You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

1911 lines
66KB

  1. /*
  2. * RTSP/SDP client
  3. * Copyright (c) 2002 Fabrice Bellard
  4. *
  5. * This file is part of FFmpeg.
  6. *
  7. * FFmpeg is free software; you can redistribute it and/or
  8. * modify it under the terms of the GNU Lesser General Public
  9. * License as published by the Free Software Foundation; either
  10. * version 2.1 of the License, or (at your option) any later version.
  11. *
  12. * FFmpeg is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  15. * Lesser General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU Lesser General Public
  18. * License along with FFmpeg; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
  20. */
  21. #include "libavutil/base64.h"
  22. #include "libavutil/avstring.h"
  23. #include "libavutil/intreadwrite.h"
  24. #include "libavutil/random_seed.h"
  25. #include "avformat.h"
  26. #include <sys/time.h>
  27. #if HAVE_SYS_SELECT_H
  28. #include <sys/select.h>
  29. #endif
  30. #include <strings.h>
  31. #include "internal.h"
  32. #include "network.h"
  33. #include "os_support.h"
  34. #include "http.h"
  35. #include "rtsp.h"
  36. #include "rtpdec.h"
  37. #include "rdt.h"
  38. #include "rtpdec_formats.h"
  39. #include "rtpenc_chain.h"
  40. //#define DEBUG
  41. //#define DEBUG_RTP_TCP
  42. /* Timeout values for socket select, in ms,
  43. * and read_packet(), in seconds */
  44. #define SELECT_TIMEOUT_MS 100
  45. #define READ_PACKET_TIMEOUT_S 10
  46. #define MAX_TIMEOUTS READ_PACKET_TIMEOUT_S * 1000 / SELECT_TIMEOUT_MS
  47. #define SDP_MAX_SIZE 16384
  48. #define RECVBUF_SIZE 10 * RTP_MAX_PACKET_LENGTH
  49. static void get_word_until_chars(char *buf, int buf_size,
  50. const char *sep, const char **pp)
  51. {
  52. const char *p;
  53. char *q;
  54. p = *pp;
  55. p += strspn(p, SPACE_CHARS);
  56. q = buf;
  57. while (!strchr(sep, *p) && *p != '\0') {
  58. if ((q - buf) < buf_size - 1)
  59. *q++ = *p;
  60. p++;
  61. }
  62. if (buf_size > 0)
  63. *q = '\0';
  64. *pp = p;
  65. }
  66. static void get_word_sep(char *buf, int buf_size, const char *sep,
  67. const char **pp)
  68. {
  69. if (**pp == '/') (*pp)++;
  70. get_word_until_chars(buf, buf_size, sep, pp);
  71. }
  72. static void get_word(char *buf, int buf_size, const char **pp)
  73. {
  74. get_word_until_chars(buf, buf_size, SPACE_CHARS, pp);
  75. }
  76. /** Parse a string p in the form of Range:npt=xx-xx, and determine the start
  77. * and end time.
  78. * Used for seeking in the rtp stream.
  79. */
  80. static void rtsp_parse_range_npt(const char *p, int64_t *start, int64_t *end)
  81. {
  82. char buf[256];
  83. p += strspn(p, SPACE_CHARS);
  84. if (!av_stristart(p, "npt=", &p))
  85. return;
  86. *start = AV_NOPTS_VALUE;
  87. *end = AV_NOPTS_VALUE;
  88. get_word_sep(buf, sizeof(buf), "-", &p);
  89. *start = parse_date(buf, 1);
  90. if (*p == '-') {
  91. p++;
  92. get_word_sep(buf, sizeof(buf), "-", &p);
  93. *end = parse_date(buf, 1);
  94. }
  95. // av_log(NULL, AV_LOG_DEBUG, "Range Start: %lld\n", *start);
  96. // av_log(NULL, AV_LOG_DEBUG, "Range End: %lld\n", *end);
  97. }
  98. static int get_sockaddr(const char *buf, struct sockaddr_storage *sock)
  99. {
  100. struct addrinfo hints, *ai = NULL;
  101. memset(&hints, 0, sizeof(hints));
  102. hints.ai_flags = AI_NUMERICHOST;
  103. if (getaddrinfo(buf, NULL, &hints, &ai))
  104. return -1;
  105. memcpy(sock, ai->ai_addr, FFMIN(sizeof(*sock), ai->ai_addrlen));
  106. freeaddrinfo(ai);
  107. return 0;
  108. }
  109. #if CONFIG_RTPDEC
  110. static void init_rtp_handler(RTPDynamicProtocolHandler *handler,
  111. RTSPStream *rtsp_st, AVCodecContext *codec)
  112. {
  113. if (!handler)
  114. return;
  115. codec->codec_id = handler->codec_id;
  116. rtsp_st->dynamic_handler = handler;
  117. if (handler->open)
  118. rtsp_st->dynamic_protocol_context = handler->open();
  119. }
  120. /* parse the rtpmap description: <codec_name>/<clock_rate>[/<other params>] */
  121. static int sdp_parse_rtpmap(AVFormatContext *s,
  122. AVStream *st, RTSPStream *rtsp_st,
  123. int payload_type, const char *p)
  124. {
  125. AVCodecContext *codec = st->codec;
  126. char buf[256];
  127. int i;
  128. AVCodec *c;
  129. const char *c_name;
  130. /* Loop into AVRtpDynamicPayloadTypes[] and AVRtpPayloadTypes[] and
  131. * see if we can handle this kind of payload.
  132. * The space should normally not be there but some Real streams or
  133. * particular servers ("RealServer Version 6.1.3.970", see issue 1658)
  134. * have a trailing space. */
  135. get_word_sep(buf, sizeof(buf), "/ ", &p);
  136. if (payload_type >= RTP_PT_PRIVATE) {
  137. RTPDynamicProtocolHandler *handler =
  138. ff_rtp_handler_find_by_name(buf, codec->codec_type);
  139. init_rtp_handler(handler, rtsp_st, codec);
  140. /* If no dynamic handler was found, check with the list of standard
  141. * allocated types, if such a stream for some reason happens to
  142. * use a private payload type. This isn't handled in rtpdec.c, since
  143. * the format name from the rtpmap line never is passed into rtpdec. */
  144. if (!rtsp_st->dynamic_handler)
  145. codec->codec_id = ff_rtp_codec_id(buf, codec->codec_type);
  146. } else {
  147. /* We are in a standard case
  148. * (from http://www.iana.org/assignments/rtp-parameters). */
  149. /* search into AVRtpPayloadTypes[] */
  150. codec->codec_id = ff_rtp_codec_id(buf, codec->codec_type);
  151. }
  152. c = avcodec_find_decoder(codec->codec_id);
  153. if (c && c->name)
  154. c_name = c->name;
  155. else
  156. c_name = "(null)";
  157. get_word_sep(buf, sizeof(buf), "/", &p);
  158. i = atoi(buf);
  159. switch (codec->codec_type) {
  160. case AVMEDIA_TYPE_AUDIO:
  161. av_log(s, AV_LOG_DEBUG, "audio codec set to: %s\n", c_name);
  162. codec->sample_rate = RTSP_DEFAULT_AUDIO_SAMPLERATE;
  163. codec->channels = RTSP_DEFAULT_NB_AUDIO_CHANNELS;
  164. if (i > 0) {
  165. codec->sample_rate = i;
  166. av_set_pts_info(st, 32, 1, codec->sample_rate);
  167. get_word_sep(buf, sizeof(buf), "/", &p);
  168. i = atoi(buf);
  169. if (i > 0)
  170. codec->channels = i;
  171. // TODO: there is a bug here; if it is a mono stream, and
  172. // less than 22000Hz, faad upconverts to stereo and twice
  173. // the frequency. No problem, but the sample rate is being
  174. // set here by the sdp line. Patch on its way. (rdm)
  175. }
  176. av_log(s, AV_LOG_DEBUG, "audio samplerate set to: %i\n",
  177. codec->sample_rate);
  178. av_log(s, AV_LOG_DEBUG, "audio channels set to: %i\n",
  179. codec->channels);
  180. break;
  181. case AVMEDIA_TYPE_VIDEO:
  182. av_log(s, AV_LOG_DEBUG, "video codec set to: %s\n", c_name);
  183. if (i > 0)
  184. av_set_pts_info(st, 32, 1, i);
  185. break;
  186. default:
  187. break;
  188. }
  189. return 0;
  190. }
  191. /* parse the attribute line from the fmtp a line of an sdp response. This
  192. * is broken out as a function because it is used in rtp_h264.c, which is
  193. * forthcoming. */
  194. int ff_rtsp_next_attr_and_value(const char **p, char *attr, int attr_size,
  195. char *value, int value_size)
  196. {
  197. *p += strspn(*p, SPACE_CHARS);
  198. if (**p) {
  199. get_word_sep(attr, attr_size, "=", p);
  200. if (**p == '=')
  201. (*p)++;
  202. get_word_sep(value, value_size, ";", p);
  203. if (**p == ';')
  204. (*p)++;
  205. return 1;
  206. }
  207. return 0;
  208. }
  209. typedef struct SDPParseState {
  210. /* SDP only */
  211. struct sockaddr_storage default_ip;
  212. int default_ttl;
  213. int skip_media; ///< set if an unknown m= line occurs
  214. } SDPParseState;
  215. static void sdp_parse_line(AVFormatContext *s, SDPParseState *s1,
  216. int letter, const char *buf)
  217. {
  218. RTSPState *rt = s->priv_data;
  219. char buf1[64], st_type[64];
  220. const char *p;
  221. enum AVMediaType codec_type;
  222. int payload_type, i;
  223. AVStream *st;
  224. RTSPStream *rtsp_st;
  225. struct sockaddr_storage sdp_ip;
  226. int ttl;
  227. dprintf(s, "sdp: %c='%s'\n", letter, buf);
  228. p = buf;
  229. if (s1->skip_media && letter != 'm')
  230. return;
  231. switch (letter) {
  232. case 'c':
  233. get_word(buf1, sizeof(buf1), &p);
  234. if (strcmp(buf1, "IN") != 0)
  235. return;
  236. get_word(buf1, sizeof(buf1), &p);
  237. if (strcmp(buf1, "IP4") && strcmp(buf1, "IP6"))
  238. return;
  239. get_word_sep(buf1, sizeof(buf1), "/", &p);
  240. if (get_sockaddr(buf1, &sdp_ip))
  241. return;
  242. ttl = 16;
  243. if (*p == '/') {
  244. p++;
  245. get_word_sep(buf1, sizeof(buf1), "/", &p);
  246. ttl = atoi(buf1);
  247. }
  248. if (s->nb_streams == 0) {
  249. s1->default_ip = sdp_ip;
  250. s1->default_ttl = ttl;
  251. } else {
  252. st = s->streams[s->nb_streams - 1];
  253. rtsp_st = st->priv_data;
  254. rtsp_st->sdp_ip = sdp_ip;
  255. rtsp_st->sdp_ttl = ttl;
  256. }
  257. break;
  258. case 's':
  259. av_metadata_set2(&s->metadata, "title", p, 0);
  260. break;
  261. case 'i':
  262. if (s->nb_streams == 0) {
  263. av_metadata_set2(&s->metadata, "comment", p, 0);
  264. break;
  265. }
  266. break;
  267. case 'm':
  268. /* new stream */
  269. s1->skip_media = 0;
  270. get_word(st_type, sizeof(st_type), &p);
  271. if (!strcmp(st_type, "audio")) {
  272. codec_type = AVMEDIA_TYPE_AUDIO;
  273. } else if (!strcmp(st_type, "video")) {
  274. codec_type = AVMEDIA_TYPE_VIDEO;
  275. } else if (!strcmp(st_type, "application")) {
  276. codec_type = AVMEDIA_TYPE_DATA;
  277. } else {
  278. s1->skip_media = 1;
  279. return;
  280. }
  281. rtsp_st = av_mallocz(sizeof(RTSPStream));
  282. if (!rtsp_st)
  283. return;
  284. rtsp_st->stream_index = -1;
  285. dynarray_add(&rt->rtsp_streams, &rt->nb_rtsp_streams, rtsp_st);
  286. rtsp_st->sdp_ip = s1->default_ip;
  287. rtsp_st->sdp_ttl = s1->default_ttl;
  288. get_word(buf1, sizeof(buf1), &p); /* port */
  289. rtsp_st->sdp_port = atoi(buf1);
  290. get_word(buf1, sizeof(buf1), &p); /* protocol (ignored) */
  291. /* XXX: handle list of formats */
  292. get_word(buf1, sizeof(buf1), &p); /* format list */
  293. rtsp_st->sdp_payload_type = atoi(buf1);
  294. if (!strcmp(ff_rtp_enc_name(rtsp_st->sdp_payload_type), "MP2T")) {
  295. /* no corresponding stream */
  296. } else {
  297. st = av_new_stream(s, 0);
  298. if (!st)
  299. return;
  300. st->priv_data = rtsp_st;
  301. rtsp_st->stream_index = st->index;
  302. st->codec->codec_type = codec_type;
  303. if (rtsp_st->sdp_payload_type < RTP_PT_PRIVATE) {
  304. RTPDynamicProtocolHandler *handler;
  305. /* if standard payload type, we can find the codec right now */
  306. ff_rtp_get_codec_info(st->codec, rtsp_st->sdp_payload_type);
  307. if (st->codec->codec_type == AVMEDIA_TYPE_AUDIO &&
  308. st->codec->sample_rate > 0)
  309. av_set_pts_info(st, 32, 1, st->codec->sample_rate);
  310. /* Even static payload types may need a custom depacketizer */
  311. handler = ff_rtp_handler_find_by_id(
  312. rtsp_st->sdp_payload_type, st->codec->codec_type);
  313. init_rtp_handler(handler, rtsp_st, st->codec);
  314. }
  315. }
  316. /* put a default control url */
  317. av_strlcpy(rtsp_st->control_url, rt->control_uri,
  318. sizeof(rtsp_st->control_url));
  319. break;
  320. case 'a':
  321. if (av_strstart(p, "control:", &p)) {
  322. if (s->nb_streams == 0) {
  323. if (!strncmp(p, "rtsp://", 7))
  324. av_strlcpy(rt->control_uri, p,
  325. sizeof(rt->control_uri));
  326. } else {
  327. char proto[32];
  328. /* get the control url */
  329. st = s->streams[s->nb_streams - 1];
  330. rtsp_st = st->priv_data;
  331. /* XXX: may need to add full url resolution */
  332. av_url_split(proto, sizeof(proto), NULL, 0, NULL, 0,
  333. NULL, NULL, 0, p);
  334. if (proto[0] == '\0') {
  335. /* relative control URL */
  336. if (rtsp_st->control_url[strlen(rtsp_st->control_url)-1]!='/')
  337. av_strlcat(rtsp_st->control_url, "/",
  338. sizeof(rtsp_st->control_url));
  339. av_strlcat(rtsp_st->control_url, p,
  340. sizeof(rtsp_st->control_url));
  341. } else
  342. av_strlcpy(rtsp_st->control_url, p,
  343. sizeof(rtsp_st->control_url));
  344. }
  345. } else if (av_strstart(p, "rtpmap:", &p) && s->nb_streams > 0) {
  346. /* NOTE: rtpmap is only supported AFTER the 'm=' tag */
  347. get_word(buf1, sizeof(buf1), &p);
  348. payload_type = atoi(buf1);
  349. st = s->streams[s->nb_streams - 1];
  350. rtsp_st = st->priv_data;
  351. sdp_parse_rtpmap(s, st, rtsp_st, payload_type, p);
  352. } else if (av_strstart(p, "fmtp:", &p) ||
  353. av_strstart(p, "framesize:", &p)) {
  354. /* NOTE: fmtp is only supported AFTER the 'a=rtpmap:xxx' tag */
  355. // let dynamic protocol handlers have a stab at the line.
  356. get_word(buf1, sizeof(buf1), &p);
  357. payload_type = atoi(buf1);
  358. for (i = 0; i < s->nb_streams; i++) {
  359. st = s->streams[i];
  360. rtsp_st = st->priv_data;
  361. if (rtsp_st->sdp_payload_type == payload_type &&
  362. rtsp_st->dynamic_handler &&
  363. rtsp_st->dynamic_handler->parse_sdp_a_line)
  364. rtsp_st->dynamic_handler->parse_sdp_a_line(s, i,
  365. rtsp_st->dynamic_protocol_context, buf);
  366. }
  367. } else if (av_strstart(p, "range:", &p)) {
  368. int64_t start, end;
  369. // this is so that seeking on a streamed file can work.
  370. rtsp_parse_range_npt(p, &start, &end);
  371. s->start_time = start;
  372. /* AV_NOPTS_VALUE means live broadcast (and can't seek) */
  373. s->duration = (end == AV_NOPTS_VALUE) ?
  374. AV_NOPTS_VALUE : end - start;
  375. } else if (av_strstart(p, "IsRealDataType:integer;",&p)) {
  376. if (atoi(p) == 1)
  377. rt->transport = RTSP_TRANSPORT_RDT;
  378. } else if (av_strstart(p, "SampleRate:integer;", &p) &&
  379. s->nb_streams > 0) {
  380. st = s->streams[s->nb_streams - 1];
  381. st->codec->sample_rate = atoi(p);
  382. } else {
  383. if (rt->server_type == RTSP_SERVER_WMS)
  384. ff_wms_parse_sdp_a_line(s, p);
  385. if (s->nb_streams > 0) {
  386. if (rt->server_type == RTSP_SERVER_REAL)
  387. ff_real_parse_sdp_a_line(s, s->nb_streams - 1, p);
  388. rtsp_st = s->streams[s->nb_streams - 1]->priv_data;
  389. if (rtsp_st->dynamic_handler &&
  390. rtsp_st->dynamic_handler->parse_sdp_a_line)
  391. rtsp_st->dynamic_handler->parse_sdp_a_line(s,
  392. s->nb_streams - 1,
  393. rtsp_st->dynamic_protocol_context, buf);
  394. }
  395. }
  396. break;
  397. }
  398. }
  399. int ff_sdp_parse(AVFormatContext *s, const char *content)
  400. {
  401. const char *p;
  402. int letter;
  403. /* Some SDP lines, particularly for Realmedia or ASF RTSP streams,
  404. * contain long SDP lines containing complete ASF Headers (several
  405. * kB) or arrays of MDPR (RM stream descriptor) headers plus
  406. * "rulebooks" describing their properties. Therefore, the SDP line
  407. * buffer is large.
  408. *
  409. * The Vorbis FMTP line can be up to 16KB - see xiph_parse_sdp_line
  410. * in rtpdec_xiph.c. */
  411. char buf[16384], *q;
  412. SDPParseState sdp_parse_state, *s1 = &sdp_parse_state;
  413. memset(s1, 0, sizeof(SDPParseState));
  414. p = content;
  415. for (;;) {
  416. p += strspn(p, SPACE_CHARS);
  417. letter = *p;
  418. if (letter == '\0')
  419. break;
  420. p++;
  421. if (*p != '=')
  422. goto next_line;
  423. p++;
  424. /* get the content */
  425. q = buf;
  426. while (*p != '\n' && *p != '\r' && *p != '\0') {
  427. if ((q - buf) < sizeof(buf) - 1)
  428. *q++ = *p;
  429. p++;
  430. }
  431. *q = '\0';
  432. sdp_parse_line(s, s1, letter, buf);
  433. next_line:
  434. while (*p != '\n' && *p != '\0')
  435. p++;
  436. if (*p == '\n')
  437. p++;
  438. }
  439. return 0;
  440. }
  441. #endif /* CONFIG_RTPDEC */
  442. /* close and free RTSP streams */
  443. void ff_rtsp_close_streams(AVFormatContext *s)
  444. {
  445. RTSPState *rt = s->priv_data;
  446. int i;
  447. RTSPStream *rtsp_st;
  448. for (i = 0; i < rt->nb_rtsp_streams; i++) {
  449. rtsp_st = rt->rtsp_streams[i];
  450. if (rtsp_st) {
  451. if (rtsp_st->transport_priv) {
  452. if (s->oformat) {
  453. AVFormatContext *rtpctx = rtsp_st->transport_priv;
  454. av_write_trailer(rtpctx);
  455. if (rt->lower_transport == RTSP_LOWER_TRANSPORT_TCP) {
  456. uint8_t *ptr;
  457. url_close_dyn_buf(rtpctx->pb, &ptr);
  458. av_free(ptr);
  459. } else {
  460. url_fclose(rtpctx->pb);
  461. }
  462. av_metadata_free(&rtpctx->streams[0]->metadata);
  463. av_metadata_free(&rtpctx->metadata);
  464. av_free(rtpctx->streams[0]);
  465. av_free(rtpctx);
  466. } else if (rt->transport == RTSP_TRANSPORT_RDT && CONFIG_RTPDEC)
  467. ff_rdt_parse_close(rtsp_st->transport_priv);
  468. else if (CONFIG_RTPDEC)
  469. rtp_parse_close(rtsp_st->transport_priv);
  470. }
  471. if (rtsp_st->rtp_handle)
  472. url_close(rtsp_st->rtp_handle);
  473. if (rtsp_st->dynamic_handler && rtsp_st->dynamic_protocol_context)
  474. rtsp_st->dynamic_handler->close(
  475. rtsp_st->dynamic_protocol_context);
  476. }
  477. }
  478. av_free(rt->rtsp_streams);
  479. if (rt->asf_ctx) {
  480. av_close_input_stream (rt->asf_ctx);
  481. rt->asf_ctx = NULL;
  482. }
  483. av_free(rt->recvbuf);
  484. }
  485. static int rtsp_open_transport_ctx(AVFormatContext *s, RTSPStream *rtsp_st)
  486. {
  487. RTSPState *rt = s->priv_data;
  488. AVStream *st = NULL;
  489. /* open the RTP context */
  490. if (rtsp_st->stream_index >= 0)
  491. st = s->streams[rtsp_st->stream_index];
  492. if (!st)
  493. s->ctx_flags |= AVFMTCTX_NOHEADER;
  494. if (s->oformat && CONFIG_RTSP_MUXER) {
  495. rtsp_st->transport_priv = ff_rtp_chain_mux_open(s, st,
  496. rtsp_st->rtp_handle,
  497. RTSP_TCP_MAX_PACKET_SIZE);
  498. /* Ownership of rtp_handle is passed to the rtp mux context */
  499. rtsp_st->rtp_handle = NULL;
  500. } else if (rt->transport == RTSP_TRANSPORT_RDT && CONFIG_RTPDEC)
  501. rtsp_st->transport_priv = ff_rdt_parse_open(s, st->index,
  502. rtsp_st->dynamic_protocol_context,
  503. rtsp_st->dynamic_handler);
  504. else if (CONFIG_RTPDEC)
  505. rtsp_st->transport_priv = rtp_parse_open(s, st, rtsp_st->rtp_handle,
  506. rtsp_st->sdp_payload_type,
  507. (rt->lower_transport == RTSP_LOWER_TRANSPORT_TCP || !s->max_delay)
  508. ? 0 : RTP_REORDER_QUEUE_DEFAULT_SIZE);
  509. if (!rtsp_st->transport_priv) {
  510. return AVERROR(ENOMEM);
  511. } else if (rt->transport != RTSP_TRANSPORT_RDT && CONFIG_RTPDEC) {
  512. if (rtsp_st->dynamic_handler) {
  513. rtp_parse_set_dynamic_protocol(rtsp_st->transport_priv,
  514. rtsp_st->dynamic_protocol_context,
  515. rtsp_st->dynamic_handler);
  516. }
  517. }
  518. return 0;
  519. }
  520. #if CONFIG_RTSP_DEMUXER || CONFIG_RTSP_MUXER
  521. static void rtsp_parse_range(int *min_ptr, int *max_ptr, const char **pp)
  522. {
  523. const char *p;
  524. int v;
  525. p = *pp;
  526. p += strspn(p, SPACE_CHARS);
  527. v = strtol(p, (char **)&p, 10);
  528. if (*p == '-') {
  529. p++;
  530. *min_ptr = v;
  531. v = strtol(p, (char **)&p, 10);
  532. *max_ptr = v;
  533. } else {
  534. *min_ptr = v;
  535. *max_ptr = v;
  536. }
  537. *pp = p;
  538. }
  539. /* XXX: only one transport specification is parsed */
  540. static void rtsp_parse_transport(RTSPMessageHeader *reply, const char *p)
  541. {
  542. char transport_protocol[16];
  543. char profile[16];
  544. char lower_transport[16];
  545. char parameter[16];
  546. RTSPTransportField *th;
  547. char buf[256];
  548. reply->nb_transports = 0;
  549. for (;;) {
  550. p += strspn(p, SPACE_CHARS);
  551. if (*p == '\0')
  552. break;
  553. th = &reply->transports[reply->nb_transports];
  554. get_word_sep(transport_protocol, sizeof(transport_protocol),
  555. "/", &p);
  556. if (!strcasecmp (transport_protocol, "rtp")) {
  557. get_word_sep(profile, sizeof(profile), "/;,", &p);
  558. lower_transport[0] = '\0';
  559. /* rtp/avp/<protocol> */
  560. if (*p == '/') {
  561. get_word_sep(lower_transport, sizeof(lower_transport),
  562. ";,", &p);
  563. }
  564. th->transport = RTSP_TRANSPORT_RTP;
  565. } else if (!strcasecmp (transport_protocol, "x-pn-tng") ||
  566. !strcasecmp (transport_protocol, "x-real-rdt")) {
  567. /* x-pn-tng/<protocol> */
  568. get_word_sep(lower_transport, sizeof(lower_transport), "/;,", &p);
  569. profile[0] = '\0';
  570. th->transport = RTSP_TRANSPORT_RDT;
  571. }
  572. if (!strcasecmp(lower_transport, "TCP"))
  573. th->lower_transport = RTSP_LOWER_TRANSPORT_TCP;
  574. else
  575. th->lower_transport = RTSP_LOWER_TRANSPORT_UDP;
  576. if (*p == ';')
  577. p++;
  578. /* get each parameter */
  579. while (*p != '\0' && *p != ',') {
  580. get_word_sep(parameter, sizeof(parameter), "=;,", &p);
  581. if (!strcmp(parameter, "port")) {
  582. if (*p == '=') {
  583. p++;
  584. rtsp_parse_range(&th->port_min, &th->port_max, &p);
  585. }
  586. } else if (!strcmp(parameter, "client_port")) {
  587. if (*p == '=') {
  588. p++;
  589. rtsp_parse_range(&th->client_port_min,
  590. &th->client_port_max, &p);
  591. }
  592. } else if (!strcmp(parameter, "server_port")) {
  593. if (*p == '=') {
  594. p++;
  595. rtsp_parse_range(&th->server_port_min,
  596. &th->server_port_max, &p);
  597. }
  598. } else if (!strcmp(parameter, "interleaved")) {
  599. if (*p == '=') {
  600. p++;
  601. rtsp_parse_range(&th->interleaved_min,
  602. &th->interleaved_max, &p);
  603. }
  604. } else if (!strcmp(parameter, "multicast")) {
  605. if (th->lower_transport == RTSP_LOWER_TRANSPORT_UDP)
  606. th->lower_transport = RTSP_LOWER_TRANSPORT_UDP_MULTICAST;
  607. } else if (!strcmp(parameter, "ttl")) {
  608. if (*p == '=') {
  609. p++;
  610. th->ttl = strtol(p, (char **)&p, 10);
  611. }
  612. } else if (!strcmp(parameter, "destination")) {
  613. if (*p == '=') {
  614. p++;
  615. get_word_sep(buf, sizeof(buf), ";,", &p);
  616. get_sockaddr(buf, &th->destination);
  617. }
  618. } else if (!strcmp(parameter, "source")) {
  619. if (*p == '=') {
  620. p++;
  621. get_word_sep(buf, sizeof(buf), ";,", &p);
  622. av_strlcpy(th->source, buf, sizeof(th->source));
  623. }
  624. }
  625. while (*p != ';' && *p != '\0' && *p != ',')
  626. p++;
  627. if (*p == ';')
  628. p++;
  629. }
  630. if (*p == ',')
  631. p++;
  632. reply->nb_transports++;
  633. }
  634. }
  635. static void handle_rtp_info(RTSPState *rt, const char *url,
  636. uint32_t seq, uint32_t rtptime)
  637. {
  638. int i;
  639. if (!rtptime || !url[0])
  640. return;
  641. if (rt->transport != RTSP_TRANSPORT_RTP)
  642. return;
  643. for (i = 0; i < rt->nb_rtsp_streams; i++) {
  644. RTSPStream *rtsp_st = rt->rtsp_streams[i];
  645. RTPDemuxContext *rtpctx = rtsp_st->transport_priv;
  646. if (!rtpctx)
  647. continue;
  648. if (!strcmp(rtsp_st->control_url, url)) {
  649. rtpctx->base_timestamp = rtptime;
  650. break;
  651. }
  652. }
  653. }
  654. static void rtsp_parse_rtp_info(RTSPState *rt, const char *p)
  655. {
  656. int read = 0;
  657. char key[20], value[1024], url[1024] = "";
  658. uint32_t seq = 0, rtptime = 0;
  659. for (;;) {
  660. p += strspn(p, SPACE_CHARS);
  661. if (!*p)
  662. break;
  663. get_word_sep(key, sizeof(key), "=", &p);
  664. if (*p != '=')
  665. break;
  666. p++;
  667. get_word_sep(value, sizeof(value), ";, ", &p);
  668. read++;
  669. if (!strcmp(key, "url"))
  670. av_strlcpy(url, value, sizeof(url));
  671. else if (!strcmp(key, "seq"))
  672. seq = strtol(value, NULL, 10);
  673. else if (!strcmp(key, "rtptime"))
  674. rtptime = strtol(value, NULL, 10);
  675. if (*p == ',') {
  676. handle_rtp_info(rt, url, seq, rtptime);
  677. url[0] = '\0';
  678. seq = rtptime = 0;
  679. read = 0;
  680. }
  681. if (*p)
  682. p++;
  683. }
  684. if (read > 0)
  685. handle_rtp_info(rt, url, seq, rtptime);
  686. }
  687. void ff_rtsp_parse_line(RTSPMessageHeader *reply, const char *buf,
  688. RTSPState *rt, const char *method)
  689. {
  690. const char *p;
  691. /* NOTE: we do case independent match for broken servers */
  692. p = buf;
  693. if (av_stristart(p, "Session:", &p)) {
  694. int t;
  695. get_word_sep(reply->session_id, sizeof(reply->session_id), ";", &p);
  696. if (av_stristart(p, ";timeout=", &p) &&
  697. (t = strtol(p, NULL, 10)) > 0) {
  698. reply->timeout = t;
  699. }
  700. } else if (av_stristart(p, "Content-Length:", &p)) {
  701. reply->content_length = strtol(p, NULL, 10);
  702. } else if (av_stristart(p, "Transport:", &p)) {
  703. rtsp_parse_transport(reply, p);
  704. } else if (av_stristart(p, "CSeq:", &p)) {
  705. reply->seq = strtol(p, NULL, 10);
  706. } else if (av_stristart(p, "Range:", &p)) {
  707. rtsp_parse_range_npt(p, &reply->range_start, &reply->range_end);
  708. } else if (av_stristart(p, "RealChallenge1:", &p)) {
  709. p += strspn(p, SPACE_CHARS);
  710. av_strlcpy(reply->real_challenge, p, sizeof(reply->real_challenge));
  711. } else if (av_stristart(p, "Server:", &p)) {
  712. p += strspn(p, SPACE_CHARS);
  713. av_strlcpy(reply->server, p, sizeof(reply->server));
  714. } else if (av_stristart(p, "Notice:", &p) ||
  715. av_stristart(p, "X-Notice:", &p)) {
  716. reply->notice = strtol(p, NULL, 10);
  717. } else if (av_stristart(p, "Location:", &p)) {
  718. p += strspn(p, SPACE_CHARS);
  719. av_strlcpy(reply->location, p , sizeof(reply->location));
  720. } else if (av_stristart(p, "WWW-Authenticate:", &p) && rt) {
  721. p += strspn(p, SPACE_CHARS);
  722. ff_http_auth_handle_header(&rt->auth_state, "WWW-Authenticate", p);
  723. } else if (av_stristart(p, "Authentication-Info:", &p) && rt) {
  724. p += strspn(p, SPACE_CHARS);
  725. ff_http_auth_handle_header(&rt->auth_state, "Authentication-Info", p);
  726. } else if (av_stristart(p, "Content-Base:", &p) && rt) {
  727. p += strspn(p, SPACE_CHARS);
  728. if (method && !strcmp(method, "DESCRIBE"))
  729. av_strlcpy(rt->control_uri, p , sizeof(rt->control_uri));
  730. } else if (av_stristart(p, "RTP-Info:", &p) && rt) {
  731. p += strspn(p, SPACE_CHARS);
  732. if (method && !strcmp(method, "PLAY"))
  733. rtsp_parse_rtp_info(rt, p);
  734. }
  735. }
  736. /* skip a RTP/TCP interleaved packet */
  737. void ff_rtsp_skip_packet(AVFormatContext *s)
  738. {
  739. RTSPState *rt = s->priv_data;
  740. int ret, len, len1;
  741. uint8_t buf[1024];
  742. ret = url_read_complete(rt->rtsp_hd, buf, 3);
  743. if (ret != 3)
  744. return;
  745. len = AV_RB16(buf + 1);
  746. dprintf(s, "skipping RTP packet len=%d\n", len);
  747. /* skip payload */
  748. while (len > 0) {
  749. len1 = len;
  750. if (len1 > sizeof(buf))
  751. len1 = sizeof(buf);
  752. ret = url_read_complete(rt->rtsp_hd, buf, len1);
  753. if (ret != len1)
  754. return;
  755. len -= len1;
  756. }
  757. }
  758. int ff_rtsp_read_reply(AVFormatContext *s, RTSPMessageHeader *reply,
  759. unsigned char **content_ptr,
  760. int return_on_interleaved_data, const char *method)
  761. {
  762. RTSPState *rt = s->priv_data;
  763. char buf[4096], buf1[1024], *q;
  764. unsigned char ch;
  765. const char *p;
  766. int ret, content_length, line_count = 0;
  767. unsigned char *content = NULL;
  768. memset(reply, 0, sizeof(*reply));
  769. /* parse reply (XXX: use buffers) */
  770. rt->last_reply[0] = '\0';
  771. for (;;) {
  772. q = buf;
  773. for (;;) {
  774. ret = url_read_complete(rt->rtsp_hd, &ch, 1);
  775. #ifdef DEBUG_RTP_TCP
  776. dprintf(s, "ret=%d c=%02x [%c]\n", ret, ch, ch);
  777. #endif
  778. if (ret != 1)
  779. return AVERROR_EOF;
  780. if (ch == '\n')
  781. break;
  782. if (ch == '$') {
  783. /* XXX: only parse it if first char on line ? */
  784. if (return_on_interleaved_data) {
  785. return 1;
  786. } else
  787. ff_rtsp_skip_packet(s);
  788. } else if (ch != '\r') {
  789. if ((q - buf) < sizeof(buf) - 1)
  790. *q++ = ch;
  791. }
  792. }
  793. *q = '\0';
  794. dprintf(s, "line='%s'\n", buf);
  795. /* test if last line */
  796. if (buf[0] == '\0')
  797. break;
  798. p = buf;
  799. if (line_count == 0) {
  800. /* get reply code */
  801. get_word(buf1, sizeof(buf1), &p);
  802. get_word(buf1, sizeof(buf1), &p);
  803. reply->status_code = atoi(buf1);
  804. av_strlcpy(reply->reason, p, sizeof(reply->reason));
  805. } else {
  806. ff_rtsp_parse_line(reply, p, rt, method);
  807. av_strlcat(rt->last_reply, p, sizeof(rt->last_reply));
  808. av_strlcat(rt->last_reply, "\n", sizeof(rt->last_reply));
  809. }
  810. line_count++;
  811. }
  812. if (rt->session_id[0] == '\0' && reply->session_id[0] != '\0')
  813. av_strlcpy(rt->session_id, reply->session_id, sizeof(rt->session_id));
  814. content_length = reply->content_length;
  815. if (content_length > 0) {
  816. /* leave some room for a trailing '\0' (useful for simple parsing) */
  817. content = av_malloc(content_length + 1);
  818. (void)url_read_complete(rt->rtsp_hd, content, content_length);
  819. content[content_length] = '\0';
  820. }
  821. if (content_ptr)
  822. *content_ptr = content;
  823. else
  824. av_free(content);
  825. if (rt->seq != reply->seq) {
  826. av_log(s, AV_LOG_WARNING, "CSeq %d expected, %d received.\n",
  827. rt->seq, reply->seq);
  828. }
  829. /* EOS */
  830. if (reply->notice == 2101 /* End-of-Stream Reached */ ||
  831. reply->notice == 2104 /* Start-of-Stream Reached */ ||
  832. reply->notice == 2306 /* Continuous Feed Terminated */) {
  833. rt->state = RTSP_STATE_IDLE;
  834. } else if (reply->notice >= 4400 && reply->notice < 5500) {
  835. return AVERROR(EIO); /* data or server error */
  836. } else if (reply->notice == 2401 /* Ticket Expired */ ||
  837. (reply->notice >= 5500 && reply->notice < 5600) /* end of term */ )
  838. return AVERROR(EPERM);
  839. return 0;
  840. }
  841. int ff_rtsp_send_cmd_with_content_async(AVFormatContext *s,
  842. const char *method, const char *url,
  843. const char *headers,
  844. const unsigned char *send_content,
  845. int send_content_length)
  846. {
  847. RTSPState *rt = s->priv_data;
  848. char buf[4096], *out_buf;
  849. char base64buf[AV_BASE64_SIZE(sizeof(buf))];
  850. /* Add in RTSP headers */
  851. out_buf = buf;
  852. rt->seq++;
  853. snprintf(buf, sizeof(buf), "%s %s RTSP/1.0\r\n", method, url);
  854. if (headers)
  855. av_strlcat(buf, headers, sizeof(buf));
  856. av_strlcatf(buf, sizeof(buf), "CSeq: %d\r\n", rt->seq);
  857. if (rt->session_id[0] != '\0' && (!headers ||
  858. !strstr(headers, "\nIf-Match:"))) {
  859. av_strlcatf(buf, sizeof(buf), "Session: %s\r\n", rt->session_id);
  860. }
  861. if (rt->auth[0]) {
  862. char *str = ff_http_auth_create_response(&rt->auth_state,
  863. rt->auth, url, method);
  864. if (str)
  865. av_strlcat(buf, str, sizeof(buf));
  866. av_free(str);
  867. }
  868. if (send_content_length > 0 && send_content)
  869. av_strlcatf(buf, sizeof(buf), "Content-Length: %d\r\n", send_content_length);
  870. av_strlcat(buf, "\r\n", sizeof(buf));
  871. /* base64 encode rtsp if tunneling */
  872. if (rt->control_transport == RTSP_MODE_TUNNEL) {
  873. av_base64_encode(base64buf, sizeof(base64buf), buf, strlen(buf));
  874. out_buf = base64buf;
  875. }
  876. dprintf(s, "Sending:\n%s--\n", buf);
  877. url_write(rt->rtsp_hd_out, out_buf, strlen(out_buf));
  878. if (send_content_length > 0 && send_content) {
  879. if (rt->control_transport == RTSP_MODE_TUNNEL) {
  880. av_log(s, AV_LOG_ERROR, "tunneling of RTSP requests "
  881. "with content data not supported\n");
  882. return AVERROR_PATCHWELCOME;
  883. }
  884. url_write(rt->rtsp_hd_out, send_content, send_content_length);
  885. }
  886. rt->last_cmd_time = av_gettime();
  887. return 0;
  888. }
  889. int ff_rtsp_send_cmd_async(AVFormatContext *s, const char *method,
  890. const char *url, const char *headers)
  891. {
  892. return ff_rtsp_send_cmd_with_content_async(s, method, url, headers, NULL, 0);
  893. }
  894. int ff_rtsp_send_cmd(AVFormatContext *s, const char *method, const char *url,
  895. const char *headers, RTSPMessageHeader *reply,
  896. unsigned char **content_ptr)
  897. {
  898. return ff_rtsp_send_cmd_with_content(s, method, url, headers, reply,
  899. content_ptr, NULL, 0);
  900. }
  901. int ff_rtsp_send_cmd_with_content(AVFormatContext *s,
  902. const char *method, const char *url,
  903. const char *header,
  904. RTSPMessageHeader *reply,
  905. unsigned char **content_ptr,
  906. const unsigned char *send_content,
  907. int send_content_length)
  908. {
  909. RTSPState *rt = s->priv_data;
  910. HTTPAuthType cur_auth_type;
  911. int ret;
  912. retry:
  913. cur_auth_type = rt->auth_state.auth_type;
  914. if ((ret = ff_rtsp_send_cmd_with_content_async(s, method, url, header,
  915. send_content,
  916. send_content_length)))
  917. return ret;
  918. if ((ret = ff_rtsp_read_reply(s, reply, content_ptr, 0, method) ) < 0)
  919. return ret;
  920. if (reply->status_code == 401 && cur_auth_type == HTTP_AUTH_NONE &&
  921. rt->auth_state.auth_type != HTTP_AUTH_NONE)
  922. goto retry;
  923. if (reply->status_code > 400){
  924. av_log(s, AV_LOG_ERROR, "method %s failed: %d%s\n",
  925. method,
  926. reply->status_code,
  927. reply->reason);
  928. av_log(s, AV_LOG_DEBUG, "%s\n", rt->last_reply);
  929. }
  930. return 0;
  931. }
  932. /**
  933. * @return 0 on success, <0 on error, 1 if protocol is unavailable.
  934. */
  935. static int make_setup_request(AVFormatContext *s, const char *host, int port,
  936. int lower_transport, const char *real_challenge)
  937. {
  938. RTSPState *rt = s->priv_data;
  939. int rtx, j, i, err, interleave = 0;
  940. RTSPStream *rtsp_st;
  941. RTSPMessageHeader reply1, *reply = &reply1;
  942. char cmd[2048];
  943. const char *trans_pref;
  944. if (rt->transport == RTSP_TRANSPORT_RDT)
  945. trans_pref = "x-pn-tng";
  946. else
  947. trans_pref = "RTP/AVP";
  948. /* default timeout: 1 minute */
  949. rt->timeout = 60;
  950. /* for each stream, make the setup request */
  951. /* XXX: we assume the same server is used for the control of each
  952. * RTSP stream */
  953. for (j = RTSP_RTP_PORT_MIN, i = 0; i < rt->nb_rtsp_streams; ++i) {
  954. char transport[2048];
  955. /**
  956. * WMS serves all UDP data over a single connection, the RTX, which
  957. * isn't necessarily the first in the SDP but has to be the first
  958. * to be set up, else the second/third SETUP will fail with a 461.
  959. */
  960. if (lower_transport == RTSP_LOWER_TRANSPORT_UDP &&
  961. rt->server_type == RTSP_SERVER_WMS) {
  962. if (i == 0) {
  963. /* rtx first */
  964. for (rtx = 0; rtx < rt->nb_rtsp_streams; rtx++) {
  965. int len = strlen(rt->rtsp_streams[rtx]->control_url);
  966. if (len >= 4 &&
  967. !strcmp(rt->rtsp_streams[rtx]->control_url + len - 4,
  968. "/rtx"))
  969. break;
  970. }
  971. if (rtx == rt->nb_rtsp_streams)
  972. return -1; /* no RTX found */
  973. rtsp_st = rt->rtsp_streams[rtx];
  974. } else
  975. rtsp_st = rt->rtsp_streams[i > rtx ? i : i - 1];
  976. } else
  977. rtsp_st = rt->rtsp_streams[i];
  978. /* RTP/UDP */
  979. if (lower_transport == RTSP_LOWER_TRANSPORT_UDP) {
  980. char buf[256];
  981. if (rt->server_type == RTSP_SERVER_WMS && i > 1) {
  982. port = reply->transports[0].client_port_min;
  983. goto have_port;
  984. }
  985. /* first try in specified port range */
  986. if (RTSP_RTP_PORT_MIN != 0) {
  987. while (j <= RTSP_RTP_PORT_MAX) {
  988. ff_url_join(buf, sizeof(buf), "rtp", NULL, host, -1,
  989. "?localport=%d", j);
  990. /* we will use two ports per rtp stream (rtp and rtcp) */
  991. j += 2;
  992. if (url_open(&rtsp_st->rtp_handle, buf, URL_RDWR) == 0)
  993. goto rtp_opened;
  994. }
  995. }
  996. #if 0
  997. /* then try on any port */
  998. if (url_open(&rtsp_st->rtp_handle, "rtp://", URL_RDONLY) < 0) {
  999. err = AVERROR_INVALIDDATA;
  1000. goto fail;
  1001. }
  1002. #endif
  1003. rtp_opened:
  1004. port = rtp_get_local_rtp_port(rtsp_st->rtp_handle);
  1005. have_port:
  1006. snprintf(transport, sizeof(transport) - 1,
  1007. "%s/UDP;", trans_pref);
  1008. if (rt->server_type != RTSP_SERVER_REAL)
  1009. av_strlcat(transport, "unicast;", sizeof(transport));
  1010. av_strlcatf(transport, sizeof(transport),
  1011. "client_port=%d", port);
  1012. if (rt->transport == RTSP_TRANSPORT_RTP &&
  1013. !(rt->server_type == RTSP_SERVER_WMS && i > 0))
  1014. av_strlcatf(transport, sizeof(transport), "-%d", port + 1);
  1015. }
  1016. /* RTP/TCP */
  1017. else if (lower_transport == RTSP_LOWER_TRANSPORT_TCP) {
  1018. /** For WMS streams, the application streams are only used for
  1019. * UDP. When trying to set it up for TCP streams, the server
  1020. * will return an error. Therefore, we skip those streams. */
  1021. if (rt->server_type == RTSP_SERVER_WMS &&
  1022. s->streams[rtsp_st->stream_index]->codec->codec_type ==
  1023. AVMEDIA_TYPE_DATA)
  1024. continue;
  1025. snprintf(transport, sizeof(transport) - 1,
  1026. "%s/TCP;", trans_pref);
  1027. if (rt->server_type == RTSP_SERVER_WMS)
  1028. av_strlcat(transport, "unicast;", sizeof(transport));
  1029. av_strlcatf(transport, sizeof(transport),
  1030. "interleaved=%d-%d",
  1031. interleave, interleave + 1);
  1032. interleave += 2;
  1033. }
  1034. else if (lower_transport == RTSP_LOWER_TRANSPORT_UDP_MULTICAST) {
  1035. snprintf(transport, sizeof(transport) - 1,
  1036. "%s/UDP;multicast", trans_pref);
  1037. }
  1038. if (s->oformat) {
  1039. av_strlcat(transport, ";mode=receive", sizeof(transport));
  1040. } else if (rt->server_type == RTSP_SERVER_REAL ||
  1041. rt->server_type == RTSP_SERVER_WMS)
  1042. av_strlcat(transport, ";mode=play", sizeof(transport));
  1043. snprintf(cmd, sizeof(cmd),
  1044. "Transport: %s\r\n",
  1045. transport);
  1046. if (i == 0 && rt->server_type == RTSP_SERVER_REAL && CONFIG_RTPDEC) {
  1047. char real_res[41], real_csum[9];
  1048. ff_rdt_calc_response_and_checksum(real_res, real_csum,
  1049. real_challenge);
  1050. av_strlcatf(cmd, sizeof(cmd),
  1051. "If-Match: %s\r\n"
  1052. "RealChallenge2: %s, sd=%s\r\n",
  1053. rt->session_id, real_res, real_csum);
  1054. }
  1055. ff_rtsp_send_cmd(s, "SETUP", rtsp_st->control_url, cmd, reply, NULL);
  1056. if (reply->status_code == 461 /* Unsupported protocol */ && i == 0) {
  1057. err = 1;
  1058. goto fail;
  1059. } else if (reply->status_code != RTSP_STATUS_OK ||
  1060. reply->nb_transports != 1) {
  1061. err = AVERROR_INVALIDDATA;
  1062. goto fail;
  1063. }
  1064. /* XXX: same protocol for all streams is required */
  1065. if (i > 0) {
  1066. if (reply->transports[0].lower_transport != rt->lower_transport ||
  1067. reply->transports[0].transport != rt->transport) {
  1068. err = AVERROR_INVALIDDATA;
  1069. goto fail;
  1070. }
  1071. } else {
  1072. rt->lower_transport = reply->transports[0].lower_transport;
  1073. rt->transport = reply->transports[0].transport;
  1074. }
  1075. /* Fail if the server responded with another lower transport mode
  1076. * than what we requested. */
  1077. if (reply->transports[0].lower_transport != lower_transport) {
  1078. av_log(s, AV_LOG_ERROR, "Nonmatching transport in server reply\n");
  1079. err = AVERROR_INVALIDDATA;
  1080. goto fail;
  1081. }
  1082. switch(reply->transports[0].lower_transport) {
  1083. case RTSP_LOWER_TRANSPORT_TCP:
  1084. rtsp_st->interleaved_min = reply->transports[0].interleaved_min;
  1085. rtsp_st->interleaved_max = reply->transports[0].interleaved_max;
  1086. break;
  1087. case RTSP_LOWER_TRANSPORT_UDP: {
  1088. char url[1024];
  1089. /* Use source address if specified */
  1090. if (reply->transports[0].source[0]) {
  1091. ff_url_join(url, sizeof(url), "rtp", NULL,
  1092. reply->transports[0].source,
  1093. reply->transports[0].server_port_min, NULL);
  1094. } else {
  1095. ff_url_join(url, sizeof(url), "rtp", NULL, host,
  1096. reply->transports[0].server_port_min, NULL);
  1097. }
  1098. if (!(rt->server_type == RTSP_SERVER_WMS && i > 1) &&
  1099. rtp_set_remote_url(rtsp_st->rtp_handle, url) < 0) {
  1100. err = AVERROR_INVALIDDATA;
  1101. goto fail;
  1102. }
  1103. /* Try to initialize the connection state in a
  1104. * potential NAT router by sending dummy packets.
  1105. * RTP/RTCP dummy packets are used for RDT, too.
  1106. */
  1107. if (!(rt->server_type == RTSP_SERVER_WMS && i > 1) && s->iformat &&
  1108. CONFIG_RTPDEC)
  1109. rtp_send_punch_packets(rtsp_st->rtp_handle);
  1110. break;
  1111. }
  1112. case RTSP_LOWER_TRANSPORT_UDP_MULTICAST: {
  1113. char url[1024], namebuf[50];
  1114. struct sockaddr_storage addr;
  1115. int port, ttl;
  1116. if (reply->transports[0].destination.ss_family) {
  1117. addr = reply->transports[0].destination;
  1118. port = reply->transports[0].port_min;
  1119. ttl = reply->transports[0].ttl;
  1120. } else {
  1121. addr = rtsp_st->sdp_ip;
  1122. port = rtsp_st->sdp_port;
  1123. ttl = rtsp_st->sdp_ttl;
  1124. }
  1125. getnameinfo((struct sockaddr*) &addr, sizeof(addr),
  1126. namebuf, sizeof(namebuf), NULL, 0, NI_NUMERICHOST);
  1127. ff_url_join(url, sizeof(url), "rtp", NULL, namebuf,
  1128. port, "?ttl=%d", ttl);
  1129. if (url_open(&rtsp_st->rtp_handle, url, URL_RDWR) < 0) {
  1130. err = AVERROR_INVALIDDATA;
  1131. goto fail;
  1132. }
  1133. break;
  1134. }
  1135. }
  1136. if ((err = rtsp_open_transport_ctx(s, rtsp_st)))
  1137. goto fail;
  1138. }
  1139. if (reply->timeout > 0)
  1140. rt->timeout = reply->timeout;
  1141. if (rt->server_type == RTSP_SERVER_REAL)
  1142. rt->need_subscription = 1;
  1143. return 0;
  1144. fail:
  1145. for (i = 0; i < rt->nb_rtsp_streams; i++) {
  1146. if (rt->rtsp_streams[i]->rtp_handle) {
  1147. url_close(rt->rtsp_streams[i]->rtp_handle);
  1148. rt->rtsp_streams[i]->rtp_handle = NULL;
  1149. }
  1150. }
  1151. return err;
  1152. }
  1153. void ff_rtsp_close_connections(AVFormatContext *s)
  1154. {
  1155. RTSPState *rt = s->priv_data;
  1156. if (rt->rtsp_hd_out != rt->rtsp_hd) url_close(rt->rtsp_hd_out);
  1157. url_close(rt->rtsp_hd);
  1158. rt->rtsp_hd = rt->rtsp_hd_out = NULL;
  1159. }
  1160. int ff_rtsp_connect(AVFormatContext *s)
  1161. {
  1162. RTSPState *rt = s->priv_data;
  1163. char host[1024], path[1024], tcpname[1024], cmd[2048], auth[128];
  1164. char *option_list, *option, *filename;
  1165. int port, err, tcp_fd;
  1166. RTSPMessageHeader reply1 = {0}, *reply = &reply1;
  1167. int lower_transport_mask = 0;
  1168. char real_challenge[64];
  1169. struct sockaddr_storage peer;
  1170. socklen_t peer_len = sizeof(peer);
  1171. if (!ff_network_init())
  1172. return AVERROR(EIO);
  1173. redirect:
  1174. rt->control_transport = RTSP_MODE_PLAIN;
  1175. /* extract hostname and port */
  1176. av_url_split(NULL, 0, auth, sizeof(auth),
  1177. host, sizeof(host), &port, path, sizeof(path), s->filename);
  1178. if (*auth) {
  1179. av_strlcpy(rt->auth, auth, sizeof(rt->auth));
  1180. }
  1181. if (port < 0)
  1182. port = RTSP_DEFAULT_PORT;
  1183. /* search for options */
  1184. option_list = strrchr(path, '?');
  1185. if (option_list) {
  1186. /* Strip out the RTSP specific options, write out the rest of
  1187. * the options back into the same string. */
  1188. filename = option_list;
  1189. while (option_list) {
  1190. /* move the option pointer */
  1191. option = ++option_list;
  1192. option_list = strchr(option_list, '&');
  1193. if (option_list)
  1194. *option_list = 0;
  1195. /* handle the options */
  1196. if (!strcmp(option, "udp")) {
  1197. lower_transport_mask |= (1<< RTSP_LOWER_TRANSPORT_UDP);
  1198. } else if (!strcmp(option, "multicast")) {
  1199. lower_transport_mask |= (1<< RTSP_LOWER_TRANSPORT_UDP_MULTICAST);
  1200. } else if (!strcmp(option, "tcp")) {
  1201. lower_transport_mask |= (1<< RTSP_LOWER_TRANSPORT_TCP);
  1202. } else if(!strcmp(option, "http")) {
  1203. lower_transport_mask |= (1<< RTSP_LOWER_TRANSPORT_TCP);
  1204. rt->control_transport = RTSP_MODE_TUNNEL;
  1205. } else {
  1206. /* Write options back into the buffer, using memmove instead
  1207. * of strcpy since the strings may overlap. */
  1208. int len = strlen(option);
  1209. memmove(++filename, option, len);
  1210. filename += len;
  1211. if (option_list) *filename = '&';
  1212. }
  1213. }
  1214. *filename = 0;
  1215. }
  1216. if (!lower_transport_mask)
  1217. lower_transport_mask = (1 << RTSP_LOWER_TRANSPORT_NB) - 1;
  1218. if (s->oformat) {
  1219. /* Only UDP or TCP - UDP multicast isn't supported. */
  1220. lower_transport_mask &= (1 << RTSP_LOWER_TRANSPORT_UDP) |
  1221. (1 << RTSP_LOWER_TRANSPORT_TCP);
  1222. if (!lower_transport_mask || rt->control_transport == RTSP_MODE_TUNNEL) {
  1223. av_log(s, AV_LOG_ERROR, "Unsupported lower transport method, "
  1224. "only UDP and TCP are supported for output.\n");
  1225. err = AVERROR(EINVAL);
  1226. goto fail;
  1227. }
  1228. }
  1229. /* Construct the URI used in request; this is similar to s->filename,
  1230. * but with authentication credentials removed and RTSP specific options
  1231. * stripped out. */
  1232. ff_url_join(rt->control_uri, sizeof(rt->control_uri), "rtsp", NULL,
  1233. host, port, "%s", path);
  1234. if (rt->control_transport == RTSP_MODE_TUNNEL) {
  1235. /* set up initial handshake for tunneling */
  1236. char httpname[1024];
  1237. char sessioncookie[17];
  1238. char headers[1024];
  1239. ff_url_join(httpname, sizeof(httpname), "http", auth, host, port, "%s", path);
  1240. snprintf(sessioncookie, sizeof(sessioncookie), "%08x%08x",
  1241. av_get_random_seed(), av_get_random_seed());
  1242. /* GET requests */
  1243. if (url_alloc(&rt->rtsp_hd, httpname, URL_RDONLY) < 0) {
  1244. err = AVERROR(EIO);
  1245. goto fail;
  1246. }
  1247. /* generate GET headers */
  1248. snprintf(headers, sizeof(headers),
  1249. "x-sessioncookie: %s\r\n"
  1250. "Accept: application/x-rtsp-tunnelled\r\n"
  1251. "Pragma: no-cache\r\n"
  1252. "Cache-Control: no-cache\r\n",
  1253. sessioncookie);
  1254. ff_http_set_headers(rt->rtsp_hd, headers);
  1255. /* complete the connection */
  1256. if (url_connect(rt->rtsp_hd)) {
  1257. err = AVERROR(EIO);
  1258. goto fail;
  1259. }
  1260. /* POST requests */
  1261. if (url_alloc(&rt->rtsp_hd_out, httpname, URL_WRONLY) < 0 ) {
  1262. err = AVERROR(EIO);
  1263. goto fail;
  1264. }
  1265. /* generate POST headers */
  1266. snprintf(headers, sizeof(headers),
  1267. "x-sessioncookie: %s\r\n"
  1268. "Content-Type: application/x-rtsp-tunnelled\r\n"
  1269. "Pragma: no-cache\r\n"
  1270. "Cache-Control: no-cache\r\n"
  1271. "Content-Length: 32767\r\n"
  1272. "Expires: Sun, 9 Jan 1972 00:00:00 GMT\r\n",
  1273. sessioncookie);
  1274. ff_http_set_headers(rt->rtsp_hd_out, headers);
  1275. ff_http_set_chunked_transfer_encoding(rt->rtsp_hd_out, 0);
  1276. /* Initialize the authentication state for the POST session. The HTTP
  1277. * protocol implementation doesn't properly handle multi-pass
  1278. * authentication for POST requests, since it would require one of
  1279. * the following:
  1280. * - implementing Expect: 100-continue, which many HTTP servers
  1281. * don't support anyway, even less the RTSP servers that do HTTP
  1282. * tunneling
  1283. * - sending the whole POST data until getting a 401 reply specifying
  1284. * what authentication method to use, then resending all that data
  1285. * - waiting for potential 401 replies directly after sending the
  1286. * POST header (waiting for some unspecified time)
  1287. * Therefore, we copy the full auth state, which works for both basic
  1288. * and digest. (For digest, we would have to synchronize the nonce
  1289. * count variable between the two sessions, if we'd do more requests
  1290. * with the original session, though.)
  1291. */
  1292. ff_http_init_auth_state(rt->rtsp_hd_out, rt->rtsp_hd);
  1293. /* complete the connection */
  1294. if (url_connect(rt->rtsp_hd_out)) {
  1295. err = AVERROR(EIO);
  1296. goto fail;
  1297. }
  1298. } else {
  1299. /* open the tcp connection */
  1300. ff_url_join(tcpname, sizeof(tcpname), "tcp", NULL, host, port, NULL);
  1301. if (url_open(&rt->rtsp_hd, tcpname, URL_RDWR) < 0) {
  1302. err = AVERROR(EIO);
  1303. goto fail;
  1304. }
  1305. rt->rtsp_hd_out = rt->rtsp_hd;
  1306. }
  1307. rt->seq = 0;
  1308. tcp_fd = url_get_file_handle(rt->rtsp_hd);
  1309. if (!getpeername(tcp_fd, (struct sockaddr*) &peer, &peer_len)) {
  1310. getnameinfo((struct sockaddr*) &peer, peer_len, host, sizeof(host),
  1311. NULL, 0, NI_NUMERICHOST);
  1312. }
  1313. /* request options supported by the server; this also detects server
  1314. * type */
  1315. for (rt->server_type = RTSP_SERVER_RTP;;) {
  1316. cmd[0] = 0;
  1317. if (rt->server_type == RTSP_SERVER_REAL)
  1318. av_strlcat(cmd,
  1319. /**
  1320. * The following entries are required for proper
  1321. * streaming from a Realmedia server. They are
  1322. * interdependent in some way although we currently
  1323. * don't quite understand how. Values were copied
  1324. * from mplayer SVN r23589.
  1325. * @param CompanyID is a 16-byte ID in base64
  1326. * @param ClientChallenge is a 16-byte ID in hex
  1327. */
  1328. "ClientChallenge: 9e26d33f2984236010ef6253fb1887f7\r\n"
  1329. "PlayerStarttime: [28/03/2003:22:50:23 00:00]\r\n"
  1330. "CompanyID: KnKV4M4I/B2FjJ1TToLycw==\r\n"
  1331. "GUID: 00000000-0000-0000-0000-000000000000\r\n",
  1332. sizeof(cmd));
  1333. ff_rtsp_send_cmd(s, "OPTIONS", rt->control_uri, cmd, reply, NULL);
  1334. if (reply->status_code != RTSP_STATUS_OK) {
  1335. err = AVERROR_INVALIDDATA;
  1336. goto fail;
  1337. }
  1338. /* detect server type if not standard-compliant RTP */
  1339. if (rt->server_type != RTSP_SERVER_REAL && reply->real_challenge[0]) {
  1340. rt->server_type = RTSP_SERVER_REAL;
  1341. continue;
  1342. } else if (!strncasecmp(reply->server, "WMServer/", 9)) {
  1343. rt->server_type = RTSP_SERVER_WMS;
  1344. } else if (rt->server_type == RTSP_SERVER_REAL)
  1345. strcpy(real_challenge, reply->real_challenge);
  1346. break;
  1347. }
  1348. if (s->iformat && CONFIG_RTSP_DEMUXER)
  1349. err = ff_rtsp_setup_input_streams(s, reply);
  1350. else if (CONFIG_RTSP_MUXER)
  1351. err = ff_rtsp_setup_output_streams(s, host);
  1352. if (err)
  1353. goto fail;
  1354. do {
  1355. int lower_transport = ff_log2_tab[lower_transport_mask &
  1356. ~(lower_transport_mask - 1)];
  1357. err = make_setup_request(s, host, port, lower_transport,
  1358. rt->server_type == RTSP_SERVER_REAL ?
  1359. real_challenge : NULL);
  1360. if (err < 0)
  1361. goto fail;
  1362. lower_transport_mask &= ~(1 << lower_transport);
  1363. if (lower_transport_mask == 0 && err == 1) {
  1364. err = FF_NETERROR(EPROTONOSUPPORT);
  1365. goto fail;
  1366. }
  1367. } while (err);
  1368. rt->state = RTSP_STATE_IDLE;
  1369. rt->seek_timestamp = 0; /* default is to start stream at position zero */
  1370. return 0;
  1371. fail:
  1372. ff_rtsp_close_streams(s);
  1373. ff_rtsp_close_connections(s);
  1374. if (reply->status_code >=300 && reply->status_code < 400 && s->iformat) {
  1375. av_strlcpy(s->filename, reply->location, sizeof(s->filename));
  1376. av_log(s, AV_LOG_INFO, "Status %d: Redirecting to %s\n",
  1377. reply->status_code,
  1378. s->filename);
  1379. goto redirect;
  1380. }
  1381. ff_network_close();
  1382. return err;
  1383. }
  1384. #endif /* CONFIG_RTSP_DEMUXER || CONFIG_RTSP_MUXER */
  1385. #if CONFIG_RTPDEC
  1386. static int udp_read_packet(AVFormatContext *s, RTSPStream **prtsp_st,
  1387. uint8_t *buf, int buf_size, int64_t wait_end)
  1388. {
  1389. RTSPState *rt = s->priv_data;
  1390. RTSPStream *rtsp_st;
  1391. fd_set rfds;
  1392. int fd, fd_rtcp, fd_max, n, i, ret, tcp_fd, timeout_cnt = 0;
  1393. struct timeval tv;
  1394. for (;;) {
  1395. if (url_interrupt_cb())
  1396. return AVERROR(EINTR);
  1397. if (wait_end && wait_end - av_gettime() < 0)
  1398. return AVERROR(EAGAIN);
  1399. FD_ZERO(&rfds);
  1400. if (rt->rtsp_hd) {
  1401. tcp_fd = fd_max = url_get_file_handle(rt->rtsp_hd);
  1402. FD_SET(tcp_fd, &rfds);
  1403. } else {
  1404. fd_max = 0;
  1405. tcp_fd = -1;
  1406. }
  1407. for (i = 0; i < rt->nb_rtsp_streams; i++) {
  1408. rtsp_st = rt->rtsp_streams[i];
  1409. if (rtsp_st->rtp_handle) {
  1410. fd = url_get_file_handle(rtsp_st->rtp_handle);
  1411. fd_rtcp = rtp_get_rtcp_file_handle(rtsp_st->rtp_handle);
  1412. if (FFMAX(fd, fd_rtcp) > fd_max)
  1413. fd_max = FFMAX(fd, fd_rtcp);
  1414. FD_SET(fd, &rfds);
  1415. FD_SET(fd_rtcp, &rfds);
  1416. }
  1417. }
  1418. tv.tv_sec = 0;
  1419. tv.tv_usec = SELECT_TIMEOUT_MS * 1000;
  1420. n = select(fd_max + 1, &rfds, NULL, NULL, &tv);
  1421. if (n > 0) {
  1422. timeout_cnt = 0;
  1423. for (i = 0; i < rt->nb_rtsp_streams; i++) {
  1424. rtsp_st = rt->rtsp_streams[i];
  1425. if (rtsp_st->rtp_handle) {
  1426. fd = url_get_file_handle(rtsp_st->rtp_handle);
  1427. fd_rtcp = rtp_get_rtcp_file_handle(rtsp_st->rtp_handle);
  1428. if (FD_ISSET(fd_rtcp, &rfds) || FD_ISSET(fd, &rfds)) {
  1429. ret = url_read(rtsp_st->rtp_handle, buf, buf_size);
  1430. if (ret > 0) {
  1431. *prtsp_st = rtsp_st;
  1432. return ret;
  1433. }
  1434. }
  1435. }
  1436. }
  1437. #if CONFIG_RTSP_DEMUXER
  1438. if (tcp_fd != -1 && FD_ISSET(tcp_fd, &rfds)) {
  1439. RTSPMessageHeader reply;
  1440. ret = ff_rtsp_read_reply(s, &reply, NULL, 0, NULL);
  1441. if (ret < 0)
  1442. return ret;
  1443. /* XXX: parse message */
  1444. if (rt->state != RTSP_STATE_STREAMING)
  1445. return 0;
  1446. }
  1447. #endif
  1448. } else if (n == 0 && ++timeout_cnt >= MAX_TIMEOUTS) {
  1449. return FF_NETERROR(ETIMEDOUT);
  1450. } else if (n < 0 && errno != EINTR)
  1451. return AVERROR(errno);
  1452. }
  1453. }
  1454. int ff_rtsp_fetch_packet(AVFormatContext *s, AVPacket *pkt)
  1455. {
  1456. RTSPState *rt = s->priv_data;
  1457. int ret, len;
  1458. RTSPStream *rtsp_st, *first_queue_st = NULL;
  1459. int64_t wait_end = 0;
  1460. if (rt->nb_byes == rt->nb_rtsp_streams)
  1461. return AVERROR_EOF;
  1462. /* get next frames from the same RTP packet */
  1463. if (rt->cur_transport_priv) {
  1464. if (rt->transport == RTSP_TRANSPORT_RDT) {
  1465. ret = ff_rdt_parse_packet(rt->cur_transport_priv, pkt, NULL, 0);
  1466. } else
  1467. ret = rtp_parse_packet(rt->cur_transport_priv, pkt, NULL, 0);
  1468. if (ret == 0) {
  1469. rt->cur_transport_priv = NULL;
  1470. return 0;
  1471. } else if (ret == 1) {
  1472. return 0;
  1473. } else
  1474. rt->cur_transport_priv = NULL;
  1475. }
  1476. if (rt->transport == RTSP_TRANSPORT_RTP) {
  1477. int i;
  1478. int64_t first_queue_time = 0;
  1479. for (i = 0; i < rt->nb_rtsp_streams; i++) {
  1480. RTPDemuxContext *rtpctx = rt->rtsp_streams[i]->transport_priv;
  1481. int64_t queue_time;
  1482. if (!rtpctx)
  1483. continue;
  1484. queue_time = ff_rtp_queued_packet_time(rtpctx);
  1485. if (queue_time && (queue_time - first_queue_time < 0 ||
  1486. !first_queue_time)) {
  1487. first_queue_time = queue_time;
  1488. first_queue_st = rt->rtsp_streams[i];
  1489. }
  1490. }
  1491. if (first_queue_time)
  1492. wait_end = first_queue_time + s->max_delay;
  1493. }
  1494. /* read next RTP packet */
  1495. redo:
  1496. if (!rt->recvbuf) {
  1497. rt->recvbuf = av_malloc(RECVBUF_SIZE);
  1498. if (!rt->recvbuf)
  1499. return AVERROR(ENOMEM);
  1500. }
  1501. switch(rt->lower_transport) {
  1502. default:
  1503. #if CONFIG_RTSP_DEMUXER
  1504. case RTSP_LOWER_TRANSPORT_TCP:
  1505. len = ff_rtsp_tcp_read_packet(s, &rtsp_st, rt->recvbuf, RECVBUF_SIZE);
  1506. break;
  1507. #endif
  1508. case RTSP_LOWER_TRANSPORT_UDP:
  1509. case RTSP_LOWER_TRANSPORT_UDP_MULTICAST:
  1510. len = udp_read_packet(s, &rtsp_st, rt->recvbuf, RECVBUF_SIZE, wait_end);
  1511. if (len >=0 && rtsp_st->transport_priv && rt->transport == RTSP_TRANSPORT_RTP)
  1512. rtp_check_and_send_back_rr(rtsp_st->transport_priv, len);
  1513. break;
  1514. }
  1515. if (len == AVERROR(EAGAIN) && first_queue_st &&
  1516. rt->transport == RTSP_TRANSPORT_RTP) {
  1517. rtsp_st = first_queue_st;
  1518. ret = rtp_parse_packet(rtsp_st->transport_priv, pkt, NULL, 0);
  1519. goto end;
  1520. }
  1521. if (len < 0)
  1522. return len;
  1523. if (len == 0)
  1524. return AVERROR_EOF;
  1525. if (rt->transport == RTSP_TRANSPORT_RDT) {
  1526. ret = ff_rdt_parse_packet(rtsp_st->transport_priv, pkt, &rt->recvbuf, len);
  1527. } else {
  1528. ret = rtp_parse_packet(rtsp_st->transport_priv, pkt, &rt->recvbuf, len);
  1529. if (ret < 0) {
  1530. /* Either bad packet, or a RTCP packet. Check if the
  1531. * first_rtcp_ntp_time field was initialized. */
  1532. RTPDemuxContext *rtpctx = rtsp_st->transport_priv;
  1533. if (rtpctx->first_rtcp_ntp_time != AV_NOPTS_VALUE) {
  1534. /* first_rtcp_ntp_time has been initialized for this stream,
  1535. * copy the same value to all other uninitialized streams,
  1536. * in order to map their timestamp origin to the same ntp time
  1537. * as this one. */
  1538. int i;
  1539. AVStream *st = NULL;
  1540. if (rtsp_st->stream_index >= 0)
  1541. st = s->streams[rtsp_st->stream_index];
  1542. for (i = 0; i < rt->nb_rtsp_streams; i++) {
  1543. RTPDemuxContext *rtpctx2 = rt->rtsp_streams[i]->transport_priv;
  1544. AVStream *st2 = NULL;
  1545. if (rt->rtsp_streams[i]->stream_index >= 0)
  1546. st2 = s->streams[rt->rtsp_streams[i]->stream_index];
  1547. if (rtpctx2 && st && st2 &&
  1548. rtpctx2->first_rtcp_ntp_time == AV_NOPTS_VALUE) {
  1549. rtpctx2->first_rtcp_ntp_time = rtpctx->first_rtcp_ntp_time;
  1550. rtpctx2->rtcp_ts_offset = av_rescale_q(
  1551. rtpctx->rtcp_ts_offset, st->time_base,
  1552. st2->time_base);
  1553. }
  1554. }
  1555. }
  1556. if (ret == -RTCP_BYE) {
  1557. rt->nb_byes++;
  1558. av_log(s, AV_LOG_DEBUG, "Received BYE for stream %d (%d/%d)\n",
  1559. rtsp_st->stream_index, rt->nb_byes, rt->nb_rtsp_streams);
  1560. if (rt->nb_byes == rt->nb_rtsp_streams)
  1561. return AVERROR_EOF;
  1562. }
  1563. }
  1564. }
  1565. end:
  1566. if (ret < 0)
  1567. goto redo;
  1568. if (ret == 1)
  1569. /* more packets may follow, so we save the RTP context */
  1570. rt->cur_transport_priv = rtsp_st->transport_priv;
  1571. return ret;
  1572. }
  1573. #endif /* CONFIG_RTPDEC */
  1574. #if CONFIG_SDP_DEMUXER
  1575. static int sdp_probe(AVProbeData *p1)
  1576. {
  1577. const char *p = p1->buf, *p_end = p1->buf + p1->buf_size;
  1578. /* we look for a line beginning "c=IN IP" */
  1579. while (p < p_end && *p != '\0') {
  1580. if (p + sizeof("c=IN IP") - 1 < p_end &&
  1581. av_strstart(p, "c=IN IP", NULL))
  1582. return AVPROBE_SCORE_MAX / 2;
  1583. while (p < p_end - 1 && *p != '\n') p++;
  1584. if (++p >= p_end)
  1585. break;
  1586. if (*p == '\r')
  1587. p++;
  1588. }
  1589. return 0;
  1590. }
  1591. static int sdp_read_header(AVFormatContext *s, AVFormatParameters *ap)
  1592. {
  1593. RTSPState *rt = s->priv_data;
  1594. RTSPStream *rtsp_st;
  1595. int size, i, err;
  1596. char *content;
  1597. char url[1024];
  1598. if (!ff_network_init())
  1599. return AVERROR(EIO);
  1600. /* read the whole sdp file */
  1601. /* XXX: better loading */
  1602. content = av_malloc(SDP_MAX_SIZE);
  1603. size = get_buffer(s->pb, content, SDP_MAX_SIZE - 1);
  1604. if (size <= 0) {
  1605. av_free(content);
  1606. return AVERROR_INVALIDDATA;
  1607. }
  1608. content[size] ='\0';
  1609. ff_sdp_parse(s, content);
  1610. av_free(content);
  1611. /* open each RTP stream */
  1612. for (i = 0; i < rt->nb_rtsp_streams; i++) {
  1613. char namebuf[50];
  1614. rtsp_st = rt->rtsp_streams[i];
  1615. getnameinfo((struct sockaddr*) &rtsp_st->sdp_ip, sizeof(rtsp_st->sdp_ip),
  1616. namebuf, sizeof(namebuf), NULL, 0, NI_NUMERICHOST);
  1617. ff_url_join(url, sizeof(url), "rtp", NULL,
  1618. namebuf, rtsp_st->sdp_port,
  1619. "?localport=%d&ttl=%d", rtsp_st->sdp_port,
  1620. rtsp_st->sdp_ttl);
  1621. if (url_open(&rtsp_st->rtp_handle, url, URL_RDWR) < 0) {
  1622. err = AVERROR_INVALIDDATA;
  1623. goto fail;
  1624. }
  1625. if ((err = rtsp_open_transport_ctx(s, rtsp_st)))
  1626. goto fail;
  1627. }
  1628. return 0;
  1629. fail:
  1630. ff_rtsp_close_streams(s);
  1631. ff_network_close();
  1632. return err;
  1633. }
  1634. static int sdp_read_close(AVFormatContext *s)
  1635. {
  1636. ff_rtsp_close_streams(s);
  1637. ff_network_close();
  1638. return 0;
  1639. }
  1640. AVInputFormat sdp_demuxer = {
  1641. "sdp",
  1642. NULL_IF_CONFIG_SMALL("SDP"),
  1643. sizeof(RTSPState),
  1644. sdp_probe,
  1645. sdp_read_header,
  1646. ff_rtsp_fetch_packet,
  1647. sdp_read_close,
  1648. };
  1649. #endif /* CONFIG_SDP_DEMUXER */
  1650. #if CONFIG_RTP_DEMUXER
  1651. static int rtp_probe(AVProbeData *p)
  1652. {
  1653. if (av_strstart(p->filename, "rtp:", NULL))
  1654. return AVPROBE_SCORE_MAX;
  1655. return 0;
  1656. }
  1657. static int rtp_read_header(AVFormatContext *s,
  1658. AVFormatParameters *ap)
  1659. {
  1660. uint8_t recvbuf[1500];
  1661. char host[500], sdp[500];
  1662. int ret, port;
  1663. URLContext* in = NULL;
  1664. int payload_type;
  1665. AVCodecContext codec;
  1666. struct sockaddr_storage addr;
  1667. ByteIOContext pb;
  1668. socklen_t addrlen = sizeof(addr);
  1669. if (!ff_network_init())
  1670. return AVERROR(EIO);
  1671. ret = url_open(&in, s->filename, URL_RDONLY);
  1672. if (ret)
  1673. goto fail;
  1674. while (1) {
  1675. ret = url_read(in, recvbuf, sizeof(recvbuf));
  1676. if (ret == AVERROR(EAGAIN))
  1677. continue;
  1678. if (ret < 0)
  1679. goto fail;
  1680. if (ret < 12) {
  1681. av_log(s, AV_LOG_WARNING, "Received too short packet\n");
  1682. continue;
  1683. }
  1684. if ((recvbuf[0] & 0xc0) != 0x80) {
  1685. av_log(s, AV_LOG_WARNING, "Unsupported RTP version packet "
  1686. "received\n");
  1687. continue;
  1688. }
  1689. payload_type = recvbuf[1] & 0x7f;
  1690. break;
  1691. }
  1692. getsockname(url_get_file_handle(in), (struct sockaddr*) &addr, &addrlen);
  1693. url_close(in);
  1694. in = NULL;
  1695. memset(&codec, 0, sizeof(codec));
  1696. if (ff_rtp_get_codec_info(&codec, payload_type)) {
  1697. av_log(s, AV_LOG_ERROR, "Unable to receive RTP payload type %d "
  1698. "without an SDP file describing it\n",
  1699. payload_type);
  1700. goto fail;
  1701. }
  1702. if (codec.codec_type != AVMEDIA_TYPE_DATA) {
  1703. av_log(s, AV_LOG_WARNING, "Guessing on RTP content - if not received "
  1704. "properly you need an SDP file "
  1705. "describing it\n");
  1706. }
  1707. av_url_split(NULL, 0, NULL, 0, host, sizeof(host), &port,
  1708. NULL, 0, s->filename);
  1709. snprintf(sdp, sizeof(sdp),
  1710. "v=0\r\nc=IN IP%d %s\r\nm=%s %d RTP/AVP %d\r\n",
  1711. addr.ss_family == AF_INET ? 4 : 6, host,
  1712. codec.codec_type == AVMEDIA_TYPE_DATA ? "application" :
  1713. codec.codec_type == AVMEDIA_TYPE_VIDEO ? "video" : "audio",
  1714. port, payload_type);
  1715. av_log(s, AV_LOG_VERBOSE, "SDP:\n%s\n", sdp);
  1716. init_put_byte(&pb, sdp, strlen(sdp), 0, NULL, NULL, NULL, NULL);
  1717. s->pb = &pb;
  1718. /* sdp_read_header initializes this again */
  1719. ff_network_close();
  1720. ret = sdp_read_header(s, ap);
  1721. s->pb = NULL;
  1722. return ret;
  1723. fail:
  1724. if (in)
  1725. url_close(in);
  1726. ff_network_close();
  1727. return ret;
  1728. }
  1729. AVInputFormat rtp_demuxer = {
  1730. "rtp",
  1731. NULL_IF_CONFIG_SMALL("RTP input format"),
  1732. sizeof(RTSPState),
  1733. rtp_probe,
  1734. rtp_read_header,
  1735. ff_rtsp_fetch_packet,
  1736. sdp_read_close,
  1737. .flags = AVFMT_NOFILE,
  1738. };
  1739. #endif /* CONFIG_RTP_DEMUXER */