce ) ) ;
av_md5_update ( md5 , " : " , 1 ) ;
av_md5_update ( md5 , nc , strlen ( nc ) ) ;
av_md5_update ( md5 , " : " , 1 ) ;
av_md5_update ( md5 , cnonce , strlen ( cnonce ) ) ;
av_md5_update ( md5 , " : " , 1 ) ;
av_md5_update ( md5 , qop , strlen ( qop ) ) ;
av_md5_update ( md5 , " : " , 1 ) ;
av_md5_update ( md5 , hashstr2 , strlen ( hashstr2 ) ) ;
av_md5_final ( md5 , hash ) ;
ff_data_to_hex ( hashstr1 , hash , 16 , 1 ) ;
snprintf ( rt - > auth_params , sizeof ( rt - > auth_params ) ,
" ?authmod=%s&user=%s&nonce=%s&cnonce=%s&nc=%s&response=%s " ,
" llnw " , user , nonce , cnonce , nc , hashstr1 ) ;
av_free ( md5 ) ;
return 0 ;
}
2012-12-30 20:39:38 +00:00
static int handle_connect_error ( URLContext * s , const char * desc )
{
RTMPContext * rt = s - > priv_data ;
2012-12-30 22:46:14 +00:00
char buf [ 300 ] , * ptr , authmod [ 15 ] ;
2012-12-30 20:39:38 +00:00
int i = 0 , ret = 0 ;
const char * user = " " , * salt = " " , * opaque = NULL ,
2012-12-30 22:46:14 +00:00
* challenge = NULL , * cptr = NULL , * nonce = NULL ;
2012-12-30 20:39:38 +00:00
2012-12-30 22:46:14 +00:00
if ( ! ( cptr = strstr ( desc , " authmod=adobe " ) ) & &
! ( cptr = strstr ( desc , " authmod=llnw " ) ) ) {
2012-12-30 20:39:38 +00:00
av_log ( s , AV_LOG_ERROR ,
" Unknown connect error (unsupported authentication method?) \n " ) ;
return AVERROR_UNKNOWN ;
}
2012-12-30 22:46:14 +00:00
cptr + = strlen ( " authmod= " ) ;
while ( * cptr & & * cptr ! = ' ' & & i < sizeof ( authmod ) - 1 )
authmod [ i + + ] = * cptr + + ;
authmod [ i ] = ' \0 ' ;
2012-12-30 20:39:38 +00:00
if ( ! rt - > username [ 0 ] | | ! rt - > password [ 0 ] ) {
av_log ( s , AV_LOG_ERROR , " No credentials set \n " ) ;
return AVERROR_UNKNOWN ;
}
if ( strstr ( desc , " ?reason=authfailed " ) ) {
av_log ( s , AV_LOG_ERROR , " Incorrect username/password \n " ) ;
return AVERROR_UNKNOWN ;
} else if ( strstr ( desc , " ?reason=nosuchuser " ) ) {
av_log ( s , AV_LOG_ERROR , " Incorrect username \n " ) ;
return AVERROR_UNKNOWN ;
}
if ( rt - > auth_tried ) {
av_log ( s , AV_LOG_ERROR , " Authentication failed \n " ) ;
return AVERROR_UNKNOWN ;
}
rt - > auth_params [ 0 ] = ' \0 ' ;
if ( strstr ( desc , " code=403 need auth " ) ) {
snprintf ( rt - > auth_params , sizeof ( rt - > auth_params ) ,
2012-12-30 22:46:14 +00:00
" ?authmod=%s&user=%s " , authmod , rt - > username ) ;
2012-12-30 20:39:38 +00:00
return 0 ;
}
if ( ! ( cptr = strstr ( desc , " ?reason=needauth " ) ) ) {
av_log ( s , AV_LOG_ERROR , " No auth parameters found \n " ) ;
return AVERROR_UNKNOWN ;
}
av_strlcpy ( buf , cptr + 1 , sizeof ( buf ) ) ;
ptr = buf ;
while ( ptr ) {
char * next = strchr ( ptr , ' & ' ) ;
char * value = strchr ( ptr , ' = ' ) ;
if ( next )
* next + + = ' \0 ' ;
if ( value )
* value + + = ' \0 ' ;
if ( ! strcmp ( ptr , " user " ) ) {
user = value ;
} else if ( ! strcmp ( ptr , " salt " ) ) {
salt = value ;
} else if ( ! strcmp ( ptr , " opaque " ) ) {
opaque = value ;
} else if ( ! strcmp ( ptr , " challenge " ) ) {
challenge = value ;
2012-12-30 22:46:14 +00:00
} else if ( ! strcmp ( ptr , " nonce " ) ) {
nonce = value ;
2012-12-30 20:39:38 +00:00
}
ptr = next ;
}
2012-12-30 22:46:14 +00:00
if ( ! strcmp ( authmod , " adobe " ) ) {
2013-03-20 09:07:53 +00:00
if ( ( ret = do_adobe_auth ( rt , user , salt , opaque , challenge ) ) < 0 )
2012-12-30 22:46:14 +00:00
return ret ;
} else {
if ( ( ret = do_llnw_auth ( rt , user , nonce ) ) < 0 )
return ret ;
}
2012-12-30 20:39:38 +00:00
rt - > auth_tried = 1 ;
return 0 ;
}
2012-08-09 12:57:51 +00:00
static int handle_invoke_error ( URLContext * s , RTMPPacket * pkt )
{
2012-12-30 20:39:38 +00:00
RTMPContext * rt = s - > priv_data ;
2013-08-08 16:52:11 +00:00
const uint8_t * data_end = pkt - > data + pkt - > size ;
2012-08-11 10:42:17 +00:00
char * tracked_method = NULL ;
int level = AV_LOG_ERROR ;
2012-08-09 12:57:51 +00:00
uint8_t tmpstr [ 256 ] ;
2012-08-11 10:42:17 +00:00
int ret ;
if ( ( ret = find_tracked_method ( s , pkt , 9 , & tracked_method ) ) < 0 )
return ret ;
2012-08-09 12:57:51 +00:00
if ( ! ff_amf_get_field_value ( pkt - > data + 9 , data_end ,
" description " , tmpstr , sizeof ( tmpstr ) ) ) {
2012-08-19 11:02:23 +00:00
if ( tracked_method & & ( ! strcmp ( tracked_method , " _checkbw " ) | |
! strcmp ( tracked_method , " releaseStream " ) | |
! strcmp ( tracked_method , " FCSubscribe " ) | |
! strcmp ( tracked_method , " FCPublish " ) ) ) {
/* Gracefully ignore Adobe-specific historical artifact errors. */
2012-08-11 10:42:17 +00:00
level = AV_LOG_WARNING ;
ret = 0 ;
2012-12-30 20:39:38 +00:00
} else if ( tracked_method & & ! strcmp ( tracked_method , " connect " ) ) {
ret = handle_connect_error ( s , tmpstr ) ;
if ( ! ret ) {
rt - > do_reconnect = 1 ;
level = AV_LOG_VERBOSE ;
}
2012-08-11 10:42:17 +00:00
} else
2012-12-30 16:53:35 +00:00
ret = AVERROR_UNKNOWN ;
2012-08-11 10:42:17 +00:00
av_log ( s , level , " Server error: %s \n " , tmpstr ) ;
2012-08-09 12:57:51 +00:00
}
2012-08-11 10:42:17 +00:00
av_free ( tracked_method ) ;
return ret ;
2012-08-09 12:57:51 +00:00
}
2013-09-14 14:41:50 +00:00
static int write_begin ( URLContext * s )
{
RTMPContext * rt = s - > priv_data ;
PutByteContext pbc ;
RTMPPacket spkt = { 0 } ;
int ret ;
// Send Stream Begin 1
if ( ( ret = ff_rtmp_packet_create ( & spkt , RTMP_NETWORK_CHANNEL ,
RTMP_PT_PING , 0 , 6 ) ) < 0 ) {
av_log ( s , AV_LOG_ERROR , " Unable to create response packet \n " ) ;
return ret ;
}
bytestream2_init_writer ( & pbc , spkt . data , spkt . size ) ;
bytestream2_put_be16 ( & pbc , 0 ) ; // 0 -> Stream Begin
bytestream2_put_be32 ( & pbc , rt - > nb_streamid ) ;
ret = ff_rtmp_packet_write ( rt - > stream , & spkt , rt - > out_chunk_size ,
rt - > prev_pkt [ 1 ] ) ;
ff_rtmp_packet_destroy ( & spkt ) ;
return ret ;
}
static int write_status ( URLContext * s , RTMPPacket * pkt ,
const char * status , const char * filename )
{
RTMPContext * rt = s - > priv_data ;
RTMPPacket spkt = { 0 } ;
char statusmsg [ 128 ] ;
uint8_t * pp ;
int ret ;
if ( ( ret = ff_rtmp_packet_create ( & spkt , RTMP_SYSTEM_CHANNEL ,
RTMP_PT_INVOKE , 0 ,
RTMP_PKTDATA_DEFAULT_SIZE ) ) < 0 ) {
av_log ( s , AV_LOG_ERROR , " Unable to create response packet \n " ) ;
return ret ;
}
pp = spkt . data ;
spkt . extra = pkt - > extra ;
ff_amf_write_string ( & pp , " onStatus " ) ;
ff_amf_write_number ( & pp , 0 ) ;
ff_amf_write_null ( & pp ) ;
ff_amf_write_object_start ( & pp ) ;
ff_amf_write_field_name ( & pp , " level " ) ;
ff_amf_write_string ( & pp , " status " ) ;
ff_amf_write_field_name ( & pp , " code " ) ;
ff_amf_write_string ( & pp , status ) ;
ff_amf_write_field_name ( & pp , " description " ) ;
snprintf ( statusmsg , sizeof ( statusmsg ) ,
" %s is now published " , filename ) ;
ff_amf_write_string ( & pp , statusmsg ) ;
ff_amf_write_field_name ( & pp , " details " ) ;
ff_amf_write_string ( & pp , filename ) ;
ff_amf_write_field_name ( & pp , " clientid " ) ;
snprintf ( statusmsg , sizeof ( statusmsg ) , " %s " , LIBAVFORMAT_IDENT ) ;
ff_amf_write_string ( & pp , statusmsg ) ;
ff_amf_write_object_end ( & pp ) ;
spkt . size = pp - spkt . data ;
ret = ff_rtmp_packet_write ( rt - > stream , & spkt , rt - > out_chunk_size ,
rt - > prev_pkt [ 1 ] ) ;
ff_rtmp_packet_destroy ( & spkt ) ;
return ret ;
}
2012-08-16 14:04:48 +00:00
static int send_invoke_response ( URLContext * s , RTMPPacket * pkt )
{
RTMPContext * rt = s - > priv_data ;
double seqnum ;
char filename [ 64 ] ;
char command [ 64 ] ;
int stringlen ;
char * pchar ;
const uint8_t * p = pkt - > data ;
uint8_t * pp = NULL ;
RTMPPacket spkt = { 0 } ;
GetByteContext gbc ;
int ret ;
2013-08-08 16:52:11 +00:00
bytestream2_init ( & gbc , p , pkt - > size ) ;
2012-08-16 14:04:48 +00:00
if ( ff_amf_read_string ( & gbc , command , sizeof ( command ) ,
& stringlen ) ) {
av_log ( s , AV_LOG_ERROR , " Error in PT_INVOKE \n " ) ;
return AVERROR_INVALIDDATA ;
}
ret = ff_amf_read_number ( & gbc , & seqnum ) ;
if ( ret )
return ret ;
ret = ff_amf_read_null ( & gbc ) ;
if ( ret )
return ret ;
if ( ! strcmp ( command , " FCPublish " ) | |
! strcmp ( command , " publish " ) ) {
ret = ff_amf_read_string ( & gbc , filename ,
sizeof ( filename ) , & stringlen ) ;
// check with url
if ( s - > filename ) {
pchar = strrchr ( s - > filename , ' / ' ) ;
if ( ! pchar ) {
av_log ( s , AV_LOG_WARNING ,
" Unable to find / in url %s, bad format \n " ,
s - > filename ) ;
pchar = s - > filename ;
}
pchar + + ;
if ( strcmp ( pchar , filename ) )
av_log ( s , AV_LOG_WARNING , " Unexpected stream %s, expecting "
" %s \n " , filename , pchar ) ;
}
rt - > state = STATE_RECEIVING ;
}
if ( ! strcmp ( command , " FCPublish " ) ) {
if ( ( ret = ff_rtmp_packet_create ( & spkt , RTMP_SYSTEM_CHANNEL ,
RTMP_PT_INVOKE , 0 ,
RTMP_PKTDATA_DEFAULT_SIZE ) ) < 0 ) {
av_log ( s , AV_LOG_ERROR , " Unable to create response packet \n " ) ;
return ret ;
}
pp = spkt . data ;
ff_amf_write_string ( & pp , " onFCPublish " ) ;
} else if ( ! strcmp ( command , " publish " ) ) {
2013-09-14 14:41:50 +00:00
ret = write_begin ( s ) ;
2012-08-16 14:04:48 +00:00
if ( ret < 0 )
return ret ;
// Send onStatus(NetStream.Publish.Start)
2013-09-14 14:41:50 +00:00
return write_status ( s , pkt , " NetStream.Publish.Start " ,
filename ) ;
2013-09-15 14:52:33 +00:00
} else if ( ! strcmp ( command , " play " ) ) {
ret = write_begin ( s ) ;
if ( ret < 0 )
return ret ;
rt - > state = STATE_SENDING ;
return write_status ( s , pkt , " NetStream.Play.Start " ,
filename ) ;
2012-08-16 14:04:48 +00:00
} else {
if ( ( ret = ff_rtmp_packet_create ( & spkt , RTMP_SYSTEM_CHANNEL ,
RTMP_PT_INVOKE , 0 ,
RTMP_PKTDATA_DEFAULT_SIZE ) ) < 0 ) {
av_log ( s , AV_LOG_ERROR , " Unable to create response packet \n " ) ;
return ret ;
}
pp = spkt . data ;
ff_amf_write_string ( & pp , " _result " ) ;
ff_amf_write_number ( & pp , seqnum ) ;
ff_amf_write_null ( & pp ) ;
if ( ! strcmp ( command , " createStream " ) ) {
rt - > nb_streamid + + ;
if ( rt - > nb_streamid = = 0 | | rt - > nb_streamid = = 2 )
rt - > nb_streamid + + ; /* Values 0 and 2 are reserved */
ff_amf_write_number ( & pp , rt - > nb_streamid ) ;
/* By now we don't control which streams are removed in
* deleteStream . There is no stream creation control
* if a client creates more than 2 ^ 32 - 2 streams . */
}
}
2013-08-08 16:52:11 +00:00
spkt . size = pp - spkt . data ;
2012-08-16 14:04:48 +00:00
ret = ff_rtmp_packet_write ( rt - > stream , & spkt , rt - > out_chunk_size ,
rt - > prev_pkt [ 1 ] ) ;
ff_rtmp_packet_destroy ( & spkt ) ;
return ret ;
}
2012-08-09 12:57:49 +00:00
static int handle_invoke_result ( URLContext * s , RTMPPacket * pkt )
{
RTMPContext * rt = s - > priv_data ;
char * tracked_method = NULL ;
int ret = 0 ;
2012-08-11 10:41:32 +00:00
if ( ( ret = find_tracked_method ( s , pkt , 10 , & tracked_method ) ) < 0 )
2012-08-09 12:57:49 +00:00
return ret ;
if ( ! tracked_method ) {
/* Ignore this reply when the current method is not tracked. */
return ret ;
}
2013-08-08 17:44:19 +00:00
if ( ! strcmp ( tracked_method , " connect " ) ) {
2012-08-09 12:57:49 +00:00
if ( ! rt - > is_input ) {
if ( ( ret = gen_release_stream ( s , rt ) ) < 0 )
goto fail ;
if ( ( ret = gen_fcpublish_stream ( s , rt ) ) < 0 )
goto fail ;
} else {
if ( ( ret = gen_server_bw ( s , rt ) ) < 0 )
goto fail ;
}
if ( ( ret = gen_create_stream ( s , rt ) ) < 0 )
goto fail ;
if ( rt - > is_input ) {
/* Send the FCSubscribe command when the name of live
* stream is defined by the user or if it ' s a live stream . */
if ( rt - > subscribe ) {
if ( ( ret = gen_fcsubscribe_stream ( s , rt , rt - > subscribe ) ) < 0 )
goto fail ;
} else if ( rt - > live = = - 1 ) {
if ( ( ret = gen_fcsubscribe_stream ( s , rt , rt - > playpath ) ) < 0 )
goto fail ;
}
}
2013-08-08 17:44:19 +00:00
} else if ( ! strcmp ( tracked_method , " createStream " ) ) {
2012-08-09 12:57:49 +00:00
//extract a number from the result
if ( pkt - > data [ 10 ] | | pkt - > data [ 19 ] ! = 5 | | pkt - > data [ 20 ] ) {
av_log ( s , AV_LOG_WARNING , " Unexpected reply on connect() \n " ) ;
} else {
2013-09-16 20:20:58 +00:00
rt - > stream_id = av_int2double ( AV_RB64 ( pkt - > data + 21 ) ) ;
2012-08-09 12:57:49 +00:00
}
if ( ! rt - > is_input ) {
if ( ( ret = gen_publish ( s , rt ) ) < 0 )
goto fail ;
} else {
if ( ( ret = gen_play ( s , rt ) ) < 0 )
goto fail ;
if ( ( ret = gen_buffer_time ( s , rt ) ) < 0 )
goto fail ;
}
}
fail :
av_free ( tracked_method ) ;
return ret ;
}
2012-08-09 12:57:50 +00:00
static int handle_invoke_status ( URLContext * s , RTMPPacket * pkt )
2009-07-31 06:49:36 +00:00
{
2012-07-21 10:59:58 +00:00
RTMPContext * rt = s - > priv_data ;
2013-08-08 16:52:11 +00:00
const uint8_t * data_end = pkt - > data + pkt - > size ;
2013-09-21 19:16:04 +00:00
const uint8_t * ptr = pkt - > data + RTMP_HEADER ;
2012-08-09 12:57:50 +00:00
uint8_t tmpstr [ 256 ] ;
2009-07-31 06:49:36 +00:00
int i , t ;
2012-08-09 12:57:50 +00:00
for ( i = 0 ; i < 2 ; i + + ) {
t = ff_amf_tag_size ( ptr , data_end ) ;
if ( t < 0 )
return 1 ;
ptr + = t ;
}
t = ff_amf_get_field_value ( ptr , data_end , " level " , tmpstr , sizeof ( tmpstr ) ) ;
if ( ! t & & ! strcmp ( tmpstr , " error " ) ) {
2013-10-03 05:44:51 +00:00
t = ff_amf_get_field_value ( ptr , data_end ,
" description " , tmpstr , sizeof ( tmpstr ) ) ;
if ( t | | ! tmpstr [ 0 ] )
t = ff_amf_get_field_value ( ptr , data_end , " code " ,
tmpstr , sizeof ( tmpstr ) ) ;
if ( ! t )
2012-08-09 12:57:50 +00:00
av_log ( s , AV_LOG_ERROR , " Server error: %s \n " , tmpstr ) ;
return - 1 ;
}
t = ff_amf_get_field_value ( ptr , data_end , " code " , tmpstr , sizeof ( tmpstr ) ) ;
if ( ! t & & ! strcmp ( tmpstr , " NetStream.Play.Start " ) ) rt - > state = STATE_PLAYING ;
if ( ! t & & ! strcmp ( tmpstr , " NetStream.Play.Stop " ) ) rt - > state = STATE_STOPPED ;
if ( ! t & & ! strcmp ( tmpstr , " NetStream.Play.UnpublishNotify " ) ) rt - > state = STATE_STOPPED ;
if ( ! t & & ! strcmp ( tmpstr , " NetStream.Publish.Start " ) ) rt - > state = STATE_PUBLISHING ;
2013-08-02 09:29:23 +00:00
if ( ! t & & ! strcmp ( tmpstr , " NetStream.Seek.Notify " ) ) rt - > state = STATE_PLAYING ;
2012-08-09 12:57:50 +00:00
return 0 ;
}
static int handle_invoke ( URLContext * s , RTMPPacket * pkt )
{
RTMPContext * rt = s - > priv_data ;
2012-08-08 12:36:39 +00:00
int ret = 0 ;
2009-07-31 06:49:36 +00:00
2012-07-21 10:59:58 +00:00
//TODO: check for the messages sent for wrong state?
2013-08-08 17:44:19 +00:00
if ( ff_amf_match_string ( pkt - > data , pkt - > size , " _error " ) ) {
2012-08-09 12:57:51 +00:00
if ( ( ret = handle_invoke_error ( s , pkt ) ) < 0 )
return ret ;
2013-08-08 17:44:19 +00:00
} else if ( ff_amf_match_string ( pkt - > data , pkt - > size , " _result " ) ) {
2012-08-09 12:57:49 +00:00
if ( ( ret = handle_invoke_result ( s , pkt ) ) < 0 )
2012-08-08 12:36:39 +00:00
return ret ;
2013-08-08 17:44:19 +00:00
} else if ( ff_amf_match_string ( pkt - > data , pkt - > size , " onStatus " ) ) {
2012-08-09 12:57:50 +00:00
if ( ( ret = handle_invoke_status ( s , pkt ) ) < 0 )
return ret ;
2013-08-08 17:44:19 +00:00
} else if ( ff_amf_match_string ( pkt - > data , pkt - > size , " onBWDone " ) ) {
2012-07-21 10:59:58 +00:00
if ( ( ret = gen_check_bw ( s , rt ) ) < 0 )
return ret ;
2013-08-08 17:44:19 +00:00
} else if ( ff_amf_match_string ( pkt - > data , pkt - > size , " releaseStream " ) | |
ff_amf_match_string ( pkt - > data , pkt - > size , " FCPublish " ) | |
ff_amf_match_string ( pkt - > data , pkt - > size , " publish " ) | |
2013-09-15 14:52:33 +00:00
ff_amf_match_string ( pkt - > data , pkt - > size , " play " ) | |
2013-08-08 17:44:19 +00:00
ff_amf_match_string ( pkt - > data , pkt - > size , " _checkbw " ) | |
ff_amf_match_string ( pkt - > data , pkt - > size , " createStream " ) ) {
2013-01-13 23:07:51 +00:00
if ( ( ret = send_invoke_response ( s , pkt ) ) < 0 )
2012-08-16 14:04:48 +00:00
return ret ;
2012-07-21 10:59:58 +00:00
}
2012-08-08 12:36:39 +00:00
return ret ;
2012-07-21 10:59:58 +00:00
}
2013-09-21 09:09:39 +00:00
static int update_offset ( RTMPContext * rt , int size )
{
int old_flv_size ;
2012-08-16 14:04:48 +00:00
2013-09-16 15:42:59 +00:00
// generate packet header and put data into buffer for FLV demuxer
if ( rt - > flv_off < rt - > flv_size ) {
2013-09-19 09:48:04 +00:00
// There is old unread data in the buffer, thus append at the end
2013-09-16 15:42:59 +00:00
old_flv_size = rt - > flv_size ;
2013-10-03 10:29:37 +00:00
rt - > flv_size + = size ;
2013-09-16 15:42:59 +00:00
} else {
2013-09-19 09:48:04 +00:00
// All data has been read, write the new data at the start of the buffer
2013-09-16 15:42:59 +00:00
old_flv_size = 0 ;
2013-10-03 10:29:37 +00:00
rt - > flv_size = size ;
2013-09-16 15:42:59 +00:00
rt - > flv_off = 0 ;
2012-08-16 14:04:48 +00:00
}
2013-09-18 23:49:41 +00:00
2013-09-21 09:09:39 +00:00
return old_flv_size ;
}
static int append_flv_data ( RTMPContext * rt , RTMPPacket * pkt , int skip )
{
int old_flv_size , ret ;
PutByteContext pbc ;
const uint8_t * data = pkt - > data + skip ;
const int size = pkt - > size - skip ;
uint32_t ts = pkt - > timestamp ;
2013-10-03 10:29:37 +00:00
old_flv_size = update_offset ( rt , size + 15 ) ;
2013-09-21 09:09:39 +00:00
2013-10-03 10:27:10 +00:00
if ( ( ret = av_reallocp ( & rt - > flv_data , rt - > flv_size ) ) < 0 ) {
rt - > flv_size = rt - > flv_off = 0 ;
2013-09-21 09:09:39 +00:00
return ret ;
2013-10-03 10:27:10 +00:00
}
2013-09-18 23:49:41 +00:00
bytestream2_init_writer ( & pbc , rt - > flv_data , rt - > flv_size ) ;
bytestream2_skip_p ( & pbc , old_flv_size ) ;
bytestream2_put_byte ( & pbc , pkt - > type ) ;
2013-09-21 09:09:39 +00:00
bytestream2_put_be24 ( & pbc , size ) ;
2013-09-18 23:49:41 +00:00
bytestream2_put_be24 ( & pbc , ts ) ;
bytestream2_put_byte ( & pbc , ts > > 24 ) ;
bytestream2_put_be24 ( & pbc , 0 ) ;
2013-09-21 09:09:39 +00:00
bytestream2_put_buffer ( & pbc , data , size ) ;
2013-09-18 23:49:41 +00:00
bytestream2_put_be32 ( & pbc , 0 ) ;
2012-08-16 14:04:48 +00:00
return 0 ;
}
2013-09-21 09:09:39 +00:00
static int handle_notify ( URLContext * s , RTMPPacket * pkt )
{
RTMPContext * rt = s - > priv_data ;
uint8_t commandbuffer [ 64 ] ;
char statusmsg [ 128 ] ;
int stringlen , ret , skip = 0 ;
GetByteContext gbc ;
bytestream2_init ( & gbc , pkt - > data , pkt - > size ) ;
if ( ff_amf_read_string ( & gbc , commandbuffer , sizeof ( commandbuffer ) ,
& stringlen ) )
return AVERROR_INVALIDDATA ;
// Skip the @setDataFrame string and validate it is a notification
if ( ! strcmp ( commandbuffer , " @setDataFrame " ) ) {
skip = gbc . buffer - pkt - > data ;
ret = ff_amf_read_string ( & gbc , statusmsg ,
sizeof ( statusmsg ) , & stringlen ) ;
if ( ret < 0 )
return AVERROR_INVALIDDATA ;
}
return append_flv_data ( rt , pkt , skip ) ;
}
2012-07-21 10:59:58 +00:00
/**
* Parse received packet and possibly perform some action depending on
* the packet contents .
* @ return 0 for no errors , negative values for serious errors which prevent
* further communications , positive values for uncritical errors
*/
static int rtmp_parse_result ( URLContext * s , RTMPContext * rt , RTMPPacket * pkt )
{
int ret ;
# ifdef DEBUG
ff_rtmp_packet_dump ( s , pkt ) ;
# endif
switch ( pkt - > type ) {
2012-08-13 17:46:04 +00:00
case RTMP_PT_BYTES_READ :
av_dlog ( s , " received bytes read report \n " ) ;
break ;
2012-07-21 10:59:58 +00:00
case RTMP_PT_CHUNK_SIZE :
if ( ( ret = handle_chunk_size ( s , pkt ) ) < 0 )
return ret ;
break ;
case RTMP_PT_PING :
if ( ( ret = handle_ping ( s , pkt ) ) < 0 )
return ret ;
break ;
case RTMP_PT_CLIENT_BW :
if ( ( ret = handle_client_bw ( s , pkt ) ) < 0 )
return ret ;
break ;
case RTMP_PT_SERVER_BW :
if ( ( ret = handle_server_bw ( s , pkt ) ) < 0 )
return ret ;
break ;
case RTMP_PT_INVOKE :
if ( ( ret = handle_invoke ( s , pkt ) ) < 0 )
return ret ;
2009-07-31 06:49:36 +00:00
break ;
2012-07-03 18:20:02 +00:00
case RTMP_PT_VIDEO :
case RTMP_PT_AUDIO :
2012-07-26 19:10:09 +00:00
case RTMP_PT_METADATA :
2012-08-16 14:04:48 +00:00
case RTMP_PT_NOTIFY :
2012-07-26 19:10:09 +00:00
/* Audio, Video and Metadata packets are parsed in get_packet() */
2012-07-03 18:20:02 +00:00
break ;
2012-06-13 12:45:57 +00:00
default :
av_log ( s , AV_LOG_VERBOSE , " Unknown packet type received 0x%02X \n " , pkt - > type ) ;
break ;
2009-07-31 06:49:36 +00:00
}
return 0 ;
}
2013-09-21 09:10:41 +00:00
static int handle_metadata ( RTMPContext * rt , RTMPPacket * pkt )
{
int ret , old_flv_size , type ;
const uint8_t * next ;
uint8_t * p ;
uint32_t size ;
uint32_t ts , cts , pts = 0 ;
old_flv_size = update_offset ( rt , pkt - > size ) ;
2013-10-03 10:27:10 +00:00
if ( ( ret = av_reallocp ( & rt - > flv_data , rt - > flv_size ) ) < 0 ) {
rt - > flv_size = rt - > flv_off = 0 ;
2013-09-21 09:10:41 +00:00
return ret ;
2013-10-03 10:27:10 +00:00
}
2013-09-21 09:10:41 +00:00
next = pkt - > data ;
p = rt - > flv_data + old_flv_size ;
/* copy data while rewriting timestamps */
ts = pkt - > timestamp ;
2013-09-21 19:16:04 +00:00
while ( next - pkt - > data < pkt - > size - RTMP_HEADER ) {
2013-09-21 09:10:41 +00:00
type = bytestream_get_byte ( & next ) ;
size = bytestream_get_be24 ( & next ) ;
cts = bytestream_get_be24 ( & next ) ;
cts | = bytestream_get_byte ( & next ) < < 24 ;
if ( ! pts )
pts = cts ;
ts + = cts - pts ;
pts = cts ;
bytestream_put_byte ( & p , type ) ;
bytestream_put_be24 ( & p , size ) ;
bytestream_put_be24 ( & p , ts ) ;
bytestream_put_byte ( & p , ts > > 24 ) ;
memcpy ( p , next , size + 3 + 4 ) ;
next + = size + 3 + 4 ;
p + = size + 3 + 4 ;
}
2013-10-03 11:44:38 +00:00
if ( p ! = rt - > flv_data + rt - > flv_size ) {
av_log ( NULL , AV_LOG_WARNING , " Incomplete flv packets in "
" RTMP_PT_METADATA packet \n " ) ;
rt - > flv_size = p - rt - > flv_data ;
}
2013-09-21 09:10:41 +00:00
return 0 ;
}
2009-07-31 06:49:36 +00:00
/**
2010-06-30 15:38:06 +00:00
* Interact with the server by receiving and sending RTMP packets until
2009-07-31 06:49:36 +00:00
* there is some significant data ( media data or expected status notification ) .
*
* @ param s reading context
2009-11-12 23:05:56 +00:00
* @ param for_header non - zero value tells function to work until it
* gets notification from the server that playing has been started ,
* otherwise function will work until some media data is received ( or
* an error happens )
2009-07-31 06:49:36 +00:00
* @ return 0 for successful operation , negative value in case of error
*/
static int get_packet ( URLContext * s , int for_header )
{
RTMPContext * rt = s - > priv_data ;
int ret ;
2009-12-11 11:37:21 +00:00
if ( rt - > state = = STATE_STOPPED )
return AVERROR_EOF ;
2009-12-06 07:03:46 +00:00
for ( ; ; ) {
2011-05-25 16:08:29 +00:00
RTMPPacket rpkt = { 0 } ;
2009-07-31 06:49:36 +00:00
if ( ( ret = ff_rtmp_packet_read ( rt - > stream , & rpkt ,
2012-08-10 17:03:22 +00:00
rt - > in_chunk_size , rt - > prev_pkt [ 0 ] ) ) < = 0 ) {
2010-01-30 09:45:52 +00:00
if ( ret = = 0 ) {
2009-07-31 06:49:36 +00:00
return AVERROR ( EAGAIN ) ;
} else {
return AVERROR ( EIO ) ;
}
}
2010-02-18 16:27:18 +00:00
rt - > bytes_read + = ret ;
if ( rt - > bytes_read > rt - > last_bytes_read + rt - > client_report_size ) {
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_DEBUG , " Sending bytes read report \n " ) ;
2012-05-23 20:45:03 +00:00
if ( ( ret = gen_bytes_read ( s , rt , rpkt . timestamp + 1 ) ) < 0 )
return ret ;
2010-02-18 16:27:18 +00:00
rt - > last_bytes_read = rt - > bytes_read ;
}
2009-07-31 06:49:36 +00:00
ret = rtmp_parse_result ( s , rt , & rpkt ) ;
2013-08-02 09:29:23 +00:00
// At this point we must check if we are in the seek state and continue
// with the next packet. handle_invoke will get us out of this state
// when the right message is encountered
if ( rt - > state = = STATE_SEEKING ) {
ff_rtmp_packet_destroy ( & rpkt ) ;
// We continue, let the natural flow of things happen:
// AVERROR(EAGAIN) or handle_invoke gets us out of here
continue ;
}
2009-07-31 06:49:36 +00:00
if ( ret < 0 ) { //serious error in current packet
ff_rtmp_packet_destroy ( & rpkt ) ;
2012-05-23 20:45:03 +00:00
return ret ;
2009-07-31 06:49:36 +00:00
}
2012-12-30 20:39:38 +00:00
if ( rt - > do_reconnect & & for_header ) {
ff_rtmp_packet_destroy ( & rpkt ) ;
return 0 ;
}
2009-12-11 11:37:21 +00:00
if ( rt - > state = = STATE_STOPPED ) {
ff_rtmp_packet_destroy ( & rpkt ) ;
return AVERROR_EOF ;
}
2012-08-16 14:04:48 +00:00
if ( for_header & & ( rt - > state = = STATE_PLAYING | |
rt - > state = = STATE_PUBLISHING | |
2013-09-15 14:52:33 +00:00
rt - > state = = STATE_SENDING | |
2012-08-16 14:04:48 +00:00
rt - > state = = STATE_RECEIVING ) ) {
2009-07-31 06:49:36 +00:00
ff_rtmp_packet_destroy ( & rpkt ) ;
return 0 ;
}
2013-08-08 16:52:11 +00:00
if ( ! rpkt . size | | ! rt - > is_input ) {
2009-07-31 06:49:36 +00:00
ff_rtmp_packet_destroy ( & rpkt ) ;
continue ;
}
2013-09-21 09:09:39 +00:00
if ( rpkt . type = = RTMP_PT_VIDEO | | rpkt . type = = RTMP_PT_AUDIO ) {
ret = append_flv_data ( rt , & rpkt , 0 ) ;
2009-07-31 06:49:36 +00:00
ff_rtmp_packet_destroy ( & rpkt ) ;
2013-09-21 09:09:39 +00:00
return ret ;
2012-08-16 14:04:48 +00:00
} else if ( rpkt . type = = RTMP_PT_NOTIFY ) {
ret = handle_notify ( s , & rpkt ) ;
ff_rtmp_packet_destroy ( & rpkt ) ;
2013-09-21 09:09:39 +00:00
return ret ;
2009-07-31 06:49:36 +00:00
} else if ( rpkt . type = = RTMP_PT_METADATA ) {
2013-09-21 09:10:41 +00:00
ret = handle_metadata ( rt , & rpkt ) ;
2009-07-31 06:49:36 +00:00
ff_rtmp_packet_destroy ( & rpkt ) ;
return 0 ;
}
ff_rtmp_packet_destroy ( & rpkt ) ;
}
}
static int rtmp_close ( URLContext * h )
{
RTMPContext * rt = h - > priv_data ;
2013-09-17 06:58:48 +00:00
int ret = 0 , i , j ;
2009-07-31 06:49:36 +00:00
2009-12-06 07:03:46 +00:00
if ( ! rt - > is_input ) {
2009-12-04 16:52:16 +00:00
rt - > flv_data = NULL ;
2013-08-08 16:52:11 +00:00
if ( rt - > out_pkt . size )
2009-12-04 16:52:16 +00:00
ff_rtmp_packet_destroy ( & rt - > out_pkt ) ;
2009-12-06 07:01:37 +00:00
if ( rt - > state > STATE_FCPUBLISH )
2012-05-23 20:45:03 +00:00
ret = gen_fcunpublish_stream ( h , rt ) ;
2009-12-04 16:52:16 +00:00
}
2009-12-06 07:01:37 +00:00
if ( rt - > state > STATE_HANDSHAKED )
2012-05-23 20:45:03 +00:00
ret = gen_delete_stream ( h , rt ) ;
2013-09-17 06:58:48 +00:00
for ( i = 0 ; i < 2 ; i + + )
for ( j = 0 ; j < RTMP_CHANNELS ; j + + )
ff_rtmp_packet_destroy ( & rt - > prev_pkt [ i ] [ j ] ) ;
2009-12-04 16:52:16 +00:00
2012-08-08 12:36:39 +00:00
free_tracked_methods ( rt ) ;
2009-07-31 06:49:36 +00:00
av_freep ( & rt - > flv_data ) ;
2011-03-31 15:36:06 +00:00
ffurl_close ( rt - > stream ) ;
2012-05-23 20:45:03 +00:00
return ret ;
2009-07-31 06:49:36 +00:00
}
/**
2010-06-30 15:38:06 +00:00
* Open RTMP connection and verify that the stream can be played .
2009-07-31 06:49:36 +00:00
*
* URL syntax : rtmp : //server[:port][/app][/playpath]
* where ' app ' is first one or two directories in the path
* ( e . g . / ondemand / , / flash / live / , etc . )
* and ' playpath ' is a file name ( the rest of the path ,
* may be prefixed with " mp4: " )
*/
static int rtmp_open ( URLContext * s , const char * uri , int flags )
{
2011-12-01 09:44:21 +00:00
RTMPContext * rt = s - > priv_data ;
2012-12-30 20:39:38 +00:00
char proto [ 8 ] , hostname [ 256 ] , path [ 1024 ] , auth [ 100 ] , * fname ;
2012-04-15 19:49:48 +00:00
char * old_app ;
2009-07-31 06:49:36 +00:00
uint8_t buf [ 2048 ] ;
2009-12-02 12:55:10 +00:00
int port ;
2012-07-17 10:02:43 +00:00
AVDictionary * opts = NULL ;
2009-07-31 06:49:36 +00:00
int ret ;
2012-08-16 14:04:48 +00:00
if ( rt - > listen_timeout > 0 )
rt - > listen = 1 ;
2011-04-15 14:42:09 +00:00
rt - > is_input = ! ( flags & AVIO_FLAG_WRITE ) ;
2009-07-31 06:49:36 +00:00
2012-12-30 20:39:38 +00:00
av_url_split ( proto , sizeof ( proto ) , auth , sizeof ( auth ) ,
hostname , sizeof ( hostname ) , & port ,
2010-03-08 09:05:03 +00:00
path , sizeof ( path ) , s - > filename ) ;
2009-07-31 06:49:36 +00:00
2013-08-10 08:53:31 +00:00
if ( strchr ( path , ' ' ) ) {
av_log ( s , AV_LOG_WARNING ,
" Detected librtmp style URL parameters, these aren't supported "
" by the libavformat internal RTMP handler currently enabled. "
" See the documentation for the correct way to pass parameters. \n " ) ;
}
2012-12-30 20:39:38 +00:00
if ( auth [ 0 ] ) {
char * ptr = strchr ( auth , ' : ' ) ;
if ( ptr ) {
* ptr = ' \0 ' ;
av_strlcpy ( rt - > username , auth , sizeof ( rt - > username ) ) ;
av_strlcpy ( rt - > password , ptr + 1 , sizeof ( rt - > password ) ) ;
}
}
2012-08-16 14:04:48 +00:00
if ( rt - > listen & & strcmp ( proto , " rtmp " ) ) {
av_log ( s , AV_LOG_ERROR , " rtmp_listen not available for %s \n " ,
proto ) ;
return AVERROR ( EINVAL ) ;
}
2012-07-17 10:02:43 +00:00
if ( ! strcmp ( proto , " rtmpt " ) | | ! strcmp ( proto , " rtmpts " ) ) {
if ( ! strcmp ( proto , " rtmpts " ) )
av_dict_set ( & opts , " ffrtmphttp_tls " , " 1 " , 1 ) ;
2012-06-17 18:24:43 +00:00
/* open the http tunneling connection */
2012-07-16 09:56:20 +00:00
ff_url_join ( buf , sizeof ( buf ) , " ffrtmphttp " , NULL , hostname , port , NULL ) ;
2012-07-17 10:02:42 +00:00
} else if ( ! strcmp ( proto , " rtmps " ) ) {
/* open the tls connection */
if ( port < 0 )
port = RTMPS_DEFAULT_PORT ;
ff_url_join ( buf , sizeof ( buf ) , " tls " , NULL , hostname , port , NULL ) ;
2012-07-20 14:36:47 +00:00
} else if ( ! strcmp ( proto , " rtmpe " ) | | ( ! strcmp ( proto , " rtmpte " ) ) ) {
if ( ! strcmp ( proto , " rtmpte " ) )
av_dict_set ( & opts , " ffrtmpcrypt_tunneling " , " 1 " , 1 ) ;
2012-07-19 12:13:58 +00:00
/* open the encrypted connection */
ff_url_join ( buf , sizeof ( buf ) , " ffrtmpcrypt " , NULL , hostname , port , NULL ) ;
rt - > encrypted = 1 ;
2012-06-17 18:24:43 +00:00
} else {
/* open the tcp connection */
if ( port < 0 )
port = RTMP_DEFAULT_PORT ;
2012-08-16 14:04:48 +00:00
if ( rt - > listen )
ff_url_join ( buf , sizeof ( buf ) , " tcp " , NULL , hostname , port ,
" ?listen&listen_timeout=%d " ,
rt - > listen_timeout * 1000 ) ;
else
ff_url_join ( buf , sizeof ( buf ) , " tcp " , NULL , hostname , port , NULL ) ;
2012-06-17 18:24:43 +00:00
}
2009-07-31 06:49:36 +00:00
2012-12-30 20:39:38 +00:00
reconnect :
2012-05-23 20:45:03 +00:00
if ( ( ret = ffurl_open ( & rt - > stream , buf , AVIO_FLAG_READ_WRITE ,
2012-07-17 10:02:43 +00:00
& s - > interrupt_callback , & opts ) ) < 0 ) {
2011-04-15 14:42:09 +00:00
av_log ( s , AV_LOG_ERROR , " Cannot open connection %s \n " , buf ) ;
2009-07-31 06:49:36 +00:00
goto fail ;
2009-11-22 08:42:55 +00:00
}
2009-07-31 06:49:36 +00:00
2012-08-15 14:11:50 +00:00
if ( rt - > swfverify ) {
if ( ( ret = rtmp_calc_swfhash ( s ) ) < 0 )
goto fail ;
}
2009-12-04 16:52:42 +00:00
rt - > state = STATE_START ;
2012-08-16 14:04:48 +00:00
if ( ! rt - > listen & & ( ret = rtmp_handshake ( s , rt ) ) < 0 )
goto fail ;
if ( rt - > listen & & ( ret = rtmp_server_handshake ( s , rt ) ) < 0 )
2011-12-01 09:34:06 +00:00
goto fail ;
2009-07-31 06:49:36 +00:00
2012-08-10 17:03:22 +00:00
rt - > out_chunk_size = 128 ;
rt - > in_chunk_size = 128 ; // Probably overwritten later
2009-12-04 16:52:42 +00:00
rt - > state = STATE_HANDSHAKED ;
2012-04-15 19:49:48 +00:00
// Keep the application name when it has been defined by the user.
old_app = rt - > app ;
rt - > app = av_malloc ( APP_MAX_LENGTH ) ;
if ( ! rt - > app ) {
2012-05-23 20:45:03 +00:00
ret = AVERROR ( ENOMEM ) ;
goto fail ;
2012-04-15 19:49:48 +00:00
}
2009-12-04 16:52:42 +00:00
//extract "app" part from path
if ( ! strncmp ( path , " /ondemand/ " , 10 ) ) {
fname = path + 10 ;
memcpy ( rt - > app , " ondemand " , 9 ) ;
} else {
2012-05-16 08:45:47 +00:00
char * next = * path ? path + 1 : path ;
char * p = strchr ( next , ' / ' ) ;
2009-12-04 16:52:42 +00:00
if ( ! p ) {
2012-05-16 08:45:47 +00:00
fname = next ;
2009-12-04 16:52:42 +00:00
rt - > app [ 0 ] = ' \0 ' ;
2009-07-31 06:49:36 +00:00
} else {
2012-05-15 00:24:27 +00:00
// make sure we do not mismatch a playpath for an application instance
2009-12-04 16:52:42 +00:00
char * c = strchr ( p + 1 , ' : ' ) ;
fname = strchr ( p + 1 , ' / ' ) ;
2012-05-15 00:24:27 +00:00
if ( ! fname | | ( c & & c < fname ) ) {
2009-12-04 16:52:42 +00:00
fname = p + 1 ;
av_strlcpy ( rt - > app , path + 1 , p - path ) ;
2009-07-31 06:49:36 +00:00
} else {
2009-12-04 16:52:42 +00:00
fname + + ;
av_strlcpy ( rt - > app , path + 1 , fname - path - 1 ) ;
2009-07-31 06:49:36 +00:00
}
}
2009-12-04 16:52:42 +00:00
}
2012-04-15 19:49:48 +00:00
if ( old_app ) {
// The name of application has been defined by the user, override it.
av_free ( rt - > app ) ;
rt - > app = old_app ;
}
2012-04-15 19:50:50 +00:00
if ( ! rt - > playpath ) {
2012-06-07 15:46:34 +00:00
int len = strlen ( fname ) ;
2012-04-15 19:50:50 +00:00
rt - > playpath = av_malloc ( PLAYPATH_MAX_LENGTH ) ;
if ( ! rt - > playpath ) {
2012-05-23 20:45:03 +00:00
ret = AVERROR ( ENOMEM ) ;
goto fail ;
2012-04-15 19:50:50 +00:00
}
2012-06-11 12:21:32 +00:00
if ( ! strchr ( fname , ' : ' ) & & len > = 4 & &
2012-06-07 15:46:34 +00:00
( ! strcmp ( fname + len - 4 , " .f4v " ) | |
! strcmp ( fname + len - 4 , " .mp4 " ) ) ) {
2012-04-15 19:50:50 +00:00
memcpy ( rt - > playpath , " mp4: " , 5 ) ;
2012-06-11 12:21:32 +00:00
} else if ( len > = 4 & & ! strcmp ( fname + len - 4 , " .flv " ) ) {
2012-06-07 15:46:34 +00:00
fname [ len - 4 ] = ' \0 ' ;
2012-04-15 19:50:50 +00:00
} else {
rt - > playpath [ 0 ] = 0 ;
}
2012-11-05 09:01:24 +00:00
av_strlcat ( rt - > playpath , fname , PLAYPATH_MAX_LENGTH ) ;
2009-12-04 16:52:42 +00:00
}
2009-07-31 06:49:36 +00:00
2012-05-09 00:12:14 +00:00
if ( ! rt - > tcurl ) {
rt - > tcurl = av_malloc ( TCURL_MAX_LENGTH ) ;
2012-05-23 16:55:34 +00:00
if ( ! rt - > tcurl ) {
ret = AVERROR ( ENOMEM ) ;
goto fail ;
}
2012-05-09 00:12:14 +00:00
ff_url_join ( rt - > tcurl , TCURL_MAX_LENGTH , proto , NULL , hostname ,
port , " /%s " , rt - > app ) ;
}
2012-05-09 00:12:15 +00:00
if ( ! rt - > flashver ) {
rt - > flashver = av_malloc ( FLASHVER_MAX_LENGTH ) ;
2012-05-23 16:55:34 +00:00
if ( ! rt - > flashver ) {
ret = AVERROR ( ENOMEM ) ;
goto fail ;
}
2012-05-09 00:12:15 +00:00
if ( rt - > is_input ) {
snprintf ( rt - > flashver , FLASHVER_MAX_LENGTH , " %s %d,%d,%d,%d " ,
RTMP_CLIENT_PLATFORM , RTMP_CLIENT_VER1 , RTMP_CLIENT_VER2 ,
RTMP_CLIENT_VER3 , RTMP_CLIENT_VER4 ) ;
} else {
snprintf ( rt - > flashver , FLASHVER_MAX_LENGTH ,
" FMLE/3.0 (compatible; %s) " , LIBAVFORMAT_IDENT ) ;
}
}
2010-02-18 16:27:18 +00:00
rt - > client_report_size = 1048576 ;
rt - > bytes_read = 0 ;
rt - > last_bytes_read = 0 ;
2012-06-13 12:47:26 +00:00
rt - > server_bw = 2500000 ;
2010-02-18 16:27:18 +00:00
2011-02-03 11:53:28 +00:00
av_log ( s , AV_LOG_DEBUG , " Proto = %s, path = %s, app = %s, fname = %s \n " ,
2009-12-04 16:52:42 +00:00
proto , path , rt - > app , rt - > playpath ) ;
2012-08-16 14:04:48 +00:00
if ( ! rt - > listen ) {
if ( ( ret = gen_connect ( s , rt ) ) < 0 )
goto fail ;
} else {
if ( read_connect ( s , s - > priv_data ) < 0 )
goto fail ;
}
2009-07-31 06:49:36 +00:00
2009-12-04 16:52:42 +00:00
do {
ret = get_packet ( s , 1 ) ;
2013-09-17 12:07:10 +00:00
} while ( ret = = AVERROR ( EAGAIN ) ) ;
2009-12-04 16:52:42 +00:00
if ( ret < 0 )
goto fail ;
2009-12-04 16:52:16 +00:00
2012-12-30 20:39:38 +00:00
if ( rt - > do_reconnect ) {
ffurl_close ( rt - > stream ) ;
rt - > stream = NULL ;
rt - > do_reconnect = 0 ;
rt - > nb_invokes = 0 ;
memset ( rt - > prev_pkt , 0 , sizeof ( rt - > prev_pkt ) ) ;
free_tracked_methods ( rt ) ;
goto reconnect ;
}
2009-12-04 16:52:16 +00:00
if ( rt - > is_input ) {
2013-09-18 16:12:36 +00:00
int err ;
2009-07-31 06:49:36 +00:00
// generate FLV header for demuxer
rt - > flv_size = 13 ;
2013-09-18 16:12:36 +00:00
if ( ( err = av_reallocp ( & rt - > flv_data , rt - > flv_size ) ) < 0 )
return err ;
2009-07-31 06:49:36 +00:00
rt - > flv_off = 0 ;
memcpy ( rt - > flv_data , " FLV \1 \5 \0 \0 \0 \011 \0 \0 \0 \0 " , rt - > flv_size ) ;
2009-12-04 16:52:16 +00:00
} else {
rt - > flv_size = 0 ;
rt - > flv_data = NULL ;
rt - > flv_off = 0 ;
2011-09-21 20:21:30 +00:00
rt - > skip_bytes = 13 ;
2009-07-31 06:49:36 +00:00
}
2011-03-31 15:58:04 +00:00
s - > max_packet_size = rt - > stream - > max_packet_size ;
2009-07-31 06:49:36 +00:00
s - > is_streamed = 1 ;
return 0 ;
fail :
2012-07-17 10:02:43 +00:00
av_dict_free ( & opts ) ;
2009-07-31 06:49:36 +00:00
rtmp_close ( s ) ;
2012-05-23 20:45:03 +00:00
return ret ;
2009-07-31 06:49:36 +00:00
}
static int rtmp_read ( URLContext * s , uint8_t * buf , int size )
{
RTMPContext * rt = s - > priv_data ;
int orig_size = size ;
int ret ;
while ( size > 0 ) {
int data_left = rt - > flv_size - rt - > flv_off ;
if ( data_left > = size ) {
memcpy ( buf , rt - > flv_data + rt - > flv_off , size ) ;
rt - > flv_off + = size ;
return orig_size ;
}
if ( data_left > 0 ) {
memcpy ( buf , rt - > flv_data + rt - > flv_off , data_left ) ;
buf + = data_left ;
size - = data_left ;
rt - > flv_off = rt - > flv_size ;
2010-06-18 12:02:51 +00:00
return data_left ;
2009-07-31 06:49:36 +00:00
}
if ( ( ret = get_packet ( s , 0 ) ) < 0 )
return ret ;
}
return orig_size ;
}
2013-08-02 09:29:23 +00:00
static int64_t rtmp_seek ( URLContext * s , int stream_index , int64_t timestamp ,
int flags )
{
RTMPContext * rt = s - > priv_data ;
int ret ;
av_log ( s , AV_LOG_DEBUG ,
2013-08-08 15:43:15 +00:00
" Seek on stream index %d at timestamp % " PRId64 " with flags %08x \n " ,
2013-08-02 09:29:23 +00:00
stream_index , timestamp , flags ) ;
if ( ( ret = gen_seek ( s , rt , timestamp ) ) < 0 ) {
av_log ( s , AV_LOG_ERROR ,
2013-08-08 15:43:15 +00:00
" Unable to send seek command on stream index %d at timestamp "
" % " PRId64 " with flags %08x \n " ,
2013-08-02 09:29:23 +00:00
stream_index , timestamp , flags ) ;
return ret ;
}
rt - > flv_off = rt - > flv_size ;
rt - > state = STATE_SEEKING ;
return timestamp ;
}
2011-02-03 11:17:35 +00:00
static int rtmp_write ( URLContext * s , const uint8_t * buf , int size )
2009-07-31 06:49:36 +00:00
{
2011-02-03 11:17:35 +00:00
RTMPContext * rt = s - > priv_data ;
2009-12-04 16:52:16 +00:00
int size_temp = size ;
int pktsize , pkttype ;
uint32_t ts ;
const uint8_t * buf_temp = buf ;
2012-06-14 13:28:40 +00:00
uint8_t c ;
2012-05-23 20:45:03 +00:00
int ret ;
2009-12-04 16:52:16 +00:00
do {
2011-09-21 20:21:30 +00:00
if ( rt - > skip_bytes ) {
int skip = FFMIN ( rt - > skip_bytes , size_temp ) ;
buf_temp + = skip ;
size_temp - = skip ;
rt - > skip_bytes - = skip ;
continue ;
}
2013-09-21 19:16:04 +00:00
if ( rt - > flv_header_bytes < RTMP_HEADER ) {
2011-09-21 20:21:30 +00:00
const uint8_t * header = rt - > flv_header ;
2013-09-21 19:16:04 +00:00
int copy = FFMIN ( RTMP_HEADER - rt - > flv_header_bytes , size_temp ) ;
2013-09-16 20:20:57 +00:00
int channel = RTMP_AUDIO_CHANNEL ;
2011-09-21 20:21:30 +00:00
bytestream_get_buffer ( & buf_temp , rt - > flv_header + rt - > flv_header_bytes , copy ) ;
rt - > flv_header_bytes + = copy ;
size_temp - = copy ;
2013-09-21 19:16:04 +00:00
if ( rt - > flv_header_bytes < RTMP_HEADER )
2011-09-21 20:21:30 +00:00
break ;
2009-12-04 16:52:16 +00:00
2011-09-21 20:21:30 +00:00
pkttype = bytestream_get_byte ( & header ) ;
pktsize = bytestream_get_be24 ( & header ) ;
ts = bytestream_get_be24 ( & header ) ;
ts | = bytestream_get_byte ( & header ) < < 24 ;
bytestream_get_be24 ( & header ) ;
2009-12-04 16:52:16 +00:00
rt - > flv_size = pktsize ;
2013-09-16 20:20:56 +00:00
if ( pkttype = = RTMP_PT_VIDEO )
channel = RTMP_VIDEO_CHANNEL ;
2009-12-04 16:52:16 +00:00
//force 12bytes header
if ( ( ( pkttype = = RTMP_PT_VIDEO | | pkttype = = RTMP_PT_AUDIO ) & & ts = = 0 ) | |
pkttype = = RTMP_PT_NOTIFY ) {
if ( pkttype = = RTMP_PT_NOTIFY )
pktsize + = 16 ;
2013-09-16 20:20:56 +00:00
rt - > prev_pkt [ 1 ] [ channel ] . channel_id = 0 ;
2009-12-04 16:52:16 +00:00
}
//this can be a big packet, it's better to send it right here
2013-09-16 20:20:56 +00:00
if ( ( ret = ff_rtmp_packet_create ( & rt - > out_pkt , channel ,
2012-05-23 20:45:03 +00:00
pkttype , ts , pktsize ) ) < 0 )
return ret ;
2013-09-16 20:20:58 +00:00
rt - > out_pkt . extra = rt - > stream_id ;
2009-12-04 16:52:16 +00:00
rt - > flv_data = rt - > out_pkt . data ;
if ( pkttype = = RTMP_PT_NOTIFY )
ff_amf_write_string ( & rt - > flv_data , " @setDataFrame " ) ;
}
if ( rt - > flv_size - rt - > flv_off > size_temp ) {
bytestream_get_buffer ( & buf_temp , rt - > flv_data + rt - > flv_off , size_temp ) ;
rt - > flv_off + = size_temp ;
2011-09-18 03:39:53 +00:00
size_temp = 0 ;
2009-12-04 16:52:16 +00:00
} else {
bytestream_get_buffer ( & buf_temp , rt - > flv_data + rt - > flv_off , rt - > flv_size - rt - > flv_off ) ;
2011-09-18 03:39:53 +00:00
size_temp - = rt - > flv_size - rt - > flv_off ;
2009-12-04 16:52:16 +00:00
rt - > flv_off + = rt - > flv_size - rt - > flv_off ;
}
if ( rt - > flv_off = = rt - > flv_size ) {
2011-09-21 20:21:30 +00:00
rt - > skip_bytes = 4 ;
2012-08-08 12:36:39 +00:00
if ( ( ret = rtmp_send_packet ( rt , & rt - > out_pkt , 0 ) ) < 0 )
2012-05-24 11:48:25 +00:00
return ret ;
2009-12-04 16:52:16 +00:00
rt - > flv_size = 0 ;
rt - > flv_off = 0 ;
2011-09-21 20:21:30 +00:00
rt - > flv_header_bytes = 0 ;
2012-06-18 12:55:55 +00:00
rt - > flv_nb_packets + + ;
2009-12-04 16:52:16 +00:00
}
2011-09-18 03:39:53 +00:00
} while ( buf_temp - buf < size ) ;
2012-06-14 13:28:40 +00:00
2012-06-18 12:55:55 +00:00
if ( rt - > flv_nb_packets < rt - > flush_interval )
return size ;
rt - > flv_nb_packets = 0 ;
2012-06-14 13:28:40 +00:00
/* set stream into nonblocking mode */
rt - > stream - > flags | = AVIO_FLAG_NONBLOCK ;
/* try to read one byte from the stream */
ret = ffurl_read ( rt - > stream , & c , 1 ) ;
/* switch the stream back into blocking mode */
rt - > stream - > flags & = ~ AVIO_FLAG_NONBLOCK ;
if ( ret = = AVERROR ( EAGAIN ) ) {
/* no incoming data to handle */
return size ;
} else if ( ret < 0 ) {
return ret ;
} else if ( ret = = 1 ) {
RTMPPacket rpkt = { 0 } ;
if ( ( ret = ff_rtmp_packet_read_internal ( rt - > stream , & rpkt ,
2012-08-10 17:03:22 +00:00
rt - > in_chunk_size ,
2012-06-14 13:28:40 +00:00
rt - > prev_pkt [ 0 ] , c ) ) < = 0 )
return ret ;
if ( ( ret = rtmp_parse_result ( s , rt , & rpkt ) ) < 0 )
return ret ;
ff_rtmp_packet_destroy ( & rpkt ) ;
}
2009-12-04 16:52:16 +00:00
return size ;
2009-07-31 06:49:36 +00:00
}
2012-04-15 19:49:48 +00:00
# define OFFSET(x) offsetof(RTMPContext, x)
# define DEC AV_OPT_FLAG_DECODING_PARAM
# define ENC AV_OPT_FLAG_ENCODING_PARAM
static const AVOption rtmp_options [ ] = {
{ " rtmp_app " , " Name of application to connect to on the RTMP server " , OFFSET ( app ) , AV_OPT_TYPE_STRING , { . str = NULL } , 0 , 0 , DEC | ENC } ,
2012-08-31 10:22:31 +00:00
{ " rtmp_buffer " , " Set buffer time in milliseconds. The default is 3000. " , OFFSET ( client_buffer_time ) , AV_OPT_TYPE_INT , { . i64 = 3000 } , 0 , INT_MAX , DEC | ENC } ,
2012-06-08 11:16:34 +00:00
{ " rtmp_conn " , " Append arbitrary AMF data to the Connect message " , OFFSET ( conn ) , AV_OPT_TYPE_STRING , { . str = NULL } , 0 , 0 , DEC | ENC } ,
2012-05-09 00:12:15 +00:00
{ " rtmp_flashver " , " Version of the Flash plugin used to run the SWF player. " , OFFSET ( flashver ) , AV_OPT_TYPE_STRING , { . str = NULL } , 0 , 0 , DEC | ENC } ,
2012-08-31 10:22:31 +00:00
{ " rtmp_flush_interval " , " Number of packets flushed in the same request (RTMPT only). " , OFFSET ( flush_interval ) , AV_OPT_TYPE_INT , { . i64 = 10 } , 0 , INT_MAX , ENC } ,
{ " rtmp_live " , " Specify that the media is a live stream. " , OFFSET ( live ) , AV_OPT_TYPE_INT , { . i64 = - 2 } , INT_MIN , INT_MAX , DEC , " rtmp_live " } ,
2012-08-31 09:45:52 +00:00
{ " any " , " both " , 0 , AV_OPT_TYPE_CONST , { . i64 = - 2 } , 0 , 0 , DEC , " rtmp_live " } ,
{ " live " , " live stream " , 0 , AV_OPT_TYPE_CONST , { . i64 = - 1 } , 0 , 0 , DEC , " rtmp_live " } ,
{ " recorded " , " recorded stream " , 0 , AV_OPT_TYPE_CONST , { . i64 = 0 } , 0 , 0 , DEC , " rtmp_live " } ,
2012-07-24 14:29:40 +00:00
{ " rtmp_pageurl " , " URL of the web page in which the media was embedded. By default no value will be sent. " , OFFSET ( pageurl ) , AV_OPT_TYPE_STRING , { . str = NULL } , 0 , 0 , DEC } ,
2012-04-15 19:50:50 +00:00
{ " rtmp_playpath " , " Stream identifier to play or to publish " , OFFSET ( playpath ) , AV_OPT_TYPE_STRING , { . str = NULL } , 0 , 0 , DEC | ENC } ,
2012-08-07 20:02:27 +00:00
{ " rtmp_subscribe " , " Name of live stream to subscribe to. Defaults to rtmp_playpath. " , OFFSET ( subscribe ) , AV_OPT_TYPE_STRING , { . str = NULL } , 0 , 0 , DEC } ,
2012-08-13 15:05:00 +00:00
{ " rtmp_swfhash " , " SHA256 hash of the decompressed SWF file (32 bytes). " , OFFSET ( swfhash ) , AV_OPT_TYPE_BINARY , . flags = DEC } ,
2012-08-31 10:22:31 +00:00
{ " rtmp_swfsize " , " Size of the decompressed SWF file, required for SWFVerification. " , OFFSET ( swfsize ) , AV_OPT_TYPE_INT , { . i64 = 0 } , 0 , INT_MAX , DEC } ,
2012-05-09 00:12:16 +00:00
{ " rtmp_swfurl " , " URL of the SWF player. By default no value will be sent " , OFFSET ( swfurl ) , AV_OPT_TYPE_STRING , { . str = NULL } , 0 , 0 , DEC | ENC } ,
2012-08-15 14:11:50 +00:00
{ " rtmp_swfverify " , " URL to player swf file, compute hash/size automatically. " , OFFSET ( swfverify ) , AV_OPT_TYPE_STRING , { . str = NULL } , 0 , 0 , DEC } ,
2012-07-24 14:29:38 +00:00
{ " rtmp_tcurl " , " URL of the target stream. Defaults to proto://host[:port]/app. " , OFFSET ( tcurl ) , AV_OPT_TYPE_STRING , { . str = NULL } , 0 , 0 , DEC | ENC } ,
2012-08-31 10:22:31 +00:00
{ " rtmp_listen " , " Listen for incoming rtmp connections " , OFFSET ( listen ) , AV_OPT_TYPE_INT , { . i64 = 0 } , INT_MIN , INT_MAX , DEC , " rtmp_listen " } ,
2013-10-01 13:42:06 +00:00
{ " listen " , " Listen for incoming rtmp connections " , OFFSET ( listen ) , AV_OPT_TYPE_INT , { . i64 = 0 } , INT_MIN , INT_MAX , DEC , " rtmp_listen " } ,
2012-08-31 10:22:31 +00:00
{ " timeout " , " Maximum timeout (in seconds) to wait for incoming connections. -1 is infinite. Implies -rtmp_listen 1 " , OFFSET ( listen_timeout ) , AV_OPT_TYPE_INT , { . i64 = - 1 } , INT_MIN , INT_MAX , DEC , " rtmp_listen " } ,
2012-04-15 19:49:48 +00:00
{ NULL } ,
} ;
2012-08-07 10:21:31 +00:00
# define RTMP_PROTOCOL(flavor) \
static const AVClass flavor # # _class = { \
. class_name = # flavor , \
. item_name = av_default_item_name , \
. option = rtmp_options , \
. version = LIBAVUTIL_VERSION_INT , \
} ; \
\
URLProtocol ff_ # # flavor # # _protocol = { \
. name = # flavor , \
. url_open = rtmp_open , \
. url_read = rtmp_read , \
2013-08-02 09:29:23 +00:00
. url_read_seek = rtmp_seek , \
2012-08-07 10:21:31 +00:00
. url_write = rtmp_write , \
. url_close = rtmp_close , \
. priv_data_size = sizeof ( RTMPContext ) , \
. flags = URL_PROTOCOL_FLAG_NETWORK , \
. priv_data_class = & flavor # # _class , \
2012-04-15 19:49:48 +00:00
} ;
2012-07-20 14:36:47 +00:00
2012-08-07 10:21:31 +00:00
RTMP_PROTOCOL ( rtmp )
RTMP_PROTOCOL ( rtmpe )
RTMP_PROTOCOL ( rtmps )
RTMP_PROTOCOL ( rtmpt )
RTMP_PROTOCOL ( rtmpte )
RTMP_PROTOCOL ( rtmpts )