You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

578 lines
18KB

  1. /*
  2. * RTP network protocol
  3. * Copyright (c) 2002 Fabrice Bellard
  4. *
  5. * This file is part of FFmpeg.
  6. *
  7. * FFmpeg is free software; you can redistribute it and/or
  8. * modify it under the terms of the GNU Lesser General Public
  9. * License as published by the Free Software Foundation; either
  10. * version 2.1 of the License, or (at your option) any later version.
  11. *
  12. * FFmpeg is distributed in the hope that it will be useful,
  13. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  15. * Lesser General Public License for more details.
  16. *
  17. * You should have received a copy of the GNU Lesser General Public
  18. * License along with FFmpeg; if not, write to the Free Software
  19. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
  20. */
  21. /**
  22. * @file
  23. * RTP protocol
  24. */
  25. #include "libavutil/parseutils.h"
  26. #include "libavutil/avstring.h"
  27. #include "avformat.h"
  28. #include "avio_internal.h"
  29. #include "rtp.h"
  30. #include "rtpproto.h"
  31. #include "url.h"
  32. #include <stdarg.h>
  33. #include "internal.h"
  34. #include "network.h"
  35. #include "os_support.h"
  36. #include <fcntl.h>
  37. #if HAVE_POLL_H
  38. #include <sys/poll.h>
  39. #endif
  40. typedef struct RTPContext {
  41. URLContext *rtp_hd, *rtcp_hd;
  42. int rtp_fd, rtcp_fd, nb_ssm_include_addrs, nb_ssm_exclude_addrs;
  43. struct sockaddr_storage **ssm_include_addrs, **ssm_exclude_addrs;
  44. int write_to_source;
  45. struct sockaddr_storage last_rtp_source, last_rtcp_source;
  46. socklen_t last_rtp_source_len, last_rtcp_source_len;
  47. } RTPContext;
  48. /**
  49. * If no filename is given to av_open_input_file because you want to
  50. * get the local port first, then you must call this function to set
  51. * the remote server address.
  52. *
  53. * @param h media file context
  54. * @param uri of the remote server
  55. * @return zero if no error.
  56. */
  57. int ff_rtp_set_remote_url(URLContext *h, const char *uri)
  58. {
  59. RTPContext *s = h->priv_data;
  60. char hostname[256];
  61. int port, rtcp_port;
  62. const char *p;
  63. char buf[1024];
  64. char path[1024];
  65. av_url_split(NULL, 0, NULL, 0, hostname, sizeof(hostname), &port,
  66. path, sizeof(path), uri);
  67. rtcp_port = port + 1;
  68. p = strchr(uri, '?');
  69. if (p) {
  70. if (av_find_info_tag(buf, sizeof(buf), "rtcpport", p)) {
  71. rtcp_port = strtol(buf, NULL, 10);
  72. }
  73. }
  74. ff_url_join(buf, sizeof(buf), "udp", NULL, hostname, port, "%s", path);
  75. ff_udp_set_remote_url(s->rtp_hd, buf);
  76. ff_url_join(buf, sizeof(buf), "udp", NULL, hostname, rtcp_port, "%s", path);
  77. ff_udp_set_remote_url(s->rtcp_hd, buf);
  78. return 0;
  79. }
  80. static struct addrinfo* rtp_resolve_host(const char *hostname, int port,
  81. int type, int family, int flags)
  82. {
  83. struct addrinfo hints = { 0 }, *res = 0;
  84. int error;
  85. char service[16];
  86. snprintf(service, sizeof(service), "%d", port);
  87. hints.ai_socktype = type;
  88. hints.ai_family = family;
  89. hints.ai_flags = flags;
  90. if ((error = getaddrinfo(hostname, service, &hints, &res))) {
  91. res = NULL;
  92. av_log(NULL, AV_LOG_ERROR, "rtp_resolve_host: %s\n", gai_strerror(error));
  93. }
  94. return res;
  95. }
  96. static int compare_addr(const struct sockaddr_storage *a,
  97. const struct sockaddr_storage *b)
  98. {
  99. if (a->ss_family != b->ss_family)
  100. return 1;
  101. if (a->ss_family == AF_INET) {
  102. return (((const struct sockaddr_in *)a)->sin_addr.s_addr !=
  103. ((const struct sockaddr_in *)b)->sin_addr.s_addr);
  104. }
  105. #if HAVE_STRUCT_SOCKADDR_IN6
  106. if (a->ss_family == AF_INET6) {
  107. const uint8_t *s6_addr_a = ((const struct sockaddr_in6 *)a)->sin6_addr.s6_addr;
  108. const uint8_t *s6_addr_b = ((const struct sockaddr_in6 *)b)->sin6_addr.s6_addr;
  109. return memcmp(s6_addr_a, s6_addr_b, 16);
  110. }
  111. #endif
  112. return 1;
  113. }
  114. static int get_port(const struct sockaddr_storage *ss)
  115. {
  116. if (ss->ss_family == AF_INET)
  117. return ntohs(((const struct sockaddr_in *)ss)->sin_port);
  118. #if HAVE_STRUCT_SOCKADDR_IN6
  119. if (ss->ss_family == AF_INET6)
  120. return ntohs(((const struct sockaddr_in6 *)ss)->sin6_port);
  121. #endif
  122. return 0;
  123. }
  124. static void set_port(struct sockaddr_storage *ss, int port)
  125. {
  126. if (ss->ss_family == AF_INET)
  127. ((struct sockaddr_in *)ss)->sin_port = htons(port);
  128. #if HAVE_STRUCT_SOCKADDR_IN6
  129. else if (ss->ss_family == AF_INET6)
  130. ((struct sockaddr_in6 *)ss)->sin6_port = htons(port);
  131. #endif
  132. }
  133. static int rtp_check_source_lists(RTPContext *s, struct sockaddr_storage *source_addr_ptr)
  134. {
  135. int i;
  136. if (s->nb_ssm_exclude_addrs) {
  137. for (i = 0; i < s->nb_ssm_exclude_addrs; i++) {
  138. if (!compare_addr(source_addr_ptr, s->ssm_exclude_addrs[i]))
  139. return 1;
  140. }
  141. }
  142. if (s->nb_ssm_include_addrs) {
  143. for (i = 0; i < s->nb_ssm_include_addrs; i++) {
  144. if (!compare_addr(source_addr_ptr, s->ssm_include_addrs[i]))
  145. return 0;
  146. }
  147. return 1;
  148. }
  149. return 0;
  150. }
  151. /**
  152. * add option to url of the form:
  153. * "http://host:port/path?option1=val1&option2=val2...
  154. */
  155. static av_printf_format(3, 4) void url_add_option(char *buf, int buf_size, const char *fmt, ...)
  156. {
  157. char buf1[1024];
  158. va_list ap;
  159. va_start(ap, fmt);
  160. if (strchr(buf, '?'))
  161. av_strlcat(buf, "&", buf_size);
  162. else
  163. av_strlcat(buf, "?", buf_size);
  164. vsnprintf(buf1, sizeof(buf1), fmt, ap);
  165. av_strlcat(buf, buf1, buf_size);
  166. va_end(ap);
  167. }
  168. static void build_udp_url(char *buf, int buf_size,
  169. const char *hostname, int port,
  170. int local_port, int ttl,
  171. int max_packet_size, int connect,
  172. int dscp,
  173. const char *include_sources,
  174. const char *exclude_sources)
  175. {
  176. ff_url_join(buf, buf_size, "udp", NULL, hostname, port, NULL);
  177. if (local_port >= 0)
  178. url_add_option(buf, buf_size, "localport=%d", local_port);
  179. if (ttl >= 0)
  180. url_add_option(buf, buf_size, "ttl=%d", ttl);
  181. if (max_packet_size >=0)
  182. url_add_option(buf, buf_size, "pkt_size=%d", max_packet_size);
  183. if (connect)
  184. url_add_option(buf, buf_size, "connect=1");
  185. if (dscp >= 0)
  186. url_add_option(buf, buf_size, "dscp=%d", dscp);
  187. url_add_option(buf, buf_size, "fifo_size=0");
  188. if (include_sources && include_sources[0])
  189. url_add_option(buf, buf_size, "sources=%s", include_sources);
  190. if (exclude_sources && exclude_sources[0])
  191. url_add_option(buf, buf_size, "block=%s", exclude_sources);
  192. }
  193. static void rtp_parse_addr_list(URLContext *h, char *buf,
  194. struct sockaddr_storage ***address_list_ptr,
  195. int *address_list_size_ptr)
  196. {
  197. struct addrinfo *ai = NULL;
  198. struct sockaddr_storage *source_addr;
  199. char tmp = '\0', *p = buf, *next;
  200. /* Resolve all of the IPs */
  201. while (p && p[0]) {
  202. next = strchr(p, ',');
  203. if (next) {
  204. tmp = *next;
  205. *next = '\0';
  206. }
  207. ai = rtp_resolve_host(p, 0, SOCK_DGRAM, AF_UNSPEC, 0);
  208. if (ai) {
  209. source_addr = av_mallocz(sizeof(struct sockaddr_storage));
  210. if (!source_addr) {
  211. freeaddrinfo(ai);
  212. break;
  213. }
  214. memcpy(source_addr, ai->ai_addr, ai->ai_addrlen);
  215. freeaddrinfo(ai);
  216. dynarray_add(address_list_ptr, address_list_size_ptr, source_addr);
  217. } else {
  218. av_log(h, AV_LOG_WARNING, "Unable to resolve %s\n", p);
  219. }
  220. if (next) {
  221. *next = tmp;
  222. p = next + 1;
  223. } else {
  224. p = NULL;
  225. }
  226. }
  227. }
  228. /**
  229. * url syntax: rtp://host:port[?option=val...]
  230. * option: 'ttl=n' : set the ttl value (for multicast only)
  231. * 'rtcpport=n' : set the remote rtcp port to n
  232. * 'localrtpport=n' : set the local rtp port to n
  233. * 'localrtcpport=n' : set the local rtcp port to n
  234. * 'pkt_size=n' : set max packet size
  235. * 'connect=0/1' : do a connect() on the UDP socket
  236. * 'sources=ip[,ip]' : list allowed source IP addresses
  237. * 'block=ip[,ip]' : list disallowed source IP addresses
  238. * 'write_to_source=0/1' : send packets to the source address of the latest received packet
  239. * 'dscp=n' : set DSCP value to n (QoS)
  240. * deprecated option:
  241. * 'localport=n' : set the local port to n
  242. *
  243. * if rtcpport isn't set the rtcp port will be the rtp port + 1
  244. * if local rtp port isn't set any available port will be used for the local
  245. * rtp and rtcp ports
  246. * if the local rtcp port is not set it will be the local rtp port + 1
  247. */
  248. static int rtp_open(URLContext *h, const char *uri, int flags)
  249. {
  250. RTPContext *s = h->priv_data;
  251. int rtp_port, rtcp_port,
  252. ttl, connect,
  253. local_rtp_port, local_rtcp_port, max_packet_size, dscp;
  254. char hostname[256], include_sources[1024] = "", exclude_sources[1024] = "";
  255. char buf[1024];
  256. char path[1024];
  257. const char *p;
  258. int i, max_retry_count = 3;
  259. av_url_split(NULL, 0, NULL, 0, hostname, sizeof(hostname), &rtp_port,
  260. path, sizeof(path), uri);
  261. /* extract parameters */
  262. ttl = -1;
  263. rtcp_port = rtp_port+1;
  264. local_rtp_port = -1;
  265. local_rtcp_port = -1;
  266. max_packet_size = -1;
  267. connect = 0;
  268. dscp = -1;
  269. p = strchr(uri, '?');
  270. if (p) {
  271. if (av_find_info_tag(buf, sizeof(buf), "ttl", p)) {
  272. ttl = strtol(buf, NULL, 10);
  273. }
  274. if (av_find_info_tag(buf, sizeof(buf), "rtcpport", p)) {
  275. rtcp_port = strtol(buf, NULL, 10);
  276. }
  277. if (av_find_info_tag(buf, sizeof(buf), "localport", p)) {
  278. local_rtp_port = strtol(buf, NULL, 10);
  279. }
  280. if (av_find_info_tag(buf, sizeof(buf), "localrtpport", p)) {
  281. local_rtp_port = strtol(buf, NULL, 10);
  282. }
  283. if (av_find_info_tag(buf, sizeof(buf), "localrtcpport", p)) {
  284. local_rtcp_port = strtol(buf, NULL, 10);
  285. }
  286. if (av_find_info_tag(buf, sizeof(buf), "pkt_size", p)) {
  287. max_packet_size = strtol(buf, NULL, 10);
  288. }
  289. if (av_find_info_tag(buf, sizeof(buf), "connect", p)) {
  290. connect = strtol(buf, NULL, 10);
  291. }
  292. if (av_find_info_tag(buf, sizeof(buf), "write_to_source", p)) {
  293. s->write_to_source = strtol(buf, NULL, 10);
  294. }
  295. if (av_find_info_tag(buf, sizeof(buf), "dscp", p)) {
  296. dscp = strtol(buf, NULL, 10);
  297. }
  298. if (av_find_info_tag(buf, sizeof(buf), "sources", p)) {
  299. av_strlcpy(include_sources, buf, sizeof(include_sources));
  300. rtp_parse_addr_list(h, buf, &s->ssm_include_addrs, &s->nb_ssm_include_addrs);
  301. }
  302. if (av_find_info_tag(buf, sizeof(buf), "block", p)) {
  303. av_strlcpy(exclude_sources, buf, sizeof(exclude_sources));
  304. rtp_parse_addr_list(h, buf, &s->ssm_exclude_addrs, &s->nb_ssm_exclude_addrs);
  305. }
  306. }
  307. for (i = 0;i < max_retry_count;i++) {
  308. build_udp_url(buf, sizeof(buf),
  309. hostname, rtp_port, local_rtp_port, ttl, max_packet_size,
  310. connect, dscp, include_sources, exclude_sources);
  311. if (ffurl_open(&s->rtp_hd, buf, flags, &h->interrupt_callback, NULL) < 0)
  312. goto fail;
  313. local_rtp_port = ff_udp_get_local_port(s->rtp_hd);
  314. if(local_rtp_port == 65535) {
  315. local_rtp_port = -1;
  316. continue;
  317. }
  318. if (local_rtcp_port<0) {
  319. local_rtcp_port = local_rtp_port + 1;
  320. build_udp_url(buf, sizeof(buf),
  321. hostname, rtcp_port, local_rtcp_port, ttl, max_packet_size,
  322. connect, dscp, include_sources, exclude_sources);
  323. if (ffurl_open(&s->rtcp_hd, buf, flags, &h->interrupt_callback, NULL) < 0) {
  324. local_rtp_port = local_rtcp_port = -1;
  325. continue;
  326. }
  327. break;
  328. }
  329. build_udp_url(buf, sizeof(buf),
  330. hostname, rtcp_port, local_rtcp_port, ttl, max_packet_size,
  331. connect, dscp, include_sources, exclude_sources);
  332. if (ffurl_open(&s->rtcp_hd, buf, flags, &h->interrupt_callback, NULL) < 0)
  333. goto fail;
  334. break;
  335. }
  336. /* just to ease handle access. XXX: need to suppress direct handle
  337. access */
  338. s->rtp_fd = ffurl_get_file_handle(s->rtp_hd);
  339. s->rtcp_fd = ffurl_get_file_handle(s->rtcp_hd);
  340. h->max_packet_size = s->rtp_hd->max_packet_size;
  341. h->is_streamed = 1;
  342. return 0;
  343. fail:
  344. if (s->rtp_hd)
  345. ffurl_close(s->rtp_hd);
  346. if (s->rtcp_hd)
  347. ffurl_close(s->rtcp_hd);
  348. return AVERROR(EIO);
  349. }
  350. static int rtp_read(URLContext *h, uint8_t *buf, int size)
  351. {
  352. RTPContext *s = h->priv_data;
  353. int len, n, i;
  354. struct pollfd p[2] = {{s->rtp_fd, POLLIN, 0}, {s->rtcp_fd, POLLIN, 0}};
  355. int poll_delay = h->flags & AVIO_FLAG_NONBLOCK ? 0 : 100;
  356. struct sockaddr_storage *addrs[2] = { &s->last_rtp_source, &s->last_rtcp_source };
  357. socklen_t *addr_lens[2] = { &s->last_rtp_source_len, &s->last_rtcp_source_len };
  358. for(;;) {
  359. if (ff_check_interrupt(&h->interrupt_callback))
  360. return AVERROR_EXIT;
  361. n = poll(p, 2, poll_delay);
  362. if (n > 0) {
  363. /* first try RTCP, then RTP */
  364. for (i = 1; i >= 0; i--) {
  365. if (!(p[i].revents & POLLIN))
  366. continue;
  367. *addr_lens[i] = sizeof(*addrs[i]);
  368. len = recvfrom(p[i].fd, buf, size, 0,
  369. (struct sockaddr *)addrs[i], addr_lens[i]);
  370. if (len < 0) {
  371. if (ff_neterrno() == AVERROR(EAGAIN) ||
  372. ff_neterrno() == AVERROR(EINTR))
  373. continue;
  374. return AVERROR(EIO);
  375. }
  376. if (rtp_check_source_lists(s, addrs[i]))
  377. continue;
  378. return len;
  379. }
  380. } else if (n < 0) {
  381. if (ff_neterrno() == AVERROR(EINTR))
  382. continue;
  383. return AVERROR(EIO);
  384. }
  385. if (h->flags & AVIO_FLAG_NONBLOCK)
  386. return AVERROR(EAGAIN);
  387. }
  388. return len;
  389. }
  390. static int rtp_write(URLContext *h, const uint8_t *buf, int size)
  391. {
  392. RTPContext *s = h->priv_data;
  393. int ret;
  394. URLContext *hd;
  395. if (size < 2)
  396. return AVERROR(EINVAL);
  397. if ((buf[0] & 0xc0) != (RTP_VERSION << 6))
  398. av_log(h, AV_LOG_WARNING, "Data doesn't look like RTP packets, "
  399. "make sure the RTP muxer is used\n");
  400. if (s->write_to_source) {
  401. int fd;
  402. struct sockaddr_storage *source, temp_source;
  403. socklen_t *source_len, temp_len;
  404. if (!s->last_rtp_source.ss_family && !s->last_rtcp_source.ss_family) {
  405. av_log(h, AV_LOG_ERROR,
  406. "Unable to send packet to source, no packets received yet\n");
  407. // Intentionally not returning an error here
  408. return size;
  409. }
  410. if (RTP_PT_IS_RTCP(buf[1])) {
  411. fd = s->rtcp_fd;
  412. source = &s->last_rtcp_source;
  413. source_len = &s->last_rtcp_source_len;
  414. } else {
  415. fd = s->rtp_fd;
  416. source = &s->last_rtp_source;
  417. source_len = &s->last_rtp_source_len;
  418. }
  419. if (!source->ss_family) {
  420. source = &temp_source;
  421. source_len = &temp_len;
  422. if (RTP_PT_IS_RTCP(buf[1])) {
  423. temp_source = s->last_rtp_source;
  424. temp_len = s->last_rtp_source_len;
  425. set_port(source, get_port(source) + 1);
  426. av_log(h, AV_LOG_INFO,
  427. "Not received any RTCP packets yet, inferring peer port "
  428. "from the RTP port\n");
  429. } else {
  430. temp_source = s->last_rtcp_source;
  431. temp_len = s->last_rtcp_source_len;
  432. set_port(source, get_port(source) - 1);
  433. av_log(h, AV_LOG_INFO,
  434. "Not received any RTP packets yet, inferring peer port "
  435. "from the RTCP port\n");
  436. }
  437. }
  438. if (!(h->flags & AVIO_FLAG_NONBLOCK)) {
  439. ret = ff_network_wait_fd(fd, 1);
  440. if (ret < 0)
  441. return ret;
  442. }
  443. ret = sendto(fd, buf, size, 0, (struct sockaddr *) source,
  444. *source_len);
  445. return ret < 0 ? ff_neterrno() : ret;
  446. }
  447. if (RTP_PT_IS_RTCP(buf[1])) {
  448. /* RTCP payload type */
  449. hd = s->rtcp_hd;
  450. } else {
  451. /* RTP payload type */
  452. hd = s->rtp_hd;
  453. }
  454. ret = ffurl_write(hd, buf, size);
  455. return ret;
  456. }
  457. static int rtp_close(URLContext *h)
  458. {
  459. RTPContext *s = h->priv_data;
  460. int i;
  461. for (i = 0; i < s->nb_ssm_include_addrs; i++)
  462. av_freep(&s->ssm_include_addrs[i]);
  463. av_freep(&s->ssm_include_addrs);
  464. for (i = 0; i < s->nb_ssm_exclude_addrs; i++)
  465. av_freep(&s->ssm_exclude_addrs[i]);
  466. av_freep(&s->ssm_exclude_addrs);
  467. ffurl_close(s->rtp_hd);
  468. ffurl_close(s->rtcp_hd);
  469. return 0;
  470. }
  471. /**
  472. * Return the local rtp port used by the RTP connection
  473. * @param h media file context
  474. * @return the local port number
  475. */
  476. int ff_rtp_get_local_rtp_port(URLContext *h)
  477. {
  478. RTPContext *s = h->priv_data;
  479. return ff_udp_get_local_port(s->rtp_hd);
  480. }
  481. /**
  482. * Return the local rtcp port used by the RTP connection
  483. * @param h media file context
  484. * @return the local port number
  485. */
  486. int ff_rtp_get_local_rtcp_port(URLContext *h)
  487. {
  488. RTPContext *s = h->priv_data;
  489. return ff_udp_get_local_port(s->rtcp_hd);
  490. }
  491. static int rtp_get_file_handle(URLContext *h)
  492. {
  493. RTPContext *s = h->priv_data;
  494. return s->rtp_fd;
  495. }
  496. static int rtp_get_multi_file_handle(URLContext *h, int **handles,
  497. int *numhandles)
  498. {
  499. RTPContext *s = h->priv_data;
  500. int *hs = *handles = av_malloc(sizeof(**handles) * 2);
  501. if (!hs)
  502. return AVERROR(ENOMEM);
  503. hs[0] = s->rtp_fd;
  504. hs[1] = s->rtcp_fd;
  505. *numhandles = 2;
  506. return 0;
  507. }
  508. URLProtocol ff_rtp_protocol = {
  509. .name = "rtp",
  510. .url_open = rtp_open,
  511. .url_read = rtp_read,
  512. .url_write = rtp_write,
  513. .url_close = rtp_close,
  514. .url_get_file_handle = rtp_get_file_handle,
  515. .url_get_multi_file_handle = rtp_get_multi_file_handle,
  516. .priv_data_size = sizeof(RTPContext),
  517. .flags = URL_PROTOCOL_FLAG_NETWORK,
  518. };