rtmp.c 167 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528
  1. /*
  2. * Copyright (C) 2005-2008 Team XBMC
  3. * http://www.xbmc.org
  4. * Copyright (C) 2008-2009 Andrej Stepanchuk
  5. * Copyright (C) 2009-2010 Howard Chu
  6. *
  7. * This file is part of librtmp.
  8. *
  9. * librtmp is free software; you can redistribute it and/or modify
  10. * it under the terms of the GNU Lesser General Public License as
  11. * published by the Free Software Foundation; either version 2.1,
  12. * or (at your option) any later version.
  13. *
  14. * librtmp is distributed in the hope that it will be useful,
  15. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  16. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  17. * GNU General Public License for more details.
  18. *
  19. * You should have received a copy of the GNU Lesser General Public License
  20. * along with librtmp see the file COPYING. If not, write to
  21. * the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
  22. * Boston, MA 02110-1301, USA.
  23. * http://www.gnu.org/copyleft/lgpl.html
  24. */
  25. #ifndef NO_AUTH
  26. #ifndef CRYPTO
  27. #define USE_ONLY_MD5
  28. #endif
  29. #endif
  30. #include "rtmp_sys.h"
  31. #include "log.h"
  32. #include <util/platform.h>
  33. #if !defined(MSG_NOSIGNAL)
  34. #define MSG_NOSIGNAL 0
  35. #endif
  36. #ifdef CRYPTO
  37. #ifdef __APPLE__
  38. #pragma GCC diagnostic ignored "-Wdeprecated-declarations"
  39. #endif
  40. #if defined(USE_MBEDTLS)
  41. #if defined(_WIN32)
  42. #include <windows.h>
  43. #include <wincrypt.h>
  44. #elif defined(__APPLE__)
  45. #include <Security/Security.h>
  46. #endif
  47. #include <mbedtls/ctr_drbg.h>
  48. #include <mbedtls/md5.h>
  49. #include <mbedtls/base64.h>
  50. #define MD5_DIGEST_LENGTH 16
  51. #elif defined(USE_POLARSSL)
  52. #include <polarssl/havege.h>
  53. #include <polarssl/md5.h>
  54. #include <polarssl/base64.h>
  55. #define MD5_DIGEST_LENGTH 16
  56. static const char *my_dhm_P =
  57. "E4004C1F94182000103D883A448B3F80" \
  58. "2CE4B44A83301270002C20D0321CFD00" \
  59. "11CCEF784C26A400F43DFB901BCA7538" \
  60. "F2C6B176001CF5A0FD16D2C48B1D0C1C" \
  61. "F6AC8E1DA6BCC3B4E1F96B0564965300" \
  62. "FFA1D0B601EB2800F489AA512C4B248C" \
  63. "01F76949A60BB7F00A40B1EAB64BDD48" \
  64. "E8A700D60B7F1200FA8E77B0A979DABF";
  65. static const char *my_dhm_G = "4";
  66. #elif defined(USE_GNUTLS)
  67. #include <gnutls/gnutls.h>
  68. #define MD5_DIGEST_LENGTH 16
  69. #include <nettle/base64.h>
  70. #include <nettle/md5.h>
  71. #else /* USE_OPENSSL */
  72. #include <openssl/ssl.h>
  73. #include <openssl/rc4.h>
  74. #include <openssl/md5.h>
  75. #include <openssl/bio.h>
  76. #include <openssl/buffer.h>
  77. #endif
  78. TLS_CTX RTMP_TLS_ctx = NULL;
  79. #endif
  80. #define RTMP_SIG_SIZE 1536
  81. #define RTMP_LARGE_HEADER_SIZE 12
  82. static const int packetSize[] = { 12, 8, 4, 1 };
  83. int RTMP_ctrlC;
  84. const char RTMPProtocolStrings[][7] =
  85. {
  86. "RTMP",
  87. "RTMPT",
  88. "RTMPE",
  89. "RTMPTE",
  90. "RTMPS",
  91. "RTMPTS",
  92. "",
  93. "",
  94. "RTMFP"
  95. };
  96. const char RTMPProtocolStringsLower[][7] =
  97. {
  98. "rtmp",
  99. "rtmpt",
  100. "rtmpe",
  101. "rtmpte",
  102. "rtmps",
  103. "rtmpts",
  104. "",
  105. "",
  106. "rtmfp"
  107. };
  108. static const char *RTMPT_cmds[] =
  109. {
  110. "open",
  111. "send",
  112. "idle",
  113. "close"
  114. };
  115. typedef enum
  116. {
  117. RTMPT_OPEN=0, RTMPT_SEND, RTMPT_IDLE, RTMPT_CLOSE
  118. } RTMPTCmd;
  119. static int DumpMetaData(AMFObject *obj);
  120. static int HandShake(RTMP *r, int FP9HandShake);
  121. static int SocksNegotiate(RTMP *r);
  122. static int SendConnectPacket(RTMP *r, RTMPPacket *cp);
  123. static int SendCheckBW(RTMP *r);
  124. static int SendCheckBWResult(RTMP *r, double txn);
  125. static int SendDeleteStream(RTMP *r, double dStreamId);
  126. static int SendFCSubscribe(RTMP *r, AVal *subscribepath);
  127. static int SendPlay(RTMP *r, int streamIdx);
  128. static int SendBytesReceived(RTMP *r);
  129. static int SendUsherToken(RTMP *r, AVal *usherToken);
  130. static int SendFCUnpublish(RTMP *r, int streamIdx);
  131. #if 0 /* unused */
  132. static int SendBGHasStream(RTMP *r, double dId, AVal *playpath);
  133. #endif
  134. static int HandleInvoke(RTMP *r, const char *body, unsigned int nBodySize);
  135. static int HandleMetadata(RTMP *r, char *body, unsigned int len);
  136. static void HandleChangeChunkSize(RTMP *r, const RTMPPacket *packet);
  137. static void HandleAudio(RTMP *r, const RTMPPacket *packet);
  138. static void HandleVideo(RTMP *r, const RTMPPacket *packet);
  139. static void HandleCtrl(RTMP *r, const RTMPPacket *packet);
  140. static void HandleServerBW(RTMP *r, const RTMPPacket *packet);
  141. static void HandleClientBW(RTMP *r, const RTMPPacket *packet);
  142. static int ReadN(RTMP *r, char *buffer, int n);
  143. static int WriteN(RTMP *r, const char *buffer, int n);
  144. static void DecodeTEA(AVal *key, AVal *text);
  145. static int HTTP_Post(RTMP *r, RTMPTCmd cmd, const char *buf, int len);
  146. static int HTTP_read(RTMP *r, int fill);
  147. #if !defined(_WIN32) && !defined(_DEBUG)
  148. static int clk_tck;
  149. #endif
  150. #ifdef CRYPTO
  151. #include "handshake.h"
  152. #endif
  153. uint32_t
  154. RTMP_GetTime()
  155. {
  156. #ifdef _DEBUG
  157. return 0;
  158. #elif defined(_WIN32)
  159. return timeGetTime();
  160. #else
  161. struct tms t;
  162. if (!clk_tck) clk_tck = sysconf(_SC_CLK_TCK);
  163. return times(&t) * 1000 / clk_tck;
  164. #endif
  165. }
  166. const char *
  167. socketerror(int err)
  168. {
  169. static char buff[1024];
  170. #ifdef _WIN32
  171. if (FormatMessageA (FORMAT_MESSAGE_FROM_SYSTEM, NULL, err, 0, buff, sizeof(buff), NULL))
  172. {
  173. int i, len;
  174. buff[sizeof(buff)-1] = '\0';
  175. len = (int)strlen (buff);
  176. for (i = 0; i < len; i++)
  177. {
  178. if (buff[i] == '\r' || buff[i] == '\n')
  179. {
  180. memmove (buff + i, buff + i + 1, len - i);
  181. i--;
  182. len--;
  183. }
  184. }
  185. return buff;
  186. }
  187. #else
  188. (void)err;
  189. #endif
  190. strcpy (buff, "unknown error");
  191. return buff;
  192. }
  193. void
  194. RTMP_UserInterrupt()
  195. {
  196. RTMP_ctrlC = TRUE;
  197. }
  198. void
  199. RTMPPacket_Reset(RTMPPacket *p)
  200. {
  201. p->m_headerType = 0;
  202. p->m_packetType = 0;
  203. p->m_nChannel = 0;
  204. p->m_nTimeStamp = 0;
  205. p->m_nInfoField2 = 0;
  206. p->m_hasAbsTimestamp = FALSE;
  207. p->m_nBodySize = 0;
  208. p->m_nBytesRead = 0;
  209. }
  210. int
  211. RTMPPacket_Alloc(RTMPPacket *p, uint32_t nSize)
  212. {
  213. char *ptr;
  214. #if ARCH_BITS == 32
  215. if (nSize > SIZE_MAX - RTMP_MAX_HEADER_SIZE)
  216. return FALSE;
  217. #endif
  218. ptr = calloc(1, nSize + RTMP_MAX_HEADER_SIZE);
  219. if (!ptr)
  220. return FALSE;
  221. p->m_body = ptr + RTMP_MAX_HEADER_SIZE;
  222. p->m_nBytesRead = 0;
  223. return TRUE;
  224. }
  225. void
  226. RTMPPacket_Free(RTMPPacket *p)
  227. {
  228. if (p->m_body)
  229. {
  230. free(p->m_body - RTMP_MAX_HEADER_SIZE);
  231. p->m_body = NULL;
  232. }
  233. }
  234. void
  235. RTMPPacket_Dump(RTMPPacket *p)
  236. {
  237. RTMP_Log(RTMP_LOGDEBUG,
  238. "RTMP PACKET: packet type: 0x%02x. channel: 0x%02x. info 1: %d info 2: %d. Body size: %u. body: 0x%02x",
  239. p->m_packetType, p->m_nChannel, p->m_nTimeStamp, p->m_nInfoField2,
  240. p->m_nBodySize, p->m_body ? (unsigned char)p->m_body[0] : 0);
  241. }
  242. int
  243. RTMP_LibVersion()
  244. {
  245. return RTMP_LIB_VERSION;
  246. }
  247. void
  248. RTMP_TLS_LoadCerts() {
  249. #ifdef USE_MBEDTLS
  250. mbedtls_x509_crt *chain = RTMP_TLS_ctx->cacert = calloc(1, sizeof(struct mbedtls_x509_crt));
  251. mbedtls_x509_crt_init(chain);
  252. #if defined(_WIN32)
  253. HCERTSTORE hCertStore;
  254. PCCERT_CONTEXT pCertContext = NULL;
  255. if (!(hCertStore = CertOpenSystemStore((HCRYPTPROV)NULL, L"ROOT"))) {
  256. goto error;
  257. }
  258. while (pCertContext = CertEnumCertificatesInStore(hCertStore, pCertContext)) {
  259. mbedtls_x509_crt_parse_der(chain,
  260. (unsigned char *)pCertContext->pbCertEncoded,
  261. pCertContext->cbCertEncoded);
  262. }
  263. CertFreeCertificateContext(pCertContext);
  264. CertCloseStore(hCertStore, 0);
  265. #elif defined(__APPLE__)
  266. SecKeychainRef keychain_ref;
  267. CFMutableDictionaryRef search_settings_ref;
  268. CFArrayRef result_ref;
  269. if (SecKeychainOpen("/System/Library/Keychains/SystemRootCertificates.keychain",
  270. &keychain_ref)
  271. != errSecSuccess) {
  272. goto error;
  273. }
  274. search_settings_ref = CFDictionaryCreateMutable(NULL, 0, NULL, NULL);
  275. CFDictionarySetValue(search_settings_ref, kSecClass, kSecClassCertificate);
  276. CFDictionarySetValue(search_settings_ref, kSecMatchLimit, kSecMatchLimitAll);
  277. CFDictionarySetValue(search_settings_ref, kSecReturnRef, kCFBooleanTrue);
  278. CFDictionarySetValue(search_settings_ref, kSecMatchSearchList,
  279. CFArrayCreate(NULL, (const void **)&keychain_ref, 1, NULL));
  280. if (SecItemCopyMatching(search_settings_ref, (CFTypeRef *)&result_ref)
  281. != errSecSuccess) {
  282. goto error;
  283. }
  284. for (CFIndex i = 0; i < CFArrayGetCount(result_ref); i++) {
  285. SecCertificateRef item_ref = (SecCertificateRef)
  286. CFArrayGetValueAtIndex(result_ref, i);
  287. CFDataRef data_ref;
  288. if ((data_ref = SecCertificateCopyData(item_ref))) {
  289. mbedtls_x509_crt_parse_der(chain,
  290. (unsigned char *)CFDataGetBytePtr(data_ref),
  291. CFDataGetLength(data_ref));
  292. CFRelease(data_ref);
  293. }
  294. }
  295. CFRelease(keychain_ref);
  296. #elif defined(__linux__)
  297. if (mbedtls_x509_crt_parse_path(chain, "/etc/ssl/certs/") != 0) {
  298. goto error;
  299. }
  300. #endif
  301. mbedtls_ssl_conf_ca_chain(&RTMP_TLS_ctx->conf, chain, NULL);
  302. return;
  303. error:
  304. mbedtls_x509_crt_free(chain);
  305. free(chain);
  306. RTMP_TLS_ctx->cacert = NULL;
  307. #endif /* USE_MBEDTLS */
  308. }
  309. void
  310. RTMP_TLS_Init()
  311. {
  312. #ifdef CRYPTO
  313. #if defined(USE_MBEDTLS)
  314. const char * pers = "RTMP_TLS";
  315. RTMP_TLS_ctx = calloc(1,sizeof(struct tls_ctx));
  316. mbedtls_ssl_config_init(&RTMP_TLS_ctx->conf);
  317. mbedtls_ctr_drbg_init(&RTMP_TLS_ctx->ctr_drbg);
  318. mbedtls_entropy_init(&RTMP_TLS_ctx->entropy);
  319. mbedtls_ctr_drbg_seed(&RTMP_TLS_ctx->ctr_drbg,
  320. mbedtls_entropy_func,
  321. &RTMP_TLS_ctx->entropy,
  322. (const unsigned char *)pers,
  323. strlen(pers));
  324. RTMP_TLS_LoadCerts();
  325. #elif defined(USE_POLARSSL)
  326. /* Do this regardless of NO_SSL, we use havege for rtmpe too */
  327. RTMP_TLS_ctx = calloc(1,sizeof(struct tls_ctx));
  328. havege_init(&RTMP_TLS_ctx->hs);
  329. #elif defined(USE_GNUTLS) && !defined(NO_SSL)
  330. /* Technically we need to initialize libgcrypt ourselves if
  331. * we're not going to call gnutls_global_init(). Ignoring this
  332. * for now.
  333. */
  334. gnutls_global_init();
  335. RTMP_TLS_ctx = malloc(sizeof(struct tls_ctx));
  336. gnutls_certificate_allocate_credentials(&RTMP_TLS_ctx->cred);
  337. gnutls_priority_init(&RTMP_TLS_ctx->prios, "NORMAL", NULL);
  338. gnutls_certificate_set_x509_trust_file(RTMP_TLS_ctx->cred,
  339. "ca.pem", GNUTLS_X509_FMT_PEM);
  340. #elif !defined(NO_SSL) /* USE_OPENSSL */
  341. /* libcrypto doesn't need anything special */
  342. SSL_load_error_strings();
  343. SSL_library_init();
  344. OpenSSL_add_all_digests();
  345. RTMP_TLS_ctx = SSL_CTX_new(SSLv23_method());
  346. SSL_CTX_set_options(RTMP_TLS_ctx, SSL_OP_ALL);
  347. SSL_CTX_set_default_verify_paths(RTMP_TLS_ctx);
  348. #endif
  349. #else
  350. #endif
  351. }
  352. void
  353. RTMP_TLS_Free() {
  354. #ifdef USE_MBEDTLS
  355. mbedtls_ssl_config_free(&RTMP_TLS_ctx->conf);
  356. mbedtls_ctr_drbg_free(&RTMP_TLS_ctx->ctr_drbg);
  357. mbedtls_entropy_free(&RTMP_TLS_ctx->entropy);
  358. if (RTMP_TLS_ctx->cacert) {
  359. mbedtls_x509_crt_free(RTMP_TLS_ctx->cacert);
  360. free(RTMP_TLS_ctx->cacert);
  361. RTMP_TLS_ctx->cacert = NULL;
  362. }
  363. // NO mbedtls_net_free() BECAUSE WE SET IT UP BY HAND!
  364. free(RTMP_TLS_ctx);
  365. RTMP_TLS_ctx = NULL;
  366. #endif
  367. }
  368. void *
  369. RTMP_TLS_AllocServerContext(const char* cert, const char* key)
  370. {
  371. void *ctx = NULL;
  372. #ifdef CRYPTO
  373. if (!RTMP_TLS_ctx)
  374. RTMP_TLS_Init();
  375. #if defined(USE_MBEDTLS)
  376. tls_server_ctx *tc = ctx = calloc(1, sizeof(struct tls_server_ctx));
  377. tc->conf = &RTMP_TLS_ctx->conf;
  378. tc->ctr_drbg = &RTMP_TLS_ctx->ctr_drbg;
  379. mbedtls_x509_crt_init(&tc->cert);
  380. if (mbedtls_x509_crt_parse_file(&tc->cert, cert))
  381. {
  382. free(tc);
  383. return NULL;
  384. }
  385. mbedtls_pk_init(&tc->key);
  386. if (mbedtls_pk_parse_keyfile(&tc->key, key, NULL))
  387. {
  388. mbedtls_x509_crt_free(&tc->cert);
  389. mbedtls_pk_free(&tc->key);
  390. free(tc);
  391. return NULL;
  392. }
  393. #elif defined(USE_POLARSSL)
  394. tls_server_ctx *tc = ctx = calloc(1, sizeof(struct tls_server_ctx));
  395. tc->dhm_P = my_dhm_P;
  396. tc->dhm_G = my_dhm_G;
  397. tc->hs = &RTMP_TLS_ctx->hs;
  398. if (x509parse_crtfile(&tc->cert, cert))
  399. {
  400. free(tc);
  401. return NULL;
  402. }
  403. if (x509parse_keyfile(&tc->key, key, NULL))
  404. {
  405. x509_free(&tc->cert);
  406. free(tc);
  407. return NULL;
  408. }
  409. #elif defined(USE_GNUTLS) && !defined(NO_SSL)
  410. gnutls_certificate_allocate_credentials((gnutls_certificate_credentials*) &ctx);
  411. if (gnutls_certificate_set_x509_key_file(ctx, cert, key, GNUTLS_X509_FMT_PEM) != 0)
  412. {
  413. gnutls_certificate_free_credentials(ctx);
  414. return NULL;
  415. }
  416. #elif !defined(NO_SSL) /* USE_OPENSSL */
  417. ctx = SSL_CTX_new(SSLv23_server_method());
  418. if (!SSL_CTX_use_certificate_chain_file(ctx, cert))
  419. {
  420. SSL_CTX_free(ctx);
  421. return NULL;
  422. }
  423. if (!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM))
  424. {
  425. SSL_CTX_free(ctx);
  426. return NULL;
  427. }
  428. #endif
  429. #else
  430. (void)cert;
  431. (void)key;
  432. #endif
  433. return ctx;
  434. }
  435. void
  436. RTMP_TLS_FreeServerContext(void *ctx)
  437. {
  438. #ifdef CRYPTO
  439. #if defined(USE_MBEDTLS)
  440. mbedtls_x509_crt_free(&((tls_server_ctx*)ctx)->cert);
  441. mbedtls_pk_free(&((tls_server_ctx*)ctx)->key);
  442. free(ctx);
  443. #elif defined(USE_POLARSSL)
  444. x509_free(&((tls_server_ctx*)ctx)->cert);
  445. rsa_free(&((tls_server_ctx*)ctx)->key);
  446. free(ctx);
  447. #elif defined(USE_GNUTLS) && !defined(NO_SSL)
  448. gnutls_certificate_free_credentials(ctx);
  449. #elif !defined(NO_SSL) /* USE_OPENSSL */
  450. SSL_CTX_free(ctx);
  451. #endif
  452. #else
  453. (void)ctx;
  454. #endif
  455. }
  456. RTMP *
  457. RTMP_Alloc()
  458. {
  459. return calloc(1, sizeof(RTMP));
  460. }
  461. void
  462. RTMP_Free(RTMP *r)
  463. {
  464. #if defined(CRYPTO) && defined(USE_MBEDTLS)
  465. if (RTMP_TLS_ctx)
  466. RTMP_TLS_Free();
  467. #endif
  468. free(r);
  469. }
  470. void
  471. RTMP_Init(RTMP *r)
  472. {
  473. #ifdef CRYPTO
  474. if (!RTMP_TLS_ctx)
  475. RTMP_TLS_Init();
  476. #endif
  477. memset(r, 0, sizeof(RTMP));
  478. r->m_sb.sb_socket = -1;
  479. r->m_inChunkSize = RTMP_DEFAULT_CHUNKSIZE;
  480. r->m_outChunkSize = RTMP_DEFAULT_CHUNKSIZE;
  481. r->m_bSendChunkSizeInfo = 1;
  482. r->m_nBufferMS = 30000;
  483. r->m_nClientBW = 2500000;
  484. r->m_nClientBW2 = 2;
  485. r->m_nServerBW = 2500000;
  486. r->m_fAudioCodecs = 3191.0;
  487. r->m_fVideoCodecs = 252.0;
  488. r->Link.curStreamIdx = 0;
  489. r->Link.nStreams = 0;
  490. r->Link.timeout = 30;
  491. r->Link.swfAge = 30;
  492. }
  493. void
  494. RTMP_EnableWrite(RTMP *r)
  495. {
  496. r->Link.protocol |= RTMP_FEATURE_WRITE;
  497. }
  498. double
  499. RTMP_GetDuration(RTMP *r)
  500. {
  501. return r->m_fDuration;
  502. }
  503. int
  504. RTMP_IsConnected(RTMP *r)
  505. {
  506. return r->m_sb.sb_socket != INVALID_SOCKET;
  507. }
  508. SOCKET
  509. RTMP_Socket(RTMP *r)
  510. {
  511. return r->m_sb.sb_socket;
  512. }
  513. int
  514. RTMP_IsTimedout(RTMP *r)
  515. {
  516. return r->m_sb.sb_timedout;
  517. }
  518. void
  519. RTMP_SetBufferMS(RTMP *r, int size)
  520. {
  521. r->m_nBufferMS = size;
  522. }
  523. void
  524. RTMP_UpdateBufferMS(RTMP *r)
  525. {
  526. RTMP_SendCtrl(r, 3, r->m_stream_id, r->m_nBufferMS);
  527. }
  528. #undef OSS
  529. #ifdef _WIN32
  530. #define OSS "WIN"
  531. #elif defined(__sun__)
  532. #define OSS "SOL"
  533. #elif defined(__APPLE__)
  534. #define OSS "MAC"
  535. #elif defined(__linux__)
  536. #define OSS "LNX"
  537. #else
  538. #define OSS "GNU"
  539. #endif
  540. #define DEF_VERSTR OSS " 10,0,32,18"
  541. static const char DEFAULT_FLASH_VER[] = DEF_VERSTR;
  542. const AVal RTMP_DefaultFlashVer =
  543. { (char *)DEFAULT_FLASH_VER, sizeof(DEFAULT_FLASH_VER) - 1 };
  544. static void
  545. SocksSetup(RTMP *r, AVal *sockshost)
  546. {
  547. if (sockshost->av_len)
  548. {
  549. const char *socksport = strchr(sockshost->av_val, ':');
  550. char *hostname = strdup(sockshost->av_val);
  551. if (socksport)
  552. hostname[socksport - sockshost->av_val] = '\0';
  553. r->Link.sockshost.av_val = hostname;
  554. r->Link.sockshost.av_len = (int)strlen(hostname);
  555. r->Link.socksport = socksport ? atoi(socksport + 1) : 1080;
  556. RTMP_Log(RTMP_LOGDEBUG, "Connecting via SOCKS proxy: %s:%d", r->Link.sockshost.av_val,
  557. r->Link.socksport);
  558. }
  559. else
  560. {
  561. r->Link.sockshost.av_val = NULL;
  562. r->Link.sockshost.av_len = 0;
  563. r->Link.socksport = 0;
  564. }
  565. }
  566. static int
  567. parseAMF(AMFObject *obj, AVal *av, int *depth)
  568. {
  569. AMFObjectProperty prop = {{0,0}};
  570. int i;
  571. char *p, *arg = av->av_val;
  572. if (arg[1] == ':')
  573. {
  574. p = (char *)arg+2;
  575. switch(arg[0])
  576. {
  577. case 'B':
  578. prop.p_type = AMF_BOOLEAN;
  579. prop.p_vu.p_number = atoi(p);
  580. break;
  581. case 'S':
  582. prop.p_type = AMF_STRING;
  583. prop.p_vu.p_aval.av_val = p;
  584. prop.p_vu.p_aval.av_len = av->av_len - (p-arg);
  585. break;
  586. case 'N':
  587. prop.p_type = AMF_NUMBER;
  588. prop.p_vu.p_number = strtod(p, NULL);
  589. break;
  590. case 'Z':
  591. prop.p_type = AMF_NULL;
  592. break;
  593. case 'O':
  594. i = atoi(p);
  595. if (i)
  596. {
  597. prop.p_type = AMF_OBJECT;
  598. }
  599. else
  600. {
  601. (*depth)--;
  602. return 0;
  603. }
  604. break;
  605. default:
  606. return -1;
  607. }
  608. }
  609. else if (arg[2] == ':' && arg[0] == 'N')
  610. {
  611. p = strchr(arg+3, ':');
  612. if (!p || !*depth)
  613. return -1;
  614. prop.p_name.av_val = (char *)arg+3;
  615. prop.p_name.av_len = p - (arg+3);
  616. p++;
  617. switch(arg[1])
  618. {
  619. case 'B':
  620. prop.p_type = AMF_BOOLEAN;
  621. prop.p_vu.p_number = atoi(p);
  622. break;
  623. case 'S':
  624. prop.p_type = AMF_STRING;
  625. prop.p_vu.p_aval.av_val = p;
  626. prop.p_vu.p_aval.av_len = av->av_len - (p-arg);
  627. break;
  628. case 'N':
  629. prop.p_type = AMF_NUMBER;
  630. prop.p_vu.p_number = strtod(p, NULL);
  631. break;
  632. case 'O':
  633. prop.p_type = AMF_OBJECT;
  634. break;
  635. default:
  636. return -1;
  637. }
  638. }
  639. else
  640. return -1;
  641. if (*depth)
  642. {
  643. AMFObject *o2;
  644. for (i=0; i<*depth; i++)
  645. {
  646. o2 = &obj->o_props[obj->o_num-1].p_vu.p_object;
  647. obj = o2;
  648. }
  649. }
  650. AMF_AddProp(obj, &prop);
  651. if (prop.p_type == AMF_OBJECT)
  652. (*depth)++;
  653. return 0;
  654. }
  655. int RTMP_SetupURL(RTMP *r, char *url)
  656. {
  657. int ret, len;
  658. unsigned int port = 0;
  659. len = (int)strlen(url);
  660. ret = RTMP_ParseURL(url, &r->Link.protocol, &r->Link.hostname,
  661. &port, &r->Link.app);
  662. if (!ret)
  663. return ret;
  664. r->Link.port = port;
  665. if (!r->Link.tcUrl.av_len)
  666. {
  667. r->Link.tcUrl.av_val = url;
  668. if (r->Link.app.av_len)
  669. {
  670. if (r->Link.app.av_val < url + len)
  671. {
  672. /* if app is part of original url, just use it */
  673. r->Link.tcUrl.av_len = r->Link.app.av_len + (r->Link.app.av_val - url);
  674. }
  675. else
  676. {
  677. len = r->Link.hostname.av_len + r->Link.app.av_len +
  678. sizeof("rtmpte://:65535/");
  679. r->Link.tcUrl.av_val = malloc(len);
  680. r->Link.tcUrl.av_len = snprintf(r->Link.tcUrl.av_val, len,
  681. "%s://%.*s:%d/%.*s",
  682. RTMPProtocolStringsLower[r->Link.protocol],
  683. r->Link.hostname.av_len, r->Link.hostname.av_val,
  684. r->Link.port,
  685. r->Link.app.av_len, r->Link.app.av_val);
  686. r->Link.lFlags |= RTMP_LF_FTCU;
  687. }
  688. }
  689. else
  690. {
  691. r->Link.tcUrl.av_len = (int)strlen(url);
  692. }
  693. }
  694. #ifdef CRYPTO
  695. if ((r->Link.lFlags & RTMP_LF_SWFV) && r->Link.swfUrl.av_len)
  696. RTMP_HashSWF(r->Link.swfUrl.av_val, &r->Link.SWFSize,
  697. (unsigned char *)r->Link.SWFHash, r->Link.swfAge);
  698. #endif
  699. SocksSetup(r, &r->Link.sockshost);
  700. if (r->Link.port == 0)
  701. {
  702. if (r->Link.protocol & RTMP_FEATURE_SSL)
  703. r->Link.port = 443;
  704. else if (r->Link.protocol & RTMP_FEATURE_HTTP)
  705. r->Link.port = 80;
  706. else
  707. r->Link.port = 1935;
  708. }
  709. return TRUE;
  710. }
  711. int RTMP_AddStream(RTMP *r, const char *playpath)
  712. {
  713. int idx = -1;
  714. AVal pp = { (char*)playpath, playpath?(int)strlen(playpath):0 };
  715. RTMP_ParsePlaypath(&pp, &r->Link.streams[r->Link.nStreams].playpath);
  716. r->Link.streams[r->Link.nStreams].id = -1;
  717. idx = r->Link.nStreams;
  718. r->Link.nStreams++;
  719. return idx;
  720. }
  721. static int
  722. add_addr_info(struct sockaddr_storage *service, socklen_t *addrlen, AVal *host, int port, socklen_t addrlen_hint, int *socket_error)
  723. {
  724. char *hostname;
  725. int ret = TRUE;
  726. if (host->av_val[host->av_len] || host->av_val[0] == '[')
  727. {
  728. int v6 = host->av_val[0] == '[';
  729. hostname = malloc(host->av_len+1 - v6 * 2);
  730. memcpy(hostname, host->av_val + v6, host->av_len - v6 * 2);
  731. hostname[host->av_len - v6 * 2] = '\0';
  732. }
  733. else
  734. {
  735. hostname = host->av_val;
  736. }
  737. struct addrinfo hints;
  738. struct addrinfo *result = NULL;
  739. struct addrinfo *ptr = NULL;
  740. memset(&hints, 0, sizeof(hints));
  741. hints.ai_family = AF_UNSPEC;
  742. hints.ai_socktype = SOCK_STREAM;
  743. hints.ai_protocol = IPPROTO_TCP;
  744. service->ss_family = AF_UNSPEC;
  745. *addrlen = 0;
  746. char portStr[8];
  747. sprintf(portStr, "%d", port);
  748. int err = getaddrinfo(hostname, portStr, &hints, &result);
  749. if (err)
  750. {
  751. #ifndef _WIN32
  752. #define gai_strerrorA gai_strerror
  753. #endif
  754. RTMP_Log(RTMP_LOGERROR, "Could not resolve %s: %s (%d)", hostname, gai_strerrorA(GetSockError()), GetSockError());
  755. *socket_error = GetSockError();
  756. ret = FALSE;
  757. goto finish;
  758. }
  759. // prefer ipv4 results, since lots of ISPs have broken ipv6 connectivity
  760. for (ptr = result; ptr != NULL; ptr = ptr->ai_next)
  761. {
  762. if (ptr->ai_family == AF_INET && (!addrlen_hint || ptr->ai_addrlen == addrlen_hint))
  763. {
  764. memcpy(service, ptr->ai_addr, ptr->ai_addrlen);
  765. *addrlen = (socklen_t)ptr->ai_addrlen;
  766. break;
  767. }
  768. }
  769. if (!*addrlen)
  770. {
  771. for (ptr = result; ptr != NULL; ptr = ptr->ai_next)
  772. {
  773. if (ptr->ai_family == AF_INET6 && (!addrlen_hint || ptr->ai_addrlen == addrlen_hint))
  774. {
  775. memcpy(service, ptr->ai_addr, ptr->ai_addrlen);
  776. *addrlen = (socklen_t)ptr->ai_addrlen;
  777. break;
  778. }
  779. }
  780. }
  781. freeaddrinfo(result);
  782. if (service->ss_family == AF_UNSPEC || *addrlen == 0)
  783. {
  784. // since we're handling multiple addresses internally, fake the correct error response
  785. #ifdef _WIN32
  786. *socket_error = WSANO_DATA;
  787. #elif __FreeBSD__
  788. *socket_error = ENOATTR;
  789. #else
  790. *socket_error = ENODATA;
  791. #endif
  792. RTMP_Log(RTMP_LOGERROR, "Could not resolve server '%s': no valid address found", hostname);
  793. ret = FALSE;
  794. goto finish;
  795. }
  796. finish:
  797. if (hostname != host->av_val)
  798. free(hostname);
  799. return ret;
  800. }
  801. #ifdef _WIN32
  802. #define E_TIMEDOUT WSAETIMEDOUT
  803. #define E_CONNREFUSED WSAECONNREFUSED
  804. #define E_ACCES WSAEACCES
  805. #else
  806. #define E_TIMEDOUT ETIMEDOUT
  807. #define E_CONNREFUSED ECONNREFUSED
  808. #define E_ACCES EACCES
  809. #endif
  810. int
  811. RTMP_Connect0(RTMP *r, struct sockaddr * service, socklen_t addrlen)
  812. {
  813. int on = 1;
  814. r->m_sb.sb_timedout = FALSE;
  815. r->m_pausing = 0;
  816. r->m_fDuration = 0.0;
  817. //best to be explicit, we need overlapped socket
  818. #ifdef _WIN32
  819. r->m_sb.sb_socket = WSASocket(service->sa_family, SOCK_STREAM, IPPROTO_TCP, NULL, 0, WSA_FLAG_OVERLAPPED);
  820. #else
  821. r->m_sb.sb_socket = socket(service->sa_family, SOCK_STREAM, IPPROTO_TCP);
  822. #endif
  823. if (r->m_sb.sb_socket != INVALID_SOCKET)
  824. {
  825. #ifndef _WIN32
  826. #ifdef SO_NOSIGPIPE
  827. setsockopt(r->m_sb.sb_socket, SOL_SOCKET, SO_NOSIGPIPE, &(int){ 1 }, sizeof(int));
  828. #endif
  829. #endif
  830. if(r->m_bindIP.addrLen)
  831. {
  832. if (bind(r->m_sb.sb_socket, (const struct sockaddr *)&r->m_bindIP.addr, r->m_bindIP.addrLen) < 0)
  833. {
  834. int err = GetSockError();
  835. RTMP_Log(RTMP_LOGERROR, "%s, failed to bind socket: %s (%d)",
  836. __FUNCTION__, socketerror(err), err);
  837. r->last_error_code = err;
  838. RTMP_Close(r);
  839. return FALSE;
  840. }
  841. }
  842. uint64_t connect_start = os_gettime_ns();
  843. if (connect(r->m_sb.sb_socket, service, addrlen) < 0)
  844. {
  845. int err = GetSockError();
  846. if (err == E_CONNREFUSED)
  847. RTMP_Log(RTMP_LOGERROR, "%s is offline. Try a different server (ECONNREFUSED).", r->Link.hostname.av_val);
  848. else if (err == E_ACCES)
  849. RTMP_Log(RTMP_LOGERROR, "The connection is being blocked by a firewall or other security software (EACCES).");
  850. else if (err == E_TIMEDOUT)
  851. RTMP_Log(RTMP_LOGERROR, "The connection timed out. Try a different server, or check that the connection is not being blocked by a firewall or other security software (ETIMEDOUT).");
  852. else
  853. RTMP_Log(RTMP_LOGERROR, "%s, failed to connect socket: %s (%d)",
  854. __FUNCTION__, socketerror(err), err);
  855. r->last_error_code = err;
  856. RTMP_Close(r);
  857. return FALSE;
  858. }
  859. r->connect_time_ms = (int)((os_gettime_ns() - connect_start) / 1000000);
  860. if (r->Link.socksport)
  861. {
  862. RTMP_Log(RTMP_LOGDEBUG, "%s ... SOCKS negotiation", __FUNCTION__);
  863. if (!SocksNegotiate(r))
  864. {
  865. RTMP_Log(RTMP_LOGERROR, "%s, SOCKS negotiation failed.", __FUNCTION__);
  866. RTMP_Close(r);
  867. return FALSE;
  868. }
  869. }
  870. }
  871. else
  872. {
  873. RTMP_Log(RTMP_LOGERROR, "%s, failed to create socket. Error: %d", __FUNCTION__,
  874. GetSockError());
  875. return FALSE;
  876. }
  877. /* set timeout */
  878. {
  879. SET_RCVTIMEO(tv, r->Link.timeout);
  880. if (setsockopt
  881. (r->m_sb.sb_socket, SOL_SOCKET, SO_RCVTIMEO, (char *)&tv, sizeof(tv)))
  882. {
  883. RTMP_Log(RTMP_LOGERROR, "%s, Setting socket timeout to %ds failed!",
  884. __FUNCTION__, r->Link.timeout);
  885. }
  886. }
  887. if(!r->m_bUseNagle)
  888. setsockopt(r->m_sb.sb_socket, IPPROTO_TCP, TCP_NODELAY, (char *) &on, sizeof(on));
  889. return TRUE;
  890. }
  891. int
  892. RTMP_TLS_Accept(RTMP *r, void *ctx)
  893. {
  894. #if defined(CRYPTO) && !defined(NO_SSL)
  895. tls_server_ctx *srv_ctx = ctx;
  896. TLS_server(srv_ctx, r->m_sb.sb_ssl);
  897. #if defined(USE_MBEDTLS)
  898. mbedtls_net_context *client_fd = &RTMP_TLS_ctx->net;
  899. mbedtls_net_init(client_fd);
  900. client_fd->fd = r->m_sb.sb_socket;
  901. TLS_setfd(r->m_sb.sb_ssl, client_fd);
  902. #else
  903. TLS_setfd(r->m_sb.sb_ssl, r->m_sb.sb_socket);
  904. #endif
  905. int connect_return = TLS_connect(r->m_sb.sb_ssl);
  906. if (connect_return < 0)
  907. {
  908. RTMP_Log(RTMP_LOGERROR, "%s, TLS_Connect failed", __FUNCTION__);
  909. return FALSE;
  910. }
  911. return TRUE;
  912. #else
  913. (void)r;
  914. (void)ctx;
  915. return FALSE;
  916. #endif
  917. }
  918. int
  919. RTMP_Connect1(RTMP *r, RTMPPacket *cp)
  920. {
  921. if (r->Link.protocol & RTMP_FEATURE_SSL)
  922. {
  923. #if defined(CRYPTO) && !defined(NO_SSL)
  924. TLS_client(RTMP_TLS_ctx, r->m_sb.sb_ssl);
  925. #if defined(USE_MBEDTLS)
  926. mbedtls_net_context *server_fd = &RTMP_TLS_ctx->net;
  927. server_fd->fd = r->m_sb.sb_socket;
  928. TLS_setfd(r->m_sb.sb_ssl, server_fd);
  929. // make sure we verify the certificate hostname
  930. char hostname[MBEDTLS_SSL_MAX_HOST_NAME_LEN + 1];
  931. if (r->Link.hostname.av_len >= MBEDTLS_SSL_MAX_HOST_NAME_LEN)
  932. return FALSE;
  933. memcpy(hostname, r->Link.hostname.av_val, r->Link.hostname.av_len);
  934. hostname[r->Link.hostname.av_len] = 0;
  935. if (mbedtls_ssl_set_hostname(r->m_sb.sb_ssl, hostname))
  936. return FALSE;
  937. #else
  938. TLS_setfd(r->m_sb.sb_ssl, r->m_sb.sb_socket);
  939. #endif
  940. int connect_return = TLS_connect(r->m_sb.sb_ssl);
  941. if (connect_return < 0)
  942. {
  943. #if defined(USE_MBEDTLS)
  944. if (connect_return == MBEDTLS_ERR_X509_CERT_VERIFY_FAILED)
  945. {
  946. r->last_error_code = connect_return;
  947. // show a more detailed error in the log if possible
  948. int verify_result = mbedtls_ssl_get_verify_result(r->m_sb.sb_ssl);
  949. if (verify_result)
  950. {
  951. char err[256], *e;
  952. if (mbedtls_x509_crt_verify_info(err, sizeof(err), "", verify_result) > 0)
  953. {
  954. e = strchr(err, '\n');
  955. if (e)
  956. *e = '\0';
  957. }
  958. else
  959. {
  960. strcpy(err, "unknown error");
  961. }
  962. RTMP_Log(RTMP_LOGERROR, "%s, Cert verify failed: %d (%s)", __FUNCTION__, verify_result, err);
  963. RTMP_Close(r);
  964. return FALSE;
  965. }
  966. }
  967. #endif
  968. // output the error in a format that matches mbedTLS
  969. connect_return = abs(connect_return);
  970. RTMP_Log(RTMP_LOGERROR, "%s, TLS_Connect failed: -0x%x", __FUNCTION__, connect_return);
  971. RTMP_Close(r);
  972. return FALSE;
  973. }
  974. #else
  975. RTMP_Log(RTMP_LOGERROR, "%s, no SSL/TLS support", __FUNCTION__);
  976. RTMP_Close(r);
  977. return FALSE;
  978. #endif
  979. }
  980. if (r->Link.protocol & RTMP_FEATURE_HTTP)
  981. {
  982. r->m_msgCounter = 1;
  983. r->m_clientID.av_val = NULL;
  984. r->m_clientID.av_len = 0;
  985. HTTP_Post(r, RTMPT_OPEN, "", 1);
  986. if (HTTP_read(r, 1) != 0)
  987. {
  988. r->m_msgCounter = 0;
  989. RTMP_Log(RTMP_LOGDEBUG, "%s, Could not connect for handshake", __FUNCTION__);
  990. RTMP_Close(r);
  991. return 0;
  992. }
  993. r->m_msgCounter = 0;
  994. }
  995. RTMP_Log(RTMP_LOGDEBUG, "%s, ... connected, handshaking", __FUNCTION__);
  996. if (!HandShake(r, TRUE))
  997. {
  998. RTMP_Log(RTMP_LOGERROR, "%s, handshake failed.", __FUNCTION__);
  999. RTMP_Close(r);
  1000. return FALSE;
  1001. }
  1002. RTMP_Log(RTMP_LOGDEBUG, "%s, handshaked", __FUNCTION__);
  1003. if (!SendConnectPacket(r, cp))
  1004. {
  1005. RTMP_Log(RTMP_LOGERROR, "%s, RTMP connect failed.", __FUNCTION__);
  1006. RTMP_Close(r);
  1007. return FALSE;
  1008. }
  1009. return TRUE;
  1010. }
  1011. int
  1012. RTMP_Connect(RTMP *r, RTMPPacket *cp)
  1013. {
  1014. #ifdef _WIN32
  1015. HOSTENT *h;
  1016. #endif
  1017. struct sockaddr_storage service;
  1018. socklen_t addrlen = 0;
  1019. socklen_t addrlen_hint = 0;
  1020. int socket_error = 0;
  1021. if (!r->Link.hostname.av_len)
  1022. return FALSE;
  1023. #ifdef _WIN32
  1024. //COMODO security software sandbox blocks all DNS by returning "host not found"
  1025. h = gethostbyname("localhost");
  1026. if (!h && GetLastError() == WSAHOST_NOT_FOUND)
  1027. {
  1028. r->last_error_code = WSAHOST_NOT_FOUND;
  1029. RTMP_Log(RTMP_LOGERROR, "RTMP_Connect: Connection test failed. This error is likely caused by Comodo Internet Security running OBS in sandbox mode. Please add OBS to the Comodo automatic sandbox exclusion list, restart OBS and try again (11001).");
  1030. return FALSE;
  1031. }
  1032. #endif
  1033. memset(&service, 0, sizeof(service));
  1034. if (r->m_bindIP.addrLen)
  1035. addrlen_hint = r->m_bindIP.addrLen;
  1036. if (r->Link.socksport)
  1037. {
  1038. /* Connect via SOCKS */
  1039. if (!add_addr_info(&service, &addrlen, &r->Link.sockshost, r->Link.socksport, addrlen_hint, &socket_error))
  1040. {
  1041. r->last_error_code = socket_error;
  1042. return FALSE;
  1043. }
  1044. }
  1045. else
  1046. {
  1047. /* Connect directly */
  1048. if (!add_addr_info(&service, &addrlen, &r->Link.hostname, r->Link.port, addrlen_hint, &socket_error))
  1049. {
  1050. r->last_error_code = socket_error;
  1051. return FALSE;
  1052. }
  1053. }
  1054. if (!RTMP_Connect0(r, (struct sockaddr *)&service, addrlen))
  1055. return FALSE;
  1056. r->m_bSendCounter = TRUE;
  1057. return RTMP_Connect1(r, cp);
  1058. }
  1059. static int
  1060. SocksNegotiate(RTMP *r)
  1061. {
  1062. unsigned long addr;
  1063. struct sockaddr_storage service;
  1064. socklen_t addrlen = 0;
  1065. int socket_error = 0;
  1066. memset(&service, 0, sizeof(service));
  1067. add_addr_info(&service, &addrlen, &r->Link.hostname, r->Link.port, 0, &socket_error);
  1068. // not doing IPv6 socks
  1069. if (service.ss_family == AF_INET6)
  1070. return FALSE;
  1071. addr = htonl((*(struct sockaddr_in *)&service).sin_addr.s_addr);
  1072. {
  1073. char packet[] =
  1074. {
  1075. 4, 1, /* SOCKS 4, connect */
  1076. (r->Link.port >> 8) & 0xFF,
  1077. (r->Link.port) & 0xFF,
  1078. (char)(addr >> 24) & 0xFF, (char)(addr >> 16) & 0xFF,
  1079. (char)(addr >> 8) & 0xFF, (char)addr & 0xFF,
  1080. 0
  1081. }; /* NULL terminate */
  1082. WriteN(r, packet, sizeof packet);
  1083. if (ReadN(r, packet, 8) != 8)
  1084. return FALSE;
  1085. if (packet[0] == 0 && packet[1] == 90)
  1086. {
  1087. return TRUE;
  1088. }
  1089. else
  1090. {
  1091. RTMP_Log(RTMP_LOGERROR, "%s, SOCKS returned error code %d", __FUNCTION__, packet[1]);
  1092. return FALSE;
  1093. }
  1094. }
  1095. }
  1096. int
  1097. RTMP_ConnectStream(RTMP *r, int seekTime)
  1098. {
  1099. RTMPPacket packet = { 0 };
  1100. /* seekTime was already set by SetupStream / SetupURL.
  1101. * This is only needed by ReconnectStream.
  1102. */
  1103. if (seekTime > 0)
  1104. r->Link.seekTime = seekTime;
  1105. r->m_mediaChannel = 0;
  1106. while (!r->m_bPlaying && RTMP_IsConnected(r) && RTMP_ReadPacket(r, &packet))
  1107. {
  1108. if (RTMPPacket_IsReady(&packet))
  1109. {
  1110. if (!packet.m_nBodySize)
  1111. continue;
  1112. if ((packet.m_packetType == RTMP_PACKET_TYPE_AUDIO) ||
  1113. (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO) ||
  1114. (packet.m_packetType == RTMP_PACKET_TYPE_INFO))
  1115. {
  1116. RTMP_Log(RTMP_LOGWARNING, "Received FLV packet before play()! Ignoring.");
  1117. RTMPPacket_Free(&packet);
  1118. continue;
  1119. }
  1120. RTMP_ClientPacket(r, &packet);
  1121. RTMPPacket_Free(&packet);
  1122. }
  1123. }
  1124. return r->m_bPlaying;
  1125. }
  1126. int
  1127. RTMP_ReconnectStream(RTMP *r, int seekTime, int streamIdx)
  1128. {
  1129. RTMP_DeleteStream(r, streamIdx);
  1130. RTMP_SendCreateStream(r);
  1131. return RTMP_ConnectStream(r, seekTime);
  1132. }
  1133. int
  1134. RTMP_ToggleStream(RTMP *r)
  1135. {
  1136. int res;
  1137. if (!r->m_pausing)
  1138. {
  1139. if (RTMP_IsTimedout(r) && r->m_read.status == RTMP_READ_EOF)
  1140. r->m_read.status = 0;
  1141. res = RTMP_SendPause(r, TRUE, r->m_pauseStamp);
  1142. if (!res)
  1143. return res;
  1144. r->m_pausing = 1;
  1145. sleep(1);
  1146. }
  1147. res = RTMP_SendPause(r, FALSE, r->m_pauseStamp);
  1148. r->m_pausing = 3;
  1149. return res;
  1150. }
  1151. void
  1152. RTMP_DeleteStream(RTMP *r, int streamIdx)
  1153. {
  1154. if (r->m_stream_id < 0)
  1155. return;
  1156. r->m_bPlaying = FALSE;
  1157. if ((r->Link.protocol & RTMP_FEATURE_WRITE))
  1158. SendFCUnpublish(r, streamIdx);
  1159. SendDeleteStream(r, r->m_stream_id);
  1160. r->m_stream_id = -1;
  1161. }
  1162. int
  1163. RTMP_GetNextMediaPacket(RTMP *r, RTMPPacket *packet)
  1164. {
  1165. int bHasMediaPacket = 0;
  1166. while (!bHasMediaPacket && RTMP_IsConnected(r)
  1167. && RTMP_ReadPacket(r, packet))
  1168. {
  1169. if (!RTMPPacket_IsReady(packet) || !packet->m_nBodySize)
  1170. {
  1171. continue;
  1172. }
  1173. bHasMediaPacket = RTMP_ClientPacket(r, packet);
  1174. if (!bHasMediaPacket)
  1175. {
  1176. RTMPPacket_Free(packet);
  1177. }
  1178. else if (r->m_pausing == 3)
  1179. {
  1180. if (packet->m_nTimeStamp <= r->m_mediaStamp)
  1181. {
  1182. bHasMediaPacket = 0;
  1183. #ifdef _DEBUG
  1184. RTMP_Log(RTMP_LOGDEBUG,
  1185. "Skipped type: %02X, size: %d, TS: %d ms, abs TS: %d, pause: %d ms",
  1186. packet->m_packetType, packet->m_nBodySize,
  1187. packet->m_nTimeStamp, packet->m_hasAbsTimestamp,
  1188. r->m_mediaStamp);
  1189. #endif
  1190. RTMPPacket_Free(packet);
  1191. continue;
  1192. }
  1193. r->m_pausing = 0;
  1194. }
  1195. }
  1196. if (bHasMediaPacket)
  1197. r->m_bPlaying = TRUE;
  1198. else if (r->m_sb.sb_timedout && !r->m_pausing)
  1199. r->m_pauseStamp = r->m_mediaChannel < r->m_channelsAllocatedIn ?
  1200. r->m_channelTimestamp[r->m_mediaChannel] : 0;
  1201. return bHasMediaPacket;
  1202. }
  1203. int
  1204. RTMP_ClientPacket(RTMP *r, RTMPPacket *packet)
  1205. {
  1206. int bHasMediaPacket = 0;
  1207. switch (packet->m_packetType)
  1208. {
  1209. case RTMP_PACKET_TYPE_CHUNK_SIZE:
  1210. /* chunk size */
  1211. HandleChangeChunkSize(r, packet);
  1212. break;
  1213. case RTMP_PACKET_TYPE_BYTES_READ_REPORT:
  1214. /* bytes read report */
  1215. RTMP_Log(RTMP_LOGDEBUG, "%s, received: bytes read report", __FUNCTION__);
  1216. break;
  1217. case RTMP_PACKET_TYPE_CONTROL:
  1218. /* ctrl */
  1219. HandleCtrl(r, packet);
  1220. break;
  1221. case RTMP_PACKET_TYPE_SERVER_BW:
  1222. /* server bw */
  1223. HandleServerBW(r, packet);
  1224. break;
  1225. case RTMP_PACKET_TYPE_CLIENT_BW:
  1226. /* client bw */
  1227. HandleClientBW(r, packet);
  1228. break;
  1229. case RTMP_PACKET_TYPE_AUDIO:
  1230. /* audio data */
  1231. /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: audio %lu bytes", __FUNCTION__, packet.m_nBodySize); */
  1232. HandleAudio(r, packet);
  1233. bHasMediaPacket = 1;
  1234. if (!r->m_mediaChannel)
  1235. r->m_mediaChannel = packet->m_nChannel;
  1236. if (!r->m_pausing)
  1237. r->m_mediaStamp = packet->m_nTimeStamp;
  1238. break;
  1239. case RTMP_PACKET_TYPE_VIDEO:
  1240. /* video data */
  1241. /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: video %lu bytes", __FUNCTION__, packet.m_nBodySize); */
  1242. HandleVideo(r, packet);
  1243. bHasMediaPacket = 1;
  1244. if (!r->m_mediaChannel)
  1245. r->m_mediaChannel = packet->m_nChannel;
  1246. if (!r->m_pausing)
  1247. r->m_mediaStamp = packet->m_nTimeStamp;
  1248. break;
  1249. case RTMP_PACKET_TYPE_FLEX_STREAM_SEND:
  1250. /* flex stream send */
  1251. RTMP_Log(RTMP_LOGDEBUG,
  1252. "%s, flex stream send, size %u bytes, not supported, ignoring",
  1253. __FUNCTION__, packet->m_nBodySize);
  1254. break;
  1255. case RTMP_PACKET_TYPE_FLEX_SHARED_OBJECT:
  1256. /* flex shared object */
  1257. RTMP_Log(RTMP_LOGDEBUG,
  1258. "%s, flex shared object, size %u bytes, not supported, ignoring",
  1259. __FUNCTION__, packet->m_nBodySize);
  1260. break;
  1261. case RTMP_PACKET_TYPE_FLEX_MESSAGE:
  1262. /* flex message */
  1263. {
  1264. RTMP_Log(RTMP_LOGDEBUG,
  1265. "%s, flex message, size %u bytes, not fully supported",
  1266. __FUNCTION__, packet->m_nBodySize);
  1267. /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
  1268. /* some DEBUG code */
  1269. #if 0
  1270. RTMP_LIB_AMFObject obj;
  1271. int nRes = obj.Decode(packet.m_body+1, packet.m_nBodySize-1);
  1272. if(nRes < 0)
  1273. {
  1274. RTMP_Log(RTMP_LOGERROR, "%s, error decoding AMF3 packet", __FUNCTION__);
  1275. /*return; */
  1276. }
  1277. obj.Dump();
  1278. #endif
  1279. if (HandleInvoke(r, packet->m_body + 1, packet->m_nBodySize - 1) == 1)
  1280. bHasMediaPacket = 2;
  1281. break;
  1282. }
  1283. case RTMP_PACKET_TYPE_INFO:
  1284. /* metadata (notify) */
  1285. RTMP_Log(RTMP_LOGDEBUG, "%s, received: notify %u bytes", __FUNCTION__,
  1286. packet->m_nBodySize);
  1287. if (HandleMetadata(r, packet->m_body, packet->m_nBodySize))
  1288. bHasMediaPacket = 1;
  1289. break;
  1290. case RTMP_PACKET_TYPE_SHARED_OBJECT:
  1291. RTMP_Log(RTMP_LOGDEBUG, "%s, shared object, not supported, ignoring",
  1292. __FUNCTION__);
  1293. break;
  1294. case RTMP_PACKET_TYPE_INVOKE:
  1295. /* invoke */
  1296. RTMP_Log(RTMP_LOGDEBUG, "%s, received: invoke %u bytes", __FUNCTION__,
  1297. packet->m_nBodySize);
  1298. /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
  1299. if (HandleInvoke(r, packet->m_body, packet->m_nBodySize) == 1)
  1300. bHasMediaPacket = 2;
  1301. break;
  1302. case RTMP_PACKET_TYPE_FLASH_VIDEO:
  1303. {
  1304. /* go through FLV packets and handle metadata packets */
  1305. unsigned int pos = 0;
  1306. uint32_t nTimeStamp = packet->m_nTimeStamp;
  1307. while (pos + 11 < packet->m_nBodySize)
  1308. {
  1309. uint32_t dataSize = AMF_DecodeInt24(packet->m_body + pos + 1); /* size without header (11) and prevTagSize (4) */
  1310. if (pos + 11 + dataSize + 4 > packet->m_nBodySize)
  1311. {
  1312. RTMP_Log(RTMP_LOGWARNING, "Stream corrupt?!");
  1313. break;
  1314. }
  1315. if (packet->m_body[pos] == 0x12)
  1316. {
  1317. HandleMetadata(r, packet->m_body + pos + 11, dataSize);
  1318. }
  1319. else if (packet->m_body[pos] == 8 || packet->m_body[pos] == 9)
  1320. {
  1321. nTimeStamp = AMF_DecodeInt24(packet->m_body + pos + 4);
  1322. nTimeStamp |= (packet->m_body[pos + 7] << 24);
  1323. }
  1324. pos += (11 + dataSize + 4);
  1325. }
  1326. if (!r->m_pausing)
  1327. r->m_mediaStamp = nTimeStamp;
  1328. /* FLV tag(s) */
  1329. /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: FLV tag(s) %lu bytes", __FUNCTION__, packet.m_nBodySize); */
  1330. bHasMediaPacket = 1;
  1331. break;
  1332. }
  1333. default:
  1334. RTMP_Log(RTMP_LOGDEBUG, "%s, unknown packet type received: 0x%02x", __FUNCTION__,
  1335. packet->m_packetType);
  1336. #ifdef _DEBUG
  1337. RTMP_LogHex(RTMP_LOGDEBUG, (const uint8_t*)packet->m_body, packet->m_nBodySize);
  1338. #endif
  1339. }
  1340. return bHasMediaPacket;
  1341. }
  1342. #if defined(RTMP_NETSTACK_DUMP)
  1343. extern FILE *netstackdump;
  1344. extern FILE *netstackdump_read;
  1345. #endif
  1346. static int
  1347. ReadN(RTMP *r, char *buffer, int n)
  1348. {
  1349. int nOriginalSize = n;
  1350. int avail;
  1351. char *ptr;
  1352. r->m_sb.sb_timedout = FALSE;
  1353. #ifdef _DEBUG
  1354. memset(buffer, 0, n);
  1355. #endif
  1356. ptr = buffer;
  1357. while (n > 0)
  1358. {
  1359. int nBytes = 0, nRead;
  1360. if (r->Link.protocol & RTMP_FEATURE_HTTP)
  1361. {
  1362. int refill = 0;
  1363. while (!r->m_resplen)
  1364. {
  1365. int ret;
  1366. if (r->m_sb.sb_size < 13 || refill)
  1367. {
  1368. if (!r->m_unackd)
  1369. HTTP_Post(r, RTMPT_IDLE, "", 1);
  1370. if (RTMPSockBuf_Fill(&r->m_sb) < 1)
  1371. {
  1372. if (!r->m_sb.sb_timedout)
  1373. RTMP_Close(r);
  1374. return 0;
  1375. }
  1376. }
  1377. if ((ret = HTTP_read(r, 0)) == -1)
  1378. {
  1379. RTMP_Log(RTMP_LOGDEBUG, "%s, No valid HTTP response found", __FUNCTION__);
  1380. RTMP_Close(r);
  1381. return 0;
  1382. }
  1383. else if (ret == -2)
  1384. {
  1385. refill = 1;
  1386. }
  1387. else
  1388. {
  1389. refill = 0;
  1390. }
  1391. }
  1392. if (r->m_resplen && !r->m_sb.sb_size)
  1393. RTMPSockBuf_Fill(&r->m_sb);
  1394. avail = r->m_sb.sb_size;
  1395. if (avail > r->m_resplen)
  1396. avail = r->m_resplen;
  1397. }
  1398. else
  1399. {
  1400. avail = r->m_sb.sb_size;
  1401. if (avail == 0)
  1402. {
  1403. if (RTMPSockBuf_Fill(&r->m_sb) < 1)
  1404. {
  1405. if (!r->m_sb.sb_timedout)
  1406. RTMP_Close(r);
  1407. return 0;
  1408. }
  1409. avail = r->m_sb.sb_size;
  1410. }
  1411. }
  1412. nRead = ((n < avail) ? n : avail);
  1413. if (nRead > 0)
  1414. {
  1415. memcpy(ptr, r->m_sb.sb_start, nRead);
  1416. r->m_sb.sb_start += nRead;
  1417. r->m_sb.sb_size -= nRead;
  1418. nBytes = nRead;
  1419. r->m_nBytesIn += nRead;
  1420. if (r->m_bSendCounter
  1421. && r->m_nBytesIn > ( r->m_nBytesInSent + r->m_nClientBW / 10))
  1422. if (!SendBytesReceived(r))
  1423. return FALSE;
  1424. }
  1425. /*RTMP_Log(RTMP_LOGDEBUG, "%s: %d bytes\n", __FUNCTION__, nBytes); */
  1426. #if defined(RTMP_NETSTACK_DUMP)
  1427. fwrite(ptr, 1, nBytes, netstackdump_read);
  1428. #endif
  1429. if (nBytes == 0)
  1430. {
  1431. RTMP_Log(RTMP_LOGDEBUG, "%s, RTMP socket closed by peer", __FUNCTION__);
  1432. /*goto again; */
  1433. RTMP_Close(r);
  1434. break;
  1435. }
  1436. if (r->Link.protocol & RTMP_FEATURE_HTTP)
  1437. r->m_resplen -= nBytes;
  1438. #ifdef CRYPTO
  1439. if (r->Link.rc4keyIn)
  1440. {
  1441. RC4_encrypt(r->Link.rc4keyIn, nBytes, ptr);
  1442. }
  1443. #endif
  1444. n -= nBytes;
  1445. ptr += nBytes;
  1446. }
  1447. return nOriginalSize - n;
  1448. }
  1449. static int
  1450. WriteN(RTMP *r, const char *buffer, int n)
  1451. {
  1452. const char *ptr = buffer;
  1453. #ifdef CRYPTO
  1454. char *encrypted = 0;
  1455. char buf[RTMP_BUFFER_CACHE_SIZE];
  1456. if (r->Link.rc4keyOut)
  1457. {
  1458. if (n > (int)sizeof(buf))
  1459. encrypted = (char *)malloc(n);
  1460. else
  1461. encrypted = (char *)buf;
  1462. ptr = encrypted;
  1463. RC4_encrypt2(r->Link.rc4keyOut, n, buffer, ptr);
  1464. }
  1465. #endif
  1466. while (n > 0)
  1467. {
  1468. int nBytes;
  1469. if (r->Link.protocol & RTMP_FEATURE_HTTP)
  1470. nBytes = HTTP_Post(r, RTMPT_SEND, ptr, n);
  1471. else if(r->m_bCustomSend && r->m_customSendFunc)
  1472. nBytes = r->m_customSendFunc(&r->m_sb, ptr, n, r->m_customSendParam);
  1473. else
  1474. nBytes = RTMPSockBuf_Send(&r->m_sb, ptr, n);
  1475. /*RTMP_Log(RTMP_LOGDEBUG, "%s: %d\n", __FUNCTION__, nBytes); */
  1476. if (nBytes < 0)
  1477. {
  1478. int sockerr = GetSockError();
  1479. RTMP_Log(RTMP_LOGERROR, "%s, RTMP send error %d (%d bytes)", __FUNCTION__,
  1480. sockerr, n);
  1481. if (sockerr == EINTR && !RTMP_ctrlC)
  1482. continue;
  1483. r->last_error_code = sockerr;
  1484. RTMP_Close(r);
  1485. n = 1;
  1486. break;
  1487. }
  1488. if (nBytes == 0)
  1489. break;
  1490. n -= nBytes;
  1491. ptr += nBytes;
  1492. }
  1493. #ifdef CRYPTO
  1494. if (encrypted && encrypted != buf)
  1495. free(encrypted);
  1496. #endif
  1497. return n == 0;
  1498. }
  1499. #define SAVC(x) static const AVal av_##x = AVC(#x)
  1500. SAVC(app);
  1501. SAVC(connect);
  1502. SAVC(flashVer);
  1503. SAVC(swfUrl);
  1504. SAVC(pageUrl);
  1505. SAVC(tcUrl);
  1506. SAVC(fpad);
  1507. SAVC(capabilities);
  1508. SAVC(audioCodecs);
  1509. SAVC(videoCodecs);
  1510. SAVC(videoFunction);
  1511. SAVC(objectEncoding);
  1512. SAVC(secureToken);
  1513. SAVC(secureTokenResponse);
  1514. SAVC(type);
  1515. SAVC(nonprivate);
  1516. static int
  1517. SendConnectPacket(RTMP *r, RTMPPacket *cp)
  1518. {
  1519. RTMPPacket packet;
  1520. char pbuf[4096], *pend = pbuf + sizeof(pbuf);
  1521. char *enc;
  1522. if (cp)
  1523. return RTMP_SendPacket(r, cp, TRUE);
  1524. if((r->Link.protocol & RTMP_FEATURE_WRITE) && r->m_bSendChunkSizeInfo)
  1525. {
  1526. packet.m_nChannel = 0x02;
  1527. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1528. packet.m_packetType = RTMP_PACKET_TYPE_CHUNK_SIZE;
  1529. packet.m_nTimeStamp = 0;
  1530. packet.m_nInfoField2 = 0;
  1531. packet.m_hasAbsTimestamp = 0;
  1532. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1533. packet.m_nBodySize = 4;
  1534. enc = packet.m_body;
  1535. AMF_EncodeInt32(enc, pend, r->m_outChunkSize);
  1536. if(!RTMP_SendPacket(r, &packet, FALSE))
  1537. return 0;
  1538. }
  1539. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1540. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1541. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1542. packet.m_nTimeStamp = 0;
  1543. packet.m_nInfoField2 = 0;
  1544. packet.m_hasAbsTimestamp = 0;
  1545. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1546. enc = packet.m_body;
  1547. enc = AMF_EncodeString(enc, pend, &av_connect);
  1548. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1549. *enc++ = AMF_OBJECT;
  1550. enc = AMF_EncodeNamedString(enc, pend, &av_app, &r->Link.app);
  1551. if (!enc)
  1552. return FALSE;
  1553. if (r->Link.protocol & RTMP_FEATURE_WRITE)
  1554. {
  1555. enc = AMF_EncodeNamedString(enc, pend, &av_type, &av_nonprivate);
  1556. if (!enc)
  1557. return FALSE;
  1558. }
  1559. if (r->Link.flashVer.av_len)
  1560. {
  1561. enc = AMF_EncodeNamedString(enc, pend, &av_flashVer, &r->Link.flashVer);
  1562. if (!enc)
  1563. return FALSE;
  1564. }
  1565. if (r->Link.swfUrl.av_len)
  1566. {
  1567. enc = AMF_EncodeNamedString(enc, pend, &av_swfUrl, &r->Link.swfUrl);
  1568. if (!enc)
  1569. return FALSE;
  1570. }
  1571. if (r->Link.tcUrl.av_len)
  1572. {
  1573. enc = AMF_EncodeNamedString(enc, pend, &av_tcUrl, &r->Link.tcUrl);
  1574. if (!enc)
  1575. return FALSE;
  1576. }
  1577. if (!(r->Link.protocol & RTMP_FEATURE_WRITE))
  1578. {
  1579. enc = AMF_EncodeNamedBoolean(enc, pend, &av_fpad, FALSE);
  1580. if (!enc)
  1581. return FALSE;
  1582. enc = AMF_EncodeNamedNumber(enc, pend, &av_capabilities, 15.0);
  1583. if (!enc)
  1584. return FALSE;
  1585. enc = AMF_EncodeNamedNumber(enc, pend, &av_audioCodecs, r->m_fAudioCodecs);
  1586. if (!enc)
  1587. return FALSE;
  1588. enc = AMF_EncodeNamedNumber(enc, pend, &av_videoCodecs, r->m_fVideoCodecs);
  1589. if (!enc)
  1590. return FALSE;
  1591. enc = AMF_EncodeNamedNumber(enc, pend, &av_videoFunction, 1.0);
  1592. if (!enc)
  1593. return FALSE;
  1594. if (r->Link.pageUrl.av_len)
  1595. {
  1596. enc = AMF_EncodeNamedString(enc, pend, &av_pageUrl, &r->Link.pageUrl);
  1597. if (!enc)
  1598. return FALSE;
  1599. }
  1600. }
  1601. if (r->m_fEncoding != 0.0 || r->m_bSendEncoding)
  1602. {
  1603. /* AMF0, AMF3 not fully supported yet */
  1604. enc = AMF_EncodeNamedNumber(enc, pend, &av_objectEncoding, r->m_fEncoding);
  1605. if (!enc)
  1606. return FALSE;
  1607. }
  1608. if (enc + 3 >= pend)
  1609. return FALSE;
  1610. *enc++ = 0;
  1611. *enc++ = 0; /* end of object - 0x00 0x00 0x09 */
  1612. *enc++ = AMF_OBJECT_END;
  1613. /* add auth string */
  1614. if (r->Link.auth.av_len)
  1615. {
  1616. enc = AMF_EncodeBoolean(enc, pend, r->Link.lFlags & RTMP_LF_AUTH);
  1617. if (!enc)
  1618. return FALSE;
  1619. enc = AMF_EncodeString(enc, pend, &r->Link.auth);
  1620. if (!enc)
  1621. return FALSE;
  1622. }
  1623. if (r->Link.extras.o_num)
  1624. {
  1625. int i;
  1626. for (i = 0; i < r->Link.extras.o_num; i++)
  1627. {
  1628. enc = AMFProp_Encode(&r->Link.extras.o_props[i], enc, pend);
  1629. if (!enc)
  1630. return FALSE;
  1631. }
  1632. }
  1633. packet.m_nBodySize = enc - packet.m_body;
  1634. return RTMP_SendPacket(r, &packet, TRUE);
  1635. }
  1636. #if 0 /* unused */
  1637. SAVC(bgHasStream);
  1638. static int
  1639. SendBGHasStream(RTMP *r, double dId, AVal *playpath)
  1640. {
  1641. RTMPPacket packet;
  1642. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1643. char *enc;
  1644. packet.m_forceChannel = FALSE;
  1645. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1646. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1647. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1648. packet.m_nTimeStamp = 0;
  1649. packet.m_nInfoField2 = 0;
  1650. packet.m_hasAbsTimestamp = 0;
  1651. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1652. enc = packet.m_body;
  1653. enc = AMF_EncodeString(enc, pend, &av_bgHasStream);
  1654. enc = AMF_EncodeNumber(enc, pend, dId);
  1655. *enc++ = AMF_NULL;
  1656. enc = AMF_EncodeString(enc, pend, playpath);
  1657. if (enc == NULL)
  1658. return FALSE;
  1659. packet.m_nBodySize = enc - packet.m_body;
  1660. return RTMP_SendPacket(r, &packet, TRUE);
  1661. }
  1662. #endif
  1663. SAVC(createStream);
  1664. int
  1665. RTMP_SendCreateStream(RTMP *r)
  1666. {
  1667. RTMPPacket packet;
  1668. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1669. char *enc;
  1670. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1671. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1672. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1673. packet.m_nTimeStamp = 0;
  1674. packet.m_nInfoField2 = 0;
  1675. packet.m_hasAbsTimestamp = 0;
  1676. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1677. enc = packet.m_body;
  1678. enc = AMF_EncodeString(enc, pend, &av_createStream);
  1679. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1680. *enc++ = AMF_NULL; /* NULL */
  1681. packet.m_nBodySize = enc - packet.m_body;
  1682. return RTMP_SendPacket(r, &packet, TRUE);
  1683. }
  1684. SAVC(FCSubscribe);
  1685. static int
  1686. SendFCSubscribe(RTMP *r, AVal *subscribepath)
  1687. {
  1688. RTMPPacket packet;
  1689. char pbuf[512], *pend = pbuf + sizeof(pbuf);
  1690. char *enc;
  1691. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1692. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1693. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1694. packet.m_nTimeStamp = 0;
  1695. packet.m_nInfoField2 = 0;
  1696. packet.m_hasAbsTimestamp = 0;
  1697. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1698. RTMP_Log(RTMP_LOGDEBUG, "FCSubscribe: %s", subscribepath->av_val);
  1699. enc = packet.m_body;
  1700. enc = AMF_EncodeString(enc, pend, &av_FCSubscribe);
  1701. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1702. *enc++ = AMF_NULL;
  1703. enc = AMF_EncodeString(enc, pend, subscribepath);
  1704. if (!enc)
  1705. return FALSE;
  1706. packet.m_nBodySize = enc - packet.m_body;
  1707. return RTMP_SendPacket(r, &packet, TRUE);
  1708. }
  1709. /* Justin.tv specific authentication */
  1710. static const AVal av_NetStream_Authenticate_UsherToken = AVC("NetStream.Authenticate.UsherToken");
  1711. static int
  1712. SendUsherToken(RTMP *r, AVal *usherToken)
  1713. {
  1714. RTMPPacket packet;
  1715. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1716. char *enc;
  1717. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1718. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1719. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1720. packet.m_nTimeStamp = 0;
  1721. packet.m_nInfoField2 = 0;
  1722. packet.m_hasAbsTimestamp = 0;
  1723. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1724. RTMP_Log(RTMP_LOGDEBUG, "UsherToken: %s", usherToken->av_val);
  1725. enc = packet.m_body;
  1726. enc = AMF_EncodeString(enc, pend, &av_NetStream_Authenticate_UsherToken);
  1727. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1728. *enc++ = AMF_NULL;
  1729. enc = AMF_EncodeString(enc, pend, usherToken);
  1730. if (!enc)
  1731. return FALSE;
  1732. packet.m_nBodySize = enc - packet.m_body;
  1733. return RTMP_SendPacket(r, &packet, FALSE);
  1734. }
  1735. /******************************************/
  1736. SAVC(releaseStream);
  1737. static int
  1738. SendReleaseStream(RTMP *r, int streamIdx)
  1739. {
  1740. RTMPPacket packet;
  1741. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1742. char *enc;
  1743. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1744. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1745. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1746. packet.m_nTimeStamp = 0;
  1747. packet.m_nInfoField2 = 0;
  1748. packet.m_hasAbsTimestamp = 0;
  1749. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1750. enc = packet.m_body;
  1751. enc = AMF_EncodeString(enc, pend, &av_releaseStream);
  1752. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1753. *enc++ = AMF_NULL;
  1754. enc = AMF_EncodeString(enc, pend, &r->Link.streams[streamIdx].playpath);
  1755. if (!enc)
  1756. return FALSE;
  1757. packet.m_nBodySize = enc - packet.m_body;
  1758. return RTMP_SendPacket(r, &packet, FALSE);
  1759. }
  1760. SAVC(FCPublish);
  1761. static int
  1762. SendFCPublish(RTMP *r, int streamIdx)
  1763. {
  1764. RTMPPacket packet;
  1765. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1766. char *enc;
  1767. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1768. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1769. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1770. packet.m_nTimeStamp = 0;
  1771. packet.m_nInfoField2 = 0;
  1772. packet.m_hasAbsTimestamp = 0;
  1773. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1774. enc = packet.m_body;
  1775. enc = AMF_EncodeString(enc, pend, &av_FCPublish);
  1776. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1777. *enc++ = AMF_NULL;
  1778. enc = AMF_EncodeString(enc, pend, &r->Link.streams[streamIdx].playpath);
  1779. if (!enc)
  1780. return FALSE;
  1781. packet.m_nBodySize = enc - packet.m_body;
  1782. return RTMP_SendPacket(r, &packet, FALSE);
  1783. }
  1784. SAVC(FCUnpublish);
  1785. static int
  1786. SendFCUnpublish(RTMP *r, int streamIdx)
  1787. {
  1788. RTMPPacket packet;
  1789. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1790. char *enc;
  1791. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1792. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1793. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1794. packet.m_nTimeStamp = 0;
  1795. packet.m_nInfoField2 = 0;
  1796. packet.m_hasAbsTimestamp = 0;
  1797. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1798. enc = packet.m_body;
  1799. enc = AMF_EncodeString(enc, pend, &av_FCUnpublish);
  1800. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1801. *enc++ = AMF_NULL;
  1802. enc = AMF_EncodeString(enc, pend, &r->Link.streams[streamIdx].playpath);
  1803. if (!enc)
  1804. return FALSE;
  1805. packet.m_nBodySize = enc - packet.m_body;
  1806. return RTMP_SendPacket(r, &packet, FALSE);
  1807. }
  1808. SAVC(publish);
  1809. SAVC(live);
  1810. static int
  1811. SendPublish(RTMP *r, int streamIdx)
  1812. {
  1813. RTMPPacket packet;
  1814. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  1815. char *enc;
  1816. packet.m_nChannel = 0x04; /* source channel (invoke) */
  1817. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1818. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1819. packet.m_nTimeStamp = 0;
  1820. packet.m_nInfoField2 = r->Link.streams[streamIdx].id;
  1821. packet.m_hasAbsTimestamp = 0;
  1822. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1823. enc = packet.m_body;
  1824. enc = AMF_EncodeString(enc, pend, &av_publish);
  1825. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1826. *enc++ = AMF_NULL;
  1827. enc = AMF_EncodeString(enc, pend, &r->Link.streams[streamIdx].playpath);
  1828. if (!enc)
  1829. return FALSE;
  1830. /* FIXME: should we choose live based on Link.lFlags & RTMP_LF_LIVE? */
  1831. enc = AMF_EncodeString(enc, pend, &av_live);
  1832. if (!enc)
  1833. return FALSE;
  1834. packet.m_nBodySize = enc - packet.m_body;
  1835. return RTMP_SendPacket(r, &packet, TRUE);
  1836. }
  1837. SAVC(deleteStream);
  1838. static int
  1839. SendDeleteStream(RTMP *r, double dStreamId)
  1840. {
  1841. RTMPPacket packet;
  1842. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1843. char *enc;
  1844. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1845. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1846. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1847. packet.m_nTimeStamp = 0;
  1848. packet.m_nInfoField2 = 0;
  1849. packet.m_hasAbsTimestamp = 0;
  1850. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1851. enc = packet.m_body;
  1852. enc = AMF_EncodeString(enc, pend, &av_deleteStream);
  1853. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1854. *enc++ = AMF_NULL;
  1855. enc = AMF_EncodeNumber(enc, pend, dStreamId);
  1856. packet.m_nBodySize = enc - packet.m_body;
  1857. /* no response expected */
  1858. return RTMP_SendPacket(r, &packet, FALSE);
  1859. }
  1860. SAVC(pause);
  1861. int
  1862. RTMP_SendPause(RTMP *r, int DoPause, int iTime)
  1863. {
  1864. RTMPPacket packet;
  1865. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1866. char *enc;
  1867. packet.m_nChannel = 0x08; /* video channel */
  1868. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1869. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1870. packet.m_nTimeStamp = 0;
  1871. packet.m_nInfoField2 = 0;
  1872. packet.m_hasAbsTimestamp = 0;
  1873. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1874. enc = packet.m_body;
  1875. enc = AMF_EncodeString(enc, pend, &av_pause);
  1876. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1877. *enc++ = AMF_NULL;
  1878. enc = AMF_EncodeBoolean(enc, pend, DoPause);
  1879. enc = AMF_EncodeNumber(enc, pend, (double)iTime);
  1880. packet.m_nBodySize = enc - packet.m_body;
  1881. RTMP_Log(RTMP_LOGDEBUG, "%s, %d, pauseTime=%d", __FUNCTION__, DoPause, iTime);
  1882. return RTMP_SendPacket(r, &packet, TRUE);
  1883. }
  1884. int RTMP_Pause(RTMP *r, int DoPause)
  1885. {
  1886. if (DoPause)
  1887. r->m_pauseStamp = r->m_mediaChannel < r->m_channelsAllocatedIn ?
  1888. r->m_channelTimestamp[r->m_mediaChannel] : 0;
  1889. return RTMP_SendPause(r, DoPause, r->m_pauseStamp);
  1890. }
  1891. SAVC(seek);
  1892. int
  1893. RTMP_SendSeek(RTMP *r, int iTime)
  1894. {
  1895. RTMPPacket packet;
  1896. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1897. char *enc;
  1898. packet.m_nChannel = 0x08; /* video channel */
  1899. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1900. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1901. packet.m_nTimeStamp = 0;
  1902. packet.m_nInfoField2 = 0;
  1903. packet.m_hasAbsTimestamp = 0;
  1904. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1905. enc = packet.m_body;
  1906. enc = AMF_EncodeString(enc, pend, &av_seek);
  1907. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1908. *enc++ = AMF_NULL;
  1909. enc = AMF_EncodeNumber(enc, pend, (double)iTime);
  1910. packet.m_nBodySize = enc - packet.m_body;
  1911. r->m_read.flags |= RTMP_READ_SEEKING;
  1912. r->m_read.nResumeTS = 0;
  1913. return RTMP_SendPacket(r, &packet, TRUE);
  1914. }
  1915. int
  1916. RTMP_SendServerBW(RTMP *r)
  1917. {
  1918. RTMPPacket packet;
  1919. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1920. packet.m_nChannel = 0x02; /* control channel (invoke) */
  1921. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1922. packet.m_packetType = RTMP_PACKET_TYPE_SERVER_BW;
  1923. packet.m_nTimeStamp = 0;
  1924. packet.m_nInfoField2 = 0;
  1925. packet.m_hasAbsTimestamp = 0;
  1926. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1927. packet.m_nBodySize = 4;
  1928. AMF_EncodeInt32(packet.m_body, pend, r->m_nServerBW);
  1929. return RTMP_SendPacket(r, &packet, FALSE);
  1930. }
  1931. int
  1932. RTMP_SendClientBW(RTMP *r)
  1933. {
  1934. RTMPPacket packet;
  1935. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1936. packet.m_nChannel = 0x02; /* control channel (invoke) */
  1937. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1938. packet.m_packetType = RTMP_PACKET_TYPE_CLIENT_BW;
  1939. packet.m_nTimeStamp = 0;
  1940. packet.m_nInfoField2 = 0;
  1941. packet.m_hasAbsTimestamp = 0;
  1942. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1943. packet.m_nBodySize = 5;
  1944. AMF_EncodeInt32(packet.m_body, pend, r->m_nClientBW);
  1945. packet.m_body[4] = r->m_nClientBW2;
  1946. return RTMP_SendPacket(r, &packet, FALSE);
  1947. }
  1948. static int
  1949. SendBytesReceived(RTMP *r)
  1950. {
  1951. RTMPPacket packet;
  1952. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1953. packet.m_nChannel = 0x02; /* control channel (invoke) */
  1954. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1955. packet.m_packetType = RTMP_PACKET_TYPE_BYTES_READ_REPORT;
  1956. packet.m_nTimeStamp = 0;
  1957. packet.m_nInfoField2 = 0;
  1958. packet.m_hasAbsTimestamp = 0;
  1959. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1960. packet.m_nBodySize = 4;
  1961. AMF_EncodeInt32(packet.m_body, pend, r->m_nBytesIn); /* hard coded for now */
  1962. r->m_nBytesInSent = r->m_nBytesIn;
  1963. /*RTMP_Log(RTMP_LOGDEBUG, "Send bytes report. 0x%x (%d bytes)", (unsigned int)m_nBytesIn, m_nBytesIn); */
  1964. return RTMP_SendPacket(r, &packet, FALSE);
  1965. }
  1966. SAVC(_checkbw);
  1967. static int
  1968. SendCheckBW(RTMP *r)
  1969. {
  1970. RTMPPacket packet;
  1971. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1972. char *enc;
  1973. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1974. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  1975. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1976. packet.m_nTimeStamp = 0; /* RTMP_GetTime(); */
  1977. packet.m_nInfoField2 = 0;
  1978. packet.m_hasAbsTimestamp = 0;
  1979. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  1980. enc = packet.m_body;
  1981. enc = AMF_EncodeString(enc, pend, &av__checkbw);
  1982. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  1983. *enc++ = AMF_NULL;
  1984. packet.m_nBodySize = enc - packet.m_body;
  1985. /* triggers _onbwcheck and eventually results in _onbwdone */
  1986. return RTMP_SendPacket(r, &packet, FALSE);
  1987. }
  1988. SAVC(_result);
  1989. static int
  1990. SendCheckBWResult(RTMP *r, double txn)
  1991. {
  1992. RTMPPacket packet;
  1993. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  1994. char *enc;
  1995. packet.m_nChannel = 0x03; /* control channel (invoke) */
  1996. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  1997. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  1998. packet.m_nTimeStamp = 0x16 * r->m_nBWCheckCounter; /* temp inc value. till we figure it out. */
  1999. packet.m_nInfoField2 = 0;
  2000. packet.m_hasAbsTimestamp = 0;
  2001. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  2002. enc = packet.m_body;
  2003. enc = AMF_EncodeString(enc, pend, &av__result);
  2004. enc = AMF_EncodeNumber(enc, pend, txn);
  2005. *enc++ = AMF_NULL;
  2006. enc = AMF_EncodeNumber(enc, pend, (double)r->m_nBWCheckCounter++);
  2007. packet.m_nBodySize = enc - packet.m_body;
  2008. return RTMP_SendPacket(r, &packet, FALSE);
  2009. }
  2010. SAVC(ping);
  2011. SAVC(pong);
  2012. static int
  2013. SendPong(RTMP *r, double txn)
  2014. {
  2015. RTMPPacket packet;
  2016. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  2017. char *enc;
  2018. packet.m_nChannel = 0x03; /* control channel (invoke) */
  2019. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  2020. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  2021. packet.m_nTimeStamp = 0x16 * r->m_nBWCheckCounter; /* temp inc value. till we figure it out. */
  2022. packet.m_nInfoField2 = 0;
  2023. packet.m_hasAbsTimestamp = 0;
  2024. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  2025. enc = packet.m_body;
  2026. enc = AMF_EncodeString(enc, pend, &av_pong);
  2027. enc = AMF_EncodeNumber(enc, pend, txn);
  2028. *enc++ = AMF_NULL;
  2029. packet.m_nBodySize = enc - packet.m_body;
  2030. return RTMP_SendPacket(r, &packet, FALSE);
  2031. }
  2032. SAVC(play);
  2033. static int
  2034. SendPlay(RTMP *r, int streamIdx)
  2035. {
  2036. RTMPPacket packet;
  2037. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  2038. char *enc;
  2039. packet.m_nChannel = 0x08; /* we make 8 our stream channel */
  2040. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  2041. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  2042. packet.m_nTimeStamp = 0;
  2043. packet.m_nInfoField2 = r->Link.streams[streamIdx].id; /*0x01000000; */
  2044. packet.m_hasAbsTimestamp = 0;
  2045. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  2046. enc = packet.m_body;
  2047. enc = AMF_EncodeString(enc, pend, &av_play);
  2048. enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
  2049. *enc++ = AMF_NULL;
  2050. RTMP_Log(RTMP_LOGDEBUG, "%s, seekTime=%d, stopTime=%d, sending play: %s",
  2051. __FUNCTION__, r->Link.seekTime, r->Link.stopTime,
  2052. r->Link.streams[streamIdx].playpath.av_val);
  2053. enc = AMF_EncodeString(enc, pend, &r->Link.streams[streamIdx].playpath);
  2054. if (!enc)
  2055. return FALSE;
  2056. /* Optional parameters start and len.
  2057. *
  2058. * start: -2, -1, 0, positive number
  2059. * -2: looks for a live stream, then a recorded stream,
  2060. * if not found any open a live stream
  2061. * -1: plays a live stream
  2062. * >=0: plays a recorded streams from 'start' milliseconds
  2063. */
  2064. if (r->Link.lFlags & RTMP_LF_LIVE)
  2065. enc = AMF_EncodeNumber(enc, pend, -1000.0);
  2066. else
  2067. {
  2068. if (r->Link.seekTime > 0.0)
  2069. enc = AMF_EncodeNumber(enc, pend, r->Link.seekTime); /* resume from here */
  2070. else
  2071. enc = AMF_EncodeNumber(enc, pend, 0.0); /*-2000.0);*/ /* recorded as default, -2000.0 is not reliable since that freezes the player if the stream is not found */
  2072. }
  2073. if (!enc)
  2074. return FALSE;
  2075. /* len: -1, 0, positive number
  2076. * -1: plays live or recorded stream to the end (default)
  2077. * 0: plays a frame 'start' ms away from the beginning
  2078. * >0: plays a live or recoded stream for 'len' milliseconds
  2079. */
  2080. /*enc += EncodeNumber(enc, -1.0); */ /* len */
  2081. if (r->Link.stopTime)
  2082. {
  2083. enc = AMF_EncodeNumber(enc, pend, r->Link.stopTime - r->Link.seekTime);
  2084. if (!enc)
  2085. return FALSE;
  2086. }
  2087. packet.m_nBodySize = enc - packet.m_body;
  2088. return RTMP_SendPacket(r, &packet, TRUE);
  2089. }
  2090. SAVC(set_playlist);
  2091. SAVC(0);
  2092. static int
  2093. SendPlaylist(RTMP *r, int streamIdx)
  2094. {
  2095. RTMPPacket packet;
  2096. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  2097. char *enc;
  2098. packet.m_nChannel = 0x08; /* we make 8 our stream channel */
  2099. packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
  2100. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  2101. packet.m_nTimeStamp = 0;
  2102. packet.m_nInfoField2 = r->Link.streams[streamIdx].id; /*0x01000000; */
  2103. packet.m_hasAbsTimestamp = 0;
  2104. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  2105. enc = packet.m_body;
  2106. enc = AMF_EncodeString(enc, pend, &av_set_playlist);
  2107. enc = AMF_EncodeNumber(enc, pend, 0);
  2108. *enc++ = AMF_NULL;
  2109. *enc++ = AMF_ECMA_ARRAY;
  2110. *enc++ = 0;
  2111. *enc++ = 0;
  2112. *enc++ = 0;
  2113. *enc++ = AMF_OBJECT;
  2114. enc = AMF_EncodeNamedString(enc, pend, &av_0, &r->Link.streams[streamIdx].playpath);
  2115. if (!enc)
  2116. return FALSE;
  2117. if (enc + 3 >= pend)
  2118. return FALSE;
  2119. *enc++ = 0;
  2120. *enc++ = 0;
  2121. *enc++ = AMF_OBJECT_END;
  2122. packet.m_nBodySize = enc - packet.m_body;
  2123. return RTMP_SendPacket(r, &packet, TRUE);
  2124. }
  2125. static int
  2126. SendSecureTokenResponse(RTMP *r, AVal *resp)
  2127. {
  2128. RTMPPacket packet;
  2129. char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  2130. char *enc;
  2131. packet.m_nChannel = 0x03; /* control channel (invoke) */
  2132. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  2133. packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  2134. packet.m_nTimeStamp = 0;
  2135. packet.m_nInfoField2 = 0;
  2136. packet.m_hasAbsTimestamp = 0;
  2137. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  2138. enc = packet.m_body;
  2139. enc = AMF_EncodeString(enc, pend, &av_secureTokenResponse);
  2140. enc = AMF_EncodeNumber(enc, pend, 0.0);
  2141. *enc++ = AMF_NULL;
  2142. enc = AMF_EncodeString(enc, pend, resp);
  2143. if (!enc)
  2144. return FALSE;
  2145. packet.m_nBodySize = enc - packet.m_body;
  2146. return RTMP_SendPacket(r, &packet, FALSE);
  2147. }
  2148. /*
  2149. from http://jira.red5.org/confluence/display/docs/Ping:
  2150. Ping is the most mysterious message in RTMP and till now we haven't fully interpreted it yet. In summary, Ping message is used as a special command that are exchanged between client and server. This page aims to document all known Ping messages. Expect the list to grow.
  2151. The type of Ping packet is 0x4 and contains two mandatory parameters and two optional parameters. The first parameter is the type of Ping and in short integer. The second parameter is the target of the ping. As Ping is always sent in Channel 2 (control channel) and the target object in RTMP header is always 0 which means the Connection object, it's necessary to put an extra parameter to indicate the exact target object the Ping is sent to. The second parameter takes this responsibility. The value has the same meaning as the target object field in RTMP header. (The second value could also be used as other purposes, like RTT Ping/Pong. It is used as the timestamp.) The third and fourth parameters are optional and could be looked upon as the parameter of the Ping packet. Below is an unexhausted list of Ping messages.
  2152. * type 0: Clear the stream. No third and fourth parameters. The second parameter could be 0. After the connection is established, a Ping 0,0 will be sent from server to client. The message will also be sent to client on the start of Play and in response of a Seek or Pause/Resume request. This Ping tells client to re-calibrate the clock with the timestamp of the next packet server sends.
  2153. * type 1: Tell the stream to clear the playing buffer.
  2154. * type 3: Buffer time of the client. The third parameter is the buffer time in millisecond.
  2155. * type 4: Reset a stream. Used together with type 0 in the case of VOD. Often sent before type 0.
  2156. * type 6: Ping the client from server. The second parameter is the current time.
  2157. * type 7: Pong reply from client. The second parameter is the time the server sent with his ping request.
  2158. * type 26: SWFVerification request
  2159. * type 27: SWFVerification response
  2160. */
  2161. int
  2162. RTMP_SendCtrl(RTMP *r, short nType, unsigned int nObject, unsigned int nTime)
  2163. {
  2164. RTMPPacket packet;
  2165. char pbuf[256], *pend = pbuf + sizeof(pbuf);
  2166. int nSize;
  2167. char *buf;
  2168. RTMP_Log(RTMP_LOGDEBUG, "sending ctrl. type: 0x%04x", (unsigned short)nType);
  2169. packet.m_nChannel = 0x02; /* control channel (ping) */
  2170. packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  2171. packet.m_packetType = RTMP_PACKET_TYPE_CONTROL;
  2172. packet.m_nTimeStamp = 0; /* RTMP_GetTime(); */
  2173. packet.m_nInfoField2 = 0;
  2174. packet.m_hasAbsTimestamp = 0;
  2175. packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;
  2176. switch(nType)
  2177. {
  2178. case 0x03:
  2179. nSize = 10;
  2180. break; /* buffer time */
  2181. case 0x1A:
  2182. nSize = 3;
  2183. break; /* SWF verify request */
  2184. case 0x1B:
  2185. nSize = 44;
  2186. break; /* SWF verify response */
  2187. default:
  2188. nSize = 6;
  2189. break;
  2190. }
  2191. packet.m_nBodySize = nSize;
  2192. buf = packet.m_body;
  2193. buf = AMF_EncodeInt16(buf, pend, nType);
  2194. if (nType == 0x1B)
  2195. {
  2196. #ifdef CRYPTO
  2197. memcpy(buf, r->Link.SWFVerificationResponse, 42);
  2198. RTMP_Log(RTMP_LOGDEBUG, "Sending SWFVerification response: ");
  2199. RTMP_LogHex(RTMP_LOGDEBUG, (uint8_t *)packet.m_body, packet.m_nBodySize);
  2200. #endif
  2201. }
  2202. else if (nType == 0x1A)
  2203. {
  2204. *buf = nObject & 0xff;
  2205. }
  2206. else
  2207. {
  2208. if (nSize > 2)
  2209. buf = AMF_EncodeInt32(buf, pend, nObject);
  2210. if (nSize > 6)
  2211. buf = AMF_EncodeInt32(buf, pend, nTime);
  2212. }
  2213. return RTMP_SendPacket(r, &packet, FALSE);
  2214. }
  2215. static void
  2216. AV_erase(RTMP_METHOD *vals, int *num, int i, int freeit)
  2217. {
  2218. if (freeit)
  2219. free(vals[i].name.av_val);
  2220. (*num)--;
  2221. for (; i < *num; i++)
  2222. {
  2223. vals[i] = vals[i + 1];
  2224. }
  2225. vals[i].name.av_val = NULL;
  2226. vals[i].name.av_len = 0;
  2227. vals[i].num = 0;
  2228. }
  2229. void
  2230. RTMP_DropRequest(RTMP *r, int i, int freeit)
  2231. {
  2232. AV_erase(r->m_methodCalls, &r->m_numCalls, i, freeit);
  2233. }
  2234. static void
  2235. AV_queue(RTMP_METHOD **vals, int *num, AVal *av, int txn)
  2236. {
  2237. char *tmp;
  2238. if (!(*num & 0x0f))
  2239. *vals = realloc(*vals, (*num + 16) * sizeof(RTMP_METHOD));
  2240. tmp = malloc(av->av_len + 1);
  2241. memcpy(tmp, av->av_val, av->av_len);
  2242. tmp[av->av_len] = '\0';
  2243. (*vals)[*num].num = txn;
  2244. (*vals)[*num].name.av_len = av->av_len;
  2245. (*vals)[(*num)++].name.av_val = tmp;
  2246. }
  2247. static void
  2248. AV_clear(RTMP_METHOD *vals, int num)
  2249. {
  2250. int i;
  2251. for (i = 0; i < num; i++)
  2252. free(vals[i].name.av_val);
  2253. free(vals);
  2254. }
  2255. #if defined(CRYPTO) || defined(USE_ONLY_MD5)
  2256. static int
  2257. b64enc(const unsigned char *input, int length, char *output, int maxsize)
  2258. {
  2259. (void)maxsize;
  2260. #if defined(USE_MBEDTLS)
  2261. size_t osize;
  2262. if(mbedtls_base64_encode((unsigned char *) output, maxsize, &osize, input, length) == 0)
  2263. {
  2264. output[osize] = '\0';
  2265. return 1;
  2266. }
  2267. else
  2268. {
  2269. RTMP_Log(RTMP_LOGDEBUG, "%s, error", __FUNCTION__);
  2270. return 0;
  2271. }
  2272. #elif defined(USE_POLARSSL)
  2273. size_t buf_size = maxsize;
  2274. if(base64_encode((unsigned char *) output, &buf_size, input, length) == 0)
  2275. {
  2276. output[buf_size] = '\0';
  2277. return 1;
  2278. }
  2279. else
  2280. {
  2281. RTMP_Log(RTMP_LOGDEBUG, "%s, error", __FUNCTION__);
  2282. return 0;
  2283. }
  2284. #elif defined(USE_GNUTLS)
  2285. if (BASE64_ENCODE_RAW_LENGTH(length) <= maxsize)
  2286. base64_encode_raw((uint8_t*) output, length, input);
  2287. else
  2288. {
  2289. RTMP_Log(RTMP_LOGDEBUG, "%s, error", __FUNCTION__);
  2290. return 0;
  2291. }
  2292. #elif defined(USE_ONLY_MD5)
  2293. if ((((length + 2) / 3) * 4) <= maxsize)
  2294. {
  2295. base64_encodestate state;
  2296. base64_init_encodestate(&state);
  2297. output += base64_encode_block((const char *)input, length, output, &state);
  2298. base64_encode_blockend(output, &state);
  2299. }
  2300. else
  2301. {
  2302. RTMP_Log(RTMP_LOGDEBUG, "%s, error", __FUNCTION__);
  2303. return 0;
  2304. }
  2305. #else /* USE_OPENSSL */
  2306. BIO *bmem, *b64;
  2307. BUF_MEM *bptr;
  2308. b64 = BIO_new(BIO_f_base64());
  2309. bmem = BIO_new(BIO_s_mem());
  2310. b64 = BIO_push(b64, bmem);
  2311. BIO_write(b64, input, length);
  2312. if (BIO_flush(b64) == 1)
  2313. {
  2314. BIO_get_mem_ptr(b64, &bptr);
  2315. memcpy(output, bptr->data, bptr->length-1);
  2316. output[bptr->length-1] = '\0';
  2317. }
  2318. else
  2319. {
  2320. RTMP_Log(RTMP_LOGDEBUG, "%s, error", __FUNCTION__);
  2321. return 0;
  2322. }
  2323. BIO_free_all(b64);
  2324. #endif
  2325. return 1;
  2326. }
  2327. #if defined(USE_MBEDTLS)
  2328. typedef mbedtls_md5_context MD5_CTX;
  2329. #define MD5_Init(ctx) mbedtls_md5_init(ctx); mbedtls_md5_starts(ctx)
  2330. #define MD5_Update(ctx,data,len) mbedtls_md5_update(ctx,(unsigned char *)data,len)
  2331. #define MD5_Final(dig,ctx) mbedtls_md5_finish(ctx,dig); mbedtls_md5_free(ctx)
  2332. #elif defined(USE_POLARSSL)
  2333. #define MD5_CTX md5_context
  2334. #define MD5_Init(ctx) md5_starts(ctx)
  2335. #define MD5_Update(ctx,data,len) md5_update(ctx,(unsigned char *)data,len)
  2336. #define MD5_Final(dig,ctx) md5_finish(ctx,dig)
  2337. #elif defined(USE_GNUTLS)
  2338. typedef struct md5_ctx MD5_CTX;
  2339. #define MD5_Init(ctx) md5_init(ctx)
  2340. #define MD5_Update(ctx,data,len) md5_update(ctx,len,data)
  2341. #define MD5_Final(dig,ctx) md5_digest(ctx,MD5_DIGEST_LENGTH,dig)
  2342. #else
  2343. #endif
  2344. static const AVal av_authmod_adobe = AVC("authmod=adobe");
  2345. static const AVal av_authmod_llnw = AVC("authmod=llnw");
  2346. static void hexenc(unsigned char *inbuf, int len, char *dst)
  2347. {
  2348. char *ptr = dst;
  2349. while(len--)
  2350. {
  2351. sprintf(ptr, "%02x", *inbuf++);
  2352. ptr += 2;
  2353. }
  2354. *ptr = '\0';
  2355. }
  2356. static char *AValChr(AVal *av, char c)
  2357. {
  2358. int i;
  2359. for (i = 0; i < av->av_len; i++)
  2360. {
  2361. if (av->av_val[i] == c)
  2362. return &av->av_val[i];
  2363. }
  2364. return NULL;
  2365. }
  2366. static int
  2367. PublisherAuth(RTMP *r, AVal *description)
  2368. {
  2369. char *token_in = NULL;
  2370. char *ptr;
  2371. unsigned char md5sum_val[MD5_DIGEST_LENGTH+1];
  2372. MD5_CTX md5ctx;
  2373. int challenge2_data;
  2374. #define RESPONSE_LEN 32
  2375. #define CHALLENGE2_LEN 16
  2376. #define SALTED2_LEN (32+8+8+8)
  2377. #define B64DIGEST_LEN 24 /* 16 byte digest => 22 b64 chars + 2 chars padding */
  2378. #define B64INT_LEN 8 /* 4 byte int => 6 b64 chars + 2 chars padding */
  2379. #define HEXHASH_LEN (2*MD5_DIGEST_LENGTH)
  2380. char response[RESPONSE_LEN];
  2381. char challenge2[CHALLENGE2_LEN];
  2382. char salted2[SALTED2_LEN];
  2383. AVal pubToken;
  2384. if (strstr(description->av_val, av_authmod_adobe.av_val) != NULL)
  2385. {
  2386. if(strstr(description->av_val, "code=403 need auth") != NULL)
  2387. {
  2388. if (strstr(r->Link.app.av_val, av_authmod_adobe.av_val) != NULL)
  2389. {
  2390. RTMP_Log(RTMP_LOGERROR, "%s, wrong pubUser & pubPasswd for publisher auth", __FUNCTION__);
  2391. r->Link.pFlags |= RTMP_PUB_CLEAN;
  2392. return 0;
  2393. }
  2394. else if(r->Link.pubUser.av_len && r->Link.pubPasswd.av_len)
  2395. {
  2396. pubToken.av_val = malloc(r->Link.pubUser.av_len + av_authmod_adobe.av_len + 8);
  2397. pubToken.av_len = sprintf(pubToken.av_val, "?%s&user=%s",
  2398. av_authmod_adobe.av_val,
  2399. r->Link.pubUser.av_val);
  2400. RTMP_Log(RTMP_LOGDEBUG, "%s, pubToken1: %s", __FUNCTION__, pubToken.av_val);
  2401. r->Link.pFlags |= RTMP_PUB_NAME;
  2402. }
  2403. else
  2404. {
  2405. RTMP_Log(RTMP_LOGERROR, "%s, need to set pubUser & pubPasswd for publisher auth", __FUNCTION__);
  2406. r->Link.pFlags |= RTMP_PUB_CLEAN;
  2407. return 0;
  2408. }
  2409. }
  2410. else if((token_in = strstr(description->av_val, "?reason=needauth")) != NULL)
  2411. {
  2412. char *par, *val = NULL, *orig_ptr;
  2413. AVal user, salt, opaque, challenge, *aptr = NULL;
  2414. opaque.av_len = challenge.av_len = salt.av_len = user.av_len = 0;
  2415. opaque.av_val = challenge.av_val = salt.av_val = user.av_val = NULL;
  2416. ptr = orig_ptr = strdup(token_in);
  2417. while (ptr)
  2418. {
  2419. par = ptr;
  2420. ptr = strchr(par, '&');
  2421. if(ptr)
  2422. *ptr++ = '\0';
  2423. val = strchr(par, '=');
  2424. if(val)
  2425. *val++ = '\0';
  2426. if (aptr)
  2427. {
  2428. aptr->av_len = par - aptr->av_val - 1;
  2429. aptr = NULL;
  2430. }
  2431. if (strcmp(par, "user") == 0)
  2432. {
  2433. user.av_val = val;
  2434. aptr = &user;
  2435. }
  2436. else if (strcmp(par, "salt") == 0)
  2437. {
  2438. salt.av_val = val;
  2439. aptr = &salt;
  2440. }
  2441. else if (strcmp(par, "opaque") == 0)
  2442. {
  2443. opaque.av_val = val;
  2444. aptr = &opaque;
  2445. }
  2446. else if (strcmp(par, "challenge") == 0)
  2447. {
  2448. challenge.av_val = val;
  2449. aptr = &challenge;
  2450. }
  2451. RTMP_Log(RTMP_LOGDEBUG, "%s, par:\"%s\" = val:\"%s\"", __FUNCTION__, par, val);
  2452. }
  2453. if (aptr)
  2454. aptr->av_len = (int)strlen(aptr->av_val);
  2455. /* hash1 = base64enc(md5(user + _aodbeAuthSalt + password)) */
  2456. MD5_Init(&md5ctx);
  2457. MD5_Update(&md5ctx, user.av_val, user.av_len);
  2458. MD5_Update(&md5ctx, salt.av_val, salt.av_len);
  2459. MD5_Update(&md5ctx, r->Link.pubPasswd.av_val, r->Link.pubPasswd.av_len);
  2460. MD5_Final(md5sum_val, &md5ctx);
  2461. RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s%s%s) =>", __FUNCTION__,
  2462. user.av_val, salt.av_val, r->Link.pubPasswd.av_val);
  2463. RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
  2464. b64enc(md5sum_val, MD5_DIGEST_LENGTH, salted2, SALTED2_LEN);
  2465. RTMP_Log(RTMP_LOGDEBUG, "%s, b64(md5_1) = %s", __FUNCTION__, salted2);
  2466. challenge2_data = rand();
  2467. b64enc((unsigned char *) &challenge2_data, sizeof(int), challenge2, CHALLENGE2_LEN);
  2468. RTMP_Log(RTMP_LOGDEBUG, "%s, b64(%d) = %s", __FUNCTION__, challenge2_data, challenge2);
  2469. MD5_Init(&md5ctx);
  2470. MD5_Update(&md5ctx, salted2, B64DIGEST_LEN);
  2471. /* response = base64enc(md5(hash1 + opaque + challenge2)) */
  2472. if (opaque.av_len)
  2473. MD5_Update(&md5ctx, opaque.av_val, opaque.av_len);
  2474. else if (challenge.av_len)
  2475. MD5_Update(&md5ctx, challenge.av_val, challenge.av_len);
  2476. MD5_Update(&md5ctx, challenge2, B64INT_LEN);
  2477. MD5_Final(md5sum_val, &md5ctx);
  2478. RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s%s%s) =>", __FUNCTION__,
  2479. salted2, opaque.av_len ? opaque.av_val : "", challenge2);
  2480. RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
  2481. b64enc(md5sum_val, MD5_DIGEST_LENGTH, response, RESPONSE_LEN);
  2482. RTMP_Log(RTMP_LOGDEBUG, "%s, b64(md5_2) = %s", __FUNCTION__, response);
  2483. /* have all hashes, create auth token for the end of app */
  2484. pubToken.av_val = malloc(32 + B64INT_LEN + B64DIGEST_LEN + opaque.av_len);
  2485. pubToken.av_len = sprintf(pubToken.av_val,
  2486. "&challenge=%s&response=%s&opaque=%s",
  2487. challenge2,
  2488. response,
  2489. opaque.av_len ? opaque.av_val : "");
  2490. RTMP_Log(RTMP_LOGDEBUG, "%s, pubToken2: %s", __FUNCTION__, pubToken.av_val);
  2491. free(orig_ptr);
  2492. r->Link.pFlags |= RTMP_PUB_RESP|RTMP_PUB_CLATE;
  2493. }
  2494. else if(strstr(description->av_val, "?reason=authfailed") != NULL)
  2495. {
  2496. RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: wrong password", __FUNCTION__);
  2497. r->Link.pFlags |= RTMP_PUB_CLEAN;
  2498. return 0;
  2499. }
  2500. else if(strstr(description->av_val, "?reason=nosuchuser") != NULL)
  2501. {
  2502. RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: no such user", __FUNCTION__);
  2503. r->Link.pFlags |= RTMP_PUB_CLEAN;
  2504. return 0;
  2505. }
  2506. else
  2507. {
  2508. RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: unknown auth mode: %s",
  2509. __FUNCTION__, description->av_val);
  2510. r->Link.pFlags |= RTMP_PUB_CLEAN;
  2511. return 0;
  2512. }
  2513. ptr = malloc(r->Link.app.av_len + pubToken.av_len);
  2514. strncpy(ptr, r->Link.app.av_val, r->Link.app.av_len);
  2515. strncpy(ptr + r->Link.app.av_len, pubToken.av_val, pubToken.av_len);
  2516. r->Link.app.av_len += pubToken.av_len;
  2517. if(r->Link.pFlags & RTMP_PUB_ALLOC)
  2518. free(r->Link.app.av_val);
  2519. r->Link.app.av_val = ptr;
  2520. ptr = malloc(r->Link.tcUrl.av_len + pubToken.av_len);
  2521. strncpy(ptr, r->Link.tcUrl.av_val, r->Link.tcUrl.av_len);
  2522. strncpy(ptr + r->Link.tcUrl.av_len, pubToken.av_val, pubToken.av_len);
  2523. r->Link.tcUrl.av_len += pubToken.av_len;
  2524. if(r->Link.pFlags & RTMP_PUB_ALLOC)
  2525. free(r->Link.tcUrl.av_val);
  2526. r->Link.tcUrl.av_val = ptr;
  2527. free(pubToken.av_val);
  2528. r->Link.pFlags |= RTMP_PUB_ALLOC;
  2529. RTMP_Log(RTMP_LOGDEBUG, "%s, new app: %.*s tcUrl: %.*s playpath: %s", __FUNCTION__,
  2530. r->Link.app.av_len, r->Link.app.av_val,
  2531. r->Link.tcUrl.av_len, r->Link.tcUrl.av_val,
  2532. r->Link.streams[r->Link.curStreamIdx].playpath.av_val);
  2533. }
  2534. else if (strstr(description->av_val, av_authmod_llnw.av_val) != NULL)
  2535. {
  2536. if(strstr(description->av_val, "code=403 need auth") != NULL)
  2537. {
  2538. /* This part seems to be the same for llnw and adobe */
  2539. if (strstr(r->Link.app.av_val, av_authmod_llnw.av_val) != NULL)
  2540. {
  2541. RTMP_Log(RTMP_LOGERROR, "%s, wrong pubUser & pubPasswd for publisher auth", __FUNCTION__);
  2542. r->Link.pFlags |= RTMP_PUB_CLEAN;
  2543. return 0;
  2544. }
  2545. else if(r->Link.pubUser.av_len && r->Link.pubPasswd.av_len)
  2546. {
  2547. pubToken.av_val = malloc(r->Link.pubUser.av_len + av_authmod_llnw.av_len + 8);
  2548. pubToken.av_len = sprintf(pubToken.av_val, "?%s&user=%s",
  2549. av_authmod_llnw.av_val,
  2550. r->Link.pubUser.av_val);
  2551. RTMP_Log(RTMP_LOGDEBUG, "%s, pubToken1: %s", __FUNCTION__, pubToken.av_val);
  2552. r->Link.pFlags |= RTMP_PUB_NAME;
  2553. }
  2554. else
  2555. {
  2556. RTMP_Log(RTMP_LOGERROR, "%s, need to set pubUser & pubPasswd for publisher auth", __FUNCTION__);
  2557. r->Link.pFlags |= RTMP_PUB_CLEAN;
  2558. return 0;
  2559. }
  2560. }
  2561. else if((token_in = strstr(description->av_val, "?reason=needauth")) != NULL)
  2562. {
  2563. char *orig_ptr;
  2564. char *par, *val = NULL;
  2565. char hash1[HEXHASH_LEN+1], hash2[HEXHASH_LEN+1], hash3[HEXHASH_LEN+1];
  2566. AVal user, nonce, *aptr = NULL;
  2567. AVal apptmp;
  2568. /* llnw auth method
  2569. * Seems to be closely based on HTTP Digest Auth:
  2570. * http://tools.ietf.org/html/rfc2617
  2571. * http://en.wikipedia.org/wiki/Digest_access_authentication
  2572. */
  2573. const char authmod[] = "llnw";
  2574. const char realm[] = "live";
  2575. const char method[] = "publish";
  2576. const char qop[] = "auth";
  2577. /* nc = 1..connection count (or rather, number of times cnonce has been reused) */
  2578. int nc = 1;
  2579. /* nchex = hexenc(nc) (8 hex digits according to RFC 2617) */
  2580. char nchex[9];
  2581. /* cnonce = hexenc(4 random bytes) (initialized on first connection) */
  2582. char cnonce[9];
  2583. nonce.av_len = user.av_len = 0;
  2584. nonce.av_val = user.av_val = NULL;
  2585. ptr = orig_ptr = strdup(token_in);
  2586. /* Extract parameters (we need user and nonce) */
  2587. while (ptr)
  2588. {
  2589. par = ptr;
  2590. ptr = strchr(par, '&');
  2591. if(ptr)
  2592. *ptr++ = '\0';
  2593. val = strchr(par, '=');
  2594. if(val)
  2595. *val++ = '\0';
  2596. if (aptr)
  2597. {
  2598. aptr->av_len = par - aptr->av_val - 1;
  2599. aptr = NULL;
  2600. }
  2601. if (strcmp(par, "user") == 0)
  2602. {
  2603. user.av_val = val;
  2604. aptr = &user;
  2605. }
  2606. else if (strcmp(par, "nonce") == 0)
  2607. {
  2608. nonce.av_val = val;
  2609. aptr = &nonce;
  2610. }
  2611. RTMP_Log(RTMP_LOGDEBUG, "%s, par:\"%s\" = val:\"%s\"", __FUNCTION__, par, val);
  2612. }
  2613. if (aptr)
  2614. aptr->av_len = (int)strlen(aptr->av_val);
  2615. /* FIXME: handle case where user==NULL or nonce==NULL */
  2616. sprintf(nchex, "%08x", nc);
  2617. sprintf(cnonce, "%08x", rand());
  2618. /* hash1 = hexenc(md5(user + ":" + realm + ":" + password)) */
  2619. MD5_Init(&md5ctx);
  2620. MD5_Update(&md5ctx, user.av_val, user.av_len);
  2621. MD5_Update(&md5ctx, ":", 1);
  2622. MD5_Update(&md5ctx, (void *)realm, sizeof(realm)-1);
  2623. MD5_Update(&md5ctx, ":", 1);
  2624. MD5_Update(&md5ctx, r->Link.pubPasswd.av_val, r->Link.pubPasswd.av_len);
  2625. MD5_Final(md5sum_val, &md5ctx);
  2626. RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s:%s:%s) =>", __FUNCTION__,
  2627. user.av_val, realm, r->Link.pubPasswd.av_val);
  2628. RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
  2629. hexenc(md5sum_val, MD5_DIGEST_LENGTH, hash1);
  2630. /* hash2 = hexenc(md5(method + ":/" + app + "/" + appInstance)) */
  2631. /* Extract appname + appinstance without query parameters */
  2632. apptmp = r->Link.app;
  2633. ptr = AValChr(&apptmp, '?');
  2634. if (ptr)
  2635. apptmp.av_len = ptr - apptmp.av_val;
  2636. MD5_Init(&md5ctx);
  2637. MD5_Update(&md5ctx, (void *)method, sizeof(method)-1);
  2638. MD5_Update(&md5ctx, ":/", 2);
  2639. MD5_Update(&md5ctx, apptmp.av_val, apptmp.av_len);
  2640. if (!AValChr(&apptmp, '/'))
  2641. MD5_Update(&md5ctx, "/_definst_", sizeof("/_definst_") - 1);
  2642. MD5_Final(md5sum_val, &md5ctx);
  2643. RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s:/%.*s) =>", __FUNCTION__,
  2644. method, apptmp.av_len, apptmp.av_val);
  2645. RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
  2646. hexenc(md5sum_val, MD5_DIGEST_LENGTH, hash2);
  2647. /* hash3 = hexenc(md5(hash1 + ":" + nonce + ":" + nchex + ":" + cnonce + ":" + qop + ":" + hash2)) */
  2648. MD5_Init(&md5ctx);
  2649. MD5_Update(&md5ctx, hash1, HEXHASH_LEN);
  2650. MD5_Update(&md5ctx, ":", 1);
  2651. MD5_Update(&md5ctx, nonce.av_val, nonce.av_len);
  2652. MD5_Update(&md5ctx, ":", 1);
  2653. MD5_Update(&md5ctx, nchex, sizeof(nchex)-1);
  2654. MD5_Update(&md5ctx, ":", 1);
  2655. MD5_Update(&md5ctx, cnonce, sizeof(cnonce)-1);
  2656. MD5_Update(&md5ctx, ":", 1);
  2657. MD5_Update(&md5ctx, (void *)qop, sizeof(qop)-1);
  2658. MD5_Update(&md5ctx, ":", 1);
  2659. MD5_Update(&md5ctx, hash2, HEXHASH_LEN);
  2660. MD5_Final(md5sum_val, &md5ctx);
  2661. RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s:%s:%s:%s:%s:%s) =>", __FUNCTION__,
  2662. hash1, nonce.av_val, nchex, cnonce, qop, hash2);
  2663. RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
  2664. hexenc(md5sum_val, MD5_DIGEST_LENGTH, hash3);
  2665. /* pubToken = &authmod=<authmod>&user=<username>&nonce=<nonce>&cnonce=<cnonce>&nc=<nchex>&response=<hash3> */
  2666. /* Append nonces and response to query string which already contains
  2667. * user + authmod */
  2668. pubToken.av_val = malloc(64 + sizeof(authmod)-1 + user.av_len + nonce.av_len + sizeof(cnonce)-1 + sizeof(nchex)-1 + HEXHASH_LEN);
  2669. sprintf(pubToken.av_val,
  2670. "&nonce=%s&cnonce=%s&nc=%s&response=%s",
  2671. nonce.av_val, cnonce, nchex, hash3);
  2672. pubToken.av_len = (int)strlen(pubToken.av_val);
  2673. RTMP_Log(RTMP_LOGDEBUG, "%s, pubToken2: %s", __FUNCTION__, pubToken.av_val);
  2674. r->Link.pFlags |= RTMP_PUB_RESP|RTMP_PUB_CLATE;
  2675. free(orig_ptr);
  2676. }
  2677. else if(strstr(description->av_val, "?reason=authfail") != NULL)
  2678. {
  2679. RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed", __FUNCTION__);
  2680. r->Link.pFlags |= RTMP_PUB_CLEAN;
  2681. return 0;
  2682. }
  2683. else if(strstr(description->av_val, "?reason=nosuchuser") != NULL)
  2684. {
  2685. RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: no such user", __FUNCTION__);
  2686. r->Link.pFlags |= RTMP_PUB_CLEAN;
  2687. return 0;
  2688. }
  2689. else
  2690. {
  2691. RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: unknown auth mode: %s",
  2692. __FUNCTION__, description->av_val);
  2693. r->Link.pFlags |= RTMP_PUB_CLEAN;
  2694. return 0;
  2695. }
  2696. ptr = malloc(r->Link.app.av_len + pubToken.av_len);
  2697. strncpy(ptr, r->Link.app.av_val, r->Link.app.av_len);
  2698. strncpy(ptr + r->Link.app.av_len, pubToken.av_val, pubToken.av_len);
  2699. r->Link.app.av_len += pubToken.av_len;
  2700. if(r->Link.pFlags & RTMP_PUB_ALLOC)
  2701. free(r->Link.app.av_val);
  2702. r->Link.app.av_val = ptr;
  2703. ptr = malloc(r->Link.tcUrl.av_len + pubToken.av_len);
  2704. strncpy(ptr, r->Link.tcUrl.av_val, r->Link.tcUrl.av_len);
  2705. strncpy(ptr + r->Link.tcUrl.av_len, pubToken.av_val, pubToken.av_len);
  2706. r->Link.tcUrl.av_len += pubToken.av_len;
  2707. if(r->Link.pFlags & RTMP_PUB_ALLOC)
  2708. free(r->Link.tcUrl.av_val);
  2709. r->Link.tcUrl.av_val = ptr;
  2710. free(pubToken.av_val);
  2711. r->Link.pFlags |= RTMP_PUB_ALLOC;
  2712. RTMP_Log(RTMP_LOGDEBUG, "%s, new app: %.*s tcUrl: %.*s playpath: %s", __FUNCTION__,
  2713. r->Link.app.av_len, r->Link.app.av_val,
  2714. r->Link.tcUrl.av_len, r->Link.tcUrl.av_val,
  2715. r->Link.streams[r->Link.curStreamIdx].playpath.av_val);
  2716. }
  2717. else
  2718. {
  2719. return 0;
  2720. }
  2721. return 1;
  2722. }
  2723. #endif
  2724. SAVC(onBWDone);
  2725. SAVC(onFCSubscribe);
  2726. SAVC(onFCUnsubscribe);
  2727. SAVC(_onbwcheck);
  2728. SAVC(_onbwdone);
  2729. SAVC(_error);
  2730. SAVC(close);
  2731. SAVC(code);
  2732. SAVC(level);
  2733. SAVC(description);
  2734. SAVC(onStatus);
  2735. SAVC(playlist_ready);
  2736. static const AVal av_NetStream_Failed = AVC("NetStream.Failed");
  2737. static const AVal av_NetStream_Play_Failed = AVC("NetStream.Play.Failed");
  2738. static const AVal av_NetStream_Play_StreamNotFound =
  2739. AVC("NetStream.Play.StreamNotFound");
  2740. static const AVal av_NetConnection_Connect_InvalidApp =
  2741. AVC("NetConnection.Connect.InvalidApp");
  2742. static const AVal av_NetStream_Play_Start = AVC("NetStream.Play.Start");
  2743. static const AVal av_NetStream_Play_Complete = AVC("NetStream.Play.Complete");
  2744. static const AVal av_NetStream_Play_Stop = AVC("NetStream.Play.Stop");
  2745. static const AVal av_NetStream_Seek_Notify = AVC("NetStream.Seek.Notify");
  2746. static const AVal av_NetStream_Pause_Notify = AVC("NetStream.Pause.Notify");
  2747. static const AVal av_NetStream_Play_PublishNotify =
  2748. AVC("NetStream.Play.PublishNotify");
  2749. static const AVal av_NetStream_Play_UnpublishNotify =
  2750. AVC("NetStream.Play.UnpublishNotify");
  2751. static const AVal av_NetStream_Publish_Start = AVC("NetStream.Publish.Start");
  2752. static const AVal av_NetStream_Publish_Rejected = AVC("NetStream.Publish.Rejected");
  2753. static const AVal av_NetStream_Publish_Denied = AVC("NetStream.Publish.Denied");
  2754. /* Returns 0 for OK/Failed/error, 1 for 'Stop or Complete' */
  2755. static int
  2756. HandleInvoke(RTMP *r, const char *body, unsigned int nBodySize)
  2757. {
  2758. AMFObject obj;
  2759. AVal method;
  2760. double txn;
  2761. int ret = 0, nRes;
  2762. if (body[0] != 0x02) /* make sure it is a string method name we start with */
  2763. {
  2764. RTMP_Log(RTMP_LOGWARNING, "%s, Sanity failed. no string method in invoke packet",
  2765. __FUNCTION__);
  2766. return 0;
  2767. }
  2768. nRes = AMF_Decode(&obj, body, nBodySize, FALSE);
  2769. if (nRes < 0)
  2770. {
  2771. RTMP_Log(RTMP_LOGERROR, "%s, error decoding invoke packet", __FUNCTION__);
  2772. return 0;
  2773. }
  2774. AMF_Dump(&obj);
  2775. AMFProp_GetString(AMF_GetProp(&obj, NULL, 0), &method);
  2776. txn = AMFProp_GetNumber(AMF_GetProp(&obj, NULL, 1));
  2777. RTMP_Log(RTMP_LOGDEBUG, "%s, server invoking <%s>", __FUNCTION__, method.av_val);
  2778. if (AVMATCH(&method, &av__result))
  2779. {
  2780. AVal methodInvoked = {0};
  2781. int i;
  2782. for (i=0; i<r->m_numCalls; i++)
  2783. {
  2784. if (r->m_methodCalls[i].num == (int)txn)
  2785. {
  2786. methodInvoked = r->m_methodCalls[i].name;
  2787. AV_erase(r->m_methodCalls, &r->m_numCalls, i, FALSE);
  2788. break;
  2789. }
  2790. }
  2791. if (!methodInvoked.av_val)
  2792. {
  2793. RTMP_Log(RTMP_LOGDEBUG, "%s, received result id %f without matching request",
  2794. __FUNCTION__, txn);
  2795. goto leave;
  2796. }
  2797. RTMP_Log(RTMP_LOGDEBUG, "%s, received result for method call <%s>", __FUNCTION__,
  2798. methodInvoked.av_val);
  2799. if (AVMATCH(&methodInvoked, &av_connect))
  2800. {
  2801. if (r->Link.token.av_len)
  2802. {
  2803. AMFObjectProperty p;
  2804. if (RTMP_FindFirstMatchingProperty(&obj, &av_secureToken, &p))
  2805. {
  2806. DecodeTEA(&r->Link.token, &p.p_vu.p_aval);
  2807. SendSecureTokenResponse(r, &p.p_vu.p_aval);
  2808. }
  2809. }
  2810. if (r->Link.protocol & RTMP_FEATURE_WRITE)
  2811. {
  2812. for (int i = 0; i < r->Link.nStreams; i++)
  2813. SendReleaseStream(r, i);
  2814. for (int i = 0; i < r->Link.nStreams; i++)
  2815. SendFCPublish(r, i);
  2816. }
  2817. else
  2818. {
  2819. RTMP_SendServerBW(r);
  2820. RTMP_SendCtrl(r, 3, 0, 300);
  2821. }
  2822. for (int i = 0; i < r->Link.nStreams; i++)
  2823. RTMP_SendCreateStream(r);
  2824. if (!(r->Link.protocol & RTMP_FEATURE_WRITE))
  2825. {
  2826. /* Authenticate on Justin.tv legacy servers before sending FCSubscribe */
  2827. if (r->Link.usherToken.av_len)
  2828. SendUsherToken(r, &r->Link.usherToken);
  2829. /* Send the FCSubscribe if live stream or if subscribepath is set */
  2830. if (r->Link.subscribepath.av_len)
  2831. SendFCSubscribe(r, &r->Link.subscribepath);
  2832. else if (r->Link.lFlags & RTMP_LF_LIVE)
  2833. {
  2834. for (int i = 0; i < r->Link.nStreams; i++)
  2835. SendFCSubscribe(r, &r->Link.streams[i].playpath);
  2836. }
  2837. }
  2838. }
  2839. else if (AVMATCH(&methodInvoked, &av_createStream))
  2840. {
  2841. int id = (int)AMFProp_GetNumber(AMF_GetProp(&obj, NULL, 3));
  2842. r->Link.streams[r->Link.curStreamIdx].id = id;
  2843. if (r->Link.protocol & RTMP_FEATURE_WRITE)
  2844. SendPublish(r, r->Link.curStreamIdx);
  2845. else
  2846. {
  2847. if (r->Link.lFlags & RTMP_LF_PLST)
  2848. SendPlaylist(r, r->Link.curStreamIdx);
  2849. SendPlay(r, r->Link.curStreamIdx);
  2850. RTMP_SendCtrl(r, 3, id, r->m_nBufferMS);
  2851. }
  2852. r->Link.curStreamIdx++;
  2853. }
  2854. else if (AVMATCH(&methodInvoked, &av_play) ||
  2855. AVMATCH(&methodInvoked, &av_publish))
  2856. {
  2857. r->m_bPlaying = TRUE;
  2858. r->Link.playingStreams++;
  2859. }
  2860. free(methodInvoked.av_val);
  2861. }
  2862. else if (AVMATCH(&method, &av_onBWDone))
  2863. {
  2864. if (!r->m_nBWCheckCounter)
  2865. SendCheckBW(r);
  2866. }
  2867. else if (AVMATCH(&method, &av_onFCSubscribe))
  2868. {
  2869. /* SendOnFCSubscribe(); */
  2870. }
  2871. else if (AVMATCH(&method, &av_onFCUnsubscribe))
  2872. {
  2873. RTMP_Close(r);
  2874. ret = 1;
  2875. }
  2876. else if (AVMATCH(&method, &av_ping))
  2877. {
  2878. SendPong(r, txn);
  2879. }
  2880. else if (AVMATCH(&method, &av__onbwcheck))
  2881. {
  2882. SendCheckBWResult(r, txn);
  2883. }
  2884. else if (AVMATCH(&method, &av__onbwdone))
  2885. {
  2886. int i;
  2887. for (i = 0; i < r->m_numCalls; i++)
  2888. if (AVMATCH(&r->m_methodCalls[i].name, &av__checkbw))
  2889. {
  2890. AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
  2891. break;
  2892. }
  2893. }
  2894. else if (AVMATCH(&method, &av__error))
  2895. {
  2896. #if defined(CRYPTO) || defined(USE_ONLY_MD5)
  2897. AVal methodInvoked = {0};
  2898. int i;
  2899. if (r->Link.protocol & RTMP_FEATURE_WRITE)
  2900. {
  2901. for (i=0; i<r->m_numCalls; i++)
  2902. {
  2903. if (r->m_methodCalls[i].num == txn)
  2904. {
  2905. methodInvoked = r->m_methodCalls[i].name;
  2906. AV_erase(r->m_methodCalls, &r->m_numCalls, i, FALSE);
  2907. break;
  2908. }
  2909. }
  2910. if (!methodInvoked.av_val)
  2911. {
  2912. RTMP_Log(RTMP_LOGDEBUG, "%s, received result id %f without matching request",
  2913. __FUNCTION__, txn);
  2914. goto leave;
  2915. }
  2916. RTMP_Log(RTMP_LOGDEBUG, "%s, received error for method call <%s>", __FUNCTION__,
  2917. methodInvoked.av_val);
  2918. if (AVMATCH(&methodInvoked, &av_connect))
  2919. {
  2920. AMFObject obj2;
  2921. AVal code, level, description;
  2922. AMFProp_GetObject(AMF_GetProp(&obj, NULL, 3), &obj2);
  2923. AMFProp_GetString(AMF_GetProp(&obj2, &av_code, -1), &code);
  2924. AMFProp_GetString(AMF_GetProp(&obj2, &av_level, -1), &level);
  2925. AMFProp_GetString(AMF_GetProp(&obj2, &av_description, -1), &description);
  2926. RTMP_Log(RTMP_LOGDEBUG, "%s, error description: %s", __FUNCTION__, description.av_val);
  2927. /* if PublisherAuth returns 1, then reconnect */
  2928. if (PublisherAuth(r, &description) == 1)
  2929. {
  2930. RTMP_Close(r);
  2931. if (r->Link.pFlags & RTMP_PUB_CLATE)
  2932. {
  2933. r->Link.pFlags |= RTMP_PUB_CLEAN;
  2934. }
  2935. if (!RTMP_Connect(r, NULL) || !RTMP_ConnectStream(r, 0))
  2936. {
  2937. goto leave;
  2938. }
  2939. }
  2940. }
  2941. }
  2942. else
  2943. {
  2944. RTMP_Log(RTMP_LOGERROR, "rtmp server sent error");
  2945. }
  2946. free(methodInvoked.av_val);
  2947. #else
  2948. RTMP_Log(RTMP_LOGERROR, "rtmp server sent error");
  2949. #endif
  2950. }
  2951. else if (AVMATCH(&method, &av_close))
  2952. {
  2953. RTMP_Log(RTMP_LOGERROR, "rtmp server requested close");
  2954. RTMP_Close(r);
  2955. // disabled this for now, if the server sends an rtmp close message librtmp
  2956. // will enter an infinite loop here until stack is exhausted.
  2957. #if 0 && (defined(CRYPTO) || defined(USE_ONLY_MD5))
  2958. if ((r->Link.protocol & RTMP_FEATURE_WRITE) &&
  2959. !(r->Link.pFlags & RTMP_PUB_CLEAN) &&
  2960. ( !(r->Link.pFlags & RTMP_PUB_NAME) ||
  2961. !(r->Link.pFlags & RTMP_PUB_RESP) ||
  2962. (r->Link.pFlags & RTMP_PUB_CLATE) ) )
  2963. {
  2964. /* clean later */
  2965. if(r->Link.pFlags & RTMP_PUB_CLATE)
  2966. r->Link.pFlags |= RTMP_PUB_CLEAN;
  2967. RTMP_Log(RTMP_LOGERROR, "authenticating publisher");
  2968. if (!RTMP_Connect(r, NULL) || !RTMP_ConnectStream(r, 0))
  2969. goto leave;
  2970. }
  2971. #endif
  2972. }
  2973. else if (AVMATCH(&method, &av_onStatus))
  2974. {
  2975. AMFObject obj2;
  2976. AVal code, level, description;
  2977. AMFProp_GetObject(AMF_GetProp(&obj, NULL, 3), &obj2);
  2978. AMFProp_GetString(AMF_GetProp(&obj2, &av_code, -1), &code);
  2979. AMFProp_GetString(AMF_GetProp(&obj2, &av_level, -1), &level);
  2980. AMFProp_GetString(AMF_GetProp(&obj2, &av_description, -1), &description);
  2981. RTMP_Log(RTMP_LOGDEBUG, "%s, onStatus: %s", __FUNCTION__, code.av_val);
  2982. if (AVMATCH(&code, &av_NetStream_Failed)
  2983. || AVMATCH(&code, &av_NetStream_Play_Failed)
  2984. || AVMATCH(&code, &av_NetStream_Play_StreamNotFound)
  2985. || AVMATCH(&code, &av_NetConnection_Connect_InvalidApp)
  2986. || AVMATCH(&code, &av_NetStream_Publish_Rejected)
  2987. || AVMATCH(&code, &av_NetStream_Publish_Denied))
  2988. {
  2989. r->m_stream_id = -1;
  2990. RTMP_Close(r);
  2991. if (description.av_len)
  2992. RTMP_Log(RTMP_LOGERROR, "%s:\n%s (%s)", r->Link.tcUrl.av_val, code.av_val, description.av_val);
  2993. else
  2994. RTMP_Log(RTMP_LOGERROR, "%s:\n%s", r->Link.tcUrl.av_val, code.av_val);
  2995. }
  2996. else if (AVMATCH(&code, &av_NetStream_Play_Start)
  2997. || AVMATCH(&code, &av_NetStream_Play_PublishNotify))
  2998. {
  2999. int i;
  3000. r->m_bPlaying = TRUE;
  3001. for (i = 0; i < r->m_numCalls; i++)
  3002. {
  3003. if (AVMATCH(&r->m_methodCalls[i].name, &av_play))
  3004. {
  3005. AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
  3006. break;
  3007. }
  3008. }
  3009. }
  3010. else if (AVMATCH(&code, &av_NetStream_Publish_Start))
  3011. {
  3012. int i;
  3013. r->m_bPlaying = TRUE;
  3014. for (i = 0; i < r->m_numCalls; i++)
  3015. {
  3016. if (AVMATCH(&r->m_methodCalls[i].name, &av_publish))
  3017. {
  3018. AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
  3019. break;
  3020. }
  3021. }
  3022. }
  3023. /* Return 1 if this is a Play.Complete or Play.Stop */
  3024. else if (AVMATCH(&code, &av_NetStream_Play_Complete)
  3025. || AVMATCH(&code, &av_NetStream_Play_Stop)
  3026. || AVMATCH(&code, &av_NetStream_Play_UnpublishNotify))
  3027. {
  3028. RTMP_Close(r);
  3029. ret = 1;
  3030. }
  3031. else if (AVMATCH(&code, &av_NetStream_Seek_Notify))
  3032. {
  3033. r->m_read.flags &= ~RTMP_READ_SEEKING;
  3034. }
  3035. else if (AVMATCH(&code, &av_NetStream_Pause_Notify))
  3036. {
  3037. if (r->m_pausing == 1 || r->m_pausing == 2)
  3038. {
  3039. RTMP_SendPause(r, FALSE, r->m_pauseStamp);
  3040. r->m_pausing = 3;
  3041. }
  3042. }
  3043. }
  3044. else if (AVMATCH(&method, &av_playlist_ready))
  3045. {
  3046. int i;
  3047. for (i = 0; i < r->m_numCalls; i++)
  3048. {
  3049. if (AVMATCH(&r->m_methodCalls[i].name, &av_set_playlist))
  3050. {
  3051. AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
  3052. break;
  3053. }
  3054. }
  3055. }
  3056. else
  3057. {
  3058. }
  3059. leave:
  3060. AMF_Reset(&obj);
  3061. return ret;
  3062. }
  3063. int
  3064. RTMP_FindFirstMatchingProperty(AMFObject *obj, const AVal *name,
  3065. AMFObjectProperty * p)
  3066. {
  3067. int n;
  3068. /* this is a small object search to locate the "duration" property */
  3069. for (n = 0; n < obj->o_num; n++)
  3070. {
  3071. AMFObjectProperty *prop = AMF_GetProp(obj, NULL, n);
  3072. if (AVMATCH(&prop->p_name, name))
  3073. {
  3074. memcpy(p, prop, sizeof(*prop));
  3075. return TRUE;
  3076. }
  3077. if (prop->p_type == AMF_OBJECT || prop->p_type == AMF_ECMA_ARRAY)
  3078. {
  3079. if (RTMP_FindFirstMatchingProperty(&prop->p_vu.p_object, name, p))
  3080. return TRUE;
  3081. }
  3082. }
  3083. return FALSE;
  3084. }
  3085. /* Like above, but only check if name is a prefix of property */
  3086. int
  3087. RTMP_FindPrefixProperty(AMFObject *obj, const AVal *name,
  3088. AMFObjectProperty * p)
  3089. {
  3090. int n;
  3091. for (n = 0; n < obj->o_num; n++)
  3092. {
  3093. AMFObjectProperty *prop = AMF_GetProp(obj, NULL, n);
  3094. if (prop->p_name.av_len > name->av_len &&
  3095. !memcmp(prop->p_name.av_val, name->av_val, name->av_len))
  3096. {
  3097. memcpy(p, prop, sizeof(*prop));
  3098. return TRUE;
  3099. }
  3100. if (prop->p_type == AMF_OBJECT)
  3101. {
  3102. if (RTMP_FindPrefixProperty(&prop->p_vu.p_object, name, p))
  3103. return TRUE;
  3104. }
  3105. }
  3106. return FALSE;
  3107. }
  3108. static int
  3109. DumpMetaData(AMFObject *obj)
  3110. {
  3111. AMFObjectProperty *prop;
  3112. int n, len;
  3113. for (n = 0; n < obj->o_num; n++)
  3114. {
  3115. char str[256] = "";
  3116. prop = AMF_GetProp(obj, NULL, n);
  3117. switch (prop->p_type)
  3118. {
  3119. case AMF_OBJECT:
  3120. case AMF_ECMA_ARRAY:
  3121. case AMF_STRICT_ARRAY:
  3122. if (prop->p_name.av_len)
  3123. RTMP_Log(RTMP_LOGINFO, "%.*s:", prop->p_name.av_len, prop->p_name.av_val);
  3124. DumpMetaData(&prop->p_vu.p_object);
  3125. break;
  3126. case AMF_NUMBER:
  3127. snprintf(str, 255, "%.2f", prop->p_vu.p_number);
  3128. break;
  3129. case AMF_BOOLEAN:
  3130. snprintf(str, 255, "%s",
  3131. prop->p_vu.p_number != 0. ? "TRUE" : "FALSE");
  3132. break;
  3133. case AMF_STRING:
  3134. len = snprintf(str, 255, "%.*s", prop->p_vu.p_aval.av_len,
  3135. prop->p_vu.p_aval.av_val);
  3136. if (len >= 1 && str[len-1] == '\n')
  3137. str[len-1] = '\0';
  3138. break;
  3139. case AMF_DATE:
  3140. snprintf(str, 255, "timestamp:%.2f", prop->p_vu.p_number);
  3141. break;
  3142. default:
  3143. snprintf(str, 255, "INVALID TYPE 0x%02x",
  3144. (unsigned char)prop->p_type);
  3145. }
  3146. if (str[0] && prop->p_name.av_len)
  3147. {
  3148. RTMP_Log(RTMP_LOGINFO, " %-22.*s%s", prop->p_name.av_len,
  3149. prop->p_name.av_val, str);
  3150. }
  3151. }
  3152. return FALSE;
  3153. }
  3154. SAVC(onMetaData);
  3155. SAVC(duration);
  3156. SAVC(video);
  3157. SAVC(audio);
  3158. static int
  3159. HandleMetadata(RTMP *r, char *body, unsigned int len)
  3160. {
  3161. /* allright we get some info here, so parse it and print it */
  3162. /* also keep duration or filesize to make a nice progress bar */
  3163. AMFObject obj;
  3164. AVal metastring;
  3165. int ret = FALSE;
  3166. int nRes = AMF_Decode(&obj, body, len, FALSE);
  3167. if (nRes < 0)
  3168. {
  3169. RTMP_Log(RTMP_LOGERROR, "%s, error decoding meta data packet", __FUNCTION__);
  3170. return FALSE;
  3171. }
  3172. AMF_Dump(&obj);
  3173. AMFProp_GetString(AMF_GetProp(&obj, NULL, 0), &metastring);
  3174. if (AVMATCH(&metastring, &av_onMetaData))
  3175. {
  3176. AMFObjectProperty prop;
  3177. /* Show metadata */
  3178. RTMP_Log(RTMP_LOGINFO, "Metadata:");
  3179. DumpMetaData(&obj);
  3180. if (RTMP_FindFirstMatchingProperty(&obj, &av_duration, &prop))
  3181. {
  3182. r->m_fDuration = prop.p_vu.p_number;
  3183. /*RTMP_Log(RTMP_LOGDEBUG, "Set duration: %.2f", m_fDuration); */
  3184. }
  3185. /* Search for audio or video tags */
  3186. if (RTMP_FindPrefixProperty(&obj, &av_video, &prop))
  3187. r->m_read.dataType |= 1;
  3188. if (RTMP_FindPrefixProperty(&obj, &av_audio, &prop))
  3189. r->m_read.dataType |= 4;
  3190. ret = TRUE;
  3191. }
  3192. AMF_Reset(&obj);
  3193. return ret;
  3194. }
  3195. static void
  3196. HandleChangeChunkSize(RTMP *r, const RTMPPacket *packet)
  3197. {
  3198. if (packet->m_nBodySize >= 4)
  3199. {
  3200. r->m_inChunkSize = AMF_DecodeInt32(packet->m_body);
  3201. RTMP_Log(RTMP_LOGDEBUG, "%s, received: chunk size change to %d", __FUNCTION__,
  3202. r->m_inChunkSize);
  3203. }
  3204. }
  3205. static void
  3206. HandleAudio(RTMP *r, const RTMPPacket *packet)
  3207. {
  3208. (void)r;
  3209. (void)packet;
  3210. }
  3211. static void
  3212. HandleVideo(RTMP *r, const RTMPPacket *packet)
  3213. {
  3214. (void)r;
  3215. (void)packet;
  3216. }
  3217. static void
  3218. HandleCtrl(RTMP *r, const RTMPPacket *packet)
  3219. {
  3220. short nType = -1;
  3221. unsigned int tmp;
  3222. if (packet->m_body && packet->m_nBodySize >= 2)
  3223. nType = AMF_DecodeInt16(packet->m_body);
  3224. RTMP_Log(RTMP_LOGDEBUG, "%s, received ctrl. type: %d, len: %d", __FUNCTION__, nType,
  3225. packet->m_nBodySize);
  3226. /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
  3227. if (packet->m_nBodySize >= 6)
  3228. {
  3229. switch (nType)
  3230. {
  3231. case 0:
  3232. tmp = AMF_DecodeInt32(packet->m_body + 2);
  3233. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream Begin %d", __FUNCTION__, tmp);
  3234. break;
  3235. case 1:
  3236. tmp = AMF_DecodeInt32(packet->m_body + 2);
  3237. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream EOF %d", __FUNCTION__, tmp);
  3238. if (r->m_pausing == 1)
  3239. r->m_pausing = 2;
  3240. break;
  3241. case 2:
  3242. tmp = AMF_DecodeInt32(packet->m_body + 2);
  3243. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream Dry %d", __FUNCTION__, tmp);
  3244. break;
  3245. case 4:
  3246. tmp = AMF_DecodeInt32(packet->m_body + 2);
  3247. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream IsRecorded %d", __FUNCTION__, tmp);
  3248. break;
  3249. case 6: /* server ping. reply with pong. */
  3250. tmp = AMF_DecodeInt32(packet->m_body + 2);
  3251. RTMP_Log(RTMP_LOGDEBUG, "%s, Ping %d", __FUNCTION__, tmp);
  3252. RTMP_SendCtrl(r, 0x07, tmp, 0);
  3253. break;
  3254. /* FMS 3.5 servers send the following two controls to let the client
  3255. * know when the server has sent a complete buffer. I.e., when the
  3256. * server has sent an amount of data equal to m_nBufferMS in duration.
  3257. * The server meters its output so that data arrives at the client
  3258. * in realtime and no faster.
  3259. *
  3260. * The rtmpdump program tries to set m_nBufferMS as large as
  3261. * possible, to force the server to send data as fast as possible.
  3262. * In practice, the server appears to cap this at about 1 hour's
  3263. * worth of data. After the server has sent a complete buffer, and
  3264. * sends this BufferEmpty message, it will wait until the play
  3265. * duration of that buffer has passed before sending a new buffer.
  3266. * The BufferReady message will be sent when the new buffer starts.
  3267. * (There is no BufferReady message for the very first buffer;
  3268. * presumably the Stream Begin message is sufficient for that
  3269. * purpose.)
  3270. *
  3271. * If the network speed is much faster than the data bitrate, then
  3272. * there may be long delays between the end of one buffer and the
  3273. * start of the next.
  3274. *
  3275. * Since usually the network allows data to be sent at
  3276. * faster than realtime, and rtmpdump wants to download the data
  3277. * as fast as possible, we use this RTMP_LF_BUFX hack: when we
  3278. * get the BufferEmpty message, we send a Pause followed by an
  3279. * Unpause. This causes the server to send the next buffer immediately
  3280. * instead of waiting for the full duration to elapse. (That's
  3281. * also the purpose of the ToggleStream function, which rtmpdump
  3282. * calls if we get a read timeout.)
  3283. *
  3284. * Media player apps don't need this hack since they are just
  3285. * going to play the data in realtime anyway. It also doesn't work
  3286. * for live streams since they obviously can only be sent in
  3287. * realtime. And it's all moot if the network speed is actually
  3288. * slower than the media bitrate.
  3289. */
  3290. case 31:
  3291. tmp = AMF_DecodeInt32(packet->m_body + 2);
  3292. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream BufferEmpty %d", __FUNCTION__, tmp);
  3293. if (!(r->Link.lFlags & RTMP_LF_BUFX))
  3294. break;
  3295. if (!r->m_pausing)
  3296. {
  3297. r->m_pauseStamp = r->m_mediaChannel < r->m_channelsAllocatedIn ?
  3298. r->m_channelTimestamp[r->m_mediaChannel] : 0;
  3299. RTMP_SendPause(r, TRUE, r->m_pauseStamp);
  3300. r->m_pausing = 1;
  3301. }
  3302. else if (r->m_pausing == 2)
  3303. {
  3304. RTMP_SendPause(r, FALSE, r->m_pauseStamp);
  3305. r->m_pausing = 3;
  3306. }
  3307. break;
  3308. case 32:
  3309. tmp = AMF_DecodeInt32(packet->m_body + 2);
  3310. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream BufferReady %d", __FUNCTION__, tmp);
  3311. break;
  3312. default:
  3313. tmp = AMF_DecodeInt32(packet->m_body + 2);
  3314. RTMP_Log(RTMP_LOGDEBUG, "%s, Stream xx %d", __FUNCTION__, tmp);
  3315. break;
  3316. }
  3317. }
  3318. if (nType == 0x1A)
  3319. {
  3320. RTMP_Log(RTMP_LOGDEBUG, "%s, SWFVerification ping received: ", __FUNCTION__);
  3321. if (packet->m_nBodySize > 2 && packet->m_body[2] > 0x01)
  3322. {
  3323. RTMP_Log(RTMP_LOGERROR,
  3324. "%s: SWFVerification Type %d request not supported! Patches welcome...",
  3325. __FUNCTION__, packet->m_body[2]);
  3326. }
  3327. #ifdef CRYPTO
  3328. /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */
  3329. /* respond with HMAC SHA256 of decompressed SWF, key is the 30byte player key, also the last 30 bytes of the server handshake are applied */
  3330. else if (r->Link.SWFSize)
  3331. {
  3332. RTMP_SendCtrl(r, 0x1B, 0, 0);
  3333. }
  3334. else
  3335. {
  3336. RTMP_Log(RTMP_LOGERROR,
  3337. "%s: Ignoring SWFVerification request, use --swfVfy!",
  3338. __FUNCTION__);
  3339. }
  3340. #else
  3341. RTMP_Log(RTMP_LOGERROR,
  3342. "%s: Ignoring SWFVerification request, no CRYPTO support!",
  3343. __FUNCTION__);
  3344. #endif
  3345. }
  3346. }
  3347. static void
  3348. HandleServerBW(RTMP *r, const RTMPPacket *packet)
  3349. {
  3350. r->m_nServerBW = AMF_DecodeInt32(packet->m_body);
  3351. RTMP_Log(RTMP_LOGDEBUG, "%s: server BW = %d", __FUNCTION__, r->m_nServerBW);
  3352. }
  3353. static void
  3354. HandleClientBW(RTMP *r, const RTMPPacket *packet)
  3355. {
  3356. r->m_nClientBW = AMF_DecodeInt32(packet->m_body);
  3357. if (packet->m_nBodySize > 4)
  3358. r->m_nClientBW2 = packet->m_body[4];
  3359. else
  3360. r->m_nClientBW2 = -1;
  3361. RTMP_Log(RTMP_LOGDEBUG, "%s: client BW = %d %d", __FUNCTION__, r->m_nClientBW,
  3362. r->m_nClientBW2);
  3363. }
  3364. static int
  3365. DecodeInt32LE(const char *data)
  3366. {
  3367. unsigned char *c = (unsigned char *)data;
  3368. unsigned int val;
  3369. val = (c[3] << 24) | (c[2] << 16) | (c[1] << 8) | c[0];
  3370. return val;
  3371. }
  3372. static int
  3373. EncodeInt32LE(char *output, int nVal)
  3374. {
  3375. output[0] = nVal;
  3376. nVal >>= 8;
  3377. output[1] = nVal;
  3378. nVal >>= 8;
  3379. output[2] = nVal;
  3380. nVal >>= 8;
  3381. output[3] = nVal;
  3382. return 4;
  3383. }
  3384. int
  3385. RTMP_ReadPacket(RTMP *r, RTMPPacket *packet)
  3386. {
  3387. uint8_t hbuf[RTMP_MAX_HEADER_SIZE] = { 0 };
  3388. char *header = (char *)hbuf;
  3389. int nSize, hSize, nToRead, nChunk;
  3390. // int didAlloc = FALSE;
  3391. int extendedTimestamp = 0;
  3392. RTMP_Log(RTMP_LOGDEBUG2, "%s: fd=%d", __FUNCTION__, (int)r->m_sb.sb_socket);
  3393. if (ReadN(r, (char *)hbuf, 1) == 0)
  3394. {
  3395. RTMP_Log(RTMP_LOGDEBUG, "%s, failed to read RTMP packet header", __FUNCTION__);
  3396. return FALSE;
  3397. }
  3398. packet->m_headerType = (hbuf[0] & 0xc0) >> 6;
  3399. packet->m_nChannel = (hbuf[0] & 0x3f);
  3400. header++;
  3401. if (packet->m_nChannel == 0)
  3402. {
  3403. if (ReadN(r, (char *)&hbuf[1], 1) != 1)
  3404. {
  3405. RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet header 2nd byte",
  3406. __FUNCTION__);
  3407. return FALSE;
  3408. }
  3409. packet->m_nChannel = hbuf[1];
  3410. packet->m_nChannel += 64;
  3411. header++;
  3412. }
  3413. else if (packet->m_nChannel == 1)
  3414. {
  3415. int tmp;
  3416. if (ReadN(r, (char *)&hbuf[1], 2) != 2)
  3417. {
  3418. RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet header 3nd byte",
  3419. __FUNCTION__);
  3420. return FALSE;
  3421. }
  3422. tmp = (hbuf[2] << 8) + hbuf[1];
  3423. packet->m_nChannel = tmp + 64;
  3424. RTMP_Log(RTMP_LOGDEBUG, "%s, m_nChannel: %0x", __FUNCTION__, packet->m_nChannel);
  3425. header += 2;
  3426. }
  3427. nSize = packetSize[packet->m_headerType];
  3428. if (packet->m_nChannel >= r->m_channelsAllocatedIn)
  3429. {
  3430. int n = packet->m_nChannel + 10;
  3431. int *timestamp = realloc(r->m_channelTimestamp, sizeof(int) * n);
  3432. RTMPPacket **packets = realloc(r->m_vecChannelsIn, sizeof(RTMPPacket*) * n);
  3433. if (!timestamp)
  3434. free(r->m_channelTimestamp);
  3435. if (!packets)
  3436. free(r->m_vecChannelsIn);
  3437. r->m_channelTimestamp = timestamp;
  3438. r->m_vecChannelsIn = packets;
  3439. if (!timestamp || !packets)
  3440. {
  3441. r->m_channelsAllocatedIn = 0;
  3442. return FALSE;
  3443. }
  3444. memset(r->m_channelTimestamp + r->m_channelsAllocatedIn, 0, sizeof(int) * (n - r->m_channelsAllocatedIn));
  3445. memset(r->m_vecChannelsIn + r->m_channelsAllocatedIn, 0, sizeof(RTMPPacket*) * (n - r->m_channelsAllocatedIn));
  3446. r->m_channelsAllocatedIn = n;
  3447. }
  3448. if (nSize == RTMP_LARGE_HEADER_SIZE) /* if we get a full header the timestamp is absolute */
  3449. packet->m_hasAbsTimestamp = TRUE;
  3450. else if (nSize < RTMP_LARGE_HEADER_SIZE)
  3451. {
  3452. /* using values from the last message of this channel */
  3453. if (r->m_vecChannelsIn[packet->m_nChannel])
  3454. memcpy(packet, r->m_vecChannelsIn[packet->m_nChannel],
  3455. sizeof(RTMPPacket));
  3456. }
  3457. nSize--;
  3458. if (nSize > 0 && ReadN(r, header, nSize) != nSize)
  3459. {
  3460. RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet header. type: %x",
  3461. __FUNCTION__, (unsigned int)hbuf[0]);
  3462. return FALSE;
  3463. }
  3464. hSize = nSize + (header - (char *)hbuf);
  3465. if (nSize >= 3)
  3466. {
  3467. packet->m_nTimeStamp = AMF_DecodeInt24(header);
  3468. /*RTMP_Log(RTMP_LOGDEBUG, "%s, reading RTMP packet chunk on channel %x, headersz %i, timestamp %i, abs timestamp %i", __FUNCTION__, packet.m_nChannel, nSize, packet.m_nTimeStamp, packet.m_hasAbsTimestamp); */
  3469. if (nSize >= 6)
  3470. {
  3471. packet->m_nBodySize = AMF_DecodeInt24(header + 3);
  3472. packet->m_nBytesRead = 0;
  3473. if (nSize > 6)
  3474. {
  3475. packet->m_packetType = header[6];
  3476. if (nSize == 11)
  3477. packet->m_nInfoField2 = DecodeInt32LE(header + 7);
  3478. }
  3479. }
  3480. extendedTimestamp = (packet->m_nTimeStamp == 0xffffff);
  3481. if (extendedTimestamp)
  3482. {
  3483. if (ReadN(r, header + nSize, 4) != 4)
  3484. {
  3485. RTMP_Log(RTMP_LOGERROR, "%s, failed to read extended timestamp",
  3486. __FUNCTION__);
  3487. return FALSE;
  3488. }
  3489. packet->m_nTimeStamp = AMF_DecodeInt32(header + nSize);
  3490. hSize += 4;
  3491. }
  3492. }
  3493. RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)hbuf, hSize);
  3494. if (packet->m_nBodySize > 0 && packet->m_body == NULL)
  3495. {
  3496. if (!RTMPPacket_Alloc(packet, packet->m_nBodySize))
  3497. {
  3498. RTMP_Log(RTMP_LOGDEBUG, "%s, failed to allocate packet", __FUNCTION__);
  3499. return FALSE;
  3500. }
  3501. // didAlloc = TRUE;
  3502. packet->m_headerType = (hbuf[0] & 0xc0) >> 6;
  3503. }
  3504. nToRead = packet->m_nBodySize - packet->m_nBytesRead;
  3505. nChunk = r->m_inChunkSize;
  3506. if (nToRead < nChunk)
  3507. nChunk = nToRead;
  3508. /* Does the caller want the raw chunk? */
  3509. if (packet->m_chunk)
  3510. {
  3511. packet->m_chunk->c_headerSize = hSize;
  3512. memcpy(packet->m_chunk->c_header, hbuf, hSize);
  3513. packet->m_chunk->c_chunk = packet->m_body + packet->m_nBytesRead;
  3514. packet->m_chunk->c_chunkSize = nChunk;
  3515. }
  3516. if (ReadN(r, packet->m_body + packet->m_nBytesRead, nChunk) != nChunk)
  3517. {
  3518. RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet body. len: %u",
  3519. __FUNCTION__, packet->m_nBodySize);
  3520. return FALSE;
  3521. }
  3522. RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)packet->m_body + packet->m_nBytesRead, nChunk);
  3523. packet->m_nBytesRead += nChunk;
  3524. /* keep the packet as ref for other packets on this channel */
  3525. if (!r->m_vecChannelsIn[packet->m_nChannel])
  3526. r->m_vecChannelsIn[packet->m_nChannel] = malloc(sizeof(RTMPPacket));
  3527. memcpy(r->m_vecChannelsIn[packet->m_nChannel], packet, sizeof(RTMPPacket));
  3528. if (extendedTimestamp)
  3529. r->m_vecChannelsIn[packet->m_nChannel]->m_nTimeStamp = 0xffffff;
  3530. if (RTMPPacket_IsReady(packet))
  3531. {
  3532. /* make packet's timestamp absolute */
  3533. if (!packet->m_hasAbsTimestamp)
  3534. packet->m_nTimeStamp += r->m_channelTimestamp[packet->m_nChannel]; /* timestamps seem to be always relative!! */
  3535. r->m_channelTimestamp[packet->m_nChannel] = packet->m_nTimeStamp;
  3536. /* reset the data from the stored packet. we keep the header since we may use it later if a new packet for this channel */
  3537. /* arrives and requests to re-use some info (small packet header) */
  3538. r->m_vecChannelsIn[packet->m_nChannel]->m_body = NULL;
  3539. r->m_vecChannelsIn[packet->m_nChannel]->m_nBytesRead = 0;
  3540. r->m_vecChannelsIn[packet->m_nChannel]->m_hasAbsTimestamp = FALSE; /* can only be false if we reuse header */
  3541. }
  3542. else
  3543. {
  3544. packet->m_body = NULL; /* so it won't be erased on free */
  3545. }
  3546. return TRUE;
  3547. }
  3548. #ifndef CRYPTO
  3549. static int
  3550. HandShake(RTMP *r, int FP9HandShake)
  3551. {
  3552. int i;
  3553. uint32_t uptime, suptime;
  3554. int bMatch;
  3555. char type;
  3556. char clientbuf[RTMP_SIG_SIZE + 1], *clientsig = clientbuf + 1;
  3557. char serversig[RTMP_SIG_SIZE];
  3558. clientbuf[0] = 0x03; /* not encrypted */
  3559. uptime = htonl(RTMP_GetTime());
  3560. memcpy(clientsig, &uptime, 4);
  3561. memset(&clientsig[4], 0, 4);
  3562. #ifdef _DEBUG
  3563. for (i = 8; i < RTMP_SIG_SIZE; i++)
  3564. clientsig[i] = 0xff;
  3565. #else
  3566. for (i = 8; i < RTMP_SIG_SIZE; i++)
  3567. clientsig[i] = (char)(rand() % 256);
  3568. #endif
  3569. if (!WriteN(r, clientbuf, RTMP_SIG_SIZE + 1))
  3570. return FALSE;
  3571. if (ReadN(r, &type, 1) != 1) /* 0x03 or 0x06 */
  3572. return FALSE;
  3573. RTMP_Log(RTMP_LOGDEBUG, "%s: Type Answer : %02X", __FUNCTION__, type);
  3574. if (type != clientbuf[0])
  3575. RTMP_Log(RTMP_LOGWARNING, "%s: Type mismatch: client sent %d, server answered %d",
  3576. __FUNCTION__, clientbuf[0], type);
  3577. if (ReadN(r, serversig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
  3578. return FALSE;
  3579. /* decode server response */
  3580. memcpy(&suptime, serversig, 4);
  3581. suptime = ntohl(suptime);
  3582. RTMP_Log(RTMP_LOGDEBUG, "%s: Server Uptime : %d", __FUNCTION__, suptime);
  3583. RTMP_Log(RTMP_LOGDEBUG, "%s: FMS Version : %d.%d.%d.%d", __FUNCTION__,
  3584. serversig[4], serversig[5], serversig[6], serversig[7]);
  3585. /* 2nd part of handshake */
  3586. if (!WriteN(r, serversig, RTMP_SIG_SIZE))
  3587. return FALSE;
  3588. if (ReadN(r, serversig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
  3589. return FALSE;
  3590. bMatch = (memcmp(serversig, clientsig, RTMP_SIG_SIZE) == 0);
  3591. if (!bMatch)
  3592. {
  3593. RTMP_Log(RTMP_LOGWARNING, "%s, client signature does not match!", __FUNCTION__);
  3594. }
  3595. /* er, totally unused? */
  3596. (void)FP9HandShake;
  3597. return TRUE;
  3598. }
  3599. static int
  3600. SHandShake(RTMP *r)
  3601. {
  3602. int i;
  3603. char serverbuf[RTMP_SIG_SIZE + 1], *serversig = serverbuf + 1;
  3604. char clientsig[RTMP_SIG_SIZE];
  3605. uint32_t uptime;
  3606. int bMatch;
  3607. if (ReadN(r, serverbuf, 1) != 1) /* 0x03 or 0x06 */
  3608. return FALSE;
  3609. RTMP_Log(RTMP_LOGDEBUG, "%s: Type Request : %02X", __FUNCTION__, serverbuf[0]);
  3610. if (serverbuf[0] != 3)
  3611. {
  3612. RTMP_Log(RTMP_LOGERROR, "%s: Type unknown: client sent %02X",
  3613. __FUNCTION__, serverbuf[0]);
  3614. return FALSE;
  3615. }
  3616. uptime = htonl(RTMP_GetTime());
  3617. memcpy(serversig, &uptime, 4);
  3618. memset(&serversig[4], 0, 4);
  3619. #ifdef _DEBUG
  3620. for (i = 8; i < RTMP_SIG_SIZE; i++)
  3621. serversig[i] = 0xff;
  3622. #else
  3623. for (i = 8; i < RTMP_SIG_SIZE; i++)
  3624. serversig[i] = (char)(rand() % 256);
  3625. #endif
  3626. if (!WriteN(r, serverbuf, RTMP_SIG_SIZE + 1))
  3627. return FALSE;
  3628. if (ReadN(r, clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
  3629. return FALSE;
  3630. /* decode client response */
  3631. memcpy(&uptime, clientsig, 4);
  3632. uptime = ntohl(uptime);
  3633. RTMP_Log(RTMP_LOGDEBUG, "%s: Client Uptime : %d", __FUNCTION__, uptime);
  3634. RTMP_Log(RTMP_LOGDEBUG, "%s: Player Version: %d.%d.%d.%d", __FUNCTION__,
  3635. clientsig[4], clientsig[5], clientsig[6], clientsig[7]);
  3636. /* 2nd part of handshake */
  3637. if (!WriteN(r, clientsig, RTMP_SIG_SIZE))
  3638. return FALSE;
  3639. if (ReadN(r, clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
  3640. return FALSE;
  3641. bMatch = (memcmp(serversig, clientsig, RTMP_SIG_SIZE) == 0);
  3642. if (!bMatch)
  3643. {
  3644. RTMP_Log(RTMP_LOGWARNING, "%s, client signature does not match!", __FUNCTION__);
  3645. }
  3646. return TRUE;
  3647. }
  3648. #endif
  3649. int
  3650. RTMP_SendChunk(RTMP *r, RTMPChunk *chunk)
  3651. {
  3652. int wrote;
  3653. char hbuf[RTMP_MAX_HEADER_SIZE];
  3654. RTMP_Log(RTMP_LOGDEBUG2, "%s: fd=%d, size=%d", __FUNCTION__, (int)r->m_sb.sb_socket,
  3655. chunk->c_chunkSize);
  3656. RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)chunk->c_header, chunk->c_headerSize);
  3657. if (chunk->c_chunkSize)
  3658. {
  3659. char *ptr = chunk->c_chunk - chunk->c_headerSize;
  3660. RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)chunk->c_chunk, chunk->c_chunkSize);
  3661. /* save header bytes we're about to overwrite */
  3662. memcpy(hbuf, ptr, chunk->c_headerSize);
  3663. memcpy(ptr, chunk->c_header, chunk->c_headerSize);
  3664. wrote = WriteN(r, ptr, chunk->c_headerSize + chunk->c_chunkSize);
  3665. memcpy(ptr, hbuf, chunk->c_headerSize);
  3666. }
  3667. else
  3668. wrote = WriteN(r, chunk->c_header, chunk->c_headerSize);
  3669. return wrote;
  3670. }
  3671. int
  3672. RTMP_SendPacket(RTMP *r, RTMPPacket *packet, int queue)
  3673. {
  3674. const RTMPPacket *prevPacket;
  3675. uint32_t last = 0;
  3676. int nSize;
  3677. int hSize, cSize;
  3678. char *header, *hptr, *hend, hbuf[RTMP_MAX_HEADER_SIZE], c;
  3679. uint32_t t;
  3680. char *buffer, *tbuf = NULL, *toff = NULL;
  3681. int nChunkSize;
  3682. int tlen;
  3683. if (packet->m_nChannel >= r->m_channelsAllocatedOut)
  3684. {
  3685. int n = packet->m_nChannel + 10;
  3686. RTMPPacket **packets = realloc(r->m_vecChannelsOut, sizeof(RTMPPacket*) * n);
  3687. if (!packets)
  3688. {
  3689. free(r->m_vecChannelsOut);
  3690. r->m_vecChannelsOut = NULL;
  3691. r->m_channelsAllocatedOut = 0;
  3692. return FALSE;
  3693. }
  3694. r->m_vecChannelsOut = packets;
  3695. memset(r->m_vecChannelsOut + r->m_channelsAllocatedOut, 0, sizeof(RTMPPacket*) * (n - r->m_channelsAllocatedOut));
  3696. r->m_channelsAllocatedOut = n;
  3697. }
  3698. prevPacket = r->m_vecChannelsOut[packet->m_nChannel];
  3699. if (prevPacket && packet->m_headerType != RTMP_PACKET_SIZE_LARGE)
  3700. {
  3701. /* compress a bit by using the prev packet's attributes */
  3702. if (prevPacket->m_nBodySize == packet->m_nBodySize
  3703. && prevPacket->m_packetType == packet->m_packetType
  3704. && packet->m_headerType == RTMP_PACKET_SIZE_MEDIUM)
  3705. packet->m_headerType = RTMP_PACKET_SIZE_SMALL;
  3706. if (prevPacket->m_nTimeStamp == packet->m_nTimeStamp
  3707. && packet->m_headerType == RTMP_PACKET_SIZE_SMALL)
  3708. packet->m_headerType = RTMP_PACKET_SIZE_MINIMUM;
  3709. last = prevPacket->m_nTimeStamp;
  3710. }
  3711. if (packet->m_headerType > 3) /* sanity */
  3712. {
  3713. RTMP_Log(RTMP_LOGERROR, "sanity failed!! trying to send header of type: 0x%02x.",
  3714. (unsigned char)packet->m_headerType);
  3715. return FALSE;
  3716. }
  3717. nSize = packetSize[packet->m_headerType];
  3718. hSize = nSize;
  3719. cSize = 0;
  3720. t = packet->m_nTimeStamp - last;
  3721. if (packet->m_body)
  3722. {
  3723. header = packet->m_body - nSize;
  3724. hend = packet->m_body;
  3725. }
  3726. else
  3727. {
  3728. header = hbuf + 6;
  3729. hend = hbuf + sizeof(hbuf);
  3730. }
  3731. if (packet->m_nChannel > 319)
  3732. cSize = 2;
  3733. else if (packet->m_nChannel > 63)
  3734. cSize = 1;
  3735. if (cSize)
  3736. {
  3737. header -= cSize;
  3738. hSize += cSize;
  3739. }
  3740. if (nSize > 1 && t >= 0xffffff)
  3741. {
  3742. header -= 4;
  3743. hSize += 4;
  3744. }
  3745. hptr = header;
  3746. c = packet->m_headerType << 6;
  3747. switch (cSize)
  3748. {
  3749. case 0:
  3750. c |= packet->m_nChannel;
  3751. break;
  3752. case 1:
  3753. break;
  3754. case 2:
  3755. c |= 1;
  3756. break;
  3757. }
  3758. *hptr++ = c;
  3759. if (cSize)
  3760. {
  3761. int tmp = packet->m_nChannel - 64;
  3762. *hptr++ = tmp & 0xff;
  3763. if (cSize == 2)
  3764. *hptr++ = tmp >> 8;
  3765. }
  3766. if (nSize > 1)
  3767. {
  3768. hptr = AMF_EncodeInt24(hptr, hend, t > 0xffffff ? 0xffffff : t);
  3769. }
  3770. if (nSize > 4)
  3771. {
  3772. hptr = AMF_EncodeInt24(hptr, hend, packet->m_nBodySize);
  3773. *hptr++ = packet->m_packetType;
  3774. }
  3775. if (nSize > 8)
  3776. hptr += EncodeInt32LE(hptr, packet->m_nInfoField2);
  3777. if (nSize > 1 && t >= 0xffffff)
  3778. hptr = AMF_EncodeInt32(hptr, hend, t);
  3779. nSize = packet->m_nBodySize;
  3780. buffer = packet->m_body;
  3781. nChunkSize = r->m_outChunkSize;
  3782. RTMP_Log(RTMP_LOGDEBUG2, "%s: fd=%d, size=%d", __FUNCTION__, (int)r->m_sb.sb_socket,
  3783. nSize);
  3784. /* send all chunks in one HTTP request */
  3785. if (r->Link.protocol & RTMP_FEATURE_HTTP)
  3786. {
  3787. int chunks = (nSize+nChunkSize-1) / nChunkSize;
  3788. if (chunks > 1)
  3789. {
  3790. tlen = chunks * (cSize + 1) + nSize + hSize;
  3791. tbuf = malloc(tlen);
  3792. if (!tbuf)
  3793. return FALSE;
  3794. toff = tbuf;
  3795. }
  3796. }
  3797. while (nSize + hSize)
  3798. {
  3799. int wrote;
  3800. if (nSize < nChunkSize)
  3801. nChunkSize = nSize;
  3802. RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)header, hSize);
  3803. RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)buffer, nChunkSize);
  3804. if (tbuf)
  3805. {
  3806. memcpy(toff, header, nChunkSize + hSize);
  3807. toff += nChunkSize + hSize;
  3808. }
  3809. else
  3810. {
  3811. wrote = WriteN(r, header, nChunkSize + hSize);
  3812. if (!wrote)
  3813. return FALSE;
  3814. }
  3815. nSize -= nChunkSize;
  3816. buffer += nChunkSize;
  3817. hSize = 0;
  3818. if (nSize > 0)
  3819. {
  3820. header = buffer - 1;
  3821. hSize = 1;
  3822. if (cSize)
  3823. {
  3824. header -= cSize;
  3825. hSize += cSize;
  3826. }
  3827. *header = (0xc0 | c);
  3828. if (cSize)
  3829. {
  3830. int tmp = packet->m_nChannel - 64;
  3831. header[1] = tmp & 0xff;
  3832. if (cSize == 2)
  3833. header[2] = tmp >> 8;
  3834. }
  3835. }
  3836. }
  3837. if (tbuf)
  3838. {
  3839. int wrote = WriteN(r, tbuf, toff-tbuf);
  3840. free(tbuf);
  3841. tbuf = NULL;
  3842. if (!wrote)
  3843. return FALSE;
  3844. }
  3845. /* we invoked a remote method */
  3846. if (packet->m_packetType == RTMP_PACKET_TYPE_INVOKE)
  3847. {
  3848. AVal method;
  3849. char *ptr;
  3850. ptr = packet->m_body + 1;
  3851. AMF_DecodeString(ptr, &method);
  3852. RTMP_Log(RTMP_LOGDEBUG, "Invoking %s", method.av_val);
  3853. /* keep it in call queue till result arrives */
  3854. if (queue)
  3855. {
  3856. int txn;
  3857. ptr += 3 + method.av_len;
  3858. txn = (int)AMF_DecodeNumber(ptr);
  3859. AV_queue(&r->m_methodCalls, &r->m_numCalls, &method, txn);
  3860. }
  3861. }
  3862. if (!r->m_vecChannelsOut[packet->m_nChannel])
  3863. r->m_vecChannelsOut[packet->m_nChannel] = malloc(sizeof(RTMPPacket));
  3864. memcpy(r->m_vecChannelsOut[packet->m_nChannel], packet, sizeof(RTMPPacket));
  3865. return TRUE;
  3866. }
  3867. int
  3868. RTMP_Serve(RTMP *r)
  3869. {
  3870. return SHandShake(r);
  3871. }
  3872. void
  3873. RTMP_Close(RTMP *r)
  3874. {
  3875. int i;
  3876. if (RTMP_IsConnected(r))
  3877. {
  3878. for (int idx = 0; idx < r->Link.nStreams; idx++)
  3879. {
  3880. if (r->Link.streams[idx].id > 0)
  3881. {
  3882. i = r->Link.streams[idx].id;
  3883. r->Link.streams[idx].id = 0;
  3884. if ((r->Link.protocol & RTMP_FEATURE_WRITE))
  3885. SendFCUnpublish(r, idx);
  3886. SendDeleteStream(r, (double)i);
  3887. }
  3888. }
  3889. if (r->m_clientID.av_val)
  3890. {
  3891. HTTP_Post(r, RTMPT_CLOSE, "", 1);
  3892. free(r->m_clientID.av_val);
  3893. r->m_clientID.av_val = NULL;
  3894. r->m_clientID.av_len = 0;
  3895. }
  3896. RTMPSockBuf_Close(&r->m_sb);
  3897. }
  3898. for (int idx = 0; idx < r->Link.nStreams; idx++)
  3899. r->Link.streams[idx].id = -1;
  3900. r->m_stream_id = -1;
  3901. r->m_sb.sb_socket = -1;
  3902. r->m_nBWCheckCounter = 0;
  3903. r->m_nBytesIn = 0;
  3904. r->m_nBytesInSent = 0;
  3905. if (r->m_read.flags & RTMP_READ_HEADER)
  3906. {
  3907. free(r->m_read.buf);
  3908. r->m_read.buf = NULL;
  3909. }
  3910. r->m_read.dataType = 0;
  3911. r->m_read.flags = 0;
  3912. r->m_read.status = 0;
  3913. r->m_read.nResumeTS = 0;
  3914. r->m_read.nIgnoredFrameCounter = 0;
  3915. r->m_read.nIgnoredFlvFrameCounter = 0;
  3916. r->m_write.m_nBytesRead = 0;
  3917. RTMPPacket_Free(&r->m_write);
  3918. for (i = 0; i < r->m_channelsAllocatedIn; i++)
  3919. {
  3920. if (r->m_vecChannelsIn[i])
  3921. {
  3922. RTMPPacket_Free(r->m_vecChannelsIn[i]);
  3923. free(r->m_vecChannelsIn[i]);
  3924. r->m_vecChannelsIn[i] = NULL;
  3925. }
  3926. }
  3927. free(r->m_vecChannelsIn);
  3928. r->m_vecChannelsIn = NULL;
  3929. free(r->m_channelTimestamp);
  3930. r->m_channelTimestamp = NULL;
  3931. r->m_channelsAllocatedIn = 0;
  3932. for (i = 0; i < r->m_channelsAllocatedOut; i++)
  3933. {
  3934. if (r->m_vecChannelsOut[i])
  3935. {
  3936. free(r->m_vecChannelsOut[i]);
  3937. r->m_vecChannelsOut[i] = NULL;
  3938. }
  3939. }
  3940. free(r->m_vecChannelsOut);
  3941. r->m_vecChannelsOut = NULL;
  3942. r->m_channelsAllocatedOut = 0;
  3943. AV_clear(r->m_methodCalls, r->m_numCalls);
  3944. r->m_methodCalls = NULL;
  3945. r->m_numCalls = 0;
  3946. r->m_numInvokes = 0;
  3947. r->m_bPlaying = FALSE;
  3948. r->Link.playingStreams = 0;
  3949. r->m_sb.sb_size = 0;
  3950. r->m_msgCounter = 0;
  3951. r->m_resplen = 0;
  3952. r->m_unackd = 0;
  3953. if (r->Link.lFlags & RTMP_LF_FTCU)
  3954. {
  3955. free(r->Link.tcUrl.av_val);
  3956. r->Link.tcUrl.av_val = NULL;
  3957. r->Link.lFlags ^= RTMP_LF_FTCU;
  3958. }
  3959. memset (&r->m_bindIP, 0, sizeof(r->m_bindIP));
  3960. r->m_bCustomSend = 0;
  3961. r->m_customSendFunc = NULL;
  3962. r->m_customSendParam = NULL;
  3963. #if defined(CRYPTO) || defined(USE_ONLY_MD5)
  3964. if (!(r->Link.protocol & RTMP_FEATURE_WRITE) || (r->Link.pFlags & RTMP_PUB_CLEAN))
  3965. {
  3966. for (int idx = 0; idx < r->Link.nStreams; idx++)
  3967. {
  3968. free(r->Link.streams[idx].playpath.av_val);
  3969. r->Link.streams[idx].playpath.av_val = NULL;
  3970. }
  3971. r->Link.curStreamIdx = 0;
  3972. r->Link.nStreams = 0;
  3973. }
  3974. if ((r->Link.protocol & RTMP_FEATURE_WRITE) &&
  3975. (r->Link.pFlags & RTMP_PUB_CLEAN) &&
  3976. (r->Link.pFlags & RTMP_PUB_ALLOC))
  3977. {
  3978. free(r->Link.app.av_val);
  3979. r->Link.app.av_val = NULL;
  3980. free(r->Link.tcUrl.av_val);
  3981. r->Link.tcUrl.av_val = NULL;
  3982. }
  3983. #elif defined(CRYPTO)
  3984. if (r->Link.dh)
  3985. {
  3986. MDH_free(r->Link.dh);
  3987. r->Link.dh = NULL;
  3988. }
  3989. if (r->Link.rc4keyIn)
  3990. {
  3991. RC4_free(r->Link.rc4keyIn);
  3992. r->Link.rc4keyIn = NULL;
  3993. }
  3994. if (r->Link.rc4keyOut)
  3995. {
  3996. RC4_free(r->Link.rc4keyOut);
  3997. r->Link.rc4keyOut = NULL;
  3998. }
  3999. #else
  4000. for (int idx = 0; idx < r->Link.nStreams; idx++)
  4001. {
  4002. free(r->Link.streams[idx].playpath.av_val);
  4003. r->Link.streams[idx].playpath.av_val = NULL;
  4004. }
  4005. r->Link.curStreamIdx = 0;
  4006. r->Link.nStreams = 0;
  4007. #endif
  4008. }
  4009. int
  4010. RTMPSockBuf_Fill(RTMPSockBuf *sb)
  4011. {
  4012. int nBytes;
  4013. if (!sb->sb_size)
  4014. sb->sb_start = sb->sb_buf;
  4015. while (1)
  4016. {
  4017. nBytes = (int)sizeof(sb->sb_buf) - 1 - sb->sb_size - (sb->sb_start - sb->sb_buf);
  4018. #if defined(CRYPTO) && !defined(NO_SSL)
  4019. if (sb->sb_ssl)
  4020. {
  4021. nBytes = TLS_read(sb->sb_ssl, sb->sb_start + sb->sb_size, nBytes);
  4022. }
  4023. else
  4024. #endif
  4025. {
  4026. nBytes = recv(sb->sb_socket, sb->sb_start + sb->sb_size, nBytes, MSG_NOSIGNAL);
  4027. }
  4028. if (nBytes > 0)
  4029. {
  4030. sb->sb_size += nBytes;
  4031. }
  4032. else if (nBytes == 0)
  4033. {
  4034. RTMP_Log(RTMP_LOGERROR, "%s, remote host closed connection",
  4035. __FUNCTION__);
  4036. }
  4037. else
  4038. {
  4039. int level;
  4040. int sockerr = GetSockError();
  4041. if (sockerr == EWOULDBLOCK || sockerr == EAGAIN)
  4042. level = RTMP_LOGDEBUG;
  4043. else
  4044. level = RTMP_LOGERROR;
  4045. RTMP_Log(level, "%s, recv returned %d. GetSockError(): %d (%s)",
  4046. __FUNCTION__, nBytes, sockerr, socketerror(sockerr));
  4047. if (sockerr == EINTR && !RTMP_ctrlC)
  4048. continue;
  4049. if (sockerr == EWOULDBLOCK || sockerr == EAGAIN)
  4050. {
  4051. sb->sb_timedout = TRUE;
  4052. nBytes = 0;
  4053. }
  4054. }
  4055. break;
  4056. }
  4057. return nBytes;
  4058. }
  4059. int
  4060. RTMPSockBuf_Send(RTMPSockBuf *sb, const char *buf, int len)
  4061. {
  4062. int rc;
  4063. #if defined(RTMP_NETSTACK_DUMP)
  4064. fwrite(buf, 1, len, netstackdump);
  4065. #endif
  4066. #if defined(CRYPTO) && !defined(NO_SSL)
  4067. if (sb->sb_ssl)
  4068. {
  4069. rc = TLS_write(sb->sb_ssl, buf, len);
  4070. }
  4071. else
  4072. #endif
  4073. {
  4074. rc = send(sb->sb_socket, buf, len, MSG_NOSIGNAL);
  4075. }
  4076. return rc;
  4077. }
  4078. int
  4079. RTMPSockBuf_Close(RTMPSockBuf *sb)
  4080. {
  4081. #if defined(CRYPTO) && !defined(NO_SSL)
  4082. if (sb->sb_ssl)
  4083. {
  4084. TLS_shutdown(sb->sb_ssl);
  4085. TLS_close(sb->sb_ssl);
  4086. sb->sb_ssl = NULL;
  4087. }
  4088. #endif
  4089. if (sb->sb_socket != INVALID_SOCKET)
  4090. return closesocket(sb->sb_socket);
  4091. return 0;
  4092. }
  4093. #define HEX2BIN(a) (((a)&0x40)?((a)&0xf)+9:((a)&0xf))
  4094. static void
  4095. DecodeTEA(AVal *key, AVal *text)
  4096. {
  4097. uint32_t *v, k[4] = { 0 }, u;
  4098. uint32_t z, y, sum = 0, e, DELTA = 0x9e3779b9;
  4099. int32_t p, q;
  4100. int i, n;
  4101. unsigned char *ptr, *out;
  4102. /* prep key: pack 1st 16 chars into 4 LittleEndian ints */
  4103. ptr = (unsigned char *)key->av_val;
  4104. u = 0;
  4105. n = 0;
  4106. v = k;
  4107. p = key->av_len > 16 ? 16 : key->av_len;
  4108. for (i = 0; i < p; i++)
  4109. {
  4110. u |= ptr[i] << (n * 8);
  4111. if (n == 3)
  4112. {
  4113. *v++ = u;
  4114. u = 0;
  4115. n = 0;
  4116. }
  4117. else
  4118. {
  4119. n++;
  4120. }
  4121. }
  4122. /* any trailing chars */
  4123. if (u)
  4124. *v = u;
  4125. /* prep text: hex2bin, multiples of 4 */
  4126. n = (text->av_len + 7) / 8;
  4127. out = malloc(n * 8);
  4128. ptr = (unsigned char *)text->av_val;
  4129. v = (uint32_t *) out;
  4130. for (i = 0; i < n; i++)
  4131. {
  4132. u = (HEX2BIN(ptr[0]) << 4) + HEX2BIN(ptr[1]);
  4133. u |= ((HEX2BIN(ptr[2]) << 4) + HEX2BIN(ptr[3])) << 8;
  4134. u |= ((HEX2BIN(ptr[4]) << 4) + HEX2BIN(ptr[5])) << 16;
  4135. u |= ((HEX2BIN(ptr[6]) << 4) + HEX2BIN(ptr[7])) << 24;
  4136. *v++ = u;
  4137. ptr += 8;
  4138. }
  4139. v = (uint32_t *) out;
  4140. /* http://www.movable-type.co.uk/scripts/tea-block.html */
  4141. #define MX (((z>>5)^(y<<2)) + ((y>>3)^(z<<4))) ^ ((sum^y) + (k[(p&3)^e]^z));
  4142. z = v[n - 1];
  4143. y = v[0];
  4144. q = 6 + 52 / n;
  4145. sum = q * DELTA;
  4146. while (sum != 0)
  4147. {
  4148. e = sum >> 2 & 3;
  4149. for (p = n - 1; p > 0; p--)
  4150. z = v[p - 1], y = v[p] -= MX;
  4151. z = v[n - 1];
  4152. y = v[0] -= MX;
  4153. sum -= DELTA;
  4154. }
  4155. text->av_len /= 2;
  4156. memcpy(text->av_val, out, text->av_len);
  4157. free(out);
  4158. }
  4159. static int
  4160. HTTP_Post(RTMP *r, RTMPTCmd cmd, const char *buf, int len)
  4161. {
  4162. char hbuf[512];
  4163. int hlen = snprintf(hbuf, sizeof(hbuf), "POST /%s%s/%d HTTP/1.1\r\n"
  4164. "Host: %.*s:%d\r\n"
  4165. "Accept: */*\r\n"
  4166. "User-Agent: Shockwave Flash\r\n"
  4167. "Connection: Keep-Alive\r\n"
  4168. "Cache-Control: no-cache\r\n"
  4169. "Content-type: application/x-fcs\r\n"
  4170. "Content-length: %d\r\n\r\n", RTMPT_cmds[cmd],
  4171. r->m_clientID.av_val ? r->m_clientID.av_val : "",
  4172. r->m_msgCounter, r->Link.hostname.av_len, r->Link.hostname.av_val,
  4173. r->Link.port, len);
  4174. RTMPSockBuf_Send(&r->m_sb, hbuf, hlen);
  4175. hlen = RTMPSockBuf_Send(&r->m_sb, buf, len);
  4176. r->m_msgCounter++;
  4177. r->m_unackd++;
  4178. return hlen;
  4179. }
  4180. static int
  4181. HTTP_read(RTMP *r, int fill)
  4182. {
  4183. char *ptr;
  4184. int hlen;
  4185. restart:
  4186. if (fill)
  4187. RTMPSockBuf_Fill(&r->m_sb);
  4188. if (r->m_sb.sb_size < 13)
  4189. {
  4190. if (fill)
  4191. goto restart;
  4192. return -2;
  4193. }
  4194. if (strncmp(r->m_sb.sb_start, "HTTP/1.1 200 ", 13))
  4195. return -1;
  4196. r->m_sb.sb_start[r->m_sb.sb_size] = '\0';
  4197. if (!strstr(r->m_sb.sb_start, "\r\n\r\n"))
  4198. {
  4199. if (fill)
  4200. goto restart;
  4201. return -2;
  4202. }
  4203. ptr = r->m_sb.sb_start + sizeof("HTTP/1.1 200");
  4204. while ((ptr = strstr(ptr, "Content-")))
  4205. {
  4206. if (!strncasecmp(ptr+8, "length:", 7)) break;
  4207. ptr += 8;
  4208. }
  4209. if (!ptr)
  4210. return -1;
  4211. hlen = atoi(ptr+16);
  4212. ptr = strstr(ptr+16, "\r\n\r\n");
  4213. if (!ptr)
  4214. return -1;
  4215. ptr += 4;
  4216. if (ptr + (r->m_clientID.av_val ? 1 : hlen) > r->m_sb.sb_start + r->m_sb.sb_size)
  4217. {
  4218. if (fill)
  4219. goto restart;
  4220. return -2;
  4221. }
  4222. r->m_sb.sb_size -= ptr - r->m_sb.sb_start;
  4223. r->m_sb.sb_start = ptr;
  4224. r->m_unackd--;
  4225. if (!r->m_clientID.av_val)
  4226. {
  4227. r->m_clientID.av_len = hlen;
  4228. r->m_clientID.av_val = malloc(hlen+1);
  4229. if (!r->m_clientID.av_val)
  4230. return -1;
  4231. r->m_clientID.av_val[0] = '/';
  4232. memcpy(r->m_clientID.av_val+1, ptr, hlen-1);
  4233. r->m_clientID.av_val[hlen] = 0;
  4234. r->m_sb.sb_size = 0;
  4235. }
  4236. else
  4237. {
  4238. r->m_polling = *ptr++;
  4239. r->m_resplen = hlen - 1;
  4240. r->m_sb.sb_start++;
  4241. r->m_sb.sb_size--;
  4242. }
  4243. return 0;
  4244. }
  4245. #define MAX_IGNORED_FRAMES 50
  4246. /* Read from the stream until we get a media packet.
  4247. * Returns -3 if Play.Close/Stop, -2 if fatal error, -1 if no more media
  4248. * packets, 0 if ignorable error, >0 if there is a media packet
  4249. */
  4250. static int
  4251. Read_1_Packet(RTMP *r, char *buf, unsigned int buflen)
  4252. {
  4253. uint32_t prevTagSize = 0;
  4254. int rtnGetNextMediaPacket = 0, ret = RTMP_READ_EOF;
  4255. RTMPPacket packet = { 0 };
  4256. int recopy = FALSE;
  4257. unsigned int size;
  4258. char *ptr, *pend;
  4259. uint32_t nTimeStamp = 0;
  4260. unsigned int len;
  4261. rtnGetNextMediaPacket = RTMP_GetNextMediaPacket(r, &packet);
  4262. while (rtnGetNextMediaPacket)
  4263. {
  4264. char *packetBody = packet.m_body;
  4265. unsigned int nPacketLen = packet.m_nBodySize;
  4266. /* Return RTMP_READ_COMPLETE if this was completed nicely with
  4267. * invoke message Play.Stop or Play.Complete
  4268. */
  4269. if (rtnGetNextMediaPacket == 2)
  4270. {
  4271. RTMP_Log(RTMP_LOGDEBUG,
  4272. "Got Play.Complete or Play.Stop from server. "
  4273. "Assuming stream is complete");
  4274. ret = RTMP_READ_COMPLETE;
  4275. break;
  4276. }
  4277. r->m_read.dataType |= (((packet.m_packetType == RTMP_PACKET_TYPE_AUDIO) << 2) |
  4278. (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO));
  4279. if (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO && nPacketLen <= 5)
  4280. {
  4281. RTMP_Log(RTMP_LOGDEBUG, "ignoring too small video packet: size: %d",
  4282. nPacketLen);
  4283. ret = RTMP_READ_IGNORE;
  4284. break;
  4285. }
  4286. if (packet.m_packetType == RTMP_PACKET_TYPE_AUDIO && nPacketLen <= 1)
  4287. {
  4288. RTMP_Log(RTMP_LOGDEBUG, "ignoring too small audio packet: size: %d",
  4289. nPacketLen);
  4290. ret = RTMP_READ_IGNORE;
  4291. break;
  4292. }
  4293. if (r->m_read.flags & RTMP_READ_SEEKING)
  4294. {
  4295. ret = RTMP_READ_IGNORE;
  4296. break;
  4297. }
  4298. #ifdef _DEBUG
  4299. RTMP_Log(RTMP_LOGDEBUG, "type: %02X, size: %d, TS: %d ms, abs TS: %d",
  4300. packet.m_packetType, nPacketLen, packet.m_nTimeStamp,
  4301. packet.m_hasAbsTimestamp);
  4302. if (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO)
  4303. RTMP_Log(RTMP_LOGDEBUG, "frametype: %02X", (*packetBody & 0xf0));
  4304. #endif
  4305. if (r->m_read.flags & RTMP_READ_RESUME)
  4306. {
  4307. /* check the header if we get one */
  4308. if (packet.m_nTimeStamp == 0)
  4309. {
  4310. if (r->m_read.nMetaHeaderSize > 0
  4311. && packet.m_packetType == RTMP_PACKET_TYPE_INFO)
  4312. {
  4313. AMFObject metaObj;
  4314. int nRes =
  4315. AMF_Decode(&metaObj, packetBody, nPacketLen, FALSE);
  4316. if (nRes >= 0)
  4317. {
  4318. AVal metastring;
  4319. AMFProp_GetString(AMF_GetProp(&metaObj, NULL, 0),
  4320. &metastring);
  4321. if (AVMATCH(&metastring, &av_onMetaData))
  4322. {
  4323. /* compare */
  4324. if ((r->m_read.nMetaHeaderSize != nPacketLen) ||
  4325. (memcmp
  4326. (r->m_read.metaHeader, packetBody,
  4327. r->m_read.nMetaHeaderSize) != 0))
  4328. {
  4329. ret = RTMP_READ_ERROR;
  4330. }
  4331. }
  4332. AMF_Reset(&metaObj);
  4333. if (ret == RTMP_READ_ERROR)
  4334. break;
  4335. }
  4336. }
  4337. /* check first keyframe to make sure we got the right position
  4338. * in the stream! (the first non ignored frame)
  4339. */
  4340. if (r->m_read.nInitialFrameSize > 0)
  4341. {
  4342. /* video or audio data */
  4343. if (packet.m_packetType == r->m_read.initialFrameType
  4344. && r->m_read.nInitialFrameSize == nPacketLen)
  4345. {
  4346. /* we don't compare the sizes since the packet can
  4347. * contain several FLV packets, just make sure the
  4348. * first frame is our keyframe (which we are going
  4349. * to rewrite)
  4350. */
  4351. if (memcmp
  4352. (r->m_read.initialFrame, packetBody,
  4353. r->m_read.nInitialFrameSize) == 0)
  4354. {
  4355. RTMP_Log(RTMP_LOGDEBUG, "Checked keyframe successfully!");
  4356. r->m_read.flags |= RTMP_READ_GOTKF;
  4357. /* ignore it! (what about audio data after it? it is
  4358. * handled by ignoring all 0ms frames, see below)
  4359. */
  4360. ret = RTMP_READ_IGNORE;
  4361. break;
  4362. }
  4363. }
  4364. /* hande FLV streams, even though the server resends the
  4365. * keyframe as an extra video packet it is also included
  4366. * in the first FLV stream chunk and we have to compare
  4367. * it and filter it out !!
  4368. */
  4369. if (packet.m_packetType == RTMP_PACKET_TYPE_FLASH_VIDEO)
  4370. {
  4371. /* basically we have to find the keyframe with the
  4372. * correct TS being nResumeTS
  4373. */
  4374. unsigned int pos = 0;
  4375. uint32_t ts = 0;
  4376. while (pos + 11 < nPacketLen)
  4377. {
  4378. /* size without header (11) and prevTagSize (4) */
  4379. uint32_t dataSize =
  4380. AMF_DecodeInt24(packetBody + pos + 1);
  4381. ts = AMF_DecodeInt24(packetBody + pos + 4);
  4382. ts |= (packetBody[pos + 7] << 24);
  4383. #ifdef _DEBUG
  4384. RTMP_Log(RTMP_LOGDEBUG,
  4385. "keyframe search: FLV Packet: type %02X, dataSize: %d, timeStamp: %d ms",
  4386. packetBody[pos], dataSize, ts);
  4387. #endif
  4388. /* ok, is it a keyframe?:
  4389. * well doesn't work for audio!
  4390. */
  4391. if (packetBody[pos /*6928, test 0 */ ] ==
  4392. r->m_read.initialFrameType
  4393. /* && (packetBody[11]&0xf0) == 0x10 */ )
  4394. {
  4395. if (ts == r->m_read.nResumeTS)
  4396. {
  4397. RTMP_Log(RTMP_LOGDEBUG,
  4398. "Found keyframe with resume-keyframe timestamp!");
  4399. if (r->m_read.nInitialFrameSize != dataSize
  4400. || memcmp(r->m_read.initialFrame,
  4401. packetBody + pos + 11,
  4402. r->m_read.
  4403. nInitialFrameSize) != 0)
  4404. {
  4405. RTMP_Log(RTMP_LOGERROR,
  4406. "FLV Stream: Keyframe doesn't match!");
  4407. ret = RTMP_READ_ERROR;
  4408. break;
  4409. }
  4410. r->m_read.flags |= RTMP_READ_GOTFLVK;
  4411. /* skip this packet?
  4412. * check whether skippable:
  4413. */
  4414. if (pos + 11 + dataSize + 4 > nPacketLen)
  4415. {
  4416. RTMP_Log(RTMP_LOGWARNING,
  4417. "Non skipable packet since it doesn't end with chunk, stream corrupt!");
  4418. ret = RTMP_READ_ERROR;
  4419. break;
  4420. }
  4421. packetBody += (pos + 11 + dataSize + 4);
  4422. nPacketLen -= (pos + 11 + dataSize + 4);
  4423. goto stopKeyframeSearch;
  4424. }
  4425. else if (r->m_read.nResumeTS < ts)
  4426. {
  4427. /* the timestamp ts will only increase with
  4428. * further packets, wait for seek
  4429. */
  4430. goto stopKeyframeSearch;
  4431. }
  4432. }
  4433. pos += (11 + dataSize + 4);
  4434. }
  4435. if (ts < r->m_read.nResumeTS)
  4436. {
  4437. RTMP_Log(RTMP_LOGERROR,
  4438. "First packet does not contain keyframe, all "
  4439. "timestamps are smaller than the keyframe "
  4440. "timestamp; probably the resume seek failed?");
  4441. }
  4442. stopKeyframeSearch:
  4443. ;
  4444. if (!(r->m_read.flags & RTMP_READ_GOTFLVK))
  4445. {
  4446. RTMP_Log(RTMP_LOGERROR,
  4447. "Couldn't find the seeked keyframe in this chunk!");
  4448. ret = RTMP_READ_IGNORE;
  4449. break;
  4450. }
  4451. }
  4452. }
  4453. }
  4454. if (packet.m_nTimeStamp > 0
  4455. && (r->m_read.flags & (RTMP_READ_GOTKF|RTMP_READ_GOTFLVK)))
  4456. {
  4457. /* another problem is that the server can actually change from
  4458. * 09/08 video/audio packets to an FLV stream or vice versa and
  4459. * our keyframe check will prevent us from going along with the
  4460. * new stream if we resumed.
  4461. *
  4462. * in this case set the 'found keyframe' variables to true.
  4463. * We assume that if we found one keyframe somewhere and were
  4464. * already beyond TS > 0 we have written data to the output
  4465. * which means we can accept all forthcoming data including the
  4466. * change between 08/09 <-> FLV packets
  4467. */
  4468. r->m_read.flags |= (RTMP_READ_GOTKF|RTMP_READ_GOTFLVK);
  4469. }
  4470. /* skip till we find our keyframe
  4471. * (seeking might put us somewhere before it)
  4472. */
  4473. if (!(r->m_read.flags & RTMP_READ_GOTKF) &&
  4474. packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO)
  4475. {
  4476. RTMP_Log(RTMP_LOGWARNING,
  4477. "Stream does not start with requested frame, ignoring data... ");
  4478. r->m_read.nIgnoredFrameCounter++;
  4479. if (r->m_read.nIgnoredFrameCounter > MAX_IGNORED_FRAMES)
  4480. ret = RTMP_READ_ERROR; /* fatal error, couldn't continue stream */
  4481. else
  4482. ret = RTMP_READ_IGNORE;
  4483. break;
  4484. }
  4485. /* ok, do the same for FLV streams */
  4486. if (!(r->m_read.flags & RTMP_READ_GOTFLVK) &&
  4487. packet.m_packetType == RTMP_PACKET_TYPE_FLASH_VIDEO)
  4488. {
  4489. RTMP_Log(RTMP_LOGWARNING,
  4490. "Stream does not start with requested FLV frame, ignoring data... ");
  4491. r->m_read.nIgnoredFlvFrameCounter++;
  4492. if (r->m_read.nIgnoredFlvFrameCounter > MAX_IGNORED_FRAMES)
  4493. ret = RTMP_READ_ERROR;
  4494. else
  4495. ret = RTMP_READ_IGNORE;
  4496. break;
  4497. }
  4498. /* we have to ignore the 0ms frames since these are the first
  4499. * keyframes; we've got these so don't mess around with multiple
  4500. * copies sent by the server to us! (if the keyframe is found at a
  4501. * later position there is only one copy and it will be ignored by
  4502. * the preceding if clause)
  4503. */
  4504. if (!(r->m_read.flags & RTMP_READ_NO_IGNORE) &&
  4505. packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO)
  4506. {
  4507. /* exclude type RTMP_PACKET_TYPE_FLASH_VIDEO since it can
  4508. * contain several FLV packets
  4509. */
  4510. if (packet.m_nTimeStamp == 0)
  4511. {
  4512. ret = RTMP_READ_IGNORE;
  4513. break;
  4514. }
  4515. else
  4516. {
  4517. /* stop ignoring packets */
  4518. r->m_read.flags |= RTMP_READ_NO_IGNORE;
  4519. }
  4520. }
  4521. }
  4522. /* calculate packet size and allocate slop buffer if necessary */
  4523. size = nPacketLen +
  4524. ((packet.m_packetType == RTMP_PACKET_TYPE_AUDIO
  4525. || packet.m_packetType == RTMP_PACKET_TYPE_VIDEO
  4526. || packet.m_packetType == RTMP_PACKET_TYPE_INFO) ? 11 : 0) +
  4527. (packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO ? 4 : 0);
  4528. if (size + 4 > buflen)
  4529. {
  4530. /* the extra 4 is for the case of an FLV stream without a last
  4531. * prevTagSize (we need extra 4 bytes to append it) */
  4532. r->m_read.buf = malloc(size + 4);
  4533. if (r->m_read.buf == 0)
  4534. {
  4535. RTMP_Log(RTMP_LOGERROR, "Couldn't allocate memory!");
  4536. ret = RTMP_READ_ERROR; /* fatal error */
  4537. break;
  4538. }
  4539. recopy = TRUE;
  4540. ptr = r->m_read.buf;
  4541. }
  4542. else
  4543. {
  4544. ptr = buf;
  4545. }
  4546. pend = ptr + size + 4;
  4547. /* use to return timestamp of last processed packet */
  4548. /* audio (0x08), video (0x09) or metadata (0x12) packets :
  4549. * construct 11 byte header then add rtmp packet's data */
  4550. if (packet.m_packetType == RTMP_PACKET_TYPE_AUDIO
  4551. || packet.m_packetType == RTMP_PACKET_TYPE_VIDEO
  4552. || packet.m_packetType == RTMP_PACKET_TYPE_INFO)
  4553. {
  4554. nTimeStamp = r->m_read.nResumeTS + packet.m_nTimeStamp;
  4555. prevTagSize = 11 + nPacketLen;
  4556. *ptr = packet.m_packetType;
  4557. ptr++;
  4558. ptr = AMF_EncodeInt24(ptr, pend, nPacketLen);
  4559. #if 0
  4560. if(packet.m_packetType == RTMP_PACKET_TYPE_VIDEO)
  4561. {
  4562. /* H264 fix: */
  4563. if((packetBody[0] & 0x0f) == 7) /* CodecId = H264 */
  4564. {
  4565. uint8_t packetType = *(packetBody+1);
  4566. uint32_t ts = AMF_DecodeInt24(packetBody+2); /* composition time */
  4567. int32_t cts = (ts+0xff800000)^0xff800000;
  4568. RTMP_Log(RTMP_LOGDEBUG, "cts : %d\n", cts);
  4569. nTimeStamp -= cts;
  4570. /* get rid of the composition time */
  4571. CRTMP::EncodeInt24(packetBody+2, 0);
  4572. }
  4573. RTMP_Log(RTMP_LOGDEBUG, "VIDEO: nTimeStamp: 0x%08X (%d)\n", nTimeStamp, nTimeStamp);
  4574. }
  4575. #endif
  4576. ptr = AMF_EncodeInt24(ptr, pend, nTimeStamp);
  4577. *ptr = (char)((nTimeStamp & 0xFF000000) >> 24);
  4578. ptr++;
  4579. /* stream id */
  4580. ptr = AMF_EncodeInt24(ptr, pend, 0);
  4581. }
  4582. memcpy(ptr, packetBody, nPacketLen);
  4583. len = nPacketLen;
  4584. /* correct tagSize and obtain timestamp if we have an FLV stream */
  4585. if (packet.m_packetType == RTMP_PACKET_TYPE_FLASH_VIDEO)
  4586. {
  4587. unsigned int pos = 0;
  4588. int delta;
  4589. /* grab first timestamp and see if it needs fixing */
  4590. nTimeStamp = AMF_DecodeInt24(packetBody + 4);
  4591. nTimeStamp |= (packetBody[7] << 24);
  4592. delta = packet.m_nTimeStamp - nTimeStamp + r->m_read.nResumeTS;
  4593. while (pos + 11 < nPacketLen)
  4594. {
  4595. /* size without header (11) and without prevTagSize (4) */
  4596. uint32_t dataSize = AMF_DecodeInt24(packetBody + pos + 1);
  4597. nTimeStamp = AMF_DecodeInt24(packetBody + pos + 4);
  4598. nTimeStamp |= (packetBody[pos + 7] << 24);
  4599. if (delta)
  4600. {
  4601. nTimeStamp += delta;
  4602. AMF_EncodeInt24(ptr+pos+4, pend, nTimeStamp);
  4603. ptr[pos+7] = nTimeStamp>>24;
  4604. }
  4605. /* set data type */
  4606. r->m_read.dataType |= (((*(packetBody + pos) == 0x08) << 2) |
  4607. (*(packetBody + pos) == 0x09));
  4608. if (pos + 11 + dataSize + 4 > nPacketLen)
  4609. {
  4610. if (pos + 11 + dataSize > nPacketLen)
  4611. {
  4612. RTMP_Log(RTMP_LOGERROR,
  4613. "Wrong data size (%u), stream corrupted, aborting!",
  4614. dataSize);
  4615. ret = RTMP_READ_ERROR;
  4616. break;
  4617. }
  4618. RTMP_Log(RTMP_LOGWARNING, "No tagSize found, appending!");
  4619. /* we have to append a last tagSize! */
  4620. prevTagSize = dataSize + 11;
  4621. AMF_EncodeInt32(ptr + pos + 11 + dataSize, pend,
  4622. prevTagSize);
  4623. size += 4;
  4624. len += 4;
  4625. }
  4626. else
  4627. {
  4628. prevTagSize =
  4629. AMF_DecodeInt32(packetBody + pos + 11 + dataSize);
  4630. #ifdef _DEBUG
  4631. RTMP_Log(RTMP_LOGDEBUG,
  4632. "FLV Packet: type %02X, dataSize: %u, tagSize: %u, timeStamp: %u ms",
  4633. (unsigned char)packetBody[pos], dataSize, prevTagSize,
  4634. nTimeStamp);
  4635. #endif
  4636. if (prevTagSize != (dataSize + 11))
  4637. {
  4638. #ifdef _DEBUG
  4639. RTMP_Log(RTMP_LOGWARNING,
  4640. "Tag and data size are not consitent, writing tag size according to dataSize+11: %d",
  4641. dataSize + 11);
  4642. #endif
  4643. prevTagSize = dataSize + 11;
  4644. AMF_EncodeInt32(ptr + pos + 11 + dataSize, pend,
  4645. prevTagSize);
  4646. }
  4647. }
  4648. pos += prevTagSize + 4; /*(11+dataSize+4); */
  4649. }
  4650. }
  4651. ptr += len;
  4652. if (packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO)
  4653. {
  4654. /* FLV tag packets contain their own prevTagSize */
  4655. AMF_EncodeInt32(ptr, pend, prevTagSize);
  4656. }
  4657. /* In non-live this nTimeStamp can contain an absolute TS.
  4658. * Update ext timestamp with this absolute offset in non-live mode
  4659. * otherwise report the relative one
  4660. */
  4661. /* RTMP_Log(RTMP_LOGDEBUG, "type: %02X, size: %d, pktTS: %dms, TS: %dms, bLiveStream: %d", packet.m_packetType, nPacketLen, packet.m_nTimeStamp, nTimeStamp, r->Link.lFlags & RTMP_LF_LIVE); */
  4662. r->m_read.timestamp = (r->Link.lFlags & RTMP_LF_LIVE) ? packet.m_nTimeStamp : nTimeStamp;
  4663. ret = size;
  4664. break;
  4665. }
  4666. if (rtnGetNextMediaPacket)
  4667. RTMPPacket_Free(&packet);
  4668. if (recopy)
  4669. {
  4670. len = ret > (int)(buflen) ? buflen : (unsigned int)(ret);
  4671. memcpy(buf, r->m_read.buf, len);
  4672. r->m_read.bufpos = r->m_read.buf + len;
  4673. r->m_read.buflen = ret - len;
  4674. }
  4675. return ret;
  4676. }
  4677. static const char flvHeader[] = { 'F', 'L', 'V', 0x01,
  4678. 0x00, /* 0x04 == audio, 0x01 == video */
  4679. 0x00, 0x00, 0x00, 0x09,
  4680. 0x00, 0x00, 0x00, 0x00
  4681. };
  4682. #define HEADERBUF (128*1024)
  4683. int
  4684. RTMP_Read(RTMP *r, char *buf, int size)
  4685. {
  4686. int nRead = 0, total = 0;
  4687. /* can't continue */
  4688. fail:
  4689. switch (r->m_read.status)
  4690. {
  4691. case RTMP_READ_EOF:
  4692. case RTMP_READ_COMPLETE:
  4693. return 0;
  4694. case RTMP_READ_ERROR: /* corrupted stream, resume failed */
  4695. SetSockError(EINVAL);
  4696. return -1;
  4697. default:
  4698. break;
  4699. }
  4700. /* first time thru */
  4701. if (!(r->m_read.flags & RTMP_READ_HEADER))
  4702. {
  4703. if (!(r->m_read.flags & RTMP_READ_RESUME))
  4704. {
  4705. char *mybuf = malloc(HEADERBUF), *end = mybuf + HEADERBUF;
  4706. int cnt = 0;
  4707. r->m_read.buf = mybuf;
  4708. r->m_read.buflen = HEADERBUF;
  4709. memcpy(mybuf, flvHeader, sizeof(flvHeader));
  4710. r->m_read.buf += sizeof(flvHeader);
  4711. r->m_read.buflen -= sizeof(flvHeader);
  4712. cnt += sizeof(flvHeader);
  4713. while (r->m_read.timestamp == 0)
  4714. {
  4715. nRead = Read_1_Packet(r, r->m_read.buf, r->m_read.buflen);
  4716. if (nRead < 0)
  4717. {
  4718. free(mybuf);
  4719. r->m_read.buf = NULL;
  4720. r->m_read.buflen = 0;
  4721. r->m_read.status = nRead;
  4722. goto fail;
  4723. }
  4724. /* buffer overflow, fix buffer and give up */
  4725. if (r->m_read.buf < mybuf || r->m_read.buf > end)
  4726. {
  4727. mybuf = realloc(mybuf, cnt + nRead);
  4728. memcpy(mybuf+cnt, r->m_read.buf, nRead);
  4729. free(r->m_read.buf);
  4730. r->m_read.buf = mybuf+cnt+nRead;
  4731. break;
  4732. }
  4733. cnt += nRead;
  4734. r->m_read.buf += nRead;
  4735. r->m_read.buflen -= nRead;
  4736. if (r->m_read.dataType == 5)
  4737. break;
  4738. }
  4739. mybuf[4] = r->m_read.dataType;
  4740. r->m_read.buflen = r->m_read.buf - mybuf;
  4741. r->m_read.buf = mybuf;
  4742. r->m_read.bufpos = mybuf;
  4743. }
  4744. r->m_read.flags |= RTMP_READ_HEADER;
  4745. }
  4746. if ((r->m_read.flags & RTMP_READ_SEEKING) && r->m_read.buf)
  4747. {
  4748. /* drop whatever's here */
  4749. free(r->m_read.buf);
  4750. r->m_read.buf = NULL;
  4751. r->m_read.bufpos = NULL;
  4752. r->m_read.buflen = 0;
  4753. }
  4754. /* If there's leftover data buffered, use it up */
  4755. if (r->m_read.buf)
  4756. {
  4757. nRead = r->m_read.buflen;
  4758. if (nRead > size)
  4759. nRead = size;
  4760. memcpy(buf, r->m_read.bufpos, nRead);
  4761. r->m_read.buflen -= nRead;
  4762. if (!r->m_read.buflen)
  4763. {
  4764. free(r->m_read.buf);
  4765. r->m_read.buf = NULL;
  4766. r->m_read.bufpos = NULL;
  4767. }
  4768. else
  4769. {
  4770. r->m_read.bufpos += nRead;
  4771. }
  4772. buf += nRead;
  4773. total += nRead;
  4774. size -= nRead;
  4775. }
  4776. while (size > 0 && (nRead = Read_1_Packet(r, buf, size)) >= 0)
  4777. {
  4778. if (!nRead) continue;
  4779. buf += nRead;
  4780. total += nRead;
  4781. size -= nRead;
  4782. break;
  4783. }
  4784. if (nRead < 0)
  4785. r->m_read.status = nRead;
  4786. if (size < 0)
  4787. total += size;
  4788. return total;
  4789. }
  4790. static const AVal av_setDataFrame = AVC("@setDataFrame");
  4791. int
  4792. RTMP_Write(RTMP *r, const char *buf, int size, int streamIdx)
  4793. {
  4794. RTMPPacket *pkt = &r->m_write;
  4795. char *pend, *enc;
  4796. int s2 = size, ret, num;
  4797. pkt->m_nChannel = 0x04; /* source channel */
  4798. pkt->m_nInfoField2 = r->Link.streams[streamIdx].id;
  4799. while (s2)
  4800. {
  4801. if (!pkt->m_nBytesRead)
  4802. {
  4803. if (size < 11)
  4804. {
  4805. /* FLV pkt too small */
  4806. return 0;
  4807. }
  4808. if (buf[0] == 'F' && buf[1] == 'L' && buf[2] == 'V')
  4809. {
  4810. buf += 13;
  4811. s2 -= 13;
  4812. }
  4813. pkt->m_packetType = *buf++;
  4814. pkt->m_nBodySize = AMF_DecodeInt24(buf);
  4815. buf += 3;
  4816. pkt->m_nTimeStamp = AMF_DecodeInt24(buf);
  4817. buf += 3;
  4818. pkt->m_nTimeStamp |= *buf++ << 24;
  4819. buf += 3;
  4820. s2 -= 11;
  4821. if (((pkt->m_packetType == RTMP_PACKET_TYPE_AUDIO
  4822. || pkt->m_packetType == RTMP_PACKET_TYPE_VIDEO) &&
  4823. !pkt->m_nTimeStamp) || pkt->m_packetType == RTMP_PACKET_TYPE_INFO)
  4824. {
  4825. pkt->m_headerType = RTMP_PACKET_SIZE_LARGE;
  4826. if (pkt->m_packetType == RTMP_PACKET_TYPE_INFO)
  4827. pkt->m_nBodySize += 16;
  4828. }
  4829. else
  4830. {
  4831. pkt->m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  4832. }
  4833. if (!RTMPPacket_Alloc(pkt, pkt->m_nBodySize))
  4834. {
  4835. RTMP_Log(RTMP_LOGDEBUG, "%s, failed to allocate packet", __FUNCTION__);
  4836. return FALSE;
  4837. }
  4838. enc = pkt->m_body;
  4839. pend = enc + pkt->m_nBodySize;
  4840. if (pkt->m_packetType == RTMP_PACKET_TYPE_INFO)
  4841. {
  4842. enc = AMF_EncodeString(enc, pend, &av_setDataFrame);
  4843. pkt->m_nBytesRead = enc - pkt->m_body;
  4844. }
  4845. }
  4846. else
  4847. {
  4848. enc = pkt->m_body + pkt->m_nBytesRead;
  4849. }
  4850. num = pkt->m_nBodySize - pkt->m_nBytesRead;
  4851. if (num > s2)
  4852. num = s2;
  4853. memcpy(enc, buf, num);
  4854. pkt->m_nBytesRead += num;
  4855. s2 -= num;
  4856. buf += num;
  4857. if (pkt->m_nBytesRead == pkt->m_nBodySize)
  4858. {
  4859. ret = RTMP_SendPacket(r, pkt, FALSE);
  4860. RTMPPacket_Free(pkt);
  4861. pkt->m_nBytesRead = 0;
  4862. if (!ret)
  4863. return -1;
  4864. buf += 4;
  4865. s2 -= 4;
  4866. if (s2 < 0)
  4867. break;
  4868. }
  4869. }
  4870. return size+s2;
  4871. }