2 * Copyright (C) 2005-2008 Team XBMC
4 * Copyright (C) 2008-2009 Andrej Stepanchuk
5 * Copyright (C) 2009-2010 Howard Chu
7 * This file is part of librtmp.
9 * librtmp is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU Lesser General Public License as
11 * published by the Free Software Foundation; either version 2.1,
12 * or (at your option) any later version.
14 * librtmp is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public License
20 * along with librtmp see the file COPYING. If not, write to
21 * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
22 * Boston, MA 02110-1301, USA.
23 * http://www.gnu.org/copyleft/lgpl.html
37 #include <polarssl/havege.h>
38 #include <polarssl/md5.h>
39 #include <polarssl/base64.h>
40 #define MD5_DIGEST_LENGTH 16
42 static const char *my_dhm_P
=
43 "E4004C1F94182000103D883A448B3F80" \
44 "2CE4B44A83301270002C20D0321CFD00" \
45 "11CCEF784C26A400F43DFB901BCA7538" \
46 "F2C6B176001CF5A0FD16D2C48B1D0C1C" \
47 "F6AC8E1DA6BCC3B4E1F96B0564965300" \
48 "FFA1D0B601EB2800F489AA512C4B248C" \
49 "01F76949A60BB7F00A40B1EAB64BDD48" \
50 "E8A700D60B7F1200FA8E77B0A979DABF";
52 static const char *my_dhm_G
= "4";
54 #elif defined(USE_GNUTLS)
55 #include <gnutls/gnutls.h>
56 #define MD5_DIGEST_LENGTH 16
57 #include <nettle/base64.h>
58 #include <nettle/md5.h>
59 #else /* USE_OPENSSL */
60 #include <openssl/ssl.h>
61 #include <openssl/rc4.h>
62 #include <openssl/md5.h>
63 #include <openssl/bio.h>
64 #include <openssl/buffer.h>
69 #define RTMP_SIG_SIZE 1536
70 #define RTMP_LARGE_HEADER_SIZE 12
72 static const int packetSize
[] = { 12, 8, 4, 1 };
76 const char RTMPProtocolStrings
[][7] = {
88 const char RTMPProtocolStringsLower
[][7] = {
100 static const char *RTMPT_cmds
[] = {
108 RTMPT_OPEN
=0, RTMPT_SEND
, RTMPT_IDLE
, RTMPT_CLOSE
111 static int DumpMetaData(AMFObject
*obj
);
112 static int HandShake(RTMP
*r
, int FP9HandShake
);
113 static int SocksNegotiate(RTMP
*r
);
115 static int SendConnectPacket(RTMP
*r
, RTMPPacket
*cp
);
116 static int SendCheckBW(RTMP
*r
);
117 static int SendCheckBWResult(RTMP
*r
, double txn
);
118 static int SendDeleteStream(RTMP
*r
, double dStreamId
);
119 static int SendFCSubscribe(RTMP
*r
, AVal
*subscribepath
);
120 static int SendPlay(RTMP
*r
);
121 static int SendBytesReceived(RTMP
*r
);
122 static int SendUsherToken(RTMP
*r
, AVal
*usherToken
);
125 static int SendBGHasStream(RTMP
*r
, double dId
, AVal
*playpath
);
128 static int HandleInvoke(RTMP
*r
, const char *body
, unsigned int nBodySize
);
129 static int HandleMetadata(RTMP
*r
, char *body
, unsigned int len
);
130 static void HandleChangeChunkSize(RTMP
*r
, const RTMPPacket
*packet
);
131 static void HandleAudio(RTMP
*r
, const RTMPPacket
*packet
);
132 static void HandleVideo(RTMP
*r
, const RTMPPacket
*packet
);
133 static void HandleCtrl(RTMP
*r
, const RTMPPacket
*packet
);
134 static void HandleServerBW(RTMP
*r
, const RTMPPacket
*packet
);
135 static void HandleClientBW(RTMP
*r
, const RTMPPacket
*packet
);
137 static int ReadN(RTMP
*r
, char *buffer
, int n
);
138 static int WriteN(RTMP
*r
, const char *buffer
, int n
);
140 static void DecodeTEA(AVal
*key
, AVal
*text
);
142 static int HTTP_Post(RTMP
*r
, RTMPTCmd cmd
, const char *buf
, int len
);
143 static int HTTP_read(RTMP
*r
, int fill
);
145 static void CloseInternal(RTMP
*r
, int reconnect
);
152 #include "handshake.h"
160 #elif defined(_WIN32)
161 return timeGetTime();
164 if (!clk_tck
) clk_tck
= sysconf(_SC_CLK_TCK
);
165 return times(&t
) * 1000 / clk_tck
;
176 RTMPPacket_Reset(RTMPPacket
*p
)
182 p
->m_nInfoField2
= 0;
183 p
->m_hasAbsTimestamp
= FALSE
;
189 RTMPPacket_Alloc(RTMPPacket
*p
, int nSize
)
191 char *ptr
= calloc(1, nSize
+ RTMP_MAX_HEADER_SIZE
);
194 p
->m_body
= ptr
+ RTMP_MAX_HEADER_SIZE
;
200 RTMPPacket_Free(RTMPPacket
*p
)
204 free(p
->m_body
- RTMP_MAX_HEADER_SIZE
);
210 RTMPPacket_Dump(RTMPPacket
*p
)
212 RTMP_Log(RTMP_LOGDEBUG
,
213 "RTMP PACKET: packet type: 0x%02x. channel: 0x%02x. info 1: %d info 2: %d. Body size: %u. body: 0x%02x",
214 p
->m_packetType
, p
->m_nChannel
, p
->m_nTimeStamp
, p
->m_nInfoField2
,
215 p
->m_nBodySize
, p
->m_body
? (unsigned char)p
->m_body
[0] : 0);
221 return RTMP_LIB_VERSION
;
229 /* Do this regardless of NO_SSL, we use havege for rtmpe too */
230 RTMP_TLS_ctx
= calloc(1,sizeof(struct tls_ctx
));
231 havege_init(&RTMP_TLS_ctx
->hs
);
232 #elif defined(USE_GNUTLS) && !defined(NO_SSL)
233 /* Technically we need to initialize libgcrypt ourselves if
234 * we're not going to call gnutls_global_init(). Ignoring this
237 gnutls_global_init();
238 RTMP_TLS_ctx
= malloc(sizeof(struct tls_ctx
));
239 gnutls_certificate_allocate_credentials(&RTMP_TLS_ctx
->cred
);
240 gnutls_priority_init(&RTMP_TLS_ctx
->prios
, "NORMAL", NULL
);
241 gnutls_certificate_set_x509_trust_file(RTMP_TLS_ctx
->cred
,
242 "ca.pem", GNUTLS_X509_FMT_PEM
);
243 #elif !defined(NO_SSL) /* USE_OPENSSL */
244 /* libcrypto doesn't need anything special */
245 SSL_load_error_strings();
247 OpenSSL_add_all_digests();
248 RTMP_TLS_ctx
= SSL_CTX_new(SSLv23_method());
249 SSL_CTX_set_options(RTMP_TLS_ctx
, SSL_OP_ALL
);
250 SSL_CTX_set_default_verify_paths(RTMP_TLS_ctx
);
256 RTMP_TLS_AllocServerContext(const char* cert
, const char* key
)
263 tls_server_ctx
*tc
= ctx
= calloc(1, sizeof(struct tls_server_ctx
));
264 tc
->dhm_P
= my_dhm_P
;
265 tc
->dhm_G
= my_dhm_G
;
266 tc
->hs
= &RTMP_TLS_ctx
->hs
;
267 if (x509parse_crtfile(&tc
->cert
, cert
)) {
271 if (x509parse_keyfile(&tc
->key
, key
, NULL
)) {
272 x509_free(&tc
->cert
);
276 #elif defined(USE_GNUTLS) && !defined(NO_SSL)
277 gnutls_certificate_allocate_credentials((gnutls_certificate_credentials
*) &ctx
);
278 if (gnutls_certificate_set_x509_key_file(ctx
, cert
, key
, GNUTLS_X509_FMT_PEM
) != 0) {
279 gnutls_certificate_free_credentials(ctx
);
282 #elif !defined(NO_SSL) /* USE_OPENSSL */
283 ctx
= SSL_CTX_new(SSLv23_server_method());
284 if (!SSL_CTX_use_certificate_chain_file(ctx
, cert
)) {
288 if (!SSL_CTX_use_PrivateKey_file(ctx
, key
, SSL_FILETYPE_PEM
)) {
298 RTMP_TLS_FreeServerContext(void *ctx
)
302 x509_free(&((tls_server_ctx
*)ctx
)->cert
);
303 rsa_free(&((tls_server_ctx
*)ctx
)->key
);
305 #elif defined(USE_GNUTLS) && !defined(NO_SSL)
306 gnutls_certificate_free_credentials(ctx
);
307 #elif !defined(NO_SSL) /* USE_OPENSSL */
316 return calloc(1, sizeof(RTMP
));
333 memset(r
, 0, sizeof(RTMP
));
334 r
->m_sb
.sb_socket
= -1;
335 r
->m_inChunkSize
= RTMP_DEFAULT_CHUNKSIZE
;
336 r
->m_outChunkSize
= RTMP_DEFAULT_CHUNKSIZE
;
337 r
->m_nBufferMS
= 30000;
338 r
->m_nClientBW
= 2500000;
340 r
->m_nServerBW
= 2500000;
341 r
->m_fAudioCodecs
= 3191.0;
342 r
->m_fVideoCodecs
= 252.0;
343 r
->Link
.timeout
= 30;
348 RTMP_EnableWrite(RTMP
*r
)
350 r
->Link
.protocol
|= RTMP_FEATURE_WRITE
;
354 RTMP_GetDuration(RTMP
*r
)
356 return r
->m_fDuration
;
360 RTMP_IsConnected(RTMP
*r
)
362 return r
->m_sb
.sb_socket
!= -1;
368 return r
->m_sb
.sb_socket
;
372 RTMP_IsTimedout(RTMP
*r
)
374 return r
->m_sb
.sb_timedout
;
378 RTMP_SetBufferMS(RTMP
*r
, int size
)
380 r
->m_nBufferMS
= size
;
384 RTMP_UpdateBufferMS(RTMP
*r
)
386 RTMP_SendCtrl(r
, 3, r
->m_stream_id
, r
->m_nBufferMS
);
392 #elif defined(__sun__)
394 #elif defined(__APPLE__)
396 #elif defined(__linux__)
401 #define DEF_VERSTR OSS " 10,0,32,18"
402 static const char DEFAULT_FLASH_VER
[] = DEF_VERSTR
;
403 const AVal RTMP_DefaultFlashVer
=
404 { (char *)DEFAULT_FLASH_VER
, sizeof(DEFAULT_FLASH_VER
) - 1 };
407 SocksSetup(RTMP
*r
, AVal
*sockshost
)
409 if (sockshost
->av_len
)
411 const char *socksport
= strchr(sockshost
->av_val
, ':');
412 char *hostname
= strdup(sockshost
->av_val
);
415 hostname
[socksport
- sockshost
->av_val
] = '\0';
416 r
->Link
.sockshost
.av_val
= hostname
;
417 r
->Link
.sockshost
.av_len
= strlen(hostname
);
419 r
->Link
.socksport
= socksport
? atoi(socksport
+ 1) : 1080;
420 RTMP_Log(RTMP_LOGDEBUG
, "Connecting via SOCKS proxy: %s:%d", r
->Link
.sockshost
.av_val
,
425 r
->Link
.sockshost
.av_val
= NULL
;
426 r
->Link
.sockshost
.av_len
= 0;
427 r
->Link
.socksport
= 0;
432 RTMP_SetupStream(RTMP
*r
,
449 int dStop
, int bLiveStream
, long int timeout
)
451 RTMP_Log(RTMP_LOGDEBUG
, "Protocol : %s", RTMPProtocolStrings
[protocol
&7]);
452 RTMP_Log(RTMP_LOGDEBUG
, "Hostname : %.*s", host
->av_len
, host
->av_val
);
453 RTMP_Log(RTMP_LOGDEBUG
, "Port : %d", port
);
454 RTMP_Log(RTMP_LOGDEBUG
, "Playpath : %s", playpath
->av_val
);
456 if (tcUrl
&& tcUrl
->av_val
)
457 RTMP_Log(RTMP_LOGDEBUG
, "tcUrl : %s", tcUrl
->av_val
);
458 if (swfUrl
&& swfUrl
->av_val
)
459 RTMP_Log(RTMP_LOGDEBUG
, "swfUrl : %s", swfUrl
->av_val
);
460 if (pageUrl
&& pageUrl
->av_val
)
461 RTMP_Log(RTMP_LOGDEBUG
, "pageUrl : %s", pageUrl
->av_val
);
462 if (app
&& app
->av_val
)
463 RTMP_Log(RTMP_LOGDEBUG
, "app : %.*s", app
->av_len
, app
->av_val
);
464 if (auth
&& auth
->av_val
)
465 RTMP_Log(RTMP_LOGDEBUG
, "auth : %s", auth
->av_val
);
466 if (subscribepath
&& subscribepath
->av_val
)
467 RTMP_Log(RTMP_LOGDEBUG
, "subscribepath : %s", subscribepath
->av_val
);
468 if (usherToken
&& usherToken
->av_val
)
469 RTMP_Log(RTMP_LOGDEBUG
, "NetStream.Authenticate.UsherToken : %s", usherToken
->av_val
);
470 if (flashVer
&& flashVer
->av_val
)
471 RTMP_Log(RTMP_LOGDEBUG
, "flashVer : %s", flashVer
->av_val
);
473 RTMP_Log(RTMP_LOGDEBUG
, "StartTime : %d msec", dStart
);
475 RTMP_Log(RTMP_LOGDEBUG
, "StopTime : %d msec", dStop
);
477 RTMP_Log(RTMP_LOGDEBUG
, "live : %s", bLiveStream
? "yes" : "no");
478 RTMP_Log(RTMP_LOGDEBUG
, "timeout : %ld sec", timeout
);
481 if (swfSHA256Hash
!= NULL
&& swfSize
> 0)
483 memcpy(r
->Link
.SWFHash
, swfSHA256Hash
->av_val
, sizeof(r
->Link
.SWFHash
));
484 r
->Link
.SWFSize
= swfSize
;
485 RTMP_Log(RTMP_LOGDEBUG
, "SWFSHA256:");
486 RTMP_LogHex(RTMP_LOGDEBUG
, r
->Link
.SWFHash
, sizeof(r
->Link
.SWFHash
));
487 RTMP_Log(RTMP_LOGDEBUG
, "SWFSize : %u", r
->Link
.SWFSize
);
495 SocksSetup(r
, sockshost
);
497 if (tcUrl
&& tcUrl
->av_len
)
498 r
->Link
.tcUrl
= *tcUrl
;
499 if (swfUrl
&& swfUrl
->av_len
)
500 r
->Link
.swfUrl
= *swfUrl
;
501 if (pageUrl
&& pageUrl
->av_len
)
502 r
->Link
.pageUrl
= *pageUrl
;
503 if (app
&& app
->av_len
)
505 if (auth
&& auth
->av_len
)
507 r
->Link
.auth
= *auth
;
508 r
->Link
.lFlags
|= RTMP_LF_AUTH
;
510 if (flashVer
&& flashVer
->av_len
)
511 r
->Link
.flashVer
= *flashVer
;
513 r
->Link
.flashVer
= RTMP_DefaultFlashVer
;
514 if (subscribepath
&& subscribepath
->av_len
)
515 r
->Link
.subscribepath
= *subscribepath
;
516 if (usherToken
&& usherToken
->av_len
)
517 r
->Link
.usherToken
= *usherToken
;
518 r
->Link
.seekTime
= dStart
;
519 r
->Link
.stopTime
= dStop
;
521 r
->Link
.lFlags
|= RTMP_LF_LIVE
;
522 r
->Link
.timeout
= timeout
;
524 r
->Link
.protocol
= protocol
;
525 r
->Link
.hostname
= *host
;
527 r
->Link
.playpath
= *playpath
;
529 if (r
->Link
.port
== 0)
531 if (protocol
& RTMP_FEATURE_SSL
)
533 else if (protocol
& RTMP_FEATURE_HTTP
)
540 enum { OPT_STR
=0, OPT_INT
, OPT_BOOL
, OPT_CONN
};
541 static const char *optinfo
[] = {
542 "string", "integer", "boolean", "AMF" };
544 #define OFF(x) offsetof(struct RTMP,x)
546 static struct urlopt
{
553 { AVC("socks"), OFF(Link
.sockshost
), OPT_STR
, 0,
554 "Use the specified SOCKS proxy" },
555 { AVC("app"), OFF(Link
.app
), OPT_STR
, 0,
556 "Name of target app on server" },
557 { AVC("tcUrl"), OFF(Link
.tcUrl
), OPT_STR
, 0,
558 "URL to played stream" },
559 { AVC("pageUrl"), OFF(Link
.pageUrl
), OPT_STR
, 0,
560 "URL of played media's web page" },
561 { AVC("swfUrl"), OFF(Link
.swfUrl
), OPT_STR
, 0,
562 "URL to player SWF file" },
563 { AVC("flashver"), OFF(Link
.flashVer
), OPT_STR
, 0,
564 "Flash version string (default " DEF_VERSTR
")" },
565 { AVC("conn"), OFF(Link
.extras
), OPT_CONN
, 0,
566 "Append arbitrary AMF data to Connect message" },
567 { AVC("playpath"), OFF(Link
.playpath
), OPT_STR
, 0,
568 "Path to target media on server" },
569 { AVC("playlist"), OFF(Link
.lFlags
), OPT_BOOL
, RTMP_LF_PLST
,
570 "Set playlist before play command" },
571 { AVC("live"), OFF(Link
.lFlags
), OPT_BOOL
, RTMP_LF_LIVE
,
572 "Stream is live, no seeking possible" },
573 { AVC("subscribe"), OFF(Link
.subscribepath
), OPT_STR
, 0,
574 "Stream to subscribe to" },
575 { AVC("jtv"), OFF(Link
.usherToken
), OPT_STR
, 0,
576 "Justin.tv authentication token" },
577 { AVC("token"), OFF(Link
.token
), OPT_STR
, 0,
578 "Key for SecureToken response" },
579 { AVC("swfVfy"), OFF(Link
.lFlags
), OPT_BOOL
, RTMP_LF_SWFV
,
580 "Perform SWF Verification" },
581 { AVC("swfAge"), OFF(Link
.swfAge
), OPT_INT
, 0,
582 "Number of days to use cached SWF hash" },
583 { AVC("start"), OFF(Link
.seekTime
), OPT_INT
, 0,
584 "Stream start position in milliseconds" },
585 { AVC("stop"), OFF(Link
.stopTime
), OPT_INT
, 0,
586 "Stream stop position in milliseconds" },
587 { AVC("buffer"), OFF(m_nBufferMS
), OPT_INT
, 0,
588 "Buffer time in milliseconds" },
589 { AVC("timeout"), OFF(Link
.timeout
), OPT_INT
, 0,
590 "Session timeout in seconds" },
591 { AVC("pubUser"), OFF(Link
.pubUser
), OPT_STR
, 0,
592 "Publisher username" },
593 { AVC("pubPasswd"), OFF(Link
.pubPasswd
), OPT_STR
, 0,
594 "Publisher password" },
598 static const AVal truth
[] = {
606 static void RTMP_OptUsage()
610 RTMP_Log(RTMP_LOGERROR
, "Valid RTMP options are:\n");
611 for (i
=0; options
[i
].name
.av_len
; i
++) {
612 RTMP_Log(RTMP_LOGERROR
, "%10s %-7s %s\n", options
[i
].name
.av_val
,
613 optinfo
[options
[i
].otype
], options
[i
].use
);
618 parseAMF(AMFObject
*obj
, AVal
*av
, int *depth
)
620 AMFObjectProperty prop
= {{0,0}};
622 char *p
, *arg
= av
->av_val
;
630 prop
.p_type
= AMF_BOOLEAN
;
631 prop
.p_vu
.p_number
= atoi(p
);
634 prop
.p_type
= AMF_STRING
;
635 prop
.p_vu
.p_aval
.av_val
= p
;
636 prop
.p_vu
.p_aval
.av_len
= av
->av_len
- (p
-arg
);
639 prop
.p_type
= AMF_NUMBER
;
640 prop
.p_vu
.p_number
= strtod(p
, NULL
);
643 prop
.p_type
= AMF_NULL
;
649 prop
.p_type
= AMF_OBJECT
;
661 else if (arg
[2] == ':' && arg
[0] == 'N')
663 p
= strchr(arg
+3, ':');
666 prop
.p_name
.av_val
= (char *)arg
+3;
667 prop
.p_name
.av_len
= p
- (arg
+3);
673 prop
.p_type
= AMF_BOOLEAN
;
674 prop
.p_vu
.p_number
= atoi(p
);
677 prop
.p_type
= AMF_STRING
;
678 prop
.p_vu
.p_aval
.av_val
= p
;
679 prop
.p_vu
.p_aval
.av_len
= av
->av_len
- (p
-arg
);
682 prop
.p_type
= AMF_NUMBER
;
683 prop
.p_vu
.p_number
= strtod(p
, NULL
);
686 prop
.p_type
= AMF_OBJECT
;
698 for (i
=0; i
<*depth
; i
++)
700 o2
= &obj
->o_props
[obj
->o_num
-1].p_vu
.p_object
;
704 AMF_AddProp(obj
, &prop
);
705 if (prop
.p_type
== AMF_OBJECT
)
710 int RTMP_SetOpt(RTMP
*r
, const AVal
*opt
, AVal
*arg
)
715 for (i
=0; options
[i
].name
.av_len
; i
++) {
716 if (opt
->av_len
!= options
[i
].name
.av_len
) continue;
717 if (strcasecmp(opt
->av_val
, options
[i
].name
.av_val
)) continue;
718 v
= (char *)r
+ options
[i
].off
;
719 switch(options
[i
].otype
) {
725 long l
= strtol(arg
->av_val
, NULL
, 0);
731 for (j
=0; truth
[j
].av_len
; j
++) {
732 if (arg
->av_len
!= truth
[j
].av_len
) continue;
733 if (strcasecmp(arg
->av_val
, truth
[j
].av_val
)) continue;
734 fl
|= options
[i
].omisc
; break; }
739 if (parseAMF(&r
->Link
.extras
, arg
, &r
->Link
.edepth
))
745 if (!options
[i
].name
.av_len
) {
746 RTMP_Log(RTMP_LOGERROR
, "Unknown option %s", opt
->av_val
);
754 int RTMP_SetupURL(RTMP
*r
, char *url
)
757 char *p1
, *p2
, *ptr
= strchr(url
, ' ');
759 unsigned int port
= 0;
765 ret
= RTMP_ParseURL(url
, &r
->Link
.protocol
, &r
->Link
.hostname
,
766 &port
, &r
->Link
.playpath0
, &r
->Link
.app
);
770 r
->Link
.playpath
= r
->Link
.playpath0
;
775 p2
= strchr(p1
, '=');
779 opt
.av_len
= p2
- p1
;
782 ptr
= strchr(p2
, ' ');
785 arg
.av_len
= ptr
- p2
;
786 /* skip repeated spaces */
790 arg
.av_len
= strlen(p2
);
795 for (p1
=p2
; port
>0;) {
800 sscanf(p1
+1, "%02x", &c
);
809 arg
.av_len
= p2
- arg
.av_val
;
811 ret
= RTMP_SetOpt(r
, &opt
, &arg
);
816 if (!r
->Link
.tcUrl
.av_len
)
818 r
->Link
.tcUrl
.av_val
= url
;
819 if (r
->Link
.app
.av_len
)
821 if (r
->Link
.app
.av_val
< url
+ len
)
823 /* if app is part of original url, just use it */
824 r
->Link
.tcUrl
.av_len
= r
->Link
.app
.av_len
+ (r
->Link
.app
.av_val
- url
);
828 len
= r
->Link
.hostname
.av_len
+ r
->Link
.app
.av_len
+
829 sizeof("rtmpte://:65535/");
830 r
->Link
.tcUrl
.av_val
= malloc(len
);
831 r
->Link
.tcUrl
.av_len
= snprintf(r
->Link
.tcUrl
.av_val
, len
,
833 RTMPProtocolStringsLower
[r
->Link
.protocol
],
834 r
->Link
.hostname
.av_len
, r
->Link
.hostname
.av_val
,
836 r
->Link
.app
.av_len
, r
->Link
.app
.av_val
);
837 r
->Link
.lFlags
|= RTMP_LF_FTCU
;
842 r
->Link
.tcUrl
.av_len
= strlen(url
);
847 if ((r
->Link
.lFlags
& RTMP_LF_SWFV
) && r
->Link
.swfUrl
.av_len
)
848 RTMP_HashSWF(r
->Link
.swfUrl
.av_val
, &r
->Link
.SWFSize
,
849 (unsigned char *)r
->Link
.SWFHash
, r
->Link
.swfAge
);
852 SocksSetup(r
, &r
->Link
.sockshost
);
854 if (r
->Link
.port
== 0)
856 if (r
->Link
.protocol
& RTMP_FEATURE_SSL
)
858 else if (r
->Link
.protocol
& RTMP_FEATURE_HTTP
)
867 add_addr_info(struct sockaddr_in
*service
, AVal
*host
, int port
)
871 if (host
->av_val
[host
->av_len
])
873 hostname
= malloc(host
->av_len
+1);
874 memcpy(hostname
, host
->av_val
, host
->av_len
);
875 hostname
[host
->av_len
] = '\0';
879 hostname
= host
->av_val
;
882 service
->sin_addr
.s_addr
= inet_addr(hostname
);
883 if (service
->sin_addr
.s_addr
== INADDR_NONE
)
885 struct hostent
*host
= gethostbyname(hostname
);
886 if (host
== NULL
|| host
->h_addr
== NULL
)
888 RTMP_Log(RTMP_LOGERROR
, "Problem accessing the DNS. (addr: %s)", hostname
);
892 service
->sin_addr
= *(struct in_addr
*)host
->h_addr
;
895 service
->sin_port
= htons(port
);
897 if (hostname
!= host
->av_val
)
903 RTMP_Connect0(RTMP
*r
, struct sockaddr
* service
)
906 r
->m_sb
.sb_timedout
= FALSE
;
908 r
->m_fDuration
= 0.0;
910 r
->m_sb
.sb_socket
= socket(AF_INET
, SOCK_STREAM
, IPPROTO_TCP
);
911 if (r
->m_sb
.sb_socket
!= -1)
913 if (connect(r
->m_sb
.sb_socket
, service
, sizeof(struct sockaddr
)) < 0)
915 int err
= GetSockError();
916 RTMP_Log(RTMP_LOGERROR
, "%s, failed to connect socket. %d (%s)",
917 __FUNCTION__
, err
, strerror(err
));
922 if (r
->Link
.socksport
)
924 RTMP_Log(RTMP_LOGDEBUG
, "%s ... SOCKS negotiation", __FUNCTION__
);
925 if (!SocksNegotiate(r
))
927 RTMP_Log(RTMP_LOGERROR
, "%s, SOCKS negotiation failed.", __FUNCTION__
);
935 RTMP_Log(RTMP_LOGERROR
, "%s, failed to create socket. Error: %d", __FUNCTION__
,
942 SET_RCVTIMEO(tv
, r
->Link
.timeout
);
944 (r
->m_sb
.sb_socket
, SOL_SOCKET
, SO_RCVTIMEO
, (char *)&tv
, sizeof(tv
)))
946 RTMP_Log(RTMP_LOGERROR
, "%s, Setting socket timeout to %ds failed!",
947 __FUNCTION__
, r
->Link
.timeout
);
951 setsockopt(r
->m_sb
.sb_socket
, IPPROTO_TCP
, TCP_NODELAY
, (char *) &on
, sizeof(on
));
957 RTMP_TLS_Accept(RTMP
*r
, void *ctx
)
959 #if defined(CRYPTO) && !defined(NO_SSL)
960 TLS_server(ctx
, r
->m_sb
.sb_ssl
);
961 TLS_setfd(r
->m_sb
.sb_ssl
, r
->m_sb
.sb_socket
);
962 if (TLS_accept(r
->m_sb
.sb_ssl
) < 0)
964 RTMP_Log(RTMP_LOGERROR
, "%s, TLS_Connect failed", __FUNCTION__
);
974 RTMP_Connect1(RTMP
*r
, RTMPPacket
*cp
)
976 if (r
->Link
.protocol
& RTMP_FEATURE_SSL
)
978 #if defined(CRYPTO) && !defined(NO_SSL)
979 TLS_client(RTMP_TLS_ctx
, r
->m_sb
.sb_ssl
);
980 TLS_setfd(r
->m_sb
.sb_ssl
, r
->m_sb
.sb_socket
);
981 if (TLS_connect(r
->m_sb
.sb_ssl
) < 0)
983 RTMP_Log(RTMP_LOGERROR
, "%s, TLS_Connect failed", __FUNCTION__
);
988 RTMP_Log(RTMP_LOGERROR
, "%s, no SSL/TLS support", __FUNCTION__
);
994 if (r
->Link
.protocol
& RTMP_FEATURE_HTTP
)
997 r
->m_clientID
.av_val
= NULL
;
998 r
->m_clientID
.av_len
= 0;
999 HTTP_Post(r
, RTMPT_OPEN
, "", 1);
1000 if (HTTP_read(r
, 1) != 0)
1002 r
->m_msgCounter
= 0;
1003 RTMP_Log(RTMP_LOGDEBUG
, "%s, Could not connect for handshake", __FUNCTION__
);
1007 r
->m_msgCounter
= 0;
1009 RTMP_Log(RTMP_LOGDEBUG
, "%s, ... connected, handshaking", __FUNCTION__
);
1010 if (!HandShake(r
, TRUE
))
1012 RTMP_Log(RTMP_LOGERROR
, "%s, handshake failed.", __FUNCTION__
);
1016 RTMP_Log(RTMP_LOGDEBUG
, "%s, handshaked", __FUNCTION__
);
1018 if (!SendConnectPacket(r
, cp
))
1020 RTMP_Log(RTMP_LOGERROR
, "%s, RTMP connect failed.", __FUNCTION__
);
1028 RTMP_Connect(RTMP
*r
, RTMPPacket
*cp
)
1030 struct sockaddr_in service
;
1031 if (!r
->Link
.hostname
.av_len
)
1034 memset(&service
, 0, sizeof(struct sockaddr_in
));
1035 service
.sin_family
= AF_INET
;
1037 if (r
->Link
.socksport
)
1039 /* Connect via SOCKS */
1040 if (!add_addr_info(&service
, &r
->Link
.sockshost
, r
->Link
.socksport
))
1045 /* Connect directly */
1046 if (!add_addr_info(&service
, &r
->Link
.hostname
, r
->Link
.port
))
1050 if (!RTMP_Connect0(r
, (struct sockaddr
*)&service
))
1053 r
->m_bSendCounter
= TRUE
;
1055 return RTMP_Connect1(r
, cp
);
1059 SocksNegotiate(RTMP
*r
)
1062 struct sockaddr_in service
;
1063 memset(&service
, 0, sizeof(struct sockaddr_in
));
1065 add_addr_info(&service
, &r
->Link
.hostname
, r
->Link
.port
);
1066 addr
= htonl(service
.sin_addr
.s_addr
);
1070 4, 1, /* SOCKS 4, connect */
1071 (r
->Link
.port
>> 8) & 0xFF,
1072 (r
->Link
.port
) & 0xFF,
1073 (char)(addr
>> 24) & 0xFF, (char)(addr
>> 16) & 0xFF,
1074 (char)(addr
>> 8) & 0xFF, (char)addr
& 0xFF,
1076 }; /* NULL terminate */
1078 WriteN(r
, packet
, sizeof packet
);
1080 if (ReadN(r
, packet
, 8) != 8)
1083 if (packet
[0] == 0 && packet
[1] == 90)
1089 RTMP_Log(RTMP_LOGERROR
, "%s, SOCKS returned error code %d", __FUNCTION__
, packet
[1]);
1096 RTMP_ConnectStream(RTMP
*r
, int seekTime
)
1098 RTMPPacket packet
= { 0 };
1100 /* seekTime was already set by SetupStream / SetupURL.
1101 * This is only needed by ReconnectStream.
1104 r
->Link
.seekTime
= seekTime
;
1106 r
->m_mediaChannel
= 0;
1108 while (!r
->m_bPlaying
&& RTMP_IsConnected(r
) && RTMP_ReadPacket(r
, &packet
))
1110 if (RTMPPacket_IsReady(&packet
))
1112 if (!packet
.m_nBodySize
)
1114 if ((packet
.m_packetType
== RTMP_PACKET_TYPE_AUDIO
) ||
1115 (packet
.m_packetType
== RTMP_PACKET_TYPE_VIDEO
) ||
1116 (packet
.m_packetType
== RTMP_PACKET_TYPE_INFO
))
1118 RTMP_Log(RTMP_LOGWARNING
, "Received FLV packet before play()! Ignoring.");
1119 RTMPPacket_Free(&packet
);
1123 RTMP_ClientPacket(r
, &packet
);
1124 RTMPPacket_Free(&packet
);
1128 return r
->m_bPlaying
;
1132 RTMP_ReconnectStream(RTMP
*r
, int seekTime
)
1134 RTMP_DeleteStream(r
);
1136 RTMP_SendCreateStream(r
);
1138 return RTMP_ConnectStream(r
, seekTime
);
1142 RTMP_ToggleStream(RTMP
*r
)
1148 if (RTMP_IsTimedout(r
) && r
->m_read
.status
== RTMP_READ_EOF
)
1149 r
->m_read
.status
= 0;
1151 res
= RTMP_SendPause(r
, TRUE
, r
->m_pauseStamp
);
1158 res
= RTMP_SendPause(r
, FALSE
, r
->m_pauseStamp
);
1164 RTMP_DeleteStream(RTMP
*r
)
1166 if (r
->m_stream_id
< 0)
1169 r
->m_bPlaying
= FALSE
;
1171 SendDeleteStream(r
, r
->m_stream_id
);
1172 r
->m_stream_id
= -1;
1176 RTMP_GetNextMediaPacket(RTMP
*r
, RTMPPacket
*packet
)
1178 int bHasMediaPacket
= 0;
1180 while (!bHasMediaPacket
&& RTMP_IsConnected(r
)
1181 && RTMP_ReadPacket(r
, packet
))
1183 if (!RTMPPacket_IsReady(packet
))
1188 bHasMediaPacket
= RTMP_ClientPacket(r
, packet
);
1190 if (!bHasMediaPacket
)
1192 RTMPPacket_Free(packet
);
1194 else if (r
->m_pausing
== 3)
1196 if (packet
->m_nTimeStamp
<= r
->m_mediaStamp
)
1198 bHasMediaPacket
= 0;
1200 RTMP_Log(RTMP_LOGDEBUG
,
1201 "Skipped type: %02X, size: %d, TS: %d ms, abs TS: %d, pause: %d ms",
1202 packet
->m_packetType
, packet
->m_nBodySize
,
1203 packet
->m_nTimeStamp
, packet
->m_hasAbsTimestamp
,
1206 RTMPPacket_Free(packet
);
1213 if (bHasMediaPacket
)
1214 r
->m_bPlaying
= TRUE
;
1215 else if (r
->m_sb
.sb_timedout
&& !r
->m_pausing
)
1216 r
->m_pauseStamp
= r
->m_mediaChannel
< r
->m_channelsAllocatedIn
?
1217 r
->m_channelTimestamp
[r
->m_mediaChannel
] : 0;
1219 return bHasMediaPacket
;
1223 RTMP_ClientPacket(RTMP
*r
, RTMPPacket
*packet
)
1225 int bHasMediaPacket
= 0;
1226 switch (packet
->m_packetType
)
1228 case RTMP_PACKET_TYPE_CHUNK_SIZE
:
1230 HandleChangeChunkSize(r
, packet
);
1233 case RTMP_PACKET_TYPE_BYTES_READ_REPORT
:
1234 /* bytes read report */
1235 RTMP_Log(RTMP_LOGDEBUG
, "%s, received: bytes read report", __FUNCTION__
);
1238 case RTMP_PACKET_TYPE_CONTROL
:
1240 HandleCtrl(r
, packet
);
1243 case RTMP_PACKET_TYPE_SERVER_BW
:
1245 HandleServerBW(r
, packet
);
1248 case RTMP_PACKET_TYPE_CLIENT_BW
:
1250 HandleClientBW(r
, packet
);
1253 case RTMP_PACKET_TYPE_AUDIO
:
1255 /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: audio %lu bytes", __FUNCTION__, packet.m_nBodySize); */
1256 HandleAudio(r
, packet
);
1257 bHasMediaPacket
= 1;
1258 if (!r
->m_mediaChannel
)
1259 r
->m_mediaChannel
= packet
->m_nChannel
;
1261 r
->m_mediaStamp
= packet
->m_nTimeStamp
;
1264 case RTMP_PACKET_TYPE_VIDEO
:
1266 /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: video %lu bytes", __FUNCTION__, packet.m_nBodySize); */
1267 HandleVideo(r
, packet
);
1268 bHasMediaPacket
= 1;
1269 if (!r
->m_mediaChannel
)
1270 r
->m_mediaChannel
= packet
->m_nChannel
;
1272 r
->m_mediaStamp
= packet
->m_nTimeStamp
;
1275 case RTMP_PACKET_TYPE_FLEX_STREAM_SEND
:
1276 /* flex stream send */
1277 RTMP_Log(RTMP_LOGDEBUG
,
1278 "%s, flex stream send, size %u bytes, not supported, ignoring",
1279 __FUNCTION__
, packet
->m_nBodySize
);
1282 case RTMP_PACKET_TYPE_FLEX_SHARED_OBJECT
:
1283 /* flex shared object */
1284 RTMP_Log(RTMP_LOGDEBUG
,
1285 "%s, flex shared object, size %u bytes, not supported, ignoring",
1286 __FUNCTION__
, packet
->m_nBodySize
);
1289 case RTMP_PACKET_TYPE_FLEX_MESSAGE
:
1292 RTMP_Log(RTMP_LOGDEBUG
,
1293 "%s, flex message, size %u bytes, not fully supported",
1294 __FUNCTION__
, packet
->m_nBodySize
);
1295 /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
1297 /* some DEBUG code */
1299 RTMP_LIB_AMFObject obj
;
1300 int nRes
= obj
.Decode(packet
.m_body
+1, packet
.m_nBodySize
-1);
1302 RTMP_Log(RTMP_LOGERROR
, "%s, error decoding AMF3 packet", __FUNCTION__
);
1309 if (HandleInvoke(r
, packet
->m_body
+ 1, packet
->m_nBodySize
- 1) == 1)
1310 bHasMediaPacket
= 2;
1313 case RTMP_PACKET_TYPE_INFO
:
1314 /* metadata (notify) */
1315 RTMP_Log(RTMP_LOGDEBUG
, "%s, received: notify %u bytes", __FUNCTION__
,
1316 packet
->m_nBodySize
);
1317 if (HandleMetadata(r
, packet
->m_body
, packet
->m_nBodySize
))
1318 bHasMediaPacket
= 1;
1321 case RTMP_PACKET_TYPE_SHARED_OBJECT
:
1322 RTMP_Log(RTMP_LOGDEBUG
, "%s, shared object, not supported, ignoring",
1326 case RTMP_PACKET_TYPE_INVOKE
:
1328 RTMP_Log(RTMP_LOGDEBUG
, "%s, received: invoke %u bytes", __FUNCTION__
,
1329 packet
->m_nBodySize
);
1330 /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
1332 if (HandleInvoke(r
, packet
->m_body
, packet
->m_nBodySize
) == 1)
1333 bHasMediaPacket
= 2;
1336 case RTMP_PACKET_TYPE_FLASH_VIDEO
:
1338 /* go through FLV packets and handle metadata packets */
1339 unsigned int pos
= 0;
1340 uint32_t nTimeStamp
= packet
->m_nTimeStamp
;
1342 while (pos
+ 11 < packet
->m_nBodySize
)
1344 uint32_t dataSize
= AMF_DecodeInt24(packet
->m_body
+ pos
+ 1); /* size without header (11) and prevTagSize (4) */
1346 if (pos
+ 11 + dataSize
+ 4 > packet
->m_nBodySize
)
1348 RTMP_Log(RTMP_LOGWARNING
, "Stream corrupt?!");
1351 if (packet
->m_body
[pos
] == 0x12)
1353 HandleMetadata(r
, packet
->m_body
+ pos
+ 11, dataSize
);
1355 else if (packet
->m_body
[pos
] == 8 || packet
->m_body
[pos
] == 9)
1357 nTimeStamp
= AMF_DecodeInt24(packet
->m_body
+ pos
+ 4);
1358 nTimeStamp
|= (packet
->m_body
[pos
+ 7] << 24);
1360 pos
+= (11 + dataSize
+ 4);
1363 r
->m_mediaStamp
= nTimeStamp
;
1366 /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: FLV tag(s) %lu bytes", __FUNCTION__, packet.m_nBodySize); */
1367 bHasMediaPacket
= 1;
1371 RTMP_Log(RTMP_LOGDEBUG
, "%s, unknown packet type received: 0x%02x", __FUNCTION__
,
1372 packet
->m_packetType
);
1374 RTMP_LogHex(RTMP_LOGDEBUG
, packet
->m_body
, packet
->m_nBodySize
);
1378 return bHasMediaPacket
;
1382 extern FILE *netstackdump
;
1383 extern FILE *netstackdump_read
;
1387 ReadN(RTMP
*r
, char *buffer
, int n
)
1389 int nOriginalSize
= n
;
1393 r
->m_sb
.sb_timedout
= FALSE
;
1396 memset(buffer
, 0, n
);
1402 int nBytes
= 0, nRead
;
1403 if (r
->Link
.protocol
& RTMP_FEATURE_HTTP
)
1406 while (!r
->m_resplen
)
1409 if (r
->m_sb
.sb_size
< 13 || refill
)
1412 HTTP_Post(r
, RTMPT_IDLE
, "", 1);
1413 if (RTMPSockBuf_Fill(&r
->m_sb
) < 1)
1415 if (!r
->m_sb
.sb_timedout
)
1420 if ((ret
= HTTP_read(r
, 0)) == -1)
1422 RTMP_Log(RTMP_LOGDEBUG
, "%s, No valid HTTP response found", __FUNCTION__
);
1435 if (r
->m_resplen
&& !r
->m_sb
.sb_size
)
1436 RTMPSockBuf_Fill(&r
->m_sb
);
1437 avail
= r
->m_sb
.sb_size
;
1438 if (avail
> r
->m_resplen
)
1439 avail
= r
->m_resplen
;
1443 avail
= r
->m_sb
.sb_size
;
1446 if (RTMPSockBuf_Fill(&r
->m_sb
) < 1)
1448 if (!r
->m_sb
.sb_timedout
)
1452 avail
= r
->m_sb
.sb_size
;
1455 nRead
= ((n
< avail
) ? n
: avail
);
1458 memcpy(ptr
, r
->m_sb
.sb_start
, nRead
);
1459 r
->m_sb
.sb_start
+= nRead
;
1460 r
->m_sb
.sb_size
-= nRead
;
1462 r
->m_nBytesIn
+= nRead
;
1463 if (r
->m_bSendCounter
1464 && r
->m_nBytesIn
> ( r
->m_nBytesInSent
+ r
->m_nClientBW
/ 10))
1465 if (!SendBytesReceived(r
))
1468 /*RTMP_Log(RTMP_LOGDEBUG, "%s: %d bytes\n", __FUNCTION__, nBytes); */
1470 fwrite(ptr
, 1, nBytes
, netstackdump_read
);
1475 RTMP_Log(RTMP_LOGDEBUG
, "%s, RTMP socket closed by peer", __FUNCTION__
);
1481 if (r
->Link
.protocol
& RTMP_FEATURE_HTTP
)
1482 r
->m_resplen
-= nBytes
;
1485 if (r
->Link
.rc4keyIn
)
1487 RC4_encrypt(r
->Link
.rc4keyIn
, nBytes
, ptr
);
1495 return nOriginalSize
- n
;
1499 WriteN(RTMP
*r
, const char *buffer
, int n
)
1501 const char *ptr
= buffer
;
1503 char *encrypted
= 0;
1504 char buf
[RTMP_BUFFER_CACHE_SIZE
];
1506 if (r
->Link
.rc4keyOut
)
1508 if (n
> sizeof(buf
))
1509 encrypted
= (char *)malloc(n
);
1511 encrypted
= (char *)buf
;
1513 RC4_encrypt2(r
->Link
.rc4keyOut
, n
, buffer
, ptr
);
1521 if (r
->Link
.protocol
& RTMP_FEATURE_HTTP
)
1522 nBytes
= HTTP_Post(r
, RTMPT_SEND
, ptr
, n
);
1524 nBytes
= RTMPSockBuf_Send(&r
->m_sb
, ptr
, n
);
1525 /*RTMP_Log(RTMP_LOGDEBUG, "%s: %d\n", __FUNCTION__, nBytes); */
1529 int sockerr
= GetSockError();
1530 RTMP_Log(RTMP_LOGERROR
, "%s, RTMP send error %d (%d bytes)", __FUNCTION__
,
1533 if (sockerr
== EINTR
&& !RTMP_ctrlC
)
1549 if (encrypted
&& encrypted
!= buf
)
1556 #define SAVC(x) static const AVal av_##x = AVC(#x)
1568 SAVC(videoFunction
);
1569 SAVC(objectEncoding
);
1571 SAVC(secureTokenResponse
);
1576 SendConnectPacket(RTMP
*r
, RTMPPacket
*cp
)
1579 char pbuf
[4096], *pend
= pbuf
+ sizeof(pbuf
);
1583 return RTMP_SendPacket(r
, cp
, TRUE
);
1585 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
1586 packet
.m_headerType
= RTMP_PACKET_SIZE_LARGE
;
1587 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
1588 packet
.m_nTimeStamp
= 0;
1589 packet
.m_nInfoField2
= 0;
1590 packet
.m_hasAbsTimestamp
= 0;
1591 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
1593 enc
= packet
.m_body
;
1594 enc
= AMF_EncodeString(enc
, pend
, &av_connect
);
1595 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
1596 *enc
++ = AMF_OBJECT
;
1598 enc
= AMF_EncodeNamedString(enc
, pend
, &av_app
, &r
->Link
.app
);
1601 if (r
->Link
.protocol
& RTMP_FEATURE_WRITE
)
1603 enc
= AMF_EncodeNamedString(enc
, pend
, &av_type
, &av_nonprivate
);
1607 if (r
->Link
.flashVer
.av_len
)
1609 enc
= AMF_EncodeNamedString(enc
, pend
, &av_flashVer
, &r
->Link
.flashVer
);
1613 if (r
->Link
.swfUrl
.av_len
)
1615 enc
= AMF_EncodeNamedString(enc
, pend
, &av_swfUrl
, &r
->Link
.swfUrl
);
1619 if (r
->Link
.tcUrl
.av_len
)
1621 enc
= AMF_EncodeNamedString(enc
, pend
, &av_tcUrl
, &r
->Link
.tcUrl
);
1625 if (!(r
->Link
.protocol
& RTMP_FEATURE_WRITE
))
1627 enc
= AMF_EncodeNamedBoolean(enc
, pend
, &av_fpad
, FALSE
);
1630 enc
= AMF_EncodeNamedNumber(enc
, pend
, &av_capabilities
, 15.0);
1633 enc
= AMF_EncodeNamedNumber(enc
, pend
, &av_audioCodecs
, r
->m_fAudioCodecs
);
1636 enc
= AMF_EncodeNamedNumber(enc
, pend
, &av_videoCodecs
, r
->m_fVideoCodecs
);
1639 enc
= AMF_EncodeNamedNumber(enc
, pend
, &av_videoFunction
, 1.0);
1642 if (r
->Link
.pageUrl
.av_len
)
1644 enc
= AMF_EncodeNamedString(enc
, pend
, &av_pageUrl
, &r
->Link
.pageUrl
);
1649 if (r
->m_fEncoding
!= 0.0 || r
->m_bSendEncoding
)
1650 { /* AMF0, AMF3 not fully supported yet */
1651 enc
= AMF_EncodeNamedNumber(enc
, pend
, &av_objectEncoding
, r
->m_fEncoding
);
1655 if (enc
+ 3 >= pend
)
1658 *enc
++ = 0; /* end of object - 0x00 0x00 0x09 */
1659 *enc
++ = AMF_OBJECT_END
;
1661 /* add auth string */
1662 if (r
->Link
.auth
.av_len
)
1664 enc
= AMF_EncodeBoolean(enc
, pend
, r
->Link
.lFlags
& RTMP_LF_AUTH
);
1667 enc
= AMF_EncodeString(enc
, pend
, &r
->Link
.auth
);
1671 if (r
->Link
.extras
.o_num
)
1674 for (i
= 0; i
< r
->Link
.extras
.o_num
; i
++)
1676 enc
= AMFProp_Encode(&r
->Link
.extras
.o_props
[i
], enc
, pend
);
1681 packet
.m_nBodySize
= enc
- packet
.m_body
;
1683 return RTMP_SendPacket(r
, &packet
, TRUE
);
1690 SendBGHasStream(RTMP
*r
, double dId
, AVal
*playpath
)
1693 char pbuf
[1024], *pend
= pbuf
+ sizeof(pbuf
);
1696 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
1697 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
1698 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
1699 packet
.m_nTimeStamp
= 0;
1700 packet
.m_nInfoField2
= 0;
1701 packet
.m_hasAbsTimestamp
= 0;
1702 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
1704 enc
= packet
.m_body
;
1705 enc
= AMF_EncodeString(enc
, pend
, &av_bgHasStream
);
1706 enc
= AMF_EncodeNumber(enc
, pend
, dId
);
1709 enc
= AMF_EncodeString(enc
, pend
, playpath
);
1713 packet
.m_nBodySize
= enc
- packet
.m_body
;
1715 return RTMP_SendPacket(r
, &packet
, TRUE
);
1722 RTMP_SendCreateStream(RTMP
*r
)
1725 char pbuf
[256], *pend
= pbuf
+ sizeof(pbuf
);
1728 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
1729 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
1730 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
1731 packet
.m_nTimeStamp
= 0;
1732 packet
.m_nInfoField2
= 0;
1733 packet
.m_hasAbsTimestamp
= 0;
1734 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
1736 enc
= packet
.m_body
;
1737 enc
= AMF_EncodeString(enc
, pend
, &av_createStream
);
1738 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
1739 *enc
++ = AMF_NULL
; /* NULL */
1741 packet
.m_nBodySize
= enc
- packet
.m_body
;
1743 return RTMP_SendPacket(r
, &packet
, TRUE
);
1749 SendFCSubscribe(RTMP
*r
, AVal
*subscribepath
)
1752 char pbuf
[512], *pend
= pbuf
+ sizeof(pbuf
);
1754 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
1755 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
1756 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
1757 packet
.m_nTimeStamp
= 0;
1758 packet
.m_nInfoField2
= 0;
1759 packet
.m_hasAbsTimestamp
= 0;
1760 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
1762 RTMP_Log(RTMP_LOGDEBUG
, "FCSubscribe: %s", subscribepath
->av_val
);
1763 enc
= packet
.m_body
;
1764 enc
= AMF_EncodeString(enc
, pend
, &av_FCSubscribe
);
1765 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
1767 enc
= AMF_EncodeString(enc
, pend
, subscribepath
);
1772 packet
.m_nBodySize
= enc
- packet
.m_body
;
1774 return RTMP_SendPacket(r
, &packet
, TRUE
);
1777 /* Justin.tv specific authentication */
1778 static const AVal av_NetStream_Authenticate_UsherToken
= AVC("NetStream.Authenticate.UsherToken");
1781 SendUsherToken(RTMP
*r
, AVal
*usherToken
)
1784 char pbuf
[1024], *pend
= pbuf
+ sizeof(pbuf
);
1786 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
1787 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
1788 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
1789 packet
.m_nTimeStamp
= 0;
1790 packet
.m_nInfoField2
= 0;
1791 packet
.m_hasAbsTimestamp
= 0;
1792 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
1794 RTMP_Log(RTMP_LOGDEBUG
, "UsherToken: %s", usherToken
->av_val
);
1795 enc
= packet
.m_body
;
1796 enc
= AMF_EncodeString(enc
, pend
, &av_NetStream_Authenticate_UsherToken
);
1797 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
1799 enc
= AMF_EncodeString(enc
, pend
, usherToken
);
1804 packet
.m_nBodySize
= enc
- packet
.m_body
;
1806 return RTMP_SendPacket(r
, &packet
, FALSE
);
1808 /******************************************/
1810 SAVC(releaseStream
);
1813 SendReleaseStream(RTMP
*r
)
1816 char pbuf
[1024], *pend
= pbuf
+ sizeof(pbuf
);
1819 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
1820 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
1821 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
1822 packet
.m_nTimeStamp
= 0;
1823 packet
.m_nInfoField2
= 0;
1824 packet
.m_hasAbsTimestamp
= 0;
1825 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
1827 enc
= packet
.m_body
;
1828 enc
= AMF_EncodeString(enc
, pend
, &av_releaseStream
);
1829 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
1831 enc
= AMF_EncodeString(enc
, pend
, &r
->Link
.playpath
);
1835 packet
.m_nBodySize
= enc
- packet
.m_body
;
1837 return RTMP_SendPacket(r
, &packet
, FALSE
);
1843 SendFCPublish(RTMP
*r
)
1846 char pbuf
[1024], *pend
= pbuf
+ sizeof(pbuf
);
1849 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
1850 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
1851 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
1852 packet
.m_nTimeStamp
= 0;
1853 packet
.m_nInfoField2
= 0;
1854 packet
.m_hasAbsTimestamp
= 0;
1855 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
1857 enc
= packet
.m_body
;
1858 enc
= AMF_EncodeString(enc
, pend
, &av_FCPublish
);
1859 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
1861 enc
= AMF_EncodeString(enc
, pend
, &r
->Link
.playpath
);
1865 packet
.m_nBodySize
= enc
- packet
.m_body
;
1867 return RTMP_SendPacket(r
, &packet
, FALSE
);
1873 SendFCUnpublish(RTMP
*r
)
1876 char pbuf
[1024], *pend
= pbuf
+ sizeof(pbuf
);
1879 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
1880 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
1881 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
1882 packet
.m_nTimeStamp
= 0;
1883 packet
.m_nInfoField2
= 0;
1884 packet
.m_hasAbsTimestamp
= 0;
1885 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
1887 enc
= packet
.m_body
;
1888 enc
= AMF_EncodeString(enc
, pend
, &av_FCUnpublish
);
1889 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
1891 enc
= AMF_EncodeString(enc
, pend
, &r
->Link
.playpath
);
1895 packet
.m_nBodySize
= enc
- packet
.m_body
;
1897 return RTMP_SendPacket(r
, &packet
, FALSE
);
1905 SendPublish(RTMP
*r
)
1908 char pbuf
[1024], *pend
= pbuf
+ sizeof(pbuf
);
1911 packet
.m_nChannel
= 0x04; /* source channel (invoke) */
1912 packet
.m_headerType
= RTMP_PACKET_SIZE_LARGE
;
1913 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
1914 packet
.m_nTimeStamp
= 0;
1915 packet
.m_nInfoField2
= r
->m_stream_id
;
1916 packet
.m_hasAbsTimestamp
= 0;
1917 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
1919 enc
= packet
.m_body
;
1920 enc
= AMF_EncodeString(enc
, pend
, &av_publish
);
1921 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
1923 enc
= AMF_EncodeString(enc
, pend
, &r
->Link
.playpath
);
1927 /* FIXME: should we choose live based on Link.lFlags & RTMP_LF_LIVE? */
1928 enc
= AMF_EncodeString(enc
, pend
, &av_live
);
1932 packet
.m_nBodySize
= enc
- packet
.m_body
;
1934 return RTMP_SendPacket(r
, &packet
, TRUE
);
1940 SendDeleteStream(RTMP
*r
, double dStreamId
)
1943 char pbuf
[256], *pend
= pbuf
+ sizeof(pbuf
);
1946 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
1947 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
1948 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
1949 packet
.m_nTimeStamp
= 0;
1950 packet
.m_nInfoField2
= 0;
1951 packet
.m_hasAbsTimestamp
= 0;
1952 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
1954 enc
= packet
.m_body
;
1955 enc
= AMF_EncodeString(enc
, pend
, &av_deleteStream
);
1956 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
1958 enc
= AMF_EncodeNumber(enc
, pend
, dStreamId
);
1960 packet
.m_nBodySize
= enc
- packet
.m_body
;
1962 /* no response expected */
1963 return RTMP_SendPacket(r
, &packet
, FALSE
);
1969 RTMP_SendPause(RTMP
*r
, int DoPause
, int iTime
)
1972 char pbuf
[256], *pend
= pbuf
+ sizeof(pbuf
);
1975 packet
.m_nChannel
= 0x08; /* video channel */
1976 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
1977 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
1978 packet
.m_nTimeStamp
= 0;
1979 packet
.m_nInfoField2
= 0;
1980 packet
.m_hasAbsTimestamp
= 0;
1981 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
1983 enc
= packet
.m_body
;
1984 enc
= AMF_EncodeString(enc
, pend
, &av_pause
);
1985 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
1987 enc
= AMF_EncodeBoolean(enc
, pend
, DoPause
);
1988 enc
= AMF_EncodeNumber(enc
, pend
, (double)iTime
);
1990 packet
.m_nBodySize
= enc
- packet
.m_body
;
1992 RTMP_Log(RTMP_LOGDEBUG
, "%s, %d, pauseTime=%d", __FUNCTION__
, DoPause
, iTime
);
1993 return RTMP_SendPacket(r
, &packet
, TRUE
);
1996 int RTMP_Pause(RTMP
*r
, int DoPause
)
1999 r
->m_pauseStamp
= r
->m_mediaChannel
< r
->m_channelsAllocatedIn
?
2000 r
->m_channelTimestamp
[r
->m_mediaChannel
] : 0;
2001 return RTMP_SendPause(r
, DoPause
, r
->m_pauseStamp
);
2007 RTMP_SendSeek(RTMP
*r
, int iTime
)
2010 char pbuf
[256], *pend
= pbuf
+ sizeof(pbuf
);
2013 packet
.m_nChannel
= 0x08; /* video channel */
2014 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
2015 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
2016 packet
.m_nTimeStamp
= 0;
2017 packet
.m_nInfoField2
= 0;
2018 packet
.m_hasAbsTimestamp
= 0;
2019 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
2021 enc
= packet
.m_body
;
2022 enc
= AMF_EncodeString(enc
, pend
, &av_seek
);
2023 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
2025 enc
= AMF_EncodeNumber(enc
, pend
, (double)iTime
);
2027 packet
.m_nBodySize
= enc
- packet
.m_body
;
2029 r
->m_read
.flags
|= RTMP_READ_SEEKING
;
2030 r
->m_read
.nResumeTS
= 0;
2032 return RTMP_SendPacket(r
, &packet
, TRUE
);
2036 RTMP_SendServerBW(RTMP
*r
)
2039 char pbuf
[256], *pend
= pbuf
+ sizeof(pbuf
);
2041 packet
.m_nChannel
= 0x02; /* control channel (invoke) */
2042 packet
.m_headerType
= RTMP_PACKET_SIZE_LARGE
;
2043 packet
.m_packetType
= RTMP_PACKET_TYPE_SERVER_BW
;
2044 packet
.m_nTimeStamp
= 0;
2045 packet
.m_nInfoField2
= 0;
2046 packet
.m_hasAbsTimestamp
= 0;
2047 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
2049 packet
.m_nBodySize
= 4;
2051 AMF_EncodeInt32(packet
.m_body
, pend
, r
->m_nServerBW
);
2052 return RTMP_SendPacket(r
, &packet
, FALSE
);
2056 RTMP_SendClientBW(RTMP
*r
)
2059 char pbuf
[256], *pend
= pbuf
+ sizeof(pbuf
);
2061 packet
.m_nChannel
= 0x02; /* control channel (invoke) */
2062 packet
.m_headerType
= RTMP_PACKET_SIZE_LARGE
;
2063 packet
.m_packetType
= RTMP_PACKET_TYPE_CLIENT_BW
;
2064 packet
.m_nTimeStamp
= 0;
2065 packet
.m_nInfoField2
= 0;
2066 packet
.m_hasAbsTimestamp
= 0;
2067 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
2069 packet
.m_nBodySize
= 5;
2071 AMF_EncodeInt32(packet
.m_body
, pend
, r
->m_nClientBW
);
2072 packet
.m_body
[4] = r
->m_nClientBW2
;
2073 return RTMP_SendPacket(r
, &packet
, FALSE
);
2077 SendBytesReceived(RTMP
*r
)
2080 char pbuf
[256], *pend
= pbuf
+ sizeof(pbuf
);
2082 packet
.m_nChannel
= 0x02; /* control channel (invoke) */
2083 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
2084 packet
.m_packetType
= RTMP_PACKET_TYPE_BYTES_READ_REPORT
;
2085 packet
.m_nTimeStamp
= 0;
2086 packet
.m_nInfoField2
= 0;
2087 packet
.m_hasAbsTimestamp
= 0;
2088 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
2090 packet
.m_nBodySize
= 4;
2092 AMF_EncodeInt32(packet
.m_body
, pend
, r
->m_nBytesIn
); /* hard coded for now */
2093 r
->m_nBytesInSent
= r
->m_nBytesIn
;
2095 /*RTMP_Log(RTMP_LOGDEBUG, "Send bytes report. 0x%x (%d bytes)", (unsigned int)m_nBytesIn, m_nBytesIn); */
2096 return RTMP_SendPacket(r
, &packet
, FALSE
);
2102 SendCheckBW(RTMP
*r
)
2105 char pbuf
[256], *pend
= pbuf
+ sizeof(pbuf
);
2108 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
2109 packet
.m_headerType
= RTMP_PACKET_SIZE_LARGE
;
2110 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
2111 packet
.m_nTimeStamp
= 0; /* RTMP_GetTime(); */
2112 packet
.m_nInfoField2
= 0;
2113 packet
.m_hasAbsTimestamp
= 0;
2114 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
2116 enc
= packet
.m_body
;
2117 enc
= AMF_EncodeString(enc
, pend
, &av__checkbw
);
2118 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
2121 packet
.m_nBodySize
= enc
- packet
.m_body
;
2123 /* triggers _onbwcheck and eventually results in _onbwdone */
2124 return RTMP_SendPacket(r
, &packet
, FALSE
);
2130 SendCheckBWResult(RTMP
*r
, double txn
)
2133 char pbuf
[256], *pend
= pbuf
+ sizeof(pbuf
);
2136 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
2137 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
2138 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
2139 packet
.m_nTimeStamp
= 0x16 * r
->m_nBWCheckCounter
; /* temp inc value. till we figure it out. */
2140 packet
.m_nInfoField2
= 0;
2141 packet
.m_hasAbsTimestamp
= 0;
2142 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
2144 enc
= packet
.m_body
;
2145 enc
= AMF_EncodeString(enc
, pend
, &av__result
);
2146 enc
= AMF_EncodeNumber(enc
, pend
, txn
);
2148 enc
= AMF_EncodeNumber(enc
, pend
, (double)r
->m_nBWCheckCounter
++);
2150 packet
.m_nBodySize
= enc
- packet
.m_body
;
2152 return RTMP_SendPacket(r
, &packet
, FALSE
);
2159 SendPong(RTMP
*r
, double txn
)
2162 char pbuf
[256], *pend
= pbuf
+ sizeof(pbuf
);
2165 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
2166 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
2167 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
2168 packet
.m_nTimeStamp
= 0x16 * r
->m_nBWCheckCounter
; /* temp inc value. till we figure it out. */
2169 packet
.m_nInfoField2
= 0;
2170 packet
.m_hasAbsTimestamp
= 0;
2171 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
2173 enc
= packet
.m_body
;
2174 enc
= AMF_EncodeString(enc
, pend
, &av_pong
);
2175 enc
= AMF_EncodeNumber(enc
, pend
, txn
);
2178 packet
.m_nBodySize
= enc
- packet
.m_body
;
2180 return RTMP_SendPacket(r
, &packet
, FALSE
);
2189 char pbuf
[1024], *pend
= pbuf
+ sizeof(pbuf
);
2192 packet
.m_nChannel
= 0x08; /* we make 8 our stream channel */
2193 packet
.m_headerType
= RTMP_PACKET_SIZE_LARGE
;
2194 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
2195 packet
.m_nTimeStamp
= 0;
2196 packet
.m_nInfoField2
= r
->m_stream_id
; /*0x01000000; */
2197 packet
.m_hasAbsTimestamp
= 0;
2198 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
2200 enc
= packet
.m_body
;
2201 enc
= AMF_EncodeString(enc
, pend
, &av_play
);
2202 enc
= AMF_EncodeNumber(enc
, pend
, ++r
->m_numInvokes
);
2205 RTMP_Log(RTMP_LOGDEBUG
, "%s, seekTime=%d, stopTime=%d, sending play: %s",
2206 __FUNCTION__
, r
->Link
.seekTime
, r
->Link
.stopTime
,
2207 r
->Link
.playpath
.av_val
);
2208 enc
= AMF_EncodeString(enc
, pend
, &r
->Link
.playpath
);
2212 /* Optional parameters start and len.
2214 * start: -2, -1, 0, positive number
2215 * -2: looks for a live stream, then a recorded stream,
2216 * if not found any open a live stream
2217 * -1: plays a live stream
2218 * >=0: plays a recorded streams from 'start' milliseconds
2220 if (r
->Link
.lFlags
& RTMP_LF_LIVE
)
2221 enc
= AMF_EncodeNumber(enc
, pend
, -1000.0);
2224 if (r
->Link
.seekTime
> 0.0)
2225 enc
= AMF_EncodeNumber(enc
, pend
, r
->Link
.seekTime
); /* resume from here */
2227 enc
= AMF_EncodeNumber(enc
, pend
, 0.0); /*-2000.0);*/ /* recorded as default, -2000.0 is not reliable since that freezes the player if the stream is not found */
2232 /* len: -1, 0, positive number
2233 * -1: plays live or recorded stream to the end (default)
2234 * 0: plays a frame 'start' ms away from the beginning
2235 * >0: plays a live or recoded stream for 'len' milliseconds
2237 /*enc += EncodeNumber(enc, -1.0); */ /* len */
2238 if (r
->Link
.stopTime
)
2240 enc
= AMF_EncodeNumber(enc
, pend
, r
->Link
.stopTime
- r
->Link
.seekTime
);
2245 packet
.m_nBodySize
= enc
- packet
.m_body
;
2247 return RTMP_SendPacket(r
, &packet
, TRUE
);
2254 SendPlaylist(RTMP
*r
)
2257 char pbuf
[1024], *pend
= pbuf
+ sizeof(pbuf
);
2260 packet
.m_nChannel
= 0x08; /* we make 8 our stream channel */
2261 packet
.m_headerType
= RTMP_PACKET_SIZE_LARGE
;
2262 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
2263 packet
.m_nTimeStamp
= 0;
2264 packet
.m_nInfoField2
= r
->m_stream_id
; /*0x01000000; */
2265 packet
.m_hasAbsTimestamp
= 0;
2266 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
2268 enc
= packet
.m_body
;
2269 enc
= AMF_EncodeString(enc
, pend
, &av_set_playlist
);
2270 enc
= AMF_EncodeNumber(enc
, pend
, 0);
2272 *enc
++ = AMF_ECMA_ARRAY
;
2276 *enc
++ = AMF_OBJECT
;
2277 enc
= AMF_EncodeNamedString(enc
, pend
, &av_0
, &r
->Link
.playpath
);
2280 if (enc
+ 3 >= pend
)
2284 *enc
++ = AMF_OBJECT_END
;
2286 packet
.m_nBodySize
= enc
- packet
.m_body
;
2288 return RTMP_SendPacket(r
, &packet
, TRUE
);
2292 SendSecureTokenResponse(RTMP
*r
, AVal
*resp
)
2295 char pbuf
[1024], *pend
= pbuf
+ sizeof(pbuf
);
2298 packet
.m_nChannel
= 0x03; /* control channel (invoke) */
2299 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
2300 packet
.m_packetType
= RTMP_PACKET_TYPE_INVOKE
;
2301 packet
.m_nTimeStamp
= 0;
2302 packet
.m_nInfoField2
= 0;
2303 packet
.m_hasAbsTimestamp
= 0;
2304 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
2306 enc
= packet
.m_body
;
2307 enc
= AMF_EncodeString(enc
, pend
, &av_secureTokenResponse
);
2308 enc
= AMF_EncodeNumber(enc
, pend
, 0.0);
2310 enc
= AMF_EncodeString(enc
, pend
, resp
);
2314 packet
.m_nBodySize
= enc
- packet
.m_body
;
2316 return RTMP_SendPacket(r
, &packet
, FALSE
);
2320 from http://jira.red5.org/confluence/display/docs/Ping:
2322 Ping is the most mysterious message in RTMP and till now we haven't fully interpreted it yet. In summary, Ping message is used as a special command that are exchanged between client and server. This page aims to document all known Ping messages. Expect the list to grow.
2324 The type of Ping packet is 0x4 and contains two mandatory parameters and two optional parameters. The first parameter is the type of Ping and in short integer. The second parameter is the target of the ping. As Ping is always sent in Channel 2 (control channel) and the target object in RTMP header is always 0 which means the Connection object, it's necessary to put an extra parameter to indicate the exact target object the Ping is sent to. The second parameter takes this responsibility. The value has the same meaning as the target object field in RTMP header. (The second value could also be used as other purposes, like RTT Ping/Pong. It is used as the timestamp.) The third and fourth parameters are optional and could be looked upon as the parameter of the Ping packet. Below is an unexhausted list of Ping messages.
2326 * type 0: Clear the stream. No third and fourth parameters. The second parameter could be 0. After the connection is established, a Ping 0,0 will be sent from server to client. The message will also be sent to client on the start of Play and in response of a Seek or Pause/Resume request. This Ping tells client to re-calibrate the clock with the timestamp of the next packet server sends.
2327 * type 1: Tell the stream to clear the playing buffer.
2328 * type 3: Buffer time of the client. The third parameter is the buffer time in millisecond.
2329 * type 4: Reset a stream. Used together with type 0 in the case of VOD. Often sent before type 0.
2330 * type 6: Ping the client from server. The second parameter is the current time.
2331 * type 7: Pong reply from client. The second parameter is the time the server sent with his ping request.
2332 * type 26: SWFVerification request
2333 * type 27: SWFVerification response
2336 RTMP_SendCtrl(RTMP
*r
, short nType
, unsigned int nObject
, unsigned int nTime
)
2339 char pbuf
[256], *pend
= pbuf
+ sizeof(pbuf
);
2343 RTMP_Log(RTMP_LOGDEBUG
, "sending ctrl. type: 0x%04x", (unsigned short)nType
);
2345 packet
.m_nChannel
= 0x02; /* control channel (ping) */
2346 packet
.m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
2347 packet
.m_packetType
= RTMP_PACKET_TYPE_CONTROL
;
2348 packet
.m_nTimeStamp
= 0; /* RTMP_GetTime(); */
2349 packet
.m_nInfoField2
= 0;
2350 packet
.m_hasAbsTimestamp
= 0;
2351 packet
.m_body
= pbuf
+ RTMP_MAX_HEADER_SIZE
;
2354 case 0x03: nSize
= 10; break; /* buffer time */
2355 case 0x1A: nSize
= 3; break; /* SWF verify request */
2356 case 0x1B: nSize
= 44; break; /* SWF verify response */
2357 default: nSize
= 6; break;
2360 packet
.m_nBodySize
= nSize
;
2362 buf
= packet
.m_body
;
2363 buf
= AMF_EncodeInt16(buf
, pend
, nType
);
2368 memcpy(buf
, r
->Link
.SWFVerificationResponse
, 42);
2369 RTMP_Log(RTMP_LOGDEBUG
, "Sending SWFVerification response: ");
2370 RTMP_LogHex(RTMP_LOGDEBUG
, (uint8_t *)packet
.m_body
, packet
.m_nBodySize
);
2373 else if (nType
== 0x1A)
2375 *buf
= nObject
& 0xff;
2380 buf
= AMF_EncodeInt32(buf
, pend
, nObject
);
2383 buf
= AMF_EncodeInt32(buf
, pend
, nTime
);
2386 return RTMP_SendPacket(r
, &packet
, FALSE
);
2390 AV_erase(RTMP_METHOD
*vals
, int *num
, int i
, int freeit
)
2393 free(vals
[i
].name
.av_val
);
2395 for (; i
< *num
; i
++)
2397 vals
[i
] = vals
[i
+ 1];
2399 vals
[i
].name
.av_val
= NULL
;
2400 vals
[i
].name
.av_len
= 0;
2405 RTMP_DropRequest(RTMP
*r
, int i
, int freeit
)
2407 AV_erase(r
->m_methodCalls
, &r
->m_numCalls
, i
, freeit
);
2411 AV_queue(RTMP_METHOD
**vals
, int *num
, AVal
*av
, int txn
)
2415 *vals
= realloc(*vals
, (*num
+ 16) * sizeof(RTMP_METHOD
));
2416 tmp
= malloc(av
->av_len
+ 1);
2417 memcpy(tmp
, av
->av_val
, av
->av_len
);
2418 tmp
[av
->av_len
] = '\0';
2419 (*vals
)[*num
].num
= txn
;
2420 (*vals
)[*num
].name
.av_len
= av
->av_len
;
2421 (*vals
)[(*num
)++].name
.av_val
= tmp
;
2425 AV_clear(RTMP_METHOD
*vals
, int num
)
2428 for (i
= 0; i
< num
; i
++)
2429 free(vals
[i
].name
.av_val
);
2436 b64enc(const unsigned char *input
, int length
, char *output
, int maxsize
)
2439 size_t buf_size
= maxsize
;
2440 if(base64_encode((unsigned char *) output
, &buf_size
, input
, length
) == 0)
2442 output
[buf_size
] = '\0';
2447 RTMP_Log(RTMP_LOGDEBUG
, "%s, error", __FUNCTION__
);
2450 #elif defined(USE_GNUTLS)
2451 if (BASE64_ENCODE_RAW_LENGTH(length
) <= maxsize
)
2452 base64_encode_raw((uint8_t*) output
, length
, input
);
2455 RTMP_Log(RTMP_LOGDEBUG
, "%s, error", __FUNCTION__
);
2458 #else /* USE_OPENSSL */
2462 b64
= BIO_new(BIO_f_base64());
2463 bmem
= BIO_new(BIO_s_mem());
2464 b64
= BIO_push(b64
, bmem
);
2465 BIO_write(b64
, input
, length
);
2466 if (BIO_flush(b64
) == 1)
2468 BIO_get_mem_ptr(b64
, &bptr
);
2469 memcpy(output
, bptr
->data
, bptr
->length
-1);
2470 output
[bptr
->length
-1] = '\0';
2474 RTMP_Log(RTMP_LOGDEBUG
, "%s, error", __FUNCTION__
);
2483 #define MD5_CTX md5_context
2484 #define MD5_Init(ctx) md5_starts(ctx)
2485 #define MD5_Update(ctx,data,len) md5_update(ctx,(unsigned char *)data,len)
2486 #define MD5_Final(dig,ctx) md5_finish(ctx,dig)
2487 #elif defined(USE_GNUTLS)
2488 typedef struct md5_ctx MD5_CTX
;
2489 #define MD5_Init(ctx) md5_init(ctx)
2490 #define MD5_Update(ctx,data,len) md5_update(ctx,len,data)
2491 #define MD5_Final(dig,ctx) md5_digest(ctx,MD5_DIGEST_LENGTH,dig)
2495 static const AVal av_authmod_adobe
= AVC("authmod=adobe");
2496 static const AVal av_authmod_llnw
= AVC("authmod=llnw");
2498 static void hexenc(unsigned char *inbuf
, int len
, char *dst
)
2502 sprintf(ptr
, "%02x", *inbuf
++);
2509 AValChr(AVal
*av
, char c
)
2512 for (i
= 0; i
< av
->av_len
; i
++)
2513 if (av
->av_val
[i
] == c
)
2514 return &av
->av_val
[i
];
2519 PublisherAuth(RTMP
*r
, AVal
*description
)
2521 char *token_in
= NULL
;
2523 unsigned char md5sum_val
[MD5_DIGEST_LENGTH
+1];
2525 int challenge2_data
;
2526 #define RESPONSE_LEN 32
2527 #define CHALLENGE2_LEN 16
2528 #define SALTED2_LEN (32+8+8+8)
2529 #define B64DIGEST_LEN 24 /* 16 byte digest => 22 b64 chars + 2 chars padding */
2530 #define B64INT_LEN 8 /* 4 byte int => 6 b64 chars + 2 chars padding */
2531 #define HEXHASH_LEN (2*MD5_DIGEST_LENGTH)
2532 char response
[RESPONSE_LEN
];
2533 char challenge2
[CHALLENGE2_LEN
];
2534 char salted2
[SALTED2_LEN
];
2537 if (strstr(description
->av_val
, av_authmod_adobe
.av_val
) != NULL
)
2539 if(strstr(description
->av_val
, "code=403 need auth") != NULL
)
2541 if (strstr(r
->Link
.app
.av_val
, av_authmod_adobe
.av_val
) != NULL
) {
2542 RTMP_Log(RTMP_LOGERROR
, "%s, wrong pubUser & pubPasswd for publisher auth", __FUNCTION__
);
2544 } else if(r
->Link
.pubUser
.av_len
&& r
->Link
.pubPasswd
.av_len
) {
2545 pubToken
.av_val
= malloc(r
->Link
.pubUser
.av_len
+ av_authmod_adobe
.av_len
+ 8);
2546 pubToken
.av_len
= sprintf(pubToken
.av_val
, "?%s&user=%s",
2547 av_authmod_adobe
.av_val
,
2548 r
->Link
.pubUser
.av_val
);
2549 RTMP_Log(RTMP_LOGDEBUG
, "%s, pubToken1: %s", __FUNCTION__
, pubToken
.av_val
);
2551 RTMP_Log(RTMP_LOGERROR
, "%s, need to set pubUser & pubPasswd for publisher auth", __FUNCTION__
);
2555 else if((token_in
= strstr(description
->av_val
, "?reason=needauth")) != NULL
)
2557 char *par
, *val
= NULL
, *orig_ptr
;
2558 AVal user
, salt
, opaque
, challenge
, *aptr
= NULL
;
2560 challenge
.av_len
= 0;
2562 ptr
= orig_ptr
= strdup(token_in
);
2566 ptr
= strchr(par
, '&');
2570 val
= strchr(par
, '=');
2575 aptr
->av_len
= par
- aptr
->av_val
- 1;
2578 if (strcmp(par
, "user") == 0){
2581 } else if (strcmp(par
, "salt") == 0){
2584 } else if (strcmp(par
, "opaque") == 0){
2585 opaque
.av_val
= val
;
2587 } else if (strcmp(par
, "challenge") == 0){
2588 challenge
.av_val
= val
;
2592 RTMP_Log(RTMP_LOGDEBUG
, "%s, par:\"%s\" = val:\"%s\"", __FUNCTION__
, par
, val
);
2595 aptr
->av_len
= strlen(aptr
->av_val
);
2597 /* hash1 = base64enc(md5(user + _aodbeAuthSalt + password)) */
2599 MD5_Update(&md5ctx
, user
.av_val
, user
.av_len
);
2600 MD5_Update(&md5ctx
, salt
.av_val
, salt
.av_len
);
2601 MD5_Update(&md5ctx
, r
->Link
.pubPasswd
.av_val
, r
->Link
.pubPasswd
.av_len
);
2602 MD5_Final(md5sum_val
, &md5ctx
);
2603 RTMP_Log(RTMP_LOGDEBUG
, "%s, md5(%s%s%s) =>", __FUNCTION__
,
2604 user
.av_val
, salt
.av_val
, r
->Link
.pubPasswd
.av_val
);
2605 RTMP_LogHexString(RTMP_LOGDEBUG
, md5sum_val
, MD5_DIGEST_LENGTH
);
2607 b64enc(md5sum_val
, MD5_DIGEST_LENGTH
, salted2
, SALTED2_LEN
);
2608 RTMP_Log(RTMP_LOGDEBUG
, "%s, b64(md5_1) = %s", __FUNCTION__
, salted2
);
2610 challenge2_data
= rand();
2612 b64enc((unsigned char *) &challenge2_data
, sizeof(int), challenge2
, CHALLENGE2_LEN
);
2613 RTMP_Log(RTMP_LOGDEBUG
, "%s, b64(%d) = %s", __FUNCTION__
, challenge2_data
, challenge2
);
2616 MD5_Update(&md5ctx
, salted2
, B64DIGEST_LEN
);
2617 /* response = base64enc(md5(hash1 + opaque + challenge2)) */
2619 MD5_Update(&md5ctx
, opaque
.av_val
, opaque
.av_len
);
2620 else if (challenge
.av_len
)
2621 MD5_Update(&md5ctx
, challenge
.av_val
, challenge
.av_len
);
2622 MD5_Update(&md5ctx
, challenge2
, B64INT_LEN
);
2623 MD5_Final(md5sum_val
, &md5ctx
);
2625 RTMP_Log(RTMP_LOGDEBUG
, "%s, md5(%s%s%s) =>", __FUNCTION__
,
2626 salted2
, opaque
.av_len
? opaque
.av_val
: "", challenge2
);
2627 RTMP_LogHexString(RTMP_LOGDEBUG
, md5sum_val
, MD5_DIGEST_LENGTH
);
2629 b64enc(md5sum_val
, MD5_DIGEST_LENGTH
, response
, RESPONSE_LEN
);
2630 RTMP_Log(RTMP_LOGDEBUG
, "%s, b64(md5_2) = %s", __FUNCTION__
, response
);
2632 /* have all hashes, create auth token for the end of app */
2633 pubToken
.av_val
= malloc(32 + B64INT_LEN
+ B64DIGEST_LEN
+ opaque
.av_len
);
2634 pubToken
.av_len
= sprintf(pubToken
.av_val
,
2635 "&challenge=%s&response=%s&opaque=%s",
2638 opaque
.av_len
? opaque
.av_val
: "");
2639 RTMP_Log(RTMP_LOGDEBUG
, "%s, pubToken2: %s", __FUNCTION__
, pubToken
.av_val
);
2642 else if(strstr(description
->av_val
, "?reason=authfailed") != NULL
)
2644 RTMP_Log(RTMP_LOGERROR
, "%s, Authentication failed: wrong password", __FUNCTION__
);
2647 else if(strstr(description
->av_val
, "?reason=nosuchuser") != NULL
)
2649 RTMP_Log(RTMP_LOGERROR
, "%s, Authentication failed: no such user", __FUNCTION__
);
2654 RTMP_Log(RTMP_LOGERROR
, "%s, Authentication failed: unknown auth mode: %s",
2655 __FUNCTION__
, description
->av_val
);
2659 ptr
= malloc(r
->Link
.app
.av_len
+ pubToken
.av_len
);
2660 strncpy(ptr
, r
->Link
.app
.av_val
, r
->Link
.app
.av_len
);
2661 strncpy(ptr
+ r
->Link
.app
.av_len
, pubToken
.av_val
, pubToken
.av_len
);
2662 r
->Link
.app
.av_len
+= pubToken
.av_len
;
2663 if(r
->Link
.lFlags
& RTMP_LF_FAPU
)
2664 free(r
->Link
.app
.av_val
);
2665 r
->Link
.app
.av_val
= ptr
;
2667 ptr
= malloc(r
->Link
.tcUrl
.av_len
+ pubToken
.av_len
);
2668 strncpy(ptr
, r
->Link
.tcUrl
.av_val
, r
->Link
.tcUrl
.av_len
);
2669 strncpy(ptr
+ r
->Link
.tcUrl
.av_len
, pubToken
.av_val
, pubToken
.av_len
);
2670 r
->Link
.tcUrl
.av_len
+= pubToken
.av_len
;
2671 if(r
->Link
.lFlags
& RTMP_LF_FTCU
)
2672 free(r
->Link
.tcUrl
.av_val
);
2673 r
->Link
.tcUrl
.av_val
= ptr
;
2675 free(pubToken
.av_val
);
2676 r
->Link
.lFlags
|= RTMP_LF_FTCU
| RTMP_LF_FAPU
;
2678 RTMP_Log(RTMP_LOGDEBUG
, "%s, new app: %.*s tcUrl: %.*s playpath: %s", __FUNCTION__
,
2679 r
->Link
.app
.av_len
, r
->Link
.app
.av_val
,
2680 r
->Link
.tcUrl
.av_len
, r
->Link
.tcUrl
.av_val
,
2681 r
->Link
.playpath
.av_val
);
2683 else if (strstr(description
->av_val
, av_authmod_llnw
.av_val
) != NULL
)
2685 if(strstr(description
->av_val
, "code=403 need auth") != NULL
)
2687 /* This part seems to be the same for llnw and adobe */
2689 if (strstr(r
->Link
.app
.av_val
, av_authmod_llnw
.av_val
) != NULL
) {
2690 RTMP_Log(RTMP_LOGERROR
, "%s, wrong pubUser & pubPasswd for publisher auth", __FUNCTION__
);
2692 } else if(r
->Link
.pubUser
.av_len
&& r
->Link
.pubPasswd
.av_len
) {
2693 pubToken
.av_val
= malloc(r
->Link
.pubUser
.av_len
+ av_authmod_llnw
.av_len
+ 8);
2694 pubToken
.av_len
= sprintf(pubToken
.av_val
, "?%s&user=%s",
2695 av_authmod_llnw
.av_val
,
2696 r
->Link
.pubUser
.av_val
);
2697 RTMP_Log(RTMP_LOGDEBUG
, "%s, pubToken1: %s", __FUNCTION__
, pubToken
.av_val
);
2699 RTMP_Log(RTMP_LOGERROR
, "%s, need to set pubUser & pubPasswd for publisher auth", __FUNCTION__
);
2703 else if((token_in
= strstr(description
->av_val
, "?reason=needauth")) != NULL
)
2706 char *par
, *val
= NULL
;
2707 char hash1
[HEXHASH_LEN
+1], hash2
[HEXHASH_LEN
+1], hash3
[HEXHASH_LEN
+1];
2708 AVal user
, nonce
, *aptr
= NULL
;
2712 * Seems to be closely based on HTTP Digest Auth:
2713 * http://tools.ietf.org/html/rfc2617
2714 * http://en.wikipedia.org/wiki/Digest_access_authentication
2717 const char authmod
[] = "llnw";
2718 const char realm
[] = "live";
2719 const char method
[] = "publish";
2720 const char qop
[] = "auth";
2721 /* nc = 1..connection count (or rather, number of times cnonce has been reused) */
2723 /* nchex = hexenc(nc) (8 hex digits according to RFC 2617) */
2725 /* cnonce = hexenc(4 random bytes) (initialized on first connection) */
2728 ptr
= orig_ptr
= strdup(token_in
);
2729 /* Extract parameters (we need user and nonce) */
2733 ptr
= strchr(par
, '&');
2737 val
= strchr(par
, '=');
2742 aptr
->av_len
= par
- aptr
->av_val
- 1;
2745 if (strcmp(par
, "user") == 0){
2748 } else if (strcmp(par
, "nonce") == 0){
2753 RTMP_Log(RTMP_LOGDEBUG
, "%s, par:\"%s\" = val:\"%s\"", __FUNCTION__
, par
, val
);
2756 aptr
->av_len
= strlen(aptr
->av_val
);
2758 /* FIXME: handle case where user==NULL or nonce==NULL */
2760 sprintf(nchex
, "%08x", nc
);
2761 sprintf(cnonce
, "%08x", rand());
2763 /* hash1 = hexenc(md5(user + ":" + realm + ":" + password)) */
2765 MD5_Update(&md5ctx
, user
.av_val
, user
.av_len
);
2766 MD5_Update(&md5ctx
, ":", 1);
2767 MD5_Update(&md5ctx
, realm
, sizeof(realm
)-1);
2768 MD5_Update(&md5ctx
, ":", 1);
2769 MD5_Update(&md5ctx
, r
->Link
.pubPasswd
.av_val
, r
->Link
.pubPasswd
.av_len
);
2770 MD5_Final(md5sum_val
, &md5ctx
);
2771 RTMP_Log(RTMP_LOGDEBUG
, "%s, md5(%s:%s:%s) =>", __FUNCTION__
,
2772 user
.av_val
, realm
, r
->Link
.pubPasswd
.av_val
);
2773 RTMP_LogHexString(RTMP_LOGDEBUG
, md5sum_val
, MD5_DIGEST_LENGTH
);
2774 hexenc(md5sum_val
, MD5_DIGEST_LENGTH
, hash1
);
2776 /* hash2 = hexenc(md5(method + ":/" + app + "/" + appInstance)) */
2777 /* Extract appname + appinstance without query parameters */
2778 apptmp
= r
->Link
.app
;
2779 ptr
= AValChr(&apptmp
, '?');
2781 apptmp
.av_len
= ptr
- apptmp
.av_val
;
2784 MD5_Update(&md5ctx
, method
, sizeof(method
)-1);
2785 MD5_Update(&md5ctx
, ":/", 2);
2786 MD5_Update(&md5ctx
, apptmp
.av_val
, apptmp
.av_len
);
2787 if (!AValChr(&apptmp
, '/'))
2788 MD5_Update(&md5ctx
, "/_definst_", sizeof("/_definst_") - 1);
2789 MD5_Final(md5sum_val
, &md5ctx
);
2790 RTMP_Log(RTMP_LOGDEBUG
, "%s, md5(%s:/%.*s) =>", __FUNCTION__
,
2791 method
, apptmp
.av_len
, apptmp
.av_val
);
2792 RTMP_LogHexString(RTMP_LOGDEBUG
, md5sum_val
, MD5_DIGEST_LENGTH
);
2793 hexenc(md5sum_val
, MD5_DIGEST_LENGTH
, hash2
);
2795 /* hash3 = hexenc(md5(hash1 + ":" + nonce + ":" + nchex + ":" + cnonce + ":" + qop + ":" + hash2)) */
2797 MD5_Update(&md5ctx
, hash1
, HEXHASH_LEN
);
2798 MD5_Update(&md5ctx
, ":", 1);
2799 MD5_Update(&md5ctx
, nonce
.av_val
, nonce
.av_len
);
2800 MD5_Update(&md5ctx
, ":", 1);
2801 MD5_Update(&md5ctx
, nchex
, sizeof(nchex
)-1);
2802 MD5_Update(&md5ctx
, ":", 1);
2803 MD5_Update(&md5ctx
, cnonce
, sizeof(cnonce
)-1);
2804 MD5_Update(&md5ctx
, ":", 1);
2805 MD5_Update(&md5ctx
, qop
, sizeof(qop
)-1);
2806 MD5_Update(&md5ctx
, ":", 1);
2807 MD5_Update(&md5ctx
, hash2
, HEXHASH_LEN
);
2808 MD5_Final(md5sum_val
, &md5ctx
);
2809 RTMP_Log(RTMP_LOGDEBUG
, "%s, md5(%s:%s:%s:%s:%s:%s) =>", __FUNCTION__
,
2810 hash1
, nonce
.av_val
, nchex
, cnonce
, qop
, hash2
);
2811 RTMP_LogHexString(RTMP_LOGDEBUG
, md5sum_val
, MD5_DIGEST_LENGTH
);
2812 hexenc(md5sum_val
, MD5_DIGEST_LENGTH
, hash3
);
2814 /* pubToken = &authmod=<authmod>&user=<username>&nonce=<nonce>&cnonce=<cnonce>&nc=<nchex>&response=<hash3> */
2815 /* Append nonces and response to query string which already contains
2817 pubToken
.av_val
= malloc(64 + sizeof(authmod
)-1 + user
.av_len
+ nonce
.av_len
+ sizeof(cnonce
)-1 + sizeof(nchex
)-1 + HEXHASH_LEN
);
2818 sprintf(pubToken
.av_val
,
2819 "&nonce=%s&cnonce=%s&nc=%s&response=%s",
2820 nonce
.av_val
, cnonce
, nchex
, hash3
);
2821 pubToken
.av_len
= strlen(pubToken
.av_val
);
2822 RTMP_Log(RTMP_LOGDEBUG
, "%s, pubToken2: %s", __FUNCTION__
, pubToken
.av_val
);
2826 else if(strstr(description
->av_val
, "?reason=authfail") != NULL
)
2828 RTMP_Log(RTMP_LOGERROR
, "%s, Authentication failed", __FUNCTION__
);
2831 else if(strstr(description
->av_val
, "?reason=nosuchuser") != NULL
)
2833 RTMP_Log(RTMP_LOGERROR
, "%s, Authentication failed: no such user", __FUNCTION__
);
2838 RTMP_Log(RTMP_LOGERROR
, "%s, Authentication failed: unknown auth mode: %s",
2839 __FUNCTION__
, description
->av_val
);
2843 ptr
= malloc(r
->Link
.app
.av_len
+ pubToken
.av_len
);
2844 strncpy(ptr
, r
->Link
.app
.av_val
, r
->Link
.app
.av_len
);
2845 strncpy(ptr
+ r
->Link
.app
.av_len
, pubToken
.av_val
, pubToken
.av_len
);
2846 r
->Link
.app
.av_len
+= pubToken
.av_len
;
2847 if(r
->Link
.lFlags
& RTMP_LF_FAPU
)
2848 free(r
->Link
.app
.av_val
);
2849 r
->Link
.app
.av_val
= ptr
;
2851 ptr
= malloc(r
->Link
.tcUrl
.av_len
+ pubToken
.av_len
);
2852 strncpy(ptr
, r
->Link
.tcUrl
.av_val
, r
->Link
.tcUrl
.av_len
);
2853 strncpy(ptr
+ r
->Link
.tcUrl
.av_len
, pubToken
.av_val
, pubToken
.av_len
);
2854 r
->Link
.tcUrl
.av_len
+= pubToken
.av_len
;
2855 if(r
->Link
.lFlags
& RTMP_LF_FTCU
)
2856 free(r
->Link
.tcUrl
.av_val
);
2857 r
->Link
.tcUrl
.av_val
= ptr
;
2859 free(pubToken
.av_val
);
2860 r
->Link
.lFlags
|= RTMP_LF_FTCU
| RTMP_LF_FAPU
;
2862 RTMP_Log(RTMP_LOGDEBUG
, "%s, new app: %.*s tcUrl: %.*s playpath: %s", __FUNCTION__
,
2863 r
->Link
.app
.av_len
, r
->Link
.app
.av_val
,
2864 r
->Link
.tcUrl
.av_len
, r
->Link
.tcUrl
.av_val
,
2865 r
->Link
.playpath
.av_val
);
2877 SAVC(onFCSubscribe
);
2878 SAVC(onFCUnsubscribe
);
2887 SAVC(playlist_ready
);
2888 static const AVal av_NetStream_Failed
= AVC("NetStream.Failed");
2889 static const AVal av_NetStream_Play_Failed
= AVC("NetStream.Play.Failed");
2890 static const AVal av_NetStream_Play_StreamNotFound
=
2891 AVC("NetStream.Play.StreamNotFound");
2892 static const AVal av_NetConnection_Connect_InvalidApp
=
2893 AVC("NetConnection.Connect.InvalidApp");
2894 static const AVal av_NetStream_Play_Start
= AVC("NetStream.Play.Start");
2895 static const AVal av_NetStream_Play_Complete
= AVC("NetStream.Play.Complete");
2896 static const AVal av_NetStream_Play_Stop
= AVC("NetStream.Play.Stop");
2897 static const AVal av_NetStream_Seek_Notify
= AVC("NetStream.Seek.Notify");
2898 static const AVal av_NetStream_Pause_Notify
= AVC("NetStream.Pause.Notify");
2899 static const AVal av_NetStream_Play_PublishNotify
=
2900 AVC("NetStream.Play.PublishNotify");
2901 static const AVal av_NetStream_Play_UnpublishNotify
=
2902 AVC("NetStream.Play.UnpublishNotify");
2903 static const AVal av_NetStream_Publish_Start
= AVC("NetStream.Publish.Start");
2904 static const AVal av_NetConnection_Connect_Rejected
=
2905 AVC("NetConnection.Connect.Rejected");
2907 /* Returns 0 for OK/Failed/error, 1 for 'Stop or Complete' */
2909 HandleInvoke(RTMP
*r
, const char *body
, unsigned int nBodySize
)
2915 if (body
[0] != 0x02) /* make sure it is a string method name we start with */
2917 RTMP_Log(RTMP_LOGWARNING
, "%s, Sanity failed. no string method in invoke packet",
2922 nRes
= AMF_Decode(&obj
, body
, nBodySize
, FALSE
);
2925 RTMP_Log(RTMP_LOGERROR
, "%s, error decoding invoke packet", __FUNCTION__
);
2930 AMFProp_GetString(AMF_GetProp(&obj
, NULL
, 0), &method
);
2931 txn
= AMFProp_GetNumber(AMF_GetProp(&obj
, NULL
, 1));
2932 RTMP_Log(RTMP_LOGDEBUG
, "%s, server invoking <%s>", __FUNCTION__
, method
.av_val
);
2934 if (AVMATCH(&method
, &av__result
))
2936 AVal methodInvoked
= {0};
2939 for (i
=0; i
<r
->m_numCalls
; i
++) {
2940 if (r
->m_methodCalls
[i
].num
== (int)txn
) {
2941 methodInvoked
= r
->m_methodCalls
[i
].name
;
2942 AV_erase(r
->m_methodCalls
, &r
->m_numCalls
, i
, FALSE
);
2946 if (!methodInvoked
.av_val
) {
2947 RTMP_Log(RTMP_LOGDEBUG
, "%s, received result id %f without matching request",
2952 RTMP_Log(RTMP_LOGDEBUG
, "%s, received result for method call <%s>", __FUNCTION__
,
2953 methodInvoked
.av_val
);
2955 if (AVMATCH(&methodInvoked
, &av_connect
))
2957 if (r
->Link
.token
.av_len
)
2959 AMFObjectProperty p
;
2960 if (RTMP_FindFirstMatchingProperty(&obj
, &av_secureToken
, &p
))
2962 DecodeTEA(&r
->Link
.token
, &p
.p_vu
.p_aval
);
2963 SendSecureTokenResponse(r
, &p
.p_vu
.p_aval
);
2966 if (r
->Link
.protocol
& RTMP_FEATURE_WRITE
)
2968 SendReleaseStream(r
);
2973 RTMP_SendServerBW(r
);
2974 RTMP_SendCtrl(r
, 3, 0, 300);
2976 RTMP_SendCreateStream(r
);
2978 if (!(r
->Link
.protocol
& RTMP_FEATURE_WRITE
))
2980 /* Authenticate on Justin.tv legacy servers before sending FCSubscribe */
2981 if (r
->Link
.usherToken
.av_len
)
2982 SendUsherToken(r
, &r
->Link
.usherToken
);
2983 /* Send the FCSubscribe if live stream or if subscribepath is set */
2984 if (r
->Link
.subscribepath
.av_len
)
2985 SendFCSubscribe(r
, &r
->Link
.subscribepath
);
2986 else if (r
->Link
.lFlags
& RTMP_LF_LIVE
)
2987 SendFCSubscribe(r
, &r
->Link
.playpath
);
2990 else if (AVMATCH(&methodInvoked
, &av_createStream
))
2992 r
->m_stream_id
= (int)AMFProp_GetNumber(AMF_GetProp(&obj
, NULL
, 3));
2994 if (r
->Link
.protocol
& RTMP_FEATURE_WRITE
)
3000 if (r
->Link
.lFlags
& RTMP_LF_PLST
)
3003 RTMP_SendCtrl(r
, 3, r
->m_stream_id
, r
->m_nBufferMS
);
3006 else if (AVMATCH(&methodInvoked
, &av_play
) ||
3007 AVMATCH(&methodInvoked
, &av_publish
))
3009 r
->m_bPlaying
= TRUE
;
3011 free(methodInvoked
.av_val
);
3013 else if (AVMATCH(&method
, &av_onBWDone
))
3015 if (!r
->m_nBWCheckCounter
)
3018 else if (AVMATCH(&method
, &av_onFCSubscribe
))
3020 /* SendOnFCSubscribe(); */
3022 else if (AVMATCH(&method
, &av_onFCUnsubscribe
))
3027 else if (AVMATCH(&method
, &av_ping
))
3031 else if (AVMATCH(&method
, &av__onbwcheck
))
3033 SendCheckBWResult(r
, txn
);
3035 else if (AVMATCH(&method
, &av__onbwdone
))
3038 for (i
= 0; i
< r
->m_numCalls
; i
++)
3039 if (AVMATCH(&r
->m_methodCalls
[i
].name
, &av__checkbw
))
3041 AV_erase(r
->m_methodCalls
, &r
->m_numCalls
, i
, TRUE
);
3045 else if (AVMATCH(&method
, &av__error
))
3048 AVal methodInvoked
= {0};
3051 if (r
->Link
.protocol
& RTMP_FEATURE_WRITE
)
3053 for (i
=0; i
<r
->m_numCalls
; i
++)
3055 if (r
->m_methodCalls
[i
].num
== txn
)
3057 methodInvoked
= r
->m_methodCalls
[i
].name
;
3058 AV_erase(r
->m_methodCalls
, &r
->m_numCalls
, i
, FALSE
);
3062 if (!methodInvoked
.av_val
)
3064 RTMP_Log(RTMP_LOGDEBUG
, "%s, received result id %f without matching request",
3069 RTMP_Log(RTMP_LOGDEBUG
, "%s, received error for method call <%s>", __FUNCTION__
,
3070 methodInvoked
.av_val
);
3072 if (AVMATCH(&methodInvoked
, &av_connect
))
3075 AVal code
, level
, description
;
3076 AMFProp_GetObject(AMF_GetProp(&obj
, NULL
, 3), &obj2
);
3077 AMFProp_GetString(AMF_GetProp(&obj2
, &av_code
, -1), &code
);
3078 AMFProp_GetString(AMF_GetProp(&obj2
, &av_level
, -1), &level
);
3079 AMFProp_GetString(AMF_GetProp(&obj2
, &av_description
, -1), &description
);
3080 RTMP_Log(RTMP_LOGDEBUG
, "%s, error description: %s", __FUNCTION__
, description
.av_val
);
3081 /* if PublisherAuth returns 1, then reconnect */
3082 if (PublisherAuth(r
, &description
) == 1)
3084 CloseInternal(r
, 1);
3085 if (!RTMP_Connect(r
, NULL
) || !RTMP_ConnectStream(r
, 0))
3092 RTMP_Log(RTMP_LOGERROR
, "rtmp server sent error");
3094 free(methodInvoked
.av_val
);
3096 RTMP_Log(RTMP_LOGERROR
, "rtmp server sent error");
3099 else if (AVMATCH(&method
, &av_close
))
3101 RTMP_Log(RTMP_LOGERROR
, "rtmp server requested close");
3104 else if (AVMATCH(&method
, &av_onStatus
))
3108 AMFProp_GetObject(AMF_GetProp(&obj
, NULL
, 3), &obj2
);
3109 AMFProp_GetString(AMF_GetProp(&obj2
, &av_code
, -1), &code
);
3110 AMFProp_GetString(AMF_GetProp(&obj2
, &av_level
, -1), &level
);
3112 RTMP_Log(RTMP_LOGDEBUG
, "%s, onStatus: %s", __FUNCTION__
, code
.av_val
);
3113 if (AVMATCH(&code
, &av_NetStream_Failed
)
3114 || AVMATCH(&code
, &av_NetStream_Play_Failed
)
3115 || AVMATCH(&code
, &av_NetStream_Play_StreamNotFound
)
3116 || AVMATCH(&code
, &av_NetConnection_Connect_InvalidApp
))
3118 r
->m_stream_id
= -1;
3120 RTMP_Log(RTMP_LOGERROR
, "Closing connection: %s", code
.av_val
);
3123 else if (AVMATCH(&code
, &av_NetStream_Play_Start
)
3124 || AVMATCH(&code
, &av_NetStream_Play_PublishNotify
))
3127 r
->m_bPlaying
= TRUE
;
3128 for (i
= 0; i
< r
->m_numCalls
; i
++)
3130 if (AVMATCH(&r
->m_methodCalls
[i
].name
, &av_play
))
3132 AV_erase(r
->m_methodCalls
, &r
->m_numCalls
, i
, TRUE
);
3138 else if (AVMATCH(&code
, &av_NetStream_Publish_Start
))
3141 r
->m_bPlaying
= TRUE
;
3142 for (i
= 0; i
< r
->m_numCalls
; i
++)
3144 if (AVMATCH(&r
->m_methodCalls
[i
].name
, &av_publish
))
3146 AV_erase(r
->m_methodCalls
, &r
->m_numCalls
, i
, TRUE
);
3152 /* Return 1 if this is a Play.Complete or Play.Stop */
3153 else if (AVMATCH(&code
, &av_NetStream_Play_Complete
)
3154 || AVMATCH(&code
, &av_NetStream_Play_Stop
)
3155 || AVMATCH(&code
, &av_NetStream_Play_UnpublishNotify
))
3161 else if (AVMATCH(&code
, &av_NetStream_Seek_Notify
))
3163 r
->m_read
.flags
&= ~RTMP_READ_SEEKING
;
3166 else if (AVMATCH(&code
, &av_NetStream_Pause_Notify
))
3168 if (r
->m_pausing
== 1 || r
->m_pausing
== 2)
3170 RTMP_SendPause(r
, FALSE
, r
->m_pauseStamp
);
3175 else if (AVMATCH(&method
, &av_playlist_ready
))
3178 for (i
= 0; i
< r
->m_numCalls
; i
++)
3180 if (AVMATCH(&r
->m_methodCalls
[i
].name
, &av_set_playlist
))
3182 AV_erase(r
->m_methodCalls
, &r
->m_numCalls
, i
, TRUE
);
3197 RTMP_FindFirstMatchingProperty(AMFObject
*obj
, const AVal
*name
,
3198 AMFObjectProperty
* p
)
3201 /* this is a small object search to locate the "duration" property */
3202 for (n
= 0; n
< obj
->o_num
; n
++)
3204 AMFObjectProperty
*prop
= AMF_GetProp(obj
, NULL
, n
);
3206 if (AVMATCH(&prop
->p_name
, name
))
3208 memcpy(p
, prop
, sizeof(*prop
));
3212 if (prop
->p_type
== AMF_OBJECT
|| prop
->p_type
== AMF_ECMA_ARRAY
)
3214 if (RTMP_FindFirstMatchingProperty(&prop
->p_vu
.p_object
, name
, p
))
3221 /* Like above, but only check if name is a prefix of property */
3223 RTMP_FindPrefixProperty(AMFObject
*obj
, const AVal
*name
,
3224 AMFObjectProperty
* p
)
3227 for (n
= 0; n
< obj
->o_num
; n
++)
3229 AMFObjectProperty
*prop
= AMF_GetProp(obj
, NULL
, n
);
3231 if (prop
->p_name
.av_len
> name
->av_len
&&
3232 !memcmp(prop
->p_name
.av_val
, name
->av_val
, name
->av_len
))
3234 memcpy(p
, prop
, sizeof(*prop
));
3238 if (prop
->p_type
== AMF_OBJECT
)
3240 if (RTMP_FindPrefixProperty(&prop
->p_vu
.p_object
, name
, p
))
3248 DumpMetaData(AMFObject
*obj
)
3250 AMFObjectProperty
*prop
;
3252 for (n
= 0; n
< obj
->o_num
; n
++)
3255 prop
= AMF_GetProp(obj
, NULL
, n
);
3256 switch (prop
->p_type
)
3259 case AMF_ECMA_ARRAY
:
3260 case AMF_STRICT_ARRAY
:
3261 if (prop
->p_name
.av_len
)
3262 RTMP_Log(RTMP_LOGINFO
, "%.*s:", prop
->p_name
.av_len
, prop
->p_name
.av_val
);
3263 DumpMetaData(&prop
->p_vu
.p_object
);
3266 snprintf(str
, 255, "%.2f", prop
->p_vu
.p_number
);
3269 snprintf(str
, 255, "%s",
3270 prop
->p_vu
.p_number
!= 0. ? "TRUE" : "FALSE");
3273 len
= snprintf(str
, 255, "%.*s", prop
->p_vu
.p_aval
.av_len
,
3274 prop
->p_vu
.p_aval
.av_val
);
3275 if (len
>= 1 && str
[len
-1] == '\n')
3279 snprintf(str
, 255, "timestamp:%.2f", prop
->p_vu
.p_number
);
3282 snprintf(str
, 255, "INVALID TYPE 0x%02x",
3283 (unsigned char)prop
->p_type
);
3285 if (str
[0] && prop
->p_name
.av_len
)
3287 RTMP_Log(RTMP_LOGINFO
, " %-22.*s%s", prop
->p_name
.av_len
,
3288 prop
->p_name
.av_val
, str
);
3300 HandleMetadata(RTMP
*r
, char *body
, unsigned int len
)
3302 /* allright we get some info here, so parse it and print it */
3303 /* also keep duration or filesize to make a nice progress bar */
3309 int nRes
= AMF_Decode(&obj
, body
, len
, FALSE
);
3312 RTMP_Log(RTMP_LOGERROR
, "%s, error decoding meta data packet", __FUNCTION__
);
3317 AMFProp_GetString(AMF_GetProp(&obj
, NULL
, 0), &metastring
);
3319 if (AVMATCH(&metastring
, &av_onMetaData
))
3321 AMFObjectProperty prop
;
3323 RTMP_Log(RTMP_LOGINFO
, "Metadata:");
3325 if (RTMP_FindFirstMatchingProperty(&obj
, &av_duration
, &prop
))
3327 r
->m_fDuration
= prop
.p_vu
.p_number
;
3328 /*RTMP_Log(RTMP_LOGDEBUG, "Set duration: %.2f", m_fDuration); */
3330 /* Search for audio or video tags */
3331 if (RTMP_FindPrefixProperty(&obj
, &av_video
, &prop
))
3332 r
->m_read
.dataType
|= 1;
3333 if (RTMP_FindPrefixProperty(&obj
, &av_audio
, &prop
))
3334 r
->m_read
.dataType
|= 4;
3342 HandleChangeChunkSize(RTMP
*r
, const RTMPPacket
*packet
)
3344 if (packet
->m_nBodySize
>= 4)
3346 r
->m_inChunkSize
= AMF_DecodeInt32(packet
->m_body
);
3347 RTMP_Log(RTMP_LOGDEBUG
, "%s, received: chunk size change to %d", __FUNCTION__
,
3353 HandleAudio(RTMP
*r
, const RTMPPacket
*packet
)
3358 HandleVideo(RTMP
*r
, const RTMPPacket
*packet
)
3363 HandleCtrl(RTMP
*r
, const RTMPPacket
*packet
)
3367 if (packet
->m_body
&& packet
->m_nBodySize
>= 2)
3368 nType
= AMF_DecodeInt16(packet
->m_body
);
3369 RTMP_Log(RTMP_LOGDEBUG
, "%s, received ctrl. type: %d, len: %d", __FUNCTION__
, nType
,
3370 packet
->m_nBodySize
);
3371 /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
3373 if (packet
->m_nBodySize
>= 6)
3378 tmp
= AMF_DecodeInt32(packet
->m_body
+ 2);
3379 RTMP_Log(RTMP_LOGDEBUG
, "%s, Stream Begin %d", __FUNCTION__
, tmp
);
3383 tmp
= AMF_DecodeInt32(packet
->m_body
+ 2);
3384 RTMP_Log(RTMP_LOGDEBUG
, "%s, Stream EOF %d", __FUNCTION__
, tmp
);
3385 if (r
->m_pausing
== 1)
3390 tmp
= AMF_DecodeInt32(packet
->m_body
+ 2);
3391 RTMP_Log(RTMP_LOGDEBUG
, "%s, Stream Dry %d", __FUNCTION__
, tmp
);
3395 tmp
= AMF_DecodeInt32(packet
->m_body
+ 2);
3396 RTMP_Log(RTMP_LOGDEBUG
, "%s, Stream IsRecorded %d", __FUNCTION__
, tmp
);
3399 case 6: /* server ping. reply with pong. */
3400 tmp
= AMF_DecodeInt32(packet
->m_body
+ 2);
3401 RTMP_Log(RTMP_LOGDEBUG
, "%s, Ping %d", __FUNCTION__
, tmp
);
3402 RTMP_SendCtrl(r
, 0x07, tmp
, 0);
3405 /* FMS 3.5 servers send the following two controls to let the client
3406 * know when the server has sent a complete buffer. I.e., when the
3407 * server has sent an amount of data equal to m_nBufferMS in duration.
3408 * The server meters its output so that data arrives at the client
3409 * in realtime and no faster.
3411 * The rtmpdump program tries to set m_nBufferMS as large as
3412 * possible, to force the server to send data as fast as possible.
3413 * In practice, the server appears to cap this at about 1 hour's
3414 * worth of data. After the server has sent a complete buffer, and
3415 * sends this BufferEmpty message, it will wait until the play
3416 * duration of that buffer has passed before sending a new buffer.
3417 * The BufferReady message will be sent when the new buffer starts.
3418 * (There is no BufferReady message for the very first buffer;
3419 * presumably the Stream Begin message is sufficient for that
3422 * If the network speed is much faster than the data bitrate, then
3423 * there may be long delays between the end of one buffer and the
3424 * start of the next.
3426 * Since usually the network allows data to be sent at
3427 * faster than realtime, and rtmpdump wants to download the data
3428 * as fast as possible, we use this RTMP_LF_BUFX hack: when we
3429 * get the BufferEmpty message, we send a Pause followed by an
3430 * Unpause. This causes the server to send the next buffer immediately
3431 * instead of waiting for the full duration to elapse. (That's
3432 * also the purpose of the ToggleStream function, which rtmpdump
3433 * calls if we get a read timeout.)
3435 * Media player apps don't need this hack since they are just
3436 * going to play the data in realtime anyway. It also doesn't work
3437 * for live streams since they obviously can only be sent in
3438 * realtime. And it's all moot if the network speed is actually
3439 * slower than the media bitrate.
3442 tmp
= AMF_DecodeInt32(packet
->m_body
+ 2);
3443 RTMP_Log(RTMP_LOGDEBUG
, "%s, Stream BufferEmpty %d", __FUNCTION__
, tmp
);
3444 if (!(r
->Link
.lFlags
& RTMP_LF_BUFX
))
3448 r
->m_pauseStamp
= r
->m_mediaChannel
< r
->m_channelsAllocatedIn
?
3449 r
->m_channelTimestamp
[r
->m_mediaChannel
] : 0;
3450 RTMP_SendPause(r
, TRUE
, r
->m_pauseStamp
);
3453 else if (r
->m_pausing
== 2)
3455 RTMP_SendPause(r
, FALSE
, r
->m_pauseStamp
);
3461 tmp
= AMF_DecodeInt32(packet
->m_body
+ 2);
3462 RTMP_Log(RTMP_LOGDEBUG
, "%s, Stream BufferReady %d", __FUNCTION__
, tmp
);
3466 tmp
= AMF_DecodeInt32(packet
->m_body
+ 2);
3467 RTMP_Log(RTMP_LOGDEBUG
, "%s, Stream xx %d", __FUNCTION__
, tmp
);
3475 RTMP_Log(RTMP_LOGDEBUG
, "%s, SWFVerification ping received: ", __FUNCTION__
);
3476 if (packet
->m_nBodySize
> 2 && packet
->m_body
[2] > 0x01)
3478 RTMP_Log(RTMP_LOGERROR
,
3479 "%s: SWFVerification Type %d request not supported! Patches welcome...",
3480 __FUNCTION__
, packet
->m_body
[2]);
3483 /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
3485 /* respond with HMAC SHA256 of decompressed SWF, key is the 30byte player key, also the last 30 bytes of the server handshake are applied */
3486 else if (r
->Link
.SWFSize
)
3488 RTMP_SendCtrl(r
, 0x1B, 0, 0);
3492 RTMP_Log(RTMP_LOGERROR
,
3493 "%s: Ignoring SWFVerification request, use --swfVfy!",
3497 RTMP_Log(RTMP_LOGERROR
,
3498 "%s: Ignoring SWFVerification request, no CRYPTO support!",
3505 HandleServerBW(RTMP
*r
, const RTMPPacket
*packet
)
3507 r
->m_nServerBW
= AMF_DecodeInt32(packet
->m_body
);
3508 RTMP_Log(RTMP_LOGDEBUG
, "%s: server BW = %d", __FUNCTION__
, r
->m_nServerBW
);
3512 HandleClientBW(RTMP
*r
, const RTMPPacket
*packet
)
3514 r
->m_nClientBW
= AMF_DecodeInt32(packet
->m_body
);
3515 if (packet
->m_nBodySize
> 4)
3516 r
->m_nClientBW2
= packet
->m_body
[4];
3518 r
->m_nClientBW2
= -1;
3519 RTMP_Log(RTMP_LOGDEBUG
, "%s: client BW = %d %d", __FUNCTION__
, r
->m_nClientBW
,
3524 DecodeInt32LE(const char *data
)
3526 unsigned char *c
= (unsigned char *)data
;
3529 val
= (c
[3] << 24) | (c
[2] << 16) | (c
[1] << 8) | c
[0];
3534 EncodeInt32LE(char *output
, int nVal
)
3547 RTMP_ReadPacket(RTMP
*r
, RTMPPacket
*packet
)
3549 uint8_t hbuf
[RTMP_MAX_HEADER_SIZE
] = { 0 };
3550 char *header
= (char *)hbuf
;
3551 int nSize
, hSize
, nToRead
, nChunk
;
3552 int didAlloc
= FALSE
;
3553 int extendedTimestamp
;
3555 RTMP_Log(RTMP_LOGDEBUG2
, "%s: fd=%d", __FUNCTION__
, r
->m_sb
.sb_socket
);
3557 if (ReadN(r
, (char *)hbuf
, 1) == 0)
3559 RTMP_Log(RTMP_LOGERROR
, "%s, failed to read RTMP packet header", __FUNCTION__
);
3563 packet
->m_headerType
= (hbuf
[0] & 0xc0) >> 6;
3564 packet
->m_nChannel
= (hbuf
[0] & 0x3f);
3566 if (packet
->m_nChannel
== 0)
3568 if (ReadN(r
, (char *)&hbuf
[1], 1) != 1)
3570 RTMP_Log(RTMP_LOGERROR
, "%s, failed to read RTMP packet header 2nd byte",
3574 packet
->m_nChannel
= hbuf
[1];
3575 packet
->m_nChannel
+= 64;
3578 else if (packet
->m_nChannel
== 1)
3581 if (ReadN(r
, (char *)&hbuf
[1], 2) != 2)
3583 RTMP_Log(RTMP_LOGERROR
, "%s, failed to read RTMP packet header 3nd byte",
3587 tmp
= (hbuf
[2] << 8) + hbuf
[1];
3588 packet
->m_nChannel
= tmp
+ 64;
3589 RTMP_Log(RTMP_LOGDEBUG
, "%s, m_nChannel: %0x", __FUNCTION__
, packet
->m_nChannel
);
3593 nSize
= packetSize
[packet
->m_headerType
];
3595 if (packet
->m_nChannel
>= r
->m_channelsAllocatedIn
)
3597 int n
= packet
->m_nChannel
+ 10;
3598 int *timestamp
= realloc(r
->m_channelTimestamp
, sizeof(int) * n
);
3599 RTMPPacket
**packets
= realloc(r
->m_vecChannelsIn
, sizeof(RTMPPacket
*) * n
);
3601 free(r
->m_channelTimestamp
);
3603 free(r
->m_vecChannelsIn
);
3604 r
->m_channelTimestamp
= timestamp
;
3605 r
->m_vecChannelsIn
= packets
;
3606 if (!timestamp
|| !packets
) {
3607 r
->m_channelsAllocatedIn
= 0;
3610 memset(r
->m_channelTimestamp
+ r
->m_channelsAllocatedIn
, 0, sizeof(int) * (n
- r
->m_channelsAllocatedIn
));
3611 memset(r
->m_vecChannelsIn
+ r
->m_channelsAllocatedIn
, 0, sizeof(RTMPPacket
*) * (n
- r
->m_channelsAllocatedIn
));
3612 r
->m_channelsAllocatedIn
= n
;
3615 if (nSize
== RTMP_LARGE_HEADER_SIZE
) /* if we get a full header the timestamp is absolute */
3616 packet
->m_hasAbsTimestamp
= TRUE
;
3618 else if (nSize
< RTMP_LARGE_HEADER_SIZE
)
3619 { /* using values from the last message of this channel */
3620 if (r
->m_vecChannelsIn
[packet
->m_nChannel
])
3621 memcpy(packet
, r
->m_vecChannelsIn
[packet
->m_nChannel
],
3622 sizeof(RTMPPacket
));
3627 if (nSize
> 0 && ReadN(r
, header
, nSize
) != nSize
)
3629 RTMP_Log(RTMP_LOGERROR
, "%s, failed to read RTMP packet header. type: %x",
3630 __FUNCTION__
, (unsigned int)hbuf
[0]);
3634 hSize
= nSize
+ (header
- (char *)hbuf
);
3638 packet
->m_nTimeStamp
= AMF_DecodeInt24(header
);
3640 /*RTMP_Log(RTMP_LOGDEBUG, "%s, reading RTMP packet chunk on channel %x, headersz %i, timestamp %i, abs timestamp %i", __FUNCTION__, packet.m_nChannel, nSize, packet.m_nTimeStamp, packet.m_hasAbsTimestamp); */
3644 packet
->m_nBodySize
= AMF_DecodeInt24(header
+ 3);
3645 packet
->m_nBytesRead
= 0;
3646 RTMPPacket_Free(packet
);
3650 packet
->m_packetType
= header
[6];
3653 packet
->m_nInfoField2
= DecodeInt32LE(header
+ 7);
3658 extendedTimestamp
= packet
->m_nTimeStamp
== 0xffffff;
3659 if (extendedTimestamp
)
3661 if (ReadN(r
, header
+ nSize
, 4) != 4)
3663 RTMP_Log(RTMP_LOGERROR
, "%s, failed to read extended timestamp",
3667 packet
->m_nTimeStamp
= AMF_DecodeInt32(header
+ nSize
);
3671 RTMP_LogHexString(RTMP_LOGDEBUG2
, (uint8_t *)hbuf
, hSize
);
3673 if (packet
->m_nBodySize
> 0 && packet
->m_body
== NULL
)
3675 if (!RTMPPacket_Alloc(packet
, packet
->m_nBodySize
))
3677 RTMP_Log(RTMP_LOGDEBUG
, "%s, failed to allocate packet", __FUNCTION__
);
3681 packet
->m_headerType
= (hbuf
[0] & 0xc0) >> 6;
3684 nToRead
= packet
->m_nBodySize
- packet
->m_nBytesRead
;
3685 nChunk
= r
->m_inChunkSize
;
3686 if (nToRead
< nChunk
)
3689 /* Does the caller want the raw chunk? */
3690 if (packet
->m_chunk
)
3692 packet
->m_chunk
->c_headerSize
= hSize
;
3693 memcpy(packet
->m_chunk
->c_header
, hbuf
, hSize
);
3694 packet
->m_chunk
->c_chunk
= packet
->m_body
+ packet
->m_nBytesRead
;
3695 packet
->m_chunk
->c_chunkSize
= nChunk
;
3698 if (ReadN(r
, packet
->m_body
+ packet
->m_nBytesRead
, nChunk
) != nChunk
)
3700 RTMP_Log(RTMP_LOGERROR
, "%s, failed to read RTMP packet body. len: %u",
3701 __FUNCTION__
, packet
->m_nBodySize
);
3705 RTMP_LogHexString(RTMP_LOGDEBUG2
, (uint8_t *)packet
->m_body
+ packet
->m_nBytesRead
, nChunk
);
3707 packet
->m_nBytesRead
+= nChunk
;
3709 /* keep the packet as ref for other packets on this channel */
3710 if (!r
->m_vecChannelsIn
[packet
->m_nChannel
])
3711 r
->m_vecChannelsIn
[packet
->m_nChannel
] = malloc(sizeof(RTMPPacket
));
3712 memcpy(r
->m_vecChannelsIn
[packet
->m_nChannel
], packet
, sizeof(RTMPPacket
));
3713 if (extendedTimestamp
)
3715 r
->m_vecChannelsIn
[packet
->m_nChannel
]->m_nTimeStamp
= 0xffffff;
3718 if (RTMPPacket_IsReady(packet
))
3720 /* make packet's timestamp absolute */
3721 if (!packet
->m_hasAbsTimestamp
)
3722 packet
->m_nTimeStamp
+= r
->m_channelTimestamp
[packet
->m_nChannel
]; /* timestamps seem to be always relative!! */
3724 r
->m_channelTimestamp
[packet
->m_nChannel
] = packet
->m_nTimeStamp
;
3726 /* reset the data from the stored packet. we keep the header since we may use it later if a new packet for this channel */
3727 /* arrives and requests to re-use some info (small packet header) */
3728 r
->m_vecChannelsIn
[packet
->m_nChannel
]->m_body
= NULL
;
3729 r
->m_vecChannelsIn
[packet
->m_nChannel
]->m_nBytesRead
= 0;
3730 r
->m_vecChannelsIn
[packet
->m_nChannel
]->m_hasAbsTimestamp
= FALSE
; /* can only be false if we reuse header */
3734 packet
->m_body
= NULL
; /* so it won't be erased on free */
3742 HandShake(RTMP
*r
, int FP9HandShake
)
3745 uint32_t uptime
, suptime
;
3748 char clientbuf
[RTMP_SIG_SIZE
+ 1], *clientsig
= clientbuf
+ 1;
3749 char serversig
[RTMP_SIG_SIZE
];
3751 clientbuf
[0] = 0x03; /* not encrypted */
3753 uptime
= htonl(RTMP_GetTime());
3754 memcpy(clientsig
, &uptime
, 4);
3756 memset(&clientsig
[4], 0, 4);
3759 for (i
= 8; i
< RTMP_SIG_SIZE
; i
++)
3760 clientsig
[i
] = 0xff;
3762 for (i
= 8; i
< RTMP_SIG_SIZE
; i
++)
3763 clientsig
[i
] = (char)(rand() % 256);
3766 if (!WriteN(r
, clientbuf
, RTMP_SIG_SIZE
+ 1))
3769 if (ReadN(r
, &type
, 1) != 1) /* 0x03 or 0x06 */
3772 RTMP_Log(RTMP_LOGDEBUG
, "%s: Type Answer : %02X", __FUNCTION__
, type
);
3774 if (type
!= clientbuf
[0])
3775 RTMP_Log(RTMP_LOGWARNING
, "%s: Type mismatch: client sent %d, server answered %d",
3776 __FUNCTION__
, clientbuf
[0], type
);
3778 if (ReadN(r
, serversig
, RTMP_SIG_SIZE
) != RTMP_SIG_SIZE
)
3781 /* decode server response */
3783 memcpy(&suptime
, serversig
, 4);
3784 suptime
= ntohl(suptime
);
3786 RTMP_Log(RTMP_LOGDEBUG
, "%s: Server Uptime : %d", __FUNCTION__
, suptime
);
3787 RTMP_Log(RTMP_LOGDEBUG
, "%s: FMS Version : %d.%d.%d.%d", __FUNCTION__
,
3788 serversig
[4], serversig
[5], serversig
[6], serversig
[7]);
3790 /* 2nd part of handshake */
3791 if (!WriteN(r
, serversig
, RTMP_SIG_SIZE
))
3794 if (ReadN(r
, serversig
, RTMP_SIG_SIZE
) != RTMP_SIG_SIZE
)
3797 bMatch
= (memcmp(serversig
, clientsig
, RTMP_SIG_SIZE
) == 0);
3800 RTMP_Log(RTMP_LOGWARNING
, "%s, client signature does not match!", __FUNCTION__
);
3809 char serverbuf
[RTMP_SIG_SIZE
+ 1], *serversig
= serverbuf
+ 1;
3810 char clientsig
[RTMP_SIG_SIZE
];
3814 if (ReadN(r
, serverbuf
, 1) != 1) /* 0x03 or 0x06 */
3817 RTMP_Log(RTMP_LOGDEBUG
, "%s: Type Request : %02X", __FUNCTION__
, serverbuf
[0]);
3819 if (serverbuf
[0] != 3)
3821 RTMP_Log(RTMP_LOGERROR
, "%s: Type unknown: client sent %02X",
3822 __FUNCTION__
, serverbuf
[0]);
3826 uptime
= htonl(RTMP_GetTime());
3827 memcpy(serversig
, &uptime
, 4);
3829 memset(&serversig
[4], 0, 4);
3831 for (i
= 8; i
< RTMP_SIG_SIZE
; i
++)
3832 serversig
[i
] = 0xff;
3834 for (i
= 8; i
< RTMP_SIG_SIZE
; i
++)
3835 serversig
[i
] = (char)(rand() % 256);
3838 if (!WriteN(r
, serverbuf
, RTMP_SIG_SIZE
+ 1))
3841 if (ReadN(r
, clientsig
, RTMP_SIG_SIZE
) != RTMP_SIG_SIZE
)
3844 /* decode client response */
3846 memcpy(&uptime
, clientsig
, 4);
3847 uptime
= ntohl(uptime
);
3849 RTMP_Log(RTMP_LOGDEBUG
, "%s: Client Uptime : %d", __FUNCTION__
, uptime
);
3850 RTMP_Log(RTMP_LOGDEBUG
, "%s: Player Version: %d.%d.%d.%d", __FUNCTION__
,
3851 clientsig
[4], clientsig
[5], clientsig
[6], clientsig
[7]);
3853 /* 2nd part of handshake */
3854 if (!WriteN(r
, clientsig
, RTMP_SIG_SIZE
))
3857 if (ReadN(r
, clientsig
, RTMP_SIG_SIZE
) != RTMP_SIG_SIZE
)
3860 bMatch
= (memcmp(serversig
, clientsig
, RTMP_SIG_SIZE
) == 0);
3863 RTMP_Log(RTMP_LOGWARNING
, "%s, client signature does not match!", __FUNCTION__
);
3870 RTMP_SendChunk(RTMP
*r
, RTMPChunk
*chunk
)
3873 char hbuf
[RTMP_MAX_HEADER_SIZE
];
3875 RTMP_Log(RTMP_LOGDEBUG2
, "%s: fd=%d, size=%d", __FUNCTION__
, r
->m_sb
.sb_socket
,
3876 chunk
->c_chunkSize
);
3877 RTMP_LogHexString(RTMP_LOGDEBUG2
, (uint8_t *)chunk
->c_header
, chunk
->c_headerSize
);
3878 if (chunk
->c_chunkSize
)
3880 char *ptr
= chunk
->c_chunk
- chunk
->c_headerSize
;
3881 RTMP_LogHexString(RTMP_LOGDEBUG2
, (uint8_t *)chunk
->c_chunk
, chunk
->c_chunkSize
);
3882 /* save header bytes we're about to overwrite */
3883 memcpy(hbuf
, ptr
, chunk
->c_headerSize
);
3884 memcpy(ptr
, chunk
->c_header
, chunk
->c_headerSize
);
3885 wrote
= WriteN(r
, ptr
, chunk
->c_headerSize
+ chunk
->c_chunkSize
);
3886 memcpy(ptr
, hbuf
, chunk
->c_headerSize
);
3889 wrote
= WriteN(r
, chunk
->c_header
, chunk
->c_headerSize
);
3894 RTMP_SendPacket(RTMP
*r
, RTMPPacket
*packet
, int queue
)
3896 const RTMPPacket
*prevPacket
;
3900 char *header
, *hptr
, *hend
, hbuf
[RTMP_MAX_HEADER_SIZE
], c
;
3902 char *buffer
, *tbuf
= NULL
, *toff
= NULL
;
3906 if (packet
->m_nChannel
>= r
->m_channelsAllocatedOut
)
3908 int n
= packet
->m_nChannel
+ 10;
3909 RTMPPacket
**packets
= realloc(r
->m_vecChannelsOut
, sizeof(RTMPPacket
*) * n
);
3911 free(r
->m_vecChannelsOut
);
3912 r
->m_vecChannelsOut
= NULL
;
3913 r
->m_channelsAllocatedOut
= 0;
3916 r
->m_vecChannelsOut
= packets
;
3917 memset(r
->m_vecChannelsOut
+ r
->m_channelsAllocatedOut
, 0, sizeof(RTMPPacket
*) * (n
- r
->m_channelsAllocatedOut
));
3918 r
->m_channelsAllocatedOut
= n
;
3921 prevPacket
= r
->m_vecChannelsOut
[packet
->m_nChannel
];
3922 if (prevPacket
&& packet
->m_headerType
!= RTMP_PACKET_SIZE_LARGE
)
3924 /* compress a bit by using the prev packet's attributes */
3925 if (prevPacket
->m_nBodySize
== packet
->m_nBodySize
3926 && prevPacket
->m_packetType
== packet
->m_packetType
3927 && packet
->m_headerType
== RTMP_PACKET_SIZE_MEDIUM
)
3928 packet
->m_headerType
= RTMP_PACKET_SIZE_SMALL
;
3930 if (prevPacket
->m_nTimeStamp
== packet
->m_nTimeStamp
3931 && packet
->m_headerType
== RTMP_PACKET_SIZE_SMALL
)
3932 packet
->m_headerType
= RTMP_PACKET_SIZE_MINIMUM
;
3933 last
= prevPacket
->m_nTimeStamp
;
3936 if (packet
->m_headerType
> 3) /* sanity */
3938 RTMP_Log(RTMP_LOGERROR
, "sanity failed!! trying to send header of type: 0x%02x.",
3939 (unsigned char)packet
->m_headerType
);
3943 nSize
= packetSize
[packet
->m_headerType
];
3944 hSize
= nSize
; cSize
= 0;
3945 t
= packet
->m_nTimeStamp
- last
;
3949 header
= packet
->m_body
- nSize
;
3950 hend
= packet
->m_body
;
3955 hend
= hbuf
+ sizeof(hbuf
);
3958 if (packet
->m_nChannel
> 319)
3960 else if (packet
->m_nChannel
> 63)
3972 RTMP_Log(RTMP_LOGWARNING
, "Larger timestamp than 24-bit: 0x%x", t
);
3976 c
= packet
->m_headerType
<< 6;
3980 c
|= packet
->m_nChannel
;
3991 int tmp
= packet
->m_nChannel
- 64;
3992 *hptr
++ = tmp
& 0xff;
3999 hptr
= AMF_EncodeInt24(hptr
, hend
, t
> 0xffffff ? 0xffffff : t
);
4004 hptr
= AMF_EncodeInt24(hptr
, hend
, packet
->m_nBodySize
);
4005 *hptr
++ = packet
->m_packetType
;
4009 hptr
+= EncodeInt32LE(hptr
, packet
->m_nInfoField2
);
4012 hptr
= AMF_EncodeInt32(hptr
, hend
, t
);
4014 nSize
= packet
->m_nBodySize
;
4015 buffer
= packet
->m_body
;
4016 nChunkSize
= r
->m_outChunkSize
;
4018 RTMP_Log(RTMP_LOGDEBUG2
, "%s: fd=%d, size=%d", __FUNCTION__
, r
->m_sb
.sb_socket
,
4020 /* send all chunks in one HTTP request */
4021 if (r
->Link
.protocol
& RTMP_FEATURE_HTTP
)
4023 int chunks
= (nSize
+nChunkSize
-1) / nChunkSize
;
4026 tlen
= chunks
* (cSize
+ 1) + nSize
+ hSize
;
4027 tbuf
= malloc(tlen
);
4033 while (nSize
+ hSize
)
4037 if (nSize
< nChunkSize
)
4040 RTMP_LogHexString(RTMP_LOGDEBUG2
, (uint8_t *)header
, hSize
);
4041 RTMP_LogHexString(RTMP_LOGDEBUG2
, (uint8_t *)buffer
, nChunkSize
);
4044 memcpy(toff
, header
, nChunkSize
+ hSize
);
4045 toff
+= nChunkSize
+ hSize
;
4049 wrote
= WriteN(r
, header
, nChunkSize
+ hSize
);
4053 nSize
-= nChunkSize
;
4054 buffer
+= nChunkSize
;
4059 header
= buffer
- 1;
4071 *header
= (0xc0 | c
);
4074 int tmp
= packet
->m_nChannel
- 64;
4075 header
[1] = tmp
& 0xff;
4077 header
[2] = tmp
>> 8;
4081 char* extendedTimestamp
= header
+ 1 + cSize
;
4082 AMF_EncodeInt32(extendedTimestamp
, extendedTimestamp
+ 4, t
);
4088 int wrote
= WriteN(r
, tbuf
, toff
-tbuf
);
4095 /* we invoked a remote method */
4096 if (packet
->m_packetType
== RTMP_PACKET_TYPE_INVOKE
)
4100 ptr
= packet
->m_body
+ 1;
4101 AMF_DecodeString(ptr
, &method
);
4102 RTMP_Log(RTMP_LOGDEBUG
, "Invoking %s", method
.av_val
);
4103 /* keep it in call queue till result arrives */
4106 ptr
+= 3 + method
.av_len
;
4107 txn
= (int)AMF_DecodeNumber(ptr
);
4108 AV_queue(&r
->m_methodCalls
, &r
->m_numCalls
, &method
, txn
);
4112 if (!r
->m_vecChannelsOut
[packet
->m_nChannel
])
4113 r
->m_vecChannelsOut
[packet
->m_nChannel
] = malloc(sizeof(RTMPPacket
));
4114 memcpy(r
->m_vecChannelsOut
[packet
->m_nChannel
], packet
, sizeof(RTMPPacket
));
4121 return SHandShake(r
);
4127 CloseInternal(r
, 0);
4131 CloseInternal(RTMP
*r
, int reconnect
)
4135 if (RTMP_IsConnected(r
))
4137 if (r
->m_stream_id
> 0)
4141 if ((r
->Link
.protocol
& RTMP_FEATURE_WRITE
))
4143 SendDeleteStream(r
, i
);
4145 if (r
->m_clientID
.av_val
)
4147 HTTP_Post(r
, RTMPT_CLOSE
, "", 1);
4148 free(r
->m_clientID
.av_val
);
4149 r
->m_clientID
.av_val
= NULL
;
4150 r
->m_clientID
.av_len
= 0;
4152 RTMPSockBuf_Close(&r
->m_sb
);
4155 r
->m_stream_id
= -1;
4156 r
->m_sb
.sb_socket
= -1;
4157 r
->m_nBWCheckCounter
= 0;
4159 r
->m_nBytesInSent
= 0;
4161 if (r
->m_read
.flags
& RTMP_READ_HEADER
) {
4162 free(r
->m_read
.buf
);
4163 r
->m_read
.buf
= NULL
;
4165 r
->m_read
.dataType
= 0;
4166 r
->m_read
.flags
= 0;
4167 r
->m_read
.status
= 0;
4168 r
->m_read
.nResumeTS
= 0;
4169 r
->m_read
.nIgnoredFrameCounter
= 0;
4170 r
->m_read
.nIgnoredFlvFrameCounter
= 0;
4172 r
->m_write
.m_nBytesRead
= 0;
4173 RTMPPacket_Free(&r
->m_write
);
4175 for (i
= 0; i
< r
->m_channelsAllocatedIn
; i
++)
4177 if (r
->m_vecChannelsIn
[i
])
4179 RTMPPacket_Free(r
->m_vecChannelsIn
[i
]);
4180 free(r
->m_vecChannelsIn
[i
]);
4181 r
->m_vecChannelsIn
[i
] = NULL
;
4184 free(r
->m_vecChannelsIn
);
4185 r
->m_vecChannelsIn
= NULL
;
4186 free(r
->m_channelTimestamp
);
4187 r
->m_channelTimestamp
= NULL
;
4188 r
->m_channelsAllocatedIn
= 0;
4189 for (i
= 0; i
< r
->m_channelsAllocatedOut
; i
++)
4191 if (r
->m_vecChannelsOut
[i
])
4193 free(r
->m_vecChannelsOut
[i
]);
4194 r
->m_vecChannelsOut
[i
] = NULL
;
4197 free(r
->m_vecChannelsOut
);
4198 r
->m_vecChannelsOut
= NULL
;
4199 r
->m_channelsAllocatedOut
= 0;
4200 AV_clear(r
->m_methodCalls
, r
->m_numCalls
);
4201 r
->m_methodCalls
= NULL
;
4203 r
->m_numInvokes
= 0;
4205 r
->m_bPlaying
= FALSE
;
4206 r
->m_sb
.sb_size
= 0;
4208 r
->m_msgCounter
= 0;
4212 if (r
->Link
.lFlags
& RTMP_LF_FTCU
&& !reconnect
)
4214 free(r
->Link
.tcUrl
.av_val
);
4215 r
->Link
.tcUrl
.av_val
= NULL
;
4216 r
->Link
.lFlags
^= RTMP_LF_FTCU
;
4218 if (r
->Link
.lFlags
& RTMP_LF_FAPU
&& !reconnect
)
4220 free(r
->Link
.app
.av_val
);
4221 r
->Link
.app
.av_val
= NULL
;
4222 r
->Link
.lFlags
^= RTMP_LF_FAPU
;
4227 free(r
->Link
.playpath0
.av_val
);
4228 r
->Link
.playpath0
.av_val
= NULL
;
4233 MDH_free(r
->Link
.dh
);
4236 if (r
->Link
.rc4keyIn
)
4238 RC4_free(r
->Link
.rc4keyIn
);
4239 r
->Link
.rc4keyIn
= NULL
;
4241 if (r
->Link
.rc4keyOut
)
4243 RC4_free(r
->Link
.rc4keyOut
);
4244 r
->Link
.rc4keyOut
= NULL
;
4250 RTMPSockBuf_Fill(RTMPSockBuf
*sb
)
4255 sb
->sb_start
= sb
->sb_buf
;
4259 nBytes
= sizeof(sb
->sb_buf
) - 1 - sb
->sb_size
- (sb
->sb_start
- sb
->sb_buf
);
4260 #if defined(CRYPTO) && !defined(NO_SSL)
4263 nBytes
= TLS_read(sb
->sb_ssl
, sb
->sb_start
+ sb
->sb_size
, nBytes
);
4268 nBytes
= recv(sb
->sb_socket
, sb
->sb_start
+ sb
->sb_size
, nBytes
, 0);
4272 sb
->sb_size
+= nBytes
;
4276 int sockerr
= GetSockError();
4277 RTMP_Log(RTMP_LOGDEBUG
, "%s, recv returned %d. GetSockError(): %d (%s)",
4278 __FUNCTION__
, nBytes
, sockerr
, strerror(sockerr
));
4279 if (sockerr
== EINTR
&& !RTMP_ctrlC
)
4282 if (sockerr
== EWOULDBLOCK
|| sockerr
== EAGAIN
)
4284 sb
->sb_timedout
= TRUE
;
4295 RTMPSockBuf_Send(RTMPSockBuf
*sb
, const char *buf
, int len
)
4300 fwrite(buf
, 1, len
, netstackdump
);
4303 #if defined(CRYPTO) && !defined(NO_SSL)
4306 rc
= TLS_write(sb
->sb_ssl
, buf
, len
);
4311 rc
= send(sb
->sb_socket
, buf
, len
, 0);
4317 RTMPSockBuf_Close(RTMPSockBuf
*sb
)
4319 #if defined(CRYPTO) && !defined(NO_SSL)
4322 TLS_shutdown(sb
->sb_ssl
);
4323 TLS_close(sb
->sb_ssl
);
4327 if (sb
->sb_socket
!= -1)
4328 return closesocket(sb
->sb_socket
);
4332 #define HEX2BIN(a) (((a)&0x40)?((a)&0xf)+9:((a)&0xf))
4335 DecodeTEA(AVal
*key
, AVal
*text
)
4337 uint32_t *v
, k
[4] = { 0 }, u
;
4338 uint32_t z
, y
, sum
= 0, e
, DELTA
= 0x9e3779b9;
4341 unsigned char *ptr
, *out
;
4343 /* prep key: pack 1st 16 chars into 4 LittleEndian ints */
4344 ptr
= (unsigned char *)key
->av_val
;
4348 p
= key
->av_len
> 16 ? 16 : key
->av_len
;
4349 for (i
= 0; i
< p
; i
++)
4351 u
|= ptr
[i
] << (n
* 8);
4363 /* any trailing chars */
4367 /* prep text: hex2bin, multiples of 4 */
4368 n
= (text
->av_len
+ 7) / 8;
4369 out
= malloc(n
* 8);
4370 ptr
= (unsigned char *)text
->av_val
;
4371 v
= (uint32_t *) out
;
4372 for (i
= 0; i
< n
; i
++)
4374 u
= (HEX2BIN(ptr
[0]) << 4) + HEX2BIN(ptr
[1]);
4375 u
|= ((HEX2BIN(ptr
[2]) << 4) + HEX2BIN(ptr
[3])) << 8;
4376 u
|= ((HEX2BIN(ptr
[4]) << 4) + HEX2BIN(ptr
[5])) << 16;
4377 u
|= ((HEX2BIN(ptr
[6]) << 4) + HEX2BIN(ptr
[7])) << 24;
4381 v
= (uint32_t *) out
;
4383 /* http://www.movable-type.co.uk/scripts/tea-block.html */
4384 #define MX (((z>>5)^(y<<2)) + ((y>>3)^(z<<4))) ^ ((sum^y) + (k[(p&3)^e]^z));
4392 for (p
= n
- 1; p
> 0; p
--)
4393 z
= v
[p
- 1], y
= v
[p
] -= MX
;
4400 memcpy(text
->av_val
, out
, text
->av_len
);
4405 HTTP_Post(RTMP
*r
, RTMPTCmd cmd
, const char *buf
, int len
)
4408 int hlen
= snprintf(hbuf
, sizeof(hbuf
), "POST /%s%s/%d HTTP/1.1\r\n"
4411 "User-Agent: Shockwave Flash\r\n"
4412 "Connection: Keep-Alive\r\n"
4413 "Cache-Control: no-cache\r\n"
4414 "Content-type: application/x-fcs\r\n"
4415 "Content-length: %d\r\n\r\n", RTMPT_cmds
[cmd
],
4416 r
->m_clientID
.av_val
? r
->m_clientID
.av_val
: "",
4417 r
->m_msgCounter
, r
->Link
.hostname
.av_len
, r
->Link
.hostname
.av_val
,
4419 RTMPSockBuf_Send(&r
->m_sb
, hbuf
, hlen
);
4420 hlen
= RTMPSockBuf_Send(&r
->m_sb
, buf
, len
);
4427 HTTP_read(RTMP
*r
, int fill
)
4434 RTMPSockBuf_Fill(&r
->m_sb
);
4435 if (r
->m_sb
.sb_size
< 13) {
4440 if (strncmp(r
->m_sb
.sb_start
, "HTTP/1.1 200 ", 13))
4442 r
->m_sb
.sb_start
[r
->m_sb
.sb_size
] = '\0';
4443 if (!strstr(r
->m_sb
.sb_start
, "\r\n\r\n")) {
4449 ptr
= r
->m_sb
.sb_start
+ sizeof("HTTP/1.1 200");
4450 while ((ptr
= strstr(ptr
, "Content-"))) {
4451 if (!strncasecmp(ptr
+8, "length:", 7)) break;
4456 hlen
= atoi(ptr
+16);
4457 ptr
= strstr(ptr
+16, "\r\n\r\n");
4461 if (ptr
+ (r
->m_clientID
.av_val
? 1 : hlen
) > r
->m_sb
.sb_start
+ r
->m_sb
.sb_size
)
4467 r
->m_sb
.sb_size
-= ptr
- r
->m_sb
.sb_start
;
4468 r
->m_sb
.sb_start
= ptr
;
4471 if (!r
->m_clientID
.av_val
)
4473 r
->m_clientID
.av_len
= hlen
;
4474 r
->m_clientID
.av_val
= malloc(hlen
+1);
4475 if (!r
->m_clientID
.av_val
)
4477 r
->m_clientID
.av_val
[0] = '/';
4478 memcpy(r
->m_clientID
.av_val
+1, ptr
, hlen
-1);
4479 r
->m_clientID
.av_val
[hlen
] = 0;
4480 r
->m_sb
.sb_size
= 0;
4484 r
->m_polling
= *ptr
++;
4485 r
->m_resplen
= hlen
- 1;
4492 #define MAX_IGNORED_FRAMES 50
4494 /* Read from the stream until we get a media packet.
4495 * Returns -3 if Play.Close/Stop, -2 if fatal error, -1 if no more media
4496 * packets, 0 if ignorable error, >0 if there is a media packet
4499 Read_1_Packet(RTMP
*r
, char *buf
, unsigned int buflen
)
4501 uint32_t prevTagSize
= 0;
4502 int rtnGetNextMediaPacket
= 0, ret
= RTMP_READ_EOF
;
4503 RTMPPacket packet
= { 0 };
4507 uint32_t nTimeStamp
= 0;
4510 rtnGetNextMediaPacket
= RTMP_GetNextMediaPacket(r
, &packet
);
4511 while (rtnGetNextMediaPacket
)
4513 char *packetBody
= packet
.m_body
;
4514 unsigned int nPacketLen
= packet
.m_nBodySize
;
4516 /* Return RTMP_READ_COMPLETE if this was completed nicely with
4517 * invoke message Play.Stop or Play.Complete
4519 if (rtnGetNextMediaPacket
== 2)
4521 RTMP_Log(RTMP_LOGDEBUG
,
4522 "Got Play.Complete or Play.Stop from server. "
4523 "Assuming stream is complete");
4524 ret
= RTMP_READ_COMPLETE
;
4528 r
->m_read
.dataType
|= (((packet
.m_packetType
== RTMP_PACKET_TYPE_AUDIO
) << 2) |
4529 (packet
.m_packetType
== RTMP_PACKET_TYPE_VIDEO
));
4531 if (packet
.m_packetType
== RTMP_PACKET_TYPE_VIDEO
&& nPacketLen
<= 5)
4533 RTMP_Log(RTMP_LOGDEBUG
, "ignoring too small video packet: size: %d",
4535 ret
= RTMP_READ_IGNORE
;
4538 if (packet
.m_packetType
== RTMP_PACKET_TYPE_AUDIO
&& nPacketLen
<= 1)
4540 RTMP_Log(RTMP_LOGDEBUG
, "ignoring too small audio packet: size: %d",
4542 ret
= RTMP_READ_IGNORE
;
4546 if (r
->m_read
.flags
& RTMP_READ_SEEKING
)
4548 ret
= RTMP_READ_IGNORE
;
4552 RTMP_Log(RTMP_LOGDEBUG
, "type: %02X, size: %d, TS: %d ms, abs TS: %d",
4553 packet
.m_packetType
, nPacketLen
, packet
.m_nTimeStamp
,
4554 packet
.m_hasAbsTimestamp
);
4555 if (packet
.m_packetType
== RTMP_PACKET_TYPE_VIDEO
)
4556 RTMP_Log(RTMP_LOGDEBUG
, "frametype: %02X", (*packetBody
& 0xf0));
4559 if (r
->m_read
.flags
& RTMP_READ_RESUME
)
4561 /* check the header if we get one */
4562 if (packet
.m_nTimeStamp
== 0)
4564 if (r
->m_read
.nMetaHeaderSize
> 0
4565 && packet
.m_packetType
== RTMP_PACKET_TYPE_INFO
)
4569 AMF_Decode(&metaObj
, packetBody
, nPacketLen
, FALSE
);
4573 AMFProp_GetString(AMF_GetProp(&metaObj
, NULL
, 0),
4576 if (AVMATCH(&metastring
, &av_onMetaData
))
4579 if ((r
->m_read
.nMetaHeaderSize
!= nPacketLen
) ||
4581 (r
->m_read
.metaHeader
, packetBody
,
4582 r
->m_read
.nMetaHeaderSize
) != 0))
4584 ret
= RTMP_READ_ERROR
;
4587 AMF_Reset(&metaObj
);
4588 if (ret
== RTMP_READ_ERROR
)
4593 /* check first keyframe to make sure we got the right position
4594 * in the stream! (the first non ignored frame)
4596 if (r
->m_read
.nInitialFrameSize
> 0)
4598 /* video or audio data */
4599 if (packet
.m_packetType
== r
->m_read
.initialFrameType
4600 && r
->m_read
.nInitialFrameSize
== nPacketLen
)
4602 /* we don't compare the sizes since the packet can
4603 * contain several FLV packets, just make sure the
4604 * first frame is our keyframe (which we are going
4608 (r
->m_read
.initialFrame
, packetBody
,
4609 r
->m_read
.nInitialFrameSize
) == 0)
4611 RTMP_Log(RTMP_LOGDEBUG
, "Checked keyframe successfully!");
4612 r
->m_read
.flags
|= RTMP_READ_GOTKF
;
4613 /* ignore it! (what about audio data after it? it is
4614 * handled by ignoring all 0ms frames, see below)
4616 ret
= RTMP_READ_IGNORE
;
4621 /* hande FLV streams, even though the server resends the
4622 * keyframe as an extra video packet it is also included
4623 * in the first FLV stream chunk and we have to compare
4624 * it and filter it out !!
4626 if (packet
.m_packetType
== RTMP_PACKET_TYPE_FLASH_VIDEO
)
4628 /* basically we have to find the keyframe with the
4629 * correct TS being nResumeTS
4631 unsigned int pos
= 0;
4634 while (pos
+ 11 < nPacketLen
)
4636 /* size without header (11) and prevTagSize (4) */
4638 AMF_DecodeInt24(packetBody
+ pos
+ 1);
4639 ts
= AMF_DecodeInt24(packetBody
+ pos
+ 4);
4640 ts
|= (packetBody
[pos
+ 7] << 24);
4643 RTMP_Log(RTMP_LOGDEBUG
,
4644 "keyframe search: FLV Packet: type %02X, dataSize: %d, timeStamp: %d ms",
4645 packetBody
[pos
], dataSize
, ts
);
4647 /* ok, is it a keyframe?:
4648 * well doesn't work for audio!
4650 if (packetBody
[pos
/*6928, test 0 */ ] ==
4651 r
->m_read
.initialFrameType
4652 /* && (packetBody[11]&0xf0) == 0x10 */ )
4654 if (ts
== r
->m_read
.nResumeTS
)
4656 RTMP_Log(RTMP_LOGDEBUG
,
4657 "Found keyframe with resume-keyframe timestamp!");
4658 if (r
->m_read
.nInitialFrameSize
!= dataSize
4659 || memcmp(r
->m_read
.initialFrame
,
4660 packetBody
+ pos
+ 11,
4662 nInitialFrameSize
) != 0)
4664 RTMP_Log(RTMP_LOGERROR
,
4665 "FLV Stream: Keyframe doesn't match!");
4666 ret
= RTMP_READ_ERROR
;
4669 r
->m_read
.flags
|= RTMP_READ_GOTFLVK
;
4671 /* skip this packet?
4672 * check whether skippable:
4674 if (pos
+ 11 + dataSize
+ 4 > nPacketLen
)
4676 RTMP_Log(RTMP_LOGWARNING
,
4677 "Non skipable packet since it doesn't end with chunk, stream corrupt!");
4678 ret
= RTMP_READ_ERROR
;
4681 packetBody
+= (pos
+ 11 + dataSize
+ 4);
4682 nPacketLen
-= (pos
+ 11 + dataSize
+ 4);
4684 goto stopKeyframeSearch
;
4687 else if (r
->m_read
.nResumeTS
< ts
)
4689 /* the timestamp ts will only increase with
4690 * further packets, wait for seek
4692 goto stopKeyframeSearch
;
4695 pos
+= (11 + dataSize
+ 4);
4697 if (ts
< r
->m_read
.nResumeTS
)
4699 RTMP_Log(RTMP_LOGERROR
,
4700 "First packet does not contain keyframe, all "
4701 "timestamps are smaller than the keyframe "
4702 "timestamp; probably the resume seek failed?");
4706 if (!(r
->m_read
.flags
& RTMP_READ_GOTFLVK
))
4708 RTMP_Log(RTMP_LOGERROR
,
4709 "Couldn't find the seeked keyframe in this chunk!");
4710 ret
= RTMP_READ_IGNORE
;
4717 if (packet
.m_nTimeStamp
> 0
4718 && (r
->m_read
.flags
& (RTMP_READ_GOTKF
|RTMP_READ_GOTFLVK
)))
4720 /* another problem is that the server can actually change from
4721 * 09/08 video/audio packets to an FLV stream or vice versa and
4722 * our keyframe check will prevent us from going along with the
4723 * new stream if we resumed.
4725 * in this case set the 'found keyframe' variables to true.
4726 * We assume that if we found one keyframe somewhere and were
4727 * already beyond TS > 0 we have written data to the output
4728 * which means we can accept all forthcoming data including the
4729 * change between 08/09 <-> FLV packets
4731 r
->m_read
.flags
|= (RTMP_READ_GOTKF
|RTMP_READ_GOTFLVK
);
4734 /* skip till we find our keyframe
4735 * (seeking might put us somewhere before it)
4737 if (!(r
->m_read
.flags
& RTMP_READ_GOTKF
) &&
4738 packet
.m_packetType
!= RTMP_PACKET_TYPE_FLASH_VIDEO
)
4740 RTMP_Log(RTMP_LOGWARNING
,
4741 "Stream does not start with requested frame, ignoring data... ");
4742 r
->m_read
.nIgnoredFrameCounter
++;
4743 if (r
->m_read
.nIgnoredFrameCounter
> MAX_IGNORED_FRAMES
)
4744 ret
= RTMP_READ_ERROR
; /* fatal error, couldn't continue stream */
4746 ret
= RTMP_READ_IGNORE
;
4749 /* ok, do the same for FLV streams */
4750 if (!(r
->m_read
.flags
& RTMP_READ_GOTFLVK
) &&
4751 packet
.m_packetType
== RTMP_PACKET_TYPE_FLASH_VIDEO
)
4753 RTMP_Log(RTMP_LOGWARNING
,
4754 "Stream does not start with requested FLV frame, ignoring data... ");
4755 r
->m_read
.nIgnoredFlvFrameCounter
++;
4756 if (r
->m_read
.nIgnoredFlvFrameCounter
> MAX_IGNORED_FRAMES
)
4757 ret
= RTMP_READ_ERROR
;
4759 ret
= RTMP_READ_IGNORE
;
4763 /* we have to ignore the 0ms frames since these are the first
4764 * keyframes; we've got these so don't mess around with multiple
4765 * copies sent by the server to us! (if the keyframe is found at a
4766 * later position there is only one copy and it will be ignored by
4767 * the preceding if clause)
4769 if (!(r
->m_read
.flags
& RTMP_READ_NO_IGNORE
) &&
4770 packet
.m_packetType
!= RTMP_PACKET_TYPE_FLASH_VIDEO
)
4772 /* exclude type RTMP_PACKET_TYPE_FLASH_VIDEO since it can
4773 * contain several FLV packets
4775 if (packet
.m_nTimeStamp
== 0)
4777 ret
= RTMP_READ_IGNORE
;
4782 /* stop ignoring packets */
4783 r
->m_read
.flags
|= RTMP_READ_NO_IGNORE
;
4788 /* calculate packet size and allocate slop buffer if necessary */
4790 ((packet
.m_packetType
== RTMP_PACKET_TYPE_AUDIO
4791 || packet
.m_packetType
== RTMP_PACKET_TYPE_VIDEO
4792 || packet
.m_packetType
== RTMP_PACKET_TYPE_INFO
) ? 11 : 0) +
4793 (packet
.m_packetType
!= RTMP_PACKET_TYPE_FLASH_VIDEO
? 4 : 0);
4795 if (size
+ 4 > buflen
)
4797 /* the extra 4 is for the case of an FLV stream without a last
4798 * prevTagSize (we need extra 4 bytes to append it) */
4799 r
->m_read
.buf
= malloc(size
+ 4);
4800 if (r
->m_read
.buf
== 0)
4802 RTMP_Log(RTMP_LOGERROR
, "Couldn't allocate memory!");
4803 ret
= RTMP_READ_ERROR
; /* fatal error */
4807 ptr
= r
->m_read
.buf
;
4813 pend
= ptr
+ size
+ 4;
4815 /* use to return timestamp of last processed packet */
4817 /* audio (0x08), video (0x09) or metadata (0x12) packets :
4818 * construct 11 byte header then add rtmp packet's data */
4819 if (packet
.m_packetType
== RTMP_PACKET_TYPE_AUDIO
4820 || packet
.m_packetType
== RTMP_PACKET_TYPE_VIDEO
4821 || packet
.m_packetType
== RTMP_PACKET_TYPE_INFO
)
4823 nTimeStamp
= r
->m_read
.nResumeTS
+ packet
.m_nTimeStamp
;
4824 prevTagSize
= 11 + nPacketLen
;
4826 *ptr
= packet
.m_packetType
;
4828 ptr
= AMF_EncodeInt24(ptr
, pend
, nPacketLen
);
4831 if(packet
.m_packetType
== RTMP_PACKET_TYPE_VIDEO
) {
4834 if((packetBody
[0] & 0x0f) == 7) { /* CodecId = H264 */
4835 uint8_t packetType
= *(packetBody
+1);
4837 uint32_t ts
= AMF_DecodeInt24(packetBody
+2); /* composition time */
4838 int32_t cts
= (ts
+0xff800000)^0xff800000;
4839 RTMP_Log(RTMP_LOGDEBUG
, "cts : %d\n", cts
);
4842 /* get rid of the composition time */
4843 CRTMP::EncodeInt24(packetBody
+2, 0);
4845 RTMP_Log(RTMP_LOGDEBUG
, "VIDEO: nTimeStamp: 0x%08X (%d)\n", nTimeStamp
, nTimeStamp
);
4849 ptr
= AMF_EncodeInt24(ptr
, pend
, nTimeStamp
);
4850 *ptr
= (char)((nTimeStamp
& 0xFF000000) >> 24);
4854 ptr
= AMF_EncodeInt24(ptr
, pend
, 0);
4857 memcpy(ptr
, packetBody
, nPacketLen
);
4860 /* correct tagSize and obtain timestamp if we have an FLV stream */
4861 if (packet
.m_packetType
== RTMP_PACKET_TYPE_FLASH_VIDEO
)
4863 unsigned int pos
= 0;
4866 /* grab first timestamp and see if it needs fixing */
4867 nTimeStamp
= AMF_DecodeInt24(packetBody
+ 4);
4868 nTimeStamp
|= (packetBody
[7] << 24);
4869 delta
= packet
.m_nTimeStamp
- nTimeStamp
+ r
->m_read
.nResumeTS
;
4871 while (pos
+ 11 < nPacketLen
)
4873 /* size without header (11) and without prevTagSize (4) */
4874 uint32_t dataSize
= AMF_DecodeInt24(packetBody
+ pos
+ 1);
4875 nTimeStamp
= AMF_DecodeInt24(packetBody
+ pos
+ 4);
4876 nTimeStamp
|= (packetBody
[pos
+ 7] << 24);
4880 nTimeStamp
+= delta
;
4881 AMF_EncodeInt24(ptr
+pos
+4, pend
, nTimeStamp
);
4882 ptr
[pos
+7] = nTimeStamp
>>24;
4886 r
->m_read
.dataType
|= (((*(packetBody
+ pos
) == 0x08) << 2) |
4887 (*(packetBody
+ pos
) == 0x09));
4889 if (pos
+ 11 + dataSize
+ 4 > nPacketLen
)
4891 if (pos
+ 11 + dataSize
> nPacketLen
)
4893 RTMP_Log(RTMP_LOGERROR
,
4894 "Wrong data size (%u), stream corrupted, aborting!",
4896 ret
= RTMP_READ_ERROR
;
4899 RTMP_Log(RTMP_LOGWARNING
, "No tagSize found, appending!");
4901 /* we have to append a last tagSize! */
4902 prevTagSize
= dataSize
+ 11;
4903 AMF_EncodeInt32(ptr
+ pos
+ 11 + dataSize
, pend
,
4911 AMF_DecodeInt32(packetBody
+ pos
+ 11 + dataSize
);
4914 RTMP_Log(RTMP_LOGDEBUG
,
4915 "FLV Packet: type %02X, dataSize: %lu, tagSize: %lu, timeStamp: %lu ms",
4916 (unsigned char)packetBody
[pos
], dataSize
, prevTagSize
,
4920 if (prevTagSize
!= (dataSize
+ 11))
4923 RTMP_Log(RTMP_LOGWARNING
,
4924 "Tag and data size are not consitent, writing tag size according to dataSize+11: %d",
4928 prevTagSize
= dataSize
+ 11;
4929 AMF_EncodeInt32(ptr
+ pos
+ 11 + dataSize
, pend
,
4934 pos
+= prevTagSize
+ 4; /*(11+dataSize+4); */
4939 if (packet
.m_packetType
!= RTMP_PACKET_TYPE_FLASH_VIDEO
)
4941 /* FLV tag packets contain their own prevTagSize */
4942 AMF_EncodeInt32(ptr
, pend
, prevTagSize
);
4945 /* In non-live this nTimeStamp can contain an absolute TS.
4946 * Update ext timestamp with this absolute offset in non-live mode
4947 * otherwise report the relative one
4949 /* RTMP_Log(RTMP_LOGDEBUG, "type: %02X, size: %d, pktTS: %dms, TS: %dms, bLiveStream: %d", packet.m_packetType, nPacketLen, packet.m_nTimeStamp, nTimeStamp, r->Link.lFlags & RTMP_LF_LIVE); */
4950 r
->m_read
.timestamp
= (r
->Link
.lFlags
& RTMP_LF_LIVE
) ? packet
.m_nTimeStamp
: nTimeStamp
;
4956 if (rtnGetNextMediaPacket
)
4957 RTMPPacket_Free(&packet
);
4961 len
= ret
> buflen
? buflen
: ret
;
4962 memcpy(buf
, r
->m_read
.buf
, len
);
4963 r
->m_read
.bufpos
= r
->m_read
.buf
+ len
;
4964 r
->m_read
.buflen
= ret
- len
;
4969 static const char flvHeader
[] = { 'F', 'L', 'V', 0x01,
4970 0x00, /* 0x04 == audio, 0x01 == video */
4971 0x00, 0x00, 0x00, 0x09,
4972 0x00, 0x00, 0x00, 0x00
4975 #define HEADERBUF (128*1024)
4977 RTMP_Read(RTMP
*r
, char *buf
, int size
)
4979 int nRead
= 0, total
= 0;
4981 /* can't continue */
4983 switch (r
->m_read
.status
) {
4985 case RTMP_READ_COMPLETE
:
4987 case RTMP_READ_ERROR
: /* corrupted stream, resume failed */
4988 SetSockError(EINVAL
);
4994 /* first time thru */
4995 if (!(r
->m_read
.flags
& RTMP_READ_HEADER
))
4997 if (!(r
->m_read
.flags
& RTMP_READ_RESUME
))
4999 char *mybuf
= malloc(HEADERBUF
), *end
= mybuf
+ HEADERBUF
;
5001 r
->m_read
.buf
= mybuf
;
5002 r
->m_read
.buflen
= HEADERBUF
;
5004 memcpy(mybuf
, flvHeader
, sizeof(flvHeader
));
5005 r
->m_read
.buf
+= sizeof(flvHeader
);
5006 r
->m_read
.buflen
-= sizeof(flvHeader
);
5007 cnt
+= sizeof(flvHeader
);
5009 while (r
->m_read
.timestamp
== 0)
5011 nRead
= Read_1_Packet(r
, r
->m_read
.buf
, r
->m_read
.buflen
);
5015 r
->m_read
.buf
= NULL
;
5016 r
->m_read
.buflen
= 0;
5017 r
->m_read
.status
= nRead
;
5020 /* buffer overflow, fix buffer and give up */
5021 if (r
->m_read
.buf
< mybuf
|| r
->m_read
.buf
> end
) {
5022 mybuf
= realloc(mybuf
, cnt
+ nRead
);
5023 memcpy(mybuf
+cnt
, r
->m_read
.buf
, nRead
);
5024 free(r
->m_read
.buf
);
5025 r
->m_read
.buf
= mybuf
+cnt
+nRead
;
5029 r
->m_read
.buf
+= nRead
;
5030 r
->m_read
.buflen
-= nRead
;
5031 if (r
->m_read
.dataType
== 5)
5034 mybuf
[4] = r
->m_read
.dataType
;
5035 r
->m_read
.buflen
= r
->m_read
.buf
- mybuf
;
5036 r
->m_read
.buf
= mybuf
;
5037 r
->m_read
.bufpos
= mybuf
;
5039 r
->m_read
.flags
|= RTMP_READ_HEADER
;
5042 if ((r
->m_read
.flags
& RTMP_READ_SEEKING
) && r
->m_read
.buf
)
5044 /* drop whatever's here */
5045 free(r
->m_read
.buf
);
5046 r
->m_read
.buf
= NULL
;
5047 r
->m_read
.bufpos
= NULL
;
5048 r
->m_read
.buflen
= 0;
5051 /* If there's leftover data buffered, use it up */
5054 nRead
= r
->m_read
.buflen
;
5057 memcpy(buf
, r
->m_read
.bufpos
, nRead
);
5058 r
->m_read
.buflen
-= nRead
;
5059 if (!r
->m_read
.buflen
)
5061 free(r
->m_read
.buf
);
5062 r
->m_read
.buf
= NULL
;
5063 r
->m_read
.bufpos
= NULL
;
5067 r
->m_read
.bufpos
+= nRead
;
5074 while (size
> 0 && (nRead
= Read_1_Packet(r
, buf
, size
)) >= 0)
5076 if (!nRead
) continue;
5083 r
->m_read
.status
= nRead
;
5090 static const AVal av_setDataFrame
= AVC("@setDataFrame");
5093 RTMP_Write(RTMP
*r
, const char *buf
, int size
)
5095 RTMPPacket
*pkt
= &r
->m_write
;
5097 int s2
= size
, ret
, num
;
5099 pkt
->m_nChannel
= 0x04; /* source channel */
5100 pkt
->m_nInfoField2
= r
->m_stream_id
;
5104 if (!pkt
->m_nBytesRead
)
5107 /* FLV pkt too small */
5111 if (buf
[0] == 'F' && buf
[1] == 'L' && buf
[2] == 'V')
5117 pkt
->m_packetType
= *buf
++;
5118 pkt
->m_nBodySize
= AMF_DecodeInt24(buf
);
5120 pkt
->m_nTimeStamp
= AMF_DecodeInt24(buf
);
5122 pkt
->m_nTimeStamp
|= *buf
++ << 24;
5126 if (((pkt
->m_packetType
== RTMP_PACKET_TYPE_AUDIO
5127 || pkt
->m_packetType
== RTMP_PACKET_TYPE_VIDEO
) &&
5128 !pkt
->m_nTimeStamp
) || pkt
->m_packetType
== RTMP_PACKET_TYPE_INFO
)
5130 pkt
->m_headerType
= RTMP_PACKET_SIZE_LARGE
;
5131 if (pkt
->m_packetType
== RTMP_PACKET_TYPE_INFO
)
5132 pkt
->m_nBodySize
+= 16;
5136 pkt
->m_headerType
= RTMP_PACKET_SIZE_MEDIUM
;
5139 if (!RTMPPacket_Alloc(pkt
, pkt
->m_nBodySize
))
5141 RTMP_Log(RTMP_LOGDEBUG
, "%s, failed to allocate packet", __FUNCTION__
);
5145 pend
= enc
+ pkt
->m_nBodySize
;
5146 if (pkt
->m_packetType
== RTMP_PACKET_TYPE_INFO
)
5148 enc
= AMF_EncodeString(enc
, pend
, &av_setDataFrame
);
5149 pkt
->m_nBytesRead
= enc
- pkt
->m_body
;
5154 enc
= pkt
->m_body
+ pkt
->m_nBytesRead
;
5156 num
= pkt
->m_nBodySize
- pkt
->m_nBytesRead
;
5159 memcpy(enc
, buf
, num
);
5160 pkt
->m_nBytesRead
+= num
;
5163 if (pkt
->m_nBytesRead
== pkt
->m_nBodySize
)
5165 ret
= RTMP_SendPacket(r
, pkt
, FALSE
);
5166 RTMPPacket_Free(pkt
);
5167 pkt
->m_nBytesRead
= 0;