paste.org.ru Wed Nov  5 23:34:38 2014 : Anonymous : cpp : 115714 wide : parent [ 11 years ]
cookies:
name:

scheme:

custom css:


tools:
custom css sample
paste bash script
more coming soon
or not soon...
last:

- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- kek
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous
- Anonymous

  1. /*
  2. * Copyright (C) 2005-2008 Team XBMC
  3. * http://www.xbmc.org
  4. * Copyright (C) 2008-2009 Andrej Stepanchuk
  5. * Copyright (C) 2009-2010 Howard Chu
  6. *
  7. * This file is part of librtmp.
  8. *
  9. * librtmp is free software; you can redistribute it and/or modify
  10. * it under the terms of the GNU Lesser General Public License as
  11. * published by the Free Software Foundation; either version 2.1,
  12. * or (at your option) any later version.
  13. *
  14. * librtmp is distributed in the hope that it will be useful,
  15. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  16. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  17. * GNU General Public License for more details.
  18. *
  19. * You should have received a copy of the GNU Lesser General Public License
  20. * along with librtmp see the file COPYING. If not, write to
  21. * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
  22. * Boston, MA 02110-1301, USA.
  23. * http://www.gnu.org/copyleft/lgpl.html
  24. */
  25. #include <stdint.h>
  26. #include <stdlib.h>
  27. #include <string.h>
  28. #include <assert.h>
  29. #include <stdio.h>
  30. #include "rtmp_sys.h"
  31. #include "log.h"
  32. #ifdef CRYPTO
  33. #ifdef USE_POLARSSL
  34. #include <polarssl/havege.h>
  35. #elif defined(USE_GNUTLS)
  36. #include <gnutls/gnutls.h>
  37. #else /* USE_OPENSSL */
  38. #include <openssl/ssl.h>
  39. #include <openssl/rc4.h>
  40. #endif
  41. TLS_CTX RTMP_TLS_ctx;
  42. #endif
  43. #define RTMP_SIG_SIZE 1536
  44. #define RTMP_LARGE_HEADER_SIZE 12
  45. static const int packetSize[] = { 12, 8, 4, 1 };
  46. int RTMP_ctrlC;
  47. const char RTMPProtocolStrings[][7] = {
  48. "RTMP",
  49. "RTMPT",
  50. "RTMPE",
  51. "RTMPTE",
  52. "RTMPS",
  53. "RTMPTS",
  54. "",
  55. "",
  56. "RTMFP"
  57. };
  58. const char RTMPProtocolStringsLower[][7] = {
  59. "rtmp",
  60. "rtmpt",
  61. "rtmpe",
  62. "rtmpte",
  63. "rtmps",
  64. "rtmpts",
  65. "",
  66. "",
  67. "rtmfp"
  68. };
  69. static const char *RTMPT_cmds[] = {
  70. "open",
  71. "send",
  72. "idle",
  73. "close"
  74. };
  75. typedef enum {
  76. RTMPT_OPEN=0, RTMPT_SEND, RTMPT_IDLE, RTMPT_CLOSE
  77. } RTMPTCmd;
  78. static int DumpMetaData(AMFObject *obj);
  79. static int HandShake(RTMP *r, int FP9HandShake);
  80. static int SocksNegotiate(RTMP *r);
  81. static int SendConnectPacket(RTMP *r, RTMPPacket *cp);
  82. static int SendCheckBW(RTMP *r);
  83. static int SendCheckBWResult(RTMP *r, double txn);
  84. static int SendDeleteStream(RTMP *r, double dStreamId);
  85. static int SendFCSubscribe(RTMP *r, AVal *subscribepath);
  86. static int SendPlay(RTMP *r);
  87. static int SendBytesReceived(RTMP *r);
  88. static int SendUsherToken(RTMP *r, AVal *usherToken);
  89. #if 0 /* unused */
  90. static int SendBGHasStream(RTMP *r, double dId, AVal *playpath);
  91. #endif
  92. static int HandleInvoke(RTMP *r, const char *body, unsigned int nBodySize);
  93. static int HandleMetadata(RTMP *r, char *body, unsigned int len);
  94. static void HandleChangeChunkSize(RTMP *r, const RTMPPacket *packet);
  95. static void HandleAudio(RTMP *r, const RTMPPacket *packet);
  96. static void HandleVideo(RTMP *r, const RTMPPacket *packet);
  97. static void HandleCtrl(RTMP *r, const RTMPPacket *packet);
  98. static void HandleServerBW(RTMP *r, const RTMPPacket *packet);
  99. static void HandleClientBW(RTMP *r, const RTMPPacket *packet);
  100. static int ReadN(RTMP *r, char *buffer, int n);
  101. static int WriteN(RTMP *r, const char *buffer, int n);
  102. static void DecodeTEA(AVal *key, AVal *text);
  103. static int HTTP_Post(RTMP *r, RTMPTCmd cmd, const char *buf, int len);
  104. static int HTTP_read(RTMP *r, int fill);
  105. #ifndef _WIN32
  106. static int clk_tck;
  107. #endif
  108. #ifdef CRYPTO
  109. #include "handshake.h"
  110. #endif
  111. uint32_t
  112. RTMP_GetTime()
  113. {
  114. #ifdef _DEBUG
  115. return 0;
  116. #elif defined(_WIN32)
  117. return timeGetTime();
  118. #else
  119. struct tms t;
  120. if (!clk_tck) clk_tck = sysconf(_SC_CLK_TCK);
  121. return times(&t) * 1000 / clk_tck;
  122. #endif
  123. }
  124. void
  125. RTMP_UserInterrupt()
  126. {
  127. RTMP_ctrlC = TRUE;
  128. }
  129. void
  130. RTMPPacket_Reset(RTMPPacket *p)
  131. {
  132. p->m_headerType = 0;
  133. p->m_packetType = 0;
  134. p->m_nChannel = 0;
  135. p->m_nTimeStamp = 0;
  136. p->m_nInfoField2 = 0;
  137. p->m_hasAbsTimestamp = FALSE;
  138. p->m_nBodySize = 0;
  139. p->m_nBytesRead = 0;
  140. }
  141. int
  142. RTMPPacket_Alloc(RTMPPacket *p, int nSize)
  143. {
  144. char *ptr = calloc(1, nSize + RTMP_MAX_HEADER_SIZE);
  145. if (!ptr)
  146. return FALSE;
  147. p->m_body = ptr + RTMP_MAX_HEADER_SIZE;
  148. p->m_nBytesRead = 0;
  149. return TRUE;
  150. }
  151. void
  152. RTMPPacket_Free(RTMPPacket *p)
  153. {
  154. if (p->m_body)
  155. {
  156. free(p->m_body - RTMP_MAX_HEADER_SIZE);
  157. p->m_body = NULL;
  158. }
  159. }
  160. void
  161. RTMPPacket_Dump(RTMPPacket *p)
  162. {
  163. RTMP_Log(RTMP_LOGDEBUG,
  164. "RTMP PACKET: packet type: 0x%02x. channel: 0x%02x. info 1: %d info 2: %d. Body size: %u. body: 0x%02x",
  165. p->m_packetType, p->m_nChannel, p->m_nTimeStamp, p->m_nInfoField2,
  166. p->m_nBodySize, p->m_body ? (unsigned char)p->m_body[0] : 0);
  167. }
  168. int
  169. RTMP_LibVersion()
  170. {
  171. return RTMP_LIB_VERSION;
  172. }
  173. void
  174. RTMP_TLS_Init()
  175. {
  176. #ifdef CRYPTO
  177. #ifdef USE_POLARSSL
  178. /* Do this regardless of NO_SSL, we use havege for rtmpe too */
  179. RTMP_TLS_ctx = calloc(1,sizeof(struct tls_ctx));
  180. havege_init(&RTMP_TLS_ctx->hs);
  181. #elif defined(USE_GNUTLS) && !defined(NO_SSL)
  182. /* Technically we need to initialize libgcrypt ourselves if
  183. * we're not going to call gnutls_global_init(). Ignoring this
  184. * for now.
  185. */
  186. gnutls_global_init();
  187. RTMP_TLS_ctx = malloc(sizeof(struct tls_ctx));
  188. gnutls_certificate_allocate_credentials(&RTMP_TLS_ctx->cred);
  189. gnutls_priority_init(&RTMP_TLS_ctx->prios, "NORMAL", NULL);
  190. gnutls_certificate_set_x509_trust_file(RTMP_TLS_ctx->cred,
  191. "ca.pem", GNUTLS_X509_FMT_PEM);
  192. #elif !defined(NO_SSL) /* USE_OPENSSL */
  193. /* libcrypto doesn't need anything special */
  194. SSL_load_error_strings();
  195. SSL_library_init();
  196. OpenSSL_add_all_digests();
  197. RTMP_TLS_ctx = SSL_CTX_new(SSLv23_method());
  198. SSL_CTX_set_options(RTMP_TLS_ctx, SSL_OP_ALL);
  199. SSL_CTX_set_default_verify_paths(RTMP_TLS_ctx);
  200. #endif
  201. #endif
  202. }
  203. RTMP *
  204. RTMP_Alloc()
  205. {
  206. return calloc(1, sizeof(RTMP));
  207. }
  208. void
  209. RTMP_Free(RTMP *r)
  210. {
  211. free(r);
  212. }
  213. void
  214. RTMP_Init(RTMP *r)
  215. {
  216. #ifdef CRYPTO
  217. if (!RTMP_TLS_ctx)
  218. RTMP_TLS_Init();
  219. #endif
  220. memset(r, 0, sizeof(RTMP));
  221. r->m_sb.sb_socket = -1;
  222. r->m_inChunkSize = RTMP_DEFAULT_CHUNKSIZE;
  223. r->m_outChunkSize = RTMP_DEFAULT_CHUNKSIZE;
  224. r->m_nBufferMS = 30000;
  225. r->m_nClientBW = 2500000;
  226. r->m_nClientBW2 = 2;
  227. r->m_nServerBW = 2500000;
  228. r->m_fAudioCodecs = 3191.0;
  229. r->m_fVideoCodecs = 252.0;
  230. r->Link.timeout = 30;
  231. r->Link.swfAge = 30;
  232. }
  233. void
  234. RTMP_EnableWrite(RTMP *r)
  235. {
  236. r->Link.protocol |= RTMP_FEATURE_WRITE;
  237. }
  238. double
  239. RTMP_GetDuration(RTMP *r)
  240. {
  241. return r->m_fDuration;
  242. }
  243. int
  244. RTMP_IsConnected(RTMP *r)
  245. {
  246. return r->m_sb.sb_socket != -1;
  247. }
  248. int
  249. RTMP_Socket(RTMP *r)
  250. {
  251. return r->m_sb.sb_socket;
  252. }
  253. int
  254. RTMP_IsTimedout(RTMP *r)
  255. {
  256. return r->m_sb.sb_timedout;
  257. }
  258. void
  259. RTMP_SetBufferMS(RTMP *r, int size)
  260. {
  261. r->m_nBufferMS = size;
  262. }
  263. void
  264. RTMP_UpdateBufferMS(RTMP *r)
  265. {
  266. RTMP_SendCtrl(r, 3, r->m_stream_id, r->m_nBufferMS);
  267. }
  268. #undef OSS
  269. #ifdef _WIN32
  270. #define OSS "WIN"
  271. #elif defined(__sun__)
  272. #define OSS "SOL"
  273. #elif defined(__APPLE__)
  274. #define OSS "MAC"
  275. #elif defined(__linux__)
  276. #define OSS "LNX"
  277. #else
  278. #define OSS "GNU"
  279. #endif
  280. #define DEF_VERSTR OSS " 10,0,32,18"
  281. static const char DEFAULT_FLASH_VER[] = DEF_VERSTR;
  282. const AVal RTMP_DefaultFlashVer =
  283. { (char *)DEFAULT_FLASH_VER, sizeof(DEFAULT_FLASH_VER) - 1 };
  284. void
  285. RTMP_SetupStream(RTMP *r,
  286. int protocol,
  287. AVal *host,
  288. unsigned int port,
  289. AVal *sockshost,
  290. AVal *playpath,
  291. AVal *tcUrl,
  292. AVal *swfUrl,
  293. AVal *pageUrl,
  294. AVal *app,
  295. AVal *auth,
  296. AVal *swfSHA256Hash,
  297. uint32_t swfSize,
  298. AVal *flashVer,
  299. AVal *subscribepath,
  300. AVal *usherToken,
  301. int dStart,
  302. int dStop, int bLiveStream, long int timeout)
  303. {
  304. RTMP_Log(RTMP_LOGDEBUG, "Protocol : %s", RTMPProtocolStrings[protocol&7]);
  305. RTMP_Log(RTMP_LOGDEBUG, "Hostname : %.*s", host->av_len, host->av_val);
  306. RTMP_Log(RTMP_LOGDEBUG, "Port : %d", port);
  307. RTMP_Log(RTMP_LOGDEBUG, "Playpath : %s", playpath->av_val);
  308. if (tcUrl && tcUrl->av_val)
  309. RTMP_Log(RTMP_LOGDEBUG, "tcUrl : %s", tcUrl->av_val);
  310. if (swfUrl && swfUrl->av_val)
  311. RTMP_Log(RTMP_LOGDEBUG, "swfUrl : %s", swfUrl->av_val);
  312. if (pageUrl && pageUrl->av_val)
  313. RTMP_Log(RTMP_LOGDEBUG, "pageUrl : %s", pageUrl->av_val);
  314. if (app && app->av_val)
  315. RTMP_Log(RTMP_LOGDEBUG, "app : %.*s", app->av_len, app->av_val);
  316. if (auth && auth->av_val)
  317. RTMP_Log(RTMP_LOGDEBUG, "auth : %s", auth->av_val);
  318. if (subscribepath && subscribepath->av_val)
  319. RTMP_Log(RTMP_LOGDEBUG, "subscribepath : %s", subscribepath->av_val);
  320. if (usherToken && usherToken->av_val)
  321. RTMP_Log(RTMP_LOGDEBUG, "NetStream.Authenticate.UsherToken : %s", usherToken->av_val);
  322. if (flashVer && flashVer->av_val)
  323. RTMP_Log(RTMP_LOGDEBUG, "flashVer : %s", flashVer->av_val);
  324. if (dStart > 0)
  325. RTMP_Log(RTMP_LOGDEBUG, "StartTime : %d msec", dStart);
  326. if (dStop > 0)
  327. RTMP_Log(RTMP_LOGDEBUG, "StopTime : %d msec", dStop);
  328. RTMP_Log(RTMP_LOGDEBUG, "live : %s", bLiveStream ? "yes" : "no");
  329. RTMP_Log(RTMP_LOGDEBUG, "timeout : %ld sec", timeout);
  330. #ifdef CRYPTO
  331. if (swfSHA256Hash != NULL && swfSize > 0)
  332. {
  333. memcpy(r->Link.SWFHash, swfSHA256Hash->av_val, sizeof(r->Link.SWFHash));
  334. r->Link.SWFSize = swfSize;
  335. RTMP_Log(RTMP_LOGDEBUG, "SWFSHA256:");
  336. RTMP_LogHex(RTMP_LOGDEBUG, r->Link.SWFHash, sizeof(r->Link.SWFHash));
  337. RTMP_Log(RTMP_LOGDEBUG, "SWFSize : %u", r->Link.SWFSize);
  338. }
  339. else
  340. {
  341. r->Link.SWFSize = 0;
  342. }
  343. #endif
  344. if (sockshost->av_len)
  345. {
  346. const char *socksport = strchr(sockshost->av_val, ':');
  347. char *hostname = strdup(sockshost->av_val);
  348. if (socksport)
  349. hostname[socksport - sockshost->av_val] = '\0';
  350. r->Link.sockshost.av_val = hostname;
  351. r->Link.sockshost.av_len = strlen(hostname);
  352. r->Link.socksport = socksport ? atoi(socksport + 1) : 1080;
  353. RTMP_Log(RTMP_LOGDEBUG, "Connecting via SOCKS proxy: %s:%d", r->Link.sockshost.av_val,
  354. r->Link.socksport);
  355. }
  356. else
  357. {
  358. r->Link.sockshost.av_val = NULL;
  359. r->Link.sockshost.av_len = 0;
  360. r->Link.socksport = 0;
  361. }
  362. if (tcUrl && tcUrl->av_len)
  363. r->Link.tcUrl = *tcUrl;
  364. if (swfUrl && swfUrl->av_len)
  365. r->Link.swfUrl = *swfUrl;
  366. if (pageUrl && pageUrl->av_len)
  367. r->Link.pageUrl = *pageUrl;
  368. if (app && app->av_len)
  369. r->Link.app = *app;
  370. if (auth && auth->av_len)
  371. {
  372. r->Link.auth = *auth;
  373. r->Link.lFlags |= RTMP_LF_AUTH;
  374. }
  375. if (flashVer && flashVer->av_len)
  376. r->Link.flashVer = *flashVer;
  377. else
  378. r->Link.flashVer = RTMP_DefaultFlashVer;
  379. if (subscribepath && subscribepath->av_len)
  380. r->Link.subscribepath = *subscribepath;
  381. if (usherToken && usherToken->av_len)
  382. r->Link.usherToken = *usherToken;
  383. r->Link.seekTime = dStart;
  384. r->Link.stopTime = dStop;
  385. if (bLiveStream)
  386. r->Link.lFlags |= RTMP_LF_LIVE;
  387. r->Link.timeout = timeout;
  388. r->Link.protocol = protocol;
  389. r->Link.hostname = *host;
  390. r->Link.port = port;
  391. r->Link.playpath = *playpath;
  392. if (r->Link.port == 0)
  393. {
  394. if (protocol & RTMP_FEATURE_SSL)
  395. r->Link.port = 443;
  396. else if (protocol & RTMP_FEATURE_HTTP)
  397. r->Link.port = 80;
  398. else
  399. r->Link.port = 1935;
  400. }
  401. }
  402. enum { OPT_STR=0, OPT_INT, OPT_BOOL, OPT_CONN };
  403. static const char *optinfo[] = {
  404. "string", "integer", "boolean", "AMF" };
  405. #define OFF(x) offsetof(struct RTMP,x)
  406. static struct urlopt {
  407. AVal name;
  408. off_t off;
  409. int otype;
  410. int omisc;
  411. char *use;
  412. } options[] = {
  413. { AVC("socks"), OFF(Link.sockshost), OPT_STR, 0,
  414. "Use the specified SOCKS proxy" },
  415. { AVC("app"), OFF(Link.app), OPT_STR, 0,
  416. "Name of target app on server" },
  417. { AVC("tcUrl"), OFF(Link.tcUrl), OPT_STR, 0,
  418. "URL to played stream" },
  419. { AVC("pageUrl"), OFF(Link.pageUrl), OPT_STR, 0,
  420. "URL of played media's web page" },
  421. { AVC("swfUrl"), OFF(Link.swfUrl), OPT_STR, 0,
  422. "URL to player SWF file" },
  423. { AVC("flashver"), OFF(Link.flashVer), OPT_STR, 0,
  424. "Flash version string (default " DEF_VERSTR ")" },
  425. { AVC("conn"), OFF(Link.extras), OPT_CONN, 0,
  426. "Append arbitrary AMF data to Connect message" },
  427. { AVC("playpath"), OFF(Link.playpath), OPT_STR, 0,
  428. "Path to target media on server" },
  429. { AVC("playlist"), OFF(Link.lFlags), OPT_BOOL, RTMP_LF_PLST,
  430. "Set playlist before play command" },
  431. { AVC("live"), OFF(Link.lFlags), OPT_BOOL, RTMP_LF_LIVE,
  432. "Stream is live, no seeking possible" },
  433. { AVC("subscribe"), OFF(Link.subscribepath), OPT_STR, 0,
  434. "Stream to subscribe to" },
  435. { AVC("jtv"), OFF(Link.usherToken), OPT_STR, 0,
  436. "Justin.tv authentication token" },
  437. { AVC("token"), OFF(Link.token), OPT_STR, 0,
  438. "Key for SecureToken response" },
  439. { AVC("swfVfy"), OFF(Link.lFlags), OPT_BOOL, RTMP_LF_SWFV,
  440. "Perform SWF Verification" },
  441. { AVC("swfAge"), OFF(Link.swfAge), OPT_INT, 0,
  442. "Number of days to use cached SWF hash" },
  443. { AVC("start"), OFF(Link.seekTime), OPT_INT, 0,
  444. "Stream start position in milliseconds" },
  445. { AVC("stop"), OFF(Link.stopTime), OPT_INT, 0,
  446. "Stream stop position in milliseconds" },
  447. { AVC("buffer"), OFF(m_nBufferMS), OPT_INT, 0,
  448. "Buffer time in milliseconds" },
  449. { AVC("timeout"), OFF(Link.timeout), OPT_INT, 0,
  450. "Session timeout in seconds" },
  451. { {NULL,0}, 0, 0}
  452. };
  453. static const AVal truth[] = {
  454. AVC("1"),
  455. AVC("on"),
  456. AVC("yes"),
  457. AVC("true"),
  458. {0,0}
  459. };
  460. static void RTMP_OptUsage()
  461. {
  462. int i;
  463. RTMP_Log(RTMP_LOGERROR, "Valid RTMP options are:\n");
  464. for (i=0; options[i].name.av_len; i++) {
  465. RTMP_Log(RTMP_LOGERROR, "%10s %-7s %s\n", options[i].name.av_val,
  466. optinfo[options[i].otype], options[i].use);
  467. }
  468. }
  469. static int
  470. parseAMF(AMFObject *obj, AVal *av, int *depth)
  471. {
  472. AMFObjectProperty prop = {{0,0}};
  473. int i;
  474. char *p, *arg = av->av_val;
  475. if (arg[1] == ':')
  476. {
  477. p = (char *)arg+2;
  478. switch(arg[0])
  479. {
  480. case 'B':
  481. prop.p_type = AMF_BOOLEAN;
  482. prop.p_vu.p_number = atoi(p);
  483. break;
  484. case 'S':
  485. prop.p_type = AMF_STRING;
  486. prop.p_vu.p_aval.av_val = p;
  487. prop.p_vu.p_aval.av_len = av->av_len - (p-arg);
  488. break;
  489. case 'N':
  490. prop.p_type = AMF_NUMBER;
  491. prop.p_vu.p_number = strtod(p, NULL);
  492. break;
  493. case 'Z':
  494. prop.p_type = AMF_NULL;
  495. break;
  496. case 'O':
  497. i = atoi(p);
  498. if (i)
  499. {
  500. prop.p_type = AMF_OBJECT;
  501. }
  502. else
  503. {
  504. (*depth)--;
  505. return 0;
  506. }
  507. break;
  508. default:
  509. return -1;
  510. }
  511. }
  512. else if (arg[2] == ':' && arg[0] == 'N')
  513. {
  514. p = strchr(arg+3, ':');
  515. if (!p || !*depth)
  516. return -1;
  517. prop.p_name.av_val = (char *)arg+3;
  518. prop.p_name.av_len = p - (arg+3);
  519. p++;
  520. switch(arg[1])
  521. {
  522. case 'B':
  523. prop.p_type = AMF_BOOLEAN;
  524. prop.p_vu.p_number = atoi(p);
  525. break;
  526. case 'S':
  527. prop.p_type = AMF_STRING;
  528. prop.p_vu.p_aval.av_val = p;
  529. prop.p_vu.p_aval.av_len = av->av_len - (p-arg);
  530. break;
  531. case 'N':
  532. prop.p_type = AMF_NUMBER;
  533. prop.p_vu.p_number = strtod(p, NULL);
  534. break;
  535. case 'O':
  536. prop.p_type = AMF_OBJECT;
  537. break;
  538. default:
  539. return -1;
  540. }
  541. }
  542. else
  543. return -1;
  544. if (*depth)
  545. {
  546. AMFObject *o2;
  547. for (i=0; i<*depth; i++)
  548. {
  549. o2 = &obj->o_props[obj->o_num-1].p_vu.p_object;
  550. obj = o2;
  551. }
  552. }
  553. AMF_AddProp(obj, &prop);
  554. if (prop.p_type == AMF_OBJECT)
  555. (*depth)++;
  556. return 0;
  557. }
  558. int RTMP_SetOpt(RTMP *r, const AVal *opt, AVal *arg)
  559. {
  560. int i;
  561. void *v;
  562. for (i=0; options[i].name.av_len; i++) {
  563. if (opt->av_len != options[i].name.av_len) continue;
  564. if (strcasecmp(opt->av_val, options[i].name.av_val)) continue;
  565. v = (char *)r + options[i].off;
  566. switch(options[i].otype) {
  567. case OPT_STR: {
  568. AVal *aptr = v;
  569. *aptr = *arg; }
  570. break;
  571. case OPT_INT: {
  572. long l = strtol(arg->av_val, NULL, 0);
  573. *(int *)v = l; }
  574. break;
  575. case OPT_BOOL: {
  576. int j, fl;
  577. fl = *(int *)v;
  578. for (j=0; truth[j].av_len; j++) {
  579. if (arg->av_len != truth[j].av_len) continue;
  580. if (strcasecmp(arg->av_val, truth[j].av_val)) continue;
  581. fl |= options[i].omisc; break; }
  582. *(int *)v = fl;
  583. }
  584. break;
  585. case OPT_CONN:
  586. if (parseAMF(&r->Link.extras, arg, &r->Link.edepth))
  587. return FALSE;
  588. break;
  589. }
  590. break;
  591. }
  592. if (!options[i].name.av_len) {
  593. RTMP_Log(RTMP_LOGERROR, "Unknown option %s", opt->av_val);
  594. RTMP_OptUsage();
  595. return FALSE;
  596. }
  597. return TRUE;
  598. }
  599. int RTMP_SetupURL(RTMP *r, char *url)
  600. {
  601. AVal opt, arg;
  602. char *p1, *p2, *ptr = strchr(url, ' ');
  603. int ret, len;
  604. unsigned int port = 0;
  605. if (ptr)
  606. *ptr = '\0';
  607. len = strlen(url);
  608. ret = RTMP_ParseURL(url, &r->Link.protocol, &r->Link.hostname,
  609. &port, &r->Link.playpath0, &r->Link.app);
  610. if (!ret)
  611. return ret;
  612. r->Link.port = port;
  613. r->Link.playpath = r->Link.playpath0;
  614. while (ptr) {
  615. *ptr++ = '\0';
  616. p1 = ptr;
  617. p2 = strchr(p1, '=');
  618. if (!p2)
  619. break;
  620. opt.av_val = p1;
  621. opt.av_len = p2 - p1;
  622. *p2++ = '\0';
  623. arg.av_val = p2;
  624. ptr = strchr(p2, ' ');
  625. if (ptr) {
  626. *ptr = '\0';
  627. arg.av_len = ptr - p2;
  628. /* skip repeated spaces */
  629. while(ptr[1] == ' ')
  630. *ptr++ = '\0';
  631. } else {
  632. arg.av_len = strlen(p2);
  633. }
  634. /* unescape */
  635. port = arg.av_len;
  636. for (p1=p2; port >0;) {
  637. if (*p1 == '\\') {
  638. unsigned int c;
  639. if (port < 3)
  640. return FALSE;
  641. sscanf(p1+1, "%02x", &c);
  642. *p2++ = c;
  643. port -= 3;
  644. p1 += 3;
  645. } else {
  646. *p2++ = *p1++;
  647. port--;
  648. }
  649. }
  650. arg.av_len = p2 - arg.av_val;
  651. ret = RTMP_SetOpt(r, &opt, &arg);
  652. if (!ret)
  653. return ret;
  654. }
  655. if (!r->Link.tcUrl.av_len)
  656. {
  657. r->Link.tcUrl.av_val = url;
  658. if (r->Link.app.av_len)
  659. {
  660. if (r->Link.app.av_val < url + len)
  661. {
  662. /* if app is part of original url, just use it */
  663. r->Link.tcUrl.av_len = r->Link.app.av_len + (r->Link.app.av_val - url);
  664. }
  665. else
  666. {
  667. len = r->Link.hostname.av_len + r->Link.app.av_len +
  668. sizeof("rtmpte://:65535/");
  669. r->Link.tcUrl.av_val = malloc(len);
  670. r->Link.tcUrl.av_len = snprintf(r->Link.tcUrl.av_val, len,
  671. "%s://%.*s:%d/%.*s",
  672. RTMPProtocolStringsLower[r->Link.protocol],
  673. r->Link.hostname.av_len, r->Link.hostname.av_val,
  674. r->Link.port,
  675. r->Link.app.av_len, r->Link.app.av_val);
  676. r->Link.lFlags |= RTMP_LF_FTCU;
  677. }
  678. }
  679. else
  680. {
  681. r->Link.tcUrl.av_len = strlen(url);
  682. }
  683. }
  684. #ifdef CRYPTO
  685. if ((r->Link.lFlags & RTMP_LF_SWFV) && r->Link.swfUrl.av_len)
  686. RTMP_HashSWF(r->Link.swfUrl.av_val, &r->Link.SWFSize,
  687. (unsigned char *)r->Link.SWFHash, r->Link.swfAge);
  688. #endif
  689. if (r->Link.port == 0)
  690. {
  691. if (r->Link.protocol & RTMP_FEATURE_SSL)
  692. r->Link.port = 443;
  693. else if (r->Link.protocol & RTMP_FEATURE_HTTP)
  694. r->Link.port = 80;
  695. else
  696. r->Link.port = 1935;
  697. }
  698. return TRUE;
  699. }
  700. static int
  701. add_addr_info(struct sockaddr_in *service, AVal *host, int port)
  702. {
  703. char *hostname;
  704. int ret = TRUE;
  705. if (host->av_val[host->av_len])
  706. {
  707. hostname = malloc(host->av_len+1);
  708. memcpy(hostname, host->av_val, host->av_len);
  709. hostname[host->av_len] = '\0';
  710. }
  711. else
  712. {
  713. hostname = host->av_val;
  714. }
  715. service->sin_addr.s_addr = inet_addr(hostname);
  716. if (service->sin_addr.s_addr == INADDR_NONE)
  717. {
  718. struct hostent *host = gethostbyname(hostname);
  719. if (host == NULL || host->h_addr == NULL)
  720. {
  721. RTMP_Log(RTMP_LOGERROR, "Problem accessing the DNS. (addr: %s)", hostname);
  722. ret = FALSE;
  723. goto finish;
  724. }
  725. service->sin_addr = *(struct in_addr *)host->h_addr;
  726. }
  727. service->sin_port = htons(port);
  728. finish:
  729. if (hostname != host->av_val)
  730. free(hostname);
  731. return ret;
  732. }
  733. int
  734. RTMP_Connect0(RTMP *r, struct sockaddr * service)
  735. {
  736. int on = 1;
  737. r->m_sb.sb_timedout = FALSE;
  738. r->m_pausing = 0;
  739. r->m_fDuration = 0.0;
  740. r->m_sb.sb_socket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
  741. if (r->m_sb.sb_socket != -1)
  742. {
  743. if (connect(r->m_sb.sb_socket, service, sizeof(struct sockaddr)) < 0)
  744. {
  745. int err = GetSockError();
  746. RTMP_Log(RTMP_LOGERROR, "%s, failed to connect socket. %d (%s)",
  747. __FUNCTION__, err, strerror(err));
  748. RTMP_Close(r);
  749. return FALSE;
  750. }
  751. if (r->Link.socksport)
  752. {
  753. RTMP_Log(RTMP_LOGDEBUG, "%s ... SOCKS negotiation", __FUNCTION__);
  754. if (!SocksNegotiate(r))
  755. {
  756. RTMP_Log(RTMP_LOGERROR, "%s, SOCKS negotiation failed.", __FUNCTION__);
  757. RTMP_Close(r);
  758. return FALSE;
  759. }
  760. }
  761. }
  762. else
  763. {
  764. RTMP_Log(RTMP_LOGERROR, "%s, failed to create socket. Error: %d", __FUNCTION__,
  765. GetSockError());
  766. return FALSE;
  767. }
  768. /* set timeout */
  769. {
  770. SET_RCVTIMEO(tv, r->Link.timeout);
  771. if (setsockopt
  772. (r->m_sb.sb_socket, SOL_SOCKET, SO_RCVTIMEO, (char *)&tv, sizeof(tv)))
  773. {
  774. RTMP_Log(RTMP_LOGERROR, "%s, Setting socket timeout to %ds failed!",
  775. __FUNCTION__, r->Link.timeout);
  776. }
  777. }
  778. setsockopt(r->m_sb.sb_socket, IPPROTO_TCP, TCP_NODELAY, (char *) &on, sizeof(on));
  779. return TRUE;
  780. }
  781. int
  782. RTMP_Connect1(RTMP *r, RTMPPacket *cp)
  783. {
  784. if (r->Link.protocol & RTMP_FEATURE_SSL)
  785. {
  786. #if defined(CRYPTO) && !defined(NO_SSL)
  787. TLS_client(RTMP_TLS_ctx, r->m_sb.sb_ssl);
  788. TLS_setfd(r->m_sb.sb_ssl, r->m_sb.sb_socket);
  789. if (TLS_connect(r->m_sb.sb_ssl) < 0)
  790. {
  791. RTMP_Log(RTMP_LOGERROR, "%s, TLS_Connect failed", __FUNCTION__);
  792. RTMP_Close(r);
  793. return FALSE;
  794. }
  795. #else
  796. RTMP_Log(RTMP_LOGERROR, "%s, no SSL/TLS support", __FUNCTION__);
  797. RTMP_Close(r);
  798. return FALSE;
  799. #endif
  800. }
  801. if (r->Link.protocol & RTMP_FEATURE_HTTP)
  802. {
  803. r->m_msgCounter = 1;
  804. r->m_clientID.av_val = NULL;
  805. r->m_clientID.av_len = 0;
  806. HTTP_Post(r, RTMPT_OPEN, "", 1);
  807. if (HTTP_read(r, 1) != 0)
  808. {
  809. r->m_msgCounter = 0;
  810. RTMP_Log(RTMP_LOGDEBUG, "%s, Could not connect for handshake", __FUNCTION__);
  811. RTMP_Close(r);
  812. return 0;
  813. }
  814. r->m_msgCounter = 0;
  815. }
  816. RTMP_Log(RTMP_LOGDEBUG, "%s, ... connected, handshaking", __FUNCTION__);
  817. if (!HandShake(r, TRUE))
  818. {
  819. RTMP_Log(RTMP_LOGERROR, "%s, handshake failed.", __FUNCTION__);
  820. RTMP_Close(r);
  821. return FALSE;
  822. }
  823. RTMP_Log(RTMP_LOGDEBUG, "%s, handshaked", __FUNCTION__);
  824. if (!SendConnectPacket(r, cp))
  825. {
  826. RTMP_Log(RTMP_LOGERROR, "%s, RTMP connect failed.", __FUNCTION__);
  827. RTMP_Close(r);
  828. return FALSE;
  829. }
  830. return TRUE;
  831. }
  832. int
  833. RTMP_Connect(RTMP *r, RTMPPacket *cp)
  834. {
  835. struct sockaddr_in service;
  836. if (!r->Link.hostname.av_len)
  837. return FALSE;
  838. memset(&service, 0, sizeof(struct sockaddr_in));
  839. service.sin_family = AF_INET;
  840. if (r->Link.socksport)
  841. {
  842. /* Connect via SOCKS */
  843. if (!add_addr_info(&service, &r->Link.sockshost, r->Link.socksport))
  844. return FALSE;
  845. }
  846. else
  847. {
  848. /* Connect directly */
  849. if (!add_addr_info(&service, &r->Link.hostname, r->Link.port))
  850. return FALSE;
  851. }
  852. if (!RTMP_Connect0(r, (struct sockaddr *)&service))
  853. return FALSE;
  854. r->m_bSendCounter = TRUE;
  855. return RTMP_Connect1(r, cp);
  856. }
  857. static int
  858. SocksNegotiate(RTMP *r)
  859. {
  860. unsigned long addr;
  861. struct sockaddr_in service;
  862. memset(&service, 0, sizeof(struct sockaddr_in));
  863. add_addr_info(&service, &r->Link.hostname, r->Link.port);
  864. addr = htonl(service.sin_addr.s_addr);
  865. {
  866. char packet[] = {
  867. 4, 1, /* SOCKS 4, connect */
  868. (r->Link.port >> 8) & 0xFF,
  869. (r->Link.port) & 0xFF,
  870. (char)(addr >> 24) & 0xFF, (char)(addr >> 16) & 0xFF,
  871. (char)(addr >> 8) & 0xFF, (char)addr & 0xFF,
  872. 0
  873. }; /* NULL terminate */
  874. WriteN(r, packet, sizeof packet);
  875. if (ReadN(r, packet, 8) != 8)
  876. return FALSE;
  877. if (packet[0] == 0 && packet[1] == 90)
  878. {
  879. return TRUE;
  880. }
  881. else
  882. {
  883. RTMP_Log(RTMP_LOGERROR, "%s, SOCKS returned error code %d", __FUNCTION__, packet[1]);
  884. return FALSE;
  885. }
  886. }
  887. }
  888. int
  889. RTMP_ConnectStream(RTMP *r, int seekTime)
  890. {
  891. RTMPPacket packet = { 0 };
  892. /* seekTime was already set by SetupStream / SetupURL.
  893. * This is only needed by ReconnectStream.
  894. */
  895. if (seekTime > 0)
  896. r->Link.seekTime = seekTime;
  897. r->m_mediaChannel = 0;
  898. while (!r->m_bPlaying && RTMP_IsConnected(r) && RTMP_ReadPacket(r, &packet))
  899. {
  900. if (RTMPPacket_IsReady(&packet))
  901. {
  902. if (!packet.m_nBodySize)
  903. continue;
  904. if ((packet.m_packetType == RTMP_PACKET_TYPE_AUDIO) ||
  905. (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO) ||
  906. (packet.m_packetType == RTMP_PACKET_TYPE_INFO))
  907. {
  908. RTMP_Log(RTMP_LOGWARNING, "Received FLV packet before play()! Ignoring.");
  909. RTMPPacket_Free(&packet);
  910. continue;
  911. }
  912. RTMP_ClientPacket(r, &packet);
  913. RTMPPacket_Free(&packet);
  914. }
  915. }
  916. return r->m_bPlaying;
  917. }
  918. int
  919. RTMP_ReconnectStream(RTMP *r, int seekTime)
  920. {
  921. RTMP_DeleteStream(r);
  922. RTMP_SendCreateStream(r);
  923. return RTMP_ConnectStream(r, seekTime);
  924. }
  925. int
  926. RTMP_ToggleStream(RTMP *r)
  927. {
  928. int res;
  929. if (!r->m_pausing)
  930. {
  931. if (RTMP_IsTimedout(r) && r->m_read.status == RTMP_READ_EOF)
  932. r->m_read.status = 0;
  933. res = RTMP_SendPause(r, TRUE, r->m_pauseStamp);
  934. if (!res)
  935. return res;
  936. r->m_pausing = 1;
  937. sleep(1);
  938. }
  939. res = RTMP_SendPause(r, FALSE, r->m_pauseStamp);
  940. r->m_pausing = 3;
  941. return res;
  942. }
  943. void
  944. RTMP_DeleteStream(RTMP *r)
  945. {
  946. if (r->m_stream_id < 0)
  947. return;
  948. r->m_bPlaying = FALSE;
  949. SendDeleteStream(r, r->m_stream_id);
  950. r->m_stream_id = -1;
  951. }
  952. int
  953. RTMP_GetNextMediaPacket(RTMP *r, RTMPPacket *packet)
  954. {
  955. int bHasMediaPacket = 0;
  956. while (!bHasMediaPacket && RTMP_IsConnected(r)
  957. && RTMP_ReadPacket(r, packet))
  958. {
  959. if (!RTMPPacket_IsReady(packet))
  960. {
  961. continue;
  962. }
  963. bHasMediaPacket = RTMP_ClientPacket(r, packet);
  964. if (!bHasMediaPacket)
  965. {
  966. RTMPPacket_Free(packet);
  967. }
  968. else if (r->m_pausing == 3)
  969. {
  970. if (packet->m_nTimeStamp <= r->m_mediaStamp)
  971. {
  972. bHasMediaPacket = 0;
  973. #ifdef _DEBUG
  974. RTMP_Log(RTMP_LOGDEBUG,
  975. "Skipped type: %02X, size: %d, TS: %d ms, abs TS: %d, pause: %d ms",
  976. packet->m_packetType, packet->m_nBodySize,
  977. packet->m_nTimeStamp, packet->m_hasAbsTimestamp,
  978. r->m_mediaStamp);
  979. #endif
  980. continue;
  981. }
  982. r->m_pausing = 0;
  983. }
  984. }
  985. if (bHasMediaPacket)
  986. r->m_bPlaying = TRUE;
  987. else if (r->m_sb.sb_timedout && !r->m_pausing)
  988. r->m_pauseStamp = r->m_channelTimestamp[r->m_mediaChannel];
  989. return bHasMediaPacket;
  990. }
  991. int
  992. RTMP_ClientPacket(RTMP *r, RTMPPacket *packet)
  993. {
  994. int bHasMediaPacket = 0;
  995. switch (packet->m_packetType)
  996. {
  997. case RTMP_PACKET_TYPE_CHUNK_SIZE:
  998. /* chunk size */
  999. HandleChangeChunkSize(r, packet);
  1000. break;
  1001. case RTMP_PACKET_TYPE_BYTES_READ_REPORT:
  1002. /* bytes read report */
  1003. RTMP_Log(RTMP_LOGDEBUG, "%s, received: bytes read report", __FUNCTION__);
  1004. break;
  1005. case RTMP_PACKET_TYPE_CONTROL:
  1006. /* ctrl */
  1007. HandleCtrl(r, packet);
  1008. break;
  1009. case RTMP_PACKET_TYPE_SERVER_BW:
  1010. /* server bw */
  1011. HandleServerBW(r, packet);
  1012. break;
  1013. case RTMP_PACKET_TYPE_CLIENT_BW:
  1014. /* client bw */
  1015. HandleClientBW(r, packet);
  1016. break;
  1017. case RTMP_PACKET_TYPE_AUDIO:
  1018. /* audio data */
  1019. /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: audio %lu bytes", __FUNCTION__, packet.m_nBodySize); */
  1020. HandleAudio(r, packet);
  1021. bHasMediaPacket = 1;
  1022. if (!r->m_mediaChannel)
  1023. r->m_mediaChannel = packet->m_nChannel;
  1024. if (!r->m_pausing)
  1025. r->m_mediaStamp = packet->m_nTimeStamp;
  1026. break;
  1027. case RTMP_PACKET_TYPE_VIDEO:
  1028. /* video data */
  1029. /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: video %lu bytes", __FUNCTION__, packet.m_nBodySize); */
  1030. HandleVideo(r, packet);
  1031. bHasMediaPacket = 1;
  1032. if (!r->m_mediaChannel)
  1033. r->m_mediaChannel = packet->m_nChannel;
  1034. if (!r->m_pausing)
  1035. r->m_mediaStamp = packet->m_nTimeStamp;
  1036. break;
  1037. case RTMP_PACKET_TYPE_FLEX_STREAM_SEND:
  1038. /* flex stream send */
  1039. RTMP_Log(RTMP_LOGDEBUG,
  1040. "%s, flex stream send, size %u bytes, not supported, ignoring",
  1041. __FUNCTION__, packet->m_nBodySize);
  1042. break;
  1043. case RTMP_PACKET_TYPE_FLEX_SHARED_OBJECT:
  1044. /* flex shared object */
  1045. RTMP_Log(RTMP_LOGDEBUG,
  1046. "%s, flex shared object, size %u bytes, not supported, ignoring",
  1047. __FUNCTION__, packet->m_nBodySize);
  1048. break;
  1049. case RTMP_PACKET_TYPE_FLEX_MESSAGE:
  1050. /* flex message */
  1051. {
  1052. RTMP_Log(RTMP_LOGDEBUG,
  1053. "%s, flex message, size %u bytes, not fully supported",
  1054. __FUNCTION__, packet->m_nBodySize);
  1055. /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
  1056. /* some DEBUG code */
  1057. #if 0
  1058. RTMP_LIB_AMFObject obj;
  1059. int nRes = obj.Decode(packet.m_body+1, packet.m_nBodySize-1);
  1060. if(nRes < 0) {
  1061. RTMP_Log(RTMP_LOGERROR, "%s, error decoding AMF3 packet", __FUNCTION__);
  1062. /*return; */
  1063. }
  1064. obj.Dump();
  1065. #endif
  1066. if (HandleInvoke(r, packet->m_body + 1, packet->m_nBodySize - 1) == 1)
  1067. bHasMediaPacket = 2;
  1068. break;
  1069. }
  1070. case RTMP_PACKET_TYPE_INFO:
  1071. /* metadata (notify) */
  1072. RTMP_Log(RTMP_LOGDEBUG, "%s, received: notify %u bytes", __FUNCTION__,
  1073. packet->m_nBodySize);
  1074. if (HandleMetadata(r, packet->m_body, packet->m_nBodySize))
  1075. bHasMediaPacket = 1;
  1076. break;
  1077. case RTMP_PACKET_TYPE_SHARED_OBJECT:
  1078. RTMP_Log(RTMP_LOGDEBUG, "%s, shared object, not supported, ignoring",
  1079. __FUNCTION__);
  1080. break;
  1081. case RTMP_PACKET_TYPE_INVOKE:
  1082. /* invoke */
  1083. RTMP_Log(RTMP_LOGDEBUG, "%s, received: invoke %u bytes", __FUNCTION__,
  1084. packet->m_nBodySize);
  1085. /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
  1086. if (HandleInvoke(r, packet->m_body, packet->m_nBodySize) == 1)
  1087. bHasMediaPacket = 2;
  1088. break;
  1089. case RTMP_PACKET_TYPE_FLASH_VIDEO:
  1090. {
  1091. /* go through FLV packets and handle metadata packets */
  1092. unsigned int pos = 0;
  1093. uint32_t nTimeStamp = packet->m_nTimeStamp;
  1094. while (pos + 11 < packet->m_nBodySize)
  1095. {
  1096. uint32_t dataSize = AMF_DecodeInt24(packet->m_body + pos + 1); /* size without header (11) and prevTagSize (4) */
  1097. if (pos + 11 + dataSize + 4 > packet->m_nBodySize)
  1098. {
  1099. RTMP_Log(RTMP_LOGWARNING, "Stream corrupt?!");
  1100. break;
  1101. }
  1102. if (packet->m_body[pos] == 0x12)
  1103. {
  1104. HandleMetadata(r, packet->m_body + pos + 11, dataSize);
  1105. }
  1106. else if (packet->m_body[pos] == 8 || packet->m_body[pos] == 9)
  1107. {
  1108. nTimeStamp = AMF_DecodeInt24(packet->m_body + pos + 4);
  1109. nTimeStamp |= (packet->m_body[pos + 7] << 24);
  1110. }
  1111. pos += (11 + dataSize + 4);
  1112. }
  1113. if (!r->m_pausing)
  1114. r->m_mediaStamp = nTimeStamp;
  1115. /* FLV tag(s) */
  1116. /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: FLV tag(s) %lu bytes", __FUNCTION__, packet.m_nBodySize); */
  1117. bHasMediaPacket = 1;
  1118. break;
  1119. }
  1120. default:
  1121. RTMP_Log(RTMP_LOGDEBUG, "%s, unknown packet type received: 0x%02x", __FUNCTION__,
  1122. packet->m_packetType);
  1123. #ifdef _DEBUG
  1124. RTMP_LogHex(RTMP_LOGDEBUG, packet->m_body, packet->m_nBodySize);
  1125. #endif
  1126. }
  1127. return bHasMediaPacket;
  1128. }
  1129. #ifdef _DEBUG
  1130. extern FILE *netstackdump;
  1131. extern FILE *netstackdump_read;
  1132. #endif
  1133. static int
  1134. ReadN(RTMP *r, char *buffer, int n)
  1135. {
  1136. int nOriginalSize = n;
  1137. int avail;
  1138. char *ptr;
  1139. r->m_sb.sb_timedout = FALSE;
  1140. #ifdef _DEBUG
  1141. memset(buffer, 0, n);
  1142. #endif
  1143. ptr = buffer;
  1144. while (n > 0)
  1145. {
  1146. int nBytes = 0, nRead;
  1147. if (r->Link.protocol & RTMP_FEATURE_HTTP)
  1148. {
  1149. while (!r->m_resplen)
  1150. {
  1151. if (r->m_sb.sb_size < 144)
  1152. {
  1153. if (!r->m_unackd)
  1154. HTTP_Post(r, RTMPT_IDLE, "", 1);
  1155. if (RTMPSockBuf_Fill(&r->m_sb) < 1)
  1156. {
  1157. if (!r->m_sb.sb_timedout)
  1158. RTMP_Close(r);
  1159. return 0;
  1160. }
  1161. }
  1162. if (HTTP_read(r, 0) == -1)
  1163. {
  1164. RTMP_Log(RTMP_LOGDEBUG, "%s, No valid HTTP response found", __FUNCTION__);
  1165. RTMP_Close(r);
  1166. return 0;
  1167. }
  1168. }
  1169. if (r->m_resplen && !r->m_sb.sb_size)
  1170. RTMPSockBuf_Fill(&r->m_sb);
  1171. avail = r->m_sb.sb_size;
  1172. if (avail > r->m_resplen)
  1173. avail = r->m_resplen;
  1174. }
  1175. else
  1176. {
  1177. avail = r->m_sb.sb_size;
  1178. if (avail == 0)
  1179. {
  1180. if (RTMPSockBuf_Fill(&r->m_sb) < 1)
  1181. {
  1182. if (!r->m_sb.sb_timedout)
  1183. RTMP_Close(r);
  1184. return 0;
  1185. }
  1186. avail = r->m_sb.sb_size;
  1187. }
  1188. }
  1189. nRead = ((n < avail) ? n : avail);
  1190. if (nRead > 0)
  1191. {
  1192. memcpy(ptr, r->m_sb.sb_start, nRead);
  1193. r->m_sb.sb_start += nRead;
  1194. r->m_sb.sb_size -= nRead;
  1195. nBytes = nRead;
  1196. r->m_nBytesIn += nRead;
  1197. if (r->m_bSendCounter
  1198. && r->m_nBytesIn > ( r->m_nBytesInSent + r->m_nClientBW / 10))
  1199. if (!SendBytesReceived(r))
  1200. return FALSE;
  1201. }
  1202. /*RTMP_Log(RTMP_LOGDEBUG, "%s: %d bytes\n", __FUNCTION__, nBytes); */
  1203. #ifdef _DEBUG
  1204. fwrite(ptr, 1, nBytes, netstackdump_read);
  1205. #endif
  1206. if (nBytes == 0)
  1207. {
  1208. RTMP_Log(RTMP_LOGDEBUG, "%s, RTMP socket closed by peer", __FUNCTION__);
  1209. /*goto again; */
  1210. RTMP_Close(r);
  1211. break;
  1212. }
  1213. if (r->Link.protocol & RTMP_FEATURE_HTTP)
  1214. r->m_resplen -= nBytes;
  1215. #ifdef CRYPTO
  1216. if (r->Link.rc4keyIn)
  1217. {
  1218. RC4_encrypt(r->Link.rc4keyIn, nBytes, ptr);
  1219. }
  1220. #endif
  1221. n -= nBytes;
  1222. ptr += nBytes;
  1223. }
  1224. return nOriginalSize - n;
  1225. }
  1226. static int
  1227. WriteN(RTMP *r, const char *buffer, int n)
  1228. {
  1229. const char *ptr = buffer;
  1230. #ifdef CRYPTO
  1231. char *encrypted = 0;
  1232. char buf[RTMP_BUFFER_CACHE_SIZE];
  1233. if (r->Link.rc4keyOut)
  1234. {
  1235. if (n > sizeof(buf))
  1236. encrypted = (char *)malloc(n);
  1237. else
  1238. encrypted = (char *)buf;
  1239. ptr = encrypted;
  1240. RC4_encrypt2(r->Link.rc4keyOut, n, buffer, ptr);
  1241. }
  1242. #endif
  1243. while (n > 0)
  1244. {
  1245. int nBytes;
  1246. if (r->Link.protocol & RTMP_FEATURE_HTTP)
  1247. nBytes = HTTP_Post(r, RTMPT_SEND, ptr, n);
  1248. else
  1249. nBytes = RTMPSockBuf_Send(&r->m_sb, ptr, n);
  1250. /*RTMP_Log(RTMP_LOGDEBUG, "%s: %d\n", __FUNCTION__, nBytes); */
  1251. if (nBytes < 0)
  1252. {
  1253. int sockerr = GetSockError();
  1254. RTMP_Log(RTMP_LOGERROR, "%s, RTMP send error %d (%d bytes)", __FUNCTION__,
  1255. sockerr, n);
  1256. if (sockerr == EINTR && !RTMP_ctrlC)
  1257. continue;
  1258. RTMP_Close(r);
  1259. n = 1;
  1260. break;
  1261. }
  1262. if (nBytes == 0)
  1263. break;
  1264. n -= nBytes;
  1265. ptr += nBytes;
  1266. }
  1267. #ifdef CRYPTO
  1268. if (encrypted && encrypted != buf)
  1269. free(encrypted);
  1270. #endif
  1271. return n == 0;
  1272. }
  1273. #define SAVC(x) static const AVal av_##x = AVC(#x)
  1274. SAVC(app);
  1275. SAVC(connect);
  1276. SAVC(flashVer);
  1277. SAVC(swfUrl);
  1278. SAVC(pageUrl);
  1279. SAVC(tcUrl);
  1280. SAVC(fpad);
  1281. SAVC(capabilities);
  1282. SAVC(audioCodecs);
  1283. SAVC(videoCodecs);
  1284. SAVC(videoFunction);
  1285. SAVC(objectEncoding);
  1286. SAVC(secureToken);
  1287. SAVC(secureTokenResponse);
  1288. SAVC(type);
  1289. SAVC(nonprivate);
  1290. static int
  1291. SendConnectPacket(RTMP *r, RTMPPacket *cp)
  1292. {
  1293. RTMPPacket packet;
  1294. char pbuf[4096], *pend = pbuf + sizeof(pbuf);
  1295. char *enc;
  1296. if (cp)
  1297. return RTMP_SendPacket(r, cp, TRUE);
  1298. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1299. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1300. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1301. packet.m_nTimeStamp = 0;
  1302. packet.m_nInfoField2 = 0;
  1303. packet.m_hasAbsTimestamp = 0;
  1304. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1305. enc = packet.m_body;
  1306. enc = AMF_EncodeString(enc, pend, &av_connect);
  1307. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1308. *enc++ = AMF_OBJECT;
  1309. enc = AMF_EncodeNamedString(enc, pend, &av_app, &r->Link.app);
  1310. if (!enc)
  1311. return FALSE;
  1312. if (r->Link.protocol & RTMP_FEATURE_WRITE)
  1313. {
  1314. enc = AMF_EncodeNamedString(enc, pend, &av_type, &av_nonprivate);
  1315. if (!enc)
  1316. return FALSE;
  1317. }
  1318. if (r->Link.flashVer.av_len)
  1319. {
  1320. enc = AMF_EncodeNamedString(enc, pend, &av_flashVer, &r->Link.flashVer);
  1321. if (!enc)
  1322. return FALSE;
  1323. }
  1324. if (r->Link.swfUrl.av_len)
  1325. {
  1326. enc = AMF_EncodeNamedString(enc, pend, &av_swfUrl, &r->Link.swfUrl);
  1327. if (!enc)
  1328. return FALSE;
  1329. }
  1330. if (r->Link.tcUrl.av_len)
  1331. {
  1332. enc = AMF_EncodeNamedString(enc, pend, &av_tcUrl, &r->Link.tcUrl);
  1333. if (!enc)
  1334. return FALSE;
  1335. }
  1336. if (!(r->Link.protocol & RTMP_FEATURE_WRITE))
  1337. {
  1338. enc = AMF_EncodeNamedBoolean(enc, pend, &av_fpad, FALSE);
  1339. if (!enc)
  1340. return FALSE;
  1341. enc = AMF_EncodeNamedNumber(enc, pend, &av_capabilities, 15.0);
  1342. if (!enc)
  1343. return FALSE;
  1344. enc = AMF_EncodeNamedNumber(enc, pend, &av_audioCodecs, r->m_fAudioCodecs);
  1345. if (!enc)
  1346. return FALSE;
  1347. enc = AMF_EncodeNamedNumber(enc, pend, &av_videoCodecs, r->m_fVideoCodecs);
  1348. if (!enc)
  1349. return FALSE;
  1350. enc = AMF_EncodeNamedNumber(enc, pend, &av_videoFunction, 1.0);
  1351. if (!enc)
  1352. return FALSE;
  1353. if (r->Link.pageUrl.av_len)
  1354. {
  1355. enc = AMF_EncodeNamedString(enc, pend, &av_pageUrl, &r->Link.pageUrl);
  1356. if (!enc)
  1357. return FALSE;
  1358. }
  1359. }
  1360. if (r->m_fEncoding != 0.0 || r->m_bSendEncoding)
  1361. { /* AMF0, AMF3 not fully supported yet */
  1362. enc = AMF_EncodeNamedNumber(enc, pend, &av_objectEncoding, r->m_fEncoding);
  1363. if (!enc)
  1364. return FALSE;
  1365. }
  1366. if (enc + 3 >= pend)
  1367. return FALSE;
  1368. *enc++ = 0;
  1369. *enc++ = 0; /* end of object - 0x00 0x00 0x09 */
  1370. *enc++ = AMF_OBJECT_END;
  1371. /* add auth string */
  1372. if (r->Link.auth.av_len)
  1373. {
  1374. enc = AMF_EncodeBoolean(enc, pend, r->Link.lFlags & RTMP_LF_AUTH);
  1375. if (!enc)
  1376. return FALSE;
  1377. enc = AMF_EncodeString(enc, pend, &r->Link.auth);
  1378. if (!enc)
  1379. return FALSE;
  1380. }
  1381. if (r->Link.extras.o_num)
  1382. {
  1383. int i;
  1384. for (i = 0; i < r->Link.extras.o_num; i++)
  1385. {
  1386. enc = AMFProp_Encode(&r->Link.extras.o_props[i], enc, pend);
  1387. if (!enc)
  1388. return FALSE;
  1389. }
  1390. }
  1391. packet.m_nBodySize = enc - packet.m_body;
  1392. return RTMP_SendPacket(r, &packet, TRUE);
  1393. }
  1394. #if 0 /* unused */
  1395. SAVC(bgHasStream);
  1396. static int
  1397. SendBGHasStream(RTMP *r, double dId, AVal *playpath)
  1398. {
  1399. RTMPPacket packet;
  1400. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1401. char *enc;
  1402. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1403. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1404. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1405. packet.m_nTimeStamp = 0;
  1406. packet.m_nInfoField2 = 0;
  1407. packet.m_hasAbsTimestamp = 0;
  1408. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1409. enc = packet.m_body;
  1410. enc = AMF_EncodeString(enc, pend, &av_bgHasStream);
  1411. enc = AMF_EncodeNumber(enc, pend, dId);
  1412. *enc++ = AMF_NULL;
  1413. enc = AMF_EncodeString(enc, pend, playpath);
  1414. if (enc == NULL)
  1415. return FALSE;
  1416. packet.m_nBodySize = enc - packet.m_body;
  1417. return RTMP_SendPacket(r, &packet, TRUE);
  1418. }
  1419. #endif
  1420. SAVC(createStream);
  1421. int
  1422. RTMP_SendCreateStream(RTMP *r)
  1423. {
  1424. RTMPPacket packet;
  1425. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1426. char *enc;
  1427. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1428. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1429. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1430. packet.m_nTimeStamp = 0;
  1431. packet.m_nInfoField2 = 0;
  1432. packet.m_hasAbsTimestamp = 0;
  1433. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1434. enc = packet.m_body;
  1435. enc = AMF_EncodeString(enc, pend, &av_createStream);
  1436. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1437. *enc++ = AMF_NULL; /* NULL */
  1438. packet.m_nBodySize = enc - packet.m_body;
  1439. return RTMP_SendPacket(r, &packet, TRUE);
  1440. }
  1441. SAVC(FCSubscribe);
  1442. static int
  1443. SendFCSubscribe(RTMP *r, AVal *subscribepath)
  1444. {
  1445. RTMPPacket packet;
  1446. char pbuf[512], *pend = pbuf + sizeof(pbuf);
  1447. char *enc;
  1448. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1449. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1450. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1451. packet.m_nTimeStamp = 0;
  1452. packet.m_nInfoField2 = 0;
  1453. packet.m_hasAbsTimestamp = 0;
  1454. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1455. RTMP_Log(RTMP_LOGDEBUG, "FCSubscribe: %s", subscribepath->av_val);
  1456. enc = packet.m_body;
  1457. enc = AMF_EncodeString(enc, pend, &av_FCSubscribe);
  1458. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1459. *enc++ = AMF_NULL;
  1460. enc = AMF_EncodeString(enc, pend, subscribepath);
  1461. if (!enc)
  1462. return FALSE;
  1463. packet.m_nBodySize = enc - packet.m_body;
  1464. return RTMP_SendPacket(r, &packet, TRUE);
  1465. }
  1466. /* Justin.tv specific authentication */
  1467. static const AVal av_NetStream_Authenticate_UsherToken = AVC("NetStream.Authenticate.UsherToken");
  1468. static int
  1469. SendUsherToken(RTMP *r, AVal *usherToken)
  1470. {
  1471. RTMPPacket packet;
  1472. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1473. char *enc;
  1474. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1475. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1476. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1477. packet.m_nTimeStamp = 0;
  1478. packet.m_nInfoField2 = 0;
  1479. packet.m_hasAbsTimestamp = 0;
  1480. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1481. RTMP_Log(RTMP_LOGDEBUG, "UsherToken: %s", usherToken->av_val);
  1482. enc = packet.m_body;
  1483. enc = AMF_EncodeString(enc, pend, &av_NetStream_Authenticate_UsherToken);
  1484. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1485. *enc++ = AMF_NULL;
  1486. enc = AMF_EncodeString(enc, pend, usherToken);
  1487. if (!enc)
  1488. return FALSE;
  1489. packet.m_nBodySize = enc - packet.m_body;
  1490. return RTMP_SendPacket(r, &packet, FALSE);
  1491. }
  1492. /******************************************/
  1493. SAVC(releaseStream);
  1494. static int
  1495. SendReleaseStream(RTMP *r)
  1496. {
  1497. RTMPPacket packet;
  1498. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1499. char *enc;
  1500. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1501. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1502. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1503. packet.m_nTimeStamp = 0;
  1504. packet.m_nInfoField2 = 0;
  1505. packet.m_hasAbsTimestamp = 0;
  1506. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1507. enc = packet.m_body;
  1508. enc = AMF_EncodeString(enc, pend, &av_releaseStream);
  1509. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1510. *enc++ = AMF_NULL;
  1511. enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
  1512. if (!enc)
  1513. return FALSE;
  1514. packet.m_nBodySize = enc - packet.m_body;
  1515. return RTMP_SendPacket(r, &packet, FALSE);
  1516. }
  1517. SAVC(FCPublish);
  1518. static int
  1519. SendFCPublish(RTMP *r)
  1520. {
  1521. RTMPPacket packet;
  1522. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1523. char *enc;
  1524. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1525. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1526. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1527. packet.m_nTimeStamp = 0;
  1528. packet.m_nInfoField2 = 0;
  1529. packet.m_hasAbsTimestamp = 0;
  1530. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1531. enc = packet.m_body;
  1532. enc = AMF_EncodeString(enc, pend, &av_FCPublish);
  1533. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1534. *enc++ = AMF_NULL;
  1535. enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
  1536. if (!enc)
  1537. return FALSE;
  1538. packet.m_nBodySize = enc - packet.m_body;
  1539. return RTMP_SendPacket(r, &packet, FALSE);
  1540. }
  1541. SAVC(FCUnpublish);
  1542. static int
  1543. SendFCUnpublish(RTMP *r)
  1544. {
  1545. RTMPPacket packet;
  1546. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1547. char *enc;
  1548. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1549. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1550. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1551. packet.m_nTimeStamp = 0;
  1552. packet.m_nInfoField2 = 0;
  1553. packet.m_hasAbsTimestamp = 0;
  1554. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1555. enc = packet.m_body;
  1556. enc = AMF_EncodeString(enc, pend, &av_FCUnpublish);
  1557. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1558. *enc++ = AMF_NULL;
  1559. enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
  1560. if (!enc)
  1561. return FALSE;
  1562. packet.m_nBodySize = enc - packet.m_body;
  1563. return RTMP_SendPacket(r, &packet, FALSE);
  1564. }
  1565. SAVC(publish);
  1566. SAVC(live);
  1567. SAVC(record);
  1568. static int
  1569. SendPublish(RTMP *r)
  1570. {
  1571. RTMPPacket packet;
  1572. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1573. char *enc;
  1574. packet.m_nChannel = 0x04; /* source channel (invoke) */
  1575. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1576. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1577. packet.m_nTimeStamp = 0;
  1578. packet.m_nInfoField2 = r->m_stream_id;
  1579. packet.m_hasAbsTimestamp = 0;
  1580. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1581. enc = packet.m_body;
  1582. enc = AMF_EncodeString(enc, pend, &av_publish);
  1583. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1584. *enc++ = AMF_NULL;
  1585. enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
  1586. if (!enc)
  1587. return FALSE;
  1588. /* FIXME: should we choose live based on Link.lFlags & RTMP_LF_LIVE? */
  1589. enc = AMF_EncodeString(enc, pend, &av_live);
  1590. if (!enc)
  1591. return FALSE;
  1592. packet.m_nBodySize = enc - packet.m_body;
  1593. return RTMP_SendPacket(r, &packet, TRUE);
  1594. }
  1595. SAVC(deleteStream);
  1596. static int
  1597. SendDeleteStream(RTMP *r, double dStreamId)
  1598. {
  1599. RTMPPacket packet;
  1600. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1601. char *enc;
  1602. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1603. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1604. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1605. packet.m_nTimeStamp = 0;
  1606. packet.m_nInfoField2 = 0;
  1607. packet.m_hasAbsTimestamp = 0;
  1608. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1609. enc = packet.m_body;
  1610. enc = AMF_EncodeString(enc, pend, &av_deleteStream);
  1611. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1612. *enc++ = AMF_NULL;
  1613. enc = AMF_EncodeNumber(enc, pend, dStreamId);
  1614. packet.m_nBodySize = enc - packet.m_body;
  1615. /* no response expected */
  1616. return RTMP_SendPacket(r, &packet, FALSE);
  1617. }
  1618. SAVC(pause);
  1619. int
  1620. RTMP_SendPause(RTMP *r, int DoPause, int iTime)
  1621. {
  1622. RTMPPacket packet;
  1623. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1624. char *enc;
  1625. packet.m_nChannel = 0x08; /* video channel */
  1626. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1627. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1628. packet.m_nTimeStamp = 0;
  1629. packet.m_nInfoField2 = 0;
  1630. packet.m_hasAbsTimestamp = 0;
  1631. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1632. enc = packet.m_body;
  1633. enc = AMF_EncodeString(enc, pend, &av_pause);
  1634. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1635. *enc++ = AMF_NULL;
  1636. enc = AMF_EncodeBoolean(enc, pend, DoPause);
  1637. enc = AMF_EncodeNumber(enc, pend, (double)iTime);
  1638. packet.m_nBodySize = enc - packet.m_body;
  1639. RTMP_Log(RTMP_LOGDEBUG, "%s, %d, pauseTime=%d", __FUNCTION__, DoPause, iTime);
  1640. return RTMP_SendPacket(r, &packet, TRUE);
  1641. }
  1642. int RTMP_Pause(RTMP *r, int DoPause)
  1643. {
  1644. if (DoPause)
  1645. r->m_pauseStamp = r->m_channelTimestamp[r->m_mediaChannel];
  1646. return RTMP_SendPause(r, DoPause, r->m_pauseStamp);
  1647. }
  1648. SAVC(seek);
  1649. int
  1650. RTMP_SendSeek(RTMP *r, int iTime)
  1651. {
  1652. RTMPPacket packet;
  1653. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1654. char *enc;
  1655. packet.m_nChannel = 0x08; /* video channel */
  1656. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1657. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1658. packet.m_nTimeStamp = 0;
  1659. packet.m_nInfoField2 = 0;
  1660. packet.m_hasAbsTimestamp = 0;
  1661. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1662. enc = packet.m_body;
  1663. enc = AMF_EncodeString(enc, pend, &av_seek);
  1664. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1665. *enc++ = AMF_NULL;
  1666. enc = AMF_EncodeNumber(enc, pend, (double)iTime);
  1667. packet.m_nBodySize = enc - packet.m_body;
  1668. r->m_read.flags |= RTMP_READ_SEEKING;
  1669. r->m_read.nResumeTS = 0;
  1670. return RTMP_SendPacket(r, &packet, TRUE);
  1671. }
  1672. int
  1673. RTMP_SendServerBW(RTMP *r)
  1674. {
  1675. RTMPPacket packet;
  1676. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1677. packet.m_nChannel = 0x02; /* control channel (invoke) */
  1678. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1679. packet.m_packetType = RTMP_PACKET_TYPE_SERVER_BW;
  1680. packet.m_nTimeStamp = 0;
  1681. packet.m_nInfoField2 = 0;
  1682. packet.m_hasAbsTimestamp = 0;
  1683. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1684. packet.m_nBodySize = 4;
  1685. AMF_EncodeInt32(packet.m_body, pend, r->m_nServerBW);
  1686. return RTMP_SendPacket(r, &packet, FALSE);
  1687. }
  1688. int
  1689. RTMP_SendClientBW(RTMP *r)
  1690. {
  1691. RTMPPacket packet;
  1692. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1693. packet.m_nChannel = 0x02; /* control channel (invoke) */
  1694. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1695. packet.m_packetType = RTMP_PACKET_TYPE_CLIENT_BW;
  1696. packet.m_nTimeStamp = 0;
  1697. packet.m_nInfoField2 = 0;
  1698. packet.m_hasAbsTimestamp = 0;
  1699. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1700. packet.m_nBodySize = 5;
  1701. AMF_EncodeInt32(packet.m_body, pend, r->m_nClientBW);
  1702. packet.m_body[4] = r->m_nClientBW2;
  1703. return RTMP_SendPacket(r, &packet, FALSE);
  1704. }
  1705. static int
  1706. SendBytesReceived(RTMP *r)
  1707. {
  1708. RTMPPacket packet;
  1709. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1710. packet.m_nChannel = 0x02; /* control channel (invoke) */
  1711. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1712. packet.m_packetType = RTMP_PACKET_TYPE_BYTES_READ_REPORT;
  1713. packet.m_nTimeStamp = 0;
  1714. packet.m_nInfoField2 = 0;
  1715. packet.m_hasAbsTimestamp = 0;
  1716. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1717. packet.m_nBodySize = 4;
  1718. AMF_EncodeInt32(packet.m_body, pend, r->m_nBytesIn); /* hard coded for now */
  1719. r->m_nBytesInSent = r->m_nBytesIn;
  1720. /*RTMP_Log(RTMP_LOGDEBUG, "Send bytes report. 0x%x (%d bytes)", (unsigned int)m_nBytesIn, m_nBytesIn); */
  1721. return RTMP_SendPacket(r, &packet, FALSE);
  1722. }
  1723. SAVC(_checkbw);
  1724. static int
  1725. SendCheckBW(RTMP *r)
  1726. {
  1727. RTMPPacket packet;
  1728. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1729. char *enc;
  1730. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1731. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1732. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1733. packet.m_nTimeStamp = 0; /* RTMP_GetTime(); */
  1734. packet.m_nInfoField2 = 0;
  1735. packet.m_hasAbsTimestamp = 0;
  1736. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1737. enc = packet.m_body;
  1738. enc = AMF_EncodeString(enc, pend, &av__checkbw);
  1739. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1740. *enc++ = AMF_NULL;
  1741. packet.m_nBodySize = enc - packet.m_body;
  1742. /* triggers _onbwcheck and eventually results in _onbwdone */
  1743. return RTMP_SendPacket(r, &packet, FALSE);
  1744. }
  1745. SAVC(_result);
  1746. static int
  1747. SendCheckBWResult(RTMP *r, double txn)
  1748. {
  1749. RTMPPacket packet;
  1750. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1751. char *enc;
  1752. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1753. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1754. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1755. packet.m_nTimeStamp = 0x16 * r->m_nBWCheckCounter; /* temp inc value. till we figure it out. */
  1756. packet.m_nInfoField2 = 0;
  1757. packet.m_hasAbsTimestamp = 0;
  1758. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1759. enc = packet.m_body;
  1760. enc = AMF_EncodeString(enc, pend, &av__result);
  1761. enc = AMF_EncodeNumber(enc, pend, txn);
  1762. *enc++ = AMF_NULL;
  1763. enc = AMF_EncodeNumber(enc, pend, (double)r->m_nBWCheckCounter++);
  1764. packet.m_nBodySize = enc - packet.m_body;
  1765. return RTMP_SendPacket(r, &packet, FALSE);
  1766. }
  1767. SAVC(ping);
  1768. SAVC(pong);
  1769. static int
  1770. SendPong(RTMP *r, double txn)
  1771. {
  1772. RTMPPacket packet;
  1773. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1774. char *enc;
  1775. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1776. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1777. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1778. packet.m_nTimeStamp = 0x16 * r->m_nBWCheckCounter; /* temp inc value. till we figure it out. */
  1779. packet.m_nInfoField2 = 0;
  1780. packet.m_hasAbsTimestamp = 0;
  1781. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1782. enc = packet.m_body;
  1783. enc = AMF_EncodeString(enc, pend, &av_pong);
  1784. enc = AMF_EncodeNumber(enc, pend, txn);
  1785. *enc++ = AMF_NULL;
  1786. packet.m_nBodySize = enc - packet.m_body;
  1787. return RTMP_SendPacket(r, &packet, FALSE);
  1788. }
  1789. SAVC(play);
  1790. static int
  1791. SendPlay(RTMP *r)
  1792. {
  1793. RTMPPacket packet;
  1794. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1795. char *enc;
  1796. packet.m_nChannel = 0x08; /* we make 8 our stream channel */
  1797. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1798. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1799. packet.m_nTimeStamp = 0;
  1800. packet.m_nInfoField2 = r->m_stream_id; /*0x01000000; */
  1801. packet.m_hasAbsTimestamp = 0;
  1802. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1803. enc = packet.m_body;
  1804. enc = AMF_EncodeString(enc, pend, &av_play);
  1805. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1806. *enc++ = AMF_NULL;
  1807. RTMP_Log(RTMP_LOGDEBUG, "%s, seekTime=%d, stopTime=%d, sending play: %s",
  1808. __FUNCTION__, r->Link.seekTime, r->Link.stopTime,
  1809. r->Link.playpath.av_val);
  1810. enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
  1811. if (!enc)
  1812. return FALSE;
  1813. /* Optional parameters start and len.
  1814. *
  1815. * start: -2, -1, 0, positive number
  1816. * -2: looks for a live stream, then a recorded stream,
  1817. * if not found any open a live stream
  1818. * -1: plays a live stream
  1819. * >=0: plays a recorded streams from 'start' milliseconds
  1820. */
  1821. if (r->Link.lFlags & RTMP_LF_LIVE)
  1822. enc = AMF_EncodeNumber(enc, pend, -1000.0);
  1823. else
  1824. {
  1825. if (r->Link.seekTime > 0.0)
  1826. enc = AMF_EncodeNumber(enc, pend, r->Link.seekTime); /* resume from here */
  1827. else
  1828. enc = AMF_EncodeNumber(enc, pend, 0.0); /*-2000.0);*/ /* recorded as default, -2000.0 is not reliable since that freezes the player if the stream is not found */
  1829. }
  1830. if (!enc)
  1831. return FALSE;
  1832. /* len: -1, 0, positive number
  1833. * -1: plays live or recorded stream to the end (default)
  1834. * 0: plays a frame 'start' ms away from the beginning
  1835. * >0: plays a live or recoded stream for 'len' milliseconds
  1836. */
  1837. /*enc += EncodeNumber(enc, -1.0); */ /* len */
  1838. if (r->Link.stopTime)
  1839. {
  1840. enc = AMF_EncodeNumber(enc, pend, r->Link.stopTime - r->Link.seekTime);
  1841. if (!enc)
  1842. return FALSE;
  1843. }
  1844. packet.m_nBodySize = enc - packet.m_body;
  1845. return RTMP_SendPacket(r, &packet, TRUE);
  1846. }
  1847. SAVC(set_playlist);
  1848. SAVC(0);
  1849. static int
  1850. SendPlaylist(RTMP *r)
  1851. {
  1852. RTMPPacket packet;
  1853. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1854. char *enc;
  1855. packet.m_nChannel = 0x08; /* we make 8 our stream channel */
  1856. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1857. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1858. packet.m_nTimeStamp = 0;
  1859. packet.m_nInfoField2 = r->m_stream_id; /*0x01000000; */
  1860. packet.m_hasAbsTimestamp = 0;
  1861. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1862. enc = packet.m_body;
  1863. enc = AMF_EncodeString(enc, pend, &av_set_playlist);
  1864. enc = AMF_EncodeNumber(enc, pend, 0);
  1865. *enc++ = AMF_NULL;
  1866. *enc++ = AMF_ECMA_ARRAY;
  1867. *enc++ = 0;
  1868. *enc++ = 0;
  1869. *enc++ = 0;
  1870. *enc++ = AMF_OBJECT;
  1871. enc = AMF_EncodeNamedString(enc, pend, &av_0, &r->Link.playpath);
  1872. if (!enc)
  1873. return FALSE;
  1874. if (enc + 3 >= pend)
  1875. return FALSE;
  1876. *enc++ = 0;
  1877. *enc++ = 0;
  1878. *enc++ = AMF_OBJECT_END;
  1879. packet.m_nBodySize = enc - packet.m_body;
  1880. return RTMP_SendPacket(r, &packet, TRUE);
  1881. }
  1882. static int
  1883. SendSecureTokenResponse(RTMP *r, AVal *resp)
  1884. {
  1885. RTMPPacket packet;
  1886. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1887. char *enc;
  1888. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1889. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1890. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1891. packet.m_nTimeStamp = 0;
  1892. packet.m_nInfoField2 = 0;
  1893. packet.m_hasAbsTimestamp = 0;
  1894. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1895. enc = packet.m_body;
  1896. enc = AMF_EncodeString(enc, pend, &av_secureTokenResponse);
  1897. enc = AMF_EncodeNumber(enc, pend, 0.0);
  1898. *enc++ = AMF_NULL;
  1899. enc = AMF_EncodeString(enc, pend, resp);
  1900. if (!enc)
  1901. return FALSE;
  1902. packet.m_nBodySize = enc - packet.m_body;
  1903. return RTMP_SendPacket(r, &packet, FALSE);
  1904. }
  1905. /*
  1906. from http://jira.red5.org/confluence/display/docs/Ping:
  1907. Ping is the most mysterious message in RTMP and till now we haven't fully interpreted it yet. In summary, Ping message is used as a special command that are exchanged between client and server. This page aims to document all known Ping messages. Expect the list to grow.
  1908. The type of Ping packet is 0x4 and contains two mandatory parameters and two optional parameters. The first parameter is the type of Ping and in short integer. The second parameter is the target of the ping. As Ping is always sent in Channel 2 (control channel) and the target object in RTMP header is always 0 which means the Connection object, it's necessary to put an extra parameter to indicate the exact target object the Ping is sent to. The second parameter takes this responsibility. The value has the same meaning as the target object field in RTMP header. (The second value could also be used as other purposes, like RTT Ping/Pong. It is used as the timestamp.) The third and fourth parameters are optional and could be looked upon as the parameter of the Ping packet. Below is an unexhausted list of Ping messages.
  1909. * type 0: Clear the stream. No third and fourth parameters. The second parameter could be 0. After the connection is established, a Ping 0,0 will be sent from server to client. The message will also be sent to client on the start of Play and in response of a Seek or Pause/Resume request. This Ping tells client to re-calibrate the clock with the timestamp of the next packet server sends.
  1910. * type 1: Tell the stream to clear the playing buffer.
  1911. * type 3: Buffer time of the client. The third parameter is the buffer time in millisecond.
  1912. * type 4: Reset a stream. Used together with type 0 in the case of VOD. Often sent before type 0.
  1913. * type 6: Ping the client from server. The second parameter is the current time.
  1914. * type 7: Pong reply from client. The second parameter is the time the server sent with his ping request.
  1915. * type 26: SWFVerification request
  1916. * type 27: SWFVerification response
  1917. */
  1918. int
  1919. RTMP_SendCtrl(RTMP *r, short nType, unsigned int nObject, unsigned int nTime)
  1920. {
  1921. RTMPPacket packet;
  1922. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1923. int nSize;
  1924. char *buf;
  1925. RTMP_Log(RTMP_LOGDEBUG, "sending ctrl. type: 0x%04x", (unsigned short)nType);
  1926. packet.m_nChannel = 0x02; /* control channel (ping) */
  1927. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1928. packet.m_packetType = RTMP_PACKET_TYPE_CONTROL;
  1929. packet.m_nTimeStamp = 0; /* RTMP_GetTime(); */
  1930. packet.m_nInfoField2 = 0;
  1931. packet.m_hasAbsTimestamp = 0;
  1932. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1933. switch(nType) {
  1934. case 0x03: nSize = 10; break; /* buffer time */
  1935. case 0x1A: nSize = 3; break; /* SWF verify request */
  1936. case 0x1B: nSize = 44; break; /* SWF verify response */
  1937. default: nSize = 6; break;
  1938. }
  1939. packet.m_nBodySize = nSize;
  1940. buf = packet.m_body;
  1941. buf = AMF_EncodeInt16(buf, pend, nType);
  1942. if (nType == 0x1B)
  1943. {
  1944. #ifdef CRYPTO
  1945. memcpy(buf, r->Link.SWFVerificationResponse, 42);
  1946. RTMP_Log(RTMP_LOGDEBUG, "Sending SWFVerification response: ");
  1947. RTMP_LogHex(RTMP_LOGDEBUG, (uint8_t *)packet.m_body, packet.m_nBodySize);
  1948. #endif
  1949. }
  1950. else if (nType == 0x1A)
  1951. {
  1952. *buf = nObject & 0xff;
  1953. }
  1954. else
  1955. {
  1956. if (nSize > 2)
  1957. buf = AMF_EncodeInt32(buf, pend, nObject);
  1958. if (nSize > 6)
  1959. buf = AMF_EncodeInt32(buf, pend, nTime);
  1960. }
  1961. return RTMP_SendPacket(r, &packet, FALSE);
  1962. }
  1963. static void
  1964. AV_erase(RTMP_METHOD *vals, int *num, int i, int freeit)
  1965. {
  1966. if (freeit)
  1967. free(vals[i].name.av_val);
  1968. (*num)--;
  1969. for (; i < *num; i++)
  1970. {
  1971. vals[i] = vals[i + 1];
  1972. }
  1973. vals[i].name.av_val = NULL;
  1974. vals[i].name.av_len = 0;
  1975. vals[i].num = 0;
  1976. }
  1977. void
  1978. RTMP_DropRequest(RTMP *r, int i, int freeit)
  1979. {
  1980. AV_erase(r->m_methodCalls, &r->m_numCalls, i, freeit);
  1981. }
  1982. static void
  1983. AV_queue(RTMP_METHOD **vals, int *num, AVal *av, int txn)
  1984. {
  1985. char *tmp;
  1986. if (!(*num & 0x0f))
  1987. *vals = realloc(*vals, (*num + 16) * sizeof(RTMP_METHOD));
  1988. tmp = malloc(av->av_len + 1);
  1989. memcpy(tmp, av->av_val, av->av_len);
  1990. tmp[av->av_len] = '\0';
  1991. (*vals)[*num].num = txn;
  1992. (*vals)[*num].name.av_len = av->av_len;
  1993. (*vals)[(*num)++].name.av_val = tmp;
  1994. }
  1995. static void
  1996. AV_clear(RTMP_METHOD *vals, int num)
  1997. {
  1998. int i;
  1999. for (i = 0; i < num; i++)
  2000. free(vals[i].name.av_val);
  2001. free(vals);
  2002. }
  2003. SAVC(onBWDone);
  2004. SAVC(onFCSubscribe);
  2005. SAVC(onFCUnsubscribe);
  2006. SAVC(_onbwcheck);
  2007. SAVC(_onbwdone);
  2008. SAVC(_error);
  2009. SAVC(close);
  2010. SAVC(code);
  2011. SAVC(level);
  2012. SAVC(onStatus);
  2013. SAVC(playlist_ready);
  2014. static const AVal av_NetStream_Failed = AVC("NetStream.Failed");
  2015. static const AVal av_NetStream_Play_Failed = AVC("NetStream.Play.Failed");
  2016. static const AVal av_NetStream_Play_StreamNotFound =
  2017. AVC("NetStream.Play.StreamNotFound");
  2018. static const AVal av_NetConnection_Connect_InvalidApp =
  2019. AVC("NetConnection.Connect.InvalidApp");
  2020. static const AVal av_NetStream_Play_Start = AVC("NetStream.Play.Start");
  2021. static const AVal av_NetStream_Play_Complete = AVC("NetStream.Play.Complete");
  2022. static const AVal av_NetStream_Play_Stop = AVC("NetStream.Play.Stop");
  2023. static const AVal av_NetStream_Seek_Notify = AVC("NetStream.Seek.Notify");
  2024. static const AVal av_NetStream_Pause_Notify = AVC("NetStream.Pause.Notify");
  2025. static const AVal av_NetStream_Play_PublishNotify =
  2026. AVC("NetStream.Play.PublishNotify");
  2027. static const AVal av_NetStream_Play_UnpublishNotify =
  2028. AVC("NetStream.Play.UnpublishNotify");
  2029. static const AVal av_NetStream_Publish_Start = AVC("NetStream.Publish.Start");
  2030. /* Returns 0 for OK/Failed/error, 1 for 'Stop or Complete' */
  2031. static int
  2032. HandleInvoke(RTMP *r, const char *body, unsigned int nBodySize)
  2033. {
  2034. AMFObject obj;
  2035. AVal method;
  2036. double txn;
  2037. int ret = 0, nRes;
  2038. if (body[0] != 0x02) /* make sure it is a string method name we start with */
  2039. {
  2040. RTMP_Log(RTMP_LOGWARNING, "%s, Sanity failed. no string method in invoke packet",
  2041. __FUNCTION__);
  2042. return 0;
  2043. }
  2044. nRes = AMF_Decode(&obj, body, nBodySize, FALSE);
  2045. if (nRes < 0)
  2046. {
  2047. RTMP_Log(RTMP_LOGERROR, "%s, error decoding invoke packet", __FUNCTION__);
  2048. return 0;
  2049. }
  2050. AMF_Dump(&obj);
  2051. AMFProp_GetString(AMF_GetProp(&obj, NULL, 0), &method);
  2052. txn = AMFProp_GetNumber(AMF_GetProp(&obj, NULL, 1));
  2053. RTMP_Log(RTMP_LOGDEBUG, "%s, server invoking <%s>", __FUNCTION__, method.av_val);
  2054. if (AVMATCH(&method, &av__result))
  2055. {
  2056. AVal methodInvoked = {0};
  2057. int i;
  2058. for (i=0; i<r->m_numCalls; i++) {
  2059. if (r->m_methodCalls[i].num == (int)txn) {
  2060. methodInvoked = r->m_methodCalls[i].name;
  2061. AV_erase(r->m_methodCalls, &r->m_numCalls, i, FALSE);
  2062. break;
  2063. }
  2064. }
  2065. if (!methodInvoked.av_val) {
  2066. RTMP_Log(RTMP_LOGDEBUG, "%s, received result id %f without matching request",
  2067. __FUNCTION__, txn);
  2068. goto leave;
  2069. }
  2070. RTMP_Log(RTMP_LOGDEBUG, "%s, received result for method call <%s>", __FUNCTION__,
  2071. methodInvoked.av_val);
  2072. if (AVMATCH(&methodInvoked, &av_connect))
  2073. {
  2074. if (r->Link.token.av_len)
  2075. {
  2076. AMFObjectProperty p;
  2077. if (RTMP_FindFirstMatchingProperty(&obj, &av_secureToken, &p))
  2078. {
  2079. DecodeTEA(&r->Link.token, &p.p_vu.p_aval);
  2080. SendSecureTokenResponse(r, &p.p_vu.p_aval);
  2081. }
  2082. }
  2083. if (r->Link.protocol & RTMP_FEATURE_WRITE)
  2084. {
  2085. SendReleaseStream(r);
  2086. SendFCPublish(r);
  2087. }
  2088. else
  2089. {
  2090. RTMP_SendServerBW(r);
  2091. RTMP_SendCtrl(r, 3, 0, 300);
  2092. }
  2093. RTMP_SendCreateStream(r);
  2094. if (!(r->Link.protocol & RTMP_FEATURE_WRITE))
  2095. {
  2096. /* Authenticate on Justin.tv legacy servers before sending FCSubscribe */
  2097. if (r->Link.usherToken.av_len)
  2098. SendUsherToken(r, &r->Link.usherToken);
  2099. /* Send the FCSubscribe if live stream or if subscribepath is set */
  2100. if (r->Link.subscribepath.av_len)
  2101. SendFCSubscribe(r, &r->Link.subscribepath);
  2102. else if (r->Link.lFlags & RTMP_LF_LIVE)
  2103. SendFCSubscribe(r, &r->Link.playpath);
  2104. }
  2105. }
  2106. else if (AVMATCH(&methodInvoked, &av_createStream))
  2107. {
  2108. r->m_stream_id = (int)AMFProp_GetNumber(AMF_GetProp(&obj, NULL, 3));
  2109. if (r->Link.protocol & RTMP_FEATURE_WRITE)
  2110. {
  2111. SendPublish(r);
  2112. }
  2113. else
  2114. {
  2115. if (r->Link.lFlags & RTMP_LF_PLST)
  2116. SendPlaylist(r);
  2117. SendPlay(r);
  2118. RTMP_SendCtrl(r, 3, r->m_stream_id, r->m_nBufferMS);
  2119. }
  2120. }
  2121. else if (AVMATCH(&methodInvoked, &av_play) ||
  2122. AVMATCH(&methodInvoked, &av_publish))
  2123. {
  2124. r->m_bPlaying = TRUE;
  2125. }
  2126. free(methodInvoked.av_val);
  2127. }
  2128. else if (AVMATCH(&method, &av_onBWDone))
  2129. {
  2130. if (!r->m_nBWCheckCounter)
  2131. SendCheckBW(r);
  2132. }
  2133. else if (AVMATCH(&method, &av_onFCSubscribe))
  2134. {
  2135. /* SendOnFCSubscribe(); */
  2136. }
  2137. else if (AVMATCH(&method, &av_onFCUnsubscribe))
  2138. {
  2139. RTMP_Close(r);
  2140. ret = 1;
  2141. }
  2142. else if (AVMATCH(&method, &av_ping))
  2143. {
  2144. SendPong(r, txn);
  2145. }
  2146. else if (AVMATCH(&method, &av__onbwcheck))
  2147. {
  2148. SendCheckBWResult(r, txn);
  2149. }
  2150. else if (AVMATCH(&method, &av__onbwdone))
  2151. {
  2152. int i;
  2153. for (i = 0; i < r->m_numCalls; i++)
  2154. if (AVMATCH(&r->m_methodCalls[i].name, &av__checkbw))
  2155. {
  2156. AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
  2157. break;
  2158. }
  2159. }
  2160. else if (AVMATCH(&method, &av__error))
  2161. {
  2162. RTMP_Log(RTMP_LOGERROR, "rtmp server sent error");
  2163. }
  2164. else if (AVMATCH(&method, &av_close))
  2165. {
  2166. RTMP_Log(RTMP_LOGERROR, "rtmp server requested close");
  2167. RTMP_Close(r);
  2168. }
  2169. else if (AVMATCH(&method, &av_onStatus))
  2170. {
  2171. AMFObject obj2;
  2172. AVal code, level;
  2173. AMFProp_GetObject(AMF_GetProp(&obj, NULL, 3), &obj2);
  2174. AMFProp_GetString(AMF_GetProp(&obj2, &av_code, -1), &code);
  2175. AMFProp_GetString(AMF_GetProp(&obj2, &av_level, -1), &level);
  2176. RTMP_Log(RTMP_LOGDEBUG, "%s, onStatus: %s", __FUNCTION__, code.av_val);
  2177. if (AVMATCH(&code, &av_NetStream_Failed)
  2178. || AVMATCH(&code, &av_NetStream_Play_Failed)
  2179. || AVMATCH(&code, &av_NetStream_Play_StreamNotFound)
  2180. || AVMATCH(&code, &av_NetConnection_Connect_InvalidApp))
  2181. {
  2182. r->m_stream_id = -1;
  2183. RTMP_Close(r);
  2184. RTMP_Log(RTMP_LOGERROR, "Closing connection: %s", code.av_val);
  2185. }
  2186. else if (AVMATCH(&code, &av_NetStream_Play_Start)
  2187. || AVMATCH(&code, &av_NetStream_Play_PublishNotify))
  2188. {
  2189. int i;
  2190. r->m_bPlaying = TRUE;
  2191. for (i = 0; i < r->m_numCalls; i++)
  2192. {
  2193. if (AVMATCH(&r->m_methodCalls[i].name, &av_play))
  2194. {
  2195. AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
  2196. break;
  2197. }
  2198. }
  2199. }
  2200. else if (AVMATCH(&code, &av_NetStream_Publish_Start))
  2201. {
  2202. int i;
  2203. r->m_bPlaying = TRUE;
  2204. for (i = 0; i < r->m_numCalls; i++)
  2205. {
  2206. if (AVMATCH(&r->m_methodCalls[i].name, &av_publish))
  2207. {
  2208. AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
  2209. break;
  2210. }
  2211. }
  2212. }
  2213. /* Return 1 if this is a Play.Complete or Play.Stop */
  2214. else if (AVMATCH(&code, &av_NetStream_Play_Complete)
  2215. || AVMATCH(&code, &av_NetStream_Play_Stop)
  2216. || AVMATCH(&code, &av_NetStream_Play_UnpublishNotify))
  2217. {
  2218. RTMP_Close(r);
  2219. ret = 1;
  2220. }
  2221. else if (AVMATCH(&code, &av_NetStream_Seek_Notify))
  2222. {
  2223. r->m_read.flags &= ~RTMP_READ_SEEKING;
  2224. }
  2225. else if (AVMATCH(&code, &av_NetStream_Pause_Notify))
  2226. {
  2227. if (r->m_pausing == 1 || r->m_pausing == 2)
  2228. {
  2229. RTMP_SendPause(r, FALSE, r->m_pauseStamp);
  2230. r->m_pausing = 3;
  2231. }
  2232. }
  2233. }
  2234. else if (AVMATCH(&method, &av_playlist_ready))
  2235. {
  2236. int i;
  2237. for (i = 0; i < r->m_numCalls; i++)
  2238. {
  2239. if (AVMATCH(&r->m_methodCalls[i].name, &av_set_playlist))
  2240. {
  2241. AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
  2242. break;
  2243. }
  2244. }
  2245. }
  2246. else
  2247. {
  2248. }
  2249. leave:
  2250. AMF_Reset(&obj);
  2251. return ret;
  2252. }
  2253. int
  2254. RTMP_FindFirstMatchingProperty(AMFObject *obj, const AVal *name,
  2255. AMFObjectProperty * p)
  2256. {
  2257. int n;
  2258. /* this is a small object search to locate the "duration" property */
  2259. for (n = 0; n < obj->o_num; n++)
  2260. {
  2261. AMFObjectProperty *prop = AMF_GetProp(obj, NULL, n);
  2262. if (AVMATCH(&prop->p_name, name))
  2263. {
  2264. memcpy(p, prop, sizeof(*prop));
  2265. return TRUE;
  2266. }
  2267. if (prop->p_type == AMF_OBJECT)
  2268. {
  2269. if (RTMP_FindFirstMatchingProperty(&prop->p_vu.p_object, name, p))
  2270. return TRUE;
  2271. }
  2272. }
  2273. return FALSE;
  2274. }
  2275. /* Like above, but only check if name is a prefix of property */
  2276. int
  2277. RTMP_FindPrefixProperty(AMFObject *obj, const AVal *name,
  2278. AMFObjectProperty * p)
  2279. {
  2280. int n;
  2281. for (n = 0; n < obj->o_num; n++)
  2282. {
  2283. AMFObjectProperty *prop = AMF_GetProp(obj, NULL, n);
  2284. if (prop->p_name.av_len > name->av_len &&
  2285. !memcmp(prop->p_name.av_val, name->av_val, name->av_len))
  2286. {
  2287. memcpy(p, prop, sizeof(*prop));
  2288. return TRUE;
  2289. }
  2290. if (prop->p_type == AMF_OBJECT)
  2291. {
  2292. if (RTMP_FindPrefixProperty(&prop->p_vu.p_object, name, p))
  2293. return TRUE;
  2294. }
  2295. }
  2296. return FALSE;
  2297. }
  2298. static int
  2299. DumpMetaData(AMFObject *obj)
  2300. {
  2301. AMFObjectProperty *prop;
  2302. int n;
  2303. for (n = 0; n < obj->o_num; n++)
  2304. {
  2305. prop = AMF_GetProp(obj, NULL, n);
  2306. if (prop->p_type != AMF_OBJECT)
  2307. {
  2308. char str[256] = "";
  2309. switch (prop->p_type)
  2310. {
  2311. case AMF_NUMBER:
  2312. snprintf(str, 255, "%.2f", prop->p_vu.p_number);
  2313. break;
  2314. case AMF_BOOLEAN:
  2315. snprintf(str, 255, "%s",
  2316. prop->p_vu.p_number != 0. ? "TRUE" : "FALSE");
  2317. break;
  2318. case AMF_STRING:
  2319. snprintf(str, 255, "%.*s", prop->p_vu.p_aval.av_len,
  2320. prop->p_vu.p_aval.av_val);
  2321. break;
  2322. case AMF_DATE:
  2323. snprintf(str, 255, "timestamp:%.2f", prop->p_vu.p_number);
  2324. break;
  2325. default:
  2326. snprintf(str, 255, "INVALID TYPE 0x%02x",
  2327. (unsigned char)prop->p_type);
  2328. }
  2329. if (prop->p_name.av_len)
  2330. {
  2331. /* chomp */
  2332. if (strlen(str) >= 1 && str[strlen(str) - 1] == '\n')
  2333. str[strlen(str) - 1] = '\0';
  2334. RTMP_Log(RTMP_LOGINFO, " %-22.*s%s", prop->p_name.av_len,
  2335. prop->p_name.av_val, str);
  2336. }
  2337. }
  2338. else
  2339. {
  2340. if (prop->p_name.av_len)
  2341. RTMP_Log(RTMP_LOGINFO, "%.*s:", prop->p_name.av_len, prop->p_name.av_val);
  2342. DumpMetaData(&prop->p_vu.p_object);
  2343. }
  2344. }
  2345. return FALSE;
  2346. }
  2347. SAVC(onMetaData);
  2348. SAVC(duration);
  2349. SAVC(video);
  2350. SAVC(audio);
  2351. static int
  2352. HandleMetadata(RTMP *r, char *body, unsigned int len)
  2353. {
  2354. /* allright we get some info here, so parse it and print it */
  2355. /* also keep duration or filesize to make a nice progress bar */
  2356. AMFObject obj;
  2357. AVal metastring;
  2358. int ret = FALSE;
  2359. int nRes = AMF_Decode(&obj, body, len, FALSE);
  2360. if (nRes < 0)
  2361. {
  2362. RTMP_Log(RTMP_LOGERROR, "%s, error decoding meta data packet", __FUNCTION__);
  2363. return FALSE;
  2364. }
  2365. AMF_Dump(&obj);
  2366. AMFProp_GetString(AMF_GetProp(&obj, NULL, 0), &metastring);
  2367. if (AVMATCH(&metastring, &av_onMetaData))
  2368. {
  2369. AMFObjectProperty prop;
  2370. /* Show metadata */
  2371. RTMP_Log(RTMP_LOGINFO, "Metadata:");
  2372. DumpMetaData(&obj);
  2373. if (RTMP_FindFirstMatchingProperty(&obj, &av_duration, &prop))
  2374. {
  2375. r->m_fDuration = prop.p_vu.p_number;
  2376. /*RTMP_Log(RTMP_LOGDEBUG, "Set duration: %.2f", m_fDuration); */
  2377. }
  2378. /* Search for audio or video tags */
  2379. if (RTMP_FindPrefixProperty(&obj, &av_video, &prop))
  2380. r->m_read.dataType |= 1;
  2381. if (RTMP_FindPrefixProperty(&obj, &av_audio, &prop))
  2382. r->m_read.dataType |= 4;
  2383. ret = TRUE;
  2384. }
  2385. AMF_Reset(&obj);
  2386. return ret;
  2387. }
  2388. static void
  2389. HandleChangeChunkSize(RTMP *r, const RTMPPacket *packet)
  2390. {
  2391. if (packet->m_nBodySize >= 4)
  2392. {
  2393. r->m_inChunkSize = AMF_DecodeInt32(packet->m_body);
  2394. RTMP_Log(RTMP_LOGDEBUG, "%s, received: chunk size change to %d", __FUNCTION__,
  2395. r->m_inChunkSize);
  2396. }
  2397. }
  2398. static void
  2399. HandleAudio(RTMP *r, const RTMPPacket *packet)
  2400. {
  2401. }
  2402. static void
  2403. HandleVideo(RTMP *r, const RTMPPacket *packet)
  2404. {
  2405. }
  2406. static void
  2407. HandleCtrl(RTMP *r, const RTMPPacket *packet)
  2408. {
  2409. short nType = -1;
  2410. unsigned int tmp;
  2411. if (packet->m_body && packet->m_nBodySize >= 2)
  2412. nType = AMF_DecodeInt16(packet->m_body);
  2413. RTMP_Log(RTMP_LOGDEBUG, "%s, received ctrl. type: %d, len: %d", __FUNCTION__, nType,
  2414. packet->m_nBodySize);
  2415. /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
  2416. if (packet->m_nBodySize >= 6)
  2417. {
  2418. switch (nType)
  2419. {
  2420. case 0:
  2421. tmp = AMF_DecodeInt32(packet->m_body + 2);
  2422. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream Begin %d", __FUNCTION__, tmp);
  2423. break;
  2424. case 1:
  2425. tmp = AMF_DecodeInt32(packet->m_body + 2);
  2426. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream EOF %d", __FUNCTION__, tmp);
  2427. if (r->m_pausing == 1)
  2428. r->m_pausing = 2;
  2429. break;
  2430. case 2:
  2431. tmp = AMF_DecodeInt32(packet->m_body + 2);
  2432. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream Dry %d", __FUNCTION__, tmp);
  2433. break;
  2434. case 4:
  2435. tmp = AMF_DecodeInt32(packet->m_body + 2);
  2436. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream IsRecorded %d", __FUNCTION__, tmp);
  2437. break;
  2438. case 6: /* server ping. reply with pong. */
  2439. tmp = AMF_DecodeInt32(packet->m_body + 2);
  2440. RTMP_Log(RTMP_LOGDEBUG, "%s, Ping %d", __FUNCTION__, tmp);
  2441. RTMP_SendCtrl(r, 0x07, tmp, 0);
  2442. break;
  2443. /* FMS 3.5 servers send the following two controls to let the client
  2444. * know when the server has sent a complete buffer. I.e., when the
  2445. * server has sent an amount of data equal to m_nBufferMS in duration.
  2446. * The server meters its output so that data arrives at the client
  2447. * in realtime and no faster.
  2448. *
  2449. * The rtmpdump program tries to set m_nBufferMS as large as
  2450. * possible, to force the server to send data as fast as possible.
  2451. * In practice, the server appears to cap this at about 1 hour's
  2452. * worth of data. After the server has sent a complete buffer, and
  2453. * sends this BufferEmpty message, it will wait until the play
  2454. * duration of that buffer has passed before sending a new buffer.
  2455. * The BufferReady message will be sent when the new buffer starts.
  2456. * (There is no BufferReady message for the very first buffer;
  2457. * presumably the Stream Begin message is sufficient for that
  2458. * purpose.)
  2459. *
  2460. * If the network speed is much faster than the data bitrate, then
  2461. * there may be long delays between the end of one buffer and the
  2462. * start of the next.
  2463. *
  2464. * Since usually the network allows data to be sent at
  2465. * faster than realtime, and rtmpdump wants to download the data
  2466. * as fast as possible, we use this RTMP_LF_BUFX hack: when we
  2467. * get the BufferEmpty message, we send a Pause followed by an
  2468. * Unpause. This causes the server to send the next buffer immediately
  2469. * instead of waiting for the full duration to elapse. (That's
  2470. * also the purpose of the ToggleStream function, which rtmpdump
  2471. * calls if we get a read timeout.)
  2472. *
  2473. * Media player apps don't need this hack since they are just
  2474. * going to play the data in realtime anyway. It also doesn't work
  2475. * for live streams since they obviously can only be sent in
  2476. * realtime. And it's all moot if the network speed is actually
  2477. * slower than the media bitrate.
  2478. */
  2479. case 31:
  2480. tmp = AMF_DecodeInt32(packet->m_body + 2);
  2481. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream BufferEmpty %d", __FUNCTION__, tmp);
  2482. if (!(r->Link.lFlags & RTMP_LF_BUFX))
  2483. break;
  2484. if (!r->m_pausing)
  2485. {
  2486. r->m_pauseStamp = r->m_channelTimestamp[r->m_mediaChannel];
  2487. RTMP_SendPause(r, TRUE, r->m_pauseStamp);
  2488. r->m_pausing = 1;
  2489. }
  2490. else if (r->m_pausing == 2)
  2491. {
  2492. RTMP_SendPause(r, FALSE, r->m_pauseStamp);
  2493. r->m_pausing = 3;
  2494. }
  2495. break;
  2496. case 32:
  2497. tmp = AMF_DecodeInt32(packet->m_body + 2);
  2498. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream BufferReady %d", __FUNCTION__, tmp);
  2499. break;
  2500. default:
  2501. tmp = AMF_DecodeInt32(packet->m_body + 2);
  2502. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream xx %d", __FUNCTION__, tmp);
  2503. break;
  2504. }
  2505. }
  2506. if (nType == 0x1A)
  2507. {
  2508. RTMP_Log(RTMP_LOGDEBUG, "%s, SWFVerification ping received: ", __FUNCTION__);
  2509. if (packet->m_nBodySize > 2 && packet->m_body[2] > 0x01)
  2510. {
  2511. RTMP_Log(RTMP_LOGERROR,
  2512. "%s: SWFVerification Type %d request not supported! Patches welcome...",
  2513. __FUNCTION__, packet->m_body[2]);
  2514. }
  2515. #ifdef CRYPTO
  2516. /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
  2517. /* respond with HMAC SHA256 of decompressed SWF, key is the 30byte player key, also the last 30 bytes of the server handshake are applied */
  2518. else if (r->Link.SWFSize)
  2519. {
  2520. RTMP_SendCtrl(r, 0x1B, 0, 0);
  2521. }
  2522. else
  2523. {
  2524. RTMP_Log(RTMP_LOGERROR,
  2525. "%s: Ignoring SWFVerification request, use --swfVfy!",
  2526. __FUNCTION__);
  2527. }
  2528. #else
  2529. RTMP_Log(RTMP_LOGERROR,
  2530. "%s: Ignoring SWFVerification request, no CRYPTO support!",
  2531. __FUNCTION__);
  2532. #endif
  2533. }
  2534. }
  2535. static void
  2536. HandleServerBW(RTMP *r, const RTMPPacket *packet)
  2537. {
  2538. r->m_nServerBW = AMF_DecodeInt32(packet->m_body);
  2539. RTMP_Log(RTMP_LOGDEBUG, "%s: server BW = %d", __FUNCTION__, r->m_nServerBW);
  2540. }
  2541. static void
  2542. HandleClientBW(RTMP *r, const RTMPPacket *packet)
  2543. {
  2544. r->m_nClientBW = AMF_DecodeInt32(packet->m_body);
  2545. if (packet->m_nBodySize > 4)
  2546. r->m_nClientBW2 = packet->m_body[4];
  2547. else
  2548. r->m_nClientBW2 = -1;
  2549. RTMP_Log(RTMP_LOGDEBUG, "%s: client BW = %d %d", __FUNCTION__, r->m_nClientBW,
  2550. r->m_nClientBW2);
  2551. }
  2552. static int
  2553. DecodeInt32LE(const char *data)
  2554. {
  2555. unsigned char *c = (unsigned char *)data;
  2556. unsigned int val;
  2557. val = (c[3] << 24) | (c[2] << 16) | (c[1] << 8) | c[0];
  2558. return val;
  2559. }
  2560. static int
  2561. EncodeInt32LE(char *output, int nVal)
  2562. {
  2563. output[0] = nVal;
  2564. nVal >>= 8;
  2565. output[1] = nVal;
  2566. nVal >>= 8;
  2567. output[2] = nVal;
  2568. nVal >>= 8;
  2569. output[3] = nVal;
  2570. return 4;
  2571. }
  2572. int
  2573. RTMP_ReadPacket(RTMP *r, RTMPPacket *packet)
  2574. {
  2575. uint8_t hbuf[RTMP_MAX_HEADER_SIZE] = { 0 };
  2576. char *header = (char *)hbuf;
  2577. int nSize, hSize, nToRead, nChunk;
  2578. int didAlloc = FALSE;
  2579. RTMP_Log(RTMP_LOGDEBUG2, "%s: fd=%d", __FUNCTION__, r->m_sb.sb_socket);
  2580. if (ReadN(r, (char *)hbuf, 1) == 0)
  2581. {
  2582. RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet header", __FUNCTION__);
  2583. return FALSE;
  2584. }
  2585. packet->m_headerType = (hbuf[0] & 0xc0) >> 6;
  2586. packet->m_nChannel = (hbuf[0] & 0x3f);
  2587. header++;
  2588. if (packet->m_nChannel == 0)
  2589. {
  2590. if (ReadN(r, (char *)&hbuf[1], 1) != 1)
  2591. {
  2592. RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet header 2nd byte",
  2593. __FUNCTION__);
  2594. return FALSE;
  2595. }
  2596. packet->m_nChannel = hbuf[1];
  2597. packet->m_nChannel += 64;
  2598. header++;
  2599. }
  2600. else if (packet->m_nChannel == 1)
  2601. {
  2602. int tmp;
  2603. if (ReadN(r, (char *)&hbuf[1], 2) != 2)
  2604. {
  2605. RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet header 3nd byte",
  2606. __FUNCTION__);
  2607. return FALSE;
  2608. }
  2609. tmp = (hbuf[2] << 8) + hbuf[1];
  2610. packet->m_nChannel = tmp + 64;
  2611. RTMP_Log(RTMP_LOGDEBUG, "%s, m_nChannel: %0x", __FUNCTION__, packet->m_nChannel);
  2612. header += 2;
  2613. }
  2614. nSize = packetSize[packet->m_headerType];
  2615. if (nSize == RTMP_LARGE_HEADER_SIZE) /* if we get a full header the timestamp is absolute */
  2616. packet->m_hasAbsTimestamp = TRUE;
  2617. else if (nSize < RTMP_LARGE_HEADER_SIZE)
  2618. { /* using values from the last message of this channel */
  2619. if (r->m_vecChannelsIn[packet->m_nChannel])
  2620. memcpy(packet, r->m_vecChannelsIn[packet->m_nChannel],
  2621. sizeof(RTMPPacket));
  2622. }
  2623. nSize--;
  2624. if (nSize > 0 && ReadN(r, header, nSize) != nSize)
  2625. {
  2626. RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet header. type: %x",
  2627. __FUNCTION__, (unsigned int)hbuf[0]);
  2628. return FALSE;
  2629. }
  2630. hSize = nSize + (header - (char *)hbuf);
  2631. if (nSize >= 3)
  2632. {
  2633. packet->m_nTimeStamp = AMF_DecodeInt24(header);
  2634. /*RTMP_Log(RTMP_LOGDEBUG, "%s, reading RTMP packet chunk on channel %x, headersz %i, timestamp %i, abs timestamp %i", __FUNCTION__, packet.m_nChannel, nSize, packet.m_nTimeStamp, packet.m_hasAbsTimestamp); */
  2635. if (nSize >= 6)
  2636. {
  2637. packet->m_nBodySize = AMF_DecodeInt24(header + 3);
  2638. packet->m_nBytesRead = 0;
  2639. RTMPPacket_Free(packet);
  2640. if (nSize > 6)
  2641. {
  2642. packet->m_packetType = header[6];
  2643. if (nSize == 11)
  2644. packet->m_nInfoField2 = DecodeInt32LE(header + 7);
  2645. }
  2646. }
  2647. if (packet->m_nTimeStamp == 0xffffff)
  2648. {
  2649. if (ReadN(r, header + nSize, 4) != 4)
  2650. {
  2651. RTMP_Log(RTMP_LOGERROR, "%s, failed to read extended timestamp",
  2652. __FUNCTION__);
  2653. return FALSE;
  2654. }
  2655. packet->m_nTimeStamp = AMF_DecodeInt32(header + nSize);
  2656. hSize += 4;
  2657. }
  2658. }
  2659. RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)hbuf, hSize);
  2660. if (packet->m_nBodySize > 0 && packet->m_body == NULL)
  2661. {
  2662. if (!RTMPPacket_Alloc(packet, packet->m_nBodySize))
  2663. {
  2664. RTMP_Log(RTMP_LOGDEBUG, "%s, failed to allocate packet", __FUNCTION__);
  2665. return FALSE;
  2666. }
  2667. didAlloc = TRUE;
  2668. packet->m_headerType = (hbuf[0] & 0xc0) >> 6;
  2669. }
  2670. nToRead = packet->m_nBodySize - packet->m_nBytesRead;
  2671. nChunk = r->m_inChunkSize;
  2672. if (nToRead < nChunk)
  2673. nChunk = nToRead;
  2674. /* Does the caller want the raw chunk? */
  2675. if (packet->m_chunk)
  2676. {
  2677. packet->m_chunk->c_headerSize = hSize;
  2678. memcpy(packet->m_chunk->c_header, hbuf, hSize);
  2679. packet->m_chunk->c_chunk = packet->m_body + packet->m_nBytesRead;
  2680. packet->m_chunk->c_chunkSize = nChunk;
  2681. }
  2682. if (ReadN(r, packet->m_body + packet->m_nBytesRead, nChunk) != nChunk)
  2683. {
  2684. RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet body. len: %u",
  2685. __FUNCTION__, packet->m_nBodySize);
  2686. return FALSE;
  2687. }
  2688. RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)packet->m_body + packet->m_nBytesRead, nChunk);
  2689. packet->m_nBytesRead += nChunk;
  2690. /* keep the packet as ref for other packets on this channel */
  2691. if (!r->m_vecChannelsIn[packet->m_nChannel])
  2692. r->m_vecChannelsIn[packet->m_nChannel] = malloc(sizeof(RTMPPacket));
  2693. memcpy(r->m_vecChannelsIn[packet->m_nChannel], packet, sizeof(RTMPPacket));
  2694. if (RTMPPacket_IsReady(packet))
  2695. {
  2696. /* make packet's timestamp absolute */
  2697. if (!packet->m_hasAbsTimestamp)
  2698. packet->m_nTimeStamp += r->m_channelTimestamp[packet->m_nChannel]; /* timestamps seem to be always relative!! */
  2699. r->m_channelTimestamp[packet->m_nChannel] = packet->m_nTimeStamp;
  2700. /* reset the data from the stored packet. we keep the header since we may use it later if a new packet for this channel */
  2701. /* arrives and requests to re-use some info (small packet header) */
  2702. r->m_vecChannelsIn[packet->m_nChannel]->m_body = NULL;
  2703. r->m_vecChannelsIn[packet->m_nChannel]->m_nBytesRead = 0;
  2704. r->m_vecChannelsIn[packet->m_nChannel]->m_hasAbsTimestamp = FALSE; /* can only be false if we reuse header */
  2705. }
  2706. else
  2707. {
  2708. packet->m_body = NULL; /* so it won't be erased on free */
  2709. }
  2710. return TRUE;
  2711. }
  2712. #ifndef CRYPTO
  2713. static int
  2714. HandShake(RTMP *r, int FP9HandShake)
  2715. {
  2716. int i;
  2717. uint32_t uptime, suptime;
  2718. int bMatch;
  2719. char type;
  2720. char clientbuf[RTMP_SIG_SIZE + 1], *clientsig = clientbuf + 1;
  2721. char serversig[RTMP_SIG_SIZE];
  2722. clientbuf[0] = 0x03; /* not encrypted */
  2723. uptime = htonl(RTMP_GetTime());
  2724. memcpy(clientsig, &uptime, 4);
  2725. memset(&clientsig[4], 0, 4);
  2726. #ifdef _DEBUG
  2727. for (i = 8; i < RTMP_SIG_SIZE; i++)
  2728. clientsig[i] = 0xff;
  2729. #else
  2730. for (i = 8; i < RTMP_SIG_SIZE; i++)
  2731. clientsig[i] = (char)(rand() % 256);
  2732. #endif
  2733. if (!WriteN(r, clientbuf, RTMP_SIG_SIZE + 1))
  2734. return FALSE;
  2735. if (ReadN(r, &type, 1) != 1) /* 0x03 or 0x06 */
  2736. return FALSE;
  2737. RTMP_Log(RTMP_LOGDEBUG, "%s: Type Answer : %02X", __FUNCTION__, type);
  2738. if (type != clientbuf[0])
  2739. RTMP_Log(RTMP_LOGWARNING, "%s: Type mismatch: client sent %d, server answered %d",
  2740. __FUNCTION__, clientbuf[0], type);
  2741. if (ReadN(r, serversig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
  2742. return FALSE;
  2743. /* decode server response */
  2744. memcpy(&suptime, serversig, 4);
  2745. suptime = ntohl(suptime);
  2746. RTMP_Log(RTMP_LOGDEBUG, "%s: Server Uptime : %d", __FUNCTION__, suptime);
  2747. RTMP_Log(RTMP_LOGDEBUG, "%s: FMS Version : %d.%d.%d.%d", __FUNCTION__,
  2748. serversig[4], serversig[5], serversig[6], serversig[7]);
  2749. /* 2nd part of handshake */
  2750. if (!WriteN(r, serversig, RTMP_SIG_SIZE))
  2751. return FALSE;
  2752. if (ReadN(r, serversig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
  2753. return FALSE;
  2754. bMatch = (memcmp(serversig, clientsig, RTMP_SIG_SIZE) == 0);
  2755. if (!bMatch)
  2756. {
  2757. RTMP_Log(RTMP_LOGWARNING, "%s, client signature does not match!", __FUNCTION__);
  2758. }
  2759. return TRUE;
  2760. }
  2761. static int
  2762. SHandShake(RTMP *r)
  2763. {
  2764. int i;
  2765. char serverbuf[RTMP_SIG_SIZE + 1], *serversig = serverbuf + 1;
  2766. char clientsig[RTMP_SIG_SIZE];
  2767. uint32_t uptime;
  2768. int bMatch;
  2769. if (ReadN(r, serverbuf, 1) != 1) /* 0x03 or 0x06 */
  2770. return FALSE;
  2771. RTMP_Log(RTMP_LOGDEBUG, "%s: Type Request : %02X", __FUNCTION__, serverbuf[0]);
  2772. if (serverbuf[0] != 3)
  2773. {
  2774. RTMP_Log(RTMP_LOGERROR, "%s: Type unknown: client sent %02X",
  2775. __FUNCTION__, serverbuf[0]);
  2776. return FALSE;
  2777. }
  2778. uptime = htonl(RTMP_GetTime());
  2779. memcpy(serversig, &uptime, 4);
  2780. memset(&serversig[4], 0, 4);
  2781. #ifdef _DEBUG
  2782. for (i = 8; i < RTMP_SIG_SIZE; i++)
  2783. serversig[i] = 0xff;
  2784. #else
  2785. for (i = 8; i < RTMP_SIG_SIZE; i++)
  2786. serversig[i] = (char)(rand() % 256);
  2787. #endif
  2788. if (!WriteN(r, serverbuf, RTMP_SIG_SIZE + 1))
  2789. return FALSE;
  2790. if (ReadN(r, clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
  2791. return FALSE;
  2792. /* decode client response */
  2793. memcpy(&uptime, clientsig, 4);
  2794. uptime = ntohl(uptime);
  2795. RTMP_Log(RTMP_LOGDEBUG, "%s: Client Uptime : %d", __FUNCTION__, uptime);
  2796. RTMP_Log(RTMP_LOGDEBUG, "%s: Player Version: %d.%d.%d.%d", __FUNCTION__,
  2797. clientsig[4], clientsig[5], clientsig[6], clientsig[7]);
  2798. /* 2nd part of handshake */
  2799. if (!WriteN(r, clientsig, RTMP_SIG_SIZE))
  2800. return FALSE;
  2801. if (ReadN(r, clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
  2802. return FALSE;
  2803. bMatch = (memcmp(serversig, clientsig, RTMP_SIG_SIZE) == 0);
  2804. if (!bMatch)
  2805. {
  2806. RTMP_Log(RTMP_LOGWARNING, "%s, client signature does not match!", __FUNCTION__);
  2807. }
  2808. return TRUE;
  2809. }
  2810. #endif
  2811. int
  2812. RTMP_SendChunk(RTMP *r, RTMPChunk *chunk)
  2813. {
  2814. int wrote;
  2815. char hbuf[RTMP_MAX_HEADER_SIZE];
  2816. RTMP_Log(RTMP_LOGDEBUG2, "%s: fd=%d, size=%d", __FUNCTION__, r->m_sb.sb_socket,
  2817. chunk->c_chunkSize);
  2818. RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)chunk->c_header, chunk->c_headerSize);
  2819. if (chunk->c_chunkSize)
  2820. {
  2821. char *ptr = chunk->c_chunk - chunk->c_headerSize;
  2822. RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)chunk->c_chunk, chunk->c_chunkSize);
  2823. /* save header bytes we're about to overwrite */
  2824. memcpy(hbuf, ptr, chunk->c_headerSize);
  2825. memcpy(ptr, chunk->c_header, chunk->c_headerSize);
  2826. wrote = WriteN(r, ptr, chunk->c_headerSize + chunk->c_chunkSize);
  2827. memcpy(ptr, hbuf, chunk->c_headerSize);
  2828. }
  2829. else
  2830. wrote = WriteN(r, chunk->c_header, chunk->c_headerSize);
  2831. return wrote;
  2832. }
  2833. int
  2834. RTMP_SendPacket(RTMP *r, RTMPPacket *packet, int queue)
  2835. {
  2836. const RTMPPacket *prevPacket = r->m_vecChannelsOut[packet->m_nChannel];
  2837. uint32_t last = 0;
  2838. int nSize;
  2839. int hSize, cSize;
  2840. char *header, *hptr, *hend, hbuf[RTMP_MAX_HEADER_SIZE], c;
  2841. uint32_t t;
  2842. char *buffer, *tbuf = NULL, *toff = NULL;
  2843. int nChunkSize;
  2844. int tlen;
  2845. if (prevPacket && packet->m_headerType != RTMP_PACKET_SIZE_LARGE)
  2846. {
  2847. /* compress a bit by using the prev packet's attributes */
  2848. if (prevPacket->m_nBodySize == packet->m_nBodySize
  2849. && prevPacket->m_packetType == packet->m_packetType
  2850. && packet->m_headerType == RTMP_PACKET_SIZE_MEDIUM)
  2851. packet->m_headerType = RTMP_PACKET_SIZE_SMALL;
  2852. if (prevPacket->m_nTimeStamp == packet->m_nTimeStamp
  2853. && packet->m_headerType == RTMP_PACKET_SIZE_SMALL)
  2854. packet->m_headerType = RTMP_PACKET_SIZE_MINIMUM;
  2855. last = prevPacket->m_nTimeStamp;
  2856. }
  2857. if (packet->m_headerType > 3) /* sanity */
  2858. {
  2859. RTMP_Log(RTMP_LOGERROR, "sanity failed!! trying to send header of type: 0x%02x.",
  2860. (unsigned char)packet->m_headerType);
  2861. return FALSE;
  2862. }
  2863. nSize = packetSize[packet->m_headerType];
  2864. hSize = nSize; cSize = 0;
  2865. t = packet->m_nTimeStamp - last;
  2866. if (packet->m_body)
  2867. {
  2868. header = packet->m_body - nSize;
  2869. hend = packet->m_body;
  2870. }
  2871. else
  2872. {
  2873. header = hbuf + 6;
  2874. hend = hbuf + sizeof(hbuf);
  2875. }
  2876. if (packet->m_nChannel > 319)
  2877. cSize = 2;
  2878. else if (packet->m_nChannel > 63)
  2879. cSize = 1;
  2880. if (cSize)
  2881. {
  2882. header -= cSize;
  2883. hSize += cSize;
  2884. }
  2885. if (nSize > 1 && t >= 0xffffff)
  2886. {
  2887. header -= 4;
  2888. hSize += 4;
  2889. }
  2890. hptr = header;
  2891. c = packet->m_headerType << 6;
  2892. switch (cSize)
  2893. {
  2894. case 0:
  2895. c |= packet->m_nChannel;
  2896. break;
  2897. case 1:
  2898. break;
  2899. case 2:
  2900. c |= 1;
  2901. break;
  2902. }
  2903. *hptr++ = c;
  2904. if (cSize)
  2905. {
  2906. int tmp = packet->m_nChannel - 64;
  2907. *hptr++ = tmp & 0xff;
  2908. if (cSize == 2)
  2909. *hptr++ = tmp >> 8;
  2910. }
  2911. if (nSize > 1)
  2912. {
  2913. hptr = AMF_EncodeInt24(hptr, hend, t > 0xffffff ? 0xffffff : t);
  2914. }
  2915. if (nSize > 4)
  2916. {
  2917. hptr = AMF_EncodeInt24(hptr, hend, packet->m_nBodySize);
  2918. *hptr++ = packet->m_packetType;
  2919. }
  2920. if (nSize > 8)
  2921. hptr += EncodeInt32LE(hptr, packet->m_nInfoField2);
  2922. if (nSize > 1 && t >= 0xffffff)
  2923. hptr = AMF_EncodeInt32(hptr, hend, t);
  2924. nSize = packet->m_nBodySize;
  2925. buffer = packet->m_body;
  2926. nChunkSize = r->m_outChunkSize;
  2927. RTMP_Log(RTMP_LOGDEBUG2, "%s: fd=%d, size=%d", __FUNCTION__, r->m_sb.sb_socket,
  2928. nSize);
  2929. /* send all chunks in one HTTP request */
  2930. if (r->Link.protocol & RTMP_FEATURE_HTTP)
  2931. {
  2932. int chunks = (nSize+nChunkSize-1) / nChunkSize;
  2933. if (chunks > 1)
  2934. {
  2935. tlen = chunks * (cSize + 1) + nSize + hSize;
  2936. tbuf = malloc(tlen);
  2937. if (!tbuf)
  2938. return FALSE;
  2939. toff = tbuf;
  2940. }
  2941. }
  2942. while (nSize + hSize)
  2943. {
  2944. int wrote;
  2945. if (nSize < nChunkSize)
  2946. nChunkSize = nSize;
  2947. RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)header, hSize);
  2948. RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)buffer, nChunkSize);
  2949. if (tbuf)
  2950. {
  2951. memcpy(toff, header, nChunkSize + hSize);
  2952. toff += nChunkSize + hSize;
  2953. }
  2954. else
  2955. {
  2956. wrote = WriteN(r, header, nChunkSize + hSize);
  2957. if (!wrote)
  2958. return FALSE;
  2959. }
  2960. nSize -= nChunkSize;
  2961. buffer += nChunkSize;
  2962. hSize = 0;
  2963. if (nSize > 0)
  2964. {
  2965. header = buffer - 1;
  2966. hSize = 1;
  2967. if (cSize)
  2968. {
  2969. header -= cSize;
  2970. hSize += cSize;
  2971. }
  2972. *header = (0xc0 | c);
  2973. if (cSize)
  2974. {
  2975. int tmp = packet->m_nChannel - 64;
  2976. header[1] = tmp & 0xff;
  2977. if (cSize == 2)
  2978. header[2] = tmp >> 8;
  2979. }
  2980. }
  2981. }
  2982. if (tbuf)
  2983. {
  2984. int wrote = WriteN(r, tbuf, toff-tbuf);
  2985. free(tbuf);
  2986. tbuf = NULL;
  2987. if (!wrote)
  2988. return FALSE;
  2989. }
  2990. /* we invoked a remote method */
  2991. if (packet->m_packetType == RTMP_PACKET_TYPE_INVOKE)
  2992. {
  2993. AVal method;
  2994. char *ptr;
  2995. ptr = packet->m_body + 1;
  2996. AMF_DecodeString(ptr, &method);
  2997. RTMP_Log(RTMP_LOGDEBUG, "Invoking %s", method.av_val);
  2998. /* keep it in call queue till result arrives */
  2999. if (queue) {
  3000. int txn;
  3001. ptr += 3 + method.av_len;
  3002. txn = (int)AMF_DecodeNumber(ptr);
  3003. AV_queue(&r->m_methodCalls, &r->m_numCalls, &method, txn);
  3004. }
  3005. }
  3006. if (!r->m_vecChannelsOut[packet->m_nChannel])
  3007. r->m_vecChannelsOut[packet->m_nChannel] = malloc(sizeof(RTMPPacket));
  3008. memcpy(r->m_vecChannelsOut[packet->m_nChannel], packet, sizeof(RTMPPacket));
  3009. return TRUE;
  3010. }
  3011. int
  3012. RTMP_Serve(RTMP *r)
  3013. {
  3014. return SHandShake(r);
  3015. }
  3016. void
  3017. RTMP_Close(RTMP *r)
  3018. {
  3019. int i;
  3020. if (RTMP_IsConnected(r))
  3021. {
  3022. if (r->m_stream_id > 0)
  3023. {
  3024. i = r->m_stream_id;
  3025. r->m_stream_id = 0;
  3026. if ((r->Link.protocol & RTMP_FEATURE_WRITE))
  3027. SendFCUnpublish(r);
  3028. SendDeleteStream(r, i);
  3029. }
  3030. if (r->m_clientID.av_val)
  3031. {
  3032. HTTP_Post(r, RTMPT_CLOSE, "", 1);
  3033. free(r->m_clientID.av_val);
  3034. r->m_clientID.av_val = NULL;
  3035. r->m_clientID.av_len = 0;
  3036. }
  3037. RTMPSockBuf_Close(&r->m_sb);
  3038. }
  3039. r->m_stream_id = -1;
  3040. r->m_sb.sb_socket = -1;
  3041. r->m_nBWCheckCounter = 0;
  3042. r->m_nBytesIn = 0;
  3043. r->m_nBytesInSent = 0;
  3044. if (r->m_read.flags & RTMP_READ_HEADER) {
  3045. free(r->m_read.buf);
  3046. r->m_read.buf = NULL;
  3047. }
  3048. r->m_read.dataType = 0;
  3049. r->m_read.flags = 0;
  3050. r->m_read.status = 0;
  3051. r->m_read.nResumeTS = 0;
  3052. r->m_read.nIgnoredFrameCounter = 0;
  3053. r->m_read.nIgnoredFlvFrameCounter = 0;
  3054. r->m_write.m_nBytesRead = 0;
  3055. RTMPPacket_Free(&r->m_write);
  3056. for (i = 0; i < RTMP_CHANNELS; i++)
  3057. {
  3058. if (r->m_vecChannelsIn[i])
  3059. {
  3060. RTMPPacket_Free(r->m_vecChannelsIn[i]);
  3061. free(r->m_vecChannelsIn[i]);
  3062. r->m_vecChannelsIn[i] = NULL;
  3063. }
  3064. if (r->m_vecChannelsOut[i])
  3065. {
  3066. free(r->m_vecChannelsOut[i]);
  3067. r->m_vecChannelsOut[i] = NULL;
  3068. }
  3069. }
  3070. AV_clear(r->m_methodCalls, r->m_numCalls);
  3071. r->m_methodCalls = NULL;
  3072. r->m_numCalls = 0;
  3073. r->m_numInvokes = 0;
  3074. r->m_bPlaying = FALSE;
  3075. r->m_sb.sb_size = 0;
  3076. r->m_msgCounter = 0;
  3077. r->m_resplen = 0;
  3078. r->m_unackd = 0;
  3079. free(r->Link.playpath0.av_val);
  3080. r->Link.playpath0.av_val = NULL;
  3081. if (r->Link.lFlags & RTMP_LF_FTCU)
  3082. {
  3083. free(r->Link.tcUrl.av_val);
  3084. r->Link.tcUrl.av_val = NULL;
  3085. r->Link.lFlags ^= RTMP_LF_FTCU;
  3086. }
  3087. #ifdef CRYPTO
  3088. if (r->Link.dh)
  3089. {
  3090. MDH_free(r->Link.dh);
  3091. r->Link.dh = NULL;
  3092. }
  3093. if (r->Link.rc4keyIn)
  3094. {
  3095. RC4_free(r->Link.rc4keyIn);
  3096. r->Link.rc4keyIn = NULL;
  3097. }
  3098. if (r->Link.rc4keyOut)
  3099. {
  3100. RC4_free(r->Link.rc4keyOut);
  3101. r->Link.rc4keyOut = NULL;
  3102. }
  3103. #endif
  3104. }
  3105. int
  3106. RTMPSockBuf_Fill(RTMPSockBuf *sb)
  3107. {
  3108. int nBytes;
  3109. if (!sb->sb_size)
  3110. sb->sb_start = sb->sb_buf;
  3111. while (1)
  3112. {
  3113. nBytes = sizeof(sb->sb_buf) - sb->sb_size - (sb->sb_start - sb->sb_buf);
  3114. #if defined(CRYPTO) && !defined(NO_SSL)
  3115. if (sb->sb_ssl)
  3116. {
  3117. nBytes = TLS_read(sb->sb_ssl, sb->sb_start + sb->sb_size, nBytes);
  3118. }
  3119. else
  3120. #endif
  3121. {
  3122. nBytes = recv(sb->sb_socket, sb->sb_start + sb->sb_size, nBytes, 0);
  3123. }
  3124. if (nBytes != -1)
  3125. {
  3126. sb->sb_size += nBytes;
  3127. }
  3128. else
  3129. {
  3130. int sockerr = GetSockError();
  3131. RTMP_Log(RTMP_LOGDEBUG, "%s, recv returned %d. GetSockError(): %d (%s)",
  3132. __FUNCTION__, nBytes, sockerr, strerror(sockerr));
  3133. if (sockerr == EINTR && !RTMP_ctrlC)
  3134. continue;
  3135. if (sockerr == EWOULDBLOCK || sockerr == EAGAIN)
  3136. {
  3137. sb->sb_timedout = TRUE;
  3138. nBytes = 0;
  3139. }
  3140. }
  3141. break;
  3142. }
  3143. return nBytes;
  3144. }
  3145. int
  3146. RTMPSockBuf_Send(RTMPSockBuf *sb, const char *buf, int len)
  3147. {
  3148. int rc;
  3149. #ifdef _DEBUG
  3150. fwrite(buf, 1, len, netstackdump);
  3151. #endif
  3152. #if defined(CRYPTO) && !defined(NO_SSL)
  3153. if (sb->sb_ssl)
  3154. {
  3155. rc = TLS_write(sb->sb_ssl, buf, len);
  3156. }
  3157. else
  3158. #endif
  3159. {
  3160. rc = send(sb->sb_socket, buf, len, 0);
  3161. }
  3162. return rc;
  3163. }
  3164. int
  3165. RTMPSockBuf_Close(RTMPSockBuf *sb)
  3166. {
  3167. #if defined(CRYPTO) && !defined(NO_SSL)
  3168. if (sb->sb_ssl)
  3169. {
  3170. TLS_shutdown(sb->sb_ssl);
  3171. TLS_close(sb->sb_ssl);
  3172. sb->sb_ssl = NULL;
  3173. }
  3174. #endif
  3175. if (sb->sb_socket != -1)
  3176. return closesocket(sb->sb_socket);
  3177. return 0;
  3178. }
  3179. #define HEX2BIN(a) (((a)&0x40)?((a)&0xf)+9:((a)&0xf))
  3180. static void
  3181. DecodeTEA(AVal *key, AVal *text)
  3182. {
  3183. uint32_t *v, k[4] = { 0 }, u;
  3184. uint32_t z, y, sum = 0, e, DELTA = 0x9e3779b9;
  3185. int32_t p, q;
  3186. int i, n;
  3187. unsigned char *ptr, *out;
  3188. /* prep key: pack 1st 16 chars into 4 LittleEndian ints */
  3189. ptr = (unsigned char *)key->av_val;
  3190. u = 0;
  3191. n = 0;
  3192. v = k;
  3193. p = key->av_len > 16 ? 16 : key->av_len;
  3194. for (i = 0; i < p; i++)
  3195. {
  3196. u |= ptr[i] << (n * 8);
  3197. if (n == 3)
  3198. {
  3199. *v++ = u;
  3200. u = 0;
  3201. n = 0;
  3202. }
  3203. else
  3204. {
  3205. n++;
  3206. }
  3207. }
  3208. /* any trailing chars */
  3209. if (u)
  3210. *v = u;
  3211. /* prep text: hex2bin, multiples of 4 */
  3212. n = (text->av_len + 7) / 8;
  3213. out = malloc(n * 8);
  3214. ptr = (unsigned char *)text->av_val;
  3215. v = (uint32_t *) out;
  3216. for (i = 0; i < n; i++)
  3217. {
  3218. u = (HEX2BIN(ptr[0]) << 4) + HEX2BIN(ptr[1]);
  3219. u |= ((HEX2BIN(ptr[2]) << 4) + HEX2BIN(ptr[3])) << 8;
  3220. u |= ((HEX2BIN(ptr[4]) << 4) + HEX2BIN(ptr[5])) << 16;
  3221. u |= ((HEX2BIN(ptr[6]) << 4) + HEX2BIN(ptr[7])) << 24;
  3222. *v++ = u;
  3223. ptr += 8;
  3224. }
  3225. v = (uint32_t *) out;
  3226. /* http://www.movable-type.co.uk/scripts/tea-block.html */
  3227. #define MX (((z>>5)^(y<<2)) + ((y>>3)^(z<<4))) ^ ((sum^y) + (k[(p&3)^e]^z));
  3228. z = v[n - 1];
  3229. y = v[0];
  3230. q = 6 + 52 / n;
  3231. sum = q * DELTA;
  3232. while (sum != 0)
  3233. {
  3234. e = sum >> 2 & 3;
  3235. for (p = n - 1; p > 0; p--)
  3236. z = v[p - 1], y = v[p] -= MX;
  3237. z = v[n - 1];
  3238. y = v[0] -= MX;
  3239. sum -= DELTA;
  3240. }
  3241. text->av_len /= 2;
  3242. memcpy(text->av_val, out, text->av_len);
  3243. free(out);
  3244. }
  3245. static int
  3246. HTTP_Post(RTMP *r, RTMPTCmd cmd, const char *buf, int len)
  3247. {
  3248. char hbuf[512];
  3249. int hlen = snprintf(hbuf, sizeof(hbuf), "POST /%s%s/%d HTTP/1.1\r\n"
  3250. "Host: %.*s:%d\r\n"
  3251. "Accept: */*\r\n"
  3252. "User-Agent: Shockwave Flash\n"
  3253. "Connection: Keep-Alive\n"
  3254. "Cache-Control: no-cache\r\n"
  3255. "Content-type: application/x-fcs\r\n"
  3256. "Content-length: %d\r\n\r\n", RTMPT_cmds[cmd],
  3257. r->m_clientID.av_val ? r->m_clientID.av_val : "",
  3258. r->m_msgCounter, r->Link.hostname.av_len, r->Link.hostname.av_val,
  3259. r->Link.port, len);
  3260. RTMPSockBuf_Send(&r->m_sb, hbuf, hlen);
  3261. hlen = RTMPSockBuf_Send(&r->m_sb, buf, len);
  3262. r->m_msgCounter++;
  3263. r->m_unackd++;
  3264. return hlen;
  3265. }
  3266. static int
  3267. HTTP_read(RTMP *r, int fill)
  3268. {
  3269. char *ptr;
  3270. int hlen;
  3271. if (fill)
  3272. RTMPSockBuf_Fill(&r->m_sb);
  3273. if (r->m_sb.sb_size < 144)
  3274. return -2;
  3275. if (strncmp(r->m_sb.sb_start, "HTTP/1.1 200 ", 13))
  3276. return -1;
  3277. ptr = r->m_sb.sb_start + sizeof("HTTP/1.1 200");
  3278. while ((ptr = strstr(ptr, "Content-"))) {
  3279. if (!strncasecmp(ptr+8, "length:", 7)) break;
  3280. ptr += 8;
  3281. }
  3282. if (!ptr)
  3283. return -1;
  3284. hlen = atoi(ptr+16);
  3285. ptr = strstr(ptr+16, "\r\n\r\n");
  3286. if (!ptr)
  3287. return -1;
  3288. ptr += 4;
  3289. r->m_sb.sb_size -= ptr - r->m_sb.sb_start;
  3290. r->m_sb.sb_start = ptr;
  3291. r->m_unackd--;
  3292. if (!r->m_clientID.av_val)
  3293. {
  3294. r->m_clientID.av_len = hlen;
  3295. r->m_clientID.av_val = malloc(hlen+1);
  3296. if (!r->m_clientID.av_val)
  3297. return -1;
  3298. r->m_clientID.av_val[0] = '/';
  3299. memcpy(r->m_clientID.av_val+1, ptr, hlen-1);
  3300. r->m_clientID.av_val[hlen] = 0;
  3301. r->m_sb.sb_size = 0;
  3302. }
  3303. else
  3304. {
  3305. r->m_polling = *ptr++;
  3306. r->m_resplen = hlen - 1;
  3307. r->m_sb.sb_start++;
  3308. r->m_sb.sb_size--;
  3309. }
  3310. return 0;
  3311. }
  3312. #define MAX_IGNORED_FRAMES 50
  3313. /* Read from the stream until we get a media packet.
  3314. * Returns -3 if Play.Close/Stop, -2 if fatal error, -1 if no more media
  3315. * packets, 0 if ignorable error, >0 if there is a media packet
  3316. */
  3317. static int
  3318. Read_1_Packet(RTMP *r, char *buf, unsigned int buflen)
  3319. {
  3320. uint32_t prevTagSize = 0;
  3321. int rtnGetNextMediaPacket = 0, ret = RTMP_READ_EOF;
  3322. RTMPPacket packet = { 0 };
  3323. int recopy = FALSE;
  3324. unsigned int size;
  3325. char *ptr, *pend;
  3326. uint32_t nTimeStamp = 0;
  3327. unsigned int len;
  3328. rtnGetNextMediaPacket = RTMP_GetNextMediaPacket(r, &packet);
  3329. while (rtnGetNextMediaPacket)
  3330. {
  3331. char *packetBody = packet.m_body;
  3332. unsigned int nPacketLen = packet.m_nBodySize;
  3333. /* Return RTMP_READ_COMPLETE if this was completed nicely with
  3334. * invoke message Play.Stop or Play.Complete
  3335. */
  3336. if (rtnGetNextMediaPacket == 2)
  3337. {
  3338. RTMP_Log(RTMP_LOGDEBUG,
  3339. "Got Play.Complete or Play.Stop from server. "
  3340. "Assuming stream is complete");
  3341. ret = RTMP_READ_COMPLETE;
  3342. break;
  3343. }
  3344. r->m_read.dataType |= (((packet.m_packetType == RTMP_PACKET_TYPE_AUDIO) << 2) |
  3345. (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO));
  3346. if (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO && nPacketLen <= 5)
  3347. {
  3348. RTMP_Log(RTMP_LOGDEBUG, "ignoring too small video packet: size: %d",
  3349. nPacketLen);
  3350. ret = RTMP_READ_IGNORE;
  3351. break;
  3352. }
  3353. if (packet.m_packetType == RTMP_PACKET_TYPE_AUDIO && nPacketLen <= 1)
  3354. {
  3355. RTMP_Log(RTMP_LOGDEBUG, "ignoring too small audio packet: size: %d",
  3356. nPacketLen);
  3357. ret = RTMP_READ_IGNORE;
  3358. break;
  3359. }
  3360. if (r->m_read.flags & RTMP_READ_SEEKING)
  3361. {
  3362. ret = RTMP_READ_IGNORE;
  3363. break;
  3364. }
  3365. #ifdef _DEBUG
  3366. RTMP_Log(RTMP_LOGDEBUG, "type: %02X, size: %d, TS: %d ms, abs TS: %d",
  3367. packet.m_packetType, nPacketLen, packet.m_nTimeStamp,
  3368. packet.m_hasAbsTimestamp);
  3369. if (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO)
  3370. RTMP_Log(RTMP_LOGDEBUG, "frametype: %02X", (*packetBody & 0xf0));
  3371. #endif
  3372. if (r->m_read.flags & RTMP_READ_RESUME)
  3373. {
  3374. /* check the header if we get one */
  3375. if (packet.m_nTimeStamp == 0)
  3376. {
  3377. if (r->m_read.nMetaHeaderSize > 0
  3378. && packet.m_packetType == RTMP_PACKET_TYPE_INFO)
  3379. {
  3380. AMFObject metaObj;
  3381. int nRes =
  3382. AMF_Decode(&metaObj, packetBody, nPacketLen, FALSE);
  3383. if (nRes >= 0)
  3384. {
  3385. AVal metastring;
  3386. AMFProp_GetString(AMF_GetProp(&metaObj, NULL, 0),
  3387. &metastring);
  3388. if (AVMATCH(&metastring, &av_onMetaData))
  3389. {
  3390. /* compare */
  3391. if ((r->m_read.nMetaHeaderSize != nPacketLen) ||
  3392. (memcmp
  3393. (r->m_read.metaHeader, packetBody,
  3394. r->m_read.nMetaHeaderSize) != 0))
  3395. {
  3396. ret = RTMP_READ_ERROR;
  3397. }
  3398. }
  3399. AMF_Reset(&metaObj);
  3400. if (ret == RTMP_READ_ERROR)
  3401. break;
  3402. }
  3403. }
  3404. /* check first keyframe to make sure we got the right position
  3405. * in the stream! (the first non ignored frame)
  3406. */
  3407. if (r->m_read.nInitialFrameSize > 0)
  3408. {
  3409. /* video or audio data */
  3410. if (packet.m_packetType == r->m_read.initialFrameType
  3411. && r->m_read.nInitialFrameSize == nPacketLen)
  3412. {
  3413. /* we don't compare the sizes since the packet can
  3414. * contain several FLV packets, just make sure the
  3415. * first frame is our keyframe (which we are going
  3416. * to rewrite)
  3417. */
  3418. if (memcmp
  3419. (r->m_read.initialFrame, packetBody,
  3420. r->m_read.nInitialFrameSize) == 0)
  3421. {
  3422. RTMP_Log(RTMP_LOGDEBUG, "Checked keyframe successfully!");
  3423. r->m_read.flags |= RTMP_READ_GOTKF;
  3424. /* ignore it! (what about audio data after it? it is
  3425. * handled by ignoring all 0ms frames, see below)
  3426. */
  3427. ret = RTMP_READ_IGNORE;
  3428. break;
  3429. }
  3430. }
  3431. /* hande FLV streams, even though the server resends the
  3432. * keyframe as an extra video packet it is also included
  3433. * in the first FLV stream chunk and we have to compare
  3434. * it and filter it out !!
  3435. */
  3436. if (packet.m_packetType == RTMP_PACKET_TYPE_FLASH_VIDEO)
  3437. {
  3438. /* basically we have to find the keyframe with the
  3439. * correct TS being nResumeTS
  3440. */
  3441. unsigned int pos = 0;
  3442. uint32_t ts = 0;
  3443. while (pos + 11 < nPacketLen)
  3444. {
  3445. /* size without header (11) and prevTagSize (4) */
  3446. uint32_t dataSize =
  3447. AMF_DecodeInt24(packetBody + pos + 1);
  3448. ts = AMF_DecodeInt24(packetBody + pos + 4);
  3449. ts |= (packetBody[pos + 7] << 24);
  3450. #ifdef _DEBUG
  3451. RTMP_Log(RTMP_LOGDEBUG,
  3452. "keyframe search: FLV Packet: type %02X, dataSize: %d, timeStamp: %d ms",
  3453. packetBody[pos], dataSize, ts);
  3454. #endif
  3455. /* ok, is it a keyframe?:
  3456. * well doesn't work for audio!
  3457. */
  3458. if (packetBody[pos /*6928, test 0 */ ] ==
  3459. r->m_read.initialFrameType
  3460. /* && (packetBody[11]&0xf0) == 0x10 */ )
  3461. {
  3462. if (ts == r->m_read.nResumeTS)
  3463. {
  3464. RTMP_Log(RTMP_LOGDEBUG,
  3465. "Found keyframe with resume-keyframe timestamp!");
  3466. if (r->m_read.nInitialFrameSize != dataSize
  3467. || memcmp(r->m_read.initialFrame,
  3468. packetBody + pos + 11,
  3469. r->m_read.
  3470. nInitialFrameSize) != 0)
  3471. {
  3472. RTMP_Log(RTMP_LOGERROR,
  3473. "FLV Stream: Keyframe doesn't match!");
  3474. ret = RTMP_READ_ERROR;
  3475. break;
  3476. }
  3477. r->m_read.flags |= RTMP_READ_GOTFLVK;
  3478. /* skip this packet?
  3479. * check whether skippable:
  3480. */
  3481. if (pos + 11 + dataSize + 4 > nPacketLen)
  3482. {
  3483. RTMP_Log(RTMP_LOGWARNING,
  3484. "Non skipable packet since it doesn't end with chunk, stream corrupt!");
  3485. ret = RTMP_READ_ERROR;
  3486. break;
  3487. }
  3488. packetBody += (pos + 11 + dataSize + 4);
  3489. nPacketLen -= (pos + 11 + dataSize + 4);
  3490. goto stopKeyframeSearch;
  3491. }
  3492. else if (r->m_read.nResumeTS < ts)
  3493. {
  3494. /* the timestamp ts will only increase with
  3495. * further packets, wait for seek
  3496. */
  3497. goto stopKeyframeSearch;
  3498. }
  3499. }
  3500. pos += (11 + dataSize + 4);
  3501. }
  3502. if (ts < r->m_read.nResumeTS)
  3503. {
  3504. RTMP_Log(RTMP_LOGERROR,
  3505. "First packet does not contain keyframe, all "
  3506. "timestamps are smaller than the keyframe "
  3507. "timestamp; probably the resume seek failed?");
  3508. }
  3509. stopKeyframeSearch:
  3510. ;
  3511. if (!(r->m_read.flags & RTMP_READ_GOTFLVK))
  3512. {
  3513. RTMP_Log(RTMP_LOGERROR,
  3514. "Couldn't find the seeked keyframe in this chunk!");
  3515. ret = RTMP_READ_IGNORE;
  3516. break;
  3517. }
  3518. }
  3519. }
  3520. }
  3521. if (packet.m_nTimeStamp > 0
  3522. && (r->m_read.flags & (RTMP_READ_GOTKF|RTMP_READ_GOTFLVK)))
  3523. {
  3524. /* another problem is that the server can actually change from
  3525. * 09/08 video/audio packets to an FLV stream or vice versa and
  3526. * our keyframe check will prevent us from going along with the
  3527. * new stream if we resumed.
  3528. *
  3529. * in this case set the 'found keyframe' variables to true.
  3530. * We assume that if we found one keyframe somewhere and were
  3531. * already beyond TS > 0 we have written data to the output
  3532. * which means we can accept all forthcoming data including the
  3533. * change between 08/09 <-> FLV packets
  3534. */
  3535. r->m_read.flags |= (RTMP_READ_GOTKF|RTMP_READ_GOTFLVK);
  3536. }
  3537. /* skip till we find our keyframe
  3538. * (seeking might put us somewhere before it)
  3539. */
  3540. if (!(r->m_read.flags & RTMP_READ_GOTKF) &&
  3541. packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO)
  3542. {
  3543. RTMP_Log(RTMP_LOGWARNING,
  3544. "Stream does not start with requested frame, ignoring data... ");
  3545. r->m_read.nIgnoredFrameCounter++;
  3546. if (r->m_read.nIgnoredFrameCounter > MAX_IGNORED_FRAMES)
  3547. ret = RTMP_READ_ERROR; /* fatal error, couldn't continue stream */
  3548. else
  3549. ret = RTMP_READ_IGNORE;
  3550. break;
  3551. }
  3552. /* ok, do the same for FLV streams */
  3553. if (!(r->m_read.flags & RTMP_READ_GOTFLVK) &&
  3554. packet.m_packetType == RTMP_PACKET_TYPE_FLASH_VIDEO)
  3555. {
  3556. RTMP_Log(RTMP_LOGWARNING,
  3557. "Stream does not start with requested FLV frame, ignoring data... ");
  3558. r->m_read.nIgnoredFlvFrameCounter++;
  3559. if (r->m_read.nIgnoredFlvFrameCounter > MAX_IGNORED_FRAMES)
  3560. ret = RTMP_READ_ERROR;
  3561. else
  3562. ret = RTMP_READ_IGNORE;
  3563. break;
  3564. }
  3565. /* we have to ignore the 0ms frames since these are the first
  3566. * keyframes; we've got these so don't mess around with multiple
  3567. * copies sent by the server to us! (if the keyframe is found at a
  3568. * later position there is only one copy and it will be ignored by
  3569. * the preceding if clause)
  3570. */
  3571. if (!(r->m_read.flags & RTMP_READ_NO_IGNORE) &&
  3572. packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO)
  3573. {
  3574. /* exclude type RTMP_PACKET_TYPE_FLASH_VIDEO since it can
  3575. * contain several FLV packets
  3576. */
  3577. if (packet.m_nTimeStamp == 0)
  3578. {
  3579. ret = RTMP_READ_IGNORE;
  3580. break;
  3581. }
  3582. else
  3583. {
  3584. /* stop ignoring packets */
  3585. r->m_read.flags |= RTMP_READ_NO_IGNORE;
  3586. }
  3587. }
  3588. }
  3589. /* calculate packet size and allocate slop buffer if necessary */
  3590. size = nPacketLen +
  3591. ((packet.m_packetType == RTMP_PACKET_TYPE_AUDIO
  3592. || packet.m_packetType == RTMP_PACKET_TYPE_VIDEO
  3593. || packet.m_packetType == RTMP_PACKET_TYPE_INFO) ? 11 : 0) +
  3594. (packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO ? 4 : 0);
  3595. if (size + 4 > buflen)
  3596. {
  3597. /* the extra 4 is for the case of an FLV stream without a last
  3598. * prevTagSize (we need extra 4 bytes to append it) */
  3599. r->m_read.buf = malloc(size + 4);
  3600. if (r->m_read.buf == 0)
  3601. {
  3602. RTMP_Log(RTMP_LOGERROR, "Couldn't allocate memory!");
  3603. ret = RTMP_READ_ERROR; /* fatal error */
  3604. break;
  3605. }
  3606. recopy = TRUE;
  3607. ptr = r->m_read.buf;
  3608. }
  3609. else
  3610. {
  3611. ptr = buf;
  3612. }
  3613. pend = ptr + size + 4;
  3614. /* use to return timestamp of last processed packet */
  3615. /* audio (0x08), video (0x09) or metadata (0x12) packets :
  3616. * construct 11 byte header then add rtmp packet's data */
  3617. if (packet.m_packetType == RTMP_PACKET_TYPE_AUDIO
  3618. || packet.m_packetType == RTMP_PACKET_TYPE_VIDEO
  3619. || packet.m_packetType == RTMP_PACKET_TYPE_INFO)
  3620. {
  3621. nTimeStamp = r->m_read.nResumeTS + packet.m_nTimeStamp;
  3622. prevTagSize = 11 + nPacketLen;
  3623. *ptr = packet.m_packetType;
  3624. ptr++;
  3625. ptr = AMF_EncodeInt24(ptr, pend, nPacketLen);
  3626. #if 0
  3627. if(packet.m_packetType == RTMP_PACKET_TYPE_VIDEO) {
  3628. /* H264 fix: */
  3629. if((packetBody[0] & 0x0f) == 7) { /* CodecId = H264 */
  3630. uint8_t packetType = *(packetBody+1);
  3631. uint32_t ts = AMF_DecodeInt24(packetBody+2); /* composition time */
  3632. int32_t cts = (ts+0xff800000)^0xff800000;
  3633. RTMP_Log(RTMP_LOGDEBUG, "cts : %d\n", cts);
  3634. nTimeStamp -= cts;
  3635. /* get rid of the composition time */
  3636. CRTMP::EncodeInt24(packetBody+2, 0);
  3637. }
  3638. RTMP_Log(RTMP_LOGDEBUG, "VIDEO: nTimeStamp: 0x%08X (%d)\n", nTimeStamp, nTimeStamp);
  3639. }
  3640. #endif
  3641. ptr = AMF_EncodeInt24(ptr, pend, nTimeStamp);
  3642. *ptr = (char)((nTimeStamp & 0xFF000000) >> 24);
  3643. ptr++;
  3644. /* stream id */
  3645. ptr = AMF_EncodeInt24(ptr, pend, 0);
  3646. }
  3647. memcpy(ptr, packetBody, nPacketLen);
  3648. len = nPacketLen;
  3649. /* correct tagSize and obtain timestamp if we have an FLV stream */
  3650. if (packet.m_packetType == RTMP_PACKET_TYPE_FLASH_VIDEO)
  3651. {
  3652. unsigned int pos = 0;
  3653. int delta;
  3654. /* grab first timestamp and see if it needs fixing */
  3655. nTimeStamp = AMF_DecodeInt24(packetBody + 4);
  3656. nTimeStamp |= (packetBody[7] << 24);
  3657. delta = packet.m_nTimeStamp - nTimeStamp + r->m_read.nResumeTS;
  3658. while (pos + 11 < nPacketLen)
  3659. {
  3660. /* size without header (11) and without prevTagSize (4) */
  3661. uint32_t dataSize = AMF_DecodeInt24(packetBody + pos + 1);
  3662. nTimeStamp = AMF_DecodeInt24(packetBody + pos + 4);
  3663. nTimeStamp |= (packetBody[pos + 7] << 24);
  3664. if (delta)
  3665. {
  3666. nTimeStamp += delta;
  3667. AMF_EncodeInt24(ptr+pos+4, pend, nTimeStamp);
  3668. ptr[pos+7] = nTimeStamp>>24;
  3669. }
  3670. /* set data type */
  3671. r->m_read.dataType |= (((*(packetBody + pos) == 0x08) << 2) |
  3672. (*(packetBody + pos) == 0x09));
  3673. if (pos + 11 + dataSize + 4 > nPacketLen)
  3674. {
  3675. if (pos + 11 + dataSize > nPacketLen)
  3676. {
  3677. RTMP_Log(RTMP_LOGERROR,
  3678. "Wrong data size (%u), stream corrupted, aborting!",
  3679. dataSize);
  3680. ret = RTMP_READ_ERROR;
  3681. break;
  3682. }
  3683. RTMP_Log(RTMP_LOGWARNING, "No tagSize found, appending!");
  3684. /* we have to append a last tagSize! */
  3685. prevTagSize = dataSize + 11;
  3686. AMF_EncodeInt32(ptr + pos + 11 + dataSize, pend,
  3687. prevTagSize);
  3688. size += 4;
  3689. len += 4;
  3690. }
  3691. else
  3692. {
  3693. prevTagSize =
  3694. AMF_DecodeInt32(packetBody + pos + 11 + dataSize);
  3695. #ifdef _DEBUG
  3696. RTMP_Log(RTMP_LOGDEBUG,
  3697. "FLV Packet: type %02X, dataSize: %lu, tagSize: %lu, timeStamp: %lu ms",
  3698. (unsigned char)packetBody[pos], dataSize, prevTagSize,
  3699. nTimeStamp);
  3700. #endif
  3701. if (prevTagSize != (dataSize + 11))
  3702. {
  3703. #ifdef _DEBUG
  3704. RTMP_Log(RTMP_LOGWARNING,
  3705. "Tag and data size are not consitent, writing tag size according to dataSize+11: %d",
  3706. dataSize + 11);
  3707. #endif
  3708. prevTagSize = dataSize + 11;
  3709. AMF_EncodeInt32(ptr + pos + 11 + dataSize, pend,
  3710. prevTagSize);
  3711. }
  3712. }
  3713. pos += prevTagSize + 4; /*(11+dataSize+4); */
  3714. }
  3715. }
  3716. ptr += len;
  3717. if (packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO)
  3718. {
  3719. /* FLV tag packets contain their own prevTagSize */
  3720. AMF_EncodeInt32(ptr, pend, prevTagSize);
  3721. }
  3722. /* In non-live this nTimeStamp can contain an absolute TS.
  3723. * Update ext timestamp with this absolute offset in non-live mode
  3724. * otherwise report the relative one
  3725. */
  3726. /* RTMP_Log(RTMP_LOGDEBUG, "type: %02X, size: %d, pktTS: %dms, TS: %dms, bLiveStream: %d", packet.m_packetType, nPacketLen, packet.m_nTimeStamp, nTimeStamp, r->Link.lFlags & RTMP_LF_LIVE); */
  3727. r->m_read.timestamp = (r->Link.lFlags & RTMP_LF_LIVE) ? packet.m_nTimeStamp : nTimeStamp;
  3728. ret = size;
  3729. break;
  3730. }
  3731. if (rtnGetNextMediaPacket)
  3732. RTMPPacket_Free(&packet);
  3733. if (recopy)
  3734. {
  3735. len = ret > buflen ? buflen : ret;
  3736. memcpy(buf, r->m_read.buf, len);
  3737. r->m_read.bufpos = r->m_read.buf + len;
  3738. r->m_read.buflen = ret - len;
  3739. }
  3740. return ret;
  3741. }
  3742. static const char flvHeader[] = { 'F', 'L', 'V', 0x01,
  3743. 0x00, /* 0x04 == audio, 0x01 == video */
  3744. 0x00, 0x00, 0x00, 0x09,
  3745. 0x00, 0x00, 0x00, 0x00
  3746. };
  3747. #define HEADERBUF (128*1024)
  3748. int
  3749. RTMP_Read(RTMP *r, char *buf, int size)
  3750. {
  3751. int nRead = 0, total = 0;
  3752. /* can't continue */
  3753. fail:
  3754. switch (r->m_read.status) {
  3755. case RTMP_READ_EOF:
  3756. case RTMP_READ_COMPLETE:
  3757. return 0;
  3758. case RTMP_READ_ERROR: /* corrupted stream, resume failed */
  3759. SetSockError(EINVAL);
  3760. return -1;
  3761. default:
  3762. break;
  3763. }
  3764. /* first time thru */
  3765. if (!(r->m_read.flags & RTMP_READ_HEADER))
  3766. {
  3767. if (!(r->m_read.flags & RTMP_READ_RESUME))
  3768. {
  3769. char *mybuf = malloc(HEADERBUF), *end = mybuf + HEADERBUF;
  3770. int cnt = 0;
  3771. r->m_read.buf = mybuf;
  3772. r->m_read.buflen = HEADERBUF;
  3773. memcpy(mybuf, flvHeader, sizeof(flvHeader));
  3774. r->m_read.buf += sizeof(flvHeader);
  3775. r->m_read.buflen -= sizeof(flvHeader);
  3776. while (r->m_read.timestamp == 0)
  3777. {
  3778. nRead = Read_1_Packet(r, r->m_read.buf, r->m_read.buflen);
  3779. if (nRead < 0)
  3780. {
  3781. free(mybuf);
  3782. r->m_read.buf = NULL;
  3783. r->m_read.buflen = 0;
  3784. r->m_read.status = nRead;
  3785. goto fail;
  3786. }
  3787. /* buffer overflow, fix buffer and give up */
  3788. if (r->m_read.buf < mybuf || r->m_read.buf > end) {
  3789. mybuf = realloc(mybuf, cnt + nRead);
  3790. memcpy(mybuf+cnt, r->m_read.buf, nRead);
  3791. r->m_read.buf = mybuf+cnt+nRead;
  3792. break;
  3793. }
  3794. cnt += nRead;
  3795. r->m_read.buf += nRead;
  3796. r->m_read.buflen -= nRead;
  3797. if (r->m_read.dataType == 5)
  3798. break;
  3799. }
  3800. mybuf[4] = r->m_read.dataType;
  3801. r->m_read.buflen = r->m_read.buf - mybuf;
  3802. r->m_read.buf = mybuf;
  3803. r->m_read.bufpos = mybuf;
  3804. }
  3805. r->m_read.flags |= RTMP_READ_HEADER;
  3806. }
  3807. if ((r->m_read.flags & RTMP_READ_SEEKING) && r->m_read.buf)
  3808. {
  3809. /* drop whatever's here */
  3810. free(r->m_read.buf);
  3811. r->m_read.buf = NULL;
  3812. r->m_read.bufpos = NULL;
  3813. r->m_read.buflen = 0;
  3814. }
  3815. /* If there's leftover data buffered, use it up */
  3816. if (r->m_read.buf)
  3817. {
  3818. nRead = r->m_read.buflen;
  3819. if (nRead > size)
  3820. nRead = size;
  3821. memcpy(buf, r->m_read.bufpos, nRead);
  3822. r->m_read.buflen -= nRead;
  3823. if (!r->m_read.buflen)
  3824. {
  3825. free(r->m_read.buf);
  3826. r->m_read.buf = NULL;
  3827. r->m_read.bufpos = NULL;
  3828. }
  3829. else
  3830. {
  3831. r->m_read.bufpos += nRead;
  3832. }
  3833. buf += nRead;
  3834. total += nRead;
  3835. size -= nRead;
  3836. }
  3837. while (size > 0 && (nRead = Read_1_Packet(r, buf, size)) >= 0)
  3838. {
  3839. if (!nRead) continue;
  3840. buf += nRead;
  3841. total += nRead;
  3842. size -= nRead;
  3843. break;
  3844. }
  3845. if (nRead < 0)
  3846. r->m_read.status = nRead;
  3847. if (size < 0)
  3848. total += size;
  3849. return total;
  3850. }
  3851. static const AVal av_setDataFrame = AVC("@setDataFrame");
  3852. int
  3853. RTMP_Write(RTMP *r, const char *buf, int size)
  3854. {
  3855. RTMPPacket *pkt = &r->m_write;
  3856. char *pend, *enc;
  3857. int s2 = size, ret, num;
  3858. pkt->m_nChannel = 0x04; /* source channel */
  3859. pkt->m_nInfoField2 = r->m_stream_id;
  3860. while (s2)
  3861. {
  3862. if (!pkt->m_nBytesRead)
  3863. {
  3864. if (size < 11) {
  3865. /* FLV pkt too small */
  3866. return 0;
  3867. }
  3868. if (buf[0] == 'F' && buf[1] == 'L' && buf[2] == 'V')
  3869. {
  3870. buf += 13;
  3871. s2 -= 13;
  3872. }
  3873. pkt->m_packetType = *buf++;
  3874. pkt->m_nBodySize = AMF_DecodeInt24(buf);
  3875. buf += 3;
  3876. pkt->m_nTimeStamp = AMF_DecodeInt24(buf);
  3877. buf += 3;
  3878. pkt->m_nTimeStamp |= *buf++ << 24;
  3879. buf += 3;
  3880. s2 -= 11;
  3881. if (((pkt->m_packetType == RTMP_PACKET_TYPE_AUDIO
  3882. || pkt->m_packetType == RTMP_PACKET_TYPE_VIDEO) &&
  3883. !pkt->m_nTimeStamp) || pkt->m_packetType == RTMP_PACKET_TYPE_INFO)
  3884. {
  3885. pkt->m_headerType = RTMP_PACKET_SIZE_LARGE;
  3886. if (pkt->m_packetType == RTMP_PACKET_TYPE_INFO)
  3887. pkt->m_nBodySize += 16;
  3888. }
  3889. else
  3890. {
  3891. pkt->m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  3892. }
  3893. if (!RTMPPacket_Alloc(pkt, pkt->m_nBodySize))
  3894. {
  3895. RTMP_Log(RTMP_LOGDEBUG, "%s, failed to allocate packet", __FUNCTION__);
  3896. return FALSE;
  3897. }
  3898. enc = pkt->m_body;
  3899. pend = enc + pkt->m_nBodySize;
  3900. if (pkt->m_packetType == RTMP_PACKET_TYPE_INFO)
  3901. {
  3902. enc = AMF_EncodeString(enc, pend, &av_setDataFrame);
  3903. pkt->m_nBytesRead = enc - pkt->m_body;
  3904. }
  3905. }
  3906. else
  3907. {
  3908. enc = pkt->m_body + pkt->m_nBytesRead;
  3909. }
  3910. num = pkt->m_nBodySize - pkt->m_nBytesRead;
  3911. if (num > s2)
  3912. num = s2;
  3913. memcpy(enc, buf, num);
  3914. pkt->m_nBytesRead += num;
  3915. s2 -= num;
  3916. buf += num;
  3917. if (pkt->m_nBytesRead == pkt->m_nBodySize)
  3918. {
  3919. ret = RTMP_SendPacket(r, pkt, FALSE);
  3920. RTMPPacket_Free(pkt);
  3921. pkt->m_nBytesRead = 0;
  3922. if (!ret)
  3923. return -1;
  3924. buf += 4;
  3925. s2 -= 4;
  3926. if (s2 < 0)
  3927. break;
  3928. }
  3929. }
  3930. return size+s2;
  3931. }


viewable in any browser valid css valid html 4.01 powered by lighttpd colored by colorer written in perl hosted by stavcom