Bläddra i källkod

Add librtmp to obs-outputs

Note that this is a somewhat heavily modified custom version of librtmp.
I modified all the platform specific code that we were using for the
OBS1 to make it platform-independent.

I don't really like the code in this library, but it works well enough,
so I can't really fault anyone for it.  It's just very..  unclean.  Even
for a C library, quite unclean.  Some parts are also a little less safe
than I'd prefer as well.
jp9000 11 år sedan
förälder
incheckning
ed6fc7b122

+ 504 - 0
plugins/obs-outputs/librtmp/COPYING

@@ -0,0 +1,504 @@
+                  GNU LESSER GENERAL PUBLIC LICENSE
+                       Version 2.1, February 1999
+
+ Copyright (C) 1991, 1999 Free Software Foundation, Inc.
+ 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
+ Everyone is permitted to copy and distribute verbatim copies
+ of this license document, but changing it is not allowed.
+
+[This is the first released version of the Lesser GPL.  It also counts
+ as the successor of the GNU Library Public License, version 2, hence
+ the version number 2.1.]
+
+                            Preamble
+
+  The licenses for most software are designed to take away your
+freedom to share and change it.  By contrast, the GNU General Public
+Licenses are intended to guarantee your freedom to share and change
+free software--to make sure the software is free for all its users.
+
+  This license, the Lesser General Public License, applies to some
+specially designated software packages--typically libraries--of the
+Free Software Foundation and other authors who decide to use it.  You
+can use it too, but we suggest you first think carefully about whether
+this license or the ordinary General Public License is the better
+strategy to use in any particular case, based on the explanations below.
+
+  When we speak of free software, we are referring to freedom of use,
+not price.  Our General Public Licenses are designed to make sure that
+you have the freedom to distribute copies of free software (and charge
+for this service if you wish); that you receive source code or can get
+it if you want it; that you can change the software and use pieces of
+it in new free programs; and that you are informed that you can do
+these things.
+
+  To protect your rights, we need to make restrictions that forbid
+distributors to deny you these rights or to ask you to surrender these
+rights.  These restrictions translate to certain responsibilities for
+you if you distribute copies of the library or if you modify it.
+
+  For example, if you distribute copies of the library, whether gratis
+or for a fee, you must give the recipients all the rights that we gave
+you.  You must make sure that they, too, receive or can get the source
+code.  If you link other code with the library, you must provide
+complete object files to the recipients, so that they can relink them
+with the library after making changes to the library and recompiling
+it.  And you must show them these terms so they know their rights.
+
+  We protect your rights with a two-step method: (1) we copyright the
+library, and (2) we offer you this license, which gives you legal
+permission to copy, distribute and/or modify the library.
+
+  To protect each distributor, we want to make it very clear that
+there is no warranty for the free library.  Also, if the library is
+modified by someone else and passed on, the recipients should know
+that what they have is not the original version, so that the original
+author's reputation will not be affected by problems that might be
+introduced by others.
+
+  Finally, software patents pose a constant threat to the existence of
+any free program.  We wish to make sure that a company cannot
+effectively restrict the users of a free program by obtaining a
+restrictive license from a patent holder.  Therefore, we insist that
+any patent license obtained for a version of the library must be
+consistent with the full freedom of use specified in this license.
+
+  Most GNU software, including some libraries, is covered by the
+ordinary GNU General Public License.  This license, the GNU Lesser
+General Public License, applies to certain designated libraries, and
+is quite different from the ordinary General Public License.  We use
+this license for certain libraries in order to permit linking those
+libraries into non-free programs.
+
+  When a program is linked with a library, whether statically or using
+a shared library, the combination of the two is legally speaking a
+combined work, a derivative of the original library.  The ordinary
+General Public License therefore permits such linking only if the
+entire combination fits its criteria of freedom.  The Lesser General
+Public License permits more lax criteria for linking other code with
+the library.
+
+  We call this license the "Lesser" General Public License because it
+does Less to protect the user's freedom than the ordinary General
+Public License.  It also provides other free software developers Less
+of an advantage over competing non-free programs.  These disadvantages
+are the reason we use the ordinary General Public License for many
+libraries.  However, the Lesser license provides advantages in certain
+special circumstances.
+
+  For example, on rare occasions, there may be a special need to
+encourage the widest possible use of a certain library, so that it becomes
+a de-facto standard.  To achieve this, non-free programs must be
+allowed to use the library.  A more frequent case is that a free
+library does the same job as widely used non-free libraries.  In this
+case, there is little to gain by limiting the free library to free
+software only, so we use the Lesser General Public License.
+
+  In other cases, permission to use a particular library in non-free
+programs enables a greater number of people to use a large body of
+free software.  For example, permission to use the GNU C Library in
+non-free programs enables many more people to use the whole GNU
+operating system, as well as its variant, the GNU/Linux operating
+system.
+
+  Although the Lesser General Public License is Less protective of the
+users' freedom, it does ensure that the user of a program that is
+linked with the Library has the freedom and the wherewithal to run
+that program using a modified version of the Library.
+
+  The precise terms and conditions for copying, distribution and
+modification follow.  Pay close attention to the difference between a
+"work based on the library" and a "work that uses the library".  The
+former contains code derived from the library, whereas the latter must
+be combined with the library in order to run.
+
+                  GNU LESSER GENERAL PUBLIC LICENSE
+   TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
+
+  0. This License Agreement applies to any software library or other
+program which contains a notice placed by the copyright holder or
+other authorized party saying it may be distributed under the terms of
+this Lesser General Public License (also called "this License").
+Each licensee is addressed as "you".
+
+  A "library" means a collection of software functions and/or data
+prepared so as to be conveniently linked with application programs
+(which use some of those functions and data) to form executables.
+
+  The "Library", below, refers to any such software library or work
+which has been distributed under these terms.  A "work based on the
+Library" means either the Library or any derivative work under
+copyright law: that is to say, a work containing the Library or a
+portion of it, either verbatim or with modifications and/or translated
+straightforwardly into another language.  (Hereinafter, translation is
+included without limitation in the term "modification".)
+
+  "Source code" for a work means the preferred form of the work for
+making modifications to it.  For a library, complete source code means
+all the source code for all modules it contains, plus any associated
+interface definition files, plus the scripts used to control compilation
+and installation of the library.
+
+  Activities other than copying, distribution and modification are not
+covered by this License; they are outside its scope.  The act of
+running a program using the Library is not restricted, and output from
+such a program is covered only if its contents constitute a work based
+on the Library (independent of the use of the Library in a tool for
+writing it).  Whether that is true depends on what the Library does
+and what the program that uses the Library does.
+
+  1. You may copy and distribute verbatim copies of the Library's
+complete source code as you receive it, in any medium, provided that
+you conspicuously and appropriately publish on each copy an
+appropriate copyright notice and disclaimer of warranty; keep intact
+all the notices that refer to this License and to the absence of any
+warranty; and distribute a copy of this License along with the
+Library.
+
+  You may charge a fee for the physical act of transferring a copy,
+and you may at your option offer warranty protection in exchange for a
+fee.
+
+  2. You may modify your copy or copies of the Library or any portion
+of it, thus forming a work based on the Library, and copy and
+distribute such modifications or work under the terms of Section 1
+above, provided that you also meet all of these conditions:
+
+    a) The modified work must itself be a software library.
+
+    b) You must cause the files modified to carry prominent notices
+    stating that you changed the files and the date of any change.
+
+    c) You must cause the whole of the work to be licensed at no
+    charge to all third parties under the terms of this License.
+
+    d) If a facility in the modified Library refers to a function or a
+    table of data to be supplied by an application program that uses
+    the facility, other than as an argument passed when the facility
+    is invoked, then you must make a good faith effort to ensure that,
+    in the event an application does not supply such function or
+    table, the facility still operates, and performs whatever part of
+    its purpose remains meaningful.
+
+    (For example, a function in a library to compute square roots has
+    a purpose that is entirely well-defined independent of the
+    application.  Therefore, Subsection 2d requires that any
+    application-supplied function or table used by this function must
+    be optional: if the application does not supply it, the square
+    root function must still compute square roots.)
+
+These requirements apply to the modified work as a whole.  If
+identifiable sections of that work are not derived from the Library,
+and can be reasonably considered independent and separate works in
+themselves, then this License, and its terms, do not apply to those
+sections when you distribute them as separate works.  But when you
+distribute the same sections as part of a whole which is a work based
+on the Library, the distribution of the whole must be on the terms of
+this License, whose permissions for other licensees extend to the
+entire whole, and thus to each and every part regardless of who wrote
+it.
+
+Thus, it is not the intent of this section to claim rights or contest
+your rights to work written entirely by you; rather, the intent is to
+exercise the right to control the distribution of derivative or
+collective works based on the Library.
+
+In addition, mere aggregation of another work not based on the Library
+with the Library (or with a work based on the Library) on a volume of
+a storage or distribution medium does not bring the other work under
+the scope of this License.
+
+  3. You may opt to apply the terms of the ordinary GNU General Public
+License instead of this License to a given copy of the Library.  To do
+this, you must alter all the notices that refer to this License, so
+that they refer to the ordinary GNU General Public License, version 2,
+instead of to this License.  (If a newer version than version 2 of the
+ordinary GNU General Public License has appeared, then you can specify
+that version instead if you wish.)  Do not make any other change in
+these notices.
+
+  Once this change is made in a given copy, it is irreversible for
+that copy, so the ordinary GNU General Public License applies to all
+subsequent copies and derivative works made from that copy.
+
+  This option is useful when you wish to copy part of the code of
+the Library into a program that is not a library.
+
+  4. You may copy and distribute the Library (or a portion or
+derivative of it, under Section 2) in object code or executable form
+under the terms of Sections 1 and 2 above provided that you accompany
+it with the complete corresponding machine-readable source code, which
+must be distributed under the terms of Sections 1 and 2 above on a
+medium customarily used for software interchange.
+
+  If distribution of object code is made by offering access to copy
+from a designated place, then offering equivalent access to copy the
+source code from the same place satisfies the requirement to
+distribute the source code, even though third parties are not
+compelled to copy the source along with the object code.
+
+  5. A program that contains no derivative of any portion of the
+Library, but is designed to work with the Library by being compiled or
+linked with it, is called a "work that uses the Library".  Such a
+work, in isolation, is not a derivative work of the Library, and
+therefore falls outside the scope of this License.
+
+  However, linking a "work that uses the Library" with the Library
+creates an executable that is a derivative of the Library (because it
+contains portions of the Library), rather than a "work that uses the
+library".  The executable is therefore covered by this License.
+Section 6 states terms for distribution of such executables.
+
+  When a "work that uses the Library" uses material from a header file
+that is part of the Library, the object code for the work may be a
+derivative work of the Library even though the source code is not.
+Whether this is true is especially significant if the work can be
+linked without the Library, or if the work is itself a library.  The
+threshold for this to be true is not precisely defined by law.
+
+  If such an object file uses only numerical parameters, data
+structure layouts and accessors, and small macros and small inline
+functions (ten lines or less in length), then the use of the object
+file is unrestricted, regardless of whether it is legally a derivative
+work.  (Executables containing this object code plus portions of the
+Library will still fall under Section 6.)
+
+  Otherwise, if the work is a derivative of the Library, you may
+distribute the object code for the work under the terms of Section 6.
+Any executables containing that work also fall under Section 6,
+whether or not they are linked directly with the Library itself.
+
+  6. As an exception to the Sections above, you may also combine or
+link a "work that uses the Library" with the Library to produce a
+work containing portions of the Library, and distribute that work
+under terms of your choice, provided that the terms permit
+modification of the work for the customer's own use and reverse
+engineering for debugging such modifications.
+
+  You must give prominent notice with each copy of the work that the
+Library is used in it and that the Library and its use are covered by
+this License.  You must supply a copy of this License.  If the work
+during execution displays copyright notices, you must include the
+copyright notice for the Library among them, as well as a reference
+directing the user to the copy of this License.  Also, you must do one
+of these things:
+
+    a) Accompany the work with the complete corresponding
+    machine-readable source code for the Library including whatever
+    changes were used in the work (which must be distributed under
+    Sections 1 and 2 above); and, if the work is an executable linked
+    with the Library, with the complete machine-readable "work that
+    uses the Library", as object code and/or source code, so that the
+    user can modify the Library and then relink to produce a modified
+    executable containing the modified Library.  (It is understood
+    that the user who changes the contents of definitions files in the
+    Library will not necessarily be able to recompile the application
+    to use the modified definitions.)
+
+    b) Use a suitable shared library mechanism for linking with the
+    Library.  A suitable mechanism is one that (1) uses at run time a
+    copy of the library already present on the user's computer system,
+    rather than copying library functions into the executable, and (2)
+    will operate properly with a modified version of the library, if
+    the user installs one, as long as the modified version is
+    interface-compatible with the version that the work was made with.
+
+    c) Accompany the work with a written offer, valid for at
+    least three years, to give the same user the materials
+    specified in Subsection 6a, above, for a charge no more
+    than the cost of performing this distribution.
+
+    d) If distribution of the work is made by offering access to copy
+    from a designated place, offer equivalent access to copy the above
+    specified materials from the same place.
+
+    e) Verify that the user has already received a copy of these
+    materials or that you have already sent this user a copy.
+
+  For an executable, the required form of the "work that uses the
+Library" must include any data and utility programs needed for
+reproducing the executable from it.  However, as a special exception,
+the materials to be distributed need not include anything that is
+normally distributed (in either source or binary form) with the major
+components (compiler, kernel, and so on) of the operating system on
+which the executable runs, unless that component itself accompanies
+the executable.
+
+  It may happen that this requirement contradicts the license
+restrictions of other proprietary libraries that do not normally
+accompany the operating system.  Such a contradiction means you cannot
+use both them and the Library together in an executable that you
+distribute.
+
+  7. You may place library facilities that are a work based on the
+Library side-by-side in a single library together with other library
+facilities not covered by this License, and distribute such a combined
+library, provided that the separate distribution of the work based on
+the Library and of the other library facilities is otherwise
+permitted, and provided that you do these two things:
+
+    a) Accompany the combined library with a copy of the same work
+    based on the Library, uncombined with any other library
+    facilities.  This must be distributed under the terms of the
+    Sections above.
+
+    b) Give prominent notice with the combined library of the fact
+    that part of it is a work based on the Library, and explaining
+    where to find the accompanying uncombined form of the same work.
+
+  8. You may not copy, modify, sublicense, link with, or distribute
+the Library except as expressly provided under this License.  Any
+attempt otherwise to copy, modify, sublicense, link with, or
+distribute the Library is void, and will automatically terminate your
+rights under this License.  However, parties who have received copies,
+or rights, from you under this License will not have their licenses
+terminated so long as such parties remain in full compliance.
+
+  9. You are not required to accept this License, since you have not
+signed it.  However, nothing else grants you permission to modify or
+distribute the Library or its derivative works.  These actions are
+prohibited by law if you do not accept this License.  Therefore, by
+modifying or distributing the Library (or any work based on the
+Library), you indicate your acceptance of this License to do so, and
+all its terms and conditions for copying, distributing or modifying
+the Library or works based on it.
+
+  10. Each time you redistribute the Library (or any work based on the
+Library), the recipient automatically receives a license from the
+original licensor to copy, distribute, link with or modify the Library
+subject to these terms and conditions.  You may not impose any further
+restrictions on the recipients' exercise of the rights granted herein.
+You are not responsible for enforcing compliance by third parties with
+this License.
+
+  11. If, as a consequence of a court judgment or allegation of patent
+infringement or for any other reason (not limited to patent issues),
+conditions are imposed on you (whether by court order, agreement or
+otherwise) that contradict the conditions of this License, they do not
+excuse you from the conditions of this License.  If you cannot
+distribute so as to satisfy simultaneously your obligations under this
+License and any other pertinent obligations, then as a consequence you
+may not distribute the Library at all.  For example, if a patent
+license would not permit royalty-free redistribution of the Library by
+all those who receive copies directly or indirectly through you, then
+the only way you could satisfy both it and this License would be to
+refrain entirely from distribution of the Library.
+
+If any portion of this section is held invalid or unenforceable under any
+particular circumstance, the balance of the section is intended to apply,
+and the section as a whole is intended to apply in other circumstances.
+
+It is not the purpose of this section to induce you to infringe any
+patents or other property right claims or to contest validity of any
+such claims; this section has the sole purpose of protecting the
+integrity of the free software distribution system which is
+implemented by public license practices.  Many people have made
+generous contributions to the wide range of software distributed
+through that system in reliance on consistent application of that
+system; it is up to the author/donor to decide if he or she is willing
+to distribute software through any other system and a licensee cannot
+impose that choice.
+
+This section is intended to make thoroughly clear what is believed to
+be a consequence of the rest of this License.
+
+  12. If the distribution and/or use of the Library is restricted in
+certain countries either by patents or by copyrighted interfaces, the
+original copyright holder who places the Library under this License may add
+an explicit geographical distribution limitation excluding those countries,
+so that distribution is permitted only in or among countries not thus
+excluded.  In such case, this License incorporates the limitation as if
+written in the body of this License.
+
+  13. The Free Software Foundation may publish revised and/or new
+versions of the Lesser General Public License from time to time.
+Such new versions will be similar in spirit to the present version,
+but may differ in detail to address new problems or concerns.
+
+Each version is given a distinguishing version number.  If the Library
+specifies a version number of this License which applies to it and
+"any later version", you have the option of following the terms and
+conditions either of that version or of any later version published by
+the Free Software Foundation.  If the Library does not specify a
+license version number, you may choose any version ever published by
+the Free Software Foundation.
+
+  14. If you wish to incorporate parts of the Library into other free
+programs whose distribution conditions are incompatible with these,
+write to the author to ask for permission.  For software which is
+copyrighted by the Free Software Foundation, write to the Free
+Software Foundation; we sometimes make exceptions for this.  Our
+decision will be guided by the two goals of preserving the free status
+of all derivatives of our free software and of promoting the sharing
+and reuse of software generally.
+
+                            NO WARRANTY
+
+  15. BECAUSE THE LIBRARY IS LICENSED FREE OF CHARGE, THERE IS NO
+WARRANTY FOR THE LIBRARY, TO THE EXTENT PERMITTED BY APPLICABLE LAW.
+EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR
+OTHER PARTIES PROVIDE THE LIBRARY "AS IS" WITHOUT WARRANTY OF ANY
+KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE
+IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+PURPOSE.  THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
+LIBRARY IS WITH YOU.  SHOULD THE LIBRARY PROVE DEFECTIVE, YOU ASSUME
+THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
+
+  16. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN
+WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY
+AND/OR REDISTRIBUTE THE LIBRARY AS PERMITTED ABOVE, BE LIABLE TO YOU
+FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR
+CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
+LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
+RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A
+FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN IF
+SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH
+DAMAGES.
+
+                     END OF TERMS AND CONDITIONS
+
+           How to Apply These Terms to Your New Libraries
+
+  If you develop a new library, and you want it to be of the greatest
+possible use to the public, we recommend making it free software that
+everyone can redistribute and change.  You can do so by permitting
+redistribution under these terms (or, alternatively, under the terms of the
+ordinary General Public License).
+
+  To apply these terms, attach the following notices to the library.  It is
+safest to attach them to the start of each source file to most effectively
+convey the exclusion of warranty; and each file should have at least the
+"copyright" line and a pointer to where the full notice is found.
+
+    <one line to give the library's name and a brief idea of what it does.>
+    Copyright (C) <year>  <name of author>
+
+    This library is free software; you can redistribute it and/or
+    modify it under the terms of the GNU Lesser General Public
+    License as published by the Free Software Foundation; either
+    version 2.1 of the License, or (at your option) any later version.
+
+    This library is distributed in the hope that it will be useful,
+    but WITHOUT ANY WARRANTY; without even the implied warranty of
+    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+    Lesser General Public License for more details.
+
+    You should have received a copy of the GNU Lesser General Public
+    License along with this library; if not, write to the Free Software
+    Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
+
+Also add information on how to contact you by electronic and paper mail.
+
+You should also get your employer (if you work as a programmer) or your
+school, if any, to sign a "copyright disclaimer" for the library, if
+necessary.  Here is a sample; alter the names:
+
+  Yoyodyne, Inc., hereby disclaims all copyright interest in the
+  library `Frob' (a library for tweaking knobs) written by James Random Hacker.
+
+  <signature of Ty Coon>, 1 April 1990
+  Ty Coon, President of Vice
+
+That's all there is to it!
+
+

+ 1275 - 0
plugins/obs-outputs/librtmp/amf.c

@@ -0,0 +1,1275 @@
+/*
+ *      Copyright (C) 2005-2008 Team XBMC
+ *      http://www.xbmc.org
+ *      Copyright (C) 2008-2009 Andrej Stepanchuk
+ *      Copyright (C) 2009-2010 Howard Chu
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+#include "rtmp_sys.h"
+#include "amf.h"
+#include "log.h"
+#include "bytes.h"
+
+static const AMFObjectProperty AMFProp_Invalid = { {0, 0}, AMF_INVALID };
+static const AVal AV_empty = { 0, 0 };
+
+/* Data is Big-Endian */
+unsigned short
+AMF_DecodeInt16(const char *data)
+{
+    unsigned char *c = (unsigned char *) data;
+    unsigned short val;
+    val = (c[0] << 8) | c[1];
+    return val;
+}
+
+unsigned int
+AMF_DecodeInt24(const char *data)
+{
+    unsigned char *c = (unsigned char *) data;
+    unsigned int val;
+    val = (c[0] << 16) | (c[1] << 8) | c[2];
+    return val;
+}
+
+unsigned int
+AMF_DecodeInt32(const char *data)
+{
+    unsigned char *c = (unsigned char *)data;
+    unsigned int val;
+    val = (c[0] << 24) | (c[1] << 16) | (c[2] << 8) | c[3];
+    return val;
+}
+
+void
+AMF_DecodeString(const char *data, AVal *bv)
+{
+    bv->av_len = AMF_DecodeInt16(data);
+    bv->av_val = (bv->av_len > 0) ? (char *)data + 2 : NULL;
+}
+
+void
+AMF_DecodeLongString(const char *data, AVal *bv)
+{
+    bv->av_len = AMF_DecodeInt32(data);
+    bv->av_val = (bv->av_len > 0) ? (char *)data + 4 : NULL;
+}
+
+double
+AMF_DecodeNumber(const char *data)
+{
+    double dVal;
+#if __FLOAT_WORD_ORDER == __BYTE_ORDER
+#if __BYTE_ORDER == __BIG_ENDIAN
+    memcpy(&dVal, data, 8);
+#elif __BYTE_ORDER == __LITTLE_ENDIAN
+    unsigned char *ci, *co;
+    ci = (unsigned char *)data;
+    co = (unsigned char *)&dVal;
+    co[0] = ci[7];
+    co[1] = ci[6];
+    co[2] = ci[5];
+    co[3] = ci[4];
+    co[4] = ci[3];
+    co[5] = ci[2];
+    co[6] = ci[1];
+    co[7] = ci[0];
+#endif
+#else
+#if __BYTE_ORDER == __LITTLE_ENDIAN	/* __FLOAT_WORD_ORER == __BIG_ENDIAN */
+    unsigned char *ci, *co;
+    ci = (unsigned char *)data;
+    co = (unsigned char *)&dVal;
+    co[0] = ci[3];
+    co[1] = ci[2];
+    co[2] = ci[1];
+    co[3] = ci[0];
+    co[4] = ci[7];
+    co[5] = ci[6];
+    co[6] = ci[5];
+    co[7] = ci[4];
+#else /* __BYTE_ORDER == __BIG_ENDIAN && __FLOAT_WORD_ORER == __LITTLE_ENDIAN */
+    unsigned char *ci, *co;
+    ci = (unsigned char *)data;
+    co = (unsigned char *)&dVal;
+    co[0] = ci[4];
+    co[1] = ci[5];
+    co[2] = ci[6];
+    co[3] = ci[7];
+    co[4] = ci[0];
+    co[5] = ci[1];
+    co[6] = ci[2];
+    co[7] = ci[3];
+#endif
+#endif
+    return dVal;
+}
+
+int
+AMF_DecodeBoolean(const char *data)
+{
+    return *data != 0;
+}
+
+char *
+AMF_EncodeInt16(char *output, char *outend, short nVal)
+{
+    if (output+2 > outend)
+        return NULL;
+
+    output[1] = nVal & 0xff;
+    output[0] = nVal >> 8;
+    return output+2;
+}
+
+char *
+AMF_EncodeInt24(char *output, char *outend, int nVal)
+{
+    if (output+3 > outend)
+        return NULL;
+
+    output[2] = nVal & 0xff;
+    output[1] = nVal >> 8;
+    output[0] = nVal >> 16;
+    return output+3;
+}
+
+char *
+AMF_EncodeInt32(char *output, char *outend, int nVal)
+{
+    if (output+4 > outend)
+        return NULL;
+
+    output[3] = nVal & 0xff;
+    output[2] = nVal >> 8;
+    output[1] = nVal >> 16;
+    output[0] = nVal >> 24;
+    return output+4;
+}
+
+char *
+AMF_EncodeString(char *output, char *outend, const AVal *bv)
+{
+    if ((bv->av_len < 65536 && output + 1 + 2 + bv->av_len > outend) ||
+            output + 1 + 4 + bv->av_len > outend)
+        return NULL;
+
+    if (bv->av_len < 65536)
+    {
+        *output++ = AMF_STRING;
+
+        output = AMF_EncodeInt16(output, outend, bv->av_len);
+    }
+    else
+    {
+        *output++ = AMF_LONG_STRING;
+
+        output = AMF_EncodeInt32(output, outend, bv->av_len);
+    }
+    memcpy(output, bv->av_val, bv->av_len);
+    output += bv->av_len;
+
+    return output;
+}
+
+char *
+AMF_EncodeNumber(char *output, char *outend, double dVal)
+{
+    if (output+1+8 > outend)
+        return NULL;
+
+    *output++ = AMF_NUMBER;	/* type: Number */
+
+#if __FLOAT_WORD_ORDER == __BYTE_ORDER
+#if __BYTE_ORDER == __BIG_ENDIAN
+    memcpy(output, &dVal, 8);
+#elif __BYTE_ORDER == __LITTLE_ENDIAN
+    {
+        unsigned char *ci, *co;
+        ci = (unsigned char *)&dVal;
+        co = (unsigned char *)output;
+        co[0] = ci[7];
+        co[1] = ci[6];
+        co[2] = ci[5];
+        co[3] = ci[4];
+        co[4] = ci[3];
+        co[5] = ci[2];
+        co[6] = ci[1];
+        co[7] = ci[0];
+    }
+#endif
+#else
+#if __BYTE_ORDER == __LITTLE_ENDIAN	/* __FLOAT_WORD_ORER == __BIG_ENDIAN */
+    {
+        unsigned char *ci, *co;
+        ci = (unsigned char *)&dVal;
+        co = (unsigned char *)output;
+        co[0] = ci[3];
+        co[1] = ci[2];
+        co[2] = ci[1];
+        co[3] = ci[0];
+        co[4] = ci[7];
+        co[5] = ci[6];
+        co[6] = ci[5];
+        co[7] = ci[4];
+    }
+#else /* __BYTE_ORDER == __BIG_ENDIAN && __FLOAT_WORD_ORER == __LITTLE_ENDIAN */
+    {
+        unsigned char *ci, *co;
+        ci = (unsigned char *)&dVal;
+        co = (unsigned char *)output;
+        co[0] = ci[4];
+        co[1] = ci[5];
+        co[2] = ci[6];
+        co[3] = ci[7];
+        co[4] = ci[0];
+        co[5] = ci[1];
+        co[6] = ci[2];
+        co[7] = ci[3];
+    }
+#endif
+#endif
+
+    return output+8;
+}
+
+char *
+AMF_EncodeBoolean(char *output, char *outend, int bVal)
+{
+    if (output+2 > outend)
+        return NULL;
+
+    *output++ = AMF_BOOLEAN;
+
+    *output++ = bVal ? 0x01 : 0x00;
+
+    return output;
+}
+
+char *
+AMF_EncodeNamedString(char *output, char *outend, const AVal *strName, const AVal *strValue)
+{
+    if (output+2+strName->av_len > outend)
+        return NULL;
+    output = AMF_EncodeInt16(output, outend, strName->av_len);
+
+    memcpy(output, strName->av_val, strName->av_len);
+    output += strName->av_len;
+
+    return AMF_EncodeString(output, outend, strValue);
+}
+
+char *
+AMF_EncodeNamedNumber(char *output, char *outend, const AVal *strName, double dVal)
+{
+    if (output+2+strName->av_len > outend)
+        return NULL;
+    output = AMF_EncodeInt16(output, outend, strName->av_len);
+
+    memcpy(output, strName->av_val, strName->av_len);
+    output += strName->av_len;
+
+    return AMF_EncodeNumber(output, outend, dVal);
+}
+
+char *
+AMF_EncodeNamedBoolean(char *output, char *outend, const AVal *strName, int bVal)
+{
+    if (output+2+strName->av_len > outend)
+        return NULL;
+    output = AMF_EncodeInt16(output, outend, strName->av_len);
+
+    memcpy(output, strName->av_val, strName->av_len);
+    output += strName->av_len;
+
+    return AMF_EncodeBoolean(output, outend, bVal);
+}
+
+void
+AMFProp_GetName(AMFObjectProperty *prop, AVal *name)
+{
+    *name = prop->p_name;
+}
+
+void
+AMFProp_SetName(AMFObjectProperty *prop, AVal *name)
+{
+    prop->p_name = *name;
+}
+
+AMFDataType
+AMFProp_GetType(AMFObjectProperty *prop)
+{
+    return prop->p_type;
+}
+
+double
+AMFProp_GetNumber(AMFObjectProperty *prop)
+{
+    return prop->p_vu.p_number;
+}
+
+int
+AMFProp_GetBoolean(AMFObjectProperty *prop)
+{
+    return prop->p_vu.p_number != 0;
+}
+
+void
+AMFProp_GetString(AMFObjectProperty *prop, AVal *str)
+{
+    *str = prop->p_vu.p_aval;
+}
+
+void
+AMFProp_GetObject(AMFObjectProperty *prop, AMFObject *obj)
+{
+    *obj = prop->p_vu.p_object;
+}
+
+int
+AMFProp_IsValid(AMFObjectProperty *prop)
+{
+    return prop->p_type != AMF_INVALID;
+}
+
+char *
+AMFProp_Encode(AMFObjectProperty *prop, char *pBuffer, char *pBufEnd)
+{
+    if (prop->p_type == AMF_INVALID)
+        return NULL;
+
+    if (prop->p_type != AMF_NULL && pBuffer + prop->p_name.av_len + 2 + 1 >= pBufEnd)
+        return NULL;
+
+    if (prop->p_type != AMF_NULL && prop->p_name.av_len)
+    {
+        *pBuffer++ = prop->p_name.av_len >> 8;
+        *pBuffer++ = prop->p_name.av_len & 0xff;
+        memcpy(pBuffer, prop->p_name.av_val, prop->p_name.av_len);
+        pBuffer += prop->p_name.av_len;
+    }
+
+    switch (prop->p_type)
+    {
+    case AMF_NUMBER:
+        pBuffer = AMF_EncodeNumber(pBuffer, pBufEnd, prop->p_vu.p_number);
+        break;
+
+    case AMF_BOOLEAN:
+        pBuffer = AMF_EncodeBoolean(pBuffer, pBufEnd, prop->p_vu.p_number != 0);
+        break;
+
+    case AMF_STRING:
+        pBuffer = AMF_EncodeString(pBuffer, pBufEnd, &prop->p_vu.p_aval);
+        break;
+
+    case AMF_NULL:
+        if (pBuffer+1 >= pBufEnd)
+            return NULL;
+        *pBuffer++ = AMF_NULL;
+        break;
+
+    case AMF_OBJECT:
+        pBuffer = AMF_Encode(&prop->p_vu.p_object, pBuffer, pBufEnd);
+        break;
+
+    case AMF_ECMA_ARRAY:
+        pBuffer = AMF_EncodeEcmaArray(&prop->p_vu.p_object, pBuffer, pBufEnd);
+        break;
+
+    case AMF_STRICT_ARRAY:
+        pBuffer = AMF_EncodeArray(&prop->p_vu.p_object, pBuffer, pBufEnd);
+        break;
+
+    default:
+        RTMP_Log(RTMP_LOGERROR, "%s, invalid type. %d", __FUNCTION__, prop->p_type);
+        pBuffer = NULL;
+    };
+
+    return pBuffer;
+}
+
+#define AMF3_INTEGER_MAX	268435455
+#define AMF3_INTEGER_MIN	-268435456
+
+int
+AMF3ReadInteger(const char *data, int32_t *valp)
+{
+    int i = 0;
+    int32_t val = 0;
+
+    while (i <= 2)
+    {
+        /* handle first 3 bytes */
+        if (data[i] & 0x80)
+        {
+            /* byte used */
+            val <<= 7;		/* shift up */
+            val |= (data[i] & 0x7f);	/* add bits */
+            i++;
+        }
+        else
+        {
+            break;
+        }
+    }
+
+    if (i > 2)
+    {
+        /* use 4th byte, all 8bits */
+        val <<= 8;
+        val |= data[3];
+
+        /* range check */
+        if (val > AMF3_INTEGER_MAX)
+            val -= (1 << 29);
+    }
+    else
+    {
+        /* use 7bits of last unparsed byte (0xxxxxxx) */
+        val <<= 7;
+        val |= data[i];
+    }
+
+    *valp = val;
+
+    return i > 2 ? 4 : i + 1;
+}
+
+int
+AMF3ReadString(const char *data, AVal *str)
+{
+    int32_t ref = 0;
+    int len;
+    assert(str != 0);
+
+    len = AMF3ReadInteger(data, &ref);
+    data += len;
+
+    if ((ref & 0x1) == 0)
+    {
+        /* reference: 0xxx */
+        uint32_t refIndex = (ref >> 1);
+        RTMP_Log(RTMP_LOGDEBUG,
+                 "%s, string reference, index: %d, not supported, ignoring!",
+                 __FUNCTION__, refIndex);
+        return len;
+    }
+    else
+    {
+        uint32_t nSize = (ref >> 1);
+
+        str->av_val = (char *)data;
+        str->av_len = nSize;
+
+        return len + nSize;
+    }
+    return len;
+}
+
+int
+AMF3Prop_Decode(AMFObjectProperty *prop, const char *pBuffer, int nSize,
+                int bDecodeName)
+{
+    int nOriginalSize = nSize;
+    AMF3DataType type;
+
+    prop->p_name.av_len = 0;
+    prop->p_name.av_val = NULL;
+
+    if (nSize == 0 || !pBuffer)
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "empty buffer/no buffer pointer!");
+        return -1;
+    }
+
+    /* decode name */
+    if (bDecodeName)
+    {
+        AVal name;
+        int nRes = AMF3ReadString(pBuffer, &name);
+
+        if (name.av_len <= 0)
+            return nRes;
+
+        prop->p_name = name;
+        pBuffer += nRes;
+        nSize -= nRes;
+    }
+
+    /* decode */
+    type = *pBuffer++;
+    nSize--;
+
+    switch (type)
+    {
+    case AMF3_UNDEFINED:
+    case AMF3_NULL:
+        prop->p_type = AMF_NULL;
+        break;
+    case AMF3_FALSE:
+        prop->p_type = AMF_BOOLEAN;
+        prop->p_vu.p_number = 0.0;
+        break;
+    case AMF3_TRUE:
+        prop->p_type = AMF_BOOLEAN;
+        prop->p_vu.p_number = 1.0;
+        break;
+    case AMF3_INTEGER:
+    {
+        int32_t res = 0;
+        int len = AMF3ReadInteger(pBuffer, &res);
+        prop->p_vu.p_number = (double)res;
+        prop->p_type = AMF_NUMBER;
+        nSize -= len;
+        break;
+    }
+    case AMF3_DOUBLE:
+        if (nSize < 8)
+            return -1;
+        prop->p_vu.p_number = AMF_DecodeNumber(pBuffer);
+        prop->p_type = AMF_NUMBER;
+        nSize -= 8;
+        break;
+    case AMF3_STRING:
+    case AMF3_XML_DOC:
+    case AMF3_XML:
+    {
+        int len = AMF3ReadString(pBuffer, &prop->p_vu.p_aval);
+        prop->p_type = AMF_STRING;
+        nSize -= len;
+        break;
+    }
+    case AMF3_DATE:
+    {
+        int32_t res = 0;
+        int len = AMF3ReadInteger(pBuffer, &res);
+
+        nSize -= len;
+        pBuffer += len;
+
+        if ((res & 0x1) == 0)
+        {
+            /* reference */
+            uint32_t nIndex = (res >> 1);
+            RTMP_Log(RTMP_LOGDEBUG, "AMF3_DATE reference: %d, not supported!", nIndex);
+        }
+        else
+        {
+            if (nSize < 8)
+                return -1;
+
+            prop->p_vu.p_number = AMF_DecodeNumber(pBuffer);
+            nSize -= 8;
+            prop->p_type = AMF_NUMBER;
+        }
+        break;
+    }
+    case AMF3_OBJECT:
+    {
+        int nRes = AMF3_Decode(&prop->p_vu.p_object, pBuffer, nSize, TRUE);
+        if (nRes == -1)
+            return -1;
+        nSize -= nRes;
+        prop->p_type = AMF_OBJECT;
+        break;
+    }
+    case AMF3_ARRAY:
+    case AMF3_BYTE_ARRAY:
+    default:
+        RTMP_Log(RTMP_LOGDEBUG, "%s - AMF3 unknown/unsupported datatype 0x%02x, @%p",
+                 __FUNCTION__, (unsigned char)(*pBuffer), pBuffer);
+        return -1;
+    }
+
+    return nOriginalSize - nSize;
+}
+
+int
+AMFProp_Decode(AMFObjectProperty *prop, const char *pBuffer, int nSize,
+               int bDecodeName)
+{
+    int nOriginalSize = nSize;
+    int nRes;
+
+    prop->p_name.av_len = 0;
+    prop->p_name.av_val = NULL;
+
+    if (nSize == 0 || !pBuffer)
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Empty buffer/no buffer pointer!", __FUNCTION__);
+        return -1;
+    }
+
+    if (bDecodeName && nSize < 4)
+    {
+        /* at least name (length + at least 1 byte) and 1 byte of data */
+        RTMP_Log(RTMP_LOGDEBUG,
+                 "%s: Not enough data for decoding with name, less than 4 bytes!",
+                 __FUNCTION__);
+        return -1;
+    }
+
+    if (bDecodeName)
+    {
+        unsigned short nNameSize = AMF_DecodeInt16(pBuffer);
+        if (nNameSize > nSize - 2)
+        {
+            RTMP_Log(RTMP_LOGDEBUG,
+                     "%s: Name size out of range: namesize (%d) > len (%d) - 2",
+                     __FUNCTION__, nNameSize, nSize);
+            return -1;
+        }
+
+        AMF_DecodeString(pBuffer, &prop->p_name);
+        nSize -= 2 + nNameSize;
+        pBuffer += 2 + nNameSize;
+    }
+
+    if (nSize == 0)
+    {
+        return -1;
+    }
+
+    nSize--;
+
+    prop->p_type = *pBuffer++;
+    switch (prop->p_type)
+    {
+    case AMF_NUMBER:
+        if (nSize < 8)
+            return -1;
+        prop->p_vu.p_number = AMF_DecodeNumber(pBuffer);
+        nSize -= 8;
+        break;
+    case AMF_BOOLEAN:
+        if (nSize < 1)
+            return -1;
+        prop->p_vu.p_number = (double)AMF_DecodeBoolean(pBuffer);
+        nSize--;
+        break;
+    case AMF_STRING:
+    {
+        unsigned short nStringSize = AMF_DecodeInt16(pBuffer);
+
+        if (nSize < (long)nStringSize + 2)
+            return -1;
+        AMF_DecodeString(pBuffer, &prop->p_vu.p_aval);
+        nSize -= (2 + nStringSize);
+        break;
+    }
+    case AMF_OBJECT:
+    {
+        int nRes = AMF_Decode(&prop->p_vu.p_object, pBuffer, nSize, TRUE);
+        if (nRes == -1)
+            return -1;
+        nSize -= nRes;
+        break;
+    }
+    case AMF_MOVIECLIP:
+    {
+        RTMP_Log(RTMP_LOGERROR, "AMF_MOVIECLIP reserved!");
+        return -1;
+        break;
+    }
+    case AMF_NULL:
+    case AMF_UNDEFINED:
+    case AMF_UNSUPPORTED:
+        prop->p_type = AMF_NULL;
+        break;
+    case AMF_REFERENCE:
+    {
+        RTMP_Log(RTMP_LOGERROR, "AMF_REFERENCE not supported!");
+        return -1;
+        break;
+    }
+    case AMF_ECMA_ARRAY:
+    {
+        nSize -= 4;
+
+        /* next comes the rest, mixed array has a final 0x000009 mark and names, so its an object */
+        nRes = AMF_Decode(&prop->p_vu.p_object, pBuffer + 4, nSize, TRUE);
+        if (nRes == -1)
+            return -1;
+        nSize -= nRes;
+        break;
+    }
+    case AMF_OBJECT_END:
+    {
+        return -1;
+        break;
+    }
+    case AMF_STRICT_ARRAY:
+    {
+        unsigned int nArrayLen = AMF_DecodeInt32(pBuffer);
+        nSize -= 4;
+
+        nRes = AMF_DecodeArray(&prop->p_vu.p_object, pBuffer + 4, nSize,
+                               nArrayLen, FALSE);
+        if (nRes == -1)
+            return -1;
+        nSize -= nRes;
+        break;
+    }
+    case AMF_DATE:
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "AMF_DATE");
+
+        if (nSize < 10)
+            return -1;
+
+        prop->p_vu.p_number = AMF_DecodeNumber(pBuffer);
+        prop->p_UTCoffset = AMF_DecodeInt16(pBuffer + 8);
+
+        nSize -= 10;
+        break;
+    }
+    case AMF_LONG_STRING:
+    case AMF_XML_DOC:
+    {
+        unsigned int nStringSize = AMF_DecodeInt32(pBuffer);
+        if (nSize < (long)nStringSize + 4)
+            return -1;
+        AMF_DecodeLongString(pBuffer, &prop->p_vu.p_aval);
+        nSize -= (4 + nStringSize);
+        if (prop->p_type == AMF_LONG_STRING)
+            prop->p_type = AMF_STRING;
+        break;
+    }
+    case AMF_RECORDSET:
+    {
+        RTMP_Log(RTMP_LOGERROR, "AMF_RECORDSET reserved!");
+        return -1;
+        break;
+    }
+    case AMF_TYPED_OBJECT:
+    {
+        RTMP_Log(RTMP_LOGERROR, "AMF_TYPED_OBJECT not supported!");
+        return -1;
+        break;
+    }
+    case AMF_AVMPLUS:
+    {
+        int nRes = AMF3_Decode(&prop->p_vu.p_object, pBuffer, nSize, TRUE);
+        if (nRes == -1)
+            return -1;
+        nSize -= nRes;
+        prop->p_type = AMF_OBJECT;
+        break;
+    }
+    default:
+        RTMP_Log(RTMP_LOGDEBUG, "%s - unknown datatype 0x%02x, @%p", __FUNCTION__,
+                 prop->p_type, pBuffer - 1);
+        return -1;
+    }
+
+    return nOriginalSize - nSize;
+}
+
+void
+AMFProp_Dump(AMFObjectProperty *prop)
+{
+    char strRes[256];
+    char str[256];
+    AVal name;
+
+    if (prop->p_type == AMF_INVALID)
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "Property: INVALID");
+        return;
+    }
+
+    if (prop->p_type == AMF_NULL)
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "Property: NULL");
+        return;
+    }
+
+    if (prop->p_name.av_len)
+    {
+        name = prop->p_name;
+    }
+    else
+    {
+        name.av_val = "no-name.";
+        name.av_len = sizeof("no-name.") - 1;
+    }
+    if (name.av_len > 18)
+        name.av_len = 18;
+
+    snprintf(strRes, 255, "Name: %18.*s, ", name.av_len, name.av_val);
+
+    if (prop->p_type == AMF_OBJECT)
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "Property: <%sOBJECT>", strRes);
+        AMF_Dump(&prop->p_vu.p_object);
+        return;
+    }
+    else if (prop->p_type == AMF_ECMA_ARRAY)
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "Property: <%sECMA_ARRAY>", strRes);
+        AMF_Dump(&prop->p_vu.p_object);
+        return;
+    }
+    else if (prop->p_type == AMF_STRICT_ARRAY)
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "Property: <%sSTRICT_ARRAY>", strRes);
+        AMF_Dump(&prop->p_vu.p_object);
+        return;
+    }
+
+    switch (prop->p_type)
+    {
+    case AMF_NUMBER:
+        snprintf(str, 255, "NUMBER:\t%.2f", prop->p_vu.p_number);
+        break;
+    case AMF_BOOLEAN:
+        snprintf(str, 255, "BOOLEAN:\t%s",
+                 prop->p_vu.p_number != 0.0 ? "TRUE" : "FALSE");
+        break;
+    case AMF_STRING:
+        snprintf(str, 255, "STRING:\t%.*s", prop->p_vu.p_aval.av_len,
+                 prop->p_vu.p_aval.av_val);
+        break;
+    case AMF_DATE:
+        snprintf(str, 255, "DATE:\ttimestamp: %.2f, UTC offset: %d",
+                 prop->p_vu.p_number, prop->p_UTCoffset);
+        break;
+    default:
+        snprintf(str, 255, "INVALID TYPE 0x%02x", (unsigned char)prop->p_type);
+    }
+
+    RTMP_Log(RTMP_LOGDEBUG, "Property: <%s%s>", strRes, str);
+}
+
+void
+AMFProp_Reset(AMFObjectProperty *prop)
+{
+    if (prop->p_type == AMF_OBJECT)
+        AMF_Reset(&prop->p_vu.p_object);
+    else
+    {
+        prop->p_vu.p_aval.av_len = 0;
+        prop->p_vu.p_aval.av_val = NULL;
+    }
+    prop->p_type = AMF_INVALID;
+}
+
+/* AMFObject */
+
+char *
+AMF_Encode(AMFObject *obj, char *pBuffer, char *pBufEnd)
+{
+    int i;
+
+    if (pBuffer+4 >= pBufEnd)
+        return NULL;
+
+    *pBuffer++ = AMF_OBJECT;
+
+    for (i = 0; i < obj->o_num; i++)
+    {
+        char *res = AMFProp_Encode(&obj->o_props[i], pBuffer, pBufEnd);
+        if (res == NULL)
+        {
+            RTMP_Log(RTMP_LOGERROR, "AMF_Encode - failed to encode property in index %d",
+                     i);
+            break;
+        }
+        else
+        {
+            pBuffer = res;
+        }
+    }
+
+    if (pBuffer + 3 >= pBufEnd)
+        return NULL;			/* no room for the end marker */
+
+    pBuffer = AMF_EncodeInt24(pBuffer, pBufEnd, AMF_OBJECT_END);
+
+    return pBuffer;
+}
+
+char *
+AMF_EncodeEcmaArray(AMFObject *obj, char *pBuffer, char *pBufEnd)
+{
+    int i;
+
+    if (pBuffer+4 >= pBufEnd)
+        return NULL;
+
+    *pBuffer++ = AMF_ECMA_ARRAY;
+
+    pBuffer = AMF_EncodeInt32(pBuffer, pBufEnd, obj->o_num);
+
+    for (i = 0; i < obj->o_num; i++)
+    {
+        char *res = AMFProp_Encode(&obj->o_props[i], pBuffer, pBufEnd);
+        if (res == NULL)
+        {
+            RTMP_Log(RTMP_LOGERROR, "AMF_Encode - failed to encode property in index %d",
+                     i);
+            break;
+        }
+        else
+        {
+            pBuffer = res;
+        }
+    }
+
+    if (pBuffer + 3 >= pBufEnd)
+        return NULL;			/* no room for the end marker */
+
+    pBuffer = AMF_EncodeInt24(pBuffer, pBufEnd, AMF_OBJECT_END);
+
+    return pBuffer;
+}
+
+char *
+AMF_EncodeArray(AMFObject *obj, char *pBuffer, char *pBufEnd)
+{
+    int i;
+
+    if (pBuffer+4 >= pBufEnd)
+        return NULL;
+
+    *pBuffer++ = AMF_STRICT_ARRAY;
+
+    pBuffer = AMF_EncodeInt32(pBuffer, pBufEnd, obj->o_num);
+
+    for (i = 0; i < obj->o_num; i++)
+    {
+        char *res = AMFProp_Encode(&obj->o_props[i], pBuffer, pBufEnd);
+        if (res == NULL)
+        {
+            RTMP_Log(RTMP_LOGERROR, "AMF_Encode - failed to encode property in index %d",
+                     i);
+            break;
+        }
+        else
+        {
+            pBuffer = res;
+        }
+    }
+
+    //if (pBuffer + 3 >= pBufEnd)
+    //  return NULL;			/* no room for the end marker */
+
+    //pBuffer = AMF_EncodeInt24(pBuffer, pBufEnd, AMF_OBJECT_END);
+
+    return pBuffer;
+}
+
+int
+AMF_DecodeArray(AMFObject *obj, const char *pBuffer, int nSize,
+                int nArrayLen, int bDecodeName)
+{
+    int nOriginalSize = nSize;
+    int bError = FALSE;
+
+    obj->o_num = 0;
+    obj->o_props = NULL;
+    while (nArrayLen > 0)
+    {
+        AMFObjectProperty prop;
+        int nRes;
+        nArrayLen--;
+
+        nRes = AMFProp_Decode(&prop, pBuffer, nSize, bDecodeName);
+        if (nRes == -1)
+            bError = TRUE;
+        else
+        {
+            nSize -= nRes;
+            pBuffer += nRes;
+            AMF_AddProp(obj, &prop);
+        }
+    }
+    if (bError)
+        return -1;
+
+    return nOriginalSize - nSize;
+}
+
+int
+AMF3_Decode(AMFObject *obj, const char *pBuffer, int nSize, int bAMFData)
+{
+    int nOriginalSize = nSize;
+    int32_t ref;
+    int len;
+
+    obj->o_num = 0;
+    obj->o_props = NULL;
+    if (bAMFData)
+    {
+        if (*pBuffer != AMF3_OBJECT)
+            RTMP_Log(RTMP_LOGERROR,
+                     "AMF3 Object encapsulated in AMF stream does not start with AMF3_OBJECT!");
+        pBuffer++;
+        nSize--;
+    }
+
+    ref = 0;
+    len = AMF3ReadInteger(pBuffer, &ref);
+    pBuffer += len;
+    nSize -= len;
+
+    if ((ref & 1) == 0)
+    {
+        /* object reference, 0xxx */
+        uint32_t objectIndex = (ref >> 1);
+
+        RTMP_Log(RTMP_LOGDEBUG, "Object reference, index: %d", objectIndex);
+    }
+    else				/* object instance */
+    {
+        int32_t classRef = (ref >> 1);
+
+        AMF3ClassDef cd = { {0, 0}
+        };
+        AMFObjectProperty prop;
+
+        if ((classRef & 0x1) == 0)
+        {
+            /* class reference */
+            uint32_t classIndex = (classRef >> 1);
+            RTMP_Log(RTMP_LOGDEBUG, "Class reference: %d", classIndex);
+        }
+        else
+        {
+            int32_t classExtRef = (classRef >> 1);
+            int i;
+
+            cd.cd_externalizable = (classExtRef & 0x1) == 1;
+            cd.cd_dynamic = ((classExtRef >> 1) & 0x1) == 1;
+
+            cd.cd_num = classExtRef >> 2;
+
+            /* class name */
+
+            len = AMF3ReadString(pBuffer, &cd.cd_name);
+            nSize -= len;
+            pBuffer += len;
+
+            /*std::string str = className; */
+
+            RTMP_Log(RTMP_LOGDEBUG,
+                     "Class name: %s, externalizable: %d, dynamic: %d, classMembers: %d",
+                     cd.cd_name.av_val, cd.cd_externalizable, cd.cd_dynamic,
+                     cd.cd_num);
+
+            for (i = 0; i < cd.cd_num; i++)
+            {
+                AVal memberName;
+                len = AMF3ReadString(pBuffer, &memberName);
+                RTMP_Log(RTMP_LOGDEBUG, "Member: %s", memberName.av_val);
+                AMF3CD_AddProp(&cd, &memberName);
+                nSize -= len;
+                pBuffer += len;
+            }
+        }
+
+        /* add as referencable object */
+
+        if (cd.cd_externalizable)
+        {
+            int nRes;
+            AVal name = AVC("DEFAULT_ATTRIBUTE");
+
+            RTMP_Log(RTMP_LOGDEBUG, "Externalizable, TODO check");
+
+            nRes = AMF3Prop_Decode(&prop, pBuffer, nSize, FALSE);
+            if (nRes == -1)
+                RTMP_Log(RTMP_LOGDEBUG, "%s, failed to decode AMF3 property!",
+                         __FUNCTION__);
+            else
+            {
+                nSize -= nRes;
+                pBuffer += nRes;
+            }
+
+            AMFProp_SetName(&prop, &name);
+            AMF_AddProp(obj, &prop);
+        }
+        else
+        {
+            int nRes, i;
+            for (i = 0; i < cd.cd_num; i++)	/* non-dynamic */
+            {
+                nRes = AMF3Prop_Decode(&prop, pBuffer, nSize, FALSE);
+                if (nRes == -1)
+                    RTMP_Log(RTMP_LOGDEBUG, "%s, failed to decode AMF3 property!",
+                             __FUNCTION__);
+
+                AMFProp_SetName(&prop, AMF3CD_GetProp(&cd, i));
+                AMF_AddProp(obj, &prop);
+
+                pBuffer += nRes;
+                nSize -= nRes;
+            }
+            if (cd.cd_dynamic)
+            {
+                int len = 0;
+
+                do
+                {
+                    nRes = AMF3Prop_Decode(&prop, pBuffer, nSize, TRUE);
+                    AMF_AddProp(obj, &prop);
+
+                    pBuffer += nRes;
+                    nSize -= nRes;
+
+                    len = prop.p_name.av_len;
+                }
+                while (len > 0);
+            }
+        }
+        RTMP_Log(RTMP_LOGDEBUG, "class object!");
+    }
+    return nOriginalSize - nSize;
+}
+
+int
+AMF_Decode(AMFObject *obj, const char *pBuffer, int nSize, int bDecodeName)
+{
+    int nOriginalSize = nSize;
+    int bError = FALSE;		/* if there is an error while decoding - try to at least find the end mark AMF_OBJECT_END */
+
+    obj->o_num = 0;
+    obj->o_props = NULL;
+    while (nSize > 0)
+    {
+        AMFObjectProperty prop;
+        int nRes;
+
+        if (nSize >=3 && AMF_DecodeInt24(pBuffer) == AMF_OBJECT_END)
+        {
+            nSize -= 3;
+            bError = FALSE;
+            break;
+        }
+
+        if (bError)
+        {
+            RTMP_Log(RTMP_LOGERROR,
+                     "DECODING ERROR, IGNORING BYTES UNTIL NEXT KNOWN PATTERN!");
+            nSize--;
+            pBuffer++;
+            continue;
+        }
+
+        nRes = AMFProp_Decode(&prop, pBuffer, nSize, bDecodeName);
+        if (nRes == -1)
+            bError = TRUE;
+        else
+        {
+            nSize -= nRes;
+            pBuffer += nRes;
+            AMF_AddProp(obj, &prop);
+        }
+    }
+
+    if (bError)
+        return -1;
+
+    return nOriginalSize - nSize;
+}
+
+void
+AMF_AddProp(AMFObject *obj, const AMFObjectProperty *prop)
+{
+    if (!(obj->o_num & 0x0f))
+        obj->o_props =
+            realloc(obj->o_props, (obj->o_num + 16) * sizeof(AMFObjectProperty));
+    memcpy(&obj->o_props[obj->o_num++], prop, sizeof(AMFObjectProperty));
+}
+
+int
+AMF_CountProp(AMFObject *obj)
+{
+    return obj->o_num;
+}
+
+AMFObjectProperty *
+AMF_GetProp(AMFObject *obj, const AVal *name, int nIndex)
+{
+    if (nIndex >= 0)
+    {
+        if (nIndex < obj->o_num)
+            return &obj->o_props[nIndex];
+    }
+    else
+    {
+        int n;
+        for (n = 0; n < obj->o_num; n++)
+        {
+            if (AVMATCH(&obj->o_props[n].p_name, name))
+                return &obj->o_props[n];
+        }
+    }
+
+    return (AMFObjectProperty *)&AMFProp_Invalid;
+}
+
+void
+AMF_Dump(AMFObject *obj)
+{
+    int n;
+    RTMP_Log(RTMP_LOGDEBUG, "(object begin)");
+    for (n = 0; n < obj->o_num; n++)
+    {
+        AMFProp_Dump(&obj->o_props[n]);
+    }
+    RTMP_Log(RTMP_LOGDEBUG, "(object end)");
+}
+
+void
+AMF_Reset(AMFObject *obj)
+{
+    int n;
+    for (n = 0; n < obj->o_num; n++)
+    {
+        AMFProp_Reset(&obj->o_props[n]);
+    }
+    free(obj->o_props);
+    obj->o_props = NULL;
+    obj->o_num = 0;
+}
+
+
+/* AMF3ClassDefinition */
+
+void
+AMF3CD_AddProp(AMF3ClassDef *cd, AVal *prop)
+{
+    if (!(cd->cd_num & 0x0f))
+        cd->cd_props = realloc(cd->cd_props, (cd->cd_num + 16) * sizeof(AVal));
+    cd->cd_props[cd->cd_num++] = *prop;
+}
+
+AVal *
+AMF3CD_GetProp(AMF3ClassDef *cd, int nIndex)
+{
+    if (nIndex >= cd->cd_num)
+        return (AVal *)&AV_empty;
+    return &cd->cd_props[nIndex];
+}

+ 165 - 0
plugins/obs-outputs/librtmp/amf.h

@@ -0,0 +1,165 @@
+#ifndef __AMF_H__
+#define __AMF_H__
+/*
+ *      Copyright (C) 2005-2008 Team XBMC
+ *      http://www.xbmc.org
+ *      Copyright (C) 2008-2009 Andrej Stepanchuk
+ *      Copyright (C) 2009-2010 Howard Chu
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+#ifndef TRUE
+#define TRUE	1
+#define FALSE	0
+#endif
+
+#ifdef __cplusplus
+extern "C"
+{
+#endif
+
+    typedef enum
+    {
+        AMF_NUMBER = 0, AMF_BOOLEAN, AMF_STRING, AMF_OBJECT,
+        AMF_MOVIECLIP,		/* reserved, not used */
+        AMF_NULL, AMF_UNDEFINED, AMF_REFERENCE, AMF_ECMA_ARRAY, AMF_OBJECT_END,
+        AMF_STRICT_ARRAY, AMF_DATE, AMF_LONG_STRING, AMF_UNSUPPORTED,
+        AMF_RECORDSET,		/* reserved, not used */
+        AMF_XML_DOC, AMF_TYPED_OBJECT,
+        AMF_AVMPLUS,		/* switch to AMF3 */
+        AMF_INVALID = 0xff
+    }
+                  AMFDataType;
+
+    typedef enum
+    {
+        AMF3_UNDEFINED = 0, AMF3_NULL, AMF3_FALSE, AMF3_TRUE,
+        AMF3_INTEGER, AMF3_DOUBLE, AMF3_STRING, AMF3_XML_DOC, AMF3_DATE,
+        AMF3_ARRAY, AMF3_OBJECT, AMF3_XML, AMF3_BYTE_ARRAY
+    } AMF3DataType;
+
+    typedef struct AVal
+    {
+        char *av_val;
+        int av_len;
+    } AVal;
+#define AVC(str)	{str,sizeof(str)-1}
+#define AVMATCH(a1,a2)	((a1)->av_len == (a2)->av_len && !memcmp((a1)->av_val,(a2)->av_val,(a1)->av_len))
+
+    struct AMFObjectProperty;
+
+    typedef struct AMFObject
+    {
+        int o_num;
+        struct AMFObjectProperty *o_props;
+    } AMFObject;
+
+    typedef struct AMFObjectProperty
+    {
+        AVal p_name;
+        AMFDataType p_type;
+        union
+        {
+            double p_number;
+            AVal p_aval;
+            AMFObject p_object;
+        } p_vu;
+        int16_t p_UTCoffset;
+    } AMFObjectProperty;
+
+    char *AMF_EncodeString(char *output, char *outend, const AVal * str);
+    char *AMF_EncodeNumber(char *output, char *outend, double dVal);
+    char *AMF_EncodeInt16(char *output, char *outend, short nVal);
+    char *AMF_EncodeInt24(char *output, char *outend, int nVal);
+    char *AMF_EncodeInt32(char *output, char *outend, int nVal);
+    char *AMF_EncodeBoolean(char *output, char *outend, int bVal);
+
+    /* Shortcuts for AMFProp_Encode */
+    char *AMF_EncodeNamedString(char *output, char *outend, const AVal * name, const AVal * value);
+    char *AMF_EncodeNamedNumber(char *output, char *outend, const AVal * name, double dVal);
+    char *AMF_EncodeNamedBoolean(char *output, char *outend, const AVal * name, int bVal);
+
+    unsigned short AMF_DecodeInt16(const char *data);
+    unsigned int AMF_DecodeInt24(const char *data);
+    unsigned int AMF_DecodeInt32(const char *data);
+    void AMF_DecodeString(const char *data, AVal * str);
+    void AMF_DecodeLongString(const char *data, AVal * str);
+    int AMF_DecodeBoolean(const char *data);
+    double AMF_DecodeNumber(const char *data);
+
+    char *AMF_Encode(AMFObject * obj, char *pBuffer, char *pBufEnd);
+    char *AMF_EncodeEcmaArray(AMFObject *obj, char *pBuffer, char *pBufEnd);
+    char *AMF_EncodeArray(AMFObject *obj, char *pBuffer, char *pBufEnd);
+
+    int AMF_Decode(AMFObject * obj, const char *pBuffer, int nSize,
+                   int bDecodeName);
+    int AMF_DecodeArray(AMFObject * obj, const char *pBuffer, int nSize,
+                        int nArrayLen, int bDecodeName);
+    int AMF3_Decode(AMFObject * obj, const char *pBuffer, int nSize,
+                    int bDecodeName);
+    void AMF_Dump(AMFObject * obj);
+    void AMF_Reset(AMFObject * obj);
+
+    void AMF_AddProp(AMFObject * obj, const AMFObjectProperty * prop);
+    int AMF_CountProp(AMFObject * obj);
+    AMFObjectProperty *AMF_GetProp(AMFObject * obj, const AVal * name,
+                                   int nIndex);
+
+    AMFDataType AMFProp_GetType(AMFObjectProperty * prop);
+    void AMFProp_SetNumber(AMFObjectProperty * prop, double dval);
+    void AMFProp_SetBoolean(AMFObjectProperty * prop, int bflag);
+    void AMFProp_SetString(AMFObjectProperty * prop, AVal * str);
+    void AMFProp_SetObject(AMFObjectProperty * prop, AMFObject * obj);
+
+    void AMFProp_GetName(AMFObjectProperty * prop, AVal * name);
+    void AMFProp_SetName(AMFObjectProperty * prop, AVal * name);
+    double AMFProp_GetNumber(AMFObjectProperty * prop);
+    int AMFProp_GetBoolean(AMFObjectProperty * prop);
+    void AMFProp_GetString(AMFObjectProperty * prop, AVal * str);
+    void AMFProp_GetObject(AMFObjectProperty * prop, AMFObject * obj);
+
+    int AMFProp_IsValid(AMFObjectProperty * prop);
+
+    char *AMFProp_Encode(AMFObjectProperty * prop, char *pBuffer, char *pBufEnd);
+    int AMF3Prop_Decode(AMFObjectProperty * prop, const char *pBuffer,
+                        int nSize, int bDecodeName);
+    int AMFProp_Decode(AMFObjectProperty * prop, const char *pBuffer,
+                       int nSize, int bDecodeName);
+
+    void AMFProp_Dump(AMFObjectProperty * prop);
+    void AMFProp_Reset(AMFObjectProperty * prop);
+
+    typedef struct AMF3ClassDef
+    {
+        AVal cd_name;
+        char cd_externalizable;
+        char cd_dynamic;
+        int cd_num;
+        AVal *cd_props;
+    } AMF3ClassDef;
+
+    void AMF3CD_AddProp(AMF3ClassDef * cd, AVal * prop);
+    AVal *AMF3CD_GetProp(AMF3ClassDef * cd, int idx);
+
+#ifdef __cplusplus
+}
+#endif
+
+#endif				/* __AMF_H__ */

+ 89 - 0
plugins/obs-outputs/librtmp/bytes.h

@@ -0,0 +1,89 @@
+/*
+ *      Copyright (C) 2005-2008 Team XBMC
+ *      http://www.xbmc.org
+ *      Copyright (C) 2008-2009 Andrej Stepanchuk
+ *      Copyright (C) 2009-2010 Howard Chu
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+#ifndef __BYTES_H__
+#define __BYTES_H__
+
+#ifdef _WIN32
+/* Windows is little endian only */
+#define __LITTLE_ENDIAN 1234
+#define __BIG_ENDIAN    4321
+#define __BYTE_ORDER __LITTLE_ENDIAN
+#define __FLOAT_WORD_ORDER __BYTE_ORDER
+
+typedef unsigned char uint8_t;
+
+#else /* !_WIN32 */
+
+#include <sys/param.h>
+
+#if defined(BYTE_ORDER) && !defined(__BYTE_ORDER)
+#define __BYTE_ORDER    BYTE_ORDER
+#endif
+
+#if defined(BIG_ENDIAN) && !defined(__BIG_ENDIAN)
+#define __BIG_ENDIAN	BIG_ENDIAN
+#endif
+
+#if defined(LITTLE_ENDIAN) && !defined(__LITTLE_ENDIAN)
+#define __LITTLE_ENDIAN	LITTLE_ENDIAN
+#endif
+
+#endif /* !_WIN32 */
+
+/* define default endianness */
+#ifndef __LITTLE_ENDIAN
+#define __LITTLE_ENDIAN	1234
+#endif
+
+#ifndef __BIG_ENDIAN
+#define __BIG_ENDIAN	4321
+#endif
+
+#ifndef __BYTE_ORDER
+#warning "Byte order not defined on your system, assuming little endian!"
+#define __BYTE_ORDER	__LITTLE_ENDIAN
+#endif
+
+/* ok, we assume to have the same float word order and byte order if float word order is not defined */
+#ifndef __FLOAT_WORD_ORDER
+/* #warning "Float word order not defined, assuming the same as byte order!" */
+#define __FLOAT_WORD_ORDER	__BYTE_ORDER
+#endif
+
+#if !defined(__BYTE_ORDER) || !defined(__FLOAT_WORD_ORDER)
+#error "Undefined byte or float word order!"
+#endif
+
+#if __FLOAT_WORD_ORDER != __BIG_ENDIAN && __FLOAT_WORD_ORDER != __LITTLE_ENDIAN
+#error "Unknown/unsupported float word order!"
+#endif
+
+#if __BYTE_ORDER != __BIG_ENDIAN && __BYTE_ORDER != __LITTLE_ENDIAN
+#error "Unknown/unsupported byte order!"
+#endif
+
+#endif
+

+ 109 - 0
plugins/obs-outputs/librtmp/cencode.c

@@ -0,0 +1,109 @@
+/*
+cencoder.c - c source to a base64 encoding algorithm implementation
+
+This is part of the libb64 project, and has been placed in the public domain.
+For details, see http://sourceforge.net/projects/libb64
+*/
+
+#include "cencode.h"
+
+const int CHARS_PER_LINE = 72;
+
+void base64_init_encodestate(base64_encodestate* state_in)
+{
+	state_in->step = step_A;
+	state_in->result = 0;
+	state_in->stepcount = 0;
+}
+
+char base64_encode_value(char value_in)
+{
+	static const char* encoding = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
+	if (value_in > 63) return '=';
+	return encoding[(int)value_in];
+}
+
+int base64_encode_block(const char* plaintext_in, int length_in, char* code_out, base64_encodestate* state_in)
+{
+	const char* plainchar = plaintext_in;
+	const char* const plaintextend = plaintext_in + length_in;
+	char* codechar = code_out;
+	char result;
+	char fragment;
+
+	result = state_in->result;
+
+	switch (state_in->step)
+	{
+		while (1)
+		{
+	case step_A:
+			if (plainchar == plaintextend)
+			{
+				state_in->result = result;
+				state_in->step = step_A;
+				return (int)(codechar - code_out);
+			}
+			fragment = *plainchar++;
+			result = (fragment & 0x0fc) >> 2;
+			*codechar++ = base64_encode_value(result);
+			result = (fragment & 0x003) << 4;
+	case step_B:
+			if (plainchar == plaintextend)
+			{
+				state_in->result = result;
+				state_in->step = step_B;
+				return (int)(codechar - code_out);
+			}
+			fragment = *plainchar++;
+			result |= (fragment & 0x0f0) >> 4;
+			*codechar++ = base64_encode_value(result);
+			result = (fragment & 0x00f) << 2;
+	case step_C:
+			if (plainchar == plaintextend)
+			{
+				state_in->result = result;
+				state_in->step = step_C;
+				return (int)(codechar - code_out);
+			}
+			fragment = *plainchar++;
+			result |= (fragment & 0x0c0) >> 6;
+			*codechar++ = base64_encode_value(result);
+			result  = (fragment & 0x03f) >> 0;
+			*codechar++ = base64_encode_value(result);
+
+			++(state_in->stepcount);
+			/*if (state_in->stepcount == CHARS_PER_LINE/4)
+			{
+				*codechar++ = '\n';
+				state_in->stepcount = 0;
+			}*/
+		}
+	}
+	/* control should not reach here */
+	return (int)(codechar - code_out);
+}
+
+int base64_encode_blockend(char* code_out, base64_encodestate* state_in)
+{
+	char* codechar = code_out;
+
+	switch (state_in->step)
+	{
+	case step_B:
+		*codechar++ = base64_encode_value(state_in->result);
+		*codechar++ = '=';
+		*codechar++ = '=';
+		break;
+	case step_C:
+		*codechar++ = base64_encode_value(state_in->result);
+		*codechar++ = '=';
+		break;
+	case step_A:
+		break;
+	}
+	*codechar++ = '\0';
+
+	return (int)(codechar - code_out);
+}
+

+ 31 - 0
plugins/obs-outputs/librtmp/cencode.h

@@ -0,0 +1,31 @@
+/*
+cencode.h - c header for a base64 encoding algorithm
+
+This is part of the libb64 project, and has been placed in the public domain.
+For details, see http://sourceforge.net/projects/libb64
+*/
+
+#ifndef BASE64_CENCODE_H
+#define BASE64_CENCODE_H
+
+typedef enum
+{
+	step_A, step_B, step_C
+} base64_encodestep;
+
+typedef struct
+{
+	base64_encodestep step;
+	char result;
+	int stepcount;
+} base64_encodestate;
+
+void base64_init_encodestate(base64_encodestate* state_in);
+
+char base64_encode_value(char value_in);
+
+int base64_encode_block(const char* plaintext_in, int length_in, char* code_out, base64_encodestate* state_in);
+
+int base64_encode_blockend(char* code_out, base64_encodestate* state_in);
+
+#endif /* BASE64_CENCODE_H */

+ 330 - 0
plugins/obs-outputs/librtmp/dh.h

@@ -0,0 +1,330 @@
+/*  RTMPDump - Diffie-Hellmann Key Exchange
+ *  Copyright (C) 2009 Andrej Stepanchuk
+ *  Copyright (C) 2009-2010 Howard Chu
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+#ifdef USE_POLARSSL
+#include <polarssl/dhm.h>
+typedef mpi * MP_t;
+#define MP_new(m)	m = malloc(sizeof(mpi)); mpi_init(m)
+#define MP_set_w(mpi, w)	mpi_lset(mpi, w)
+#define MP_cmp(u, v)	mpi_cmp_mpi(u, v)
+#define MP_set(u, v)	mpi_copy(u, v)
+#define MP_sub_w(mpi, w)	mpi_sub_int(mpi, mpi, w)
+#define MP_cmp_1(mpi)	mpi_cmp_int(mpi, 1)
+#define MP_modexp(r, y, q, p)	mpi_exp_mod(r, y, q, p, NULL)
+#define MP_free(mpi)	mpi_free(mpi); free(mpi)
+#define MP_gethex(u, hex, res)	MP_new(u); res = mpi_read_string(u, 16, hex) == 0
+#define MP_bytes(u)	mpi_size(u)
+#define MP_setbin(u,buf,len)	mpi_write_binary(u,buf,len)
+#define MP_getbin(u,buf,len)	MP_new(u); mpi_read_binary(u,buf,len)
+
+typedef struct MDH
+{
+    MP_t p;
+    MP_t g;
+    MP_t pub_key;
+    MP_t priv_key;
+    long length;
+    dhm_context ctx;
+} MDH;
+
+#define MDH_new()	calloc(1,sizeof(MDH))
+#define MDH_free(vp)	{MDH *_dh = vp; dhm_free(&_dh->ctx); MP_free(_dh->p); MP_free(_dh->g); MP_free(_dh->pub_key); MP_free(_dh->priv_key); free(_dh);}
+
+static int MDH_generate_key(MDH *dh)
+{
+    unsigned char out[2];
+    MP_set(&dh->ctx.P, dh->p);
+    MP_set(&dh->ctx.G, dh->g);
+    dh->ctx.len = 128;
+    dhm_make_public(&dh->ctx, 1024, out, 1, havege_random, &RTMP_TLS_ctx->hs);
+    MP_new(dh->pub_key);
+    MP_new(dh->priv_key);
+    MP_set(dh->pub_key, &dh->ctx.GX);
+    MP_set(dh->priv_key, &dh->ctx.X);
+    return 1;
+}
+
+static int MDH_compute_key(uint8_t *secret, size_t len, MP_t pub, MDH *dh)
+{
+    MP_set(&dh->ctx.GY, pub);
+    dhm_calc_secret(&dh->ctx, secret, &len);
+    return 0;
+}
+
+#elif defined(USE_GNUTLS)
+#include <gmp.h>
+#include <nettle/bignum.h>
+typedef mpz_ptr MP_t;
+#define MP_new(m)	m = malloc(sizeof(*m)); mpz_init2(m, 1)
+#define MP_set_w(mpi, w)	mpz_set_ui(mpi, w)
+#define MP_cmp(u, v)	mpz_cmp(u, v)
+#define MP_set(u, v)	mpz_set(u, v)
+#define MP_sub_w(mpi, w)	mpz_sub_ui(mpi, mpi, w)
+#define MP_cmp_1(mpi)	mpz_cmp_ui(mpi, 1)
+#define MP_modexp(r, y, q, p)	mpz_powm(r, y, q, p)
+#define MP_free(mpi)	mpz_clear(mpi); free(mpi)
+#define MP_gethex(u, hex, res)	u = malloc(sizeof(*u)); mpz_init2(u, 1); res = (mpz_set_str(u, hex, 16) == 0)
+#define MP_bytes(u)	(mpz_sizeinbase(u, 2) + 7) / 8
+#define MP_setbin(u,buf,len)	nettle_mpz_get_str_256(len,buf,u)
+#define MP_getbin(u,buf,len)	u = malloc(sizeof(*u)); mpz_init2(u, 1); nettle_mpz_set_str_256_u(u,len,buf)
+
+typedef struct MDH
+{
+    MP_t p;
+    MP_t g;
+    MP_t pub_key;
+    MP_t priv_key;
+    long length;
+} MDH;
+
+#define	MDH_new()	calloc(1,sizeof(MDH))
+#define MDH_free(dh)	do {MP_free(((MDH*)(dh))->p); MP_free(((MDH*)(dh))->g); MP_free(((MDH*)(dh))->pub_key); MP_free(((MDH*)(dh))->priv_key); free(dh);} while(0)
+
+extern MP_t gnutls_calc_dh_secret(MP_t *priv, MP_t g, MP_t p);
+extern MP_t gnutls_calc_dh_key(MP_t y, MP_t x, MP_t p);
+
+#define MDH_generate_key(dh)	(dh->pub_key = gnutls_calc_dh_secret(&dh->priv_key, dh->g, dh->p))
+static int MDH_compute_key(uint8_t *secret, size_t len, MP_t pub, MDH *dh)
+{
+    MP_t sec = gnutls_calc_dh_key(pub, dh->priv_key, dh->p);
+    if (sec)
+    {
+        MP_setbin(sec, secret, len);
+        MP_free(sec);
+        return 0;
+    }
+    else
+        return -1;
+}
+
+#else /* USE_OPENSSL */
+#include <openssl/bn.h>
+#include <openssl/dh.h>
+
+typedef BIGNUM * MP_t;
+#define MP_new(m)	m = BN_new()
+#define MP_set_w(mpi, w)	BN_set_word(mpi, w)
+#define MP_cmp(u, v)	BN_cmp(u, v)
+#define MP_set(u, v)	BN_copy(u, v)
+#define MP_sub_w(mpi, w)	BN_sub_word(mpi, w)
+#define MP_cmp_1(mpi)	BN_cmp(mpi, BN_value_one())
+#define MP_modexp(r, y, q, p)	do {BN_CTX *ctx = BN_CTX_new(); BN_mod_exp(r, y, q, p, ctx); BN_CTX_free(ctx);} while(0)
+#define MP_free(mpi)	BN_free(mpi)
+#define MP_gethex(u, hex, res)	res = BN_hex2bn(&u, hex)
+#define MP_bytes(u)	BN_num_bytes(u)
+#define MP_setbin(u,buf,len)	BN_bn2bin(u,buf)
+#define MP_getbin(u,buf,len)	u = BN_bin2bn(buf,len,0)
+
+#define MDH	DH
+#define MDH_new()	DH_new()
+#define MDH_free(dh)	DH_free(dh)
+#define MDH_generate_key(dh)	DH_generate_key(dh)
+#define MDH_compute_key(secret, seclen, pub, dh)	DH_compute_key(secret, pub, dh)
+
+#endif
+
+#include "log.h"
+#include "dhgroups.h"
+
+/* RFC 2631, Section 2.1.5, http://www.ietf.org/rfc/rfc2631.txt */
+static int
+isValidPublicKey(MP_t y, MP_t p, MP_t q)
+{
+    int ret = TRUE;
+    MP_t bn;
+    assert(y);
+
+    MP_new(bn);
+    assert(bn);
+
+    /* y must lie in [2,p-1] */
+    MP_set_w(bn, 1);
+    if (MP_cmp(y, bn) < 0)
+    {
+        RTMP_Log(RTMP_LOGERROR, "DH public key must be at least 2");
+        ret = FALSE;
+        goto failed;
+    }
+
+    /* bn = p-2 */
+    MP_set(bn, p);
+    MP_sub_w(bn, 1);
+    if (MP_cmp(y, bn) > 0)
+    {
+        RTMP_Log(RTMP_LOGERROR, "DH public key must be at most p-2");
+        ret = FALSE;
+        goto failed;
+    }
+
+    /* Verify with Sophie-Germain prime
+     *
+     * This is a nice test to make sure the public key position is calculated
+     * correctly. This test will fail in about 50% of the cases if applied to
+     * random data.
+     */
+    if (q)
+    {
+        /* y must fulfill y^q mod p = 1 */
+        MP_modexp(bn, y, q, p);
+
+        if (MP_cmp_1(bn) != 0)
+        {
+            RTMP_Log(RTMP_LOGWARNING, "DH public key does not fulfill y^q mod p = 1");
+        }
+    }
+
+failed:
+    MP_free(bn);
+    return ret;
+}
+
+static MDH *
+DHInit(int nKeyBits)
+{
+    size_t res;
+    MDH *dh = MDH_new();
+
+    if (!dh)
+        goto failed;
+
+    MP_new(dh->g);
+
+    if (!dh->g)
+        goto failed;
+
+    MP_gethex(dh->p, P1024, res);	/* prime P1024, see dhgroups.h */
+    if (!res)
+    {
+        goto failed;
+    }
+
+    MP_set_w(dh->g, 2);	/* base 2 */
+
+    dh->length = nKeyBits;
+    return dh;
+
+failed:
+    if (dh)
+        MDH_free(dh);
+
+    return 0;
+}
+
+static int
+DHGenerateKey(MDH *dh)
+{
+    size_t res = 0;
+    if (!dh)
+        return 0;
+
+    while (!res)
+    {
+        MP_t q1 = NULL;
+
+        if (!MDH_generate_key(dh))
+            return 0;
+
+        MP_gethex(q1, Q1024, res);
+        assert(res);
+
+        res = isValidPublicKey(dh->pub_key, dh->p, q1);
+        if (!res)
+        {
+            MP_free(dh->pub_key);
+            MP_free(dh->priv_key);
+            dh->pub_key = dh->priv_key = 0;
+        }
+
+        MP_free(q1);
+    }
+    return 1;
+}
+
+/* fill pubkey with the public key in BIG ENDIAN order
+ * 00 00 00 00 00 x1 x2 x3 .....
+ */
+
+static int
+DHGetPublicKey(MDH *dh, uint8_t *pubkey, size_t nPubkeyLen)
+{
+    int len;
+    if (!dh || !dh->pub_key)
+        return 0;
+
+    len = MP_bytes(dh->pub_key);
+    if (len <= 0 || len > (int) nPubkeyLen)
+        return 0;
+
+    memset(pubkey, 0, nPubkeyLen);
+    MP_setbin(dh->pub_key, pubkey + (nPubkeyLen - len), len);
+    return 1;
+}
+
+#if 0	/* unused */
+static int
+DHGetPrivateKey(MDH *dh, uint8_t *privkey, size_t nPrivkeyLen)
+{
+    if (!dh || !dh->priv_key)
+        return 0;
+
+    int len = MP_bytes(dh->priv_key);
+    if (len <= 0 || len > (int) nPrivkeyLen)
+        return 0;
+
+    memset(privkey, 0, nPrivkeyLen);
+    MP_setbin(dh->priv_key, privkey + (nPrivkeyLen - len), len);
+    return 1;
+}
+#endif
+
+/* computes the shared secret key from the private MDH value and the
+ * other party's public key (pubkey)
+ */
+static int
+DHComputeSharedSecretKey(MDH *dh, uint8_t *pubkey, size_t nPubkeyLen,
+                         uint8_t *secret)
+{
+    MP_t q1 = NULL, pubkeyBn = NULL;
+    size_t len;
+    int res;
+
+    if (!dh || !secret || nPubkeyLen >= INT_MAX)
+        return -1;
+
+    MP_getbin(pubkeyBn, pubkey, nPubkeyLen);
+    if (!pubkeyBn)
+        return -1;
+
+    MP_gethex(q1, Q1024, len);
+    assert(len);
+
+    if (isValidPublicKey(pubkeyBn, dh->p, q1))
+        res = MDH_compute_key(secret, nPubkeyLen, pubkeyBn, dh);
+    else
+        res = -1;
+
+    MP_free(q1);
+    MP_free(pubkeyBn);
+
+    return res;
+}

+ 199 - 0
plugins/obs-outputs/librtmp/dhgroups.h

@@ -0,0 +1,199 @@
+/*  librtmp - Diffie-Hellmann Key Exchange
+ *  Copyright (C) 2009 Andrej Stepanchuk
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+/* from RFC 3526, see http://www.ietf.org/rfc/rfc3526.txt */
+
+/* 2^768 - 2 ^704 - 1 + 2^64 * { [2^638 pi] + 149686 } */
+#define P768 \
+	"FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
+	"29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
+	"EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
+	"E485B576625E7EC6F44C42E9A63A3620FFFFFFFFFFFFFFFF"
+
+/* 2^1024 - 2^960 - 1 + 2^64 * { [2^894 pi] + 129093 } */
+#define P1024 \
+	"FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
+	"29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
+	"EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
+	"E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
+	"EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE65381" \
+	"FFFFFFFFFFFFFFFF"
+
+/* Group morder largest prime factor: */
+#define Q1024 \
+	"7FFFFFFFFFFFFFFFE487ED5110B4611A62633145C06E0E68" \
+        "948127044533E63A0105DF531D89CD9128A5043CC71A026E" \
+        "F7CA8CD9E69D218D98158536F92F8A1BA7F09AB6B6A8E122" \
+        "F242DABB312F3F637A262174D31BF6B585FFAE5B7A035BF6" \
+        "F71C35FDAD44CFD2D74F9208BE258FF324943328F67329C0" \
+        "FFFFFFFFFFFFFFFF"
+
+/* 2^1536 - 2^1472 - 1 + 2^64 * { [2^1406 pi] + 741804 } */
+#define P1536 \
+	"FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
+        "29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
+        "EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
+        "E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
+        "EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \
+        "C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \
+        "83655D23DCA3AD961C62F356208552BB9ED529077096966D" \
+        "670C354E4ABC9804F1746C08CA237327FFFFFFFFFFFFFFFF"
+
+/* 2^2048 - 2^1984 - 1 + 2^64 * { [2^1918 pi] + 124476 } */
+#define P2048 \
+	"FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
+	"29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
+	"EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
+	"E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
+	"EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \
+	"C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \
+	"83655D23DCA3AD961C62F356208552BB9ED529077096966D" \
+	"670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" \
+	"E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" \
+	"DE2BCBF6955817183995497CEA956AE515D2261898FA0510" \
+	"15728E5A8AACAA68FFFFFFFFFFFFFFFF"
+
+/* 2^3072 - 2^3008 - 1 + 2^64 * { [2^2942 pi] + 1690314 } */
+#define P3072 \
+	"FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
+	"29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
+	"EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
+	"E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
+	"EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \
+	"C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \
+	"83655D23DCA3AD961C62F356208552BB9ED529077096966D" \
+	"670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" \
+	"E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" \
+	"DE2BCBF6955817183995497CEA956AE515D2261898FA0510" \
+	"15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" \
+	"ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" \
+	"ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" \
+	"F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" \
+	"BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" \
+	"43DB5BFCE0FD108E4B82D120A93AD2CAFFFFFFFFFFFFFFFF"
+
+/* 2^4096 - 2^4032 - 1 + 2^64 * { [2^3966 pi] + 240904 } */
+#define P4096 \
+	"FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
+	"29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
+	"EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
+	"E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
+	"EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \
+	"C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \
+	"83655D23DCA3AD961C62F356208552BB9ED529077096966D" \
+	"670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" \
+	"E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" \
+	"DE2BCBF6955817183995497CEA956AE515D2261898FA0510" \
+	"15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" \
+	"ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" \
+	"ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" \
+	"F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" \
+	"BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" \
+	"43DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7" \
+	"88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA" \
+	"2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6" \
+	"287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED" \
+	"1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9" \
+	"93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934063199" \
+	"FFFFFFFFFFFFFFFF"
+
+/* 2^6144 - 2^6080 - 1 + 2^64 * { [2^6014 pi] + 929484 } */
+#define P6144 \
+	"FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
+	"29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
+	"EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
+	"E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
+	"EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \
+	"C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \
+	"83655D23DCA3AD961C62F356208552BB9ED529077096966D" \
+	"670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" \
+	"E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" \
+	"DE2BCBF6955817183995497CEA956AE515D2261898FA0510" \
+	"15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" \
+	"ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" \
+	"ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" \
+	"F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" \
+	"BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" \
+	"43DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7" \
+	"88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA" \
+	"2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6" \
+	"287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED" \
+	"1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9" \
+	"93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934028492" \
+	"36C3FAB4D27C7026C1D4DCB2602646DEC9751E763DBA37BD" \
+	"F8FF9406AD9E530EE5DB382F413001AEB06A53ED9027D831" \
+	"179727B0865A8918DA3EDBEBCF9B14ED44CE6CBACED4BB1B" \
+	"DB7F1447E6CC254B332051512BD7AF426FB8F401378CD2BF" \
+	"5983CA01C64B92ECF032EA15D1721D03F482D7CE6E74FEF6" \
+	"D55E702F46980C82B5A84031900B1C9E59E7C97FBEC7E8F3" \
+	"23A97A7E36CC88BE0F1D45B7FF585AC54BD407B22B4154AA" \
+	"CC8F6D7EBF48E1D814CC5ED20F8037E0A79715EEF29BE328" \
+	"06A1D58BB7C5DA76F550AA3D8A1FBFF0EB19CCB1A313D55C" \
+	"DA56C9EC2EF29632387FE8D76E3C0468043E8F663F4860EE" \
+	"12BF2D5B0B7474D6E694F91E6DCC4024FFFFFFFFFFFFFFFF"
+
+/* 2^8192 - 2^8128 - 1 + 2^64 * { [2^8062 pi] + 4743158 } */
+#define P8192 \
+	"FFFFFFFFFFFFFFFFC90FDAA22168C234C4C6628B80DC1CD1" \
+	"29024E088A67CC74020BBEA63B139B22514A08798E3404DD" \
+	"EF9519B3CD3A431B302B0A6DF25F14374FE1356D6D51C245" \
+	"E485B576625E7EC6F44C42E9A637ED6B0BFF5CB6F406B7ED" \
+	"EE386BFB5A899FA5AE9F24117C4B1FE649286651ECE45B3D" \
+	"C2007CB8A163BF0598DA48361C55D39A69163FA8FD24CF5F" \
+	"83655D23DCA3AD961C62F356208552BB9ED529077096966D" \
+	"670C354E4ABC9804F1746C08CA18217C32905E462E36CE3B" \
+	"E39E772C180E86039B2783A2EC07A28FB5C55DF06F4C52C9" \
+	"DE2BCBF6955817183995497CEA956AE515D2261898FA0510" \
+	"15728E5A8AAAC42DAD33170D04507A33A85521ABDF1CBA64" \
+	"ECFB850458DBEF0A8AEA71575D060C7DB3970F85A6E1E4C7" \
+	"ABF5AE8CDB0933D71E8C94E04A25619DCEE3D2261AD2EE6B" \
+	"F12FFA06D98A0864D87602733EC86A64521F2B18177B200C" \
+	"BBE117577A615D6C770988C0BAD946E208E24FA074E5AB31" \
+	"43DB5BFCE0FD108E4B82D120A92108011A723C12A787E6D7" \
+	"88719A10BDBA5B2699C327186AF4E23C1A946834B6150BDA" \
+	"2583E9CA2AD44CE8DBBBC2DB04DE8EF92E8EFC141FBECAA6" \
+	"287C59474E6BC05D99B2964FA090C3A2233BA186515BE7ED" \
+	"1F612970CEE2D7AFB81BDD762170481CD0069127D5B05AA9" \
+	"93B4EA988D8FDDC186FFB7DC90A6C08F4DF435C934028492" \
+	"36C3FAB4D27C7026C1D4DCB2602646DEC9751E763DBA37BD" \
+	"F8FF9406AD9E530EE5DB382F413001AEB06A53ED9027D831" \
+	"179727B0865A8918DA3EDBEBCF9B14ED44CE6CBACED4BB1B" \
+	"DB7F1447E6CC254B332051512BD7AF426FB8F401378CD2BF" \
+	"5983CA01C64B92ECF032EA15D1721D03F482D7CE6E74FEF6" \
+	"D55E702F46980C82B5A84031900B1C9E59E7C97FBEC7E8F3" \
+	"23A97A7E36CC88BE0F1D45B7FF585AC54BD407B22B4154AA" \
+	"CC8F6D7EBF48E1D814CC5ED20F8037E0A79715EEF29BE328" \
+	"06A1D58BB7C5DA76F550AA3D8A1FBFF0EB19CCB1A313D55C" \
+	"DA56C9EC2EF29632387FE8D76E3C0468043E8F663F4860EE" \
+	"12BF2D5B0B7474D6E694F91E6DBE115974A3926F12FEE5E4" \
+	"38777CB6A932DF8CD8BEC4D073B931BA3BC832B68D9DD300" \
+	"741FA7BF8AFC47ED2576F6936BA424663AAB639C5AE4F568" \
+	"3423B4742BF1C978238F16CBE39D652DE3FDB8BEFC848AD9" \
+	"22222E04A4037C0713EB57A81A23F0C73473FC646CEA306B" \
+	"4BCBC8862F8385DDFA9D4B7FA2C087E879683303ED5BDD3A" \
+	"062B3CF5B3A278A66D2A13F83F44F82DDF310EE074AB6A36" \
+	"4597E899A0255DC164F31CC50846851DF9AB48195DED7EA1" \
+	"B1D510BD7EE74D73FAF36BC31ECFA268359046F4EB879F92" \
+	"4009438B481C6CD7889A002ED5EE382BC9190DA6FC026E47" \
+	"9558E4475677E9AA9E3050E2765694DFC81F56E880B96E71" \
+	"60C980DD98EDD3DFFFFFFFFFFFFFFFFF"
+

+ 1480 - 0
plugins/obs-outputs/librtmp/handshake.h

@@ -0,0 +1,1480 @@
+/*
+ *  Copyright (C) 2008-2009 Andrej Stepanchuk
+ *  Copyright (C) 2009-2010 Howard Chu
+ *  Copyright (C) 2010 2a665470ced7adb7156fcef47f8199a6371c117b8a79e399a2771e0b36384090
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+/* This file is #included in rtmp.c, it is not meant to be compiled alone */
+
+#ifdef USE_POLARSSL
+#include <polarssl/sha2.h>
+#include <polarssl/arc4.h>
+#ifndef SHA256_DIGEST_LENGTH
+#define SHA256_DIGEST_LENGTH	32
+#endif
+#define HMAC_CTX	sha2_context
+#define HMAC_setup(ctx, key, len)	sha2_hmac_starts(&ctx, (unsigned char *)key, len, 0)
+#define HMAC_crunch(ctx, buf, len)	sha2_hmac_update(&ctx, buf, len)
+#define HMAC_finish(ctx, dig, dlen)	dlen = SHA256_DIGEST_LENGTH; sha2_hmac_finish(&ctx, dig)
+
+typedef arc4_context *	RC4_handle;
+#define RC4_alloc(h)	*h = malloc(sizeof(arc4_context))
+#define RC4_setkey(h,l,k)	arc4_setup(h,k,l)
+#define RC4_encrypt(h,l,d)	arc4_crypt(h,l,(unsigned char *)d,(unsigned char *)d)
+#define RC4_encrypt2(h,l,s,d)	arc4_crypt(h,l,(unsigned char *)s,(unsigned char *)d)
+#define RC4_free(h)	free(h)
+
+#elif defined(USE_GNUTLS)
+#include <nettle/hmac.h>
+#include <nettle/arcfour.h>
+#ifndef SHA256_DIGEST_LENGTH
+#define SHA256_DIGEST_LENGTH	32
+#endif
+#undef HMAC_CTX
+#define HMAC_CTX	struct hmac_sha256_ctx
+#define HMAC_setup(ctx, key, len)	hmac_sha256_set_key(&ctx, len, key)
+#define HMAC_crunch(ctx, buf, len)	hmac_sha256_update(&ctx, len, buf)
+#define HMAC_finish(ctx, dig, dlen)	dlen = SHA256_DIGEST_LENGTH; hmac_sha256_digest(&ctx, SHA256_DIGEST_LENGTH, dig)
+#define HMAC_close(ctx)
+
+typedef struct arcfour_ctx*	RC4_handle;
+#define RC4_alloc(h)	*h = malloc(sizeof(struct arcfour_ctx))
+#define RC4_setkey(h,l,k)	arcfour_set_key(h, l, k)
+#define RC4_encrypt(h,l,d)	arcfour_crypt(h,l,(uint8_t *)d,(uint8_t *)d)
+#define RC4_encrypt2(h,l,s,d)	arcfour_crypt(h,l,(uint8_t *)d,(uint8_t *)s)
+#define RC4_free(h)	free(h)
+
+#else	/* USE_OPENSSL */
+#include <openssl/sha.h>
+#include <openssl/hmac.h>
+#include <openssl/rc4.h>
+#if OPENSSL_VERSION_NUMBER < 0x0090800 || !defined(SHA256_DIGEST_LENGTH)
+#error Your OpenSSL is too old, need 0.9.8 or newer with SHA256
+#endif
+#define HMAC_setup(ctx, key, len)	HMAC_CTX_init(&ctx); HMAC_Init_ex(&ctx, key, len, EVP_sha256(), 0)
+#define HMAC_crunch(ctx, buf, len)	HMAC_Update(&ctx, buf, len)
+#define HMAC_finish(ctx, dig, dlen)	HMAC_Final(&ctx, dig, &dlen); HMAC_CTX_cleanup(&ctx)
+
+typedef RC4_KEY *	RC4_handle;
+#define RC4_alloc(h)	*h = malloc(sizeof(RC4_KEY))
+#define RC4_setkey(h,l,k)	RC4_set_key(h,l,k)
+#define RC4_encrypt(h,l,d)	RC4(h,l,(uint8_t *)d,(uint8_t *)d)
+#define RC4_encrypt2(h,l,s,d)	RC4(h,l,(uint8_t *)s,(uint8_t *)d)
+#define RC4_free(h)	free(h)
+#endif
+
+#define FP10
+
+#include "dh.h"
+
+static const uint8_t GenuineFMSKey[] =
+{
+    0x47, 0x65, 0x6e, 0x75, 0x69, 0x6e, 0x65, 0x20, 0x41, 0x64, 0x6f, 0x62,
+    0x65, 0x20, 0x46, 0x6c,
+    0x61, 0x73, 0x68, 0x20, 0x4d, 0x65, 0x64, 0x69, 0x61, 0x20, 0x53, 0x65,
+    0x72, 0x76, 0x65, 0x72,
+    0x20, 0x30, 0x30, 0x31,	/* Genuine Adobe Flash Media Server 001 */
+
+    0xf0, 0xee, 0xc2, 0x4a, 0x80, 0x68, 0xbe, 0xe8, 0x2e, 0x00, 0xd0, 0xd1,
+    0x02, 0x9e, 0x7e, 0x57, 0x6e, 0xec, 0x5d, 0x2d, 0x29, 0x80, 0x6f, 0xab,
+    0x93, 0xb8, 0xe6, 0x36,
+    0xcf, 0xeb, 0x31, 0xae
+};				/* 68 */
+
+static const uint8_t GenuineFPKey[] =
+{
+    0x47, 0x65, 0x6E, 0x75, 0x69, 0x6E, 0x65, 0x20, 0x41, 0x64, 0x6F, 0x62,
+    0x65, 0x20, 0x46, 0x6C,
+    0x61, 0x73, 0x68, 0x20, 0x50, 0x6C, 0x61, 0x79, 0x65, 0x72, 0x20, 0x30,
+    0x30, 0x31,			/* Genuine Adobe Flash Player 001 */
+    0xF0, 0xEE,
+    0xC2, 0x4A, 0x80, 0x68, 0xBE, 0xE8, 0x2E, 0x00, 0xD0, 0xD1, 0x02, 0x9E,
+    0x7E, 0x57, 0x6E, 0xEC,
+    0x5D, 0x2D, 0x29, 0x80, 0x6F, 0xAB, 0x93, 0xB8, 0xE6, 0x36, 0xCF, 0xEB,
+    0x31, 0xAE
+};				/* 62 */
+
+static void InitRC4Encryption
+(uint8_t * secretKey,
+ uint8_t * pubKeyIn,
+ uint8_t * pubKeyOut, RC4_handle *rc4keyIn, RC4_handle *rc4keyOut)
+{
+    uint8_t digest[SHA256_DIGEST_LENGTH];
+    unsigned int digestLen = 0;
+    HMAC_CTX ctx;
+
+    RC4_alloc(rc4keyIn);
+    RC4_alloc(rc4keyOut);
+
+    HMAC_setup(ctx, secretKey, 128);
+    HMAC_crunch(ctx, pubKeyIn, 128);
+    HMAC_finish(ctx, digest, digestLen);
+
+    RTMP_Log(RTMP_LOGDEBUG, "RC4 Out Key: ");
+    RTMP_LogHex(RTMP_LOGDEBUG, digest, 16);
+
+    RC4_setkey(*rc4keyOut, 16, digest);
+
+    HMAC_setup(ctx, secretKey, 128);
+    HMAC_crunch(ctx, pubKeyOut, 128);
+    HMAC_finish(ctx, digest, digestLen);
+
+    RTMP_Log(RTMP_LOGDEBUG, "RC4 In Key: ");
+    RTMP_LogHex(RTMP_LOGDEBUG, digest, 16);
+
+    RC4_setkey(*rc4keyIn, 16, digest);
+}
+
+typedef unsigned int (getoff)(uint8_t *buf, unsigned int len);
+
+static unsigned int
+GetDHOffset2(uint8_t *handshake, unsigned int len)
+{
+    unsigned int offset = 0;
+    uint8_t *ptr = handshake + 768;
+    unsigned int res;
+
+    assert(RTMP_SIG_SIZE <= len);
+
+    offset += (*ptr);
+    ptr++;
+    offset += (*ptr);
+    ptr++;
+    offset += (*ptr);
+    ptr++;
+    offset += (*ptr);
+
+    res = (offset % 632) + 8;
+
+    if (res + 128 > 767)
+    {
+        RTMP_Log(RTMP_LOGERROR,
+                 "%s: Couldn't calculate correct DH offset (got %d), exiting!",
+                 __FUNCTION__, res);
+        exit(1);
+    }
+    return res;
+}
+
+static unsigned int
+GetDigestOffset2(uint8_t *handshake, unsigned int len)
+{
+    unsigned int offset = 0;
+    uint8_t *ptr = handshake + 772;
+    unsigned int res;
+
+    offset += (*ptr);
+    ptr++;
+    offset += (*ptr);
+    ptr++;
+    offset += (*ptr);
+    ptr++;
+    offset += (*ptr);
+
+    res = (offset % 728) + 776;
+
+    if (res + 32 > 1535)
+    {
+        RTMP_Log(RTMP_LOGERROR,
+                 "%s: Couldn't calculate correct digest offset (got %d), exiting",
+                 __FUNCTION__, res);
+        exit(1);
+    }
+    return res;
+}
+
+static unsigned int
+GetDHOffset1(uint8_t *handshake, unsigned int len)
+{
+    unsigned int offset = 0;
+    uint8_t *ptr = handshake + 1532;
+    unsigned int res;
+
+    assert(RTMP_SIG_SIZE <= len);
+
+    offset += (*ptr);
+    ptr++;
+    offset += (*ptr);
+    ptr++;
+    offset += (*ptr);
+    ptr++;
+    offset += (*ptr);
+
+    res = (offset % 632) + 772;
+
+    if (res + 128 > 1531)
+    {
+        RTMP_Log(RTMP_LOGERROR, "%s: Couldn't calculate DH offset (got %d), exiting!",
+                 __FUNCTION__, res);
+        exit(1);
+    }
+
+    return res;
+}
+
+static unsigned int
+GetDigestOffset1(uint8_t *handshake, unsigned int len)
+{
+    unsigned int offset = 0;
+    uint8_t *ptr = handshake + 8;
+    unsigned int res;
+
+    assert(12 <= len);
+
+    offset += (*ptr);
+    ptr++;
+    offset += (*ptr);
+    ptr++;
+    offset += (*ptr);
+    ptr++;
+    offset += (*ptr);
+
+    res = (offset % 728) + 12;
+
+    if (res + 32 > 771)
+    {
+        RTMP_Log(RTMP_LOGERROR,
+                 "%s: Couldn't calculate digest offset (got %d), exiting!",
+                 __FUNCTION__, res);
+        exit(1);
+    }
+
+    return res;
+}
+
+static getoff *digoff[] = {GetDigestOffset1, GetDigestOffset2};
+static getoff *dhoff[] = {GetDHOffset1, GetDHOffset2};
+
+static void
+HMACsha256(const uint8_t *message, size_t messageLen, const uint8_t *key,
+           size_t keylen, uint8_t *digest)
+{
+    unsigned int digestLen;
+    HMAC_CTX ctx;
+
+    HMAC_setup(ctx, key, keylen);
+    HMAC_crunch(ctx, message, messageLen);
+    HMAC_finish(ctx, digest, digestLen);
+
+    assert(digestLen == 32);
+}
+
+static void
+CalculateDigest(unsigned int digestPos, uint8_t *handshakeMessage,
+                const uint8_t *key, size_t keyLen, uint8_t *digest)
+{
+    const int messageLen = RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH;
+    uint8_t message[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH];
+
+    memcpy(message, handshakeMessage, digestPos);
+    memcpy(message + digestPos,
+           &handshakeMessage[digestPos + SHA256_DIGEST_LENGTH],
+           messageLen - digestPos);
+
+    HMACsha256(message, messageLen, key, keyLen, digest);
+}
+
+static int
+VerifyDigest(unsigned int digestPos, uint8_t *handshakeMessage, const uint8_t *key,
+             size_t keyLen)
+{
+    uint8_t calcDigest[SHA256_DIGEST_LENGTH];
+
+    CalculateDigest(digestPos, handshakeMessage, key, keyLen, calcDigest);
+
+    return memcmp(&handshakeMessage[digestPos], calcDigest,
+                  SHA256_DIGEST_LENGTH) == 0;
+}
+
+/* handshake
+ *
+ * Type		= [1 bytes] plain: 0x03, encrypted: 0x06, 0x08, 0x09
+ * -------------------------------------------------------------------- [1536 bytes]
+ * Uptime	= [4 bytes] big endian unsigned number, uptime
+ * Version 	= [4 bytes] each byte represents a version number, e.g. 9.0.124.0
+ * ...
+ *
+ */
+
+static const uint32_t rtmpe8_keys[16][4] =
+{
+    {0xbff034b2, 0x11d9081f, 0xccdfb795, 0x748de732},
+    {0x086a5eb6, 0x1743090e, 0x6ef05ab8, 0xfe5a39e2},
+    {0x7b10956f, 0x76ce0521, 0x2388a73a, 0x440149a1},
+    {0xa943f317, 0xebf11bb2, 0xa691a5ee, 0x17f36339},
+    {0x7a30e00a, 0xb529e22c, 0xa087aea5, 0xc0cb79ac},
+    {0xbdce0c23, 0x2febdeff, 0x1cfaae16, 0x1123239d},
+    {0x55dd3f7b, 0x77e7e62e, 0x9bb8c499, 0xc9481ee4},
+    {0x407bb6b4, 0x71e89136, 0xa7aebf55, 0xca33b839},
+    {0xfcf6bdc3, 0xb63c3697, 0x7ce4f825, 0x04d959b2},
+    {0x28e091fd, 0x41954c4c, 0x7fb7db00, 0xe3a066f8},
+    {0x57845b76, 0x4f251b03, 0x46d45bcd, 0xa2c30d29},
+    {0x0acceef8, 0xda55b546, 0x03473452, 0x5863713b},
+    {0xb82075dc, 0xa75f1fee, 0xd84268e8, 0xa72a44cc},
+    {0x07cf6e9e, 0xa16d7b25, 0x9fa7ae6c, 0xd92f5629},
+    {0xfeb1eae4, 0x8c8c3ce1, 0x4e0064a7, 0x6a387c2a},
+    {0x893a9427, 0xcc3013a2, 0xf106385b, 0xa829f927}
+};
+
+/* RTMPE type 8 uses XTEA on the regular signature
+ * http://en.wikipedia.org/wiki/XTEA
+ */
+static void rtmpe8_sig(uint8_t *in, uint8_t *out, int keyid)
+{
+    unsigned int i, num_rounds = 32;
+    uint32_t v0, v1, sum=0, delta=0x9E3779B9;
+    uint32_t const *k;
+
+    v0 = in[0] | (in[1] << 8) | (in[2] << 16) | (in[3] << 24);
+    v1 = in[4] | (in[5] << 8) | (in[6] << 16) | (in[7] << 24);
+    k = rtmpe8_keys[keyid];
+
+    for (i=0; i < num_rounds; i++)
+    {
+        v0 += (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]);
+        sum += delta;
+        v1 += (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]);
+    }
+
+    out[0] = v0;
+    v0 >>= 8;
+    out[1] = v0;
+    v0 >>= 8;
+    out[2] = v0;
+    v0 >>= 8;
+    out[3] = v0;
+
+    out[4] = v1;
+    v1 >>= 8;
+    out[5] = v1;
+    v1 >>= 8;
+    out[6] = v1;
+    v1 >>= 8;
+    out[7] = v1;
+}
+
+/* RTMPE type 9 uses Blowfish on the regular signature
+ * http://en.wikipedia.org/wiki/Blowfish_(cipher)
+ */
+#define	BF_ROUNDS	16
+typedef struct bf_key
+{
+    uint32_t s[4][256];
+    uint32_t p[BF_ROUNDS+2];
+} bf_key;
+
+static const uint32_t bf_sinit[][256] =
+{
+
+    /* S-Box 0 */
+    {
+        0xd1310ba6, 0x98dfb5ac, 0x2ffd72db, 0xd01adfb7, 0xb8e1afed, 0x6a267e96,
+        0xba7c9045, 0xf12c7f99, 0x24a19947, 0xb3916cf7, 0x0801f2e2, 0x858efc16,
+        0x636920d8, 0x71574e69, 0xa458fea3, 0xf4933d7e, 0x0d95748f, 0x728eb658,
+        0x718bcd58, 0x82154aee, 0x7b54a41d, 0xc25a59b5, 0x9c30d539, 0x2af26013,
+        0xc5d1b023, 0x286085f0, 0xca417918, 0xb8db38ef, 0x8e79dcb0, 0x603a180e,
+        0x6c9e0e8b, 0xb01e8a3e, 0xd71577c1, 0xbd314b27, 0x78af2fda, 0x55605c60,
+        0xe65525f3, 0xaa55ab94, 0x57489862, 0x63e81440, 0x55ca396a, 0x2aab10b6,
+        0xb4cc5c34, 0x1141e8ce, 0xa15486af, 0x7c72e993, 0xb3ee1411, 0x636fbc2a,
+        0x2ba9c55d, 0x741831f6, 0xce5c3e16, 0x9b87931e, 0xafd6ba33, 0x6c24cf5c,
+        0x7a325381, 0x28958677, 0x3b8f4898, 0x6b4bb9af, 0xc4bfe81b, 0x66282193,
+        0x61d809cc, 0xfb21a991, 0x487cac60, 0x5dec8032, 0xef845d5d, 0xe98575b1,
+        0xdc262302, 0xeb651b88, 0x23893e81, 0xd396acc5, 0x0f6d6ff3, 0x83f44239,
+        0x2e0b4482, 0xa4842004, 0x69c8f04a, 0x9e1f9b5e, 0x21c66842, 0xf6e96c9a,
+        0x670c9c61, 0xabd388f0, 0x6a51a0d2, 0xd8542f68, 0x960fa728, 0xab5133a3,
+        0x6eef0b6c, 0x137a3be4, 0xba3bf050, 0x7efb2a98, 0xa1f1651d, 0x39af0176,
+        0x66ca593e, 0x82430e88, 0x8cee8619, 0x456f9fb4, 0x7d84a5c3, 0x3b8b5ebe,
+        0xe06f75d8, 0x85c12073, 0x401a449f, 0x56c16aa6, 0x4ed3aa62, 0x363f7706,
+        0x1bfedf72, 0x429b023d, 0x37d0d724, 0xd00a1248, 0xdb0fead3, 0x49f1c09b,
+        0x075372c9, 0x80991b7b, 0x25d479d8, 0xf6e8def7, 0xe3fe501a, 0xb6794c3b,
+        0x976ce0bd, 0x04c006ba, 0xc1a94fb6, 0x409f60c4, 0x5e5c9ec2, 0x196a2463,
+        0x68fb6faf, 0x3e6c53b5, 0x1339b2eb, 0x3b52ec6f, 0x6dfc511f, 0x9b30952c,
+        0xcc814544, 0xaf5ebd09, 0xbee3d004, 0xde334afd, 0x660f2807, 0x192e4bb3,
+        0xc0cba857, 0x45c8740f, 0xd20b5f39, 0xb9d3fbdb, 0x5579c0bd, 0x1a60320a,
+        0xd6a100c6, 0x402c7279, 0x679f25fe, 0xfb1fa3cc, 0x8ea5e9f8, 0xdb3222f8,
+        0x3c7516df, 0xfd616b15, 0x2f501ec8, 0xad0552ab, 0x323db5fa, 0xfd238760,
+        0x53317b48, 0x3e00df82, 0x9e5c57bb, 0xca6f8ca0, 0x1a87562e, 0xdf1769db,
+        0xd542a8f6, 0x287effc3, 0xac6732c6, 0x8c4f5573, 0x695b27b0, 0xbbca58c8,
+        0xe1ffa35d, 0xb8f011a0, 0x10fa3d98, 0xfd2183b8, 0x4afcb56c, 0x2dd1d35b,
+        0x9a53e479, 0xb6f84565, 0xd28e49bc, 0x4bfb9790, 0xe1ddf2da, 0xa4cb7e33,
+        0x62fb1341, 0xcee4c6e8, 0xef20cada, 0x36774c01, 0xd07e9efe, 0x2bf11fb4,
+        0x95dbda4d, 0xae909198, 0xeaad8e71, 0x6b93d5a0, 0xd08ed1d0, 0xafc725e0,
+        0x8e3c5b2f, 0x8e7594b7, 0x8ff6e2fb, 0xf2122b64, 0x8888b812, 0x900df01c,
+        0x4fad5ea0, 0x688fc31c, 0xd1cff191, 0xb3a8c1ad, 0x2f2f2218, 0xbe0e1777,
+        0xea752dfe, 0x8b021fa1, 0xe5a0cc0f, 0xb56f74e8, 0x18acf3d6, 0xce89e299,
+        0xb4a84fe0, 0xfd13e0b7, 0x7cc43b81, 0xd2ada8d9, 0x165fa266, 0x80957705,
+        0x93cc7314, 0x211a1477, 0xe6ad2065, 0x77b5fa86, 0xc75442f5, 0xfb9d35cf,
+        0xebcdaf0c, 0x7b3e89a0, 0xd6411bd3, 0xae1e7e49, 0x00250e2d, 0x2071b35e,
+        0x226800bb, 0x57b8e0af, 0x2464369b, 0xf009b91e, 0x5563911d, 0x59dfa6aa,
+        0x78c14389, 0xd95a537f, 0x207d5ba2, 0x02e5b9c5, 0x83260376, 0x6295cfa9,
+        0x11c81968, 0x4e734a41, 0xb3472dca, 0x7b14a94a, 0x1b510052, 0x9a532915,
+        0xd60f573f, 0xbc9bc6e4, 0x2b60a476, 0x81e67400, 0x08ba6fb5, 0x571be91f,
+        0xf296ec6b, 0x2a0dd915, 0xb6636521, 0xe7b9f9b6, 0xff34052e, 0xc5855664,
+        0x53b02d5d, 0xa99f8fa1, 0x08ba4799, 0x6e85076a,
+    },
+
+    /* S-Box 1 */
+    {
+        0x4b7a70e9, 0xb5b32944, 0xdb75092e, 0xc4192623, 0xad6ea6b0, 0x49a7df7d,
+        0x9cee60b8, 0x8fedb266, 0xecaa8c71, 0x699a17ff, 0x5664526c, 0xc2b19ee1,
+        0x193602a5, 0x75094c29, 0xa0591340, 0xe4183a3e, 0x3f54989a, 0x5b429d65,
+        0x6b8fe4d6, 0x99f73fd6, 0xa1d29c07, 0xefe830f5, 0x4d2d38e6, 0xf0255dc1,
+        0x4cdd2086, 0x8470eb26, 0x6382e9c6, 0x021ecc5e, 0x09686b3f, 0x3ebaefc9,
+        0x3c971814, 0x6b6a70a1, 0x687f3584, 0x52a0e286, 0xb79c5305, 0xaa500737,
+        0x3e07841c, 0x7fdeae5c, 0x8e7d44ec, 0x5716f2b8, 0xb03ada37, 0xf0500c0d,
+        0xf01c1f04, 0x0200b3ff, 0xae0cf51a, 0x3cb574b2, 0x25837a58, 0xdc0921bd,
+        0xd19113f9, 0x7ca92ff6, 0x94324773, 0x22f54701, 0x3ae5e581, 0x37c2dadc,
+        0xc8b57634, 0x9af3dda7, 0xa9446146, 0x0fd0030e, 0xecc8c73e, 0xa4751e41,
+        0xe238cd99, 0x3bea0e2f, 0x3280bba1, 0x183eb331, 0x4e548b38, 0x4f6db908,
+        0x6f420d03, 0xf60a04bf, 0x2cb81290, 0x24977c79, 0x5679b072, 0xbcaf89af,
+        0xde9a771f, 0xd9930810, 0xb38bae12, 0xdccf3f2e, 0x5512721f, 0x2e6b7124,
+        0x501adde6, 0x9f84cd87, 0x7a584718, 0x7408da17, 0xbc9f9abc, 0xe94b7d8c,
+        0xec7aec3a, 0xdb851dfa, 0x63094366, 0xc464c3d2, 0xef1c1847, 0x3215d908,
+        0xdd433b37, 0x24c2ba16, 0x12a14d43, 0x2a65c451, 0x50940002, 0x133ae4dd,
+        0x71dff89e, 0x10314e55, 0x81ac77d6, 0x5f11199b, 0x043556f1, 0xd7a3c76b,
+        0x3c11183b, 0x5924a509, 0xf28fe6ed, 0x97f1fbfa, 0x9ebabf2c, 0x1e153c6e,
+        0x86e34570, 0xeae96fb1, 0x860e5e0a, 0x5a3e2ab3, 0x771fe71c, 0x4e3d06fa,
+        0x2965dcb9, 0x99e71d0f, 0x803e89d6, 0x5266c825, 0x2e4cc978, 0x9c10b36a,
+        0xc6150eba, 0x94e2ea78, 0xa5fc3c53, 0x1e0a2df4, 0xf2f74ea7, 0x361d2b3d,
+        0x1939260f, 0x19c27960, 0x5223a708, 0xf71312b6, 0xebadfe6e, 0xeac31f66,
+        0xe3bc4595, 0xa67bc883, 0xb17f37d1, 0x018cff28, 0xc332ddef, 0xbe6c5aa5,
+        0x65582185, 0x68ab9802, 0xeecea50f, 0xdb2f953b, 0x2aef7dad, 0x5b6e2f84,
+        0x1521b628, 0x29076170, 0xecdd4775, 0x619f1510, 0x13cca830, 0xeb61bd96,
+        0x0334fe1e, 0xaa0363cf, 0xb5735c90, 0x4c70a239, 0xd59e9e0b, 0xcbaade14,
+        0xeecc86bc, 0x60622ca7, 0x9cab5cab, 0xb2f3846e, 0x648b1eaf, 0x19bdf0ca,
+        0xa02369b9, 0x655abb50, 0x40685a32, 0x3c2ab4b3, 0x319ee9d5, 0xc021b8f7,
+        0x9b540b19, 0x875fa099, 0x95f7997e, 0x623d7da8, 0xf837889a, 0x97e32d77,
+        0x11ed935f, 0x16681281, 0x0e358829, 0xc7e61fd6, 0x96dedfa1, 0x7858ba99,
+        0x57f584a5, 0x1b227263, 0x9b83c3ff, 0x1ac24696, 0xcdb30aeb, 0x532e3054,
+        0x8fd948e4, 0x6dbc3128, 0x58ebf2ef, 0x34c6ffea, 0xfe28ed61, 0xee7c3c73,
+        0x5d4a14d9, 0xe864b7e3, 0x42105d14, 0x203e13e0, 0x45eee2b6, 0xa3aaabea,
+        0xdb6c4f15, 0xfacb4fd0, 0xc742f442, 0xef6abbb5, 0x654f3b1d, 0x41cd2105,
+        0xd81e799e, 0x86854dc7, 0xe44b476a, 0x3d816250, 0xcf62a1f2, 0x5b8d2646,
+        0xfc8883a0, 0xc1c7b6a3, 0x7f1524c3, 0x69cb7492, 0x47848a0b, 0x5692b285,
+        0x095bbf00, 0xad19489d, 0x1462b174, 0x23820e00, 0x58428d2a, 0x0c55f5ea,
+        0x1dadf43e, 0x233f7061, 0x3372f092, 0x8d937e41, 0xd65fecf1, 0x6c223bdb,
+        0x7cde3759, 0xcbee7460, 0x4085f2a7, 0xce77326e, 0xa6078084, 0x19f8509e,
+        0xe8efd855, 0x61d99735, 0xa969a7aa, 0xc50c06c2, 0x5a04abfc, 0x800bcadc,
+        0x9e447a2e, 0xc3453484, 0xfdd56705, 0x0e1e9ec9, 0xdb73dbd3, 0x105588cd,
+        0x675fda79, 0xe3674340, 0xc5c43465, 0x713e38d8, 0x3d28f89e, 0xf16dff20,
+        0x153e21e7, 0x8fb03d4a, 0xe6e39f2b, 0xdb83adf7,
+    },
+
+    /* S-Box 2 */
+    {
+        0xe93d5a68, 0x948140f7, 0xf64c261c, 0x94692934, 0x411520f7, 0x7602d4f7,
+        0xbcf46b2e, 0xd4a20068, 0xd4082471, 0x3320f46a, 0x43b7d4b7, 0x500061af,
+        0x1e39f62e, 0x97244546, 0x14214f74, 0xbf8b8840, 0x4d95fc1d, 0x96b591af,
+        0x70f4ddd3, 0x66a02f45, 0xbfbc09ec, 0x03bd9785, 0x7fac6dd0, 0x31cb8504,
+        0x96eb27b3, 0x55fd3941, 0xda2547e6, 0xabca0a9a, 0x28507825, 0x530429f4,
+        0x0a2c86da, 0xe9b66dfb, 0x68dc1462, 0xd7486900, 0x680ec0a4, 0x27a18dee,
+        0x4f3ffea2, 0xe887ad8c, 0xb58ce006, 0x7af4d6b6, 0xaace1e7c, 0xd3375fec,
+        0xce78a399, 0x406b2a42, 0x20fe9e35, 0xd9f385b9, 0xee39d7ab, 0x3b124e8b,
+        0x1dc9faf7, 0x4b6d1856, 0x26a36631, 0xeae397b2, 0x3a6efa74, 0xdd5b4332,
+        0x6841e7f7, 0xca7820fb, 0xfb0af54e, 0xd8feb397, 0x454056ac, 0xba489527,
+        0x55533a3a, 0x20838d87, 0xfe6ba9b7, 0xd096954b, 0x55a867bc, 0xa1159a58,
+        0xcca92963, 0x99e1db33, 0xa62a4a56, 0x3f3125f9, 0x5ef47e1c, 0x9029317c,
+        0xfdf8e802, 0x04272f70, 0x80bb155c, 0x05282ce3, 0x95c11548, 0xe4c66d22,
+        0x48c1133f, 0xc70f86dc, 0x07f9c9ee, 0x41041f0f, 0x404779a4, 0x5d886e17,
+        0x325f51eb, 0xd59bc0d1, 0xf2bcc18f, 0x41113564, 0x257b7834, 0x602a9c60,
+        0xdff8e8a3, 0x1f636c1b, 0x0e12b4c2, 0x02e1329e, 0xaf664fd1, 0xcad18115,
+        0x6b2395e0, 0x333e92e1, 0x3b240b62, 0xeebeb922, 0x85b2a20e, 0xe6ba0d99,
+        0xde720c8c, 0x2da2f728, 0xd0127845, 0x95b794fd, 0x647d0862, 0xe7ccf5f0,
+        0x5449a36f, 0x877d48fa, 0xc39dfd27, 0xf33e8d1e, 0x0a476341, 0x992eff74,
+        0x3a6f6eab, 0xf4f8fd37, 0xa812dc60, 0xa1ebddf8, 0x991be14c, 0xdb6e6b0d,
+        0xc67b5510, 0x6d672c37, 0x2765d43b, 0xdcd0e804, 0xf1290dc7, 0xcc00ffa3,
+        0xb5390f92, 0x690fed0b, 0x667b9ffb, 0xcedb7d9c, 0xa091cf0b, 0xd9155ea3,
+        0xbb132f88, 0x515bad24, 0x7b9479bf, 0x763bd6eb, 0x37392eb3, 0xcc115979,
+        0x8026e297, 0xf42e312d, 0x6842ada7, 0xc66a2b3b, 0x12754ccc, 0x782ef11c,
+        0x6a124237, 0xb79251e7, 0x06a1bbe6, 0x4bfb6350, 0x1a6b1018, 0x11caedfa,
+        0x3d25bdd8, 0xe2e1c3c9, 0x44421659, 0x0a121386, 0xd90cec6e, 0xd5abea2a,
+        0x64af674e, 0xda86a85f, 0xbebfe988, 0x64e4c3fe, 0x9dbc8057, 0xf0f7c086,
+        0x60787bf8, 0x6003604d, 0xd1fd8346, 0xf6381fb0, 0x7745ae04, 0xd736fccc,
+        0x83426b33, 0xf01eab71, 0xb0804187, 0x3c005e5f, 0x77a057be, 0xbde8ae24,
+        0x55464299, 0xbf582e61, 0x4e58f48f, 0xf2ddfda2, 0xf474ef38, 0x8789bdc2,
+        0x5366f9c3, 0xc8b38e74, 0xb475f255, 0x46fcd9b9, 0x7aeb2661, 0x8b1ddf84,
+        0x846a0e79, 0x915f95e2, 0x466e598e, 0x20b45770, 0x8cd55591, 0xc902de4c,
+        0xb90bace1, 0xbb8205d0, 0x11a86248, 0x7574a99e, 0xb77f19b6, 0xe0a9dc09,
+        0x662d09a1, 0xc4324633, 0xe85a1f02, 0x09f0be8c, 0x4a99a025, 0x1d6efe10,
+        0x1ab93d1d, 0x0ba5a4df, 0xa186f20f, 0x2868f169, 0xdcb7da83, 0x573906fe,
+        0xa1e2ce9b, 0x4fcd7f52, 0x50115e01, 0xa70683fa, 0xa002b5c4, 0x0de6d027,
+        0x9af88c27, 0x773f8641, 0xc3604c06, 0x61a806b5, 0xf0177a28, 0xc0f586e0,
+        0x006058aa, 0x30dc7d62, 0x11e69ed7, 0x2338ea63, 0x53c2dd94, 0xc2c21634,
+        0xbbcbee56, 0x90bcb6de, 0xebfc7da1, 0xce591d76, 0x6f05e409, 0x4b7c0188,
+        0x39720a3d, 0x7c927c24, 0x86e3725f, 0x724d9db9, 0x1ac15bb4, 0xd39eb8fc,
+        0xed545578, 0x08fca5b5, 0xd83d7cd3, 0x4dad0fc4, 0x1e50ef5e, 0xb161e6f8,
+        0xa28514d9, 0x6c51133c, 0x6fd5c7e7, 0x56e14ec4, 0x362abfce, 0xddc6c837,
+        0xd79a3234, 0x92638212, 0x670efa8e, 0x406000e0,
+    },
+
+    /* S-Box 3 */
+    {
+        0x3a39ce37, 0xd3faf5cf, 0xabc27737, 0x5ac52d1b, 0x5cb0679e, 0x4fa33742,
+        0xd3822740, 0x99bc9bbe, 0xd5118e9d, 0xbf0f7315, 0xd62d1c7e, 0xc700c47b,
+        0xb78c1b6b, 0x21a19045, 0xb26eb1be, 0x6a366eb4, 0x5748ab2f, 0xbc946e79,
+        0xc6a376d2, 0x6549c2c8, 0x530ff8ee, 0x468dde7d, 0xd5730a1d, 0x4cd04dc6,
+        0x2939bbdb, 0xa9ba4650, 0xac9526e8, 0xbe5ee304, 0xa1fad5f0, 0x6a2d519a,
+        0x63ef8ce2, 0x9a86ee22, 0xc089c2b8, 0x43242ef6, 0xa51e03aa, 0x9cf2d0a4,
+        0x83c061ba, 0x9be96a4d, 0x8fe51550, 0xba645bd6, 0x2826a2f9, 0xa73a3ae1,
+        0x4ba99586, 0xef5562e9, 0xc72fefd3, 0xf752f7da, 0x3f046f69, 0x77fa0a59,
+        0x80e4a915, 0x87b08601, 0x9b09e6ad, 0x3b3ee593, 0xe990fd5a, 0x9e34d797,
+        0x2cf0b7d9, 0x022b8b51, 0x96d5ac3a, 0x017da67d, 0xd1cf3ed6, 0x7c7d2d28,
+        0x1f9f25cf, 0xadf2b89b, 0x5ad6b472, 0x5a88f54c, 0xe029ac71, 0xe019a5e6,
+        0x47b0acfd, 0xed93fa9b, 0xe8d3c48d, 0x283b57cc, 0xf8d56629, 0x79132e28,
+        0x785f0191, 0xed756055, 0xf7960e44, 0xe3d35e8c, 0x15056dd4, 0x88f46dba,
+        0x03a16125, 0x0564f0bd, 0xc3eb9e15, 0x3c9057a2, 0x97271aec, 0xa93a072a,
+        0x1b3f6d9b, 0x1e6321f5, 0xf59c66fb, 0x26dcf319, 0x7533d928, 0xb155fdf5,
+        0x03563482, 0x8aba3cbb, 0x28517711, 0xc20ad9f8, 0xabcc5167, 0xccad925f,
+        0x4de81751, 0x3830dc8e, 0x379d5862, 0x9320f991, 0xea7a90c2, 0xfb3e7bce,
+        0x5121ce64, 0x774fbe32, 0xa8b6e37e, 0xc3293d46, 0x48de5369, 0x6413e680,
+        0xa2ae0810, 0xdd6db224, 0x69852dfd, 0x09072166, 0xb39a460a, 0x6445c0dd,
+        0x586cdecf, 0x1c20c8ae, 0x5bbef7dd, 0x1b588d40, 0xccd2017f, 0x6bb4e3bb,
+        0xdda26a7e, 0x3a59ff45, 0x3e350a44, 0xbcb4cdd5, 0x72eacea8, 0xfa6484bb,
+        0x8d6612ae, 0xbf3c6f47, 0xd29be463, 0x542f5d9e, 0xaec2771b, 0xf64e6370,
+        0x740e0d8d, 0xe75b1357, 0xf8721671, 0xaf537d5d, 0x4040cb08, 0x4eb4e2cc,
+        0x34d2466a, 0x0115af84, 0xe1b00428, 0x95983a1d, 0x06b89fb4, 0xce6ea048,
+        0x6f3f3b82, 0x3520ab82, 0x011a1d4b, 0x277227f8, 0x611560b1, 0xe7933fdc,
+        0xbb3a792b, 0x344525bd, 0xa08839e1, 0x51ce794b, 0x2f32c9b7, 0xa01fbac9,
+        0xe01cc87e, 0xbcc7d1f6, 0xcf0111c3, 0xa1e8aac7, 0x1a908749, 0xd44fbd9a,
+        0xd0dadecb, 0xd50ada38, 0x0339c32a, 0xc6913667, 0x8df9317c, 0xe0b12b4f,
+        0xf79e59b7, 0x43f5bb3a, 0xf2d519ff, 0x27d9459c, 0xbf97222c, 0x15e6fc2a,
+        0x0f91fc71, 0x9b941525, 0xfae59361, 0xceb69ceb, 0xc2a86459, 0x12baa8d1,
+        0xb6c1075e, 0xe3056a0c, 0x10d25065, 0xcb03a442, 0xe0ec6e0e, 0x1698db3b,
+        0x4c98a0be, 0x3278e964, 0x9f1f9532, 0xe0d392df, 0xd3a0342b, 0x8971f21e,
+        0x1b0a7441, 0x4ba3348c, 0xc5be7120, 0xc37632d8, 0xdf359f8d, 0x9b992f2e,
+        0xe60b6f47, 0x0fe3f11d, 0xe54cda54, 0x1edad891, 0xce6279cf, 0xcd3e7e6f,
+        0x1618b166, 0xfd2c1d05, 0x848fd2c5, 0xf6fb2299, 0xf523f357, 0xa6327623,
+        0x93a83531, 0x56cccd02, 0xacf08162, 0x5a75ebb5, 0x6e163697, 0x88d273cc,
+        0xde966292, 0x81b949d0, 0x4c50901b, 0x71c65614, 0xe6c6c7bd, 0x327a140a,
+        0x45e1d006, 0xc3f27b9a, 0xc9aa53fd, 0x62a80f00, 0xbb25bfe2, 0x35bdd2f6,
+        0x71126905, 0xb2040222, 0xb6cbcf7c, 0xcd769c2b, 0x53113ec0, 0x1640e3d3,
+        0x38abbd60, 0x2547adf0, 0xba38209c, 0xf746ce76, 0x77afa1c5, 0x20756060,
+        0x85cbfe4e, 0x8ae88dd8, 0x7aaaf9b0, 0x4cf9aa7e, 0x1948c25c, 0x02fb8a8c,
+        0x01c36ae4, 0xd6ebe1f9, 0x90d4f869, 0xa65cdea0, 0x3f09252d, 0xc208e69f,
+        0xb74e6132, 0xce77e25b, 0x578fdfe3, 0x3ac372e6,
+    },
+};
+
+static const uint32_t bf_pinit[] =
+{
+    /* P-Box */
+    0x243f6a88, 0x85a308d3, 0x13198a2e, 0x03707344, 0xa4093822, 0x299f31d0,
+    0x082efa98, 0xec4e6c89, 0x452821e6, 0x38d01377, 0xbe5466cf, 0x34e90c6c,
+    0xc0ac29b7, 0xc97c50dd, 0x3f84d5b5, 0xb5470917, 0x9216d5d9, 0x8979fb1b,
+};
+
+#define KEYBYTES	24
+
+static const unsigned char rtmpe9_keys[16][KEYBYTES] =
+{
+    {
+        0x79, 0x34, 0x77, 0x4c, 0x67, 0xd1, 0x38, 0x3a, 0xdf, 0xb3, 0x56, 0xbe,
+        0x8b, 0x7b, 0xd0, 0x24, 0x38, 0xe0, 0x73, 0x58, 0x41, 0x5d, 0x69, 0x67,
+    },
+    {
+        0x46, 0xf6, 0xb4, 0xcc, 0x01, 0x93, 0xe3, 0xa1, 0x9e, 0x7d, 0x3c, 0x65,
+        0x55, 0x86, 0xfd, 0x09, 0x8f, 0xf7, 0xb3, 0xc4, 0x6f, 0x41, 0xca, 0x5c,
+    },
+    {
+        0x1a, 0xe7, 0xe2, 0xf3, 0xf9, 0x14, 0x79, 0x94, 0xc0, 0xd3, 0x97, 0x43,
+        0x08, 0x7b, 0xb3, 0x84, 0x43, 0x2f, 0x9d, 0x84, 0x3f, 0x21, 0x01, 0x9b,
+    },
+    {
+        0xd3, 0xe3, 0x54, 0xb0, 0xf7, 0x1d, 0xf6, 0x2b, 0x5a, 0x43, 0x4d, 0x04,
+        0x83, 0x64, 0x3e, 0x0d, 0x59, 0x2f, 0x61, 0xcb, 0xb1, 0x6a, 0x59, 0x0d,
+    },
+    {
+        0xc8, 0xc1, 0xe9, 0xb8, 0x16, 0x56, 0x99, 0x21, 0x7b, 0x5b, 0x36, 0xb7,
+        0xb5, 0x9b, 0xdf, 0x06, 0x49, 0x2c, 0x97, 0xf5, 0x95, 0x48, 0x85, 0x7e,
+    },
+    {
+        0xeb, 0xe5, 0xe6, 0x2e, 0xa4, 0xba, 0xd4, 0x2c, 0xf2, 0x16, 0xe0, 0x8f,
+        0x66, 0x23, 0xa9, 0x43, 0x41, 0xce, 0x38, 0x14, 0x84, 0x95, 0x00, 0x53,
+    },
+    {
+        0x66, 0xdb, 0x90, 0xf0, 0x3b, 0x4f, 0xf5, 0x6f, 0xe4, 0x9c, 0x20, 0x89,
+        0x35, 0x5e, 0xd2, 0xb2, 0xc3, 0x9e, 0x9f, 0x7f, 0x63, 0xb2, 0x28, 0x81,
+    },
+    {
+        0xbb, 0x20, 0xac, 0xed, 0x2a, 0x04, 0x6a, 0x19, 0x94, 0x98, 0x9b, 0xc8,
+        0xff, 0xcd, 0x93, 0xef, 0xc6, 0x0d, 0x56, 0xa7, 0xeb, 0x13, 0xd9, 0x30,
+    },
+    {
+        0xbc, 0xf2, 0x43, 0x82, 0x09, 0x40, 0x8a, 0x87, 0x25, 0x43, 0x6d, 0xe6,
+        0xbb, 0xa4, 0xb9, 0x44, 0x58, 0x3f, 0x21, 0x7c, 0x99, 0xbb, 0x3f, 0x24,
+    },
+    {
+        0xec, 0x1a, 0xaa, 0xcd, 0xce, 0xbd, 0x53, 0x11, 0xd2, 0xfb, 0x83, 0xb6,
+        0xc3, 0xba, 0xab, 0x4f, 0x62, 0x79, 0xe8, 0x65, 0xa9, 0x92, 0x28, 0x76,
+    },
+    {
+        0xc6, 0x0c, 0x30, 0x03, 0x91, 0x18, 0x2d, 0x7b, 0x79, 0xda, 0xe1, 0xd5,
+        0x64, 0x77, 0x9a, 0x12, 0xc5, 0xb1, 0xd7, 0x91, 0x4f, 0x96, 0x4c, 0xa3,
+    },
+    {
+        0xd7, 0x7c, 0x2a, 0xbf, 0xa6, 0xe7, 0x85, 0x7c, 0x45, 0xad, 0xff, 0x12,
+        0x94, 0xd8, 0xde, 0xa4, 0x5c, 0x3d, 0x79, 0xa4, 0x44, 0x02, 0x5d, 0x22,
+    },
+    {
+        0x16, 0x19, 0x0d, 0x81, 0x6a, 0x4c, 0xc7, 0xf8, 0xb8, 0xf9, 0x4e, 0xcd,
+        0x2c, 0x9e, 0x90, 0x84, 0xb2, 0x08, 0x25, 0x60, 0xe1, 0x1e, 0xae, 0x18,
+    },
+    {
+        0xe9, 0x7c, 0x58, 0x26, 0x1b, 0x51, 0x9e, 0x49, 0x82, 0x60, 0x61, 0xfc,
+        0xa0, 0xa0, 0x1b, 0xcd, 0xf5, 0x05, 0xd6, 0xa6, 0x6d, 0x07, 0x88, 0xa3,
+    },
+    {
+        0x2b, 0x97, 0x11, 0x8b, 0xd9, 0x4e, 0xd9, 0xdf, 0x20, 0xe3, 0x9c, 0x10,
+        0xe6, 0xa1, 0x35, 0x21, 0x11, 0xf9, 0x13, 0x0d, 0x0b, 0x24, 0x65, 0xb2,
+    },
+    {
+        0x53, 0x6a, 0x4c, 0x54, 0xac, 0x8b, 0x9b, 0xb8, 0x97, 0x29, 0xfc, 0x60,
+        0x2c, 0x5b, 0x3a, 0x85, 0x68, 0xb5, 0xaa, 0x6a, 0x44, 0xcd, 0x3f, 0xa7,
+    },
+};
+
+#define	BF_ENC(X,S) \
+	(((S[0][X>>24] + S[1][X>>16 & 0xff]) ^ S[2][(X>>8) & 0xff]) + S[3][X & 0xff])
+
+static void bf_enc(uint32_t *x, bf_key *key)
+{
+    uint32_t  Xl;
+    uint32_t  Xr;
+    uint32_t  temp;
+    int	i;
+
+    Xl = x[0];
+    Xr = x[1];
+
+    for (i = 0; i < BF_ROUNDS; ++i)
+    {
+        Xl ^= key->p[i];
+        Xr ^= BF_ENC(Xl,key->s);
+
+        temp = Xl;
+        Xl = Xr;
+        Xr = temp;
+    }
+
+    Xl ^= key->p[BF_ROUNDS];
+    Xr ^= key->p[BF_ROUNDS + 1];
+
+    x[0] = Xr;
+    x[1] = Xl;
+}
+
+static void bf_setkey(const unsigned char *kp, int keybytes, bf_key *key)
+{
+    int          i;
+    int          j;
+    int          k;
+    uint32_t  data;
+    uint32_t  d[2];
+
+    memcpy(key->p, bf_pinit, sizeof(key->p));
+    memcpy(key->s, bf_sinit, sizeof(key->s));
+
+    j = 0;
+    for (i = 0; i < BF_ROUNDS + 2; ++i)
+    {
+        data = 0x00000000;
+        for (k = 0; k < 4; ++k)
+        {
+            data = (data << 8) | kp[j];
+            j = j + 1;
+            if (j >= keybytes)
+            {
+                j = 0;
+            }
+        }
+        key->p[i] ^= data;
+    }
+
+    d[0] = 0x00000000;
+    d[1] = 0x00000000;
+
+    for (i = 0; i < BF_ROUNDS + 2; i += 2)
+    {
+        bf_enc(d, key);
+
+        key->p[i] = d[0];
+        key->p[i + 1] = d[1];
+    }
+
+    for (i = 0; i < 4; ++i)
+    {
+        for (j = 0; j < 256; j += 2)
+        {
+
+            bf_enc(d, key);
+
+            key->s[i][j] = d[0];
+            key->s[i][j + 1] = d[1];
+        }
+    }
+}
+
+static void rtmpe9_sig(uint8_t *in, uint8_t *out, int keyid)
+{
+    uint32_t d[2];
+    bf_key key;
+
+    bf_setkey(rtmpe9_keys[keyid], KEYBYTES, &key);
+
+    /* input is little-endian */
+    d[0] = in[0] | (in[1] << 8) | (in[2] << 16) | (in[3] << 24);
+    d[1] = in[4] | (in[5] << 8) | (in[6] << 16) | (in[7] << 24);
+    bf_enc(d, &key);
+    out[0] = d[0] & 0xff;
+    out[1] = (d[0] >> 8) & 0xff;
+    out[2] = (d[0] >> 16) & 0xff;
+    out[3] = (d[0] >> 24) & 0xff;
+    out[4] = d[1] & 0xff;
+    out[5] = (d[1] >> 8) & 0xff;
+    out[6] = (d[1] >> 16) & 0xff;
+    out[7] = (d[1] >> 24) & 0xff;
+}
+
+static int
+HandShake(RTMP * r, int FP9HandShake)
+{
+    int i, offalg = 0;
+    int dhposClient = 0;
+    int digestPosClient = 0;
+    int encrypted = r->Link.protocol & RTMP_FEATURE_ENC;
+
+    RC4_handle keyIn = 0;
+    RC4_handle keyOut = 0;
+
+    int32_t *ip;
+    uint32_t uptime;
+
+    uint8_t clientbuf[RTMP_SIG_SIZE + 4], *clientsig=clientbuf+4;
+    uint8_t serversig[RTMP_SIG_SIZE], client2[RTMP_SIG_SIZE], *reply;
+    uint8_t type;
+    getoff *getdh = NULL, *getdig = NULL;
+
+    if (encrypted || r->Link.SWFSize)
+        FP9HandShake = TRUE;
+    else
+        FP9HandShake = FALSE;
+
+    r->Link.rc4keyIn = r->Link.rc4keyOut = 0;
+
+    if (encrypted)
+    {
+        clientsig[-1] = 0x06;	/* 0x08 is RTMPE as well */
+        offalg = 1;
+    }
+    else
+        clientsig[-1] = 0x03;
+
+    uptime = htonl(RTMP_GetTime());
+    memcpy(clientsig, &uptime, 4);
+
+    if (FP9HandShake)
+    {
+        /* set version to at least 9.0.115.0 */
+        if (encrypted)
+        {
+            clientsig[4] = 128;
+            clientsig[6] = 3;
+        }
+        else
+        {
+            clientsig[4] = 10;
+            clientsig[6] = 45;
+        }
+        clientsig[5] = 0;
+        clientsig[7] = 2;
+
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Client type: %02X", __FUNCTION__, clientsig[-1]);
+        getdig = digoff[offalg];
+        getdh  = dhoff[offalg];
+    }
+    else
+    {
+        memset(&clientsig[4], 0, 4);
+    }
+
+    /* generate random data */
+#ifdef _DEBUG
+    memset(clientsig+8, 0, RTMP_SIG_SIZE-8);
+#else
+    ip = (int32_t *)(clientsig+8);
+    for (i = 2; i < RTMP_SIG_SIZE/4; i++)
+        *ip++ = rand();
+#endif
+
+    /* set handshake digest */
+    if (FP9HandShake)
+    {
+        if (encrypted)
+        {
+            /* generate Diffie-Hellmann parameters */
+            r->Link.dh = DHInit(1024);
+            if (!r->Link.dh)
+            {
+                RTMP_Log(RTMP_LOGERROR, "%s: Couldn't initialize Diffie-Hellmann!",
+                         __FUNCTION__);
+                return FALSE;
+            }
+
+            dhposClient = getdh(clientsig, RTMP_SIG_SIZE);
+            RTMP_Log(RTMP_LOGDEBUG, "%s: DH pubkey position: %d", __FUNCTION__, dhposClient);
+
+            if (!DHGenerateKey(r->Link.dh))
+            {
+                RTMP_Log(RTMP_LOGERROR, "%s: Couldn't generate Diffie-Hellmann public key!",
+                         __FUNCTION__);
+                return FALSE;
+            }
+
+            if (!DHGetPublicKey(r->Link.dh, &clientsig[dhposClient], 128))
+            {
+                RTMP_Log(RTMP_LOGERROR, "%s: Couldn't write public key!", __FUNCTION__);
+                return FALSE;
+            }
+        }
+
+        digestPosClient = getdig(clientsig, RTMP_SIG_SIZE);	/* reuse this value in verification */
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Client digest offset: %d", __FUNCTION__,
+                 digestPosClient);
+
+        CalculateDigest(digestPosClient, clientsig, GenuineFPKey, 30,
+                        &clientsig[digestPosClient]);
+
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Initial client digest: ", __FUNCTION__);
+        RTMP_LogHex(RTMP_LOGDEBUG, clientsig + digestPosClient,
+                    SHA256_DIGEST_LENGTH);
+    }
+
+#ifdef _DEBUG
+    RTMP_Log(RTMP_LOGDEBUG, "Clientsig: ");
+    RTMP_LogHex(RTMP_LOGDEBUG, clientsig, RTMP_SIG_SIZE);
+#endif
+
+    if (!WriteN(r, (char *)clientsig-1, RTMP_SIG_SIZE + 1))
+        return FALSE;
+
+    if (ReadN(r, (char *)&type, 1) != 1)	/* 0x03 or 0x06 */
+        return FALSE;
+
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Type Answer   : %02X", __FUNCTION__, type);
+
+    if (type != clientsig[-1])
+        RTMP_Log(RTMP_LOGWARNING, "%s: Type mismatch: client sent %d, server answered %d",
+                 __FUNCTION__, clientsig[-1], type);
+
+    if (ReadN(r, (char *)serversig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
+        return FALSE;
+
+    /* decode server response */
+    memcpy(&uptime, serversig, 4);
+    uptime = ntohl(uptime);
+
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Server Uptime : %d", __FUNCTION__, uptime);
+    RTMP_Log(RTMP_LOGDEBUG, "%s: FMS Version   : %d.%d.%d.%d", __FUNCTION__, serversig[4],
+             serversig[5], serversig[6], serversig[7]);
+
+    if (FP9HandShake && type == 3 && !serversig[4])
+        FP9HandShake = FALSE;
+
+#ifdef _DEBUG
+    RTMP_Log(RTMP_LOGDEBUG, "Server signature:");
+    RTMP_LogHex(RTMP_LOGDEBUG, serversig, RTMP_SIG_SIZE);
+#endif
+
+    if (FP9HandShake)
+    {
+        uint8_t digestResp[SHA256_DIGEST_LENGTH];
+        uint8_t *signatureResp = NULL;
+
+        /* we have to use this signature now to find the correct algorithms for getting the digest and DH positions */
+        int digestPosServer = getdig(serversig, RTMP_SIG_SIZE);
+
+        if (!VerifyDigest(digestPosServer, serversig, GenuineFMSKey, 36))
+        {
+            RTMP_Log(RTMP_LOGWARNING, "Trying different position for server digest!");
+            offalg ^= 1;
+            getdig = digoff[offalg];
+            getdh  = dhoff[offalg];
+            digestPosServer = getdig(serversig, RTMP_SIG_SIZE);
+
+            if (!VerifyDigest(digestPosServer, serversig, GenuineFMSKey, 36))
+            {
+                RTMP_Log(RTMP_LOGERROR, "Couldn't verify the server digest");	/* continuing anyway will probably fail */
+                return FALSE;
+            }
+        }
+
+        /* generate SWFVerification token (SHA256 HMAC hash of decompressed SWF, key are the last 32 bytes of the server handshake) */
+        if (r->Link.SWFSize)
+        {
+            const char swfVerify[] = { 0x01, 0x01 };
+            char *vend = r->Link.SWFVerificationResponse+sizeof(r->Link.SWFVerificationResponse);
+
+            memcpy(r->Link.SWFVerificationResponse, swfVerify, 2);
+            AMF_EncodeInt32(&r->Link.SWFVerificationResponse[2], vend, r->Link.SWFSize);
+            AMF_EncodeInt32(&r->Link.SWFVerificationResponse[6], vend, r->Link.SWFSize);
+            HMACsha256(r->Link.SWFHash, SHA256_DIGEST_LENGTH,
+                       &serversig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH],
+                       SHA256_DIGEST_LENGTH,
+                       (uint8_t *)&r->Link.SWFVerificationResponse[10]);
+        }
+
+        /* do Diffie-Hellmann Key exchange for encrypted RTMP */
+        if (encrypted)
+        {
+            /* compute secret key */
+            uint8_t secretKey[128] = { 0 };
+            int len, dhposServer;
+
+            dhposServer = getdh(serversig, RTMP_SIG_SIZE);
+            RTMP_Log(RTMP_LOGDEBUG, "%s: Server DH public key offset: %d", __FUNCTION__,
+                     dhposServer);
+            len = DHComputeSharedSecretKey(r->Link.dh, &serversig[dhposServer],
+                                           128, secretKey);
+            if (len < 0)
+            {
+                RTMP_Log(RTMP_LOGDEBUG, "%s: Wrong secret key position!", __FUNCTION__);
+                return FALSE;
+            }
+
+            RTMP_Log(RTMP_LOGDEBUG, "%s: Secret key: ", __FUNCTION__);
+            RTMP_LogHex(RTMP_LOGDEBUG, secretKey, 128);
+
+            InitRC4Encryption(secretKey,
+                              (uint8_t *) & serversig[dhposServer],
+                              (uint8_t *) & clientsig[dhposClient],
+                              &keyIn, &keyOut);
+        }
+
+
+        reply = client2;
+#ifdef _DEBUG
+        memset(reply, 0xff, RTMP_SIG_SIZE);
+#else
+        ip = (int32_t *)reply;
+        for (i = 0; i < RTMP_SIG_SIZE/4; i++)
+            *ip++ = rand();
+#endif
+        /* calculate response now */
+        signatureResp = reply+RTMP_SIG_SIZE-SHA256_DIGEST_LENGTH;
+
+        HMACsha256(&serversig[digestPosServer], SHA256_DIGEST_LENGTH,
+                   GenuineFPKey, sizeof(GenuineFPKey), digestResp);
+        HMACsha256(reply, RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH, digestResp,
+                   SHA256_DIGEST_LENGTH, signatureResp);
+
+        /* some info output */
+        RTMP_Log(RTMP_LOGDEBUG,
+                 "%s: Calculated digest key from secure key and server digest: ",
+                 __FUNCTION__);
+        RTMP_LogHex(RTMP_LOGDEBUG, digestResp, SHA256_DIGEST_LENGTH);
+
+#ifdef FP10
+        if (type == 8 )
+        {
+            uint8_t *dptr = digestResp;
+            uint8_t *sig = signatureResp;
+            /* encrypt signatureResp */
+            for (i=0; i<SHA256_DIGEST_LENGTH; i+=8)
+                rtmpe8_sig(sig+i, sig+i, dptr[i] % 15);
+        }
+        else if (type == 9)
+        {
+            uint8_t *dptr = digestResp;
+            uint8_t *sig = signatureResp;
+            /* encrypt signatureResp */
+            for (i=0; i<SHA256_DIGEST_LENGTH; i+=8)
+                rtmpe9_sig(sig+i, sig+i, dptr[i] % 15);
+        }
+#endif
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Client signature calculated:", __FUNCTION__);
+        RTMP_LogHex(RTMP_LOGDEBUG, signatureResp, SHA256_DIGEST_LENGTH);
+    }
+    else
+    {
+        reply = serversig;
+#if 0
+        uptime = htonl(RTMP_GetTime());
+        memcpy(reply+4, &uptime, 4);
+#endif
+    }
+
+#ifdef _DEBUG
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Sending handshake response: ",
+             __FUNCTION__);
+    RTMP_LogHex(RTMP_LOGDEBUG, reply, RTMP_SIG_SIZE);
+#endif
+    if (!WriteN(r, (char *)reply, RTMP_SIG_SIZE))
+        return FALSE;
+
+    /* 2nd part of handshake */
+    if (ReadN(r, (char *)serversig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
+        return FALSE;
+
+#ifdef _DEBUG
+    RTMP_Log(RTMP_LOGDEBUG, "%s: 2nd handshake: ", __FUNCTION__);
+    RTMP_LogHex(RTMP_LOGDEBUG, serversig, RTMP_SIG_SIZE);
+#endif
+
+    if (FP9HandShake)
+    {
+        uint8_t signature[SHA256_DIGEST_LENGTH];
+        uint8_t digest[SHA256_DIGEST_LENGTH];
+
+        if (serversig[4] == 0 && serversig[5] == 0 && serversig[6] == 0
+                && serversig[7] == 0)
+        {
+            RTMP_Log(RTMP_LOGDEBUG,
+                     "%s: Wait, did the server just refuse signed authentication?",
+                     __FUNCTION__);
+        }
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Server sent signature:", __FUNCTION__);
+        RTMP_LogHex(RTMP_LOGDEBUG, &serversig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH],
+                    SHA256_DIGEST_LENGTH);
+
+        /* verify server response */
+        HMACsha256(&clientsig[digestPosClient], SHA256_DIGEST_LENGTH,
+                   GenuineFMSKey, sizeof(GenuineFMSKey), digest);
+        HMACsha256(serversig, RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH, digest,
+                   SHA256_DIGEST_LENGTH, signature);
+
+        /* show some information */
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Digest key: ", __FUNCTION__);
+        RTMP_LogHex(RTMP_LOGDEBUG, digest, SHA256_DIGEST_LENGTH);
+
+#ifdef FP10
+        if (type == 8 )
+        {
+            uint8_t *dptr = digest;
+            uint8_t *sig = signature;
+            /* encrypt signature */
+            for (i=0; i<SHA256_DIGEST_LENGTH; i+=8)
+                rtmpe8_sig(sig+i, sig+i, dptr[i] % 15);
+        }
+        else if (type == 9)
+        {
+            uint8_t *dptr = digest;
+            uint8_t *sig = signature;
+            /* encrypt signatureResp */
+            for (i=0; i<SHA256_DIGEST_LENGTH; i+=8)
+                rtmpe9_sig(sig+i, sig+i, dptr[i] % 15);
+        }
+#endif
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Signature calculated:", __FUNCTION__);
+        RTMP_LogHex(RTMP_LOGDEBUG, signature, SHA256_DIGEST_LENGTH);
+        if (memcmp
+                (signature, &serversig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH],
+                 SHA256_DIGEST_LENGTH) != 0)
+        {
+            RTMP_Log(RTMP_LOGWARNING, "%s: Server not genuine Adobe!", __FUNCTION__);
+            return FALSE;
+        }
+        else
+        {
+            RTMP_Log(RTMP_LOGDEBUG, "%s: Genuine Adobe Flash Media Server", __FUNCTION__);
+        }
+
+        if (encrypted)
+        {
+            char buff[RTMP_SIG_SIZE];
+            /* set keys for encryption from now on */
+            r->Link.rc4keyIn = keyIn;
+            r->Link.rc4keyOut = keyOut;
+
+
+            /* update the keystreams */
+            if (r->Link.rc4keyIn)
+            {
+                RC4_encrypt(r->Link.rc4keyIn, RTMP_SIG_SIZE, (uint8_t *) buff);
+            }
+
+            if (r->Link.rc4keyOut)
+            {
+                RC4_encrypt(r->Link.rc4keyOut, RTMP_SIG_SIZE, (uint8_t *) buff);
+            }
+        }
+    }
+    else
+    {
+        if (memcmp(serversig, clientsig, RTMP_SIG_SIZE) != 0)
+        {
+            RTMP_Log(RTMP_LOGWARNING, "%s: client signature does not match!",
+                     __FUNCTION__);
+        }
+    }
+
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Handshaking finished....", __FUNCTION__);
+    return TRUE;
+}
+
+static int
+SHandShake(RTMP * r)
+{
+    int i, offalg = 0;
+    int dhposServer = 0;
+    int digestPosServer = 0;
+    RC4_handle keyIn = 0;
+    RC4_handle keyOut = 0;
+    int FP9HandShake = FALSE;
+    int encrypted;
+    int32_t *ip;
+
+    uint8_t clientsig[RTMP_SIG_SIZE];
+    uint8_t serverbuf[RTMP_SIG_SIZE + 4], *serversig = serverbuf+4;
+    uint8_t type;
+    uint32_t uptime;
+    getoff *getdh = NULL, *getdig = NULL;
+
+    if (ReadN(r, (char *)&type, 1) != 1)	/* 0x03 or 0x06 */
+        return FALSE;
+
+    if (ReadN(r, (char *)clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
+        return FALSE;
+
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Type Requested : %02X", __FUNCTION__, type);
+    RTMP_LogHex(RTMP_LOGDEBUG2, clientsig, RTMP_SIG_SIZE);
+
+    if (type == 3)
+    {
+        encrypted = FALSE;
+    }
+    else if (type == 6 || type == 8)
+    {
+        offalg = 1;
+        encrypted = TRUE;
+        FP9HandShake = TRUE;
+        r->Link.protocol |= RTMP_FEATURE_ENC;
+        /* use FP10 if client is capable */
+        if (clientsig[4] == 128)
+            type = 8;
+    }
+    else
+    {
+        RTMP_Log(RTMP_LOGERROR, "%s: Unknown version %02x",
+                 __FUNCTION__, type);
+        return FALSE;
+    }
+
+    if (!FP9HandShake && clientsig[4])
+        FP9HandShake = TRUE;
+
+    serversig[-1] = type;
+
+    r->Link.rc4keyIn = r->Link.rc4keyOut = 0;
+
+    uptime = htonl(RTMP_GetTime());
+    memcpy(serversig, &uptime, 4);
+
+    if (FP9HandShake)
+    {
+        /* Server version */
+        serversig[4] = 3;
+        serversig[5] = 5;
+        serversig[6] = 1;
+        serversig[7] = 1;
+
+        getdig = digoff[offalg];
+        getdh  = dhoff[offalg];
+    }
+    else
+    {
+        memset(&serversig[4], 0, 4);
+    }
+
+    /* generate random data */
+#ifdef _DEBUG
+    memset(serversig+8, 0, RTMP_SIG_SIZE-8);
+#else
+    ip = (int32_t *)(serversig+8);
+    for (i = 2; i < RTMP_SIG_SIZE/4; i++)
+        *ip++ = rand();
+#endif
+
+    /* set handshake digest */
+    if (FP9HandShake)
+    {
+        if (encrypted)
+        {
+            /* generate Diffie-Hellmann parameters */
+            r->Link.dh = DHInit(1024);
+            if (!r->Link.dh)
+            {
+                RTMP_Log(RTMP_LOGERROR, "%s: Couldn't initialize Diffie-Hellmann!",
+                         __FUNCTION__);
+                return FALSE;
+            }
+
+            dhposServer = getdh(serversig, RTMP_SIG_SIZE);
+            RTMP_Log(RTMP_LOGDEBUG, "%s: DH pubkey position: %d", __FUNCTION__, dhposServer);
+
+            if (!DHGenerateKey(r->Link.dh))
+            {
+                RTMP_Log(RTMP_LOGERROR, "%s: Couldn't generate Diffie-Hellmann public key!",
+                         __FUNCTION__);
+                return FALSE;
+            }
+
+            if (!DHGetPublicKey
+                    (r->Link.dh, (uint8_t *) &serversig[dhposServer], 128))
+            {
+                RTMP_Log(RTMP_LOGERROR, "%s: Couldn't write public key!", __FUNCTION__);
+                return FALSE;
+            }
+        }
+
+        digestPosServer = getdig(serversig, RTMP_SIG_SIZE);	/* reuse this value in verification */
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Server digest offset: %d", __FUNCTION__,
+                 digestPosServer);
+
+        CalculateDigest(digestPosServer, serversig, GenuineFMSKey, 36,
+                        &serversig[digestPosServer]);
+
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Initial server digest: ", __FUNCTION__);
+        RTMP_LogHex(RTMP_LOGDEBUG, serversig + digestPosServer,
+                    SHA256_DIGEST_LENGTH);
+    }
+
+    RTMP_Log(RTMP_LOGDEBUG2, "Serversig: ");
+    RTMP_LogHex(RTMP_LOGDEBUG2, serversig, RTMP_SIG_SIZE);
+
+    if (!WriteN(r, (char *)serversig-1, RTMP_SIG_SIZE + 1))
+        return FALSE;
+
+    /* decode client response */
+    memcpy(&uptime, clientsig, 4);
+    uptime = ntohl(uptime);
+
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Client Uptime : %d", __FUNCTION__, uptime);
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Player Version: %d.%d.%d.%d", __FUNCTION__, clientsig[4],
+             clientsig[5], clientsig[6], clientsig[7]);
+
+    if (FP9HandShake)
+    {
+        uint8_t digestResp[SHA256_DIGEST_LENGTH];
+        uint8_t *signatureResp = NULL;
+
+        /* we have to use this signature now to find the correct algorithms for getting the digest and DH positions */
+        int digestPosClient = getdig(clientsig, RTMP_SIG_SIZE);
+
+        if (!VerifyDigest(digestPosClient, clientsig, GenuineFPKey, 30))
+        {
+            RTMP_Log(RTMP_LOGWARNING, "Trying different position for client digest!");
+            offalg ^= 1;
+            getdig = digoff[offalg];
+            getdh  = dhoff[offalg];
+
+            digestPosClient = getdig(clientsig, RTMP_SIG_SIZE);
+
+            if (!VerifyDigest(digestPosClient, clientsig, GenuineFPKey, 30))
+            {
+                RTMP_Log(RTMP_LOGERROR, "Couldn't verify the client digest");	/* continuing anyway will probably fail */
+                return FALSE;
+            }
+        }
+
+        /* generate SWFVerification token (SHA256 HMAC hash of decompressed SWF, key are the last 32 bytes of the server handshake) */
+        if (r->Link.SWFSize)
+        {
+            const char swfVerify[] = { 0x01, 0x01 };
+            char *vend = r->Link.SWFVerificationResponse+sizeof(r->Link.SWFVerificationResponse);
+
+            memcpy(r->Link.SWFVerificationResponse, swfVerify, 2);
+            AMF_EncodeInt32(&r->Link.SWFVerificationResponse[2], vend, r->Link.SWFSize);
+            AMF_EncodeInt32(&r->Link.SWFVerificationResponse[6], vend, r->Link.SWFSize);
+            HMACsha256(r->Link.SWFHash, SHA256_DIGEST_LENGTH,
+                       &serversig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH],
+                       SHA256_DIGEST_LENGTH,
+                       (uint8_t *)&r->Link.SWFVerificationResponse[10]);
+        }
+
+        /* do Diffie-Hellmann Key exchange for encrypted RTMP */
+        if (encrypted)
+        {
+            int dhposClient, len;
+            /* compute secret key */
+            uint8_t secretKey[128] = { 0 };
+
+            dhposClient = getdh(clientsig, RTMP_SIG_SIZE);
+            RTMP_Log(RTMP_LOGDEBUG, "%s: Client DH public key offset: %d", __FUNCTION__,
+                     dhposClient);
+            len =
+                DHComputeSharedSecretKey(r->Link.dh,
+                                         (uint8_t *) &clientsig[dhposClient], 128,
+                                         secretKey);
+            if (len < 0)
+            {
+                RTMP_Log(RTMP_LOGDEBUG, "%s: Wrong secret key position!", __FUNCTION__);
+                return FALSE;
+            }
+
+            RTMP_Log(RTMP_LOGDEBUG, "%s: Secret key: ", __FUNCTION__);
+            RTMP_LogHex(RTMP_LOGDEBUG, secretKey, 128);
+
+            InitRC4Encryption(secretKey,
+                              (uint8_t *) &clientsig[dhposClient],
+                              (uint8_t *) &serversig[dhposServer],
+                              &keyIn, &keyOut);
+        }
+
+
+        /* calculate response now */
+        signatureResp = clientsig+RTMP_SIG_SIZE-SHA256_DIGEST_LENGTH;
+
+        HMACsha256(&clientsig[digestPosClient], SHA256_DIGEST_LENGTH,
+                   GenuineFMSKey, sizeof(GenuineFMSKey), digestResp);
+        HMACsha256(clientsig, RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH, digestResp,
+                   SHA256_DIGEST_LENGTH, signatureResp);
+#ifdef FP10
+        if (type == 8 )
+        {
+            uint8_t *dptr = digestResp;
+            uint8_t *sig = signatureResp;
+            /* encrypt signatureResp */
+            for (i=0; i<SHA256_DIGEST_LENGTH; i+=8)
+                rtmpe8_sig(sig+i, sig+i, dptr[i] % 15);
+        }
+        else if (type == 9)
+        {
+            uint8_t *dptr = digestResp;
+            uint8_t *sig = signatureResp;
+            /* encrypt signatureResp */
+            for (i=0; i<SHA256_DIGEST_LENGTH; i+=8)
+                rtmpe9_sig(sig+i, sig+i, dptr[i] % 15);
+        }
+#endif
+
+        /* some info output */
+        RTMP_Log(RTMP_LOGDEBUG,
+                 "%s: Calculated digest key from secure key and server digest: ",
+                 __FUNCTION__);
+        RTMP_LogHex(RTMP_LOGDEBUG, digestResp, SHA256_DIGEST_LENGTH);
+
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Server signature calculated:", __FUNCTION__);
+        RTMP_LogHex(RTMP_LOGDEBUG, signatureResp, SHA256_DIGEST_LENGTH);
+    }
+#if 0
+    else
+    {
+        uptime = htonl(RTMP_GetTime());
+        memcpy(clientsig+4, &uptime, 4);
+    }
+#endif
+
+    RTMP_Log(RTMP_LOGDEBUG2, "%s: Sending handshake response: ",
+             __FUNCTION__);
+    RTMP_LogHex(RTMP_LOGDEBUG2, clientsig, RTMP_SIG_SIZE);
+
+    if (!WriteN(r, (char *)clientsig, RTMP_SIG_SIZE))
+        return FALSE;
+
+    /* 2nd part of handshake */
+    if (ReadN(r, (char *)clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
+        return FALSE;
+
+    RTMP_Log(RTMP_LOGDEBUG2, "%s: 2nd handshake: ", __FUNCTION__);
+    RTMP_LogHex(RTMP_LOGDEBUG2, clientsig, RTMP_SIG_SIZE);
+
+    if (FP9HandShake)
+    {
+        uint8_t signature[SHA256_DIGEST_LENGTH];
+        uint8_t digest[SHA256_DIGEST_LENGTH];
+
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Client sent signature:", __FUNCTION__);
+        RTMP_LogHex(RTMP_LOGDEBUG, &clientsig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH],
+                    SHA256_DIGEST_LENGTH);
+
+        /* verify client response */
+        HMACsha256(&serversig[digestPosServer], SHA256_DIGEST_LENGTH,
+                   GenuineFPKey, sizeof(GenuineFPKey), digest);
+        HMACsha256(clientsig, RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH, digest,
+                   SHA256_DIGEST_LENGTH, signature);
+#ifdef FP10
+        if (type == 8 )
+        {
+            uint8_t *dptr = digest;
+            uint8_t *sig = signature;
+            /* encrypt signatureResp */
+            for (i=0; i<SHA256_DIGEST_LENGTH; i+=8)
+                rtmpe8_sig(sig+i, sig+i, dptr[i] % 15);
+        }
+        else if (type == 9)
+        {
+            uint8_t *dptr = digest;
+            uint8_t *sig = signature;
+            /* encrypt signatureResp */
+            for (i=0; i<SHA256_DIGEST_LENGTH; i+=8)
+                rtmpe9_sig(sig+i, sig+i, dptr[i] % 15);
+        }
+#endif
+
+        /* show some information */
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Digest key: ", __FUNCTION__);
+        RTMP_LogHex(RTMP_LOGDEBUG, digest, SHA256_DIGEST_LENGTH);
+
+        RTMP_Log(RTMP_LOGDEBUG, "%s: Signature calculated:", __FUNCTION__);
+        RTMP_LogHex(RTMP_LOGDEBUG, signature, SHA256_DIGEST_LENGTH);
+        if (memcmp
+                (signature, &clientsig[RTMP_SIG_SIZE - SHA256_DIGEST_LENGTH],
+                 SHA256_DIGEST_LENGTH) != 0)
+        {
+            RTMP_Log(RTMP_LOGWARNING, "%s: Client not genuine Adobe!", __FUNCTION__);
+            return FALSE;
+        }
+        else
+        {
+            RTMP_Log(RTMP_LOGDEBUG, "%s: Genuine Adobe Flash Player", __FUNCTION__);
+        }
+
+        if (encrypted)
+        {
+            char buff[RTMP_SIG_SIZE];
+            /* set keys for encryption from now on */
+            r->Link.rc4keyIn = keyIn;
+            r->Link.rc4keyOut = keyOut;
+
+            /* update the keystreams */
+            if (r->Link.rc4keyIn)
+            {
+                RC4_encrypt(r->Link.rc4keyIn, RTMP_SIG_SIZE, (uint8_t *) buff);
+            }
+
+            if (r->Link.rc4keyOut)
+            {
+                RC4_encrypt(r->Link.rc4keyOut, RTMP_SIG_SIZE, (uint8_t *) buff);
+            }
+        }
+    }
+    else
+    {
+        if (memcmp(serversig, clientsig, RTMP_SIG_SIZE) != 0)
+        {
+            RTMP_Log(RTMP_LOGWARNING, "%s: client signature does not match!",
+                     __FUNCTION__);
+        }
+    }
+
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Handshaking finished....", __FUNCTION__);
+    return TRUE;
+}

+ 661 - 0
plugins/obs-outputs/librtmp/hashswf.c

@@ -0,0 +1,661 @@
+/*
+ *  Copyright (C) 2009-2010 Howard Chu
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+#include "rtmp_sys.h"
+#include "log.h"
+#include "http.h"
+
+#ifdef CRYPTO
+#ifdef USE_POLARSSL
+#include <polarssl/sha2.h>
+#ifndef SHA256_DIGEST_LENGTH
+#define SHA256_DIGEST_LENGTH	32
+#endif
+#define HMAC_CTX	sha2_context
+#define HMAC_setup(ctx, key, len)	sha2_hmac_starts(&ctx, (unsigned char *)key, len, 0)
+#define HMAC_crunch(ctx, buf, len)	sha2_hmac_update(&ctx, buf, len)
+#define HMAC_finish(ctx, dig, dlen)	dlen = SHA256_DIGEST_LENGTH; sha2_hmac_finish(&ctx, dig)
+#define HMAC_close(ctx)
+#elif defined(USE_GNUTLS)
+#include <nettle/hmac.h>
+#ifndef SHA256_DIGEST_LENGTH
+#define SHA256_DIGEST_LENGTH	32
+#endif
+#undef HMAC_CTX
+#define HMAC_CTX	struct hmac_sha256_ctx
+#define HMAC_setup(ctx, key, len)	hmac_sha256_set_key(&ctx, len, key)
+#define HMAC_crunch(ctx, buf, len)	hmac_sha256_update(&ctx, len, buf)
+#define HMAC_finish(ctx, dig, dlen)	dlen = SHA256_DIGEST_LENGTH; hmac_sha256_digest(&ctx, SHA256_DIGEST_LENGTH, dig)
+#define HMAC_close(ctx)
+#else	/* USE_OPENSSL */
+#include <openssl/ssl.h>
+#include <openssl/sha.h>
+#include <openssl/hmac.h>
+#include <openssl/rc4.h>
+#define HMAC_setup(ctx, key, len)	HMAC_CTX_init(&ctx); HMAC_Init_ex(&ctx, (unsigned char *)key, len, EVP_sha256(), 0)
+#define HMAC_crunch(ctx, buf, len)	HMAC_Update(&ctx, (unsigned char *)buf, len)
+#define HMAC_finish(ctx, dig, dlen)	HMAC_Final(&ctx, (unsigned char *)dig, &dlen);
+#define HMAC_close(ctx)	HMAC_CTX_cleanup(&ctx)
+#endif
+
+extern void RTMP_TLS_Init();
+extern TLS_CTX RTMP_TLS_ctx;
+
+#include <zlib.h>
+
+#endif /* CRYPTO */
+
+#define	AGENT	"Mozilla/5.0"
+
+HTTPResult
+HTTP_get(struct HTTP_ctx *http, const char *url, HTTP_read_callback *cb)
+{
+    char *host, *path;
+    char *p1, *p2;
+    char hbuf[256];
+    int port = 80;
+#ifdef CRYPTO
+    int ssl = 0;
+#endif
+    int hlen, flen = 0;
+    int rc, i;
+    int len_known;
+    HTTPResult ret = HTTPRES_OK;
+    struct sockaddr_in sa;
+    RTMPSockBuf sb = {0};
+
+    http->status = -1;
+
+    memset(&sa, 0, sizeof(struct sockaddr_in));
+    sa.sin_family = AF_INET;
+
+    /* we only handle http here */
+    if (strncasecmp(url, "http", 4))
+        return HTTPRES_BAD_REQUEST;
+
+    if (url[4] == 's')
+    {
+#ifdef CRYPTO
+        ssl = 1;
+        port = 443;
+        if (!RTMP_TLS_ctx)
+            RTMP_TLS_Init();
+#else
+        return HTTPRES_BAD_REQUEST;
+#endif
+    }
+
+    p1 = strchr(url + 4, ':');
+    if (!p1 || strncmp(p1, "://", 3))
+        return HTTPRES_BAD_REQUEST;
+
+    host = p1 + 3;
+    path = strchr(host, '/');
+    hlen = path - host;
+    strncpy(hbuf, host, hlen);
+    hbuf[hlen] = '\0';
+    host = hbuf;
+    p1 = strrchr(host, ':');
+    if (p1)
+    {
+        *p1++ = '\0';
+        port = atoi(p1);
+    }
+
+    sa.sin_addr.s_addr = inet_addr(host);
+    if (sa.sin_addr.s_addr == INADDR_NONE)
+    {
+        struct hostent *hp = gethostbyname(host);
+        if (!hp || !hp->h_addr)
+            return HTTPRES_LOST_CONNECTION;
+        sa.sin_addr = *(struct in_addr *)hp->h_addr;
+    }
+    sa.sin_port = htons(port);
+    sb.sb_socket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
+    if (sb.sb_socket == -1)
+        return HTTPRES_LOST_CONNECTION;
+    i =
+        sprintf(sb.sb_buf,
+                "GET %s HTTP/1.0\r\nUser-Agent: %s\r\nHost: %s\r\nReferer: %.*s\r\n",
+                path, AGENT, host, (int)(path - url + 1), url);
+    if (http->date[0])
+        i += sprintf(sb.sb_buf + i, "If-Modified-Since: %s\r\n", http->date);
+    i += sprintf(sb.sb_buf + i, "\r\n");
+
+    if (connect
+            (sb.sb_socket, (struct sockaddr *)&sa, sizeof(struct sockaddr)) < 0)
+    {
+        ret = HTTPRES_LOST_CONNECTION;
+        goto leave;
+    }
+#ifdef CRYPTO
+    if (ssl)
+    {
+#ifdef NO_SSL
+        RTMP_Log(RTMP_LOGERROR, "%s, No SSL/TLS support", __FUNCTION__);
+        ret = HTTPRES_BAD_REQUEST;
+        goto leave;
+#else
+        TLS_client(RTMP_TLS_ctx, sb.sb_ssl);
+        TLS_setfd(sb.sb_ssl, sb.sb_socket);
+        if (TLS_connect(sb.sb_ssl) < 0)
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, TLS_Connect failed", __FUNCTION__);
+            ret = HTTPRES_LOST_CONNECTION;
+            goto leave;
+        }
+#endif
+    }
+#endif
+    RTMPSockBuf_Send(&sb, sb.sb_buf, i);
+
+    /* set timeout */
+#define HTTP_TIMEOUT	5
+    {
+        SET_RCVTIMEO(tv, HTTP_TIMEOUT);
+        if (setsockopt
+                (sb.sb_socket, SOL_SOCKET, SO_RCVTIMEO, (char *)&tv, sizeof(tv)))
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, Setting socket timeout to %ds failed!",
+                     __FUNCTION__, HTTP_TIMEOUT);
+        }
+    }
+
+    sb.sb_size = 0;
+    sb.sb_timedout = FALSE;
+    if (RTMPSockBuf_Fill(&sb) < 1)
+    {
+        ret = HTTPRES_LOST_CONNECTION;
+        goto leave;
+    }
+    if (strncmp(sb.sb_buf, "HTTP/1", 6))
+    {
+        ret = HTTPRES_BAD_REQUEST;
+        goto leave;
+    }
+
+    p1 = strchr(sb.sb_buf, ' ');
+    rc = atoi(p1 + 1);
+    http->status = rc;
+
+    if (rc >= 300)
+    {
+        if (rc == 304)
+        {
+            ret = HTTPRES_OK_NOT_MODIFIED;
+            goto leave;
+        }
+        else if (rc == 404)
+            ret = HTTPRES_NOT_FOUND;
+        else if (rc >= 500)
+            ret = HTTPRES_SERVER_ERROR;
+        else if (rc >= 400)
+            ret = HTTPRES_BAD_REQUEST;
+        else
+            ret = HTTPRES_REDIRECTED;
+    }
+
+    p1 = memchr(sb.sb_buf, '\n', sb.sb_size);
+    if (!p1)
+    {
+        ret = HTTPRES_BAD_REQUEST;
+        goto leave;
+    }
+    sb.sb_start = p1 + 1;
+    sb.sb_size -= sb.sb_start - sb.sb_buf;
+
+    while ((p2 = memchr(sb.sb_start, '\r', sb.sb_size)))
+    {
+        if (*sb.sb_start == '\r')
+        {
+            sb.sb_start += 2;
+            sb.sb_size -= 2;
+            break;
+        }
+        else if (!strncasecmp
+                 (sb.sb_start, "Content-Length: ", sizeof("Content-Length: ") - 1))
+        {
+            flen = atoi(sb.sb_start + sizeof("Content-Length: ") - 1);
+        }
+        else if (!strncasecmp
+                 (sb.sb_start, "Last-Modified: ", sizeof("Last-Modified: ") - 1))
+        {
+            *p2 = '\0';
+            strcpy(http->date, sb.sb_start + sizeof("Last-Modified: ") - 1);
+        }
+        p2 += 2;
+        sb.sb_size -= p2 - sb.sb_start;
+        sb.sb_start = p2;
+        if (sb.sb_size < 1)
+        {
+            if (RTMPSockBuf_Fill(&sb) < 1)
+            {
+                ret = HTTPRES_LOST_CONNECTION;
+                goto leave;
+            }
+        }
+    }
+
+    len_known = flen > 0;
+    while ((!len_known || flen > 0) &&
+            (sb.sb_size > 0 || RTMPSockBuf_Fill(&sb) > 0))
+    {
+        cb(sb.sb_start, 1, sb.sb_size, http->data);
+        if (len_known)
+            flen -= sb.sb_size;
+        http->size += sb.sb_size;
+        sb.sb_size = 0;
+    }
+
+    if (flen > 0)
+        ret = HTTPRES_LOST_CONNECTION;
+
+leave:
+    RTMPSockBuf_Close(&sb);
+    return ret;
+}
+
+#ifdef CRYPTO
+
+#define CHUNK	16384
+
+struct info
+{
+    z_stream *zs;
+    HMAC_CTX ctx;
+    int first;
+    int zlib;
+    int size;
+};
+
+static size_t
+swfcrunch(void *ptr, size_t size, size_t nmemb, void *stream)
+{
+    struct info *i = stream;
+    char *p = ptr;
+    size_t len = size * nmemb;
+
+    if (i->first)
+    {
+        i->first = 0;
+        /* compressed? */
+        if (!strncmp(p, "CWS", 3))
+        {
+            *p = 'F';
+            i->zlib = 1;
+        }
+        HMAC_crunch(i->ctx, (unsigned char *)p, 8);
+        p += 8;
+        len -= 8;
+        i->size = 8;
+    }
+
+    if (i->zlib)
+    {
+        unsigned char out[CHUNK];
+        i->zs->next_in = (unsigned char *)p;
+        i->zs->avail_in = len;
+        do
+        {
+            i->zs->avail_out = CHUNK;
+            i->zs->next_out = out;
+            inflate(i->zs, Z_NO_FLUSH);
+            len = CHUNK - i->zs->avail_out;
+            i->size += len;
+            HMAC_crunch(i->ctx, out, len);
+        }
+        while (i->zs->avail_out == 0);
+    }
+    else
+    {
+        i->size += len;
+        HMAC_crunch(i->ctx, (unsigned char *)p, len);
+    }
+    return size * nmemb;
+}
+
+static int tzoff;
+static int tzchecked;
+
+#define	JAN02_1980	318340800
+
+static const char *monthtab[12] = { "Jan", "Feb", "Mar",
+                                    "Apr", "May", "Jun",
+                                    "Jul", "Aug", "Sep",
+                                    "Oct", "Nov", "Dec"
+                                  };
+static const char *days[] =
+{ "Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat" };
+
+/* Parse an HTTP datestamp into Unix time */
+static time_t
+make_unix_time(char *s)
+{
+    struct tm time;
+    int i, ysub = 1900, fmt = 0;
+    char *month;
+    char *n;
+    time_t res;
+
+    if (s[3] != ' ')
+    {
+        fmt = 1;
+        if (s[3] != ',')
+            ysub = 0;
+    }
+    for (n = s; *n; ++n)
+        if (*n == '-' || *n == ':')
+            *n = ' ';
+
+    time.tm_mon = 0;
+    n = strchr(s, ' ');
+    if (fmt)
+    {
+        /* Day, DD-MMM-YYYY HH:MM:SS GMT */
+        time.tm_mday = strtol(n + 1, &n, 0);
+        month = n + 1;
+        n = strchr(month, ' ');
+        time.tm_year = strtol(n + 1, &n, 0);
+        time.tm_hour = strtol(n + 1, &n, 0);
+        time.tm_min = strtol(n + 1, &n, 0);
+        time.tm_sec = strtol(n + 1, NULL, 0);
+    }
+    else
+    {
+        /* Unix ctime() format. Does not conform to HTTP spec. */
+        /* Day MMM DD HH:MM:SS YYYY */
+        month = n + 1;
+        n = strchr(month, ' ');
+        while (isspace(*n))
+            n++;
+        time.tm_mday = strtol(n, &n, 0);
+        time.tm_hour = strtol(n + 1, &n, 0);
+        time.tm_min = strtol(n + 1, &n, 0);
+        time.tm_sec = strtol(n + 1, &n, 0);
+        time.tm_year = strtol(n + 1, NULL, 0);
+    }
+    if (time.tm_year > 100)
+        time.tm_year -= ysub;
+
+    for (i = 0; i < 12; i++)
+        if (!strncasecmp(month, monthtab[i], 3))
+        {
+            time.tm_mon = i;
+            break;
+        }
+    time.tm_isdst = 0;		/* daylight saving is never in effect in GMT */
+
+    /* this is normally the value of extern int timezone, but some
+     * braindead C libraries don't provide it.
+     */
+    if (!tzchecked)
+    {
+        struct tm *tc;
+        time_t then = JAN02_1980;
+        tc = localtime(&then);
+        tzoff = (12 - tc->tm_hour) * 3600 + tc->tm_min * 60 + tc->tm_sec;
+        tzchecked = 1;
+    }
+    res = mktime(&time);
+    /* Unfortunately, mktime() assumes the input is in local time,
+     * not GMT, so we have to correct it here.
+     */
+    if (res != -1)
+        res += tzoff;
+    return res;
+}
+
+/* Convert a Unix time to a network time string
+ * Weekday, DD-MMM-YYYY HH:MM:SS GMT
+ */
+static void
+strtime(time_t * t, char *s)
+{
+    struct tm *tm;
+
+    tm = gmtime((time_t *) t);
+    sprintf(s, "%s, %02d %s %d %02d:%02d:%02d GMT",
+            days[tm->tm_wday], tm->tm_mday, monthtab[tm->tm_mon],
+            tm->tm_year + 1900, tm->tm_hour, tm->tm_min, tm->tm_sec);
+}
+
+#define HEX2BIN(a)      (((a)&0x40)?((a)&0xf)+9:((a)&0xf))
+
+int
+RTMP_HashSWF(const char *url, unsigned int *size, unsigned char *hash,
+             int age)
+{
+    FILE *f = NULL;
+    char *path, date[64], cctim[64];
+    long pos = 0;
+    time_t ctim = -1, cnow;
+    int i, got = 0, ret = 0;
+    unsigned int hlen;
+    struct info in = { 0 };
+    struct HTTP_ctx http = { 0 };
+    HTTPResult httpres;
+    z_stream zs = { 0 };
+    AVal home, hpre;
+
+    date[0] = '\0';
+#ifdef _WIN32
+#ifdef XBMC4XBOX
+    hpre.av_val = "Q:";
+    hpre.av_len = 2;
+    home.av_val = "\\UserData";
+#else
+    hpre.av_val = getenv("HOMEDRIVE");
+    hpre.av_len = strlen(hpre.av_val);
+    home.av_val = getenv("HOMEPATH");
+#endif
+#define DIRSEP	"\\"
+
+#else /* !_WIN32 */
+    hpre.av_val = "";
+    hpre.av_len = 0;
+    home.av_val = getenv("HOME");
+#define DIRSEP	"/"
+#endif
+    if (!home.av_val)
+        home.av_val = ".";
+    home.av_len = strlen(home.av_val);
+
+    /* SWF hash info is cached in a fixed-format file.
+     * url: <url of SWF file>
+     * ctim: HTTP datestamp of when we last checked it.
+     * date: HTTP datestamp of the SWF's last modification.
+     * size: SWF size in hex
+     * hash: SWF hash in hex
+     *
+     * These fields must be present in this order. All fields
+     * besides URL are fixed size.
+     */
+    path = malloc(hpre.av_len + home.av_len + sizeof(DIRSEP ".swfinfo"));
+    sprintf(path, "%s%s" DIRSEP ".swfinfo", hpre.av_val, home.av_val);
+
+    f = fopen(path, "r+");
+    while (f)
+    {
+        char buf[4096], *file, *p;
+
+        file = strchr(url, '/');
+        if (!file)
+            break;
+        file += 2;
+        file = strchr(file, '/');
+        if (!file)
+            break;
+        file++;
+        hlen = file - url;
+        p = strrchr(file, '/');
+        if (p)
+            file = p;
+        else
+            file--;
+
+        while (fgets(buf, sizeof(buf), f))
+        {
+            char *r1;
+
+            got = 0;
+
+            if (strncmp(buf, "url: ", 5))
+                continue;
+            if (strncmp(buf + 5, url, hlen))
+                continue;
+            r1 = strrchr(buf, '/');
+            i = strlen(r1);
+            r1[--i] = '\0';
+            if (strncmp(r1, file, i))
+                continue;
+            pos = ftell(f);
+            while (got < 4 && fgets(buf, sizeof(buf), f))
+            {
+                if (!strncmp(buf, "size: ", 6))
+                {
+                    *size = strtol(buf + 6, NULL, 16);
+                    got++;
+                }
+                else if (!strncmp(buf, "hash: ", 6))
+                {
+                    unsigned char *ptr = hash, *in = (unsigned char *)buf + 6;
+                    int l = strlen((char *)in) - 1;
+                    for (i = 0; i < l; i += 2)
+                        *ptr++ = (HEX2BIN(in[i]) << 4) | HEX2BIN(in[i + 1]);
+                    got++;
+                }
+                else if (!strncmp(buf, "date: ", 6))
+                {
+                    buf[strlen(buf) - 1] = '\0';
+                    strncpy(date, buf + 6, sizeof(date));
+                    got++;
+                }
+                else if (!strncmp(buf, "ctim: ", 6))
+                {
+                    buf[strlen(buf) - 1] = '\0';
+                    ctim = make_unix_time(buf + 6);
+                    got++;
+                }
+                else if (!strncmp(buf, "url: ", 5))
+                    break;
+            }
+            break;
+        }
+        break;
+    }
+
+    cnow = time(NULL);
+    /* If we got a cache time, see if it's young enough to use directly */
+    if (age && ctim > 0)
+    {
+        ctim = cnow - ctim;
+        ctim /= 3600 * 24;	/* seconds to days */
+        if (ctim < age)		/* ok, it's new enough */
+            goto out;
+    }
+
+    in.first = 1;
+    HMAC_setup(in.ctx, "Genuine Adobe Flash Player 001", 30);
+    inflateInit(&zs);
+    in.zs = &zs;
+
+    http.date = date;
+    http.data = &in;
+
+    httpres = HTTP_get(&http, url, swfcrunch);
+
+    inflateEnd(&zs);
+
+    if (httpres != HTTPRES_OK && httpres != HTTPRES_OK_NOT_MODIFIED)
+    {
+        ret = -1;
+        if (httpres == HTTPRES_LOST_CONNECTION)
+            RTMP_Log(RTMP_LOGERROR, "%s: connection lost while downloading swfurl %s",
+                     __FUNCTION__, url);
+        else if (httpres == HTTPRES_NOT_FOUND)
+            RTMP_Log(RTMP_LOGERROR, "%s: swfurl %s not found", __FUNCTION__, url);
+        else
+            RTMP_Log(RTMP_LOGERROR, "%s: couldn't contact swfurl %s (HTTP error %d)",
+                     __FUNCTION__, url, http.status);
+    }
+    else
+    {
+        if (got && pos)
+            fseek(f, pos, SEEK_SET);
+        else
+        {
+            char *q;
+            if (!f)
+                f = fopen(path, "w");
+            if (!f)
+            {
+                int err = errno;
+                RTMP_Log(RTMP_LOGERROR,
+                         "%s: couldn't open %s for writing, errno %d (%s)",
+                         __FUNCTION__, path, err, strerror(err));
+                ret = -1;
+                goto out;
+            }
+            fseek(f, 0, SEEK_END);
+            q = strchr(url, '?');
+            if (q)
+                i = q - url;
+            else
+                i = strlen(url);
+
+            fprintf(f, "url: %.*s\n", i, url);
+        }
+        strtime(&cnow, cctim);
+        fprintf(f, "ctim: %s\n", cctim);
+
+        if (!in.first)
+        {
+            HMAC_finish(in.ctx, hash, hlen);
+            *size = in.size;
+
+            fprintf(f, "date: %s\n", date);
+            fprintf(f, "size: %08x\n", in.size);
+            fprintf(f, "hash: ");
+            for (i = 0; i < SHA256_DIGEST_LENGTH; i++)
+                fprintf(f, "%02x", hash[i]);
+            fprintf(f, "\n");
+        }
+    }
+    HMAC_close(in.ctx);
+out:
+    free(path);
+    if (f)
+        fclose(f);
+    return ret;
+}
+#else
+int
+RTMP_HashSWF(const char *url, unsigned int *size, unsigned char *hash,
+             int age)
+{
+    (void)url;
+    (void)size;
+    (void)hash;
+    (void)age;
+    return -1;
+}
+#endif

+ 49 - 0
plugins/obs-outputs/librtmp/http.h

@@ -0,0 +1,49 @@
+#ifndef __RTMP_HTTP_H__
+#define __RTMP_HTTP_H__
+/*
+ *      Copyright (C) 2010 Howard Chu
+ *      Copyright (C) 2010 Antti Ajanki
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+typedef enum
+{
+    HTTPRES_OK,               /* result OK */
+    HTTPRES_OK_NOT_MODIFIED,  /* not modified since last request */
+    HTTPRES_NOT_FOUND,        /* not found */
+    HTTPRES_BAD_REQUEST,      /* client error */
+    HTTPRES_SERVER_ERROR,     /* server reported an error */
+    HTTPRES_REDIRECTED,       /* resource has been moved */
+    HTTPRES_LOST_CONNECTION   /* connection lost while waiting for data */
+} HTTPResult;
+
+struct HTTP_ctx
+{
+    char *date;
+    int size;
+    int status;
+    void *data;
+};
+
+typedef size_t (HTTP_read_callback)(void *ptr, size_t size, size_t nmemb, void *stream);
+
+HTTPResult HTTP_get(struct HTTP_ctx *http, const char *url, HTTP_read_callback *cb);
+
+#endif

+ 228 - 0
plugins/obs-outputs/librtmp/log.c

@@ -0,0 +1,228 @@
+/*
+ *  Copyright (C) 2008-2009 Andrej Stepanchuk
+ *  Copyright (C) 2009-2010 Howard Chu
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+#include "rtmp_sys.h"
+#include "log.h"
+
+#define MAX_PRINT_LEN	2048
+
+RTMP_LogLevel RTMP_debuglevel = RTMP_LOGERROR;
+
+static int neednl;
+
+static FILE *fmsg;
+
+static RTMP_LogCallback rtmp_log_default, *cb = rtmp_log_default;
+
+static const char *levels[] =
+{
+    "CRIT", "ERROR", "WARNING", "INFO",
+    "DEBUG", "DEBUG2"
+};
+
+static void rtmp_log_default(int level, const char *format, va_list vl)
+{
+    char str[MAX_PRINT_LEN]="";
+
+    vsnprintf(str, MAX_PRINT_LEN-1, format, vl);
+
+    /* Filter out 'no-name' */
+    if ( RTMP_debuglevel<RTMP_LOGALL && strstr(str, "no-name" ) != NULL )
+        return;
+
+    if ( !fmsg ) fmsg = stderr;
+
+    if ( level <= (int)RTMP_debuglevel )
+    {
+        if (neednl)
+        {
+            putc('\n', fmsg);
+            neednl = 0;
+        }
+        fprintf(fmsg, "%s: %s\n", levels[level], str);
+#ifdef _DEBUG
+        fflush(fmsg);
+#endif
+    }
+}
+
+void RTMP_LogSetOutput(FILE *file)
+{
+    fmsg = file;
+}
+
+void RTMP_LogSetLevel(RTMP_LogLevel level)
+{
+    RTMP_debuglevel = level;
+}
+
+void RTMP_LogSetCallback(RTMP_LogCallback *cbp)
+{
+    cb = cbp;
+}
+
+RTMP_LogLevel RTMP_LogGetLevel()
+{
+    return RTMP_debuglevel;
+}
+
+void RTMP_Log(int level, const char *format, ...)
+{
+    va_list args;
+    va_start(args, format);
+    cb(level, format, args);
+    va_end(args);
+}
+
+static const char hexdig[] = "0123456789abcdef";
+
+void RTMP_LogHex(int level, const uint8_t *data, unsigned long len)
+{
+    unsigned long i;
+    char line[50], *ptr;
+
+    if ( level > (int)RTMP_debuglevel )
+        return;
+
+    ptr = line;
+
+    for(i=0; i<len; i++)
+    {
+        *ptr++ = hexdig[0x0f & (data[i] >> 4)];
+        *ptr++ = hexdig[0x0f & data[i]];
+        if ((i & 0x0f) == 0x0f)
+        {
+            *ptr = '\0';
+            ptr = line;
+            RTMP_Log(level, "%s", line);
+        }
+        else
+        {
+            *ptr++ = ' ';
+        }
+    }
+    if (i & 0x0f)
+    {
+        *ptr = '\0';
+        RTMP_Log(level, "%s", line);
+    }
+}
+
+void RTMP_LogHexString(int level, const uint8_t *data, unsigned long len)
+{
+#define BP_OFFSET 9
+#define BP_GRAPH 60
+#define BP_LEN	80
+    char	line[BP_LEN];
+    unsigned long i;
+
+    if ( !data || level > (int)RTMP_debuglevel )
+        return;
+
+    /* in case len is zero */
+    line[0] = '\0';
+
+    for ( i = 0 ; i < len ; i++ )
+    {
+        int n = i % 16;
+        unsigned off;
+
+        if( !n )
+        {
+            if( i ) RTMP_Log( level, "%s", line );
+            memset( line, ' ', sizeof(line)-2 );
+            line[sizeof(line)-2] = '\0';
+
+            off = i % 0x0ffffU;
+
+            line[2] = hexdig[0x0f & (off >> 12)];
+            line[3] = hexdig[0x0f & (off >>  8)];
+            line[4] = hexdig[0x0f & (off >>  4)];
+            line[5] = hexdig[0x0f & off];
+            line[6] = ':';
+        }
+
+        off = BP_OFFSET + n*3 + ((n >= 8)?1:0);
+        line[off] = hexdig[0x0f & ( data[i] >> 4 )];
+        line[off+1] = hexdig[0x0f & data[i]];
+
+        off = BP_GRAPH + n + ((n >= 8)?1:0);
+
+        if ( isprint( data[i] ))
+        {
+            line[BP_GRAPH + n] = data[i];
+        }
+        else
+        {
+            line[BP_GRAPH + n] = '.';
+        }
+    }
+
+    RTMP_Log( level, "%s", line );
+}
+
+/* These should only be used by apps, never by the library itself */
+void RTMP_LogPrintf(const char *format, ...)
+{
+    char str[MAX_PRINT_LEN]="";
+    int len;
+    va_list args;
+    va_start(args, format);
+    len = vsnprintf(str, MAX_PRINT_LEN-1, format, args);
+    va_end(args);
+
+    if ( RTMP_debuglevel==RTMP_LOGCRIT )
+        return;
+
+    if ( !fmsg ) fmsg = stderr;
+
+    if (neednl)
+    {
+        putc('\n', fmsg);
+        neednl = 0;
+    }
+
+    if (len > MAX_PRINT_LEN-1)
+        len = MAX_PRINT_LEN-1;
+    fprintf(fmsg, "%s", str);
+    if (str[len-1] == '\n')
+        fflush(fmsg);
+}
+
+void RTMP_LogStatus(const char *format, ...)
+{
+    char str[MAX_PRINT_LEN]="";
+    va_list args;
+    va_start(args, format);
+    vsnprintf(str, MAX_PRINT_LEN-1, format, args);
+    va_end(args);
+
+    if ( RTMP_debuglevel==RTMP_LOGCRIT )
+        return;
+
+    if ( !fmsg ) fmsg = stderr;
+
+    fprintf(fmsg, "%s", str);
+    fflush(fmsg);
+    neednl = 1;
+}

+ 70 - 0
plugins/obs-outputs/librtmp/log.h

@@ -0,0 +1,70 @@
+/*
+ *  Copyright (C) 2008-2009 Andrej Stepanchuk
+ *  Copyright (C) 2009-2010 Howard Chu
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+#ifndef __RTMP_LOG_H__
+#define __RTMP_LOG_H__
+
+#include <stdio.h>
+#include <stdarg.h>
+
+#ifdef __cplusplus
+extern "C" {
+#endif
+    /* Enable this to get full debugging output */
+    /* #define _DEBUG */
+
+#ifdef _DEBUG
+#undef NODEBUG
+#endif
+
+    typedef enum
+    {
+        RTMP_LOGCRIT=0, RTMP_LOGERROR, RTMP_LOGWARNING, RTMP_LOGINFO,
+        RTMP_LOGDEBUG, RTMP_LOGDEBUG2, RTMP_LOGALL
+    }
+    RTMP_LogLevel;
+
+    extern RTMP_LogLevel RTMP_debuglevel;
+
+    typedef void (RTMP_LogCallback)(int level, const char *fmt, va_list);
+    void RTMP_LogSetCallback(RTMP_LogCallback *cb);
+    void RTMP_LogSetOutput(FILE *file);
+#ifdef __GNUC__
+    void RTMP_LogPrintf(const char *format, ...) __attribute__ ((__format__ (__printf__, 1, 2)));
+    void RTMP_LogStatus(const char *format, ...) __attribute__ ((__format__ (__printf__, 1, 2)));
+    void RTMP_Log(int level, const char *format, ...) __attribute__ ((__format__ (__printf__, 2, 3)));
+#else
+    void RTMP_LogPrintf(const char *format, ...);
+    void RTMP_LogStatus(const char *format, ...);
+    void RTMP_Log(int level, const char *format, ...);
+#endif
+    void RTMP_LogHex(int level, const uint8_t *data, unsigned long len);
+    void RTMP_LogHexString(int level, const uint8_t *data, unsigned long len);
+    void RTMP_LogSetLevel(RTMP_LogLevel lvl);
+    RTMP_LogLevel RTMP_LogGetLevel(void);
+
+#ifdef __cplusplus
+}
+#endif
+
+#endif

+ 295 - 0
plugins/obs-outputs/librtmp/md5.c

@@ -0,0 +1,295 @@
+/*
+ * This is an OpenSSL-compatible implementation of the RSA Data Security, Inc.
+ * MD5 Message-Digest Algorithm (RFC 1321).
+ *
+ * Homepage:
+ * http://openwall.info/wiki/people/solar/software/public-domain-source-code/md5
+ *
+ * Author:
+ * Alexander Peslyak, better known as Solar Designer <solar at openwall.com>
+ *
+ * This software was written by Alexander Peslyak in 2001.  No copyright is
+ * claimed, and the software is hereby placed in the public domain.
+ * In case this attempt to disclaim copyright and place the software in the
+ * public domain is deemed null and void, then the software is
+ * Copyright (c) 2001 Alexander Peslyak and it is hereby released to the
+ * general public under the following terms:
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted.
+ *
+ * There's ABSOLUTELY NO WARRANTY, express or implied.
+ *
+ * (This is a heavily cut-down "BSD license".)
+ *
+ * This differs from Colin Plumb's older public domain implementation in that
+ * no exactly 32-bit integer data type is required (any 32-bit or wider
+ * unsigned integer data type will do), there's no compile-time endianness
+ * configuration, and the function prototypes match OpenSSL's.  No code from
+ * Colin Plumb's implementation has been reused; this comment merely compares
+ * the properties of the two independent implementations.
+ *
+ * The primary goals of this implementation are portability and ease of use.
+ * It is meant to be fast, but not as fast as possible.  Some known
+ * optimizations are not included to reduce source code size and avoid
+ * compile-time configuration.
+ */
+
+#ifndef HAVE_OPENSSL
+
+#include <string.h>
+
+#include "md5.h"
+
+/*
+ * The basic MD5 functions.
+ *
+ * F and G are optimized compared to their RFC 1321 definitions for
+ * architectures that lack an AND-NOT instruction, just like in Colin Plumb's
+ * implementation.
+ */
+#define F(x, y, z)			((z) ^ ((x) & ((y) ^ (z))))
+#define G(x, y, z)			((y) ^ ((z) & ((x) ^ (y))))
+#define H(x, y, z)			((x) ^ (y) ^ (z))
+#define I(x, y, z)			((y) ^ ((x) | ~(z)))
+
+/*
+ * The MD5 transformation for all four rounds.
+ */
+#define STEP(f, a, b, c, d, x, t, s) \
+	(a) += f((b), (c), (d)) + (x) + (t); \
+	(a) = (((a) << (s)) | (((a) & 0xffffffff) >> (32 - (s)))); \
+	(a) += (b);
+
+/*
+ * SET reads 4 input bytes in little-endian byte order and stores them
+ * in a properly aligned word in host byte order.
+ *
+ * The check for little-endian architectures that tolerate unaligned
+ * memory accesses is just an optimization.  Nothing will break if it
+ * doesn't work.
+ */
+#if defined(__i386__) || defined(__x86_64__) || defined(__vax__)
+#define SET(n) \
+	(*(MD5_u32plus *)&ptr[(n) * 4])
+#define GET(n) \
+	SET(n)
+#else
+#define SET(n) \
+	(ctx->block[(n)] = \
+	(MD5_u32plus)ptr[(n) * 4] | \
+	((MD5_u32plus)ptr[(n) * 4 + 1] << 8) | \
+	((MD5_u32plus)ptr[(n) * 4 + 2] << 16) | \
+	((MD5_u32plus)ptr[(n) * 4 + 3] << 24))
+#define GET(n) \
+	(ctx->block[(n)])
+#endif
+
+/*
+ * This processes one or more 64-byte data blocks, but does NOT update
+ * the bit counters.  There are no alignment requirements.
+ */
+static void *body(MD5_CTX *ctx, void *data, unsigned long size)
+{
+	unsigned char *ptr;
+	MD5_u32plus a, b, c, d;
+	MD5_u32plus saved_a, saved_b, saved_c, saved_d;
+
+	ptr = data;
+
+	a = ctx->a;
+	b = ctx->b;
+	c = ctx->c;
+	d = ctx->d;
+
+	do {
+		saved_a = a;
+		saved_b = b;
+		saved_c = c;
+		saved_d = d;
+
+/* Round 1 */
+		STEP(F, a, b, c, d, SET(0), 0xd76aa478, 7)
+		STEP(F, d, a, b, c, SET(1), 0xe8c7b756, 12)
+		STEP(F, c, d, a, b, SET(2), 0x242070db, 17)
+		STEP(F, b, c, d, a, SET(3), 0xc1bdceee, 22)
+		STEP(F, a, b, c, d, SET(4), 0xf57c0faf, 7)
+		STEP(F, d, a, b, c, SET(5), 0x4787c62a, 12)
+		STEP(F, c, d, a, b, SET(6), 0xa8304613, 17)
+		STEP(F, b, c, d, a, SET(7), 0xfd469501, 22)
+		STEP(F, a, b, c, d, SET(8), 0x698098d8, 7)
+		STEP(F, d, a, b, c, SET(9), 0x8b44f7af, 12)
+		STEP(F, c, d, a, b, SET(10), 0xffff5bb1, 17)
+		STEP(F, b, c, d, a, SET(11), 0x895cd7be, 22)
+		STEP(F, a, b, c, d, SET(12), 0x6b901122, 7)
+		STEP(F, d, a, b, c, SET(13), 0xfd987193, 12)
+		STEP(F, c, d, a, b, SET(14), 0xa679438e, 17)
+		STEP(F, b, c, d, a, SET(15), 0x49b40821, 22)
+
+/* Round 2 */
+		STEP(G, a, b, c, d, GET(1), 0xf61e2562, 5)
+		STEP(G, d, a, b, c, GET(6), 0xc040b340, 9)
+		STEP(G, c, d, a, b, GET(11), 0x265e5a51, 14)
+		STEP(G, b, c, d, a, GET(0), 0xe9b6c7aa, 20)
+		STEP(G, a, b, c, d, GET(5), 0xd62f105d, 5)
+		STEP(G, d, a, b, c, GET(10), 0x02441453, 9)
+		STEP(G, c, d, a, b, GET(15), 0xd8a1e681, 14)
+		STEP(G, b, c, d, a, GET(4), 0xe7d3fbc8, 20)
+		STEP(G, a, b, c, d, GET(9), 0x21e1cde6, 5)
+		STEP(G, d, a, b, c, GET(14), 0xc33707d6, 9)
+		STEP(G, c, d, a, b, GET(3), 0xf4d50d87, 14)
+		STEP(G, b, c, d, a, GET(8), 0x455a14ed, 20)
+		STEP(G, a, b, c, d, GET(13), 0xa9e3e905, 5)
+		STEP(G, d, a, b, c, GET(2), 0xfcefa3f8, 9)
+		STEP(G, c, d, a, b, GET(7), 0x676f02d9, 14)
+		STEP(G, b, c, d, a, GET(12), 0x8d2a4c8a, 20)
+
+/* Round 3 */
+		STEP(H, a, b, c, d, GET(5), 0xfffa3942, 4)
+		STEP(H, d, a, b, c, GET(8), 0x8771f681, 11)
+		STEP(H, c, d, a, b, GET(11), 0x6d9d6122, 16)
+		STEP(H, b, c, d, a, GET(14), 0xfde5380c, 23)
+		STEP(H, a, b, c, d, GET(1), 0xa4beea44, 4)
+		STEP(H, d, a, b, c, GET(4), 0x4bdecfa9, 11)
+		STEP(H, c, d, a, b, GET(7), 0xf6bb4b60, 16)
+		STEP(H, b, c, d, a, GET(10), 0xbebfbc70, 23)
+		STEP(H, a, b, c, d, GET(13), 0x289b7ec6, 4)
+		STEP(H, d, a, b, c, GET(0), 0xeaa127fa, 11)
+		STEP(H, c, d, a, b, GET(3), 0xd4ef3085, 16)
+		STEP(H, b, c, d, a, GET(6), 0x04881d05, 23)
+		STEP(H, a, b, c, d, GET(9), 0xd9d4d039, 4)
+		STEP(H, d, a, b, c, GET(12), 0xe6db99e5, 11)
+		STEP(H, c, d, a, b, GET(15), 0x1fa27cf8, 16)
+		STEP(H, b, c, d, a, GET(2), 0xc4ac5665, 23)
+
+/* Round 4 */
+		STEP(I, a, b, c, d, GET(0), 0xf4292244, 6)
+		STEP(I, d, a, b, c, GET(7), 0x432aff97, 10)
+		STEP(I, c, d, a, b, GET(14), 0xab9423a7, 15)
+		STEP(I, b, c, d, a, GET(5), 0xfc93a039, 21)
+		STEP(I, a, b, c, d, GET(12), 0x655b59c3, 6)
+		STEP(I, d, a, b, c, GET(3), 0x8f0ccc92, 10)
+		STEP(I, c, d, a, b, GET(10), 0xffeff47d, 15)
+		STEP(I, b, c, d, a, GET(1), 0x85845dd1, 21)
+		STEP(I, a, b, c, d, GET(8), 0x6fa87e4f, 6)
+		STEP(I, d, a, b, c, GET(15), 0xfe2ce6e0, 10)
+		STEP(I, c, d, a, b, GET(6), 0xa3014314, 15)
+		STEP(I, b, c, d, a, GET(13), 0x4e0811a1, 21)
+		STEP(I, a, b, c, d, GET(4), 0xf7537e82, 6)
+		STEP(I, d, a, b, c, GET(11), 0xbd3af235, 10)
+		STEP(I, c, d, a, b, GET(2), 0x2ad7d2bb, 15)
+		STEP(I, b, c, d, a, GET(9), 0xeb86d391, 21)
+
+		a += saved_a;
+		b += saved_b;
+		c += saved_c;
+		d += saved_d;
+
+		ptr += 64;
+	} while (size -= 64);
+
+	ctx->a = a;
+	ctx->b = b;
+	ctx->c = c;
+	ctx->d = d;
+
+	return ptr;
+}
+
+void MD5_Init(MD5_CTX *ctx)
+{
+	ctx->a = 0x67452301;
+	ctx->b = 0xefcdab89;
+	ctx->c = 0x98badcfe;
+	ctx->d = 0x10325476;
+
+	ctx->lo = 0;
+	ctx->hi = 0;
+}
+
+void MD5_Update(MD5_CTX *ctx, void *data, unsigned long size)
+{
+	MD5_u32plus saved_lo;
+	unsigned long used, free;
+
+	saved_lo = ctx->lo;
+	if ((ctx->lo = (saved_lo + size) & 0x1fffffff) < saved_lo)
+		ctx->hi++;
+	ctx->hi += size >> 29;
+
+	used = saved_lo & 0x3f;
+
+	if (used) {
+		free = 64 - used;
+
+		if (size < free) {
+			memcpy(&ctx->buffer[used], data, size);
+			return;
+		}
+
+		memcpy(&ctx->buffer[used], data, free);
+		data = (unsigned char *)data + free;
+		size -= free;
+		body(ctx, ctx->buffer, 64);
+	}
+
+	if (size >= 64) {
+		data = body(ctx, data, size & ~(unsigned long)0x3f);
+		size &= 0x3f;
+	}
+
+	memcpy(ctx->buffer, data, size);
+}
+
+void MD5_Final(unsigned char *result, MD5_CTX *ctx)
+{
+	unsigned long used, free;
+
+	used = ctx->lo & 0x3f;
+
+	ctx->buffer[used++] = 0x80;
+
+	free = 64 - used;
+
+	if (free < 8) {
+		memset(&ctx->buffer[used], 0, free);
+		body(ctx, ctx->buffer, 64);
+		used = 0;
+		free = 64;
+	}
+
+	memset(&ctx->buffer[used], 0, free - 8);
+
+	ctx->lo <<= 3;
+	ctx->buffer[56] = ctx->lo;
+	ctx->buffer[57] = ctx->lo >> 8;
+	ctx->buffer[58] = ctx->lo >> 16;
+	ctx->buffer[59] = ctx->lo >> 24;
+	ctx->buffer[60] = ctx->hi;
+	ctx->buffer[61] = ctx->hi >> 8;
+	ctx->buffer[62] = ctx->hi >> 16;
+	ctx->buffer[63] = ctx->hi >> 24;
+
+	body(ctx, ctx->buffer, 64);
+
+	result[0] = ctx->a;
+	result[1] = ctx->a >> 8;
+	result[2] = ctx->a >> 16;
+	result[3] = ctx->a >> 24;
+	result[4] = ctx->b;
+	result[5] = ctx->b >> 8;
+	result[6] = ctx->b >> 16;
+	result[7] = ctx->b >> 24;
+	result[8] = ctx->c;
+	result[9] = ctx->c >> 8;
+	result[10] = ctx->c >> 16;
+	result[11] = ctx->c >> 24;
+	result[12] = ctx->d;
+	result[13] = ctx->d >> 8;
+	result[14] = ctx->d >> 16;
+	result[15] = ctx->d >> 24;
+
+	memset(ctx, 0, sizeof(*ctx));
+}
+
+#endif

+ 45 - 0
plugins/obs-outputs/librtmp/md5.h

@@ -0,0 +1,45 @@
+/*
+ * This is an OpenSSL-compatible implementation of the RSA Data Security, Inc.
+ * MD5 Message-Digest Algorithm (RFC 1321).
+ *
+ * Homepage:
+ * http://openwall.info/wiki/people/solar/software/public-domain-source-code/md5
+ *
+ * Author:
+ * Alexander Peslyak, better known as Solar Designer <solar at openwall.com>
+ *
+ * This software was written by Alexander Peslyak in 2001.  No copyright is
+ * claimed, and the software is hereby placed in the public domain.
+ * In case this attempt to disclaim copyright and place the software in the
+ * public domain is deemed null and void, then the software is
+ * Copyright (c) 2001 Alexander Peslyak and it is hereby released to the
+ * general public under the following terms:
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted.
+ *
+ * There's ABSOLUTELY NO WARRANTY, express or implied.
+ *
+ * See md5.c for more information.
+ */
+
+#ifdef HAVE_OPENSSL
+#include <openssl/md5.h>
+#elif !defined(_MD5_H)
+#define _MD5_H
+
+/* Any 32-bit or wider unsigned integer data type will do */
+typedef unsigned int MD5_u32plus;
+
+typedef struct {
+	MD5_u32plus lo, hi;
+	MD5_u32plus a, b, c, d;
+	unsigned char buffer[64];
+	MD5_u32plus block[16];
+} MD5_CTX;
+
+extern void MD5_Init(MD5_CTX *ctx);
+extern void MD5_Update(MD5_CTX *ctx, void *data, unsigned long size);
+extern void MD5_Final(unsigned char *result, MD5_CTX *ctx);
+
+#endif

+ 446 - 0
plugins/obs-outputs/librtmp/parseurl.c

@@ -0,0 +1,446 @@
+/*
+ *  Copyright (C) 2009 Andrej Stepanchuk
+ *  Copyright (C) 2009-2010 Howard Chu
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+#include "rtmp_sys.h"
+#include "log.h"
+
+int RTMP_ParseURL(const char *url, int *protocol, AVal *host, unsigned int *port,
+                  AVal *playpath, AVal *app)
+{
+    char *p, *end, *col, *ques, *slash;
+
+    RTMP_Log(RTMP_LOGDEBUG, "Parsing...");
+
+    *protocol = RTMP_PROTOCOL_RTMP;
+    *port = 0;
+    playpath->av_len = 0;
+    playpath->av_val = NULL;
+    app->av_len = 0;
+    app->av_val = NULL;
+
+    /* Old School Parsing */
+
+    /* look for usual :// pattern */
+    p = strstr(url, "://");
+    if(!p)
+    {
+        RTMP_Log(RTMP_LOGERROR, "RTMP URL: No :// in url!");
+        return FALSE;
+    }
+    {
+        int len = (int)(p-url);
+
+        if(len == 4 && strncasecmp(url, "rtmp", 4)==0)
+            *protocol = RTMP_PROTOCOL_RTMP;
+        else if(len == 5 && strncasecmp(url, "rtmpt", 5)==0)
+            *protocol = RTMP_PROTOCOL_RTMPT;
+        else if(len == 5 && strncasecmp(url, "rtmps", 5)==0)
+            *protocol = RTMP_PROTOCOL_RTMPS;
+        else if(len == 5 && strncasecmp(url, "rtmpe", 5)==0)
+            *protocol = RTMP_PROTOCOL_RTMPE;
+        else if(len == 5 && strncasecmp(url, "rtmfp", 5)==0)
+            *protocol = RTMP_PROTOCOL_RTMFP;
+        else if(len == 6 && strncasecmp(url, "rtmpte", 6)==0)
+            *protocol = RTMP_PROTOCOL_RTMPTE;
+        else if(len == 6 && strncasecmp(url, "rtmpts", 6)==0)
+            *protocol = RTMP_PROTOCOL_RTMPTS;
+        else
+        {
+            RTMP_Log(RTMP_LOGWARNING, "Unknown protocol!\n");
+            goto parsehost;
+        }
+    }
+
+    RTMP_Log(RTMP_LOGDEBUG, "Parsed protocol: %d", *protocol);
+
+parsehost:
+    /* let's get the hostname */
+    p+=3;
+
+    /* check for sudden death */
+    if(*p==0)
+    {
+        RTMP_Log(RTMP_LOGWARNING, "No hostname in URL!");
+        return FALSE;
+    }
+
+    end   = p + strlen(p);
+    col   = strchr(p, ':');
+    ques  = strchr(p, '?');
+    slash = strchr(p, '/');
+
+    {
+        int hostlen;
+        if(slash)
+            hostlen = slash - p;
+        else
+            hostlen = end - p;
+        if(col && col -p < hostlen)
+            hostlen = col - p;
+
+        if(hostlen < 256)
+        {
+            host->av_val = p;
+            host->av_len = hostlen;
+            RTMP_Log(RTMP_LOGDEBUG, "Parsed host    : %.*s", hostlen, host->av_val);
+        }
+        else
+        {
+            RTMP_Log(RTMP_LOGWARNING, "Hostname exceeds 255 characters!");
+        }
+
+        p+=hostlen;
+    }
+
+    /* get the port number if available */
+    if(*p == ':')
+    {
+        unsigned int p2;
+        p++;
+        p2 = atoi(p);
+        if(p2 > 65535)
+        {
+            RTMP_Log(RTMP_LOGWARNING, "Invalid port number!");
+        }
+        else
+        {
+            *port = p2;
+        }
+    }
+
+    if(!slash)
+    {
+        RTMP_Log(RTMP_LOGWARNING, "No application or playpath in URL!");
+        return TRUE;
+    }
+    p = slash+1;
+
+    {
+        /* parse application
+         *
+         * rtmp://host[:port]/app[/appinstance][/...]
+         * application = app[/appinstance]
+         */
+
+        char *slash2, *slash3 = NULL, *slash4 = NULL;
+        int applen, appnamelen;
+
+        slash2 = strchr(p, '/');
+        if(slash2)
+            slash3 = strchr(slash2+1, '/');
+        if(slash3)
+            slash4 = strchr(slash3+1, '/');
+
+        applen = end-p; /* ondemand, pass all parameters as app */
+        appnamelen = applen; /* ondemand length */
+
+        if(ques && strstr(p, "slist="))   /* whatever it is, the '?' and slist= means we need to use everything as app and parse plapath from slist= */
+        {
+            appnamelen = ques-p;
+        }
+        else if(strncmp(p, "ondemand/", 9)==0)
+        {
+            /* app = ondemand/foobar, only pass app=ondemand */
+            applen = 8;
+            appnamelen = 8;
+        }
+        else   /* app!=ondemand, so app is app[/appinstance] */
+        {
+            if(slash4)
+                appnamelen = slash4-p;
+            else if(slash3)
+                appnamelen = slash3-p;
+            else if(slash2)
+                appnamelen = slash2-p;
+
+            applen = appnamelen;
+        }
+
+        app->av_val = p;
+        app->av_len = applen;
+        RTMP_Log(RTMP_LOGDEBUG, "Parsed app     : %.*s", applen, p);
+
+        p += appnamelen;
+    }
+
+    if (*p == '/')
+        p++;
+
+    if (end-p)
+    {
+        AVal av = {p, end-p};
+        RTMP_ParsePlaypath(&av, playpath);
+    }
+
+    return TRUE;
+}
+
+int RTMP_ParseURL2(const char *url, int *protocol, AVal *host, unsigned int *port,
+                  AVal *app)
+{
+    char *p, *end, *col, *ques, *slash;
+
+    RTMP_Log(RTMP_LOGDEBUG, "Parsing...");
+
+    *protocol = RTMP_PROTOCOL_RTMP;
+    *port = 0;
+    app->av_len = 0;
+    app->av_val = NULL;
+
+    /* Old School Parsing */
+
+    /* look for usual :// pattern */
+    p = strstr(url, "://");
+    if(!p)
+    {
+        RTMP_Log(RTMP_LOGERROR, "RTMP URL: No :// in url!");
+        return FALSE;
+    }
+    {
+        int len = (int)(p-url);
+
+        if(len == 4 && strncasecmp(url, "rtmp", 4)==0)
+            *protocol = RTMP_PROTOCOL_RTMP;
+        else if(len == 5 && strncasecmp(url, "rtmpt", 5)==0)
+            *protocol = RTMP_PROTOCOL_RTMPT;
+        else if(len == 5 && strncasecmp(url, "rtmps", 5)==0)
+            *protocol = RTMP_PROTOCOL_RTMPS;
+        else if(len == 5 && strncasecmp(url, "rtmpe", 5)==0)
+            *protocol = RTMP_PROTOCOL_RTMPE;
+        else if(len == 5 && strncasecmp(url, "rtmfp", 5)==0)
+            *protocol = RTMP_PROTOCOL_RTMFP;
+        else if(len == 6 && strncasecmp(url, "rtmpte", 6)==0)
+            *protocol = RTMP_PROTOCOL_RTMPTE;
+        else if(len == 6 && strncasecmp(url, "rtmpts", 6)==0)
+            *protocol = RTMP_PROTOCOL_RTMPTS;
+        else
+        {
+            RTMP_Log(RTMP_LOGWARNING, "Unknown protocol!\n");
+            goto parsehost;
+        }
+    }
+
+    RTMP_Log(RTMP_LOGDEBUG, "Parsed protocol: %d", *protocol);
+
+parsehost:
+    /* let's get the hostname */
+    p+=3;
+
+    /* check for sudden death */
+    if(*p==0)
+    {
+        RTMP_Log(RTMP_LOGWARNING, "No hostname in URL!");
+        return FALSE;
+    }
+
+    end   = p + strlen(p);
+    col   = strchr(p, ':');
+    ques  = strchr(p, '?');
+    slash = strchr(p, '/');
+
+    {
+        int hostlen;
+        if(slash)
+            hostlen = slash - p;
+        else
+            hostlen = end - p;
+        if(col && col -p < hostlen)
+            hostlen = col - p;
+
+        if(hostlen < 256)
+        {
+            host->av_val = p;
+            host->av_len = hostlen;
+            RTMP_Log(RTMP_LOGDEBUG, "Parsed host    : %.*s", hostlen, host->av_val);
+        }
+        else
+        {
+            RTMP_Log(RTMP_LOGWARNING, "Hostname exceeds 255 characters!");
+        }
+
+        p+=hostlen;
+    }
+
+    /* get the port number if available */
+    if(*p == ':')
+    {
+        unsigned int p2;
+        p++;
+        p2 = atoi(p);
+        if(p2 > 65535)
+        {
+            RTMP_Log(RTMP_LOGWARNING, "Invalid port number!");
+        }
+        else
+        {
+            *port = p2;
+        }
+    }
+
+    if(!slash)
+    {
+        RTMP_Log(RTMP_LOGWARNING, "No application or playpath in URL!");
+        return TRUE;
+    }
+    p = slash+1;
+
+    //just..  whatever.
+    app->av_val = p;
+    app->av_len = (int)strlen(p);
+
+    if(app->av_len && p[app->av_len-1] == '/')
+        app->av_len--;
+
+    RTMP_Log(RTMP_LOGDEBUG, "Parsed app     : %.*s", app->av_len, p);
+    p += app->av_len;
+
+    if (*p == '/')
+        p++;
+
+    return TRUE;
+}
+
+/*
+ * Extracts playpath from RTMP URL. playpath is the file part of the
+ * URL, i.e. the part that comes after rtmp://host:port/app/
+ *
+ * Returns the stream name in a format understood by FMS. The name is
+ * the playpath part of the URL with formatting depending on the stream
+ * type:
+ *
+ * mp4 streams: prepend "mp4:", remove extension
+ * mp3 streams: prepend "mp3:", remove extension
+ * flv streams: remove extension
+ */
+void RTMP_ParsePlaypath(AVal *in, AVal *out)
+{
+    int addMP4 = 0;
+    int addMP3 = 0;
+    int subExt = 0;
+    const char *playpath = in->av_val;
+    const char *temp, *q, *ext = NULL;
+    const char *ppstart = playpath;
+    char *streamname, *destptr, *p;
+
+    int pplen = in->av_len;
+
+    out->av_val = NULL;
+    out->av_len = 0;
+
+    if ((*ppstart == '?') &&
+            (temp=strstr(ppstart, "slist=")) != 0)
+    {
+        ppstart = temp+6;
+        pplen = (int)strlen(ppstart);
+
+        temp = strchr(ppstart, '&');
+        if (temp)
+        {
+            pplen = temp-ppstart;
+        }
+    }
+
+    q = strchr(ppstart, '?');
+    if (pplen >= 4)
+    {
+        if (q)
+            ext = q-4;
+        else
+            ext = &ppstart[pplen-4];
+        if ((strncmp(ext, ".f4v", 4) == 0) ||
+                (strncmp(ext, ".mp4", 4) == 0))
+        {
+            addMP4 = 1;
+            subExt = 1;
+            /* Only remove .flv from rtmp URL, not slist params */
+        }
+        else if ((ppstart == playpath) &&
+                 (strncmp(ext, ".flv", 4) == 0))
+        {
+            subExt = 1;
+        }
+        else if (strncmp(ext, ".mp3", 4) == 0)
+        {
+            addMP3 = 1;
+            subExt = 1;
+        }
+    }
+
+    streamname = (char *)malloc((pplen+4+1)*sizeof(char));
+    if (!streamname)
+        return;
+
+    destptr = streamname;
+    if (addMP4)
+    {
+        if (strncmp(ppstart, "mp4:", 4))
+        {
+            strcpy(destptr, "mp4:");
+            destptr += 4;
+        }
+        else
+        {
+            subExt = 0;
+        }
+    }
+    else if (addMP3)
+    {
+        if (strncmp(ppstart, "mp3:", 4))
+        {
+            strcpy(destptr, "mp3:");
+            destptr += 4;
+        }
+        else
+        {
+            subExt = 0;
+        }
+    }
+
+    for (p=(char *)ppstart; pplen >0;)
+    {
+        /* skip extension */
+        if (subExt && p == ext)
+        {
+            p += 4;
+            pplen -= 4;
+            continue;
+        }
+        if (*p == '%')
+        {
+            unsigned int c;
+            sscanf(p+1, "%02x", &c);
+            *destptr++ = c;
+            pplen -= 3;
+            p += 3;
+        }
+        else
+        {
+            *destptr++ = *p++;
+            pplen--;
+        }
+    }
+    *destptr = '\0';
+
+    out->av_val = streamname;
+    out->av_len = destptr - streamname;
+}

+ 5555 - 0
plugins/obs-outputs/librtmp/rtmp.c

@@ -0,0 +1,5555 @@
+/*
+ *      Copyright (C) 2005-2008 Team XBMC
+ *      http://www.xbmc.org
+ *      Copyright (C) 2008-2009 Andrej Stepanchuk
+ *      Copyright (C) 2009-2010 Howard Chu
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+#include "rtmp_sys.h"
+#include "log.h"
+
+#ifdef CRYPTO
+#ifdef USE_POLARSSL
+#include <polarssl/havege.h>
+#include <polarssl/md5.h>
+#include <polarssl/base64.h>
+#define MD5_DIGEST_LENGTH 16
+
+static const char *my_dhm_P =
+    "E4004C1F94182000103D883A448B3F80" \
+    "2CE4B44A83301270002C20D0321CFD00" \
+    "11CCEF784C26A400F43DFB901BCA7538" \
+    "F2C6B176001CF5A0FD16D2C48B1D0C1C" \
+    "F6AC8E1DA6BCC3B4E1F96B0564965300" \
+    "FFA1D0B601EB2800F489AA512C4B248C" \
+    "01F76949A60BB7F00A40B1EAB64BDD48" \
+    "E8A700D60B7F1200FA8E77B0A979DABF";
+
+static const char *my_dhm_G = "4";
+
+#elif defined(USE_GNUTLS)
+#include <gnutls/gnutls.h>
+#define MD5_DIGEST_LENGTH 16
+#include <nettle/base64.h>
+#include <nettle/md5.h>
+#else	/* USE_OPENSSL */
+#include <openssl/ssl.h>
+#include <openssl/rc4.h>
+#include <openssl/md5.h>
+#include <openssl/bio.h>
+#include <openssl/buffer.h>
+#endif
+TLS_CTX RTMP_TLS_ctx;
+#endif
+
+#define RTMP_SIG_SIZE 1536
+#define RTMP_LARGE_HEADER_SIZE 12
+
+static const int packetSize[] = { 12, 8, 4, 1 };
+
+int RTMP_ctrlC;
+
+const char RTMPProtocolStrings[][7] =
+{
+    "RTMP",
+    "RTMPT",
+    "RTMPE",
+    "RTMPTE",
+    "RTMPS",
+    "RTMPTS",
+    "",
+    "",
+    "RTMFP"
+};
+
+const char RTMPProtocolStringsLower[][7] =
+{
+    "rtmp",
+    "rtmpt",
+    "rtmpe",
+    "rtmpte",
+    "rtmps",
+    "rtmpts",
+    "",
+    "",
+    "rtmfp"
+};
+
+static const char *RTMPT_cmds[] =
+{
+    "open",
+    "send",
+    "idle",
+    "close"
+};
+
+typedef enum
+{
+    RTMPT_OPEN=0, RTMPT_SEND, RTMPT_IDLE, RTMPT_CLOSE
+} RTMPTCmd;
+
+static int DumpMetaData(AMFObject *obj);
+static int HandShake(RTMP *r, int FP9HandShake);
+static int SocksNegotiate(RTMP *r);
+
+static int SendConnectPacket(RTMP *r, RTMPPacket *cp);
+static int SendCheckBW(RTMP *r);
+static int SendCheckBWResult(RTMP *r, double txn);
+static int SendDeleteStream(RTMP *r, double dStreamId);
+static int SendFCSubscribe(RTMP *r, AVal *subscribepath);
+static int SendPlay(RTMP *r);
+static int SendBytesReceived(RTMP *r);
+static int SendUsherToken(RTMP *r, AVal *usherToken);
+static int SendFCUnpublish(RTMP *r);
+
+#if 0				/* unused */
+static int SendBGHasStream(RTMP *r, double dId, AVal *playpath);
+#endif
+
+static int HandleInvoke(RTMP *r, const char *body, unsigned int nBodySize);
+static int HandleMetadata(RTMP *r, char *body, unsigned int len);
+static void HandleChangeChunkSize(RTMP *r, const RTMPPacket *packet);
+static void HandleAudio(RTMP *r, const RTMPPacket *packet);
+static void HandleVideo(RTMP *r, const RTMPPacket *packet);
+static void HandleCtrl(RTMP *r, const RTMPPacket *packet);
+static void HandleServerBW(RTMP *r, const RTMPPacket *packet);
+static void HandleClientBW(RTMP *r, const RTMPPacket *packet);
+
+static int ReadN(RTMP *r, char *buffer, int n);
+static int WriteN(RTMP *r, const char *buffer, int n);
+
+static void DecodeTEA(AVal *key, AVal *text);
+
+static int HTTP_Post(RTMP *r, RTMPTCmd cmd, const char *buf, int len);
+static int HTTP_read(RTMP *r, int fill);
+
+#ifndef _WIN32
+static int clk_tck;
+#endif
+
+#ifdef CRYPTO
+#include "handshake.h"
+#endif
+
+uint32_t
+RTMP_GetTime()
+{
+#ifdef _DEBUG
+    return 0;
+#elif defined(_WIN32)
+    return timeGetTime();
+#else
+    struct tms t;
+    if (!clk_tck) clk_tck = sysconf(_SC_CLK_TCK);
+    return times(&t) * 1000 / clk_tck;
+#endif
+}
+
+const char *
+socketerror(int err)
+{
+    static char buff[1024];
+
+#ifdef _WIN32
+    if (FormatMessageA (FORMAT_MESSAGE_FROM_SYSTEM, NULL, err, 0, buff, sizeof(buff), NULL))
+    {
+        int i, len;
+        buff[sizeof(buff)-1] = '\0';
+        len = (int)strlen (buff);
+        for (i = 0; i < len; i++)
+        {
+            if (buff[i] == '\r' || buff[i] == '\n')
+            {
+                memmove (buff + i, buff + i + 1, len - i);
+                i--;
+                len--;
+            }
+        }
+        return buff;
+    }
+#else
+    (void)err;
+#endif
+
+    strcpy (buff, "unknown error");
+    return buff;
+}
+
+void
+RTMP_UserInterrupt()
+{
+    RTMP_ctrlC = TRUE;
+}
+
+void
+RTMPPacket_Reset(RTMPPacket *p)
+{
+    p->m_headerType = 0;
+    p->m_packetType = 0;
+    p->m_nChannel = 0;
+    p->m_nTimeStamp = 0;
+    p->m_nInfoField2 = 0;
+    p->m_hasAbsTimestamp = FALSE;
+    p->m_nBodySize = 0;
+    p->m_nBytesRead = 0;
+}
+
+int
+RTMPPacket_Alloc(RTMPPacket *p, int nSize)
+{
+    char *ptr = calloc(1, nSize + RTMP_MAX_HEADER_SIZE);
+    if (!ptr)
+        return FALSE;
+    p->m_body = ptr + RTMP_MAX_HEADER_SIZE;
+    p->m_nBytesRead = 0;
+    return TRUE;
+}
+
+void
+RTMPPacket_Free(RTMPPacket *p)
+{
+    if (p->m_body)
+    {
+        free(p->m_body - RTMP_MAX_HEADER_SIZE);
+        p->m_body = NULL;
+    }
+}
+
+void
+RTMPPacket_Dump(RTMPPacket *p)
+{
+    RTMP_Log(RTMP_LOGDEBUG,
+             "RTMP PACKET: packet type: 0x%02x. channel: 0x%02x. info 1: %d info 2: %d. Body size: %u. body: 0x%02x",
+             p->m_packetType, p->m_nChannel, p->m_nTimeStamp, p->m_nInfoField2,
+             p->m_nBodySize, p->m_body ? (unsigned char)p->m_body[0] : 0);
+}
+
+int
+RTMP_LibVersion()
+{
+    return RTMP_LIB_VERSION;
+}
+
+void
+RTMP_TLS_Init()
+{
+#ifdef CRYPTO
+#ifdef USE_POLARSSL
+    /* Do this regardless of NO_SSL, we use havege for rtmpe too */
+    RTMP_TLS_ctx = calloc(1,sizeof(struct tls_ctx));
+    havege_init(&RTMP_TLS_ctx->hs);
+#elif defined(USE_GNUTLS) && !defined(NO_SSL)
+    /* Technically we need to initialize libgcrypt ourselves if
+     * we're not going to call gnutls_global_init(). Ignoring this
+     * for now.
+     */
+    gnutls_global_init();
+    RTMP_TLS_ctx = malloc(sizeof(struct tls_ctx));
+    gnutls_certificate_allocate_credentials(&RTMP_TLS_ctx->cred);
+    gnutls_priority_init(&RTMP_TLS_ctx->prios, "NORMAL", NULL);
+    gnutls_certificate_set_x509_trust_file(RTMP_TLS_ctx->cred,
+                                           "ca.pem", GNUTLS_X509_FMT_PEM);
+#elif !defined(NO_SSL) /* USE_OPENSSL */
+    /* libcrypto doesn't need anything special */
+    SSL_load_error_strings();
+    SSL_library_init();
+    OpenSSL_add_all_digests();
+    RTMP_TLS_ctx = SSL_CTX_new(SSLv23_method());
+    SSL_CTX_set_options(RTMP_TLS_ctx, SSL_OP_ALL);
+    SSL_CTX_set_default_verify_paths(RTMP_TLS_ctx);
+#endif
+#endif
+}
+
+void *
+RTMP_TLS_AllocServerContext(const char* cert, const char* key)
+{
+    void *ctx = NULL;
+#ifdef CRYPTO
+    if (!RTMP_TLS_ctx)
+        RTMP_TLS_Init();
+#ifdef USE_POLARSSL
+    tls_server_ctx *tc = ctx = calloc(1, sizeof(struct tls_server_ctx));
+    tc->dhm_P = my_dhm_P;
+    tc->dhm_G = my_dhm_G;
+    tc->hs = &RTMP_TLS_ctx->hs;
+    if (x509parse_crtfile(&tc->cert, cert))
+    {
+        free(tc);
+        return NULL;
+    }
+    if (x509parse_keyfile(&tc->key, key, NULL))
+    {
+        x509_free(&tc->cert);
+        free(tc);
+        return NULL;
+    }
+#elif defined(USE_GNUTLS) && !defined(NO_SSL)
+    gnutls_certificate_allocate_credentials((gnutls_certificate_credentials*) &ctx);
+    if (gnutls_certificate_set_x509_key_file(ctx, cert, key, GNUTLS_X509_FMT_PEM) != 0)
+    {
+        gnutls_certificate_free_credentials(ctx);
+        return NULL;
+    }
+#elif !defined(NO_SSL) /* USE_OPENSSL */
+    ctx = SSL_CTX_new(SSLv23_server_method());
+    if (!SSL_CTX_use_certificate_chain_file(ctx, cert))
+    {
+        SSL_CTX_free(ctx);
+        return NULL;
+    }
+    if (!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM))
+    {
+        SSL_CTX_free(ctx);
+        return NULL;
+    }
+#endif
+#else
+    (void)cert;
+    (void)key;
+#endif
+    return ctx;
+}
+
+void
+RTMP_TLS_FreeServerContext(void *ctx)
+{
+#ifdef CRYPTO
+#ifdef USE_POLARSSL
+    x509_free(&((tls_server_ctx*)ctx)->cert);
+    rsa_free(&((tls_server_ctx*)ctx)->key);
+    free(ctx);
+#elif defined(USE_GNUTLS) && !defined(NO_SSL)
+    gnutls_certificate_free_credentials(ctx);
+#elif !defined(NO_SSL) /* USE_OPENSSL */
+    SSL_CTX_free(ctx);
+#endif
+
+#else
+    (void)ctx;
+#endif
+}
+
+RTMP *
+RTMP_Alloc()
+{
+    return calloc(1, sizeof(RTMP));
+}
+
+void
+RTMP_Free(RTMP *r)
+{
+    free(r);
+}
+
+void
+RTMP_Init(RTMP *r)
+{
+#ifdef CRYPTO
+    if (!RTMP_TLS_ctx)
+        RTMP_TLS_Init();
+#endif
+
+    memset(r, 0, sizeof(RTMP));
+    r->m_sb.sb_socket = -1;
+    r->m_inChunkSize = RTMP_DEFAULT_CHUNKSIZE;
+    r->m_outChunkSize = RTMP_DEFAULT_CHUNKSIZE;
+    r->m_bSendChunkSizeInfo = 1;
+    r->m_nBufferMS = 30000;
+    r->m_nClientBW = 2500000;
+    r->m_nClientBW2 = 2;
+    r->m_nServerBW = 2500000;
+    r->m_fAudioCodecs = 3191.0;
+    r->m_fVideoCodecs = 252.0;
+    r->Link.timeout = 30;
+    r->Link.swfAge = 30;
+}
+
+void
+RTMP_EnableWrite(RTMP *r)
+{
+    r->Link.protocol |= RTMP_FEATURE_WRITE;
+}
+
+double
+RTMP_GetDuration(RTMP *r)
+{
+    return r->m_fDuration;
+}
+
+int
+RTMP_IsConnected(RTMP *r)
+{
+    return r->m_sb.sb_socket != -1;
+}
+
+SOCKET
+RTMP_Socket(RTMP *r)
+{
+    return r->m_sb.sb_socket;
+}
+
+int
+RTMP_IsTimedout(RTMP *r)
+{
+    return r->m_sb.sb_timedout;
+}
+
+void
+RTMP_SetBufferMS(RTMP *r, int size)
+{
+    r->m_nBufferMS = size;
+}
+
+void
+RTMP_UpdateBufferMS(RTMP *r)
+{
+    RTMP_SendCtrl(r, 3, r->m_stream_id, r->m_nBufferMS);
+}
+
+#undef OSS
+#ifdef _WIN32
+#define OSS	"WIN"
+#elif defined(__sun__)
+#define OSS	"SOL"
+#elif defined(__APPLE__)
+#define OSS	"MAC"
+#elif defined(__linux__)
+#define OSS	"LNX"
+#else
+#define OSS	"GNU"
+#endif
+#define DEF_VERSTR	OSS " 10,0,32,18"
+static const char DEFAULT_FLASH_VER[] = DEF_VERSTR;
+const AVal RTMP_DefaultFlashVer =
+{ (char *)DEFAULT_FLASH_VER, sizeof(DEFAULT_FLASH_VER) - 1 };
+
+static void
+SocksSetup(RTMP *r, AVal *sockshost)
+{
+    if (sockshost->av_len)
+    {
+        const char *socksport = strchr(sockshost->av_val, ':');
+        char *hostname = strdup(sockshost->av_val);
+
+        if (socksport)
+            hostname[socksport - sockshost->av_val] = '\0';
+        r->Link.sockshost.av_val = hostname;
+        r->Link.sockshost.av_len = (int)strlen(hostname);
+
+        r->Link.socksport = socksport ? atoi(socksport + 1) : 1080;
+        RTMP_Log(RTMP_LOGDEBUG, "Connecting via SOCKS proxy: %s:%d", r->Link.sockshost.av_val,
+                 r->Link.socksport);
+    }
+    else
+    {
+        r->Link.sockshost.av_val = NULL;
+        r->Link.sockshost.av_len = 0;
+        r->Link.socksport = 0;
+    }
+}
+
+void
+RTMP_SetupStream(RTMP *r,
+                 int protocol,
+                 AVal *host,
+                 unsigned int port,
+                 AVal *sockshost,
+                 AVal *playpath,
+                 AVal *tcUrl,
+                 AVal *swfUrl,
+                 AVal *pageUrl,
+                 AVal *app,
+                 AVal *auth,
+                 AVal *swfSHA256Hash,
+                 uint32_t swfSize,
+                 AVal *flashVer,
+                 AVal *subscribepath,
+                 AVal *usherToken,
+                 int dStart,
+                 int dStop, int bLiveStream, long int timeout)
+{
+    RTMP_Log(RTMP_LOGDEBUG, "Protocol : %s", RTMPProtocolStrings[protocol&7]);
+    RTMP_Log(RTMP_LOGDEBUG, "Hostname : %.*s", host->av_len, host->av_val);
+    RTMP_Log(RTMP_LOGDEBUG, "Port     : %d", port);
+    RTMP_Log(RTMP_LOGDEBUG, "Playpath : %s", playpath->av_val);
+
+    if (tcUrl && tcUrl->av_val)
+        RTMP_Log(RTMP_LOGDEBUG, "tcUrl    : %s", tcUrl->av_val);
+    if (swfUrl && swfUrl->av_val)
+        RTMP_Log(RTMP_LOGDEBUG, "swfUrl   : %s", swfUrl->av_val);
+    if (pageUrl && pageUrl->av_val)
+        RTMP_Log(RTMP_LOGDEBUG, "pageUrl  : %s", pageUrl->av_val);
+    if (app && app->av_val)
+        RTMP_Log(RTMP_LOGDEBUG, "app      : %.*s", app->av_len, app->av_val);
+    if (auth && auth->av_val)
+        RTMP_Log(RTMP_LOGDEBUG, "auth     : %s", auth->av_val);
+    if (subscribepath && subscribepath->av_val)
+        RTMP_Log(RTMP_LOGDEBUG, "subscribepath : %s", subscribepath->av_val);
+    if (usherToken && usherToken->av_val)
+        RTMP_Log(RTMP_LOGDEBUG, "NetStream.Authenticate.UsherToken : %s", usherToken->av_val);
+    if (flashVer && flashVer->av_val)
+        RTMP_Log(RTMP_LOGDEBUG, "flashVer : %s", flashVer->av_val);
+    if (dStart > 0)
+        RTMP_Log(RTMP_LOGDEBUG, "StartTime     : %d msec", dStart);
+    if (dStop > 0)
+        RTMP_Log(RTMP_LOGDEBUG, "StopTime      : %d msec", dStop);
+
+    RTMP_Log(RTMP_LOGDEBUG, "live     : %s", bLiveStream ? "yes" : "no");
+    RTMP_Log(RTMP_LOGDEBUG, "timeout  : %ld sec", timeout);
+
+#ifdef CRYPTO
+    if (swfSHA256Hash != NULL && swfSize > 0)
+    {
+        memcpy(r->Link.SWFHash, swfSHA256Hash->av_val, sizeof(r->Link.SWFHash));
+        r->Link.SWFSize = swfSize;
+        RTMP_Log(RTMP_LOGDEBUG, "SWFSHA256:");
+        RTMP_LogHex(RTMP_LOGDEBUG, r->Link.SWFHash, sizeof(r->Link.SWFHash));
+        RTMP_Log(RTMP_LOGDEBUG, "SWFSize  : %u", r->Link.SWFSize);
+    }
+    else
+    {
+        r->Link.SWFSize = 0;
+    }
+
+#else
+    (void)swfSHA256Hash;
+    (void)swfSize;
+#endif
+
+    SocksSetup(r, sockshost);
+
+    if (tcUrl && tcUrl->av_len)
+        r->Link.tcUrl = *tcUrl;
+    if (swfUrl && swfUrl->av_len)
+        r->Link.swfUrl = *swfUrl;
+    if (pageUrl && pageUrl->av_len)
+        r->Link.pageUrl = *pageUrl;
+    if (app && app->av_len)
+        r->Link.app = *app;
+    if (auth && auth->av_len)
+    {
+        r->Link.auth = *auth;
+        r->Link.lFlags |= RTMP_LF_AUTH;
+    }
+    if (flashVer && flashVer->av_len)
+        r->Link.flashVer = *flashVer;
+    else
+        r->Link.flashVer = RTMP_DefaultFlashVer;
+    if (subscribepath && subscribepath->av_len)
+        r->Link.subscribepath = *subscribepath;
+    if (usherToken && usherToken->av_len)
+        r->Link.usherToken = *usherToken;
+    r->Link.seekTime = dStart;
+    r->Link.stopTime = dStop;
+    if (bLiveStream)
+        r->Link.lFlags |= RTMP_LF_LIVE;
+    r->Link.timeout = timeout;
+
+    r->Link.protocol = protocol;
+    r->Link.hostname = *host;
+    r->Link.port = port;
+    r->Link.playpath = *playpath;
+
+    if (r->Link.port == 0)
+    {
+        if (protocol & RTMP_FEATURE_SSL)
+            r->Link.port = 443;
+        else if (protocol & RTMP_FEATURE_HTTP)
+            r->Link.port = 80;
+        else
+            r->Link.port = 1935;
+    }
+}
+
+enum { OPT_STR=0, OPT_INT, OPT_BOOL, OPT_CONN };
+static const char *optinfo[] =
+{
+    "string", "integer", "boolean", "AMF"
+};
+
+#define OFF(x)	offsetof(struct RTMP,x)
+
+static struct urlopt
+{
+    AVal name;
+    off_t off;
+    int otype;
+    int omisc;
+    char *use;
+} options[] =
+{
+    {
+        AVC("socks"),     OFF(Link.sockshost),     OPT_STR, 0,
+        "Use the specified SOCKS proxy"
+    },
+    {
+        AVC("app"),       OFF(Link.app),           OPT_STR, 0,
+        "Name of target app on server"
+    },
+    {
+        AVC("tcUrl"),     OFF(Link.tcUrl),         OPT_STR, 0,
+        "URL to played stream"
+    },
+    {
+        AVC("pageUrl"),   OFF(Link.pageUrl),       OPT_STR, 0,
+        "URL of played media's web page"
+    },
+    {
+        AVC("swfUrl"),    OFF(Link.swfUrl),        OPT_STR, 0,
+        "URL to player SWF file"
+    },
+    {
+        AVC("flashver"),  OFF(Link.flashVer),      OPT_STR, 0,
+        "Flash version string (default " DEF_VERSTR ")"
+    },
+    {
+        AVC("conn"),      OFF(Link.extras),        OPT_CONN, 0,
+        "Append arbitrary AMF data to Connect message"
+    },
+    {
+        AVC("playpath"),  OFF(Link.playpath),      OPT_STR, 0,
+        "Path to target media on server"
+    },
+    {
+        AVC("playlist"),  OFF(Link.lFlags),        OPT_BOOL, RTMP_LF_PLST,
+        "Set playlist before play command"
+    },
+    {
+        AVC("live"),      OFF(Link.lFlags),        OPT_BOOL, RTMP_LF_LIVE,
+        "Stream is live, no seeking possible"
+    },
+    {
+        AVC("subscribe"), OFF(Link.subscribepath), OPT_STR, 0,
+        "Stream to subscribe to"
+    },
+    {
+        AVC("jtv"), OFF(Link.usherToken),          OPT_STR, 0,
+        "Justin.tv authentication token"
+    },
+    {
+        AVC("token"),     OFF(Link.token),	       OPT_STR, 0,
+        "Key for SecureToken response"
+    },
+    {
+        AVC("swfVfy"),    OFF(Link.lFlags),        OPT_BOOL, RTMP_LF_SWFV,
+        "Perform SWF Verification"
+    },
+    {
+        AVC("swfAge"),    OFF(Link.swfAge),        OPT_INT, 0,
+        "Number of days to use cached SWF hash"
+    },
+    {
+        AVC("start"),     OFF(Link.seekTime),      OPT_INT, 0,
+        "Stream start position in milliseconds"
+    },
+    {
+        AVC("stop"),      OFF(Link.stopTime),      OPT_INT, 0,
+        "Stream stop position in milliseconds"
+    },
+    {
+        AVC("buffer"),    OFF(m_nBufferMS),        OPT_INT, 0,
+        "Buffer time in milliseconds"
+    },
+    {
+        AVC("timeout"),   OFF(Link.timeout),       OPT_INT, 0,
+        "Session timeout in seconds"
+    },
+    {
+        AVC("pubUser"),   OFF(Link.pubUser),       OPT_STR, 0,
+        "Publisher username"
+    },
+    {
+        AVC("pubPasswd"), OFF(Link.pubPasswd),     OPT_STR, 0,
+        "Publisher password"
+    },
+    { {NULL,0}, 0, 0}
+};
+
+static const AVal truth[] =
+{
+    AVC("1"),
+    AVC("on"),
+    AVC("yes"),
+    AVC("true"),
+    {0,0}
+};
+
+static void RTMP_OptUsage()
+{
+    int i;
+
+    RTMP_Log(RTMP_LOGERROR, "Valid RTMP options are:\n");
+    for (i=0; options[i].name.av_len; i++)
+    {
+        RTMP_Log(RTMP_LOGERROR, "%10s %-7s  %s\n", options[i].name.av_val,
+                 optinfo[options[i].otype], options[i].use);
+    }
+}
+
+static int
+parseAMF(AMFObject *obj, AVal *av, int *depth)
+{
+    AMFObjectProperty prop = {{0,0}};
+    int i;
+    char *p, *arg = av->av_val;
+
+    if (arg[1] == ':')
+    {
+        p = (char *)arg+2;
+        switch(arg[0])
+        {
+        case 'B':
+            prop.p_type = AMF_BOOLEAN;
+            prop.p_vu.p_number = atoi(p);
+            break;
+        case 'S':
+            prop.p_type = AMF_STRING;
+            prop.p_vu.p_aval.av_val = p;
+            prop.p_vu.p_aval.av_len = av->av_len - (p-arg);
+            break;
+        case 'N':
+            prop.p_type = AMF_NUMBER;
+            prop.p_vu.p_number = strtod(p, NULL);
+            break;
+        case 'Z':
+            prop.p_type = AMF_NULL;
+            break;
+        case 'O':
+            i = atoi(p);
+            if (i)
+            {
+                prop.p_type = AMF_OBJECT;
+            }
+            else
+            {
+                (*depth)--;
+                return 0;
+            }
+            break;
+        default:
+            return -1;
+        }
+    }
+    else if (arg[2] == ':' && arg[0] == 'N')
+    {
+        p = strchr(arg+3, ':');
+        if (!p || !*depth)
+            return -1;
+        prop.p_name.av_val = (char *)arg+3;
+        prop.p_name.av_len = p - (arg+3);
+
+        p++;
+        switch(arg[1])
+        {
+        case 'B':
+            prop.p_type = AMF_BOOLEAN;
+            prop.p_vu.p_number = atoi(p);
+            break;
+        case 'S':
+            prop.p_type = AMF_STRING;
+            prop.p_vu.p_aval.av_val = p;
+            prop.p_vu.p_aval.av_len = av->av_len - (p-arg);
+            break;
+        case 'N':
+            prop.p_type = AMF_NUMBER;
+            prop.p_vu.p_number = strtod(p, NULL);
+            break;
+        case 'O':
+            prop.p_type = AMF_OBJECT;
+            break;
+        default:
+            return -1;
+        }
+    }
+    else
+        return -1;
+
+    if (*depth)
+    {
+        AMFObject *o2;
+        for (i=0; i<*depth; i++)
+        {
+            o2 = &obj->o_props[obj->o_num-1].p_vu.p_object;
+            obj = o2;
+        }
+    }
+    AMF_AddProp(obj, &prop);
+    if (prop.p_type == AMF_OBJECT)
+        (*depth)++;
+    return 0;
+}
+
+int RTMP_SetOpt(RTMP *r, const AVal *opt, AVal *arg)
+{
+    int i;
+    void *v;
+
+    for (i=0; options[i].name.av_len; i++)
+    {
+        if (opt->av_len != options[i].name.av_len) continue;
+        if (strcasecmp(opt->av_val, options[i].name.av_val)) continue;
+        v = (char *)r + options[i].off;
+        switch(options[i].otype)
+        {
+        case OPT_STR:
+        {
+            AVal *aptr = v;
+            *aptr = *arg;
+        }
+        break;
+        case OPT_INT:
+        {
+            long l = strtol(arg->av_val, NULL, 0);
+            *(int *)v = l;
+        }
+        break;
+        case OPT_BOOL:
+        {
+            int j, fl;
+            fl = *(int *)v;
+            for (j=0; truth[j].av_len; j++)
+            {
+                if (arg->av_len != truth[j].av_len) continue;
+                if (strcasecmp(arg->av_val, truth[j].av_val)) continue;
+                fl |= options[i].omisc;
+                break;
+            }
+            *(int *)v = fl;
+        }
+        break;
+        case OPT_CONN:
+            if (parseAMF(&r->Link.extras, arg, &r->Link.edepth))
+                return FALSE;
+            break;
+        }
+        break;
+    }
+    if (!options[i].name.av_len)
+    {
+        RTMP_Log(RTMP_LOGERROR, "Unknown option %s", opt->av_val);
+        RTMP_OptUsage();
+        return FALSE;
+    }
+
+    return TRUE;
+}
+
+int RTMP_SetupURL(RTMP *r, char *url)
+{
+    AVal opt, arg;
+    char *p1, *p2, *ptr = strchr(url, ' ');
+    int ret, len;
+    unsigned int port = 0;
+
+    if (ptr)
+        *ptr = '\0';
+
+    len = (int)strlen(url);
+    ret = RTMP_ParseURL(url, &r->Link.protocol, &r->Link.hostname,
+                        &port, &r->Link.playpath0, &r->Link.app);
+    if (!ret)
+        return ret;
+    r->Link.port = port;
+    r->Link.playpath = r->Link.playpath0;
+
+    while (ptr)
+    {
+        *ptr++ = '\0';
+        p1 = ptr;
+        p2 = strchr(p1, '=');
+        if (!p2)
+            break;
+        opt.av_val = p1;
+        opt.av_len = p2 - p1;
+        *p2++ = '\0';
+        arg.av_val = p2;
+        ptr = strchr(p2, ' ');
+        if (ptr)
+        {
+            *ptr = '\0';
+            arg.av_len = ptr - p2;
+            /* skip repeated spaces */
+            while(ptr[1] == ' ')
+                *ptr++ = '\0';
+        }
+        else
+        {
+            arg.av_len = (int)strlen(p2);
+        }
+
+        /* unescape */
+        port = arg.av_len;
+        for (p1=p2; port >0;)
+        {
+            if (*p1 == '\\')
+            {
+                unsigned int c;
+                if (port < 3)
+                    return FALSE;
+                sscanf(p1+1, "%02x", &c);
+                *p2++ = c;
+                port -= 3;
+                p1 += 3;
+            }
+            else
+            {
+                *p2++ = *p1++;
+                port--;
+            }
+        }
+        arg.av_len = p2 - arg.av_val;
+
+        ret = RTMP_SetOpt(r, &opt, &arg);
+        if (!ret)
+            return ret;
+    }
+
+    if (!r->Link.tcUrl.av_len)
+    {
+        r->Link.tcUrl.av_val = url;
+        if (r->Link.app.av_len)
+        {
+            if (r->Link.app.av_val < url + len)
+            {
+                /* if app is part of original url, just use it */
+                r->Link.tcUrl.av_len = r->Link.app.av_len + (r->Link.app.av_val - url);
+            }
+            else
+            {
+                len = r->Link.hostname.av_len + r->Link.app.av_len +
+                      sizeof("rtmpte://:65535/");
+                r->Link.tcUrl.av_val = malloc(len);
+                r->Link.tcUrl.av_len = snprintf(r->Link.tcUrl.av_val, len,
+                                                "%s://%.*s:%d/%.*s",
+                                                RTMPProtocolStringsLower[r->Link.protocol],
+                                                r->Link.hostname.av_len, r->Link.hostname.av_val,
+                                                r->Link.port,
+                                                r->Link.app.av_len, r->Link.app.av_val);
+                r->Link.lFlags |= RTMP_LF_FTCU;
+            }
+        }
+        else
+        {
+            r->Link.tcUrl.av_len = (int)strlen(url);
+        }
+    }
+
+#ifdef CRYPTO
+    if ((r->Link.lFlags & RTMP_LF_SWFV) && r->Link.swfUrl.av_len)
+        RTMP_HashSWF(r->Link.swfUrl.av_val, &r->Link.SWFSize,
+                     (unsigned char *)r->Link.SWFHash, r->Link.swfAge);
+#endif
+
+    SocksSetup(r, &r->Link.sockshost);
+
+    if (r->Link.port == 0)
+    {
+        if (r->Link.protocol & RTMP_FEATURE_SSL)
+            r->Link.port = 443;
+        else if (r->Link.protocol & RTMP_FEATURE_HTTP)
+            r->Link.port = 80;
+        else
+            r->Link.port = 1935;
+    }
+    return TRUE;
+}
+
+int RTMP_SetupURL2(RTMP *r, char *url, char *playpath)
+{
+    AVal opt, arg;
+    char *p1, *p2, *ptr = strchr(url, ' ');
+    int ret, len;
+    unsigned int port = 0;
+
+    if (ptr)
+        *ptr = '\0';
+
+    len = (int)strlen(url);
+    ret = RTMP_ParseURL2(url, &r->Link.protocol, &r->Link.hostname,
+        &port, &r->Link.app);
+    if (!ret)
+        return ret;
+    r->Link.port = port;
+
+    if(playpath && *playpath)
+    {
+        AVal pp = {playpath, (int)strlen(playpath)};
+        RTMP_ParsePlaypath(&pp, &r->Link.playpath0);
+    }
+
+    r->Link.playpath = r->Link.playpath0;
+
+    while (ptr)
+    {
+        *ptr++ = '\0';
+        p1 = ptr;
+        p2 = strchr(p1, '=');
+        if (!p2)
+            break;
+        opt.av_val = p1;
+        opt.av_len = p2 - p1;
+        *p2++ = '\0';
+        arg.av_val = p2;
+        ptr = strchr(p2, ' ');
+        if (ptr)
+        {
+            *ptr = '\0';
+            arg.av_len = ptr - p2;
+            /* skip repeated spaces */
+            while(ptr[1] == ' ')
+                *ptr++ = '\0';
+        }
+        else
+        {
+            arg.av_len = (int)strlen(p2);
+        }
+
+        /* unescape */
+        port = arg.av_len;
+        for (p1=p2; port >0;)
+        {
+            if (*p1 == '\\')
+            {
+                unsigned int c;
+                if (port < 3)
+                    return FALSE;
+                sscanf(p1+1, "%02x", &c);
+                *p2++ = c;
+                port -= 3;
+                p1 += 3;
+            }
+            else
+            {
+                *p2++ = *p1++;
+                port--;
+            }
+        }
+        arg.av_len = p2 - arg.av_val;
+
+        ret = RTMP_SetOpt(r, &opt, &arg);
+        if (!ret)
+            return ret;
+    }
+
+    if (!r->Link.tcUrl.av_len)
+    {
+        r->Link.tcUrl.av_val = url;
+        if (r->Link.app.av_len)
+        {
+            if (r->Link.app.av_val < url + len)
+            {
+                /* if app is part of original url, just use it */
+                r->Link.tcUrl.av_len = r->Link.app.av_len + (r->Link.app.av_val - url);
+            }
+            else
+            {
+                len = r->Link.hostname.av_len + r->Link.app.av_len +
+                    sizeof("rtmpte://:65535/");
+                r->Link.tcUrl.av_val = malloc(len);
+                r->Link.tcUrl.av_len = snprintf(r->Link.tcUrl.av_val, len,
+                    "%s://%.*s:%d/%.*s",
+                    RTMPProtocolStringsLower[r->Link.protocol],
+                    r->Link.hostname.av_len, r->Link.hostname.av_val,
+                    r->Link.port,
+                    r->Link.app.av_len, r->Link.app.av_val);
+                r->Link.lFlags |= RTMP_LF_FTCU;
+            }
+        }
+        else
+        {
+            r->Link.tcUrl.av_len = (int)strlen(url);
+        }
+    }
+
+#ifdef CRYPTO
+    if ((r->Link.lFlags & RTMP_LF_SWFV) && r->Link.swfUrl.av_len)
+        RTMP_HashSWF(r->Link.swfUrl.av_val, &r->Link.SWFSize,
+        (unsigned char *)r->Link.SWFHash, r->Link.swfAge);
+#endif
+
+    SocksSetup(r, &r->Link.sockshost);
+
+    if (r->Link.port == 0)
+    {
+        if (r->Link.protocol & RTMP_FEATURE_SSL)
+            r->Link.port = 443;
+        else if (r->Link.protocol & RTMP_FEATURE_HTTP)
+            r->Link.port = 80;
+        else
+            r->Link.port = 1935;
+    }
+    return TRUE;
+}
+
+static int
+add_addr_info(struct sockaddr_in *service, AVal *host, int port)
+{
+    char *hostname;
+    int ret = TRUE;
+    if (host->av_val[host->av_len])
+    {
+        hostname = malloc(host->av_len+1);
+        memcpy(hostname, host->av_val, host->av_len);
+        hostname[host->av_len] = '\0';
+    }
+    else
+    {
+        hostname = host->av_val;
+    }
+
+    service->sin_addr.s_addr = inet_addr(hostname);
+    if (service->sin_addr.s_addr == INADDR_NONE)
+    {
+        struct hostent *host = gethostbyname(hostname);
+        if (host == NULL || host->h_addr == NULL)
+        {
+            RTMP_Log(RTMP_LOGERROR, "Problem accessing the DNS. (addr: %s, error: %d)", hostname, GetSockError());
+            ret = FALSE;
+            goto finish;
+        }
+        service->sin_addr = *(struct in_addr *)host->h_addr;
+    }
+
+    service->sin_port = htons(port);
+finish:
+    if (hostname != host->av_val)
+        free(hostname);
+    return ret;
+}
+
+#ifdef _WIN32
+#define E_TIMEDOUT     WSAETIMEDOUT
+#define E_CONNREFUSED  WSAECONNREFUSED
+#define E_ACCES        WSAEACCES
+#else
+#define E_TIMEDOUT     ETIMEDOUT
+#define E_CONNREFUSED  ECONNREFUSED
+#define E_ACCES        EACCES
+#endif
+
+int
+RTMP_Connect0(RTMP *r, struct sockaddr * service)
+{
+    int on = 1;
+    r->m_sb.sb_timedout = FALSE;
+    r->m_pausing = 0;
+    r->m_fDuration = 0.0;
+
+    //best to be explicit, we need overlapped socket
+#ifdef _WIN32
+    r->m_sb.sb_socket = WSASocket(AF_INET, SOCK_STREAM, IPPROTO_TCP, NULL, 0, WSA_FLAG_OVERLAPPED);
+#else
+    r->m_sb.sb_socket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
+#endif
+
+    if (r->m_sb.sb_socket != -1)
+    {
+        if(r->m_bindIP.addrLen)
+        {
+            if (bind(r->m_sb.sb_socket, (const struct sockaddr *)&r->m_bindIP.addr, r->m_bindIP.addrLen) < 0)
+            {
+                int err = GetSockError();
+                RTMP_Log(RTMP_LOGERROR, "%s, failed to bind socket: %s (%d)",
+                         __FUNCTION__, socketerror(err), err);
+                RTMP_Close(r);
+                return FALSE;
+            }
+        }
+
+        if (connect(r->m_sb.sb_socket, service, sizeof(struct sockaddr)) < 0)
+        {
+            int err = GetSockError();
+            if (err == E_CONNREFUSED)
+                RTMP_Log(RTMP_LOGERROR, "%s is offline. Try a different server (ECONNREFUSED).", r->Link.hostname.av_val);
+            else if (err == E_ACCES)
+                RTMP_Log(RTMP_LOGERROR, "The connection is being blocked by a firewall or other security software (EACCES).");
+            else if (err == E_TIMEDOUT)
+                RTMP_Log(RTMP_LOGERROR, "The connection timed out. Try a different server, or check that the connection is not being blocked by a firewall or other security software (ETIMEDOUT).");
+            else
+                RTMP_Log(RTMP_LOGERROR, "%s, failed to connect socket: %s (%d)",
+                     __FUNCTION__, socketerror(err), err);
+            RTMP_Close(r);
+            return FALSE;
+        }
+
+        if (r->Link.socksport)
+        {
+            RTMP_Log(RTMP_LOGDEBUG, "%s ... SOCKS negotiation", __FUNCTION__);
+            if (!SocksNegotiate(r))
+            {
+                RTMP_Log(RTMP_LOGERROR, "%s, SOCKS negotiation failed.", __FUNCTION__);
+                RTMP_Close(r);
+                return FALSE;
+            }
+        }
+    }
+    else
+    {
+        RTMP_Log(RTMP_LOGERROR, "%s, failed to create socket. Error: %d", __FUNCTION__,
+                 GetSockError());
+        return FALSE;
+    }
+
+    /* set timeout */
+    {
+        SET_RCVTIMEO(tv, r->Link.timeout);
+        if (setsockopt
+                (r->m_sb.sb_socket, SOL_SOCKET, SO_RCVTIMEO, (char *)&tv, sizeof(tv)))
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, Setting socket timeout to %ds failed!",
+                     __FUNCTION__, r->Link.timeout);
+        }
+    }
+
+    if(!r->m_bUseNagle)
+        setsockopt(r->m_sb.sb_socket, IPPROTO_TCP, TCP_NODELAY, (char *) &on, sizeof(on));
+
+    return TRUE;
+}
+
+int
+RTMP_TLS_Accept(RTMP *r, void *ctx)
+{
+#if defined(CRYPTO) && !defined(NO_SSL)
+    TLS_server(ctx, r->m_sb.sb_ssl);
+    TLS_setfd(r->m_sb.sb_ssl, r->m_sb.sb_socket);
+    if (TLS_accept(r->m_sb.sb_ssl) < 0)
+    {
+        RTMP_Log(RTMP_LOGERROR, "%s, TLS_Connect failed", __FUNCTION__);
+        return FALSE;
+    }
+    return TRUE;
+#else
+    (void)r;
+    (void)ctx;
+    return FALSE;
+#endif
+}
+
+int
+RTMP_Connect1(RTMP *r, RTMPPacket *cp)
+{
+    if (r->Link.protocol & RTMP_FEATURE_SSL)
+    {
+#if defined(CRYPTO) && !defined(NO_SSL)
+        TLS_client(RTMP_TLS_ctx, r->m_sb.sb_ssl);
+        TLS_setfd(r->m_sb.sb_ssl, r->m_sb.sb_socket);
+        if (TLS_connect(r->m_sb.sb_ssl) < 0)
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, TLS_Connect failed", __FUNCTION__);
+            RTMP_Close(r);
+            return FALSE;
+        }
+#else
+        RTMP_Log(RTMP_LOGERROR, "%s, no SSL/TLS support", __FUNCTION__);
+        RTMP_Close(r);
+        return FALSE;
+
+#endif
+    }
+    if (r->Link.protocol & RTMP_FEATURE_HTTP)
+    {
+        r->m_msgCounter = 1;
+        r->m_clientID.av_val = NULL;
+        r->m_clientID.av_len = 0;
+        HTTP_Post(r, RTMPT_OPEN, "", 1);
+        if (HTTP_read(r, 1) != 0)
+        {
+            r->m_msgCounter = 0;
+            RTMP_Log(RTMP_LOGDEBUG, "%s, Could not connect for handshake", __FUNCTION__);
+            RTMP_Close(r);
+            return 0;
+        }
+        r->m_msgCounter = 0;
+    }
+    RTMP_Log(RTMP_LOGDEBUG, "%s, ... connected, handshaking", __FUNCTION__);
+    if (!HandShake(r, TRUE))
+    {
+        RTMP_Log(RTMP_LOGERROR, "%s, handshake failed.", __FUNCTION__);
+        RTMP_Close(r);
+        return FALSE;
+    }
+    RTMP_Log(RTMP_LOGDEBUG, "%s, handshaked", __FUNCTION__);
+
+    if (!SendConnectPacket(r, cp))
+    {
+        RTMP_Log(RTMP_LOGERROR, "%s, RTMP connect failed.", __FUNCTION__);
+        RTMP_Close(r);
+        return FALSE;
+    }
+    return TRUE;
+}
+
+int
+RTMP_Connect(RTMP *r, RTMPPacket *cp)
+{
+    struct sockaddr_in service;
+    if (!r->Link.hostname.av_len)
+        return FALSE;
+
+    memset(&service, 0, sizeof(struct sockaddr_in));
+    service.sin_family = AF_INET;
+
+    if (r->Link.socksport)
+    {
+        /* Connect via SOCKS */
+        if (!add_addr_info(&service, &r->Link.sockshost, r->Link.socksport))
+            return FALSE;
+    }
+    else
+    {
+        /* Connect directly */
+        if (!add_addr_info(&service, &r->Link.hostname, r->Link.port))
+            return FALSE;
+    }
+
+    if (!RTMP_Connect0(r, (struct sockaddr *)&service))
+        return FALSE;
+
+    r->m_bSendCounter = TRUE;
+
+    return RTMP_Connect1(r, cp);
+}
+
+static int
+SocksNegotiate(RTMP *r)
+{
+    unsigned long addr;
+    struct sockaddr_in service;
+    memset(&service, 0, sizeof(struct sockaddr_in));
+
+    add_addr_info(&service, &r->Link.hostname, r->Link.port);
+    addr = htonl(service.sin_addr.s_addr);
+
+    {
+        char packet[] =
+        {
+            4, 1,			/* SOCKS 4, connect */
+            (r->Link.port >> 8) & 0xFF,
+            (r->Link.port) & 0xFF,
+            (char)(addr >> 24) & 0xFF, (char)(addr >> 16) & 0xFF,
+            (char)(addr >> 8) & 0xFF, (char)addr & 0xFF,
+            0
+        };				/* NULL terminate */
+
+        WriteN(r, packet, sizeof packet);
+
+        if (ReadN(r, packet, 8) != 8)
+            return FALSE;
+
+        if (packet[0] == 0 && packet[1] == 90)
+        {
+            return TRUE;
+        }
+        else
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, SOCKS returned error code %d", __FUNCTION__, packet[1]);
+            return FALSE;
+        }
+    }
+}
+
+int
+RTMP_ConnectStream(RTMP *r, int seekTime)
+{
+    RTMPPacket packet = { 0 };
+
+    /* seekTime was already set by SetupStream / SetupURL.
+     * This is only needed by ReconnectStream.
+     */
+    if (seekTime > 0)
+        r->Link.seekTime = seekTime;
+
+    r->m_mediaChannel = 0;
+
+    while (!r->m_bPlaying && RTMP_IsConnected(r) && RTMP_ReadPacket(r, &packet))
+    {
+        if (RTMPPacket_IsReady(&packet))
+        {
+            if (!packet.m_nBodySize)
+                continue;
+            if ((packet.m_packetType == RTMP_PACKET_TYPE_AUDIO) ||
+                    (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO) ||
+                    (packet.m_packetType == RTMP_PACKET_TYPE_INFO))
+            {
+                RTMP_Log(RTMP_LOGWARNING, "Received FLV packet before play()! Ignoring.");
+                RTMPPacket_Free(&packet);
+                continue;
+            }
+
+            RTMP_ClientPacket(r, &packet);
+            RTMPPacket_Free(&packet);
+        }
+    }
+
+    return r->m_bPlaying;
+}
+
+int
+RTMP_ReconnectStream(RTMP *r, int seekTime)
+{
+    RTMP_DeleteStream(r);
+
+    RTMP_SendCreateStream(r);
+
+    return RTMP_ConnectStream(r, seekTime);
+}
+
+int
+RTMP_ToggleStream(RTMP *r)
+{
+    int res;
+
+    if (!r->m_pausing)
+    {
+        if (RTMP_IsTimedout(r) && r->m_read.status == RTMP_READ_EOF)
+            r->m_read.status = 0;
+
+        res = RTMP_SendPause(r, TRUE, r->m_pauseStamp);
+        if (!res)
+            return res;
+
+        r->m_pausing = 1;
+        sleep(1);
+    }
+    res = RTMP_SendPause(r, FALSE, r->m_pauseStamp);
+    r->m_pausing = 3;
+    return res;
+}
+
+void
+RTMP_DeleteStream(RTMP *r)
+{
+    if (r->m_stream_id < 0)
+        return;
+
+    r->m_bPlaying = FALSE;
+
+    if ((r->Link.protocol & RTMP_FEATURE_WRITE))
+        SendFCUnpublish(r);
+
+    SendDeleteStream(r, r->m_stream_id);
+    r->m_stream_id = -1;
+}
+
+int
+RTMP_GetNextMediaPacket(RTMP *r, RTMPPacket *packet)
+{
+    int bHasMediaPacket = 0;
+
+    while (!bHasMediaPacket && RTMP_IsConnected(r)
+            && RTMP_ReadPacket(r, packet))
+    {
+        if (!RTMPPacket_IsReady(packet))
+        {
+            continue;
+        }
+
+        bHasMediaPacket = RTMP_ClientPacket(r, packet);
+
+        if (!bHasMediaPacket)
+        {
+            RTMPPacket_Free(packet);
+        }
+        else if (r->m_pausing == 3)
+        {
+            if (packet->m_nTimeStamp <= r->m_mediaStamp)
+            {
+                bHasMediaPacket = 0;
+#ifdef _DEBUG
+                RTMP_Log(RTMP_LOGDEBUG,
+                         "Skipped type: %02X, size: %d, TS: %d ms, abs TS: %d, pause: %d ms",
+                         packet->m_packetType, packet->m_nBodySize,
+                         packet->m_nTimeStamp, packet->m_hasAbsTimestamp,
+                         r->m_mediaStamp);
+#endif
+                RTMPPacket_Free(packet);
+                continue;
+            }
+            r->m_pausing = 0;
+        }
+    }
+
+    if (bHasMediaPacket)
+        r->m_bPlaying = TRUE;
+    else if (r->m_sb.sb_timedout && !r->m_pausing)
+        r->m_pauseStamp = r->m_mediaChannel < r->m_channelsAllocatedIn ?
+                          r->m_channelTimestamp[r->m_mediaChannel] : 0;
+
+    return bHasMediaPacket;
+}
+
+int
+RTMP_ClientPacket(RTMP *r, RTMPPacket *packet)
+{
+    int bHasMediaPacket = 0;
+    switch (packet->m_packetType)
+    {
+    case RTMP_PACKET_TYPE_CHUNK_SIZE:
+        /* chunk size */
+        HandleChangeChunkSize(r, packet);
+        break;
+
+    case RTMP_PACKET_TYPE_BYTES_READ_REPORT:
+        /* bytes read report */
+        RTMP_Log(RTMP_LOGDEBUG, "%s, received: bytes read report", __FUNCTION__);
+        break;
+
+    case RTMP_PACKET_TYPE_CONTROL:
+        /* ctrl */
+        HandleCtrl(r, packet);
+        break;
+
+    case RTMP_PACKET_TYPE_SERVER_BW:
+        /* server bw */
+        HandleServerBW(r, packet);
+        break;
+
+    case RTMP_PACKET_TYPE_CLIENT_BW:
+        /* client bw */
+        HandleClientBW(r, packet);
+        break;
+
+    case RTMP_PACKET_TYPE_AUDIO:
+        /* audio data */
+        /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: audio %lu bytes", __FUNCTION__, packet.m_nBodySize); */
+        HandleAudio(r, packet);
+        bHasMediaPacket = 1;
+        if (!r->m_mediaChannel)
+            r->m_mediaChannel = packet->m_nChannel;
+        if (!r->m_pausing)
+            r->m_mediaStamp = packet->m_nTimeStamp;
+        break;
+
+    case RTMP_PACKET_TYPE_VIDEO:
+        /* video data */
+        /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: video %lu bytes", __FUNCTION__, packet.m_nBodySize); */
+        HandleVideo(r, packet);
+        bHasMediaPacket = 1;
+        if (!r->m_mediaChannel)
+            r->m_mediaChannel = packet->m_nChannel;
+        if (!r->m_pausing)
+            r->m_mediaStamp = packet->m_nTimeStamp;
+        break;
+
+    case RTMP_PACKET_TYPE_FLEX_STREAM_SEND:
+        /* flex stream send */
+        RTMP_Log(RTMP_LOGDEBUG,
+                 "%s, flex stream send, size %u bytes, not supported, ignoring",
+                 __FUNCTION__, packet->m_nBodySize);
+        break;
+
+    case RTMP_PACKET_TYPE_FLEX_SHARED_OBJECT:
+        /* flex shared object */
+        RTMP_Log(RTMP_LOGDEBUG,
+                 "%s, flex shared object, size %u bytes, not supported, ignoring",
+                 __FUNCTION__, packet->m_nBodySize);
+        break;
+
+    case RTMP_PACKET_TYPE_FLEX_MESSAGE:
+        /* flex message */
+    {
+        RTMP_Log(RTMP_LOGDEBUG,
+                 "%s, flex message, size %u bytes, not fully supported",
+                 __FUNCTION__, packet->m_nBodySize);
+        /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
+
+        /* some DEBUG code */
+#if 0
+        RTMP_LIB_AMFObject obj;
+        int nRes = obj.Decode(packet.m_body+1, packet.m_nBodySize-1);
+        if(nRes < 0)
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, error decoding AMF3 packet", __FUNCTION__);
+            /*return; */
+        }
+
+        obj.Dump();
+#endif
+
+        if (HandleInvoke(r, packet->m_body + 1, packet->m_nBodySize - 1) == 1)
+            bHasMediaPacket = 2;
+        break;
+    }
+    case RTMP_PACKET_TYPE_INFO:
+        /* metadata (notify) */
+        RTMP_Log(RTMP_LOGDEBUG, "%s, received: notify %u bytes", __FUNCTION__,
+                 packet->m_nBodySize);
+        if (HandleMetadata(r, packet->m_body, packet->m_nBodySize))
+            bHasMediaPacket = 1;
+        break;
+
+    case RTMP_PACKET_TYPE_SHARED_OBJECT:
+        RTMP_Log(RTMP_LOGDEBUG, "%s, shared object, not supported, ignoring",
+                 __FUNCTION__);
+        break;
+
+    case RTMP_PACKET_TYPE_INVOKE:
+        /* invoke */
+        RTMP_Log(RTMP_LOGDEBUG, "%s, received: invoke %u bytes", __FUNCTION__,
+                 packet->m_nBodySize);
+        /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
+
+        if (HandleInvoke(r, packet->m_body, packet->m_nBodySize) == 1)
+            bHasMediaPacket = 2;
+        break;
+
+    case RTMP_PACKET_TYPE_FLASH_VIDEO:
+    {
+        /* go through FLV packets and handle metadata packets */
+        unsigned int pos = 0;
+        uint32_t nTimeStamp = packet->m_nTimeStamp;
+
+        while (pos + 11 < packet->m_nBodySize)
+        {
+            uint32_t dataSize = AMF_DecodeInt24(packet->m_body + pos + 1);	/* size without header (11) and prevTagSize (4) */
+
+            if (pos + 11 + dataSize + 4 > packet->m_nBodySize)
+            {
+                RTMP_Log(RTMP_LOGWARNING, "Stream corrupt?!");
+                break;
+            }
+            if (packet->m_body[pos] == 0x12)
+            {
+                HandleMetadata(r, packet->m_body + pos + 11, dataSize);
+            }
+            else if (packet->m_body[pos] == 8 || packet->m_body[pos] == 9)
+            {
+                nTimeStamp = AMF_DecodeInt24(packet->m_body + pos + 4);
+                nTimeStamp |= (packet->m_body[pos + 7] << 24);
+            }
+            pos += (11 + dataSize + 4);
+        }
+        if (!r->m_pausing)
+            r->m_mediaStamp = nTimeStamp;
+
+        /* FLV tag(s) */
+        /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: FLV tag(s) %lu bytes", __FUNCTION__, packet.m_nBodySize); */
+        bHasMediaPacket = 1;
+        break;
+    }
+    default:
+        RTMP_Log(RTMP_LOGDEBUG, "%s, unknown packet type received: 0x%02x", __FUNCTION__,
+                 packet->m_packetType);
+#ifdef _DEBUG
+        RTMP_LogHex(RTMP_LOGDEBUG, packet->m_body, packet->m_nBodySize);
+#endif
+    }
+
+    return bHasMediaPacket;
+}
+
+#if defined(_DEBUG) && !defined(WIN32)
+extern FILE *netstackdump;
+extern FILE *netstackdump_read;
+#endif
+
+static int
+ReadN(RTMP *r, char *buffer, int n)
+{
+    int nOriginalSize = n;
+    int avail;
+    char *ptr;
+
+    r->m_sb.sb_timedout = FALSE;
+
+#ifdef _DEBUG
+    memset(buffer, 0, n);
+#endif
+
+    ptr = buffer;
+    while (n > 0)
+    {
+        int nBytes = 0, nRead;
+        if (r->Link.protocol & RTMP_FEATURE_HTTP)
+        {
+            int refill = 0;
+            while (!r->m_resplen)
+            {
+                int ret;
+                if (r->m_sb.sb_size < 13 || refill)
+                {
+                    if (!r->m_unackd)
+                        HTTP_Post(r, RTMPT_IDLE, "", 1);
+                    if (RTMPSockBuf_Fill(&r->m_sb) < 1)
+                    {
+                        if (!r->m_sb.sb_timedout)
+                            RTMP_Close(r);
+                        return 0;
+                    }
+                }
+                if ((ret = HTTP_read(r, 0)) == -1)
+                {
+                    RTMP_Log(RTMP_LOGDEBUG, "%s, No valid HTTP response found", __FUNCTION__);
+                    RTMP_Close(r);
+                    return 0;
+                }
+                else if (ret == -2)
+                {
+                    refill = 1;
+                }
+                else
+                {
+                    refill = 0;
+                }
+            }
+            if (r->m_resplen && !r->m_sb.sb_size)
+                RTMPSockBuf_Fill(&r->m_sb);
+            avail = r->m_sb.sb_size;
+            if (avail > r->m_resplen)
+                avail = r->m_resplen;
+        }
+        else
+        {
+            avail = r->m_sb.sb_size;
+            if (avail == 0)
+            {
+                if (RTMPSockBuf_Fill(&r->m_sb) < 1)
+                {
+                    if (!r->m_sb.sb_timedout)
+                        RTMP_Close(r);
+                    return 0;
+                }
+                avail = r->m_sb.sb_size;
+            }
+        }
+        nRead = ((n < avail) ? n : avail);
+        if (nRead > 0)
+        {
+            memcpy(ptr, r->m_sb.sb_start, nRead);
+            r->m_sb.sb_start += nRead;
+            r->m_sb.sb_size -= nRead;
+            nBytes = nRead;
+            r->m_nBytesIn += nRead;
+            if (r->m_bSendCounter
+                    && r->m_nBytesIn > ( r->m_nBytesInSent + r->m_nClientBW / 10))
+                if (!SendBytesReceived(r))
+                    return FALSE;
+        }
+        /*RTMP_Log(RTMP_LOGDEBUG, "%s: %d bytes\n", __FUNCTION__, nBytes); */
+#if defined(_DEBUG) && !defined(WIN32)
+        fwrite(ptr, 1, nBytes, netstackdump_read);
+#endif
+
+        if (nBytes == 0)
+        {
+            RTMP_Log(RTMP_LOGDEBUG, "%s, RTMP socket closed by peer", __FUNCTION__);
+            /*goto again; */
+            RTMP_Close(r);
+            break;
+        }
+
+        if (r->Link.protocol & RTMP_FEATURE_HTTP)
+            r->m_resplen -= nBytes;
+
+#ifdef CRYPTO
+        if (r->Link.rc4keyIn)
+        {
+            RC4_encrypt(r->Link.rc4keyIn, nBytes, ptr);
+        }
+#endif
+
+        n -= nBytes;
+        ptr += nBytes;
+    }
+
+    return nOriginalSize - n;
+}
+
+static int
+WriteN(RTMP *r, const char *buffer, int n)
+{
+    const char *ptr = buffer;
+#ifdef CRYPTO
+    char *encrypted = 0;
+    char buf[RTMP_BUFFER_CACHE_SIZE];
+
+    if (r->Link.rc4keyOut)
+    {
+        if (n > sizeof(buf))
+            encrypted = (char *)malloc(n);
+        else
+            encrypted = (char *)buf;
+        ptr = encrypted;
+        RC4_encrypt2(r->Link.rc4keyOut, n, buffer, ptr);
+    }
+#endif
+
+    while (n > 0)
+    {
+        int nBytes;
+
+        if (r->Link.protocol & RTMP_FEATURE_HTTP)
+            nBytes = HTTP_Post(r, RTMPT_SEND, ptr, n);
+        else if(r->m_bCustomSend && r->m_customSendFunc)
+            nBytes = r->m_customSendFunc(&r->m_sb, ptr, n, r->m_customSendParam);
+        else
+            nBytes = RTMPSockBuf_Send(&r->m_sb, ptr, n);
+        /*RTMP_Log(RTMP_LOGDEBUG, "%s: %d\n", __FUNCTION__, nBytes); */
+
+        if (nBytes < 0)
+        {
+            int sockerr = GetSockError();
+            RTMP_Log(RTMP_LOGERROR, "%s, RTMP send error %d (%d bytes)", __FUNCTION__,
+                     sockerr, n);
+
+            if (sockerr == EINTR && !RTMP_ctrlC)
+                continue;
+
+            RTMP_Close(r);
+            n = 1;
+            break;
+        }
+
+        if (nBytes == 0)
+            break;
+
+        n -= nBytes;
+        ptr += nBytes;
+    }
+
+#ifdef CRYPTO
+    if (encrypted && encrypted != buf)
+        free(encrypted);
+#endif
+
+    return n == 0;
+}
+
+#define SAVC(x)	static const AVal av_##x = AVC(#x)
+
+SAVC(app);
+SAVC(connect);
+SAVC(flashVer);
+SAVC(swfUrl);
+SAVC(pageUrl);
+SAVC(tcUrl);
+SAVC(fpad);
+SAVC(capabilities);
+SAVC(audioCodecs);
+SAVC(videoCodecs);
+SAVC(videoFunction);
+SAVC(objectEncoding);
+SAVC(secureToken);
+SAVC(secureTokenResponse);
+SAVC(type);
+SAVC(nonprivate);
+
+static int
+SendConnectPacket(RTMP *r, RTMPPacket *cp)
+{
+    RTMPPacket packet;
+    char pbuf[4096], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    if (cp)
+        return RTMP_SendPacket(r, cp, TRUE);
+
+    if((r->Link.protocol & RTMP_FEATURE_WRITE) && r->m_bSendChunkSizeInfo)
+    {
+        packet.m_nChannel = 0x02;
+        packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
+        packet.m_packetType = RTMP_PACKET_TYPE_CHUNK_SIZE;
+        packet.m_nTimeStamp = 0;
+        packet.m_nInfoField2 = 0;
+        packet.m_hasAbsTimestamp = 0;
+        packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+        packet.m_nBodySize = 4;
+
+        enc = packet.m_body;
+        AMF_EncodeInt32(enc, pend, r->m_outChunkSize);
+
+        if(!RTMP_SendPacket(r, &packet, FALSE))
+            return 0;
+    }
+
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_connect);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_OBJECT;
+
+    enc = AMF_EncodeNamedString(enc, pend, &av_app, &r->Link.app);
+    if (!enc)
+        return FALSE;
+    if (r->Link.protocol & RTMP_FEATURE_WRITE)
+    {
+        enc = AMF_EncodeNamedString(enc, pend, &av_type, &av_nonprivate);
+        if (!enc)
+            return FALSE;
+    }
+    if (r->Link.flashVer.av_len)
+    {
+        enc = AMF_EncodeNamedString(enc, pend, &av_flashVer, &r->Link.flashVer);
+        if (!enc)
+            return FALSE;
+    }
+    if (r->Link.swfUrl.av_len)
+    {
+        enc = AMF_EncodeNamedString(enc, pend, &av_swfUrl, &r->Link.swfUrl);
+        if (!enc)
+            return FALSE;
+    }
+    if (r->Link.tcUrl.av_len)
+    {
+        enc = AMF_EncodeNamedString(enc, pend, &av_tcUrl, &r->Link.tcUrl);
+        if (!enc)
+            return FALSE;
+    }
+    if (!(r->Link.protocol & RTMP_FEATURE_WRITE))
+    {
+        enc = AMF_EncodeNamedBoolean(enc, pend, &av_fpad, FALSE);
+        if (!enc)
+            return FALSE;
+        enc = AMF_EncodeNamedNumber(enc, pend, &av_capabilities, 15.0);
+        if (!enc)
+            return FALSE;
+        enc = AMF_EncodeNamedNumber(enc, pend, &av_audioCodecs, r->m_fAudioCodecs);
+        if (!enc)
+            return FALSE;
+        enc = AMF_EncodeNamedNumber(enc, pend, &av_videoCodecs, r->m_fVideoCodecs);
+        if (!enc)
+            return FALSE;
+        enc = AMF_EncodeNamedNumber(enc, pend, &av_videoFunction, 1.0);
+        if (!enc)
+            return FALSE;
+        if (r->Link.pageUrl.av_len)
+        {
+            enc = AMF_EncodeNamedString(enc, pend, &av_pageUrl, &r->Link.pageUrl);
+            if (!enc)
+                return FALSE;
+        }
+    }
+    if (r->m_fEncoding != 0.0 || r->m_bSendEncoding)
+    {
+        /* AMF0, AMF3 not fully supported yet */
+        enc = AMF_EncodeNamedNumber(enc, pend, &av_objectEncoding, r->m_fEncoding);
+        if (!enc)
+            return FALSE;
+    }
+    if (enc + 3 >= pend)
+        return FALSE;
+    *enc++ = 0;
+    *enc++ = 0;			/* end of object - 0x00 0x00 0x09 */
+    *enc++ = AMF_OBJECT_END;
+
+    /* add auth string */
+    if (r->Link.auth.av_len)
+    {
+        enc = AMF_EncodeBoolean(enc, pend, r->Link.lFlags & RTMP_LF_AUTH);
+        if (!enc)
+            return FALSE;
+        enc = AMF_EncodeString(enc, pend, &r->Link.auth);
+        if (!enc)
+            return FALSE;
+    }
+    if (r->Link.extras.o_num)
+    {
+        int i;
+        for (i = 0; i < r->Link.extras.o_num; i++)
+        {
+            enc = AMFProp_Encode(&r->Link.extras.o_props[i], enc, pend);
+            if (!enc)
+                return FALSE;
+        }
+    }
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, TRUE);
+}
+
+#if 0				/* unused */
+SAVC(bgHasStream);
+
+static int
+SendBGHasStream(RTMP *r, double dId, AVal *playpath)
+{
+    RTMPPacket packet;
+    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_forceChannel = FALSE;
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_bgHasStream);
+    enc = AMF_EncodeNumber(enc, pend, dId);
+    *enc++ = AMF_NULL;
+
+    enc = AMF_EncodeString(enc, pend, playpath);
+    if (enc == NULL)
+        return FALSE;
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, TRUE);
+}
+#endif
+
+SAVC(createStream);
+
+int
+RTMP_SendCreateStream(RTMP *r)
+{
+    RTMPPacket packet;
+    char pbuf[256], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_createStream);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_NULL;		/* NULL */
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, TRUE);
+}
+
+SAVC(FCSubscribe);
+
+static int
+SendFCSubscribe(RTMP *r, AVal *subscribepath)
+{
+    RTMPPacket packet;
+    char pbuf[512], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    RTMP_Log(RTMP_LOGDEBUG, "FCSubscribe: %s", subscribepath->av_val);
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_FCSubscribe);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_NULL;
+    enc = AMF_EncodeString(enc, pend, subscribepath);
+
+    if (!enc)
+        return FALSE;
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, TRUE);
+}
+
+/* Justin.tv specific authentication */
+static const AVal av_NetStream_Authenticate_UsherToken = AVC("NetStream.Authenticate.UsherToken");
+
+static int
+SendUsherToken(RTMP *r, AVal *usherToken)
+{
+    RTMPPacket packet;
+    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    RTMP_Log(RTMP_LOGDEBUG, "UsherToken: %s", usherToken->av_val);
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_NetStream_Authenticate_UsherToken);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_NULL;
+    enc = AMF_EncodeString(enc, pend, usherToken);
+
+    if (!enc)
+        return FALSE;
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+/******************************************/
+
+SAVC(releaseStream);
+
+static int
+SendReleaseStream(RTMP *r)
+{
+    RTMPPacket packet;
+    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_releaseStream);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_NULL;
+    enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
+    if (!enc)
+        return FALSE;
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+
+SAVC(FCPublish);
+
+static int
+SendFCPublish(RTMP *r)
+{
+    RTMPPacket packet;
+    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_FCPublish);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_NULL;
+    enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
+    if (!enc)
+        return FALSE;
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+
+SAVC(FCUnpublish);
+
+static int
+SendFCUnpublish(RTMP *r)
+{
+    RTMPPacket packet;
+    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_FCUnpublish);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_NULL;
+    enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
+    if (!enc)
+        return FALSE;
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+
+SAVC(publish);
+SAVC(live);
+SAVC(record);
+
+static int
+SendPublish(RTMP *r)
+{
+    RTMPPacket packet;
+    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x04;	/* source channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = r->m_stream_id;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_publish);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_NULL;
+    enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
+    if (!enc)
+        return FALSE;
+
+    /* FIXME: should we choose live based on Link.lFlags & RTMP_LF_LIVE? */
+    enc = AMF_EncodeString(enc, pend, &av_live);
+    if (!enc)
+        return FALSE;
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, TRUE);
+}
+
+SAVC(deleteStream);
+
+static int
+SendDeleteStream(RTMP *r, double dStreamId)
+{
+    RTMPPacket packet;
+    char pbuf[256], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_deleteStream);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_NULL;
+    enc = AMF_EncodeNumber(enc, pend, dStreamId);
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    /* no response expected */
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+
+SAVC(pause);
+
+int
+RTMP_SendPause(RTMP *r, int DoPause, int iTime)
+{
+    RTMPPacket packet;
+    char pbuf[256], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x08;	/* video channel */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_pause);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_NULL;
+    enc = AMF_EncodeBoolean(enc, pend, DoPause);
+    enc = AMF_EncodeNumber(enc, pend, (double)iTime);
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    RTMP_Log(RTMP_LOGDEBUG, "%s, %d, pauseTime=%d", __FUNCTION__, DoPause, iTime);
+    return RTMP_SendPacket(r, &packet, TRUE);
+}
+
+int RTMP_Pause(RTMP *r, int DoPause)
+{
+    if (DoPause)
+        r->m_pauseStamp = r->m_mediaChannel < r->m_channelsAllocatedIn ?
+                          r->m_channelTimestamp[r->m_mediaChannel] : 0;
+    return RTMP_SendPause(r, DoPause, r->m_pauseStamp);
+}
+
+SAVC(seek);
+
+int
+RTMP_SendSeek(RTMP *r, int iTime)
+{
+    RTMPPacket packet;
+    char pbuf[256], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x08;	/* video channel */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_seek);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_NULL;
+    enc = AMF_EncodeNumber(enc, pend, (double)iTime);
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    r->m_read.flags |= RTMP_READ_SEEKING;
+    r->m_read.nResumeTS = 0;
+
+    return RTMP_SendPacket(r, &packet, TRUE);
+}
+
+int
+RTMP_SendServerBW(RTMP *r)
+{
+    RTMPPacket packet;
+    char pbuf[256], *pend = pbuf + sizeof(pbuf);
+
+    packet.m_nChannel = 0x02;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
+    packet.m_packetType = RTMP_PACKET_TYPE_SERVER_BW;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    packet.m_nBodySize = 4;
+
+    AMF_EncodeInt32(packet.m_body, pend, r->m_nServerBW);
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+
+int
+RTMP_SendClientBW(RTMP *r)
+{
+    RTMPPacket packet;
+    char pbuf[256], *pend = pbuf + sizeof(pbuf);
+
+    packet.m_nChannel = 0x02;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
+    packet.m_packetType = RTMP_PACKET_TYPE_CLIENT_BW;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    packet.m_nBodySize = 5;
+
+    AMF_EncodeInt32(packet.m_body, pend, r->m_nClientBW);
+    packet.m_body[4] = r->m_nClientBW2;
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+
+static int
+SendBytesReceived(RTMP *r)
+{
+    RTMPPacket packet;
+    char pbuf[256], *pend = pbuf + sizeof(pbuf);
+
+    packet.m_nChannel = 0x02;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_BYTES_READ_REPORT;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    packet.m_nBodySize = 4;
+
+    AMF_EncodeInt32(packet.m_body, pend, r->m_nBytesIn);	/* hard coded for now */
+    r->m_nBytesInSent = r->m_nBytesIn;
+
+    /*RTMP_Log(RTMP_LOGDEBUG, "Send bytes report. 0x%x (%d bytes)", (unsigned int)m_nBytesIn, m_nBytesIn); */
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+
+SAVC(_checkbw);
+
+static int
+SendCheckBW(RTMP *r)
+{
+    RTMPPacket packet;
+    char pbuf[256], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;	/* RTMP_GetTime(); */
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av__checkbw);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_NULL;
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    /* triggers _onbwcheck and eventually results in _onbwdone */
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+
+SAVC(_result);
+
+static int
+SendCheckBWResult(RTMP *r, double txn)
+{
+    RTMPPacket packet;
+    char pbuf[256], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0x16 * r->m_nBWCheckCounter;	/* temp inc value. till we figure it out. */
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av__result);
+    enc = AMF_EncodeNumber(enc, pend, txn);
+    *enc++ = AMF_NULL;
+    enc = AMF_EncodeNumber(enc, pend, (double)r->m_nBWCheckCounter++);
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+
+SAVC(ping);
+SAVC(pong);
+
+static int
+SendPong(RTMP *r, double txn)
+{
+    RTMPPacket packet;
+    char pbuf[256], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0x16 * r->m_nBWCheckCounter;	/* temp inc value. till we figure it out. */
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_pong);
+    enc = AMF_EncodeNumber(enc, pend, txn);
+    *enc++ = AMF_NULL;
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+
+SAVC(play);
+
+static int
+SendPlay(RTMP *r)
+{
+    RTMPPacket packet;
+    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x08;	/* we make 8 our stream channel */
+    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = r->m_stream_id;	/*0x01000000; */
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_play);
+    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
+    *enc++ = AMF_NULL;
+
+    RTMP_Log(RTMP_LOGDEBUG, "%s, seekTime=%d, stopTime=%d, sending play: %s",
+             __FUNCTION__, r->Link.seekTime, r->Link.stopTime,
+             r->Link.playpath.av_val);
+    enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
+    if (!enc)
+        return FALSE;
+
+    /* Optional parameters start and len.
+     *
+     * start: -2, -1, 0, positive number
+     *  -2: looks for a live stream, then a recorded stream,
+     *      if not found any open a live stream
+     *  -1: plays a live stream
+     * >=0: plays a recorded streams from 'start' milliseconds
+     */
+    if (r->Link.lFlags & RTMP_LF_LIVE)
+        enc = AMF_EncodeNumber(enc, pend, -1000.0);
+    else
+    {
+        if (r->Link.seekTime > 0.0)
+            enc = AMF_EncodeNumber(enc, pend, r->Link.seekTime);	/* resume from here */
+        else
+            enc = AMF_EncodeNumber(enc, pend, 0.0);	/*-2000.0);*/ /* recorded as default, -2000.0 is not reliable since that freezes the player if the stream is not found */
+    }
+    if (!enc)
+        return FALSE;
+
+    /* len: -1, 0, positive number
+     *  -1: plays live or recorded stream to the end (default)
+     *   0: plays a frame 'start' ms away from the beginning
+     *  >0: plays a live or recoded stream for 'len' milliseconds
+     */
+    /*enc += EncodeNumber(enc, -1.0); */ /* len */
+    if (r->Link.stopTime)
+    {
+        enc = AMF_EncodeNumber(enc, pend, r->Link.stopTime - r->Link.seekTime);
+        if (!enc)
+            return FALSE;
+    }
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, TRUE);
+}
+
+SAVC(set_playlist);
+SAVC(0);
+
+static int
+SendPlaylist(RTMP *r)
+{
+    RTMPPacket packet;
+    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x08;	/* we make 8 our stream channel */
+    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = r->m_stream_id;	/*0x01000000; */
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_set_playlist);
+    enc = AMF_EncodeNumber(enc, pend, 0);
+    *enc++ = AMF_NULL;
+    *enc++ = AMF_ECMA_ARRAY;
+    *enc++ = 0;
+    *enc++ = 0;
+    *enc++ = 0;
+    *enc++ = AMF_OBJECT;
+    enc = AMF_EncodeNamedString(enc, pend, &av_0, &r->Link.playpath);
+    if (!enc)
+        return FALSE;
+    if (enc + 3 >= pend)
+        return FALSE;
+    *enc++ = 0;
+    *enc++ = 0;
+    *enc++ = AMF_OBJECT_END;
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, TRUE);
+}
+
+static int
+SendSecureTokenResponse(RTMP *r, AVal *resp)
+{
+    RTMPPacket packet;
+    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
+    char *enc;
+
+    packet.m_nChannel = 0x03;	/* control channel (invoke) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
+    packet.m_nTimeStamp = 0;
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    enc = packet.m_body;
+    enc = AMF_EncodeString(enc, pend, &av_secureTokenResponse);
+    enc = AMF_EncodeNumber(enc, pend, 0.0);
+    *enc++ = AMF_NULL;
+    enc = AMF_EncodeString(enc, pend, resp);
+    if (!enc)
+        return FALSE;
+
+    packet.m_nBodySize = enc - packet.m_body;
+
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+
+/*
+from http://jira.red5.org/confluence/display/docs/Ping:
+
+Ping is the most mysterious message in RTMP and till now we haven't fully interpreted it yet. In summary, Ping message is used as a special command that are exchanged between client and server. This page aims to document all known Ping messages. Expect the list to grow.
+
+The type of Ping packet is 0x4 and contains two mandatory parameters and two optional parameters. The first parameter is the type of Ping and in short integer. The second parameter is the target of the ping. As Ping is always sent in Channel 2 (control channel) and the target object in RTMP header is always 0 which means the Connection object, it's necessary to put an extra parameter to indicate the exact target object the Ping is sent to. The second parameter takes this responsibility. The value has the same meaning as the target object field in RTMP header. (The second value could also be used as other purposes, like RTT Ping/Pong. It is used as the timestamp.) The third and fourth parameters are optional and could be looked upon as the parameter of the Ping packet. Below is an unexhausted list of Ping messages.
+
+    * type 0: Clear the stream. No third and fourth parameters. The second parameter could be 0. After the connection is established, a Ping 0,0 will be sent from server to client. The message will also be sent to client on the start of Play and in response of a Seek or Pause/Resume request. This Ping tells client to re-calibrate the clock with the timestamp of the next packet server sends.
+    * type 1: Tell the stream to clear the playing buffer.
+    * type 3: Buffer time of the client. The third parameter is the buffer time in millisecond.
+    * type 4: Reset a stream. Used together with type 0 in the case of VOD. Often sent before type 0.
+    * type 6: Ping the client from server. The second parameter is the current time.
+    * type 7: Pong reply from client. The second parameter is the time the server sent with his ping request.
+    * type 26: SWFVerification request
+    * type 27: SWFVerification response
+*/
+int
+RTMP_SendCtrl(RTMP *r, short nType, unsigned int nObject, unsigned int nTime)
+{
+    RTMPPacket packet;
+    char pbuf[256], *pend = pbuf + sizeof(pbuf);
+    int nSize;
+    char *buf;
+
+    RTMP_Log(RTMP_LOGDEBUG, "sending ctrl. type: 0x%04x", (unsigned short)nType);
+
+    packet.m_nChannel = 0x02;	/* control channel (ping) */
+    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+    packet.m_packetType = RTMP_PACKET_TYPE_CONTROL;
+    packet.m_nTimeStamp = 0;	/* RTMP_GetTime(); */
+    packet.m_nInfoField2 = 0;
+    packet.m_hasAbsTimestamp = 0;
+    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
+
+    switch(nType)
+    {
+    case 0x03:
+        nSize = 10;
+        break;	/* buffer time */
+    case 0x1A:
+        nSize = 3;
+        break;	/* SWF verify request */
+    case 0x1B:
+        nSize = 44;
+        break;	/* SWF verify response */
+    default:
+        nSize = 6;
+        break;
+    }
+
+    packet.m_nBodySize = nSize;
+
+    buf = packet.m_body;
+    buf = AMF_EncodeInt16(buf, pend, nType);
+
+    if (nType == 0x1B)
+    {
+#ifdef CRYPTO
+        memcpy(buf, r->Link.SWFVerificationResponse, 42);
+        RTMP_Log(RTMP_LOGDEBUG, "Sending SWFVerification response: ");
+        RTMP_LogHex(RTMP_LOGDEBUG, (uint8_t *)packet.m_body, packet.m_nBodySize);
+#endif
+    }
+    else if (nType == 0x1A)
+    {
+        *buf = nObject & 0xff;
+    }
+    else
+    {
+        if (nSize > 2)
+            buf = AMF_EncodeInt32(buf, pend, nObject);
+
+        if (nSize > 6)
+            buf = AMF_EncodeInt32(buf, pend, nTime);
+    }
+
+    return RTMP_SendPacket(r, &packet, FALSE);
+}
+
+static void
+AV_erase(RTMP_METHOD *vals, int *num, int i, int freeit)
+{
+    if (freeit)
+        free(vals[i].name.av_val);
+    (*num)--;
+    for (; i < *num; i++)
+    {
+        vals[i] = vals[i + 1];
+    }
+    vals[i].name.av_val = NULL;
+    vals[i].name.av_len = 0;
+    vals[i].num = 0;
+}
+
+void
+RTMP_DropRequest(RTMP *r, int i, int freeit)
+{
+    AV_erase(r->m_methodCalls, &r->m_numCalls, i, freeit);
+}
+
+static void
+AV_queue(RTMP_METHOD **vals, int *num, AVal *av, int txn)
+{
+    char *tmp;
+    if (!(*num & 0x0f))
+        *vals = realloc(*vals, (*num + 16) * sizeof(RTMP_METHOD));
+    tmp = malloc(av->av_len + 1);
+    memcpy(tmp, av->av_val, av->av_len);
+    tmp[av->av_len] = '\0';
+    (*vals)[*num].num = txn;
+    (*vals)[*num].name.av_len = av->av_len;
+    (*vals)[(*num)++].name.av_val = tmp;
+}
+
+static void
+AV_clear(RTMP_METHOD *vals, int num)
+{
+    int i;
+    for (i = 0; i < num; i++)
+        free(vals[i].name.av_val);
+    free(vals);
+}
+
+
+#if defined(CRYPTO) || defined(USE_ONLY_MD5)
+static int
+b64enc(const unsigned char *input, int length, char *output, int maxsize)
+{
+#ifdef USE_POLARSSL
+    size_t buf_size = maxsize;
+    if(base64_encode((unsigned char *) output, &buf_size, input, length) == 0)
+    {
+        output[buf_size] = '\0';
+        return 1;
+    }
+    else
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "%s, error", __FUNCTION__);
+        return 0;
+    }
+#elif defined(USE_GNUTLS)
+    if (BASE64_ENCODE_RAW_LENGTH(length) <= maxsize)
+        base64_encode_raw((uint8_t*) output, length, input);
+    else
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "%s, error", __FUNCTION__);
+        return 0;
+    }
+#elif defined(USE_ONLY_MD5)
+    base64_encodestate state;
+
+    base64_init_encodestate(&state);
+    output += base64_encode_block((const char *)input, length, output, &state);
+    base64_encode_blockend(output, &state);
+
+#else   /* USE_OPENSSL */
+    BIO *bmem, *b64;
+    BUF_MEM *bptr;
+
+    b64 = BIO_new(BIO_f_base64());
+    bmem = BIO_new(BIO_s_mem());
+    b64 = BIO_push(b64, bmem);
+    BIO_write(b64, input, length);
+    if (BIO_flush(b64) == 1)
+    {
+        BIO_get_mem_ptr(b64, &bptr);
+        memcpy(output, bptr->data, bptr->length-1);
+        output[bptr->length-1] = '\0';
+    }
+    else
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "%s, error", __FUNCTION__);
+        return 0;
+    }
+    BIO_free_all(b64);
+#endif
+    return 1;
+}
+
+#ifdef USE_POLARSSL
+#define MD5_CTX	md5_context
+#define MD5_Init(ctx)	md5_starts(ctx)
+#define MD5_Update(ctx,data,len)	md5_update(ctx,(unsigned char *)data,len)
+#define MD5_Final(dig,ctx)	md5_finish(ctx,dig)
+#elif defined(USE_GNUTLS)
+typedef struct md5_ctx	MD5_CTX;
+#define MD5_Init(ctx)	md5_init(ctx)
+#define MD5_Update(ctx,data,len)	md5_update(ctx,len,data)
+#define MD5_Final(dig,ctx)	md5_digest(ctx,MD5_DIGEST_LENGTH,dig)
+#else
+#endif
+
+static const AVal av_authmod_adobe = AVC("authmod=adobe");
+static const AVal av_authmod_llnw  = AVC("authmod=llnw");
+
+static void hexenc(unsigned char *inbuf, int len, char *dst)
+{
+    char *ptr = dst;
+    while(len--)
+    {
+        sprintf(ptr, "%02x", *inbuf++);
+        ptr += 2;
+    }
+    *ptr = '\0';
+}
+
+static int
+PublisherAuth(RTMP *r, AVal *description)
+{
+    char *token_in = NULL;
+    char *ptr;
+    unsigned char md5sum_val[MD5_DIGEST_LENGTH+1];
+    MD5_CTX md5ctx;
+    int challenge2_data;
+#define RESPONSE_LEN 32
+#define CHALLENGE2_LEN 16
+#define SALTED2_LEN (32+8+8+8)
+#define B64DIGEST_LEN	24	/* 16 byte digest => 22 b64 chars + 2 chars padding */
+#define B64INT_LEN	8	/* 4 byte int => 6 b64 chars + 2 chars padding */
+#define HEXHASH_LEN	(2*MD5_DIGEST_LENGTH)
+    char response[RESPONSE_LEN];
+    char challenge2[CHALLENGE2_LEN];
+    char salted2[SALTED2_LEN];
+    AVal pubToken;
+
+    if (strstr(description->av_val, av_authmod_adobe.av_val) != NULL)
+    {
+        if(strstr(description->av_val, "code=403 need auth") != NULL)
+        {
+            if (strstr(r->Link.app.av_val, av_authmod_adobe.av_val) != NULL)
+            {
+                RTMP_Log(RTMP_LOGERROR, "%s, wrong pubUser & pubPasswd for publisher auth", __FUNCTION__);
+                r->Link.pFlags |= RTMP_PUB_CLEAN;
+                return 0;
+            }
+            else if(r->Link.pubUser.av_len && r->Link.pubPasswd.av_len)
+            {
+                pubToken.av_val = malloc(r->Link.pubUser.av_len + av_authmod_adobe.av_len + 8);
+                pubToken.av_len = sprintf(pubToken.av_val, "?%s&user=%s",
+                                          av_authmod_adobe.av_val,
+                                          r->Link.pubUser.av_val);
+                RTMP_Log(RTMP_LOGDEBUG, "%s, pubToken1: %s", __FUNCTION__, pubToken.av_val);
+                r->Link.pFlags |= RTMP_PUB_NAME;
+            }
+            else
+            {
+                RTMP_Log(RTMP_LOGERROR, "%s, need to set pubUser & pubPasswd for publisher auth", __FUNCTION__);
+                r->Link.pFlags |= RTMP_PUB_CLEAN;
+                return 0;
+            }
+        }
+        else if((token_in = strstr(description->av_val, "?reason=needauth")) != NULL)
+        {
+            char *par, *val = NULL, *orig_ptr;
+            AVal user, salt, opaque, challenge, *aptr = NULL;
+            opaque.av_len = 0;
+            challenge.av_len = 0;
+
+            ptr = orig_ptr = strdup(token_in);
+            while (ptr)
+            {
+                par = ptr;
+                ptr = strchr(par, '&');
+                if(ptr)
+                    *ptr++ = '\0';
+
+                val =  strchr(par, '=');
+                if(val)
+                    *val++ = '\0';
+
+                if (aptr)
+                {
+                    aptr->av_len = par - aptr->av_val - 1;
+                    aptr = NULL;
+                }
+                if (strcmp(par, "user") == 0)
+                {
+                    user.av_val = val;
+                    aptr = &user;
+                }
+                else if (strcmp(par, "salt") == 0)
+                {
+                    salt.av_val = val;
+                    aptr = &salt;
+                }
+                else if (strcmp(par, "opaque") == 0)
+                {
+                    opaque.av_val = val;
+                    aptr = &opaque;
+                }
+                else if (strcmp(par, "challenge") == 0)
+                {
+                    challenge.av_val = val;
+                    aptr = &challenge;
+                }
+
+                RTMP_Log(RTMP_LOGDEBUG, "%s, par:\"%s\" = val:\"%s\"", __FUNCTION__, par, val);
+            }
+            if (aptr)
+                aptr->av_len = (int)strlen(aptr->av_val);
+
+            /* hash1 = base64enc(md5(user + _aodbeAuthSalt + password)) */
+            MD5_Init(&md5ctx);
+            MD5_Update(&md5ctx, user.av_val, user.av_len);
+            MD5_Update(&md5ctx, salt.av_val, salt.av_len);
+            MD5_Update(&md5ctx, r->Link.pubPasswd.av_val, r->Link.pubPasswd.av_len);
+            MD5_Final(md5sum_val, &md5ctx);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s%s%s) =>", __FUNCTION__,
+                     user.av_val, salt.av_val, r->Link.pubPasswd.av_val);
+            RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
+
+            b64enc(md5sum_val, MD5_DIGEST_LENGTH, salted2, SALTED2_LEN);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, b64(md5_1) = %s", __FUNCTION__, salted2);
+
+            challenge2_data = rand();
+
+            b64enc((unsigned char *) &challenge2_data, sizeof(int), challenge2, CHALLENGE2_LEN);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, b64(%d) = %s", __FUNCTION__, challenge2_data, challenge2);
+
+            MD5_Init(&md5ctx);
+            MD5_Update(&md5ctx, salted2, B64DIGEST_LEN);
+            /* response = base64enc(md5(hash1 + opaque + challenge2)) */
+            if (opaque.av_len)
+                MD5_Update(&md5ctx, opaque.av_val, opaque.av_len);
+            else if (challenge.av_len)
+                MD5_Update(&md5ctx, challenge.av_val, challenge.av_len);
+            MD5_Update(&md5ctx, challenge2, B64INT_LEN);
+            MD5_Final(md5sum_val, &md5ctx);
+
+            RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s%s%s) =>", __FUNCTION__,
+                     salted2, opaque.av_len ? opaque.av_val : "", challenge2);
+            RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
+
+            b64enc(md5sum_val, MD5_DIGEST_LENGTH, response, RESPONSE_LEN);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, b64(md5_2) = %s", __FUNCTION__, response);
+
+            /* have all hashes, create auth token for the end of app */
+            pubToken.av_val = malloc(32 + B64INT_LEN + B64DIGEST_LEN + opaque.av_len);
+            pubToken.av_len = sprintf(pubToken.av_val,
+                                      "&challenge=%s&response=%s&opaque=%s",
+                                      challenge2,
+                                      response,
+                                      opaque.av_len ? opaque.av_val : "");
+            RTMP_Log(RTMP_LOGDEBUG, "%s, pubToken2: %s", __FUNCTION__, pubToken.av_val);
+            free(orig_ptr);
+            r->Link.pFlags |= RTMP_PUB_RESP|RTMP_PUB_CLATE;
+        }
+        else if(strstr(description->av_val, "?reason=authfailed") != NULL)
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: wrong password", __FUNCTION__);
+            r->Link.pFlags |= RTMP_PUB_CLEAN;
+            return 0;
+        }
+        else if(strstr(description->av_val, "?reason=nosuchuser") != NULL)
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: no such user", __FUNCTION__);
+            r->Link.pFlags |= RTMP_PUB_CLEAN;
+            return 0;
+        }
+        else
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: unknown auth mode: %s",
+                     __FUNCTION__, description->av_val);
+            r->Link.pFlags |= RTMP_PUB_CLEAN;
+            return 0;
+        }
+
+        ptr = malloc(r->Link.app.av_len + pubToken.av_len);
+        strncpy(ptr, r->Link.app.av_val, r->Link.app.av_len);
+        strncpy(ptr + r->Link.app.av_len, pubToken.av_val, pubToken.av_len);
+        r->Link.app.av_len += pubToken.av_len;
+        if(r->Link.pFlags & RTMP_PUB_ALLOC)
+            free(r->Link.app.av_val);
+        r->Link.app.av_val = ptr;
+
+        ptr = malloc(r->Link.tcUrl.av_len + pubToken.av_len);
+        strncpy(ptr, r->Link.tcUrl.av_val, r->Link.tcUrl.av_len);
+        strncpy(ptr + r->Link.tcUrl.av_len, pubToken.av_val, pubToken.av_len);
+        r->Link.tcUrl.av_len += pubToken.av_len;
+        if(r->Link.pFlags & RTMP_PUB_ALLOC)
+            free(r->Link.tcUrl.av_val);
+        r->Link.tcUrl.av_val = ptr;
+
+        free(pubToken.av_val);
+        r->Link.pFlags |= RTMP_PUB_ALLOC;
+
+        RTMP_Log(RTMP_LOGDEBUG, "%s, new app: %.*s tcUrl: %.*s playpath: %s", __FUNCTION__,
+                 r->Link.app.av_len, r->Link.app.av_val,
+                 r->Link.tcUrl.av_len, r->Link.tcUrl.av_val,
+                 r->Link.playpath.av_val);
+    }
+    else if (strstr(description->av_val, av_authmod_llnw.av_val) != NULL)
+    {
+        if(strstr(description->av_val, "code=403 need auth") != NULL)
+        {
+            /* This part seems to be the same for llnw and adobe */
+
+            if (strstr(r->Link.app.av_val, av_authmod_llnw.av_val) != NULL)
+            {
+                RTMP_Log(RTMP_LOGERROR, "%s, wrong pubUser & pubPasswd for publisher auth", __FUNCTION__);
+                r->Link.pFlags |= RTMP_PUB_CLEAN;
+                return 0;
+            }
+            else if(r->Link.pubUser.av_len && r->Link.pubPasswd.av_len)
+            {
+                pubToken.av_val = malloc(r->Link.pubUser.av_len + av_authmod_llnw.av_len + 8);
+                pubToken.av_len = sprintf(pubToken.av_val, "?%s&user=%s",
+                                          av_authmod_llnw.av_val,
+                                          r->Link.pubUser.av_val);
+                RTMP_Log(RTMP_LOGDEBUG, "%s, pubToken1: %s", __FUNCTION__, pubToken.av_val);
+                r->Link.pFlags |= RTMP_PUB_NAME;
+            }
+            else
+            {
+                RTMP_Log(RTMP_LOGERROR, "%s, need to set pubUser & pubPasswd for publisher auth", __FUNCTION__);
+                r->Link.pFlags |= RTMP_PUB_CLEAN;
+                return 0;
+            }
+        }
+        else if((token_in = strstr(description->av_val, "?reason=needauth")) != NULL)
+        {
+            char *orig_ptr;
+            char *par, *val = NULL;
+            char hash1[HEXHASH_LEN+1], hash2[HEXHASH_LEN+1], hash3[HEXHASH_LEN+1];
+            AVal user, nonce, *aptr = NULL;
+            AVal apptmp;
+
+            /* llnw auth method
+             * Seems to be closely based on HTTP Digest Auth:
+             *    http://tools.ietf.org/html/rfc2617
+             *    http://en.wikipedia.org/wiki/Digest_access_authentication
+             */
+
+            const char authmod[] = "llnw";
+            const char realm[] = "live";
+            const char method[] = "publish";
+            const char qop[] = "auth";
+            /* nc = 1..connection count (or rather, number of times cnonce has been reused) */
+            int nc = 1;
+            /* nchex = hexenc(nc) (8 hex digits according to RFC 2617) */
+            char nchex[9];
+            /* cnonce = hexenc(4 random bytes) (initialized on first connection) */
+            char cnonce[9];
+
+            ptr = orig_ptr = strdup(token_in);
+            /* Extract parameters (we need user and nonce) */
+            while (ptr)
+            {
+                par = ptr;
+                ptr = strchr(par, '&');
+                if(ptr)
+                    *ptr++ = '\0';
+
+                val =  strchr(par, '=');
+                if(val)
+                    *val++ = '\0';
+
+                if (aptr)
+                {
+                    aptr->av_len = par - aptr->av_val - 1;
+                    aptr = NULL;
+                }
+                if (strcmp(par, "user") == 0)
+                {
+                    user.av_val = val;
+                    aptr = &user;
+                }
+                else if (strcmp(par, "nonce") == 0)
+                {
+                    nonce.av_val = val;
+                    aptr = &nonce;
+                }
+
+                RTMP_Log(RTMP_LOGDEBUG, "%s, par:\"%s\" = val:\"%s\"", __FUNCTION__, par, val);
+            }
+            if (aptr)
+                aptr->av_len = (int)strlen(aptr->av_val);
+
+            /* FIXME: handle case where user==NULL or nonce==NULL */
+
+            sprintf(nchex, "%08x", nc);
+            sprintf(cnonce, "%08x", rand());
+
+            /* hash1 = hexenc(md5(user + ":" + realm + ":" + password)) */
+            MD5_Init(&md5ctx);
+            MD5_Update(&md5ctx, user.av_val, user.av_len);
+            MD5_Update(&md5ctx, ":", 1);
+            MD5_Update(&md5ctx, (void *)realm, sizeof(realm)-1);
+            MD5_Update(&md5ctx, ":", 1);
+            MD5_Update(&md5ctx, r->Link.pubPasswd.av_val, r->Link.pubPasswd.av_len);
+            MD5_Final(md5sum_val, &md5ctx);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s:%s:%s) =>", __FUNCTION__,
+                     user.av_val, realm, r->Link.pubPasswd.av_val);
+            RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
+            hexenc(md5sum_val, MD5_DIGEST_LENGTH, hash1);
+
+            /* hash2 = hexenc(md5(method + ":/" + app + "/" + appInstance)) */
+            /* Extract appname + appinstance without query parameters */
+            apptmp = r->Link.app;
+            ptr = strchr(apptmp.av_val, '?');
+            if (ptr)
+                apptmp.av_len = ptr - apptmp.av_val;
+
+            MD5_Init(&md5ctx);
+            MD5_Update(&md5ctx, (void *)method, sizeof(method)-1);
+            MD5_Update(&md5ctx, ":/", 2);
+            MD5_Update(&md5ctx, apptmp.av_val, apptmp.av_len);
+            MD5_Final(md5sum_val, &md5ctx);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s:/%.*s) =>", __FUNCTION__,
+                     method, apptmp.av_len, apptmp.av_val);
+            RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
+            hexenc(md5sum_val, MD5_DIGEST_LENGTH, hash2);
+
+            /* hash3 = hexenc(md5(hash1 + ":" + nonce + ":" + nchex + ":" + cnonce + ":" + qop + ":" + hash2)) */
+            MD5_Init(&md5ctx);
+            MD5_Update(&md5ctx, hash1, HEXHASH_LEN);
+            MD5_Update(&md5ctx, ":", 1);
+            MD5_Update(&md5ctx, nonce.av_val, nonce.av_len);
+            MD5_Update(&md5ctx, ":", 1);
+            MD5_Update(&md5ctx, nchex, sizeof(nchex)-1);
+            MD5_Update(&md5ctx, ":", 1);
+            MD5_Update(&md5ctx, cnonce, sizeof(cnonce)-1);
+            MD5_Update(&md5ctx, ":", 1);
+            MD5_Update(&md5ctx, (void *)qop, sizeof(qop)-1);
+            MD5_Update(&md5ctx, ":", 1);
+            MD5_Update(&md5ctx, hash2, HEXHASH_LEN);
+            MD5_Final(md5sum_val, &md5ctx);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s:%s:%s:%s:%s:%s) =>", __FUNCTION__,
+                     hash1, nonce.av_val, nchex, cnonce, qop, hash2);
+            RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
+            hexenc(md5sum_val, MD5_DIGEST_LENGTH, hash3);
+
+            /* pubToken = &authmod=<authmod>&user=<username>&nonce=<nonce>&cnonce=<cnonce>&nc=<nchex>&response=<hash3> */
+            /* Append nonces and response to query string which already contains
+             * user + authmod */
+            pubToken.av_val = malloc(64 + sizeof(authmod)-1 + user.av_len + nonce.av_len + sizeof(cnonce)-1 + sizeof(nchex)-1 + HEXHASH_LEN);
+            sprintf(pubToken.av_val,
+                    "&nonce=%s&cnonce=%s&nc=%s&response=%s",
+                    nonce.av_val, cnonce, nchex, hash3);
+            pubToken.av_len = (int)strlen(pubToken.av_val);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, pubToken2: %s", __FUNCTION__, pubToken.av_val);
+            r->Link.pFlags |= RTMP_PUB_RESP|RTMP_PUB_CLATE;
+
+            free(orig_ptr);
+        }
+        else if(strstr(description->av_val, "?reason=authfail") != NULL)
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed", __FUNCTION__);
+            r->Link.pFlags |= RTMP_PUB_CLEAN;
+            return 0;
+        }
+        else if(strstr(description->av_val, "?reason=nosuchuser") != NULL)
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: no such user", __FUNCTION__);
+            r->Link.pFlags |= RTMP_PUB_CLEAN;
+            return 0;
+        }
+        else
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: unknown auth mode: %s",
+                     __FUNCTION__, description->av_val);
+            r->Link.pFlags |= RTMP_PUB_CLEAN;
+            return 0;
+        }
+
+        ptr = malloc(r->Link.app.av_len + pubToken.av_len);
+        strncpy(ptr, r->Link.app.av_val, r->Link.app.av_len);
+        strncpy(ptr + r->Link.app.av_len, pubToken.av_val, pubToken.av_len);
+        r->Link.app.av_len += pubToken.av_len;
+        if(r->Link.pFlags & RTMP_PUB_ALLOC)
+            free(r->Link.app.av_val);
+        r->Link.app.av_val = ptr;
+
+        ptr = malloc(r->Link.tcUrl.av_len + pubToken.av_len);
+        strncpy(ptr, r->Link.tcUrl.av_val, r->Link.tcUrl.av_len);
+        strncpy(ptr + r->Link.tcUrl.av_len, pubToken.av_val, pubToken.av_len);
+        r->Link.tcUrl.av_len += pubToken.av_len;
+        if(r->Link.pFlags & RTMP_PUB_ALLOC)
+            free(r->Link.tcUrl.av_val);
+        r->Link.tcUrl.av_val = ptr;
+
+        free(pubToken.av_val);
+        r->Link.pFlags |= RTMP_PUB_ALLOC;
+
+        RTMP_Log(RTMP_LOGDEBUG, "%s, new app: %.*s tcUrl: %.*s playpath: %s", __FUNCTION__,
+                 r->Link.app.av_len, r->Link.app.av_val,
+                 r->Link.tcUrl.av_len, r->Link.tcUrl.av_val,
+                 r->Link.playpath.av_val);
+    }
+    else
+    {
+        return 0;
+    }
+    return 1;
+}
+#endif
+
+
+SAVC(onBWDone);
+SAVC(onFCSubscribe);
+SAVC(onFCUnsubscribe);
+SAVC(_onbwcheck);
+SAVC(_onbwdone);
+SAVC(_error);
+SAVC(close);
+SAVC(code);
+SAVC(level);
+SAVC(description);
+SAVC(onStatus);
+SAVC(playlist_ready);
+static const AVal av_NetStream_Failed = AVC("NetStream.Failed");
+static const AVal av_NetStream_Play_Failed = AVC("NetStream.Play.Failed");
+static const AVal av_NetStream_Play_StreamNotFound =
+    AVC("NetStream.Play.StreamNotFound");
+static const AVal av_NetConnection_Connect_InvalidApp =
+    AVC("NetConnection.Connect.InvalidApp");
+static const AVal av_NetStream_Play_Start = AVC("NetStream.Play.Start");
+static const AVal av_NetStream_Play_Complete = AVC("NetStream.Play.Complete");
+static const AVal av_NetStream_Play_Stop = AVC("NetStream.Play.Stop");
+static const AVal av_NetStream_Seek_Notify = AVC("NetStream.Seek.Notify");
+static const AVal av_NetStream_Pause_Notify = AVC("NetStream.Pause.Notify");
+static const AVal av_NetStream_Play_PublishNotify =
+    AVC("NetStream.Play.PublishNotify");
+static const AVal av_NetStream_Play_UnpublishNotify =
+    AVC("NetStream.Play.UnpublishNotify");
+static const AVal av_NetStream_Publish_Start = AVC("NetStream.Publish.Start");
+static const AVal av_NetStream_Publish_Rejected = AVC("NetStream.Publish.Rejected");
+static const AVal av_NetStream_Publish_Denied = AVC("NetStream.Publish.Denied");
+static const AVal av_NetConnection_Connect_Rejected =
+    AVC("NetConnection.Connect.Rejected");
+
+/* Returns 0 for OK/Failed/error, 1 for 'Stop or Complete' */
+static int
+HandleInvoke(RTMP *r, const char *body, unsigned int nBodySize)
+{
+    AMFObject obj;
+    AVal method;
+    double txn;
+    int ret = 0, nRes;
+    if (body[0] != 0x02)		/* make sure it is a string method name we start with */
+    {
+        RTMP_Log(RTMP_LOGWARNING, "%s, Sanity failed. no string method in invoke packet",
+                 __FUNCTION__);
+        return 0;
+    }
+
+    nRes = AMF_Decode(&obj, body, nBodySize, FALSE);
+    if (nRes < 0)
+    {
+        RTMP_Log(RTMP_LOGERROR, "%s, error decoding invoke packet", __FUNCTION__);
+        return 0;
+    }
+
+    AMF_Dump(&obj);
+    AMFProp_GetString(AMF_GetProp(&obj, NULL, 0), &method);
+    txn = AMFProp_GetNumber(AMF_GetProp(&obj, NULL, 1));
+    RTMP_Log(RTMP_LOGDEBUG, "%s, server invoking <%s>", __FUNCTION__, method.av_val);
+
+    if (AVMATCH(&method, &av__result))
+    {
+        AVal methodInvoked = {0};
+        int i;
+
+        for (i=0; i<r->m_numCalls; i++)
+        {
+            if (r->m_methodCalls[i].num == (int)txn)
+            {
+                methodInvoked = r->m_methodCalls[i].name;
+                AV_erase(r->m_methodCalls, &r->m_numCalls, i, FALSE);
+                break;
+            }
+        }
+        if (!methodInvoked.av_val)
+        {
+            RTMP_Log(RTMP_LOGDEBUG, "%s, received result id %f without matching request",
+                     __FUNCTION__, txn);
+            goto leave;
+        }
+
+        RTMP_Log(RTMP_LOGDEBUG, "%s, received result for method call <%s>", __FUNCTION__,
+                 methodInvoked.av_val);
+
+        if (AVMATCH(&methodInvoked, &av_connect))
+        {
+            if (r->Link.token.av_len)
+            {
+                AMFObjectProperty p;
+                if (RTMP_FindFirstMatchingProperty(&obj, &av_secureToken, &p))
+                {
+                    DecodeTEA(&r->Link.token, &p.p_vu.p_aval);
+                    SendSecureTokenResponse(r, &p.p_vu.p_aval);
+                }
+            }
+            if (r->Link.protocol & RTMP_FEATURE_WRITE)
+            {
+                SendReleaseStream(r);
+                SendFCPublish(r);
+            }
+            else
+            {
+                RTMP_SendServerBW(r);
+                RTMP_SendCtrl(r, 3, 0, 300);
+            }
+            RTMP_SendCreateStream(r);
+
+            if (!(r->Link.protocol & RTMP_FEATURE_WRITE))
+            {
+                /* Authenticate on Justin.tv legacy servers before sending FCSubscribe */
+                if (r->Link.usherToken.av_len)
+                    SendUsherToken(r, &r->Link.usherToken);
+                /* Send the FCSubscribe if live stream or if subscribepath is set */
+                if (r->Link.subscribepath.av_len)
+                    SendFCSubscribe(r, &r->Link.subscribepath);
+                else if (r->Link.lFlags & RTMP_LF_LIVE)
+                    SendFCSubscribe(r, &r->Link.playpath);
+            }
+        }
+        else if (AVMATCH(&methodInvoked, &av_createStream))
+        {
+            r->m_stream_id = (int)AMFProp_GetNumber(AMF_GetProp(&obj, NULL, 3));
+
+            if (r->Link.protocol & RTMP_FEATURE_WRITE)
+            {
+                SendPublish(r);
+            }
+            else
+            {
+                if (r->Link.lFlags & RTMP_LF_PLST)
+                    SendPlaylist(r);
+                SendPlay(r);
+                RTMP_SendCtrl(r, 3, r->m_stream_id, r->m_nBufferMS);
+            }
+        }
+        else if (AVMATCH(&methodInvoked, &av_play) ||
+                 AVMATCH(&methodInvoked, &av_publish))
+        {
+            r->m_bPlaying = TRUE;
+        }
+        free(methodInvoked.av_val);
+    }
+    else if (AVMATCH(&method, &av_onBWDone))
+    {
+        if (!r->m_nBWCheckCounter)
+            SendCheckBW(r);
+    }
+    else if (AVMATCH(&method, &av_onFCSubscribe))
+    {
+        /* SendOnFCSubscribe(); */
+    }
+    else if (AVMATCH(&method, &av_onFCUnsubscribe))
+    {
+        RTMP_Close(r);
+        ret = 1;
+    }
+    else if (AVMATCH(&method, &av_ping))
+    {
+        SendPong(r, txn);
+    }
+    else if (AVMATCH(&method, &av__onbwcheck))
+    {
+        SendCheckBWResult(r, txn);
+    }
+    else if (AVMATCH(&method, &av__onbwdone))
+    {
+        int i;
+        for (i = 0; i < r->m_numCalls; i++)
+            if (AVMATCH(&r->m_methodCalls[i].name, &av__checkbw))
+            {
+                AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
+                break;
+            }
+    }
+    else if (AVMATCH(&method, &av__error))
+    {
+#if defined(CRYPTO) || defined(USE_ONLY_MD5)
+        AVal methodInvoked = {0};
+        int i;
+
+        if (r->Link.protocol & RTMP_FEATURE_WRITE)
+        {
+            for (i=0; i<r->m_numCalls; i++)
+            {
+                if (r->m_methodCalls[i].num == txn)
+                {
+                    methodInvoked = r->m_methodCalls[i].name;
+                    AV_erase(r->m_methodCalls, &r->m_numCalls, i, FALSE);
+                    break;
+                }
+            }
+            if (!methodInvoked.av_val)
+            {
+                RTMP_Log(RTMP_LOGDEBUG, "%s, received result id %f without matching request",
+                         __FUNCTION__, txn);
+                goto leave;
+            }
+
+            RTMP_Log(RTMP_LOGDEBUG, "%s, received error for method call <%s>", __FUNCTION__,
+                     methodInvoked.av_val);
+
+            if (AVMATCH(&methodInvoked, &av_connect))
+            {
+                AMFObject obj2;
+                AVal code, level, description;
+                AMFProp_GetObject(AMF_GetProp(&obj, NULL, 3), &obj2);
+                AMFProp_GetString(AMF_GetProp(&obj2, &av_code, -1), &code);
+                AMFProp_GetString(AMF_GetProp(&obj2, &av_level, -1), &level);
+                AMFProp_GetString(AMF_GetProp(&obj2, &av_description, -1), &description);
+                RTMP_Log(RTMP_LOGDEBUG, "%s, error description: %s", __FUNCTION__, description.av_val);
+                /* if PublisherAuth returns 1, then reconnect */
+                PublisherAuth(r, &description);
+            }
+        }
+        else
+        {
+            RTMP_Log(RTMP_LOGERROR, "rtmp server sent error");
+        }
+        free(methodInvoked.av_val);
+#else
+        RTMP_Log(RTMP_LOGERROR, "rtmp server sent error");
+#endif
+    }
+    else if (AVMATCH(&method, &av_close))
+    {
+        RTMP_Log(RTMP_LOGERROR, "rtmp server requested close");
+        RTMP_Close(r);
+#if defined(CRYPTO) || defined(USE_ONLY_MD5)
+        if ((r->Link.protocol & RTMP_FEATURE_WRITE) &&
+                !(r->Link.pFlags & RTMP_PUB_CLEAN) &&
+                (  !(r->Link.pFlags & RTMP_PUB_NAME) ||
+                   !(r->Link.pFlags & RTMP_PUB_RESP) ||
+                   (r->Link.pFlags & RTMP_PUB_CLATE) ) )
+        {
+            /* clean later */
+            if(r->Link.pFlags & RTMP_PUB_CLATE)
+                r->Link.pFlags |= RTMP_PUB_CLEAN;
+            RTMP_Log(RTMP_LOGERROR, "authenticating publisher");
+
+            if (!RTMP_Connect(r, NULL) || !RTMP_ConnectStream(r, 0))
+                goto leave;
+        }
+#endif
+    }
+    else if (AVMATCH(&method, &av_onStatus))
+    {
+        AMFObject obj2;
+        AVal code, level, description;
+        AMFProp_GetObject(AMF_GetProp(&obj, NULL, 3), &obj2);
+        AMFProp_GetString(AMF_GetProp(&obj2, &av_code, -1), &code);
+        AMFProp_GetString(AMF_GetProp(&obj2, &av_level, -1), &level);
+        AMFProp_GetString(AMF_GetProp(&obj2, &av_description, -1), &description);
+
+        RTMP_Log(RTMP_LOGDEBUG, "%s, onStatus: %s", __FUNCTION__, code.av_val);
+        if (AVMATCH(&code, &av_NetStream_Failed)
+                || AVMATCH(&code, &av_NetStream_Play_Failed)
+                || AVMATCH(&code, &av_NetStream_Play_StreamNotFound)
+                || AVMATCH(&code, &av_NetConnection_Connect_InvalidApp)
+                || AVMATCH(&code, &av_NetStream_Publish_Rejected)
+                || AVMATCH(&code, &av_NetStream_Publish_Denied))
+        {
+            r->m_stream_id = -1;
+            RTMP_Close(r);
+
+            if (description.av_len)
+                RTMP_Log(RTMP_LOGERROR, "%s:\n%s (%s)", r->Link.tcUrl.av_val, code.av_val, description.av_val);
+            else
+                RTMP_Log(RTMP_LOGERROR, "%s:\n%s", r->Link.tcUrl.av_val, code.av_val);
+        }
+
+        else if (AVMATCH(&code, &av_NetStream_Play_Start)
+                 || AVMATCH(&code, &av_NetStream_Play_PublishNotify))
+        {
+            int i;
+            r->m_bPlaying = TRUE;
+            for (i = 0; i < r->m_numCalls; i++)
+            {
+                if (AVMATCH(&r->m_methodCalls[i].name, &av_play))
+                {
+                    AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
+                    break;
+                }
+            }
+        }
+
+        else if (AVMATCH(&code, &av_NetStream_Publish_Start))
+        {
+            int i;
+            r->m_bPlaying = TRUE;
+            for (i = 0; i < r->m_numCalls; i++)
+            {
+                if (AVMATCH(&r->m_methodCalls[i].name, &av_publish))
+                {
+                    AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
+                    break;
+                }
+            }
+        }
+
+        /* Return 1 if this is a Play.Complete or Play.Stop */
+        else if (AVMATCH(&code, &av_NetStream_Play_Complete)
+                 || AVMATCH(&code, &av_NetStream_Play_Stop)
+                 || AVMATCH(&code, &av_NetStream_Play_UnpublishNotify))
+        {
+            RTMP_Close(r);
+            ret = 1;
+        }
+
+        else if (AVMATCH(&code, &av_NetStream_Seek_Notify))
+        {
+            r->m_read.flags &= ~RTMP_READ_SEEKING;
+        }
+
+        else if (AVMATCH(&code, &av_NetStream_Pause_Notify))
+        {
+            if (r->m_pausing == 1 || r->m_pausing == 2)
+            {
+                RTMP_SendPause(r, FALSE, r->m_pauseStamp);
+                r->m_pausing = 3;
+            }
+        }
+    }
+    else if (AVMATCH(&method, &av_playlist_ready))
+    {
+        int i;
+        for (i = 0; i < r->m_numCalls; i++)
+        {
+            if (AVMATCH(&r->m_methodCalls[i].name, &av_set_playlist))
+            {
+                AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
+                break;
+            }
+        }
+    }
+    else
+    {
+
+    }
+leave:
+    AMF_Reset(&obj);
+    return ret;
+}
+
+int
+RTMP_FindFirstMatchingProperty(AMFObject *obj, const AVal *name,
+                               AMFObjectProperty * p)
+{
+    int n;
+    /* this is a small object search to locate the "duration" property */
+    for (n = 0; n < obj->o_num; n++)
+    {
+        AMFObjectProperty *prop = AMF_GetProp(obj, NULL, n);
+
+        if (AVMATCH(&prop->p_name, name))
+        {
+            memcpy(p, prop, sizeof(*prop));
+            return TRUE;
+        }
+
+        if (prop->p_type == AMF_OBJECT || prop->p_type == AMF_ECMA_ARRAY)
+        {
+            if (RTMP_FindFirstMatchingProperty(&prop->p_vu.p_object, name, p))
+                return TRUE;
+        }
+    }
+    return FALSE;
+}
+
+/* Like above, but only check if name is a prefix of property */
+int
+RTMP_FindPrefixProperty(AMFObject *obj, const AVal *name,
+                        AMFObjectProperty * p)
+{
+    int n;
+    for (n = 0; n < obj->o_num; n++)
+    {
+        AMFObjectProperty *prop = AMF_GetProp(obj, NULL, n);
+
+        if (prop->p_name.av_len > name->av_len &&
+                !memcmp(prop->p_name.av_val, name->av_val, name->av_len))
+        {
+            memcpy(p, prop, sizeof(*prop));
+            return TRUE;
+        }
+
+        if (prop->p_type == AMF_OBJECT)
+        {
+            if (RTMP_FindPrefixProperty(&prop->p_vu.p_object, name, p))
+                return TRUE;
+        }
+    }
+    return FALSE;
+}
+
+static int
+DumpMetaData(AMFObject *obj)
+{
+    AMFObjectProperty *prop;
+    int n, len;
+    for (n = 0; n < obj->o_num; n++)
+    {
+        char str[256] = "";
+        prop = AMF_GetProp(obj, NULL, n);
+        switch (prop->p_type)
+        {
+        case AMF_OBJECT:
+        case AMF_ECMA_ARRAY:
+        case AMF_STRICT_ARRAY:
+            if (prop->p_name.av_len)
+                RTMP_Log(RTMP_LOGINFO, "%.*s:", prop->p_name.av_len, prop->p_name.av_val);
+            DumpMetaData(&prop->p_vu.p_object);
+            break;
+        case AMF_NUMBER:
+            snprintf(str, 255, "%.2f", prop->p_vu.p_number);
+            break;
+        case AMF_BOOLEAN:
+            snprintf(str, 255, "%s",
+                     prop->p_vu.p_number != 0. ? "TRUE" : "FALSE");
+            break;
+        case AMF_STRING:
+            len = snprintf(str, 255, "%.*s", prop->p_vu.p_aval.av_len,
+                           prop->p_vu.p_aval.av_val);
+            if (len >= 1 && str[len-1] == '\n')
+                str[len-1] = '\0';
+            break;
+        case AMF_DATE:
+            snprintf(str, 255, "timestamp:%.2f", prop->p_vu.p_number);
+            break;
+        default:
+            snprintf(str, 255, "INVALID TYPE 0x%02x",
+                     (unsigned char)prop->p_type);
+        }
+        if (str[0] && prop->p_name.av_len)
+        {
+            RTMP_Log(RTMP_LOGINFO, "  %-22.*s%s", prop->p_name.av_len,
+                     prop->p_name.av_val, str);
+        }
+    }
+    return FALSE;
+}
+
+SAVC(onMetaData);
+SAVC(duration);
+SAVC(video);
+SAVC(audio);
+
+static int
+HandleMetadata(RTMP *r, char *body, unsigned int len)
+{
+    /* allright we get some info here, so parse it and print it */
+    /* also keep duration or filesize to make a nice progress bar */
+
+    AMFObject obj;
+    AVal metastring;
+    int ret = FALSE;
+
+    int nRes = AMF_Decode(&obj, body, len, FALSE);
+    if (nRes < 0)
+    {
+        RTMP_Log(RTMP_LOGERROR, "%s, error decoding meta data packet", __FUNCTION__);
+        return FALSE;
+    }
+
+    AMF_Dump(&obj);
+    AMFProp_GetString(AMF_GetProp(&obj, NULL, 0), &metastring);
+
+    if (AVMATCH(&metastring, &av_onMetaData))
+    {
+        AMFObjectProperty prop;
+        /* Show metadata */
+        RTMP_Log(RTMP_LOGINFO, "Metadata:");
+        DumpMetaData(&obj);
+        if (RTMP_FindFirstMatchingProperty(&obj, &av_duration, &prop))
+        {
+            r->m_fDuration = prop.p_vu.p_number;
+            /*RTMP_Log(RTMP_LOGDEBUG, "Set duration: %.2f", m_fDuration); */
+        }
+        /* Search for audio or video tags */
+        if (RTMP_FindPrefixProperty(&obj, &av_video, &prop))
+            r->m_read.dataType |= 1;
+        if (RTMP_FindPrefixProperty(&obj, &av_audio, &prop))
+            r->m_read.dataType |= 4;
+        ret = TRUE;
+    }
+    AMF_Reset(&obj);
+    return ret;
+}
+
+static void
+HandleChangeChunkSize(RTMP *r, const RTMPPacket *packet)
+{
+    if (packet->m_nBodySize >= 4)
+    {
+        r->m_inChunkSize = AMF_DecodeInt32(packet->m_body);
+        RTMP_Log(RTMP_LOGDEBUG, "%s, received: chunk size change to %d", __FUNCTION__,
+                 r->m_inChunkSize);
+    }
+}
+
+static void
+HandleAudio(RTMP *r, const RTMPPacket *packet)
+{
+	(void)r;
+	(void)packet;
+}
+
+static void
+HandleVideo(RTMP *r, const RTMPPacket *packet)
+{
+	(void)r;
+	(void)packet;
+}
+
+static void
+HandleCtrl(RTMP *r, const RTMPPacket *packet)
+{
+    short nType = -1;
+    unsigned int tmp;
+    if (packet->m_body && packet->m_nBodySize >= 2)
+        nType = AMF_DecodeInt16(packet->m_body);
+    RTMP_Log(RTMP_LOGDEBUG, "%s, received ctrl. type: %d, len: %d", __FUNCTION__, nType,
+             packet->m_nBodySize);
+    /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
+
+    if (packet->m_nBodySize >= 6)
+    {
+        switch (nType)
+        {
+        case 0:
+            tmp = AMF_DecodeInt32(packet->m_body + 2);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream Begin %d", __FUNCTION__, tmp);
+            break;
+
+        case 1:
+            tmp = AMF_DecodeInt32(packet->m_body + 2);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream EOF %d", __FUNCTION__, tmp);
+            if (r->m_pausing == 1)
+                r->m_pausing = 2;
+            break;
+
+        case 2:
+            tmp = AMF_DecodeInt32(packet->m_body + 2);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream Dry %d", __FUNCTION__, tmp);
+            break;
+
+        case 4:
+            tmp = AMF_DecodeInt32(packet->m_body + 2);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream IsRecorded %d", __FUNCTION__, tmp);
+            break;
+
+        case 6:		/* server ping. reply with pong. */
+            tmp = AMF_DecodeInt32(packet->m_body + 2);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, Ping %d", __FUNCTION__, tmp);
+            RTMP_SendCtrl(r, 0x07, tmp, 0);
+            break;
+
+            /* FMS 3.5 servers send the following two controls to let the client
+             * know when the server has sent a complete buffer. I.e., when the
+             * server has sent an amount of data equal to m_nBufferMS in duration.
+             * The server meters its output so that data arrives at the client
+             * in realtime and no faster.
+             *
+             * The rtmpdump program tries to set m_nBufferMS as large as
+             * possible, to force the server to send data as fast as possible.
+             * In practice, the server appears to cap this at about 1 hour's
+             * worth of data. After the server has sent a complete buffer, and
+             * sends this BufferEmpty message, it will wait until the play
+             * duration of that buffer has passed before sending a new buffer.
+             * The BufferReady message will be sent when the new buffer starts.
+             * (There is no BufferReady message for the very first buffer;
+             * presumably the Stream Begin message is sufficient for that
+             * purpose.)
+             *
+             * If the network speed is much faster than the data bitrate, then
+             * there may be long delays between the end of one buffer and the
+             * start of the next.
+             *
+             * Since usually the network allows data to be sent at
+             * faster than realtime, and rtmpdump wants to download the data
+             * as fast as possible, we use this RTMP_LF_BUFX hack: when we
+             * get the BufferEmpty message, we send a Pause followed by an
+             * Unpause. This causes the server to send the next buffer immediately
+             * instead of waiting for the full duration to elapse. (That's
+             * also the purpose of the ToggleStream function, which rtmpdump
+             * calls if we get a read timeout.)
+             *
+             * Media player apps don't need this hack since they are just
+             * going to play the data in realtime anyway. It also doesn't work
+             * for live streams since they obviously can only be sent in
+             * realtime. And it's all moot if the network speed is actually
+             * slower than the media bitrate.
+             */
+        case 31:
+            tmp = AMF_DecodeInt32(packet->m_body + 2);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream BufferEmpty %d", __FUNCTION__, tmp);
+            if (!(r->Link.lFlags & RTMP_LF_BUFX))
+                break;
+            if (!r->m_pausing)
+            {
+                r->m_pauseStamp = r->m_mediaChannel < r->m_channelsAllocatedIn ?
+                                  r->m_channelTimestamp[r->m_mediaChannel] : 0;
+                RTMP_SendPause(r, TRUE, r->m_pauseStamp);
+                r->m_pausing = 1;
+            }
+            else if (r->m_pausing == 2)
+            {
+                RTMP_SendPause(r, FALSE, r->m_pauseStamp);
+                r->m_pausing = 3;
+            }
+            break;
+
+        case 32:
+            tmp = AMF_DecodeInt32(packet->m_body + 2);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream BufferReady %d", __FUNCTION__, tmp);
+            break;
+
+        default:
+            tmp = AMF_DecodeInt32(packet->m_body + 2);
+            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream xx %d", __FUNCTION__, tmp);
+            break;
+        }
+
+    }
+
+    if (nType == 0x1A)
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "%s, SWFVerification ping received: ", __FUNCTION__);
+        if (packet->m_nBodySize > 2 && packet->m_body[2] > 0x01)
+        {
+            RTMP_Log(RTMP_LOGERROR,
+                     "%s: SWFVerification Type %d request not supported! Patches welcome...",
+                     __FUNCTION__, packet->m_body[2]);
+        }
+#ifdef CRYPTO
+        /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
+
+        /* respond with HMAC SHA256 of decompressed SWF, key is the 30byte player key, also the last 30 bytes of the server handshake are applied */
+        else if (r->Link.SWFSize)
+        {
+            RTMP_SendCtrl(r, 0x1B, 0, 0);
+        }
+        else
+        {
+            RTMP_Log(RTMP_LOGERROR,
+                     "%s: Ignoring SWFVerification request, use --swfVfy!",
+                     __FUNCTION__);
+        }
+#else
+        RTMP_Log(RTMP_LOGERROR,
+                 "%s: Ignoring SWFVerification request, no CRYPTO support!",
+                 __FUNCTION__);
+#endif
+    }
+}
+
+static void
+HandleServerBW(RTMP *r, const RTMPPacket *packet)
+{
+    r->m_nServerBW = AMF_DecodeInt32(packet->m_body);
+    RTMP_Log(RTMP_LOGDEBUG, "%s: server BW = %d", __FUNCTION__, r->m_nServerBW);
+}
+
+static void
+HandleClientBW(RTMP *r, const RTMPPacket *packet)
+{
+    r->m_nClientBW = AMF_DecodeInt32(packet->m_body);
+    if (packet->m_nBodySize > 4)
+        r->m_nClientBW2 = packet->m_body[4];
+    else
+        r->m_nClientBW2 = -1;
+    RTMP_Log(RTMP_LOGDEBUG, "%s: client BW = %d %d", __FUNCTION__, r->m_nClientBW,
+             r->m_nClientBW2);
+}
+
+static int
+DecodeInt32LE(const char *data)
+{
+    unsigned char *c = (unsigned char *)data;
+    unsigned int val;
+
+    val = (c[3] << 24) | (c[2] << 16) | (c[1] << 8) | c[0];
+    return val;
+}
+
+static int
+EncodeInt32LE(char *output, int nVal)
+{
+    output[0] = nVal;
+    nVal >>= 8;
+    output[1] = nVal;
+    nVal >>= 8;
+    output[2] = nVal;
+    nVal >>= 8;
+    output[3] = nVal;
+    return 4;
+}
+
+int
+RTMP_ReadPacket(RTMP *r, RTMPPacket *packet)
+{
+    uint8_t hbuf[RTMP_MAX_HEADER_SIZE] = { 0 };
+    char *header = (char *)hbuf;
+    int nSize, hSize, nToRead, nChunk;
+    int didAlloc = FALSE;
+
+    RTMP_Log(RTMP_LOGDEBUG2, "%s: fd=%d", __FUNCTION__, r->m_sb.sb_socket);
+
+    if (ReadN(r, (char *)hbuf, 1) == 0)
+    {
+        RTMP_Log(RTMP_LOGDEBUG, "%s, failed to read RTMP packet header", __FUNCTION__);
+        return FALSE;
+    }
+
+    packet->m_headerType = (hbuf[0] & 0xc0) >> 6;
+    packet->m_nChannel = (hbuf[0] & 0x3f);
+    header++;
+    if (packet->m_nChannel == 0)
+    {
+        if (ReadN(r, (char *)&hbuf[1], 1) != 1)
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet header 2nd byte",
+                     __FUNCTION__);
+            return FALSE;
+        }
+        packet->m_nChannel = hbuf[1];
+        packet->m_nChannel += 64;
+        header++;
+    }
+    else if (packet->m_nChannel == 1)
+    {
+        int tmp;
+        if (ReadN(r, (char *)&hbuf[1], 2) != 2)
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet header 3nd byte",
+                     __FUNCTION__);
+            return FALSE;
+        }
+        tmp = (hbuf[2] << 8) + hbuf[1];
+        packet->m_nChannel = tmp + 64;
+        RTMP_Log(RTMP_LOGDEBUG, "%s, m_nChannel: %0x", __FUNCTION__, packet->m_nChannel);
+        header += 2;
+    }
+
+    nSize = packetSize[packet->m_headerType];
+
+    if (packet->m_nChannel >= r->m_channelsAllocatedIn)
+    {
+        int n = packet->m_nChannel + 10;
+        int *timestamp = realloc(r->m_channelTimestamp, sizeof(int) * n);
+        RTMPPacket **packets = realloc(r->m_vecChannelsIn, sizeof(RTMPPacket*) * n);
+        if (!timestamp)
+            free(r->m_channelTimestamp);
+        if (!packets)
+            free(r->m_vecChannelsIn);
+        r->m_channelTimestamp = timestamp;
+        r->m_vecChannelsIn = packets;
+        if (!timestamp || !packets)
+        {
+            r->m_channelsAllocatedIn = 0;
+            return FALSE;
+        }
+        memset(r->m_channelTimestamp + r->m_channelsAllocatedIn, 0, sizeof(int) * (n - r->m_channelsAllocatedIn));
+        memset(r->m_vecChannelsIn + r->m_channelsAllocatedIn, 0, sizeof(RTMPPacket*) * (n - r->m_channelsAllocatedIn));
+        r->m_channelsAllocatedIn = n;
+    }
+
+    if (nSize == RTMP_LARGE_HEADER_SIZE)	/* if we get a full header the timestamp is absolute */
+        packet->m_hasAbsTimestamp = TRUE;
+
+    else if (nSize < RTMP_LARGE_HEADER_SIZE)
+    {
+        /* using values from the last message of this channel */
+        if (r->m_vecChannelsIn[packet->m_nChannel])
+            memcpy(packet, r->m_vecChannelsIn[packet->m_nChannel],
+                   sizeof(RTMPPacket));
+    }
+
+    nSize--;
+
+    if (nSize > 0 && ReadN(r, header, nSize) != nSize)
+    {
+        RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet header. type: %x",
+                 __FUNCTION__, (unsigned int)hbuf[0]);
+        return FALSE;
+    }
+
+    hSize = nSize + (header - (char *)hbuf);
+
+    if (nSize >= 3)
+    {
+        packet->m_nTimeStamp = AMF_DecodeInt24(header);
+
+        /*RTMP_Log(RTMP_LOGDEBUG, "%s, reading RTMP packet chunk on channel %x, headersz %i, timestamp %i, abs timestamp %i", __FUNCTION__, packet.m_nChannel, nSize, packet.m_nTimeStamp, packet.m_hasAbsTimestamp); */
+
+        if (nSize >= 6)
+        {
+            packet->m_nBodySize = AMF_DecodeInt24(header + 3);
+            packet->m_nBytesRead = 0;
+            RTMPPacket_Free(packet);
+
+            if (nSize > 6)
+            {
+                packet->m_packetType = header[6];
+
+                if (nSize == 11)
+                    packet->m_nInfoField2 = DecodeInt32LE(header + 7);
+            }
+        }
+        if (packet->m_nTimeStamp == 0xffffff)
+        {
+            if (ReadN(r, header + nSize, 4) != 4)
+            {
+                RTMP_Log(RTMP_LOGERROR, "%s, failed to read extended timestamp",
+                         __FUNCTION__);
+                return FALSE;
+            }
+            packet->m_nTimeStamp = AMF_DecodeInt32(header + nSize);
+            hSize += 4;
+        }
+    }
+
+    RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)hbuf, hSize);
+
+    if (packet->m_nBodySize > 0 && packet->m_body == NULL)
+    {
+        if (!RTMPPacket_Alloc(packet, packet->m_nBodySize))
+        {
+            RTMP_Log(RTMP_LOGDEBUG, "%s, failed to allocate packet", __FUNCTION__);
+            return FALSE;
+        }
+        didAlloc = TRUE;
+        packet->m_headerType = (hbuf[0] & 0xc0) >> 6;
+    }
+
+    nToRead = packet->m_nBodySize - packet->m_nBytesRead;
+    nChunk = r->m_inChunkSize;
+    if (nToRead < nChunk)
+        nChunk = nToRead;
+
+    /* Does the caller want the raw chunk? */
+    if (packet->m_chunk)
+    {
+        packet->m_chunk->c_headerSize = hSize;
+        memcpy(packet->m_chunk->c_header, hbuf, hSize);
+        packet->m_chunk->c_chunk = packet->m_body + packet->m_nBytesRead;
+        packet->m_chunk->c_chunkSize = nChunk;
+    }
+
+    if (ReadN(r, packet->m_body + packet->m_nBytesRead, nChunk) != nChunk)
+    {
+        RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet body. len: %u",
+                 __FUNCTION__, packet->m_nBodySize);
+        return FALSE;
+    }
+
+    RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)packet->m_body + packet->m_nBytesRead, nChunk);
+
+    packet->m_nBytesRead += nChunk;
+
+    /* keep the packet as ref for other packets on this channel */
+    if (!r->m_vecChannelsIn[packet->m_nChannel])
+        r->m_vecChannelsIn[packet->m_nChannel] = malloc(sizeof(RTMPPacket));
+    memcpy(r->m_vecChannelsIn[packet->m_nChannel], packet, sizeof(RTMPPacket));
+
+    if (RTMPPacket_IsReady(packet))
+    {
+        /* make packet's timestamp absolute */
+        if (!packet->m_hasAbsTimestamp)
+            packet->m_nTimeStamp += r->m_channelTimestamp[packet->m_nChannel];	/* timestamps seem to be always relative!! */
+
+        r->m_channelTimestamp[packet->m_nChannel] = packet->m_nTimeStamp;
+
+        /* reset the data from the stored packet. we keep the header since we may use it later if a new packet for this channel */
+        /* arrives and requests to re-use some info (small packet header) */
+        r->m_vecChannelsIn[packet->m_nChannel]->m_body = NULL;
+        r->m_vecChannelsIn[packet->m_nChannel]->m_nBytesRead = 0;
+        r->m_vecChannelsIn[packet->m_nChannel]->m_hasAbsTimestamp = FALSE;	/* can only be false if we reuse header */
+    }
+    else
+    {
+        packet->m_body = NULL;	/* so it won't be erased on free */
+    }
+
+    return TRUE;
+}
+
+#ifndef CRYPTO
+static int
+HandShake(RTMP *r, int FP9HandShake)
+{
+    int i;
+    uint32_t uptime, suptime;
+    int bMatch;
+    char type;
+    char clientbuf[RTMP_SIG_SIZE + 1], *clientsig = clientbuf + 1;
+    char serversig[RTMP_SIG_SIZE];
+
+    clientbuf[0] = 0x03;		/* not encrypted */
+
+    uptime = htonl(RTMP_GetTime());
+    memcpy(clientsig, &uptime, 4);
+
+    memset(&clientsig[4], 0, 4);
+
+#ifdef _DEBUG
+    for (i = 8; i < RTMP_SIG_SIZE; i++)
+        clientsig[i] = 0xff;
+#else
+    for (i = 8; i < RTMP_SIG_SIZE; i++)
+        clientsig[i] = (char)(rand() % 256);
+#endif
+
+    if (!WriteN(r, clientbuf, RTMP_SIG_SIZE + 1))
+        return FALSE;
+
+    if (ReadN(r, &type, 1) != 1)	/* 0x03 or 0x06 */
+        return FALSE;
+
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Type Answer   : %02X", __FUNCTION__, type);
+
+    if (type != clientbuf[0])
+        RTMP_Log(RTMP_LOGWARNING, "%s: Type mismatch: client sent %d, server answered %d",
+                 __FUNCTION__, clientbuf[0], type);
+
+    if (ReadN(r, serversig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
+        return FALSE;
+
+    /* decode server response */
+
+    memcpy(&suptime, serversig, 4);
+    suptime = ntohl(suptime);
+
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Server Uptime : %d", __FUNCTION__, suptime);
+    RTMP_Log(RTMP_LOGDEBUG, "%s: FMS Version   : %d.%d.%d.%d", __FUNCTION__,
+             serversig[4], serversig[5], serversig[6], serversig[7]);
+
+    /* 2nd part of handshake */
+    if (!WriteN(r, serversig, RTMP_SIG_SIZE))
+        return FALSE;
+
+    if (ReadN(r, serversig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
+        return FALSE;
+
+    bMatch = (memcmp(serversig, clientsig, RTMP_SIG_SIZE) == 0);
+    if (!bMatch)
+    {
+        RTMP_Log(RTMP_LOGWARNING, "%s, client signature does not match!", __FUNCTION__);
+    }
+
+    /* er, totally unused? */
+    (void)FP9HandShake;
+    return TRUE;
+}
+
+static int
+SHandShake(RTMP *r)
+{
+    int i;
+    char serverbuf[RTMP_SIG_SIZE + 1], *serversig = serverbuf + 1;
+    char clientsig[RTMP_SIG_SIZE];
+    uint32_t uptime;
+    int bMatch;
+
+    if (ReadN(r, serverbuf, 1) != 1)	/* 0x03 or 0x06 */
+        return FALSE;
+
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Type Request  : %02X", __FUNCTION__, serverbuf[0]);
+
+    if (serverbuf[0] != 3)
+    {
+        RTMP_Log(RTMP_LOGERROR, "%s: Type unknown: client sent %02X",
+                 __FUNCTION__, serverbuf[0]);
+        return FALSE;
+    }
+
+    uptime = htonl(RTMP_GetTime());
+    memcpy(serversig, &uptime, 4);
+
+    memset(&serversig[4], 0, 4);
+#ifdef _DEBUG
+    for (i = 8; i < RTMP_SIG_SIZE; i++)
+        serversig[i] = 0xff;
+#else
+    for (i = 8; i < RTMP_SIG_SIZE; i++)
+        serversig[i] = (char)(rand() % 256);
+#endif
+
+    if (!WriteN(r, serverbuf, RTMP_SIG_SIZE + 1))
+        return FALSE;
+
+    if (ReadN(r, clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
+        return FALSE;
+
+    /* decode client response */
+
+    memcpy(&uptime, clientsig, 4);
+    uptime = ntohl(uptime);
+
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Client Uptime : %d", __FUNCTION__, uptime);
+    RTMP_Log(RTMP_LOGDEBUG, "%s: Player Version: %d.%d.%d.%d", __FUNCTION__,
+             clientsig[4], clientsig[5], clientsig[6], clientsig[7]);
+
+    /* 2nd part of handshake */
+    if (!WriteN(r, clientsig, RTMP_SIG_SIZE))
+        return FALSE;
+
+    if (ReadN(r, clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
+        return FALSE;
+
+    bMatch = (memcmp(serversig, clientsig, RTMP_SIG_SIZE) == 0);
+    if (!bMatch)
+    {
+        RTMP_Log(RTMP_LOGWARNING, "%s, client signature does not match!", __FUNCTION__);
+    }
+    return TRUE;
+}
+#endif
+
+int
+RTMP_SendChunk(RTMP *r, RTMPChunk *chunk)
+{
+    int wrote;
+    char hbuf[RTMP_MAX_HEADER_SIZE];
+
+    RTMP_Log(RTMP_LOGDEBUG2, "%s: fd=%d, size=%d", __FUNCTION__, r->m_sb.sb_socket,
+             chunk->c_chunkSize);
+    RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)chunk->c_header, chunk->c_headerSize);
+    if (chunk->c_chunkSize)
+    {
+        char *ptr = chunk->c_chunk - chunk->c_headerSize;
+        RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)chunk->c_chunk, chunk->c_chunkSize);
+        /* save header bytes we're about to overwrite */
+        memcpy(hbuf, ptr, chunk->c_headerSize);
+        memcpy(ptr, chunk->c_header, chunk->c_headerSize);
+        wrote = WriteN(r, ptr, chunk->c_headerSize + chunk->c_chunkSize);
+        memcpy(ptr, hbuf, chunk->c_headerSize);
+    }
+    else
+        wrote = WriteN(r, chunk->c_header, chunk->c_headerSize);
+    return wrote;
+}
+
+int
+RTMP_SendPacket(RTMP *r, RTMPPacket *packet, int queue)
+{
+    const RTMPPacket *prevPacket;
+    uint32_t last = 0;
+    int nSize;
+    int hSize, cSize;
+    char *header, *hptr, *hend, hbuf[RTMP_MAX_HEADER_SIZE], c;
+    uint32_t t;
+    char *buffer, *tbuf = NULL, *toff = NULL;
+    int nChunkSize;
+    int tlen;
+
+    if (packet->m_nChannel >= r->m_channelsAllocatedOut)
+    {
+        int n = packet->m_nChannel + 10;
+        RTMPPacket **packets = realloc(r->m_vecChannelsOut, sizeof(RTMPPacket*) * n);
+        if (!packets)
+        {
+            free(r->m_vecChannelsOut);
+            r->m_vecChannelsOut = NULL;
+            r->m_channelsAllocatedOut = 0;
+            return FALSE;
+        }
+        r->m_vecChannelsOut = packets;
+        memset(r->m_vecChannelsOut + r->m_channelsAllocatedOut, 0, sizeof(RTMPPacket*) * (n - r->m_channelsAllocatedOut));
+        r->m_channelsAllocatedOut = n;
+    }
+
+    prevPacket = r->m_vecChannelsOut[packet->m_nChannel];
+    if (prevPacket && packet->m_headerType != RTMP_PACKET_SIZE_LARGE)
+    {
+        /* compress a bit by using the prev packet's attributes */
+        if (prevPacket->m_nBodySize == packet->m_nBodySize
+                && prevPacket->m_packetType == packet->m_packetType
+                && packet->m_headerType == RTMP_PACKET_SIZE_MEDIUM)
+            packet->m_headerType = RTMP_PACKET_SIZE_SMALL;
+
+        if (prevPacket->m_nTimeStamp == packet->m_nTimeStamp
+                && packet->m_headerType == RTMP_PACKET_SIZE_SMALL)
+            packet->m_headerType = RTMP_PACKET_SIZE_MINIMUM;
+        last = prevPacket->m_nTimeStamp;
+    }
+
+    if (packet->m_headerType > 3)	/* sanity */
+    {
+        RTMP_Log(RTMP_LOGERROR, "sanity failed!! trying to send header of type: 0x%02x.",
+                 (unsigned char)packet->m_headerType);
+        return FALSE;
+    }
+
+    nSize = packetSize[packet->m_headerType];
+    hSize = nSize;
+    cSize = 0;
+    t = packet->m_nTimeStamp - last;
+
+    if (packet->m_body)
+    {
+        header = packet->m_body - nSize;
+        hend = packet->m_body;
+    }
+    else
+    {
+        header = hbuf + 6;
+        hend = hbuf + sizeof(hbuf);
+    }
+
+    if (packet->m_nChannel > 319)
+        cSize = 2;
+    else if (packet->m_nChannel > 63)
+        cSize = 1;
+    if (cSize)
+    {
+        header -= cSize;
+        hSize += cSize;
+    }
+
+    if (nSize > 1 && t >= 0xffffff)
+    {
+        header -= 4;
+        hSize += 4;
+    }
+
+    hptr = header;
+    c = packet->m_headerType << 6;
+    switch (cSize)
+    {
+    case 0:
+        c |= packet->m_nChannel;
+        break;
+    case 1:
+        break;
+    case 2:
+        c |= 1;
+        break;
+    }
+    *hptr++ = c;
+    if (cSize)
+    {
+        int tmp = packet->m_nChannel - 64;
+        *hptr++ = tmp & 0xff;
+        if (cSize == 2)
+            *hptr++ = tmp >> 8;
+    }
+
+    if (nSize > 1)
+    {
+        hptr = AMF_EncodeInt24(hptr, hend, t > 0xffffff ? 0xffffff : t);
+    }
+
+    if (nSize > 4)
+    {
+        hptr = AMF_EncodeInt24(hptr, hend, packet->m_nBodySize);
+        *hptr++ = packet->m_packetType;
+    }
+
+    if (nSize > 8)
+        hptr += EncodeInt32LE(hptr, packet->m_nInfoField2);
+
+    if (nSize > 1 && t >= 0xffffff)
+        hptr = AMF_EncodeInt32(hptr, hend, t);
+
+    nSize = packet->m_nBodySize;
+    buffer = packet->m_body;
+    nChunkSize = r->m_outChunkSize;
+
+    RTMP_Log(RTMP_LOGDEBUG2, "%s: fd=%d, size=%d", __FUNCTION__, r->m_sb.sb_socket,
+             nSize);
+    /* send all chunks in one HTTP request */
+    if (r->Link.protocol & RTMP_FEATURE_HTTP)
+    {
+        int chunks = (nSize+nChunkSize-1) / nChunkSize;
+        if (chunks > 1)
+        {
+            tlen = chunks * (cSize + 1) + nSize + hSize;
+            tbuf = malloc(tlen);
+            if (!tbuf)
+                return FALSE;
+            toff = tbuf;
+        }
+    }
+    while (nSize + hSize)
+    {
+        int wrote;
+
+        if (nSize < nChunkSize)
+            nChunkSize = nSize;
+
+        RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)header, hSize);
+        RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)buffer, nChunkSize);
+        if (tbuf)
+        {
+            memcpy(toff, header, nChunkSize + hSize);
+            toff += nChunkSize + hSize;
+        }
+        else
+        {
+            wrote = WriteN(r, header, nChunkSize + hSize);
+            if (!wrote)
+                return FALSE;
+        }
+        nSize -= nChunkSize;
+        buffer += nChunkSize;
+        hSize = 0;
+
+        if (nSize > 0)
+        {
+            header = buffer - 1;
+            hSize = 1;
+            if (cSize)
+            {
+                header -= cSize;
+                hSize += cSize;
+            }
+            *header = (0xc0 | c);
+            if (cSize)
+            {
+                int tmp = packet->m_nChannel - 64;
+                header[1] = tmp & 0xff;
+                if (cSize == 2)
+                    header[2] = tmp >> 8;
+            }
+        }
+    }
+    if (tbuf)
+    {
+        int wrote = WriteN(r, tbuf, toff-tbuf);
+        free(tbuf);
+        tbuf = NULL;
+        if (!wrote)
+            return FALSE;
+    }
+
+    /* we invoked a remote method */
+    if (packet->m_packetType == RTMP_PACKET_TYPE_INVOKE)
+    {
+        AVal method;
+        char *ptr;
+        ptr = packet->m_body + 1;
+        AMF_DecodeString(ptr, &method);
+        RTMP_Log(RTMP_LOGDEBUG, "Invoking %s", method.av_val);
+        /* keep it in call queue till result arrives */
+        if (queue)
+        {
+            int txn;
+            ptr += 3 + method.av_len;
+            txn = (int)AMF_DecodeNumber(ptr);
+            AV_queue(&r->m_methodCalls, &r->m_numCalls, &method, txn);
+        }
+    }
+
+    if (!r->m_vecChannelsOut[packet->m_nChannel])
+        r->m_vecChannelsOut[packet->m_nChannel] = malloc(sizeof(RTMPPacket));
+    memcpy(r->m_vecChannelsOut[packet->m_nChannel], packet, sizeof(RTMPPacket));
+    return TRUE;
+}
+
+int
+RTMP_Serve(RTMP *r)
+{
+    return SHandShake(r);
+}
+
+void
+RTMP_Close(RTMP *r)
+{
+    int i;
+
+    if (RTMP_IsConnected(r))
+    {
+        if (r->m_stream_id > 0)
+        {
+            i = r->m_stream_id;
+            r->m_stream_id = 0;
+            if ((r->Link.protocol & RTMP_FEATURE_WRITE))
+                SendFCUnpublish(r);
+            SendDeleteStream(r, i);
+        }
+        if (r->m_clientID.av_val)
+        {
+            HTTP_Post(r, RTMPT_CLOSE, "", 1);
+            free(r->m_clientID.av_val);
+            r->m_clientID.av_val = NULL;
+            r->m_clientID.av_len = 0;
+        }
+        RTMPSockBuf_Close(&r->m_sb);
+    }
+
+    r->m_stream_id = -1;
+    r->m_sb.sb_socket = -1;
+    r->m_nBWCheckCounter = 0;
+    r->m_nBytesIn = 0;
+    r->m_nBytesInSent = 0;
+
+    if (r->m_read.flags & RTMP_READ_HEADER)
+    {
+        free(r->m_read.buf);
+        r->m_read.buf = NULL;
+    }
+    r->m_read.dataType = 0;
+    r->m_read.flags = 0;
+    r->m_read.status = 0;
+    r->m_read.nResumeTS = 0;
+    r->m_read.nIgnoredFrameCounter = 0;
+    r->m_read.nIgnoredFlvFrameCounter = 0;
+
+    r->m_write.m_nBytesRead = 0;
+    RTMPPacket_Free(&r->m_write);
+
+    for (i = 0; i < r->m_channelsAllocatedIn; i++)
+    {
+        if (r->m_vecChannelsIn[i])
+        {
+            RTMPPacket_Free(r->m_vecChannelsIn[i]);
+            free(r->m_vecChannelsIn[i]);
+            r->m_vecChannelsIn[i] = NULL;
+        }
+    }
+    free(r->m_vecChannelsIn);
+    r->m_vecChannelsIn = NULL;
+    free(r->m_channelTimestamp);
+    r->m_channelTimestamp = NULL;
+    r->m_channelsAllocatedIn = 0;
+    for (i = 0; i < r->m_channelsAllocatedOut; i++)
+    {
+        if (r->m_vecChannelsOut[i])
+        {
+            free(r->m_vecChannelsOut[i]);
+            r->m_vecChannelsOut[i] = NULL;
+        }
+    }
+    free(r->m_vecChannelsOut);
+    r->m_vecChannelsOut = NULL;
+    r->m_channelsAllocatedOut = 0;
+    AV_clear(r->m_methodCalls, r->m_numCalls);
+    r->m_methodCalls = NULL;
+    r->m_numCalls = 0;
+    r->m_numInvokes = 0;
+
+    r->m_bPlaying = FALSE;
+    r->m_sb.sb_size = 0;
+
+    r->m_msgCounter = 0;
+    r->m_resplen = 0;
+    r->m_unackd = 0;
+
+    if (r->Link.lFlags & RTMP_LF_FTCU)
+    {
+        free(r->Link.tcUrl.av_val);
+        r->Link.tcUrl.av_val = NULL;
+        r->Link.lFlags ^= RTMP_LF_FTCU;
+    }
+
+#if defined(CRYPTO) || defined(USE_ONLY_MD5)
+    if (!(r->Link.protocol & RTMP_FEATURE_WRITE) || (r->Link.pFlags & RTMP_PUB_CLEAN))
+    {
+        free(r->Link.playpath0.av_val);
+        r->Link.playpath0.av_val = NULL;
+    }
+    if ((r->Link.protocol & RTMP_FEATURE_WRITE) &&
+            (r->Link.pFlags & RTMP_PUB_CLEAN) &&
+            (r->Link.pFlags & RTMP_PUB_ALLOC))
+    {
+        free(r->Link.app.av_val);
+        r->Link.app.av_val = NULL;
+        free(r->Link.tcUrl.av_val);
+        r->Link.tcUrl.av_val = NULL;
+    }
+#elif defined(CRYPTO)
+    if (r->Link.dh)
+    {
+        MDH_free(r->Link.dh);
+        r->Link.dh = NULL;
+    }
+    if (r->Link.rc4keyIn)
+    {
+        RC4_free(r->Link.rc4keyIn);
+        r->Link.rc4keyIn = NULL;
+    }
+    if (r->Link.rc4keyOut)
+    {
+        RC4_free(r->Link.rc4keyOut);
+        r->Link.rc4keyOut = NULL;
+    }
+#else
+    free(r->Link.playpath0.av_val);
+    r->Link.playpath0.av_val = NULL;
+#endif
+}
+
+int
+RTMPSockBuf_Fill(RTMPSockBuf *sb)
+{
+    int nBytes;
+
+    if (!sb->sb_size)
+        sb->sb_start = sb->sb_buf;
+
+    while (1)
+    {
+        nBytes = (int)sizeof(sb->sb_buf) - 1 - sb->sb_size - (sb->sb_start - sb->sb_buf);
+#if defined(CRYPTO) && !defined(NO_SSL)
+        if (sb->sb_ssl)
+        {
+            nBytes = TLS_read(sb->sb_ssl, sb->sb_start + sb->sb_size, nBytes);
+        }
+        else
+#endif
+        {
+            nBytes = recv(sb->sb_socket, sb->sb_start + sb->sb_size, nBytes, 0);
+        }
+        if (nBytes > 0)
+        {
+            sb->sb_size += nBytes;
+        }
+        else if (nBytes == 0)
+        {
+            RTMP_Log(RTMP_LOGERROR, "%s, remote host closed connection",
+                     __FUNCTION__);
+        }
+        else
+        {
+            int level;
+            int sockerr = GetSockError();
+            if (sockerr == EWOULDBLOCK || sockerr == EAGAIN)
+                level = RTMP_LOGDEBUG;
+            else
+                level = RTMP_LOGERROR;
+            RTMP_Log(level, "%s, recv returned %d. GetSockError(): %d (%s)",
+                     __FUNCTION__, nBytes, sockerr, socketerror(sockerr));
+            if (sockerr == EINTR && !RTMP_ctrlC)
+                continue;
+
+            if (sockerr == EWOULDBLOCK || sockerr == EAGAIN)
+            {
+                sb->sb_timedout = TRUE;
+                nBytes = 0;
+            }
+        }
+        break;
+    }
+
+    return nBytes;
+}
+
+int
+RTMPSockBuf_Send(RTMPSockBuf *sb, const char *buf, int len)
+{
+    int rc;
+
+#if defined(_DEBUG) && !defined(WIN32)
+    fwrite(buf, 1, len, netstackdump);
+#endif
+
+#if defined(CRYPTO) && !defined(NO_SSL)
+    if (sb->sb_ssl)
+    {
+        rc = TLS_write(sb->sb_ssl, buf, len);
+    }
+    else
+#endif
+    {
+        rc = send(sb->sb_socket, buf, len, 0);
+    }
+    return rc;
+}
+
+int
+RTMPSockBuf_Close(RTMPSockBuf *sb)
+{
+#if defined(CRYPTO) && !defined(NO_SSL)
+    if (sb->sb_ssl)
+    {
+        TLS_shutdown(sb->sb_ssl);
+        TLS_close(sb->sb_ssl);
+        sb->sb_ssl = NULL;
+    }
+#endif
+    if (sb->sb_socket != -1)
+        return closesocket(sb->sb_socket);
+    return 0;
+}
+
+#define HEX2BIN(a)	(((a)&0x40)?((a)&0xf)+9:((a)&0xf))
+
+static void
+DecodeTEA(AVal *key, AVal *text)
+{
+    uint32_t *v, k[4] = { 0 }, u;
+    uint32_t z, y, sum = 0, e, DELTA = 0x9e3779b9;
+    int32_t p, q;
+    int i, n;
+    unsigned char *ptr, *out;
+
+    /* prep key: pack 1st 16 chars into 4 LittleEndian ints */
+    ptr = (unsigned char *)key->av_val;
+    u = 0;
+    n = 0;
+    v = k;
+    p = key->av_len > 16 ? 16 : key->av_len;
+    for (i = 0; i < p; i++)
+    {
+        u |= ptr[i] << (n * 8);
+        if (n == 3)
+        {
+            *v++ = u;
+            u = 0;
+            n = 0;
+        }
+        else
+        {
+            n++;
+        }
+    }
+    /* any trailing chars */
+    if (u)
+        *v = u;
+
+    /* prep text: hex2bin, multiples of 4 */
+    n = (text->av_len + 7) / 8;
+    out = malloc(n * 8);
+    ptr = (unsigned char *)text->av_val;
+    v = (uint32_t *) out;
+    for (i = 0; i < n; i++)
+    {
+        u = (HEX2BIN(ptr[0]) << 4) + HEX2BIN(ptr[1]);
+        u |= ((HEX2BIN(ptr[2]) << 4) + HEX2BIN(ptr[3])) << 8;
+        u |= ((HEX2BIN(ptr[4]) << 4) + HEX2BIN(ptr[5])) << 16;
+        u |= ((HEX2BIN(ptr[6]) << 4) + HEX2BIN(ptr[7])) << 24;
+        *v++ = u;
+        ptr += 8;
+    }
+    v = (uint32_t *) out;
+
+    /* http://www.movable-type.co.uk/scripts/tea-block.html */
+#define MX (((z>>5)^(y<<2)) + ((y>>3)^(z<<4))) ^ ((sum^y) + (k[(p&3)^e]^z));
+    z = v[n - 1];
+    y = v[0];
+    q = 6 + 52 / n;
+    sum = q * DELTA;
+    while (sum != 0)
+    {
+        e = sum >> 2 & 3;
+        for (p = n - 1; p > 0; p--)
+            z = v[p - 1], y = v[p] -= MX;
+        z = v[n - 1];
+        y = v[0] -= MX;
+        sum -= DELTA;
+    }
+
+    text->av_len /= 2;
+    memcpy(text->av_val, out, text->av_len);
+    free(out);
+}
+
+static int
+HTTP_Post(RTMP *r, RTMPTCmd cmd, const char *buf, int len)
+{
+    char hbuf[512];
+    int hlen = snprintf(hbuf, sizeof(hbuf), "POST /%s%s/%d HTTP/1.1\r\n"
+                        "Host: %.*s:%d\r\n"
+                        "Accept: */*\r\n"
+                        "User-Agent: Shockwave Flash\r\n"
+                        "Connection: Keep-Alive\r\n"
+                        "Cache-Control: no-cache\r\n"
+                        "Content-type: application/x-fcs\r\n"
+                        "Content-length: %d\r\n\r\n", RTMPT_cmds[cmd],
+                        r->m_clientID.av_val ? r->m_clientID.av_val : "",
+                        r->m_msgCounter, r->Link.hostname.av_len, r->Link.hostname.av_val,
+                        r->Link.port, len);
+    RTMPSockBuf_Send(&r->m_sb, hbuf, hlen);
+    hlen = RTMPSockBuf_Send(&r->m_sb, buf, len);
+    r->m_msgCounter++;
+    r->m_unackd++;
+    return hlen;
+}
+
+static int
+HTTP_read(RTMP *r, int fill)
+{
+    char *ptr;
+    int hlen;
+
+restart:
+    if (fill)
+        RTMPSockBuf_Fill(&r->m_sb);
+    if (r->m_sb.sb_size < 13)
+    {
+        if (fill)
+            goto restart;
+        return -2;
+    }
+    if (strncmp(r->m_sb.sb_start, "HTTP/1.1 200 ", 13))
+        return -1;
+    r->m_sb.sb_start[r->m_sb.sb_size] = '\0';
+    if (!strstr(r->m_sb.sb_start, "\r\n\r\n"))
+    {
+        if (fill)
+            goto restart;
+        return -2;
+    }
+
+    ptr = r->m_sb.sb_start + sizeof("HTTP/1.1 200");
+    while ((ptr = strstr(ptr, "Content-")))
+    {
+        if (!strncasecmp(ptr+8, "length:", 7)) break;
+        ptr += 8;
+    }
+    if (!ptr)
+        return -1;
+    hlen = atoi(ptr+16);
+    ptr = strstr(ptr+16, "\r\n\r\n");
+    if (!ptr)
+        return -1;
+    ptr += 4;
+    if (ptr + (r->m_clientID.av_val ? 1 : hlen) > r->m_sb.sb_start + r->m_sb.sb_size)
+    {
+        if (fill)
+            goto restart;
+        return -2;
+    }
+    r->m_sb.sb_size -= ptr - r->m_sb.sb_start;
+    r->m_sb.sb_start = ptr;
+    r->m_unackd--;
+
+    if (!r->m_clientID.av_val)
+    {
+        r->m_clientID.av_len = hlen;
+        r->m_clientID.av_val = malloc(hlen+1);
+        if (!r->m_clientID.av_val)
+            return -1;
+        r->m_clientID.av_val[0] = '/';
+        memcpy(r->m_clientID.av_val+1, ptr, hlen-1);
+        r->m_clientID.av_val[hlen] = 0;
+        r->m_sb.sb_size = 0;
+    }
+    else
+    {
+        r->m_polling = *ptr++;
+        r->m_resplen = hlen - 1;
+        r->m_sb.sb_start++;
+        r->m_sb.sb_size--;
+    }
+    return 0;
+}
+
+#define MAX_IGNORED_FRAMES	50
+
+/* Read from the stream until we get a media packet.
+ * Returns -3 if Play.Close/Stop, -2 if fatal error, -1 if no more media
+ * packets, 0 if ignorable error, >0 if there is a media packet
+ */
+static int
+Read_1_Packet(RTMP *r, char *buf, unsigned int buflen)
+{
+    uint32_t prevTagSize = 0;
+    int rtnGetNextMediaPacket = 0, ret = RTMP_READ_EOF;
+    RTMPPacket packet = { 0 };
+    int recopy = FALSE;
+    unsigned int size;
+    char *ptr, *pend;
+    uint32_t nTimeStamp = 0;
+    unsigned int len;
+
+    rtnGetNextMediaPacket = RTMP_GetNextMediaPacket(r, &packet);
+    while (rtnGetNextMediaPacket)
+    {
+        char *packetBody = packet.m_body;
+        unsigned int nPacketLen = packet.m_nBodySize;
+
+        /* Return RTMP_READ_COMPLETE if this was completed nicely with
+         * invoke message Play.Stop or Play.Complete
+         */
+        if (rtnGetNextMediaPacket == 2)
+        {
+            RTMP_Log(RTMP_LOGDEBUG,
+                     "Got Play.Complete or Play.Stop from server. "
+                     "Assuming stream is complete");
+            ret = RTMP_READ_COMPLETE;
+            break;
+        }
+
+        r->m_read.dataType |= (((packet.m_packetType == RTMP_PACKET_TYPE_AUDIO) << 2) |
+                               (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO));
+
+        if (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO && nPacketLen <= 5)
+        {
+            RTMP_Log(RTMP_LOGDEBUG, "ignoring too small video packet: size: %d",
+                     nPacketLen);
+            ret = RTMP_READ_IGNORE;
+            break;
+        }
+        if (packet.m_packetType == RTMP_PACKET_TYPE_AUDIO && nPacketLen <= 1)
+        {
+            RTMP_Log(RTMP_LOGDEBUG, "ignoring too small audio packet: size: %d",
+                     nPacketLen);
+            ret = RTMP_READ_IGNORE;
+            break;
+        }
+
+        if (r->m_read.flags & RTMP_READ_SEEKING)
+        {
+            ret = RTMP_READ_IGNORE;
+            break;
+        }
+#ifdef _DEBUG
+        RTMP_Log(RTMP_LOGDEBUG, "type: %02X, size: %d, TS: %d ms, abs TS: %d",
+                 packet.m_packetType, nPacketLen, packet.m_nTimeStamp,
+                 packet.m_hasAbsTimestamp);
+        if (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO)
+            RTMP_Log(RTMP_LOGDEBUG, "frametype: %02X", (*packetBody & 0xf0));
+#endif
+
+        if (r->m_read.flags & RTMP_READ_RESUME)
+        {
+            /* check the header if we get one */
+            if (packet.m_nTimeStamp == 0)
+            {
+                if (r->m_read.nMetaHeaderSize > 0
+                        && packet.m_packetType == RTMP_PACKET_TYPE_INFO)
+                {
+                    AMFObject metaObj;
+                    int nRes =
+                        AMF_Decode(&metaObj, packetBody, nPacketLen, FALSE);
+                    if (nRes >= 0)
+                    {
+                        AVal metastring;
+                        AMFProp_GetString(AMF_GetProp(&metaObj, NULL, 0),
+                                          &metastring);
+
+                        if (AVMATCH(&metastring, &av_onMetaData))
+                        {
+                            /* compare */
+                            if ((r->m_read.nMetaHeaderSize != nPacketLen) ||
+                                    (memcmp
+                                     (r->m_read.metaHeader, packetBody,
+                                      r->m_read.nMetaHeaderSize) != 0))
+                            {
+                                ret = RTMP_READ_ERROR;
+                            }
+                        }
+                        AMF_Reset(&metaObj);
+                        if (ret == RTMP_READ_ERROR)
+                            break;
+                    }
+                }
+
+                /* check first keyframe to make sure we got the right position
+                 * in the stream! (the first non ignored frame)
+                 */
+                if (r->m_read.nInitialFrameSize > 0)
+                {
+                    /* video or audio data */
+                    if (packet.m_packetType == r->m_read.initialFrameType
+                            && r->m_read.nInitialFrameSize == nPacketLen)
+                    {
+                        /* we don't compare the sizes since the packet can
+                         * contain several FLV packets, just make sure the
+                         * first frame is our keyframe (which we are going
+                         * to rewrite)
+                         */
+                        if (memcmp
+                                (r->m_read.initialFrame, packetBody,
+                                 r->m_read.nInitialFrameSize) == 0)
+                        {
+                            RTMP_Log(RTMP_LOGDEBUG, "Checked keyframe successfully!");
+                            r->m_read.flags |= RTMP_READ_GOTKF;
+                            /* ignore it! (what about audio data after it? it is
+                             * handled by ignoring all 0ms frames, see below)
+                             */
+                            ret = RTMP_READ_IGNORE;
+                            break;
+                        }
+                    }
+
+                    /* hande FLV streams, even though the server resends the
+                     * keyframe as an extra video packet it is also included
+                     * in the first FLV stream chunk and we have to compare
+                     * it and filter it out !!
+                     */
+                    if (packet.m_packetType == RTMP_PACKET_TYPE_FLASH_VIDEO)
+                    {
+                        /* basically we have to find the keyframe with the
+                         * correct TS being nResumeTS
+                         */
+                        unsigned int pos = 0;
+                        uint32_t ts = 0;
+
+                        while (pos + 11 < nPacketLen)
+                        {
+                            /* size without header (11) and prevTagSize (4) */
+                            uint32_t dataSize =
+                                AMF_DecodeInt24(packetBody + pos + 1);
+                            ts = AMF_DecodeInt24(packetBody + pos + 4);
+                            ts |= (packetBody[pos + 7] << 24);
+
+#ifdef _DEBUG
+                            RTMP_Log(RTMP_LOGDEBUG,
+                                     "keyframe search: FLV Packet: type %02X, dataSize: %d, timeStamp: %d ms",
+                                     packetBody[pos], dataSize, ts);
+#endif
+                            /* ok, is it a keyframe?:
+                             * well doesn't work for audio!
+                             */
+                            if (packetBody[pos /*6928, test 0 */ ] ==
+                                    r->m_read.initialFrameType
+                                    /* && (packetBody[11]&0xf0) == 0x10 */ )
+                            {
+                                if (ts == r->m_read.nResumeTS)
+                                {
+                                    RTMP_Log(RTMP_LOGDEBUG,
+                                             "Found keyframe with resume-keyframe timestamp!");
+                                    if (r->m_read.nInitialFrameSize != dataSize
+                                            || memcmp(r->m_read.initialFrame,
+                                                      packetBody + pos + 11,
+                                                      r->m_read.
+                                                      nInitialFrameSize) != 0)
+                                    {
+                                        RTMP_Log(RTMP_LOGERROR,
+                                                 "FLV Stream: Keyframe doesn't match!");
+                                        ret = RTMP_READ_ERROR;
+                                        break;
+                                    }
+                                    r->m_read.flags |= RTMP_READ_GOTFLVK;
+
+                                    /* skip this packet?
+                                     * check whether skippable:
+                                     */
+                                    if (pos + 11 + dataSize + 4 > nPacketLen)
+                                    {
+                                        RTMP_Log(RTMP_LOGWARNING,
+                                                 "Non skipable packet since it doesn't end with chunk, stream corrupt!");
+                                        ret = RTMP_READ_ERROR;
+                                        break;
+                                    }
+                                    packetBody += (pos + 11 + dataSize + 4);
+                                    nPacketLen -= (pos + 11 + dataSize + 4);
+
+                                    goto stopKeyframeSearch;
+
+                                }
+                                else if (r->m_read.nResumeTS < ts)
+                                {
+                                    /* the timestamp ts will only increase with
+                                     * further packets, wait for seek
+                                     */
+                                    goto stopKeyframeSearch;
+                                }
+                            }
+                            pos += (11 + dataSize + 4);
+                        }
+                        if (ts < r->m_read.nResumeTS)
+                        {
+                            RTMP_Log(RTMP_LOGERROR,
+                                     "First packet does not contain keyframe, all "
+                                     "timestamps are smaller than the keyframe "
+                                     "timestamp; probably the resume seek failed?");
+                        }
+stopKeyframeSearch:
+                        ;
+                        if (!(r->m_read.flags & RTMP_READ_GOTFLVK))
+                        {
+                            RTMP_Log(RTMP_LOGERROR,
+                                     "Couldn't find the seeked keyframe in this chunk!");
+                            ret = RTMP_READ_IGNORE;
+                            break;
+                        }
+                    }
+                }
+            }
+
+            if (packet.m_nTimeStamp > 0
+                    && (r->m_read.flags & (RTMP_READ_GOTKF|RTMP_READ_GOTFLVK)))
+            {
+                /* another problem is that the server can actually change from
+                 * 09/08 video/audio packets to an FLV stream or vice versa and
+                 * our keyframe check will prevent us from going along with the
+                 * new stream if we resumed.
+                 *
+                 * in this case set the 'found keyframe' variables to true.
+                 * We assume that if we found one keyframe somewhere and were
+                 * already beyond TS > 0 we have written data to the output
+                 * which means we can accept all forthcoming data including the
+                 * change between 08/09 <-> FLV packets
+                 */
+                r->m_read.flags |= (RTMP_READ_GOTKF|RTMP_READ_GOTFLVK);
+            }
+
+            /* skip till we find our keyframe
+             * (seeking might put us somewhere before it)
+             */
+            if (!(r->m_read.flags & RTMP_READ_GOTKF) &&
+                    packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO)
+            {
+                RTMP_Log(RTMP_LOGWARNING,
+                         "Stream does not start with requested frame, ignoring data... ");
+                r->m_read.nIgnoredFrameCounter++;
+                if (r->m_read.nIgnoredFrameCounter > MAX_IGNORED_FRAMES)
+                    ret = RTMP_READ_ERROR;	/* fatal error, couldn't continue stream */
+                else
+                    ret = RTMP_READ_IGNORE;
+                break;
+            }
+            /* ok, do the same for FLV streams */
+            if (!(r->m_read.flags & RTMP_READ_GOTFLVK) &&
+                    packet.m_packetType == RTMP_PACKET_TYPE_FLASH_VIDEO)
+            {
+                RTMP_Log(RTMP_LOGWARNING,
+                         "Stream does not start with requested FLV frame, ignoring data... ");
+                r->m_read.nIgnoredFlvFrameCounter++;
+                if (r->m_read.nIgnoredFlvFrameCounter > MAX_IGNORED_FRAMES)
+                    ret = RTMP_READ_ERROR;
+                else
+                    ret = RTMP_READ_IGNORE;
+                break;
+            }
+
+            /* we have to ignore the 0ms frames since these are the first
+             * keyframes; we've got these so don't mess around with multiple
+             * copies sent by the server to us! (if the keyframe is found at a
+             * later position there is only one copy and it will be ignored by
+             * the preceding if clause)
+             */
+            if (!(r->m_read.flags & RTMP_READ_NO_IGNORE) &&
+                    packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO)
+            {
+                /* exclude type RTMP_PACKET_TYPE_FLASH_VIDEO since it can
+                 * contain several FLV packets
+                 */
+                if (packet.m_nTimeStamp == 0)
+                {
+                    ret = RTMP_READ_IGNORE;
+                    break;
+                }
+                else
+                {
+                    /* stop ignoring packets */
+                    r->m_read.flags |= RTMP_READ_NO_IGNORE;
+                }
+            }
+        }
+
+        /* calculate packet size and allocate slop buffer if necessary */
+        size = nPacketLen +
+               ((packet.m_packetType == RTMP_PACKET_TYPE_AUDIO
+                 || packet.m_packetType == RTMP_PACKET_TYPE_VIDEO
+                 || packet.m_packetType == RTMP_PACKET_TYPE_INFO) ? 11 : 0) +
+               (packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO ? 4 : 0);
+
+        if (size + 4 > buflen)
+        {
+            /* the extra 4 is for the case of an FLV stream without a last
+             * prevTagSize (we need extra 4 bytes to append it) */
+            r->m_read.buf = malloc(size + 4);
+            if (r->m_read.buf == 0)
+            {
+                RTMP_Log(RTMP_LOGERROR, "Couldn't allocate memory!");
+                ret = RTMP_READ_ERROR;		/* fatal error */
+                break;
+            }
+            recopy = TRUE;
+            ptr = r->m_read.buf;
+        }
+        else
+        {
+            ptr = buf;
+        }
+        pend = ptr + size + 4;
+
+        /* use to return timestamp of last processed packet */
+
+        /* audio (0x08), video (0x09) or metadata (0x12) packets :
+         * construct 11 byte header then add rtmp packet's data */
+        if (packet.m_packetType == RTMP_PACKET_TYPE_AUDIO
+                || packet.m_packetType == RTMP_PACKET_TYPE_VIDEO
+                || packet.m_packetType == RTMP_PACKET_TYPE_INFO)
+        {
+            nTimeStamp = r->m_read.nResumeTS + packet.m_nTimeStamp;
+            prevTagSize = 11 + nPacketLen;
+
+            *ptr = packet.m_packetType;
+            ptr++;
+            ptr = AMF_EncodeInt24(ptr, pend, nPacketLen);
+
+#if 0
+            if(packet.m_packetType == RTMP_PACKET_TYPE_VIDEO)
+            {
+
+                /* H264 fix: */
+                if((packetBody[0] & 0x0f) == 7)   /* CodecId = H264 */
+                {
+                    uint8_t packetType = *(packetBody+1);
+
+                    uint32_t ts = AMF_DecodeInt24(packetBody+2); /* composition time */
+                    int32_t cts = (ts+0xff800000)^0xff800000;
+                    RTMP_Log(RTMP_LOGDEBUG, "cts  : %d\n", cts);
+
+                    nTimeStamp -= cts;
+                    /* get rid of the composition time */
+                    CRTMP::EncodeInt24(packetBody+2, 0);
+                }
+                RTMP_Log(RTMP_LOGDEBUG, "VIDEO: nTimeStamp: 0x%08X (%d)\n", nTimeStamp, nTimeStamp);
+            }
+#endif
+
+            ptr = AMF_EncodeInt24(ptr, pend, nTimeStamp);
+            *ptr = (char)((nTimeStamp & 0xFF000000) >> 24);
+            ptr++;
+
+            /* stream id */
+            ptr = AMF_EncodeInt24(ptr, pend, 0);
+        }
+
+        memcpy(ptr, packetBody, nPacketLen);
+        len = nPacketLen;
+
+        /* correct tagSize and obtain timestamp if we have an FLV stream */
+        if (packet.m_packetType == RTMP_PACKET_TYPE_FLASH_VIDEO)
+        {
+            unsigned int pos = 0;
+            int delta;
+
+            /* grab first timestamp and see if it needs fixing */
+            nTimeStamp = AMF_DecodeInt24(packetBody + 4);
+            nTimeStamp |= (packetBody[7] << 24);
+            delta = packet.m_nTimeStamp - nTimeStamp + r->m_read.nResumeTS;
+
+            while (pos + 11 < nPacketLen)
+            {
+                /* size without header (11) and without prevTagSize (4) */
+                uint32_t dataSize = AMF_DecodeInt24(packetBody + pos + 1);
+                nTimeStamp = AMF_DecodeInt24(packetBody + pos + 4);
+                nTimeStamp |= (packetBody[pos + 7] << 24);
+
+                if (delta)
+                {
+                    nTimeStamp += delta;
+                    AMF_EncodeInt24(ptr+pos+4, pend, nTimeStamp);
+                    ptr[pos+7] = nTimeStamp>>24;
+                }
+
+                /* set data type */
+                r->m_read.dataType |= (((*(packetBody + pos) == 0x08) << 2) |
+                                       (*(packetBody + pos) == 0x09));
+
+                if (pos + 11 + dataSize + 4 > nPacketLen)
+                {
+                    if (pos + 11 + dataSize > nPacketLen)
+                    {
+                        RTMP_Log(RTMP_LOGERROR,
+                                 "Wrong data size (%u), stream corrupted, aborting!",
+                                 dataSize);
+                        ret = RTMP_READ_ERROR;
+                        break;
+                    }
+                    RTMP_Log(RTMP_LOGWARNING, "No tagSize found, appending!");
+
+                    /* we have to append a last tagSize! */
+                    prevTagSize = dataSize + 11;
+                    AMF_EncodeInt32(ptr + pos + 11 + dataSize, pend,
+                                    prevTagSize);
+                    size += 4;
+                    len += 4;
+                }
+                else
+                {
+                    prevTagSize =
+                        AMF_DecodeInt32(packetBody + pos + 11 + dataSize);
+
+#ifdef _DEBUG
+                    RTMP_Log(RTMP_LOGDEBUG,
+                             "FLV Packet: type %02X, dataSize: %lu, tagSize: %lu, timeStamp: %lu ms",
+                             (unsigned char)packetBody[pos], dataSize, prevTagSize,
+                             nTimeStamp);
+#endif
+
+                    if (prevTagSize != (dataSize + 11))
+                    {
+#ifdef _DEBUG
+                        RTMP_Log(RTMP_LOGWARNING,
+                                 "Tag and data size are not consitent, writing tag size according to dataSize+11: %d",
+                                 dataSize + 11);
+#endif
+
+                        prevTagSize = dataSize + 11;
+                        AMF_EncodeInt32(ptr + pos + 11 + dataSize, pend,
+                                        prevTagSize);
+                    }
+                }
+
+                pos += prevTagSize + 4;	/*(11+dataSize+4); */
+            }
+        }
+        ptr += len;
+
+        if (packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO)
+        {
+            /* FLV tag packets contain their own prevTagSize */
+            AMF_EncodeInt32(ptr, pend, prevTagSize);
+        }
+
+        /* In non-live this nTimeStamp can contain an absolute TS.
+         * Update ext timestamp with this absolute offset in non-live mode
+         * otherwise report the relative one
+         */
+        /* RTMP_Log(RTMP_LOGDEBUG, "type: %02X, size: %d, pktTS: %dms, TS: %dms, bLiveStream: %d", packet.m_packetType, nPacketLen, packet.m_nTimeStamp, nTimeStamp, r->Link.lFlags & RTMP_LF_LIVE); */
+        r->m_read.timestamp = (r->Link.lFlags & RTMP_LF_LIVE) ? packet.m_nTimeStamp : nTimeStamp;
+
+        ret = size;
+        break;
+    }
+
+    if (rtnGetNextMediaPacket)
+        RTMPPacket_Free(&packet);
+
+    if (recopy)
+    {
+        len = (unsigned int)(ret) > buflen ? buflen : ret;
+        memcpy(buf, r->m_read.buf, len);
+        r->m_read.bufpos = r->m_read.buf + len;
+        r->m_read.buflen = ret - len;
+    }
+    return ret;
+}
+
+static const char flvHeader[] = { 'F', 'L', 'V', 0x01,
+                                  0x00,				/* 0x04 == audio, 0x01 == video */
+                                  0x00, 0x00, 0x00, 0x09,
+                                  0x00, 0x00, 0x00, 0x00
+                                };
+
+#define HEADERBUF	(128*1024)
+int
+RTMP_Read(RTMP *r, char *buf, int size)
+{
+    int nRead = 0, total = 0;
+
+    /* can't continue */
+fail:
+    switch (r->m_read.status)
+    {
+    case RTMP_READ_EOF:
+    case RTMP_READ_COMPLETE:
+        return 0;
+    case RTMP_READ_ERROR:  /* corrupted stream, resume failed */
+        SetSockError(EINVAL);
+        return -1;
+    default:
+        break;
+    }
+
+    /* first time thru */
+    if (!(r->m_read.flags & RTMP_READ_HEADER))
+    {
+        if (!(r->m_read.flags & RTMP_READ_RESUME))
+        {
+            char *mybuf = malloc(HEADERBUF), *end = mybuf + HEADERBUF;
+            int cnt = 0;
+            r->m_read.buf = mybuf;
+            r->m_read.buflen = HEADERBUF;
+
+            memcpy(mybuf, flvHeader, sizeof(flvHeader));
+            r->m_read.buf += sizeof(flvHeader);
+            r->m_read.buflen -= sizeof(flvHeader);
+
+            while (r->m_read.timestamp == 0)
+            {
+                nRead = Read_1_Packet(r, r->m_read.buf, r->m_read.buflen);
+                if (nRead < 0)
+                {
+                    free(mybuf);
+                    r->m_read.buf = NULL;
+                    r->m_read.buflen = 0;
+                    r->m_read.status = nRead;
+                    goto fail;
+                }
+                /* buffer overflow, fix buffer and give up */
+                if (r->m_read.buf < mybuf || r->m_read.buf > end)
+                {
+                    mybuf = realloc(mybuf, cnt + nRead);
+                    memcpy(mybuf+cnt, r->m_read.buf, nRead);
+                    r->m_read.buf = mybuf+cnt+nRead;
+                    break;
+                }
+                cnt += nRead;
+                r->m_read.buf += nRead;
+                r->m_read.buflen -= nRead;
+                if (r->m_read.dataType == 5)
+                    break;
+            }
+            mybuf[4] = r->m_read.dataType;
+            r->m_read.buflen = r->m_read.buf - mybuf;
+            r->m_read.buf = mybuf;
+            r->m_read.bufpos = mybuf;
+        }
+        r->m_read.flags |= RTMP_READ_HEADER;
+    }
+
+    if ((r->m_read.flags & RTMP_READ_SEEKING) && r->m_read.buf)
+    {
+        /* drop whatever's here */
+        free(r->m_read.buf);
+        r->m_read.buf = NULL;
+        r->m_read.bufpos = NULL;
+        r->m_read.buflen = 0;
+    }
+
+    /* If there's leftover data buffered, use it up */
+    if (r->m_read.buf)
+    {
+        nRead = r->m_read.buflen;
+        if (nRead > size)
+            nRead = size;
+        memcpy(buf, r->m_read.bufpos, nRead);
+        r->m_read.buflen -= nRead;
+        if (!r->m_read.buflen)
+        {
+            free(r->m_read.buf);
+            r->m_read.buf = NULL;
+            r->m_read.bufpos = NULL;
+        }
+        else
+        {
+            r->m_read.bufpos += nRead;
+        }
+        buf += nRead;
+        total += nRead;
+        size -= nRead;
+    }
+
+    while (size > 0 && (nRead = Read_1_Packet(r, buf, size)) >= 0)
+    {
+        if (!nRead) continue;
+        buf += nRead;
+        total += nRead;
+        size -= nRead;
+        break;
+    }
+    if (nRead < 0)
+        r->m_read.status = nRead;
+
+    if (size < 0)
+        total += size;
+    return total;
+}
+
+static const AVal av_setDataFrame = AVC("@setDataFrame");
+
+int
+RTMP_Write(RTMP *r, const char *buf, int size)
+{
+    RTMPPacket *pkt = &r->m_write;
+    char *pend, *enc;
+    int s2 = size, ret, num;
+
+    pkt->m_nChannel = 0x04;	/* source channel */
+    pkt->m_nInfoField2 = r->m_stream_id;
+
+    while (s2)
+    {
+        if (!pkt->m_nBytesRead)
+        {
+            if (size < 11)
+            {
+                /* FLV pkt too small */
+                return 0;
+            }
+
+            if (buf[0] == 'F' && buf[1] == 'L' && buf[2] == 'V')
+            {
+                buf += 13;
+                s2 -= 13;
+            }
+
+            pkt->m_packetType = *buf++;
+            pkt->m_nBodySize = AMF_DecodeInt24(buf);
+            buf += 3;
+            pkt->m_nTimeStamp = AMF_DecodeInt24(buf);
+            buf += 3;
+            pkt->m_nTimeStamp |= *buf++ << 24;
+            buf += 3;
+            s2 -= 11;
+
+            if (((pkt->m_packetType == RTMP_PACKET_TYPE_AUDIO
+                    || pkt->m_packetType == RTMP_PACKET_TYPE_VIDEO) &&
+                    !pkt->m_nTimeStamp) || pkt->m_packetType == RTMP_PACKET_TYPE_INFO)
+            {
+                pkt->m_headerType = RTMP_PACKET_SIZE_LARGE;
+                if (pkt->m_packetType == RTMP_PACKET_TYPE_INFO)
+                    pkt->m_nBodySize += 16;
+            }
+            else
+            {
+                pkt->m_headerType = RTMP_PACKET_SIZE_MEDIUM;
+            }
+
+            if (!RTMPPacket_Alloc(pkt, pkt->m_nBodySize))
+            {
+                RTMP_Log(RTMP_LOGDEBUG, "%s, failed to allocate packet", __FUNCTION__);
+                return FALSE;
+            }
+            enc = pkt->m_body;
+            pend = enc + pkt->m_nBodySize;
+            if (pkt->m_packetType == RTMP_PACKET_TYPE_INFO)
+            {
+                enc = AMF_EncodeString(enc, pend, &av_setDataFrame);
+                pkt->m_nBytesRead = enc - pkt->m_body;
+            }
+        }
+        else
+        {
+            enc = pkt->m_body + pkt->m_nBytesRead;
+        }
+        num = pkt->m_nBodySize - pkt->m_nBytesRead;
+        if (num > s2)
+            num = s2;
+        memcpy(enc, buf, num);
+        pkt->m_nBytesRead += num;
+        s2 -= num;
+        buf += num;
+        if (pkt->m_nBytesRead == pkt->m_nBodySize)
+        {
+            ret = RTMP_SendPacket(r, pkt, FALSE);
+            RTMPPacket_Free(pkt);
+            pkt->m_nBytesRead = 0;
+            if (!ret)
+                return -1;
+            buf += 4;
+            s2 -= 4;
+            if (s2 < 0)
+                break;
+        }
+    }
+    return size+s2;
+}

+ 416 - 0
plugins/obs-outputs/librtmp/rtmp.h

@@ -0,0 +1,416 @@
+#ifndef __RTMP_H__
+#define __RTMP_H__
+/*
+ *      Copyright (C) 2005-2008 Team XBMC
+ *      http://www.xbmc.org
+ *      Copyright (C) 2008-2009 Andrej Stepanchuk
+ *      Copyright (C) 2009-2010 Howard Chu
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+#define NO_CRYPTO 1
+
+#if !defined(NO_CRYPTO) && !defined(CRYPTO)
+#define CRYPTO
+#else
+#include <sys/types.h> //for off_t
+#endif
+
+#include <errno.h>
+#include <stdint.h>
+
+#ifdef _WIN32
+#pragma warning(disable:4996) //depricated warnings
+#pragma warning(disable:4244) //64bit defensive mechanism, fixed the ones that mattered
+#include <winsock.h>
+#else
+#include <sys/socket.h>
+#include <netinet/in.h>
+#define SOCKET int
+#endif
+
+#include "amf.h"
+
+#ifdef __cplusplus
+extern "C"
+{
+#endif
+
+#define RTMP_LIB_VERSION	0x020300	/* 2.3 */
+
+#define RTMP_FEATURE_HTTP	0x01
+#define RTMP_FEATURE_ENC	0x02
+#define RTMP_FEATURE_SSL	0x04
+#define RTMP_FEATURE_MFP	0x08	/* not yet supported */
+#define RTMP_FEATURE_WRITE	0x10	/* publish, not play */
+#define RTMP_FEATURE_HTTP2	0x20	/* server-side rtmpt */
+
+#define RTMP_PROTOCOL_UNDEFINED	-1
+#define RTMP_PROTOCOL_RTMP      0
+#define RTMP_PROTOCOL_RTMPE     RTMP_FEATURE_ENC
+#define RTMP_PROTOCOL_RTMPT     RTMP_FEATURE_HTTP
+#define RTMP_PROTOCOL_RTMPS     RTMP_FEATURE_SSL
+#define RTMP_PROTOCOL_RTMPTE    (RTMP_FEATURE_HTTP|RTMP_FEATURE_ENC)
+#define RTMP_PROTOCOL_RTMPTS    (RTMP_FEATURE_HTTP|RTMP_FEATURE_SSL)
+#define RTMP_PROTOCOL_RTMFP     RTMP_FEATURE_MFP
+
+#define RTMP_DEFAULT_CHUNKSIZE	128
+
+    /* needs to fit largest number of bytes recv() may return */
+#define RTMP_BUFFER_CACHE_SIZE (16*1024)
+
+#define	RTMP_CHANNELS	65600
+
+    extern const char RTMPProtocolStringsLower[][7];
+    extern const AVal RTMP_DefaultFlashVer;
+    extern int RTMP_ctrlC;
+
+    uint32_t RTMP_GetTime(void);
+
+    /*      RTMP_PACKET_TYPE_...                0x00 */
+#define RTMP_PACKET_TYPE_CHUNK_SIZE         0x01
+    /*      RTMP_PACKET_TYPE_...                0x02 */
+#define RTMP_PACKET_TYPE_BYTES_READ_REPORT  0x03
+#define RTMP_PACKET_TYPE_CONTROL            0x04
+#define RTMP_PACKET_TYPE_SERVER_BW          0x05
+#define RTMP_PACKET_TYPE_CLIENT_BW          0x06
+    /*      RTMP_PACKET_TYPE_...                0x07 */
+#define RTMP_PACKET_TYPE_AUDIO              0x08
+#define RTMP_PACKET_TYPE_VIDEO              0x09
+    /*      RTMP_PACKET_TYPE_...                0x0A */
+    /*      RTMP_PACKET_TYPE_...                0x0B */
+    /*      RTMP_PACKET_TYPE_...                0x0C */
+    /*      RTMP_PACKET_TYPE_...                0x0D */
+    /*      RTMP_PACKET_TYPE_...                0x0E */
+#define RTMP_PACKET_TYPE_FLEX_STREAM_SEND   0x0F
+#define RTMP_PACKET_TYPE_FLEX_SHARED_OBJECT 0x10
+#define RTMP_PACKET_TYPE_FLEX_MESSAGE       0x11
+#define RTMP_PACKET_TYPE_INFO               0x12
+#define RTMP_PACKET_TYPE_SHARED_OBJECT      0x13
+#define RTMP_PACKET_TYPE_INVOKE             0x14
+    /*      RTMP_PACKET_TYPE_...                0x15 */
+#define RTMP_PACKET_TYPE_FLASH_VIDEO        0x16
+
+#define RTMP_MAX_HEADER_SIZE 18
+
+#define RTMP_PACKET_SIZE_LARGE    0
+#define RTMP_PACKET_SIZE_MEDIUM   1
+#define RTMP_PACKET_SIZE_SMALL    2
+#define RTMP_PACKET_SIZE_MINIMUM  3
+
+    typedef struct RTMPChunk
+    {
+        int c_headerSize;
+        int c_chunkSize;
+        char *c_chunk;
+        char c_header[RTMP_MAX_HEADER_SIZE];
+    } RTMPChunk;
+
+    typedef struct RTMPPacket
+    {
+        uint8_t m_headerType;
+        uint8_t m_packetType;
+        uint8_t m_hasAbsTimestamp;	/* timestamp absolute or relative? */
+        int m_nChannel;
+        uint32_t m_nTimeStamp;	/* timestamp */
+        int32_t m_nInfoField2;	/* last 4 bytes in a long header */
+        uint32_t m_nBodySize;
+        uint32_t m_nBytesRead;
+        RTMPChunk *m_chunk;
+        char *m_body;
+    } RTMPPacket;
+
+    typedef struct RTMPSockBuf
+    {
+        SOCKET sb_socket;
+        int sb_size;		/* number of unprocessed bytes in buffer */
+        char *sb_start;		/* pointer into sb_pBuffer of next byte to process */
+        char sb_buf[RTMP_BUFFER_CACHE_SIZE];	/* data read from socket */
+        int sb_timedout;
+        void *sb_ssl;
+    } RTMPSockBuf;
+
+    void RTMPPacket_Reset(RTMPPacket *p);
+    void RTMPPacket_Dump(RTMPPacket *p);
+    int RTMPPacket_Alloc(RTMPPacket *p, int nSize);
+    void RTMPPacket_Free(RTMPPacket *p);
+
+#define RTMPPacket_IsReady(a)	((a)->m_nBytesRead == (a)->m_nBodySize)
+
+    typedef struct RTMP_LNK
+    {
+        AVal hostname;
+        AVal sockshost;
+
+        AVal playpath0;	/* parsed from URL */
+        AVal playpath;	/* passed in explicitly */
+        AVal tcUrl;
+        AVal swfUrl;
+        AVal pageUrl;
+        AVal app;
+        AVal auth;
+        AVal flashVer;
+        AVal subscribepath;
+        AVal usherToken;
+        AVal token;
+        AVal pubUser;
+        AVal pubPasswd;
+        AMFObject extras;
+        int edepth;
+
+        int seekTime;
+        int stopTime;
+
+#define RTMP_LF_AUTH	0x0001	/* using auth param */
+#define RTMP_LF_LIVE	0x0002	/* stream is live */
+#define RTMP_LF_SWFV	0x0004	/* do SWF verification */
+#define RTMP_LF_PLST	0x0008	/* send playlist before play */
+#define RTMP_LF_BUFX	0x0010	/* toggle stream on BufferEmpty msg */
+#define RTMP_LF_FTCU	0x0020	/* free tcUrl on close */
+        int lFlags;
+
+        int swfAge;
+
+        int protocol;
+        int timeout;		/* connection timeout in seconds */
+
+#define RTMP_PUB_NAME   0x0001  /* send login to server */
+#define RTMP_PUB_RESP   0x0002  /* send salted password hash */
+#define RTMP_PUB_ALLOC  0x0004  /* allocated data for new tcUrl & app */
+#define RTMP_PUB_CLEAN  0x0008  /* need to free allocated data for newer tcUrl & app at exit */
+#define RTMP_PUB_CLATE  0x0010  /* late clean tcUrl & app at exit */
+        int pFlags;
+
+        unsigned short socksport;
+        unsigned short port;
+
+#ifdef CRYPTO
+#define RTMP_SWF_HASHLEN	32
+        void *dh;			/* for encryption */
+        void *rc4keyIn;
+        void *rc4keyOut;
+
+        uint32_t SWFSize;
+        uint8_t SWFHash[RTMP_SWF_HASHLEN];
+        char SWFVerificationResponse[RTMP_SWF_HASHLEN+10];
+#endif
+    } RTMP_LNK;
+
+    /* state for read() wrapper */
+    typedef struct RTMP_READ
+    {
+        char *buf;
+        char *bufpos;
+        unsigned int buflen;
+        uint32_t timestamp;
+        uint8_t dataType;
+        uint8_t flags;
+#define RTMP_READ_HEADER	0x01
+#define RTMP_READ_RESUME	0x02
+#define RTMP_READ_NO_IGNORE	0x04
+#define RTMP_READ_GOTKF		0x08
+#define RTMP_READ_GOTFLVK	0x10
+#define RTMP_READ_SEEKING	0x20
+        int8_t status;
+#define RTMP_READ_COMPLETE	-3
+#define RTMP_READ_ERROR	-2
+#define RTMP_READ_EOF	-1
+#define RTMP_READ_IGNORE	0
+
+        /* if bResume == TRUE */
+        uint8_t initialFrameType;
+        uint32_t nResumeTS;
+        char *metaHeader;
+        char *initialFrame;
+        uint32_t nMetaHeaderSize;
+        uint32_t nInitialFrameSize;
+        uint32_t nIgnoredFrameCounter;
+        uint32_t nIgnoredFlvFrameCounter;
+    } RTMP_READ;
+
+    typedef struct RTMP_METHOD
+    {
+        AVal name;
+        int num;
+    } RTMP_METHOD;
+
+    typedef struct RTMP_BINDINFO
+    {
+        struct sockaddr_in addr;
+        int addrLen;
+    } RTMP_BINDINFO;
+
+    typedef int (*CUSTOMSEND)(RTMPSockBuf*, const char *, int, void*);
+
+    typedef struct RTMP
+    {
+        int m_inChunkSize;
+        int m_outChunkSize;
+        int m_nBWCheckCounter;
+        int m_nBytesIn;
+        int m_nBytesInSent;
+        int m_nBufferMS;
+        int m_stream_id;		/* returned in _result from createStream */
+        int m_mediaChannel;
+        uint32_t m_mediaStamp;
+        uint32_t m_pauseStamp;
+        int m_pausing;
+        int m_nServerBW;
+        int m_nClientBW;
+        uint8_t m_nClientBW2;
+        uint8_t m_bPlaying;
+        uint8_t m_bSendEncoding;
+        uint8_t m_bSendCounter;
+
+        uint8_t m_bUseNagle;
+        uint8_t m_bCustomSend;
+        void*   m_customSendParam;
+        CUSTOMSEND m_customSendFunc;
+
+        RTMP_BINDINFO m_bindIP;
+
+        uint8_t m_bSendChunkSizeInfo;
+
+        int m_numInvokes;
+        int m_numCalls;
+        RTMP_METHOD *m_methodCalls;	/* remote method calls queue */
+
+        int m_channelsAllocatedIn;
+        int m_channelsAllocatedOut;
+        RTMPPacket **m_vecChannelsIn;
+        RTMPPacket **m_vecChannelsOut;
+        int *m_channelTimestamp;	/* abs timestamp of last packet */
+
+        double m_fAudioCodecs;	/* audioCodecs for the connect packet */
+        double m_fVideoCodecs;	/* videoCodecs for the connect packet */
+        double m_fEncoding;		/* AMF0 or AMF3 */
+
+        double m_fDuration;		/* duration of stream in seconds */
+
+        int m_msgCounter;		/* RTMPT stuff */
+        int m_polling;
+        int m_resplen;
+        int m_unackd;
+        AVal m_clientID;
+
+        RTMP_READ m_read;
+        RTMPPacket m_write;
+        RTMPSockBuf m_sb;
+        RTMP_LNK Link;
+    } RTMP;
+
+    int RTMP_ParseURL(const char *url, int *protocol, AVal *host,
+                      unsigned int *port, AVal *playpath, AVal *app);
+
+    int RTMP_ParseURL2(const char *url, int *protocol, AVal *host,
+                      unsigned int *port, AVal *app);
+
+    void RTMP_ParsePlaypath(AVal *in, AVal *out);
+    void RTMP_SetBufferMS(RTMP *r, int size);
+    void RTMP_UpdateBufferMS(RTMP *r);
+
+    int RTMP_SetOpt(RTMP *r, const AVal *opt, AVal *arg);
+    int RTMP_SetupURL(RTMP *r, char *url);
+    int RTMP_SetupURL2(RTMP *r, char *url, char *playpath);
+    void RTMP_SetupStream(RTMP *r, int protocol,
+                          AVal *hostname,
+                          unsigned int port,
+                          AVal *sockshost,
+                          AVal *playpath,
+                          AVal *tcUrl,
+                          AVal *swfUrl,
+                          AVal *pageUrl,
+                          AVal *app,
+                          AVal *auth,
+                          AVal *swfSHA256Hash,
+                          uint32_t swfSize,
+                          AVal *flashVer,
+                          AVal *subscribepath,
+                          AVal *usherToken,
+                          int dStart,
+                          int dStop, int bLiveStream, long int timeout);
+
+    int RTMP_Connect(RTMP *r, RTMPPacket *cp);
+    struct sockaddr;
+    int RTMP_Connect0(RTMP *r, struct sockaddr *svc);
+    int RTMP_Connect1(RTMP *r, RTMPPacket *cp);
+    int RTMP_Serve(RTMP *r);
+    int RTMP_TLS_Accept(RTMP *r, void *ctx);
+
+    int RTMP_ReadPacket(RTMP *r, RTMPPacket *packet);
+    int RTMP_SendPacket(RTMP *r, RTMPPacket *packet, int queue);
+    int RTMP_SendChunk(RTMP *r, RTMPChunk *chunk);
+    int RTMP_IsConnected(RTMP *r);
+    SOCKET RTMP_Socket(RTMP *r);
+    int RTMP_IsTimedout(RTMP *r);
+    double RTMP_GetDuration(RTMP *r);
+    int RTMP_ToggleStream(RTMP *r);
+
+    int RTMP_ConnectStream(RTMP *r, int seekTime);
+    int RTMP_ReconnectStream(RTMP *r, int seekTime);
+    void RTMP_DeleteStream(RTMP *r);
+    int RTMP_GetNextMediaPacket(RTMP *r, RTMPPacket *packet);
+    int RTMP_ClientPacket(RTMP *r, RTMPPacket *packet);
+
+    void RTMP_Init(RTMP *r);
+    void RTMP_Close(RTMP *r);
+    RTMP *RTMP_Alloc(void);
+    void RTMP_Free(RTMP *r);
+    void RTMP_EnableWrite(RTMP *r);
+
+    void *RTMP_TLS_AllocServerContext(const char* cert, const char* key);
+    void RTMP_TLS_FreeServerContext(void *ctx);
+
+    int RTMP_LibVersion(void);
+    void RTMP_UserInterrupt(void);	/* user typed Ctrl-C */
+
+    int RTMP_SendCtrl(RTMP *r, short nType, unsigned int nObject,
+                      unsigned int nTime);
+
+    /* caller probably doesn't know current timestamp, should
+     * just use RTMP_Pause instead
+     */
+    int RTMP_SendPause(RTMP *r, int DoPause, int dTime);
+    int RTMP_Pause(RTMP *r, int DoPause);
+
+    int RTMP_FindFirstMatchingProperty(AMFObject *obj, const AVal *name,
+                                       AMFObjectProperty * p);
+
+    int RTMPSockBuf_Fill(RTMPSockBuf *sb);
+    int RTMPSockBuf_Send(RTMPSockBuf *sb, const char *buf, int len);
+    int RTMPSockBuf_Close(RTMPSockBuf *sb);
+
+    int RTMP_SendCreateStream(RTMP *r);
+    int RTMP_SendSeek(RTMP *r, int dTime);
+    int RTMP_SendServerBW(RTMP *r);
+    int RTMP_SendClientBW(RTMP *r);
+    void RTMP_DropRequest(RTMP *r, int i, int freeit);
+    int RTMP_Read(RTMP *r, char *buf, int size);
+    int RTMP_Write(RTMP *r, const char *buf, int size);
+
+    /* hashswf.c */
+    int RTMP_HashSWF(const char *url, unsigned int *size, unsigned char *hash,
+                     int age);
+
+#ifdef __cplusplus
+};
+#endif
+
+#endif

+ 163 - 0
plugins/obs-outputs/librtmp/rtmp_sys.h

@@ -0,0 +1,163 @@
+#ifndef __RTMP_SYS_H__
+#define __RTMP_SYS_H__
+/*
+ *      Copyright (C) 2010 Howard Chu
+ *
+ *  This file is part of librtmp.
+ *
+ *  librtmp is free software; you can redistribute it and/or modify
+ *  it under the terms of the GNU Lesser General Public License as
+ *  published by the Free Software Foundation; either version 2.1,
+ *  or (at your option) any later version.
+ *
+ *  librtmp is distributed in the hope that it will be useful,
+ *  but WITHOUT ANY WARRANTY; without even the implied warranty of
+ *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+ *  GNU General Public License for more details.
+ *
+ *  You should have received a copy of the GNU Lesser General Public License
+ *  along with librtmp see the file COPYING.  If not, write to
+ *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+ *  Boston, MA  02110-1301, USA.
+ *  http://www.gnu.org/copyleft/lgpl.html
+ */
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <assert.h>
+#include <ctype.h>
+#include <stddef.h>
+#include <errno.h>
+#include <stdarg.h>
+#include <limits.h>
+#include <time.h>
+#include <stdint.h>
+
+#ifdef _WIN32
+
+#include <winsock2.h>
+#include <ws2tcpip.h>
+
+
+#ifdef _MSC_VER	/* MSVC */
+#define snprintf _snprintf
+#define strcasecmp stricmp
+#define strncasecmp strnicmp
+#define vsnprintf _vsnprintf
+#endif
+
+#define GetSockError()	WSAGetLastError()
+#define SetSockError(e)	WSASetLastError(e)
+#define setsockopt(a,b,c,d,e)	(setsockopt)(a,b,c,(const char *)d,(int)e)
+#ifdef EWOULDBLOCK
+#undef EWOULDBLOCK
+#endif
+#define EWOULDBLOCK	WSAETIMEDOUT	/* we don't use nonblocking, but we do use timeouts */
+#define sleep(n)	Sleep(n*1000)
+#define msleep(n)	Sleep(n)
+#define SET_RCVTIMEO(tv,s)	int tv = s*1000
+#else /* !_WIN32 */
+#include <sys/types.h>
+#include <sys/socket.h>
+#include <sys/times.h>
+#include <netdb.h>
+#include <unistd.h>
+#include <netinet/in.h>
+#include <netinet/tcp.h>
+#include <arpa/inet.h>
+#define GetSockError()	errno
+#define SetSockError(e)	errno = e
+#undef closesocket
+#define closesocket(s)	close(s)
+#define msleep(n)	usleep(n*1000)
+#define SET_RCVTIMEO(tv,s)	struct timeval tv = {s,0}
+#endif
+
+#include "rtmp.h"
+
+#ifdef USE_POLARSSL
+#include <polarssl/version.h>
+#include <polarssl/net.h>
+#include <polarssl/ssl.h>
+#include <polarssl/havege.h>
+#if POLARSSL_VERSION_NUMBER < 0x01010000
+#define havege_random	havege_rand
+#endif
+#if POLARSSL_VERSION_NUMBER >= 0x01020000
+#define	SSL_SET_SESSION(S,resume,timeout,ctx)	ssl_set_session(S,ctx)
+#else
+#define	SSL_SET_SESSION(S,resume,timeout,ctx)	ssl_set_session(S,resume,timeout,ctx)
+#endif
+typedef struct tls_ctx
+{
+    havege_state hs;
+    ssl_session ssn;
+} tls_ctx;
+typedef struct tls_server_ctx
+{
+    havege_state *hs;
+    x509_cert cert;
+    rsa_context key;
+    ssl_session ssn;
+    const char *dhm_P, *dhm_G;
+} tls_server_ctx;
+
+#define TLS_CTX tls_ctx *
+#define TLS_client(ctx,s)	s = malloc(sizeof(ssl_context)); ssl_init(s);\
+	ssl_set_endpoint(s, SSL_IS_CLIENT); ssl_set_authmode(s, SSL_VERIFY_NONE);\
+	ssl_set_rng(s, havege_random, &ctx->hs);\
+	ssl_set_ciphersuites(s, ssl_default_ciphersuites);\
+	SSL_SET_SESSION(s, 1, 600, &ctx->ssn)
+#define TLS_server(ctx,s)	s = malloc(sizeof(ssl_context)); ssl_init(s);\
+	ssl_set_endpoint(s, SSL_IS_SERVER); ssl_set_authmode(s, SSL_VERIFY_NONE);\
+	ssl_set_rng(s, havege_random, ((tls_server_ctx*)ctx)->hs);\
+	ssl_set_ciphersuites(s, ssl_default_ciphersuites);\
+	SSL_SET_SESSION(s, 1, 600, &((tls_server_ctx*)ctx)->ssn);\
+	ssl_set_own_cert(s, &((tls_server_ctx*)ctx)->cert, &((tls_server_ctx*)ctx)->key);\
+	ssl_set_dh_param(s, ((tls_server_ctx*)ctx)->dhm_P, ((tls_server_ctx*)ctx)->dhm_G)
+#define TLS_setfd(s,fd)	ssl_set_bio(s, net_recv, &fd, net_send, &fd)
+#define TLS_connect(s)	ssl_handshake(s)
+#define TLS_accept(s)	ssl_handshake(s)
+#define TLS_read(s,b,l)	ssl_read(s,(unsigned char *)b,l)
+#define TLS_write(s,b,l)	ssl_write(s,(unsigned char *)b,l)
+#define TLS_shutdown(s)	ssl_close_notify(s)
+#define TLS_close(s)	ssl_free(s); free(s)
+
+#elif defined(USE_GNUTLS)
+#include <gnutls/gnutls.h>
+typedef struct tls_ctx
+{
+    gnutls_certificate_credentials_t cred;
+    gnutls_priority_t prios;
+} tls_ctx;
+#define TLS_CTX	tls_ctx *
+#define TLS_client(ctx,s)	gnutls_init((gnutls_session_t *)(&s), GNUTLS_CLIENT); gnutls_priority_set(s, ctx->prios); gnutls_credentials_set(s, GNUTLS_CRD_CERTIFICATE, ctx->cred)
+#define TLS_server(ctx,s)	gnutls_init((gnutls_session_t *)(&s), GNUTLS_SERVER); gnutls_priority_set_direct(s, "NORMAL", NULL); gnutls_credentials_set(s, GNUTLS_CRD_CERTIFICATE, ctx)
+#define TLS_setfd(s,fd)	gnutls_transport_set_ptr(s, (gnutls_transport_ptr_t)(long)fd)
+#define TLS_connect(s)	gnutls_handshake(s)
+#define TLS_accept(s)	gnutls_handshake(s)
+#define TLS_read(s,b,l)	gnutls_record_recv(s,b,l)
+#define TLS_write(s,b,l)	gnutls_record_send(s,b,l)
+#define TLS_shutdown(s)	gnutls_bye(s, GNUTLS_SHUT_RDWR)
+#define TLS_close(s)	gnutls_deinit(s)
+
+#elif defined(USE_ONLY_MD5)
+#include "md5.h"
+#include "cencode.h"
+#define MD5_DIGEST_LENGTH 16
+
+#else	/* USE_OPENSSL */
+#define TLS_CTX	SSL_CTX *
+#define TLS_client(ctx,s)	s = SSL_new(ctx)
+#define TLS_server(ctx,s)	s = SSL_new(ctx)
+#define TLS_setfd(s,fd)	SSL_set_fd(s,fd)
+#define TLS_connect(s)	SSL_connect(s)
+#define TLS_accept(s)	SSL_accept(s)
+#define TLS_read(s,b,l)	SSL_read(s,b,l)
+#define TLS_write(s,b,l)	SSL_write(s,b,l)
+#define TLS_shutdown(s)	SSL_shutdown(s)
+#define TLS_close(s)	SSL_free(s)
+
+#endif
+#endif