2 * RTMP network protocol
3 * Copyright (c) 2009 Konstantin Shishkov
5 * This file is part of FFmpeg.
7 * FFmpeg is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation; either
10 * version 2.1 of the License, or (at your option) any later version.
12 * FFmpeg is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with FFmpeg; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
27 #include "libavcodec/bytestream.h"
28 #include "libavutil/avstring.h"
29 #include "libavutil/base64.h"
30 #include "libavutil/hmac.h"
31 #include "libavutil/intfloat.h"
32 #include "libavutil/lfg.h"
33 #include "libavutil/md5.h"
34 #include "libavutil/opt.h"
35 #include "libavutil/random_seed.h"
43 #include "rtmpcrypt.h"
51 #define APP_MAX_LENGTH 1024
52 #define PLAYPATH_MAX_LENGTH 512
53 #define TCURL_MAX_LENGTH 1024
54 #define FLASHVER_MAX_LENGTH 64
55 #define RTMP_PKTDATA_DEFAULT_SIZE 4096
56 #define RTMP_HEADER 11
58 /** RTMP protocol handler state */
60 STATE_START, ///< client has not done anything yet
61 STATE_HANDSHAKED, ///< client has performed handshake
62 STATE_FCPUBLISH, ///< client FCPublishing stream (for output)
63 STATE_PLAYING, ///< client has started receiving multimedia data from server
64 STATE_SEEKING, ///< client has started the seek operation. Back on STATE_PLAYING when the time comes
65 STATE_PUBLISHING, ///< client has started sending multimedia data to server (for output)
66 STATE_RECEIVING, ///< received a publish command (for input)
67 STATE_SENDING, ///< received a play command (for output)
68 STATE_STOPPED, ///< the broadcast has been stopped
71 typedef struct TrackedMethod {
76 /** protocol handler context */
77 typedef struct RTMPContext {
79 URLContext* stream; ///< TCP stream used in interactions with RTMP server
80 RTMPPacket *prev_pkt[2]; ///< packet history used when reading and sending packets ([0] for reading, [1] for writing)
81 int nb_prev_pkt[2]; ///< number of elements in prev_pkt
82 int in_chunk_size; ///< size of the chunks incoming RTMP packets are divided into
83 int out_chunk_size; ///< size of the chunks outgoing RTMP packets are divided into
84 int is_input; ///< input/output flag
85 char *playpath; ///< stream identifier to play (with possible "mp4:" prefix)
86 int live; ///< 0: recorded, -1: live, -2: both
87 char *app; ///< name of application
88 char *conn; ///< append arbitrary AMF data to the Connect message
89 ClientState state; ///< current state
90 int stream_id; ///< ID assigned by the server for the stream
91 uint8_t* flv_data; ///< buffer with data for demuxer
92 int flv_size; ///< current buffer size
93 int flv_off; ///< number of bytes read from current buffer
94 int flv_nb_packets; ///< number of flv packets published
95 RTMPPacket out_pkt; ///< rtmp packet, created from flv a/v or metadata (for output)
96 uint32_t client_report_size; ///< number of bytes after which client should report to server
97 uint64_t bytes_read; ///< number of bytes read from server
98 uint64_t last_bytes_read; ///< number of bytes read last reported to server
99 uint32_t last_timestamp; ///< last timestamp received in a packet
100 int skip_bytes; ///< number of bytes to skip from the input FLV stream in the next write call
101 int has_audio; ///< presence of audio data
102 int has_video; ///< presence of video data
103 int received_metadata; ///< Indicates if we have received metadata about the streams
104 uint8_t flv_header[RTMP_HEADER]; ///< partial incoming flv packet header
105 int flv_header_bytes; ///< number of initialized bytes in flv_header
106 int nb_invokes; ///< keeps track of invoke messages
107 char* tcurl; ///< url of the target stream
108 char* flashver; ///< version of the flash plugin
109 char* swfhash; ///< SHA256 hash of the decompressed SWF file (32 bytes)
110 int swfhash_len; ///< length of the SHA256 hash
111 int swfsize; ///< size of the decompressed SWF file
112 char* swfurl; ///< url of the swf player
113 char* swfverify; ///< URL to player swf file, compute hash/size automatically
114 char swfverification[42]; ///< hash of the SWF verification
115 char* pageurl; ///< url of the web page
116 char* subscribe; ///< name of live stream to subscribe
117 int server_bw; ///< server bandwidth
118 int client_buffer_time; ///< client buffer time in ms
119 int flush_interval; ///< number of packets flushed in the same request (RTMPT only)
120 int encrypted; ///< use an encrypted connection (RTMPE only)
121 TrackedMethod*tracked_methods; ///< tracked methods buffer
122 int nb_tracked_methods; ///< number of tracked methods
123 int tracked_methods_size; ///< size of the tracked methods buffer
124 int listen; ///< listen mode flag
125 int listen_timeout; ///< listen timeout to wait for new connections
126 int nb_streamid; ///< The next stream id to return on createStream calls
127 double duration; ///< Duration of the stream in seconds as returned by the server (only valid if non-zero)
130 char auth_params[500];
135 #define PLAYER_KEY_OPEN_PART_LEN 30 ///< length of partial key used for first client digest signing
136 /** Client key used for digest signing */
137 static const uint8_t rtmp_player_key[] = {
138 'G', 'e', 'n', 'u', 'i', 'n', 'e', ' ', 'A', 'd', 'o', 'b', 'e', ' ',
139 'F', 'l', 'a', 's', 'h', ' ', 'P', 'l', 'a', 'y', 'e', 'r', ' ', '0', '0', '1',
141 0xF0, 0xEE, 0xC2, 0x4A, 0x80, 0x68, 0xBE, 0xE8, 0x2E, 0x00, 0xD0, 0xD1, 0x02,
142 0x9E, 0x7E, 0x57, 0x6E, 0xEC, 0x5D, 0x2D, 0x29, 0x80, 0x6F, 0xAB, 0x93, 0xB8,
143 0xE6, 0x36, 0xCF, 0xEB, 0x31, 0xAE
146 #define SERVER_KEY_OPEN_PART_LEN 36 ///< length of partial key used for first server digest signing
147 /** Key used for RTMP server digest signing */
148 static const uint8_t rtmp_server_key[] = {
149 'G', 'e', 'n', 'u', 'i', 'n', 'e', ' ', 'A', 'd', 'o', 'b', 'e', ' ',
150 'F', 'l', 'a', 's', 'h', ' ', 'M', 'e', 'd', 'i', 'a', ' ',
151 'S', 'e', 'r', 'v', 'e', 'r', ' ', '0', '0', '1',
153 0xF0, 0xEE, 0xC2, 0x4A, 0x80, 0x68, 0xBE, 0xE8, 0x2E, 0x00, 0xD0, 0xD1, 0x02,
154 0x9E, 0x7E, 0x57, 0x6E, 0xEC, 0x5D, 0x2D, 0x29, 0x80, 0x6F, 0xAB, 0x93, 0xB8,
155 0xE6, 0x36, 0xCF, 0xEB, 0x31, 0xAE
158 static int handle_chunk_size(URLContext *s, RTMPPacket *pkt);
159 static int handle_server_bw(URLContext *s, RTMPPacket *pkt);
160 static int handle_client_bw(URLContext *s, RTMPPacket *pkt);
162 static int add_tracked_method(RTMPContext *rt, const char *name, int id)
166 if (rt->nb_tracked_methods + 1 > rt->tracked_methods_size) {
167 rt->tracked_methods_size = (rt->nb_tracked_methods + 1) * 2;
168 if ((err = av_reallocp(&rt->tracked_methods, rt->tracked_methods_size *
169 sizeof(*rt->tracked_methods))) < 0) {
170 rt->nb_tracked_methods = 0;
171 rt->tracked_methods_size = 0;
176 rt->tracked_methods[rt->nb_tracked_methods].name = av_strdup(name);
177 if (!rt->tracked_methods[rt->nb_tracked_methods].name)
178 return AVERROR(ENOMEM);
179 rt->tracked_methods[rt->nb_tracked_methods].id = id;
180 rt->nb_tracked_methods++;
185 static void del_tracked_method(RTMPContext *rt, int index)
187 memmove(&rt->tracked_methods[index], &rt->tracked_methods[index + 1],
188 sizeof(*rt->tracked_methods) * (rt->nb_tracked_methods - index - 1));
189 rt->nb_tracked_methods--;
192 static int find_tracked_method(URLContext *s, RTMPPacket *pkt, int offset,
193 char **tracked_method)
195 RTMPContext *rt = s->priv_data;
201 bytestream2_init(&gbc, pkt->data + offset, pkt->size - offset);
202 if ((ret = ff_amf_read_number(&gbc, &pkt_id)) < 0)
205 for (i = 0; i < rt->nb_tracked_methods; i++) {
206 if (rt->tracked_methods[i].id != pkt_id)
209 *tracked_method = rt->tracked_methods[i].name;
210 del_tracked_method(rt, i);
217 static void free_tracked_methods(RTMPContext *rt)
221 for (i = 0; i < rt->nb_tracked_methods; i ++)
222 av_freep(&rt->tracked_methods[i].name);
223 av_freep(&rt->tracked_methods);
224 rt->tracked_methods_size = 0;
225 rt->nb_tracked_methods = 0;
228 static int rtmp_send_packet(RTMPContext *rt, RTMPPacket *pkt, int track)
232 if (pkt->type == RTMP_PT_INVOKE && track) {
238 bytestream2_init(&gbc, pkt->data, pkt->size);
239 if ((ret = ff_amf_read_string(&gbc, name, sizeof(name), &len)) < 0)
242 if ((ret = ff_amf_read_number(&gbc, &pkt_id)) < 0)
245 if ((ret = add_tracked_method(rt, name, pkt_id)) < 0)
249 ret = ff_rtmp_packet_write(rt->stream, pkt, rt->out_chunk_size,
250 &rt->prev_pkt[1], &rt->nb_prev_pkt[1]);
252 ff_rtmp_packet_destroy(pkt);
256 static int rtmp_write_amf_data(URLContext *s, char *param, uint8_t **p)
261 /* The type must be B for Boolean, N for number, S for string, O for
262 * object, or Z for null. For Booleans the data must be either 0 or 1 for
263 * FALSE or TRUE, respectively. Likewise for Objects the data must be
264 * 0 or 1 to end or begin an object, respectively. Data items in subobjects
265 * may be named, by prefixing the type with 'N' and specifying the name
266 * before the value (ie. NB:myFlag:1). This option may be used multiple times
267 * to construct arbitrary AMF sequences. */
268 if (param[0] && param[1] == ':') {
271 } else if (param[0] == 'N' && param[1] && param[2] == ':') {
274 value = strchr(field, ':');
280 ff_amf_write_field_name(p, field);
287 ff_amf_write_bool(p, value[0] != '0');
290 ff_amf_write_string(p, value);
293 ff_amf_write_number(p, strtod(value, NULL));
296 ff_amf_write_null(p);
300 ff_amf_write_object_start(p);
302 ff_amf_write_object_end(p);
312 av_log(s, AV_LOG_ERROR, "Invalid AMF parameter: %s\n", param);
313 return AVERROR(EINVAL);
317 * Generate 'connect' call and send it to the server.
319 static int gen_connect(URLContext *s, RTMPContext *rt)
325 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SYSTEM_CHANNEL, RTMP_PT_INVOKE,
326 0, 4096 + APP_MAX_LENGTH)) < 0)
331 ff_amf_write_string(&p, "connect");
332 ff_amf_write_number(&p, ++rt->nb_invokes);
333 ff_amf_write_object_start(&p);
334 ff_amf_write_field_name(&p, "app");
335 ff_amf_write_string2(&p, rt->app, rt->auth_params);
338 ff_amf_write_field_name(&p, "type");
339 ff_amf_write_string(&p, "nonprivate");
341 ff_amf_write_field_name(&p, "flashVer");
342 ff_amf_write_string(&p, rt->flashver);
345 ff_amf_write_field_name(&p, "swfUrl");
346 ff_amf_write_string(&p, rt->swfurl);
349 ff_amf_write_field_name(&p, "tcUrl");
350 ff_amf_write_string2(&p, rt->tcurl, rt->auth_params);
352 ff_amf_write_field_name(&p, "fpad");
353 ff_amf_write_bool(&p, 0);
354 ff_amf_write_field_name(&p, "capabilities");
355 ff_amf_write_number(&p, 15.0);
357 /* Tell the server we support all the audio codecs except
358 * SUPPORT_SND_INTEL (0x0008) and SUPPORT_SND_UNUSED (0x0010)
359 * which are unused in the RTMP protocol implementation. */
360 ff_amf_write_field_name(&p, "audioCodecs");
361 ff_amf_write_number(&p, 4071.0);
362 ff_amf_write_field_name(&p, "videoCodecs");
363 ff_amf_write_number(&p, 252.0);
364 ff_amf_write_field_name(&p, "videoFunction");
365 ff_amf_write_number(&p, 1.0);
368 ff_amf_write_field_name(&p, "pageUrl");
369 ff_amf_write_string(&p, rt->pageurl);
372 ff_amf_write_object_end(&p);
375 char *param = rt->conn;
377 // Write arbitrary AMF data to the Connect message.
380 param += strspn(param, " ");
383 sep = strchr(param, ' ');
386 if ((ret = rtmp_write_amf_data(s, param, &p)) < 0) {
387 // Invalid AMF parameter.
388 ff_rtmp_packet_destroy(&pkt);
399 pkt.size = p - pkt.data;
401 return rtmp_send_packet(rt, &pkt, 1);
405 #define RTMP_CTRL_ABORT_MESSAGE (2)
407 static int read_connect(URLContext *s, RTMPContext *rt)
409 RTMPPacket pkt = { 0 };
419 // handle RTMP Protocol Control Messages
421 if ((ret = ff_rtmp_packet_read(rt->stream, &pkt, rt->in_chunk_size,
422 &rt->prev_pkt[0], &rt->nb_prev_pkt[0])) < 0)
425 ff_rtmp_packet_dump(s, &pkt);
427 if (pkt.type == RTMP_PT_CHUNK_SIZE) {
428 if ((ret = handle_chunk_size(s, &pkt)) < 0) {
429 ff_rtmp_packet_destroy(&pkt);
432 } else if (pkt.type == RTMP_CTRL_ABORT_MESSAGE) {
433 av_log(s, AV_LOG_ERROR, "received abort message\n");
434 ff_rtmp_packet_destroy(&pkt);
435 return AVERROR_UNKNOWN;
436 } else if (pkt.type == RTMP_PT_BYTES_READ) {
437 av_log(s, AV_LOG_TRACE, "received acknowledgement\n");
438 } else if (pkt.type == RTMP_PT_SERVER_BW) {
439 if ((ret = handle_server_bw(s, &pkt)) < 0) {
440 ff_rtmp_packet_destroy(&pkt);
443 } else if (pkt.type == RTMP_PT_CLIENT_BW) {
444 if ((ret = handle_client_bw(s, &pkt)) < 0) {
445 ff_rtmp_packet_destroy(&pkt);
448 } else if (pkt.type == RTMP_PT_INVOKE) {
449 // received RTMP Command Message
452 av_log(s, AV_LOG_ERROR, "Unknown control message type (%d)\n", pkt.type);
454 ff_rtmp_packet_destroy(&pkt);
458 bytestream2_init(&gbc, cp, pkt.size);
459 if (ff_amf_read_string(&gbc, command, sizeof(command), &stringlen)) {
460 av_log(s, AV_LOG_ERROR, "Unable to read command string\n");
461 ff_rtmp_packet_destroy(&pkt);
462 return AVERROR_INVALIDDATA;
464 if (strcmp(command, "connect")) {
465 av_log(s, AV_LOG_ERROR, "Expecting connect, got %s\n", command);
466 ff_rtmp_packet_destroy(&pkt);
467 return AVERROR_INVALIDDATA;
469 ret = ff_amf_read_number(&gbc, &seqnum);
471 av_log(s, AV_LOG_WARNING, "SeqNum not found\n");
472 /* Here one could parse an AMF Object with data as flashVers and others. */
473 ret = ff_amf_get_field_value(gbc.buffer,
474 gbc.buffer + bytestream2_get_bytes_left(&gbc),
475 "app", tmpstr, sizeof(tmpstr));
477 av_log(s, AV_LOG_WARNING, "App field not found in connect\n");
478 if (!ret && strcmp(tmpstr, rt->app))
479 av_log(s, AV_LOG_WARNING, "App field don't match up: %s <-> %s\n",
481 ff_rtmp_packet_destroy(&pkt);
483 // Send Window Acknowledgement Size (as defined in specification)
484 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_NETWORK_CHANNEL,
485 RTMP_PT_SERVER_BW, 0, 4)) < 0)
488 bytestream_put_be32(&p, rt->server_bw);
489 pkt.size = p - pkt.data;
490 ret = ff_rtmp_packet_write(rt->stream, &pkt, rt->out_chunk_size,
491 &rt->prev_pkt[1], &rt->nb_prev_pkt[1]);
492 ff_rtmp_packet_destroy(&pkt);
495 // Send Peer Bandwidth
496 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_NETWORK_CHANNEL,
497 RTMP_PT_CLIENT_BW, 0, 5)) < 0)
500 bytestream_put_be32(&p, rt->server_bw);
501 bytestream_put_byte(&p, 2); // dynamic
502 pkt.size = p - pkt.data;
503 ret = ff_rtmp_packet_write(rt->stream, &pkt, rt->out_chunk_size,
504 &rt->prev_pkt[1], &rt->nb_prev_pkt[1]);
505 ff_rtmp_packet_destroy(&pkt);
510 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_NETWORK_CHANNEL,
511 RTMP_PT_PING, 0, 6)) < 0)
515 bytestream_put_be16(&p, 0); // 0 -> Stream Begin
516 bytestream_put_be32(&p, 0);
517 ret = ff_rtmp_packet_write(rt->stream, &pkt, rt->out_chunk_size,
518 &rt->prev_pkt[1], &rt->nb_prev_pkt[1]);
519 ff_rtmp_packet_destroy(&pkt);
524 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_NETWORK_CHANNEL,
525 RTMP_PT_CHUNK_SIZE, 0, 4)) < 0)
529 bytestream_put_be32(&p, rt->out_chunk_size);
530 ret = ff_rtmp_packet_write(rt->stream, &pkt, rt->out_chunk_size,
531 &rt->prev_pkt[1], &rt->nb_prev_pkt[1]);
532 ff_rtmp_packet_destroy(&pkt);
536 // Send _result NetConnection.Connect.Success to connect
537 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SYSTEM_CHANNEL,
539 RTMP_PKTDATA_DEFAULT_SIZE)) < 0)
543 ff_amf_write_string(&p, "_result");
544 ff_amf_write_number(&p, seqnum);
546 ff_amf_write_object_start(&p);
547 ff_amf_write_field_name(&p, "fmsVer");
548 ff_amf_write_string(&p, "FMS/3,0,1,123");
549 ff_amf_write_field_name(&p, "capabilities");
550 ff_amf_write_number(&p, 31);
551 ff_amf_write_object_end(&p);
553 ff_amf_write_object_start(&p);
554 ff_amf_write_field_name(&p, "level");
555 ff_amf_write_string(&p, "status");
556 ff_amf_write_field_name(&p, "code");
557 ff_amf_write_string(&p, "NetConnection.Connect.Success");
558 ff_amf_write_field_name(&p, "description");
559 ff_amf_write_string(&p, "Connection succeeded.");
560 ff_amf_write_field_name(&p, "objectEncoding");
561 ff_amf_write_number(&p, 0);
562 ff_amf_write_object_end(&p);
564 pkt.size = p - pkt.data;
565 ret = ff_rtmp_packet_write(rt->stream, &pkt, rt->out_chunk_size,
566 &rt->prev_pkt[1], &rt->nb_prev_pkt[1]);
567 ff_rtmp_packet_destroy(&pkt);
571 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SYSTEM_CHANNEL,
572 RTMP_PT_INVOKE, 0, 30)) < 0)
575 ff_amf_write_string(&p, "onBWDone");
576 ff_amf_write_number(&p, 0);
577 ff_amf_write_null(&p);
578 ff_amf_write_number(&p, 8192);
579 pkt.size = p - pkt.data;
580 ret = ff_rtmp_packet_write(rt->stream, &pkt, rt->out_chunk_size,
581 &rt->prev_pkt[1], &rt->nb_prev_pkt[1]);
582 ff_rtmp_packet_destroy(&pkt);
588 * Generate 'releaseStream' call and send it to the server. It should make
589 * the server release some channel for media streams.
591 static int gen_release_stream(URLContext *s, RTMPContext *rt)
597 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SYSTEM_CHANNEL, RTMP_PT_INVOKE,
598 0, 29 + strlen(rt->playpath))) < 0)
601 av_log(s, AV_LOG_DEBUG, "Releasing stream...\n");
603 ff_amf_write_string(&p, "releaseStream");
604 ff_amf_write_number(&p, ++rt->nb_invokes);
605 ff_amf_write_null(&p);
606 ff_amf_write_string(&p, rt->playpath);
608 return rtmp_send_packet(rt, &pkt, 1);
612 * Generate 'FCPublish' call and send it to the server. It should make
613 * the server prepare for receiving media streams.
615 static int gen_fcpublish_stream(URLContext *s, RTMPContext *rt)
621 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SYSTEM_CHANNEL, RTMP_PT_INVOKE,
622 0, 25 + strlen(rt->playpath))) < 0)
625 av_log(s, AV_LOG_DEBUG, "FCPublish stream...\n");
627 ff_amf_write_string(&p, "FCPublish");
628 ff_amf_write_number(&p, ++rt->nb_invokes);
629 ff_amf_write_null(&p);
630 ff_amf_write_string(&p, rt->playpath);
632 return rtmp_send_packet(rt, &pkt, 1);
636 * Generate 'FCUnpublish' call and send it to the server. It should make
637 * the server destroy stream.
639 static int gen_fcunpublish_stream(URLContext *s, RTMPContext *rt)
645 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SYSTEM_CHANNEL, RTMP_PT_INVOKE,
646 0, 27 + strlen(rt->playpath))) < 0)
649 av_log(s, AV_LOG_DEBUG, "UnPublishing stream...\n");
651 ff_amf_write_string(&p, "FCUnpublish");
652 ff_amf_write_number(&p, ++rt->nb_invokes);
653 ff_amf_write_null(&p);
654 ff_amf_write_string(&p, rt->playpath);
656 return rtmp_send_packet(rt, &pkt, 0);
660 * Generate 'createStream' call and send it to the server. It should make
661 * the server allocate some channel for media streams.
663 static int gen_create_stream(URLContext *s, RTMPContext *rt)
669 av_log(s, AV_LOG_DEBUG, "Creating stream...\n");
671 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SYSTEM_CHANNEL, RTMP_PT_INVOKE,
676 ff_amf_write_string(&p, "createStream");
677 ff_amf_write_number(&p, ++rt->nb_invokes);
678 ff_amf_write_null(&p);
680 return rtmp_send_packet(rt, &pkt, 1);
685 * Generate 'deleteStream' call and send it to the server. It should make
686 * the server remove some channel for media streams.
688 static int gen_delete_stream(URLContext *s, RTMPContext *rt)
694 av_log(s, AV_LOG_DEBUG, "Deleting stream...\n");
696 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SYSTEM_CHANNEL, RTMP_PT_INVOKE,
701 ff_amf_write_string(&p, "deleteStream");
702 ff_amf_write_number(&p, ++rt->nb_invokes);
703 ff_amf_write_null(&p);
704 ff_amf_write_number(&p, rt->stream_id);
706 return rtmp_send_packet(rt, &pkt, 0);
710 * Generate 'getStreamLength' call and send it to the server. If the server
711 * knows the duration of the selected stream, it will reply with the duration
714 static int gen_get_stream_length(URLContext *s, RTMPContext *rt)
720 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SOURCE_CHANNEL, RTMP_PT_INVOKE,
721 0, 31 + strlen(rt->playpath))) < 0)
725 ff_amf_write_string(&p, "getStreamLength");
726 ff_amf_write_number(&p, ++rt->nb_invokes);
727 ff_amf_write_null(&p);
728 ff_amf_write_string(&p, rt->playpath);
730 return rtmp_send_packet(rt, &pkt, 1);
734 * Generate client buffer time and send it to the server.
736 static int gen_buffer_time(URLContext *s, RTMPContext *rt)
742 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_NETWORK_CHANNEL, RTMP_PT_PING,
747 bytestream_put_be16(&p, 3);
748 bytestream_put_be32(&p, rt->stream_id);
749 bytestream_put_be32(&p, rt->client_buffer_time);
751 return rtmp_send_packet(rt, &pkt, 0);
755 * Generate 'play' call and send it to the server, then ping the server
756 * to start actual playing.
758 static int gen_play(URLContext *s, RTMPContext *rt)
764 av_log(s, AV_LOG_DEBUG, "Sending play command for '%s'\n", rt->playpath);
766 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SOURCE_CHANNEL, RTMP_PT_INVOKE,
767 0, 29 + strlen(rt->playpath))) < 0)
770 pkt.extra = rt->stream_id;
773 ff_amf_write_string(&p, "play");
774 ff_amf_write_number(&p, ++rt->nb_invokes);
775 ff_amf_write_null(&p);
776 ff_amf_write_string(&p, rt->playpath);
777 ff_amf_write_number(&p, rt->live * 1000);
779 return rtmp_send_packet(rt, &pkt, 1);
782 static int gen_seek(URLContext *s, RTMPContext *rt, int64_t timestamp)
788 av_log(s, AV_LOG_DEBUG, "Sending seek command for timestamp %"PRId64"\n",
791 if ((ret = ff_rtmp_packet_create(&pkt, 3, RTMP_PT_INVOKE, 0, 26)) < 0)
794 pkt.extra = rt->stream_id;
797 ff_amf_write_string(&p, "seek");
798 ff_amf_write_number(&p, 0); //no tracking back responses
799 ff_amf_write_null(&p); //as usual, the first null param
800 ff_amf_write_number(&p, timestamp); //where we want to jump
802 return rtmp_send_packet(rt, &pkt, 1);
806 * Generate a pause packet that either pauses or unpauses the current stream.
808 static int gen_pause(URLContext *s, RTMPContext *rt, int pause, uint32_t timestamp)
814 av_log(s, AV_LOG_DEBUG, "Sending pause command for timestamp %d\n",
817 if ((ret = ff_rtmp_packet_create(&pkt, 3, RTMP_PT_INVOKE, 0, 29)) < 0)
820 pkt.extra = rt->stream_id;
823 ff_amf_write_string(&p, "pause");
824 ff_amf_write_number(&p, 0); //no tracking back responses
825 ff_amf_write_null(&p); //as usual, the first null param
826 ff_amf_write_bool(&p, pause); // pause or unpause
827 ff_amf_write_number(&p, timestamp); //where we pause the stream
829 return rtmp_send_packet(rt, &pkt, 1);
833 * Generate 'publish' call and send it to the server.
835 static int gen_publish(URLContext *s, RTMPContext *rt)
841 av_log(s, AV_LOG_DEBUG, "Sending publish command for '%s'\n", rt->playpath);
843 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SOURCE_CHANNEL, RTMP_PT_INVOKE,
844 0, 30 + strlen(rt->playpath))) < 0)
847 pkt.extra = rt->stream_id;
850 ff_amf_write_string(&p, "publish");
851 ff_amf_write_number(&p, ++rt->nb_invokes);
852 ff_amf_write_null(&p);
853 ff_amf_write_string(&p, rt->playpath);
854 ff_amf_write_string(&p, "live");
856 return rtmp_send_packet(rt, &pkt, 1);
860 * Generate ping reply and send it to the server.
862 static int gen_pong(URLContext *s, RTMPContext *rt, RTMPPacket *ppkt)
868 if (ppkt->size < 6) {
869 av_log(s, AV_LOG_ERROR, "Too short ping packet (%d)\n",
871 return AVERROR_INVALIDDATA;
874 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_NETWORK_CHANNEL, RTMP_PT_PING,
875 ppkt->timestamp + 1, 6)) < 0)
879 bytestream_put_be16(&p, 7);
880 bytestream_put_be32(&p, AV_RB32(ppkt->data+2));
882 return rtmp_send_packet(rt, &pkt, 0);
886 * Generate SWF verification message and send it to the server.
888 static int gen_swf_verification(URLContext *s, RTMPContext *rt)
894 av_log(s, AV_LOG_DEBUG, "Sending SWF verification...\n");
895 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_NETWORK_CHANNEL, RTMP_PT_PING,
900 bytestream_put_be16(&p, 27);
901 memcpy(p, rt->swfverification, 42);
903 return rtmp_send_packet(rt, &pkt, 0);
907 * Generate server bandwidth message and send it to the server.
909 static int gen_server_bw(URLContext *s, RTMPContext *rt)
915 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_NETWORK_CHANNEL, RTMP_PT_SERVER_BW,
920 bytestream_put_be32(&p, rt->server_bw);
922 return rtmp_send_packet(rt, &pkt, 0);
926 * Generate check bandwidth message and send it to the server.
928 static int gen_check_bw(URLContext *s, RTMPContext *rt)
934 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SYSTEM_CHANNEL, RTMP_PT_INVOKE,
939 ff_amf_write_string(&p, "_checkbw");
940 ff_amf_write_number(&p, ++rt->nb_invokes);
941 ff_amf_write_null(&p);
943 return rtmp_send_packet(rt, &pkt, 1);
947 * Generate report on bytes read so far and send it to the server.
949 static int gen_bytes_read(URLContext *s, RTMPContext *rt, uint32_t ts)
955 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_NETWORK_CHANNEL, RTMP_PT_BYTES_READ,
960 bytestream_put_be32(&p, rt->bytes_read);
962 return rtmp_send_packet(rt, &pkt, 0);
965 static int gen_fcsubscribe_stream(URLContext *s, RTMPContext *rt,
966 const char *subscribe)
972 if ((ret = ff_rtmp_packet_create(&pkt, RTMP_SYSTEM_CHANNEL, RTMP_PT_INVOKE,
973 0, 27 + strlen(subscribe))) < 0)
977 ff_amf_write_string(&p, "FCSubscribe");
978 ff_amf_write_number(&p, ++rt->nb_invokes);
979 ff_amf_write_null(&p);
980 ff_amf_write_string(&p, subscribe);
982 return rtmp_send_packet(rt, &pkt, 1);
985 int ff_rtmp_calc_digest(const uint8_t *src, int len, int gap,
986 const uint8_t *key, int keylen, uint8_t *dst)
990 hmac = av_hmac_alloc(AV_HMAC_SHA256);
992 return AVERROR(ENOMEM);
994 av_hmac_init(hmac, key, keylen);
996 av_hmac_update(hmac, src, len);
997 } else { //skip 32 bytes used for storing digest
998 av_hmac_update(hmac, src, gap);
999 av_hmac_update(hmac, src + gap + 32, len - gap - 32);
1001 av_hmac_final(hmac, dst, 32);
1008 int ff_rtmp_calc_digest_pos(const uint8_t *buf, int off, int mod_val,
1011 int i, digest_pos = 0;
1013 for (i = 0; i < 4; i++)
1014 digest_pos += buf[i + off];
1015 digest_pos = digest_pos % mod_val + add_val;
1021 * Put HMAC-SHA2 digest of packet data (except for the bytes where this digest
1022 * will be stored) into that packet.
1024 * @param buf handshake data (1536 bytes)
1025 * @param encrypted use an encrypted connection (RTMPE)
1026 * @return offset to the digest inside input data
1028 static int rtmp_handshake_imprint_with_digest(uint8_t *buf, int encrypted)
1030 int ret, digest_pos;
1033 digest_pos = ff_rtmp_calc_digest_pos(buf, 772, 728, 776);
1035 digest_pos = ff_rtmp_calc_digest_pos(buf, 8, 728, 12);
1037 ret = ff_rtmp_calc_digest(buf, RTMP_HANDSHAKE_PACKET_SIZE, digest_pos,
1038 rtmp_player_key, PLAYER_KEY_OPEN_PART_LEN,
1047 * Verify that the received server response has the expected digest value.
1049 * @param buf handshake data received from the server (1536 bytes)
1050 * @param off position to search digest offset from
1051 * @return 0 if digest is valid, digest position otherwise
1053 static int rtmp_validate_digest(uint8_t *buf, int off)
1056 int ret, digest_pos;
1058 digest_pos = ff_rtmp_calc_digest_pos(buf, off, 728, off + 4);
1060 ret = ff_rtmp_calc_digest(buf, RTMP_HANDSHAKE_PACKET_SIZE, digest_pos,
1061 rtmp_server_key, SERVER_KEY_OPEN_PART_LEN,
1066 if (!memcmp(digest, buf + digest_pos, 32))
1071 static int rtmp_calc_swf_verification(URLContext *s, RTMPContext *rt,
1077 if (rt->swfhash_len != 32) {
1078 av_log(s, AV_LOG_ERROR,
1079 "Hash of the decompressed SWF file is not 32 bytes long.\n");
1080 return AVERROR(EINVAL);
1083 p = &rt->swfverification[0];
1084 bytestream_put_byte(&p, 1);
1085 bytestream_put_byte(&p, 1);
1086 bytestream_put_be32(&p, rt->swfsize);
1087 bytestream_put_be32(&p, rt->swfsize);
1089 if ((ret = ff_rtmp_calc_digest(rt->swfhash, 32, 0, buf, 32, p)) < 0)
1096 static int rtmp_uncompress_swfplayer(uint8_t *in_data, int64_t in_size,
1097 uint8_t **out_data, int64_t *out_size)
1099 z_stream zs = { 0 };
1104 zs.avail_in = in_size;
1105 zs.next_in = in_data;
1106 ret = inflateInit(&zs);
1108 return AVERROR_UNKNOWN;
1111 uint8_t tmp_buf[16384];
1113 zs.avail_out = sizeof(tmp_buf);
1114 zs.next_out = tmp_buf;
1116 ret = inflate(&zs, Z_NO_FLUSH);
1117 if (ret != Z_OK && ret != Z_STREAM_END) {
1118 ret = AVERROR_UNKNOWN;
1122 size = sizeof(tmp_buf) - zs.avail_out;
1123 if (!(ptr = av_realloc(*out_data, *out_size + size))) {
1124 ret = AVERROR(ENOMEM);
1129 memcpy(*out_data + *out_size, tmp_buf, size);
1131 } while (zs.avail_out == 0);
1139 static int rtmp_calc_swfhash(URLContext *s)
1141 RTMPContext *rt = s->priv_data;
1142 uint8_t *in_data = NULL, *out_data = NULL, *swfdata;
1149 /* Get the SWF player file. */
1150 if ((ret = ffurl_open_whitelist(&stream, rt->swfverify, AVIO_FLAG_READ,
1151 &s->interrupt_callback, NULL,
1152 s->protocol_whitelist, s->protocol_blacklist, s)) < 0) {
1153 av_log(s, AV_LOG_ERROR, "Cannot open connection %s.\n", rt->swfverify);
1157 if ((in_size = ffurl_seek(stream, 0, AVSEEK_SIZE)) < 0) {
1162 if (!(in_data = av_malloc(in_size))) {
1163 ret = AVERROR(ENOMEM);
1167 if ((ret = ffurl_read_complete(stream, in_data, in_size)) < 0)
1171 ret = AVERROR_INVALIDDATA;
1175 if (!memcmp(in_data, "CWS", 3)) {
1178 /* Decompress the SWF player file using Zlib. */
1179 if (!(out_data = av_malloc(8))) {
1180 ret = AVERROR(ENOMEM);
1183 *in_data = 'F'; // magic stuff
1184 memcpy(out_data, in_data, 8);
1187 if ((ret = rtmp_uncompress_swfplayer(in_data + 8, in_size - 8,
1188 &out_data, &out_size)) < 0)
1193 av_log(s, AV_LOG_ERROR,
1194 "Zlib is required for decompressing the SWF player file.\n");
1195 ret = AVERROR(EINVAL);
1203 /* Compute the SHA256 hash of the SWF player file. */
1204 if ((ret = ff_rtmp_calc_digest(swfdata, swfsize, 0,
1205 "Genuine Adobe Flash Player 001", 30,
1209 /* Set SWFVerification parameters. */
1210 av_opt_set_bin(rt, "rtmp_swfhash", swfhash, 32, 0);
1211 rt->swfsize = swfsize;
1215 av_freep(&out_data);
1216 ffurl_close(stream);
1221 * Perform handshake with the server by means of exchanging pseudorandom data
1222 * signed with HMAC-SHA2 digest.
1224 * @return 0 if handshake succeeds, negative value otherwise
1226 static int rtmp_handshake(URLContext *s, RTMPContext *rt)
1229 uint8_t tosend [RTMP_HANDSHAKE_PACKET_SIZE+1] = {
1230 3, // unencrypted data
1231 0, 0, 0, 0, // client uptime
1237 uint8_t clientdata[RTMP_HANDSHAKE_PACKET_SIZE];
1238 uint8_t serverdata[RTMP_HANDSHAKE_PACKET_SIZE+1];
1240 int server_pos, client_pos;
1241 uint8_t digest[32], signature[32];
1244 av_log(s, AV_LOG_DEBUG, "Handshaking...\n");
1246 av_lfg_init(&rnd, 0xDEADC0DE);
1247 // generate handshake packet - 1536 bytes of pseudorandom data
1248 for (i = 9; i <= RTMP_HANDSHAKE_PACKET_SIZE; i++)
1249 tosend[i] = av_lfg_get(&rnd) >> 24;
1251 if (CONFIG_FFRTMPCRYPT_PROTOCOL && rt->encrypted) {
1252 /* When the client wants to use RTMPE, we have to change the command
1253 * byte to 0x06 which means to use encrypted data and we have to set
1254 * the flash version to at least 9.0.115.0. */
1261 /* Initialize the Diffie-Hellmann context and generate the public key
1262 * to send to the server. */
1263 if ((ret = ff_rtmpe_gen_pub_key(rt->stream, tosend + 1)) < 0)
1267 client_pos = rtmp_handshake_imprint_with_digest(tosend + 1, rt->encrypted);
1271 if ((ret = ffurl_write(rt->stream, tosend,
1272 RTMP_HANDSHAKE_PACKET_SIZE + 1)) < 0) {
1273 av_log(s, AV_LOG_ERROR, "Cannot write RTMP handshake request\n");
1277 if ((ret = ffurl_read_complete(rt->stream, serverdata,
1278 RTMP_HANDSHAKE_PACKET_SIZE + 1)) < 0) {
1279 av_log(s, AV_LOG_ERROR, "Cannot read RTMP handshake response\n");
1283 if ((ret = ffurl_read_complete(rt->stream, clientdata,
1284 RTMP_HANDSHAKE_PACKET_SIZE)) < 0) {
1285 av_log(s, AV_LOG_ERROR, "Cannot read RTMP handshake response\n");
1289 av_log(s, AV_LOG_DEBUG, "Type answer %d\n", serverdata[0]);
1290 av_log(s, AV_LOG_DEBUG, "Server version %d.%d.%d.%d\n",
1291 serverdata[5], serverdata[6], serverdata[7], serverdata[8]);
1293 if (rt->is_input && serverdata[5] >= 3) {
1294 server_pos = rtmp_validate_digest(serverdata + 1, 772);
1300 server_pos = rtmp_validate_digest(serverdata + 1, 8);
1305 av_log(s, AV_LOG_ERROR, "Server response validating failed\n");
1306 return AVERROR(EIO);
1310 /* Generate SWFVerification token (SHA256 HMAC hash of decompressed SWF,
1311 * key are the last 32 bytes of the server handshake. */
1313 if ((ret = rtmp_calc_swf_verification(s, rt, serverdata + 1 +
1314 RTMP_HANDSHAKE_PACKET_SIZE - 32)) < 0)
1318 ret = ff_rtmp_calc_digest(tosend + 1 + client_pos, 32, 0,
1319 rtmp_server_key, sizeof(rtmp_server_key),
1324 ret = ff_rtmp_calc_digest(clientdata, RTMP_HANDSHAKE_PACKET_SIZE - 32,
1325 0, digest, 32, signature);
1329 if (CONFIG_FFRTMPCRYPT_PROTOCOL && rt->encrypted) {
1330 /* Compute the shared secret key sent by the server and initialize
1331 * the RC4 encryption. */
1332 if ((ret = ff_rtmpe_compute_secret_key(rt->stream, serverdata + 1,
1333 tosend + 1, type)) < 0)
1336 /* Encrypt the signature received by the server. */
1337 ff_rtmpe_encrypt_sig(rt->stream, signature, digest, serverdata[0]);
1340 if (memcmp(signature, clientdata + RTMP_HANDSHAKE_PACKET_SIZE - 32, 32)) {
1341 av_log(s, AV_LOG_ERROR, "Signature mismatch\n");
1342 return AVERROR(EIO);
1345 for (i = 0; i < RTMP_HANDSHAKE_PACKET_SIZE; i++)
1346 tosend[i] = av_lfg_get(&rnd) >> 24;
1347 ret = ff_rtmp_calc_digest(serverdata + 1 + server_pos, 32, 0,
1348 rtmp_player_key, sizeof(rtmp_player_key),
1353 ret = ff_rtmp_calc_digest(tosend, RTMP_HANDSHAKE_PACKET_SIZE - 32, 0,
1355 tosend + RTMP_HANDSHAKE_PACKET_SIZE - 32);
1359 if (CONFIG_FFRTMPCRYPT_PROTOCOL && rt->encrypted) {
1360 /* Encrypt the signature to be send to the server. */
1361 ff_rtmpe_encrypt_sig(rt->stream, tosend +
1362 RTMP_HANDSHAKE_PACKET_SIZE - 32, digest,
1366 // write reply back to the server
1367 if ((ret = ffurl_write(rt->stream, tosend,
1368 RTMP_HANDSHAKE_PACKET_SIZE)) < 0)
1371 if (CONFIG_FFRTMPCRYPT_PROTOCOL && rt->encrypted) {
1372 /* Set RC4 keys for encryption and update the keystreams. */
1373 if ((ret = ff_rtmpe_update_keystream(rt->stream)) < 0)
1377 if (CONFIG_FFRTMPCRYPT_PROTOCOL && rt->encrypted) {
1378 /* Compute the shared secret key sent by the server and initialize
1379 * the RC4 encryption. */
1380 if ((ret = ff_rtmpe_compute_secret_key(rt->stream, serverdata + 1,
1381 tosend + 1, 1)) < 0)
1384 if (serverdata[0] == 9) {
1385 /* Encrypt the signature received by the server. */
1386 ff_rtmpe_encrypt_sig(rt->stream, signature, digest,
1391 if ((ret = ffurl_write(rt->stream, serverdata + 1,
1392 RTMP_HANDSHAKE_PACKET_SIZE)) < 0)
1395 if (CONFIG_FFRTMPCRYPT_PROTOCOL && rt->encrypted) {
1396 /* Set RC4 keys for encryption and update the keystreams. */
1397 if ((ret = ff_rtmpe_update_keystream(rt->stream)) < 0)
1405 static int rtmp_receive_hs_packet(RTMPContext* rt, uint32_t *first_int,
1406 uint32_t *second_int, char *arraydata,
1411 inoutsize = ffurl_read_complete(rt->stream, arraydata,
1412 RTMP_HANDSHAKE_PACKET_SIZE);
1414 return AVERROR(EIO);
1415 if (inoutsize != RTMP_HANDSHAKE_PACKET_SIZE) {
1416 av_log(rt, AV_LOG_ERROR, "Erroneous Message size %d"
1417 " not following standard\n", (int)inoutsize);
1418 return AVERROR(EINVAL);
1421 *first_int = AV_RB32(arraydata);
1422 *second_int = AV_RB32(arraydata + 4);
1426 static int rtmp_send_hs_packet(RTMPContext* rt, uint32_t first_int,
1427 uint32_t second_int, char *arraydata, int size)
1431 AV_WB32(arraydata, first_int);
1432 AV_WB32(arraydata + 4, second_int);
1433 inoutsize = ffurl_write(rt->stream, arraydata,
1434 RTMP_HANDSHAKE_PACKET_SIZE);
1435 if (inoutsize != RTMP_HANDSHAKE_PACKET_SIZE) {
1436 av_log(rt, AV_LOG_ERROR, "Unable to write answer\n");
1437 return AVERROR(EIO);
1444 * rtmp handshake server side
1446 static int rtmp_server_handshake(URLContext *s, RTMPContext *rt)
1448 uint8_t buffer[RTMP_HANDSHAKE_PACKET_SIZE];
1450 uint32_t hs_my_epoch;
1451 uint8_t hs_c1[RTMP_HANDSHAKE_PACKET_SIZE];
1452 uint8_t hs_s1[RTMP_HANDSHAKE_PACKET_SIZE];
1459 inoutsize = ffurl_read_complete(rt->stream, buffer, 1); // Receive C0
1460 if (inoutsize <= 0) {
1461 av_log(s, AV_LOG_ERROR, "Unable to read handshake\n");
1462 return AVERROR(EIO);
1465 if (buffer[0] != 3) {
1466 av_log(s, AV_LOG_ERROR, "RTMP protocol version mismatch\n");
1467 return AVERROR(EIO);
1469 if (ffurl_write(rt->stream, buffer, 1) <= 0) { // Send S0
1470 av_log(s, AV_LOG_ERROR,
1471 "Unable to write answer - RTMP S0\n");
1472 return AVERROR(EIO);
1475 ret = rtmp_receive_hs_packet(rt, &hs_epoch, &zeroes, hs_c1,
1476 RTMP_HANDSHAKE_PACKET_SIZE);
1478 av_log(s, AV_LOG_ERROR, "RTMP Handshake C1 Error\n");
1482 /* By now same epoch will be sent */
1483 hs_my_epoch = hs_epoch;
1484 /* Generate random */
1485 for (randomidx = 8; randomidx < (RTMP_HANDSHAKE_PACKET_SIZE);
1487 AV_WB32(hs_s1 + randomidx, av_get_random_seed());
1489 ret = rtmp_send_hs_packet(rt, hs_my_epoch, 0, hs_s1,
1490 RTMP_HANDSHAKE_PACKET_SIZE);
1492 av_log(s, AV_LOG_ERROR, "RTMP Handshake S1 Error\n");
1496 ret = rtmp_send_hs_packet(rt, hs_epoch, 0, hs_c1,
1497 RTMP_HANDSHAKE_PACKET_SIZE);
1499 av_log(s, AV_LOG_ERROR, "RTMP Handshake S2 Error\n");
1503 ret = rtmp_receive_hs_packet(rt, &temp, &zeroes, buffer,
1504 RTMP_HANDSHAKE_PACKET_SIZE);
1506 av_log(s, AV_LOG_ERROR, "RTMP Handshake C2 Error\n");
1509 if (temp != hs_my_epoch)
1510 av_log(s, AV_LOG_WARNING,
1511 "Erroneous C2 Message epoch does not match up with C1 epoch\n");
1512 if (memcmp(buffer + 8, hs_s1 + 8,
1513 RTMP_HANDSHAKE_PACKET_SIZE - 8))
1514 av_log(s, AV_LOG_WARNING,
1515 "Erroneous C2 Message random does not match up\n");
1520 static int handle_chunk_size(URLContext *s, RTMPPacket *pkt)
1522 RTMPContext *rt = s->priv_data;
1525 if (pkt->size < 4) {
1526 av_log(s, AV_LOG_ERROR,
1527 "Too short chunk size change packet (%d)\n",
1529 return AVERROR_INVALIDDATA;
1532 if (!rt->is_input) {
1533 /* Send the same chunk size change packet back to the server,
1534 * setting the outgoing chunk size to the same as the incoming one. */
1535 if ((ret = ff_rtmp_packet_write(rt->stream, pkt, rt->out_chunk_size,
1536 &rt->prev_pkt[1], &rt->nb_prev_pkt[1])) < 0)
1538 rt->out_chunk_size = AV_RB32(pkt->data);
1541 rt->in_chunk_size = AV_RB32(pkt->data);
1542 if (rt->in_chunk_size <= 0) {
1543 av_log(s, AV_LOG_ERROR, "Incorrect chunk size %d\n",
1545 return AVERROR_INVALIDDATA;
1547 av_log(s, AV_LOG_DEBUG, "New incoming chunk size = %d\n",
1553 static int handle_ping(URLContext *s, RTMPPacket *pkt)
1555 RTMPContext *rt = s->priv_data;
1558 if (pkt->size < 2) {
1559 av_log(s, AV_LOG_ERROR, "Too short ping packet (%d)\n",
1561 return AVERROR_INVALIDDATA;
1564 t = AV_RB16(pkt->data);
1566 if ((ret = gen_pong(s, rt, pkt)) < 0)
1568 } else if (t == 26) {
1570 if ((ret = gen_swf_verification(s, rt)) < 0)
1573 av_log(s, AV_LOG_WARNING, "Ignoring SWFVerification request.\n");
1580 static int handle_client_bw(URLContext *s, RTMPPacket *pkt)
1582 RTMPContext *rt = s->priv_data;
1584 if (pkt->size < 4) {
1585 av_log(s, AV_LOG_ERROR,
1586 "Client bandwidth report packet is less than 4 bytes long (%d)\n",
1588 return AVERROR_INVALIDDATA;
1591 rt->client_report_size = AV_RB32(pkt->data);
1592 if (rt->client_report_size <= 0) {
1593 av_log(s, AV_LOG_ERROR, "Incorrect client bandwidth %d\n",
1594 rt->client_report_size);
1595 return AVERROR_INVALIDDATA;
1598 av_log(s, AV_LOG_DEBUG, "Client bandwidth = %d\n", rt->client_report_size);
1599 rt->client_report_size >>= 1;
1604 static int handle_server_bw(URLContext *s, RTMPPacket *pkt)
1606 RTMPContext *rt = s->priv_data;
1608 if (pkt->size < 4) {
1609 av_log(s, AV_LOG_ERROR,
1610 "Too short server bandwidth report packet (%d)\n",
1612 return AVERROR_INVALIDDATA;
1615 rt->server_bw = AV_RB32(pkt->data);
1616 if (rt->server_bw <= 0) {
1617 av_log(s, AV_LOG_ERROR, "Incorrect server bandwidth %d\n",
1619 return AVERROR_INVALIDDATA;
1621 av_log(s, AV_LOG_DEBUG, "Server bandwidth = %d\n", rt->server_bw);
1626 static int do_adobe_auth(RTMPContext *rt, const char *user, const char *salt,
1627 const char *opaque, const char *challenge)
1630 char hashstr[AV_BASE64_SIZE(sizeof(hash))], challenge2[10];
1631 struct AVMD5 *md5 = av_md5_alloc();
1633 return AVERROR(ENOMEM);
1635 snprintf(challenge2, sizeof(challenge2), "%08x", av_get_random_seed());
1638 av_md5_update(md5, user, strlen(user));
1639 av_md5_update(md5, salt, strlen(salt));
1640 av_md5_update(md5, rt->password, strlen(rt->password));
1641 av_md5_final(md5, hash);
1642 av_base64_encode(hashstr, sizeof(hashstr), hash,
1645 av_md5_update(md5, hashstr, strlen(hashstr));
1647 av_md5_update(md5, opaque, strlen(opaque));
1649 av_md5_update(md5, challenge, strlen(challenge));
1650 av_md5_update(md5, challenge2, strlen(challenge2));
1651 av_md5_final(md5, hash);
1652 av_base64_encode(hashstr, sizeof(hashstr), hash,
1654 snprintf(rt->auth_params, sizeof(rt->auth_params),
1655 "?authmod=%s&user=%s&challenge=%s&response=%s",
1656 "adobe", user, challenge2, hashstr);
1658 av_strlcatf(rt->auth_params, sizeof(rt->auth_params),
1659 "&opaque=%s", opaque);
1665 static int do_llnw_auth(RTMPContext *rt, const char *user, const char *nonce)
1668 char hashstr1[33], hashstr2[33];
1669 const char *realm = "live";
1670 const char *method = "publish";
1671 const char *qop = "auth";
1672 const char *nc = "00000001";
1674 struct AVMD5 *md5 = av_md5_alloc();
1676 return AVERROR(ENOMEM);
1678 snprintf(cnonce, sizeof(cnonce), "%08x", av_get_random_seed());
1681 av_md5_update(md5, user, strlen(user));
1682 av_md5_update(md5, ":", 1);
1683 av_md5_update(md5, realm, strlen(realm));
1684 av_md5_update(md5, ":", 1);
1685 av_md5_update(md5, rt->password, strlen(rt->password));
1686 av_md5_final(md5, hash);
1687 ff_data_to_hex(hashstr1, hash, 16, 1);
1688 hashstr1[32] = '\0';
1691 av_md5_update(md5, method, strlen(method));
1692 av_md5_update(md5, ":/", 2);
1693 av_md5_update(md5, rt->app, strlen(rt->app));
1694 if (!strchr(rt->app, '/'))
1695 av_md5_update(md5, "/_definst_", strlen("/_definst_"));
1696 av_md5_final(md5, hash);
1697 ff_data_to_hex(hashstr2, hash, 16, 1);
1698 hashstr2[32] = '\0';
1701 av_md5_update(md5, hashstr1, strlen(hashstr1));
1702 av_md5_update(md5, ":", 1);
1704 av_md5_update(md5, nonce, strlen(nonce));
1705 av_md5_update(md5, ":", 1);
1706 av_md5_update(md5, nc, strlen(nc));
1707 av_md5_update(md5, ":", 1);
1708 av_md5_update(md5, cnonce, strlen(cnonce));
1709 av_md5_update(md5, ":", 1);
1710 av_md5_update(md5, qop, strlen(qop));
1711 av_md5_update(md5, ":", 1);
1712 av_md5_update(md5, hashstr2, strlen(hashstr2));
1713 av_md5_final(md5, hash);
1714 ff_data_to_hex(hashstr1, hash, 16, 1);
1716 snprintf(rt->auth_params, sizeof(rt->auth_params),
1717 "?authmod=%s&user=%s&nonce=%s&cnonce=%s&nc=%s&response=%s",
1718 "llnw", user, nonce, cnonce, nc, hashstr1);
1724 static int handle_connect_error(URLContext *s, const char *desc)
1726 RTMPContext *rt = s->priv_data;
1727 char buf[300], *ptr, authmod[15];
1729 const char *user = "", *salt = "", *opaque = NULL,
1730 *challenge = NULL, *cptr = NULL, *nonce = NULL;
1732 if (!(cptr = strstr(desc, "authmod=adobe")) &&
1733 !(cptr = strstr(desc, "authmod=llnw"))) {
1734 av_log(s, AV_LOG_ERROR,
1735 "Unknown connect error (unsupported authentication method?)\n");
1736 return AVERROR_UNKNOWN;
1738 cptr += strlen("authmod=");
1739 while (*cptr && *cptr != ' ' && i < sizeof(authmod) - 1)
1740 authmod[i++] = *cptr++;
1743 if (!rt->username[0] || !rt->password[0]) {
1744 av_log(s, AV_LOG_ERROR, "No credentials set\n");
1745 return AVERROR_UNKNOWN;
1748 if (strstr(desc, "?reason=authfailed")) {
1749 av_log(s, AV_LOG_ERROR, "Incorrect username/password\n");
1750 return AVERROR_UNKNOWN;
1751 } else if (strstr(desc, "?reason=nosuchuser")) {
1752 av_log(s, AV_LOG_ERROR, "Incorrect username\n");
1753 return AVERROR_UNKNOWN;
1756 if (rt->auth_tried) {
1757 av_log(s, AV_LOG_ERROR, "Authentication failed\n");
1758 return AVERROR_UNKNOWN;
1761 rt->auth_params[0] = '\0';
1763 if (strstr(desc, "code=403 need auth")) {
1764 snprintf(rt->auth_params, sizeof(rt->auth_params),
1765 "?authmod=%s&user=%s", authmod, rt->username);
1769 if (!(cptr = strstr(desc, "?reason=needauth"))) {
1770 av_log(s, AV_LOG_ERROR, "No auth parameters found\n");
1771 return AVERROR_UNKNOWN;
1774 av_strlcpy(buf, cptr + 1, sizeof(buf));
1778 char *next = strchr(ptr, '&');
1779 char *value = strchr(ptr, '=');
1784 if (!strcmp(ptr, "user")) {
1786 } else if (!strcmp(ptr, "salt")) {
1788 } else if (!strcmp(ptr, "opaque")) {
1790 } else if (!strcmp(ptr, "challenge")) {
1792 } else if (!strcmp(ptr, "nonce")) {
1795 av_log(s, AV_LOG_INFO, "Ignoring unsupported var %s\n", ptr);
1798 av_log(s, AV_LOG_WARNING, "Variable %s has NULL value\n", ptr);
1803 if (!strcmp(authmod, "adobe")) {
1804 if ((ret = do_adobe_auth(rt, user, salt, opaque, challenge)) < 0)
1807 if ((ret = do_llnw_auth(rt, user, nonce)) < 0)
1815 static int handle_invoke_error(URLContext *s, RTMPPacket *pkt)
1817 RTMPContext *rt = s->priv_data;
1818 const uint8_t *data_end = pkt->data + pkt->size;
1819 char *tracked_method = NULL;
1820 int level = AV_LOG_ERROR;
1821 uint8_t tmpstr[256];
1824 if ((ret = find_tracked_method(s, pkt, 9, &tracked_method)) < 0)
1827 if (!ff_amf_get_field_value(pkt->data + 9, data_end,
1828 "description", tmpstr, sizeof(tmpstr))) {
1829 if (tracked_method && (!strcmp(tracked_method, "_checkbw") ||
1830 !strcmp(tracked_method, "releaseStream") ||
1831 !strcmp(tracked_method, "FCSubscribe") ||
1832 !strcmp(tracked_method, "FCPublish"))) {
1833 /* Gracefully ignore Adobe-specific historical artifact errors. */
1834 level = AV_LOG_WARNING;
1836 } else if (tracked_method && !strcmp(tracked_method, "getStreamLength")) {
1837 level = rt->live ? AV_LOG_DEBUG : AV_LOG_WARNING;
1839 } else if (tracked_method && !strcmp(tracked_method, "connect")) {
1840 ret = handle_connect_error(s, tmpstr);
1842 rt->do_reconnect = 1;
1843 level = AV_LOG_VERBOSE;
1846 ret = AVERROR_UNKNOWN;
1847 av_log(s, level, "Server error: %s\n", tmpstr);
1850 av_free(tracked_method);
1854 static int write_begin(URLContext *s)
1856 RTMPContext *rt = s->priv_data;
1858 RTMPPacket spkt = { 0 };
1861 // Send Stream Begin 1
1862 if ((ret = ff_rtmp_packet_create(&spkt, RTMP_NETWORK_CHANNEL,
1863 RTMP_PT_PING, 0, 6)) < 0) {
1864 av_log(s, AV_LOG_ERROR, "Unable to create response packet\n");
1868 bytestream2_init_writer(&pbc, spkt.data, spkt.size);
1869 bytestream2_put_be16(&pbc, 0); // 0 -> Stream Begin
1870 bytestream2_put_be32(&pbc, rt->nb_streamid);
1872 ret = ff_rtmp_packet_write(rt->stream, &spkt, rt->out_chunk_size,
1873 &rt->prev_pkt[1], &rt->nb_prev_pkt[1]);
1875 ff_rtmp_packet_destroy(&spkt);
1880 static int write_status(URLContext *s, RTMPPacket *pkt,
1881 const char *status, const char *filename)
1883 RTMPContext *rt = s->priv_data;
1884 RTMPPacket spkt = { 0 };
1885 char statusmsg[128];
1889 if ((ret = ff_rtmp_packet_create(&spkt, RTMP_SYSTEM_CHANNEL,
1891 RTMP_PKTDATA_DEFAULT_SIZE)) < 0) {
1892 av_log(s, AV_LOG_ERROR, "Unable to create response packet\n");
1897 spkt.extra = pkt->extra;
1898 ff_amf_write_string(&pp, "onStatus");
1899 ff_amf_write_number(&pp, 0);
1900 ff_amf_write_null(&pp);
1902 ff_amf_write_object_start(&pp);
1903 ff_amf_write_field_name(&pp, "level");
1904 ff_amf_write_string(&pp, "status");
1905 ff_amf_write_field_name(&pp, "code");
1906 ff_amf_write_string(&pp, status);
1907 ff_amf_write_field_name(&pp, "description");
1908 snprintf(statusmsg, sizeof(statusmsg),
1909 "%s is now published", filename);
1910 ff_amf_write_string(&pp, statusmsg);
1911 ff_amf_write_field_name(&pp, "details");
1912 ff_amf_write_string(&pp, filename);
1913 ff_amf_write_object_end(&pp);
1915 spkt.size = pp - spkt.data;
1916 ret = ff_rtmp_packet_write(rt->stream, &spkt, rt->out_chunk_size,
1917 &rt->prev_pkt[1], &rt->nb_prev_pkt[1]);
1918 ff_rtmp_packet_destroy(&spkt);
1923 static int send_invoke_response(URLContext *s, RTMPPacket *pkt)
1925 RTMPContext *rt = s->priv_data;
1931 const uint8_t *p = pkt->data;
1933 RTMPPacket spkt = { 0 };
1937 bytestream2_init(&gbc, p, pkt->size);
1938 if (ff_amf_read_string(&gbc, command, sizeof(command),
1940 av_log(s, AV_LOG_ERROR, "Error in PT_INVOKE\n");
1941 return AVERROR_INVALIDDATA;
1944 ret = ff_amf_read_number(&gbc, &seqnum);
1947 ret = ff_amf_read_null(&gbc);
1950 if (!strcmp(command, "FCPublish") ||
1951 !strcmp(command, "publish")) {
1952 ret = ff_amf_read_string(&gbc, filename,
1953 sizeof(filename), &stringlen);
1955 if (ret == AVERROR(EINVAL))
1956 av_log(s, AV_LOG_ERROR, "Unable to parse stream name - name too long?\n");
1958 av_log(s, AV_LOG_ERROR, "Unable to parse stream name\n");
1963 pchar = strrchr(s->filename, '/');
1965 av_log(s, AV_LOG_WARNING,
1966 "Unable to find / in url %s, bad format\n",
1968 pchar = s->filename;
1971 if (strcmp(pchar, filename))
1972 av_log(s, AV_LOG_WARNING, "Unexpected stream %s, expecting"
1973 " %s\n", filename, pchar);
1975 rt->state = STATE_RECEIVING;
1978 if (!strcmp(command, "FCPublish")) {
1979 if ((ret = ff_rtmp_packet_create(&spkt, RTMP_SYSTEM_CHANNEL,
1981 RTMP_PKTDATA_DEFAULT_SIZE)) < 0) {
1982 av_log(s, AV_LOG_ERROR, "Unable to create response packet\n");
1986 ff_amf_write_string(&pp, "onFCPublish");
1987 } else if (!strcmp(command, "publish")) {
1988 ret = write_begin(s);
1992 // Send onStatus(NetStream.Publish.Start)
1993 return write_status(s, pkt, "NetStream.Publish.Start",
1995 } else if (!strcmp(command, "play")) {
1996 ret = write_begin(s);
1999 rt->state = STATE_SENDING;
2000 return write_status(s, pkt, "NetStream.Play.Start",
2003 if ((ret = ff_rtmp_packet_create(&spkt, RTMP_SYSTEM_CHANNEL,
2005 RTMP_PKTDATA_DEFAULT_SIZE)) < 0) {
2006 av_log(s, AV_LOG_ERROR, "Unable to create response packet\n");
2010 ff_amf_write_string(&pp, "_result");
2011 ff_amf_write_number(&pp, seqnum);
2012 ff_amf_write_null(&pp);
2013 if (!strcmp(command, "createStream")) {
2015 if (rt->nb_streamid == 0 || rt->nb_streamid == 2)
2016 rt->nb_streamid++; /* Values 0 and 2 are reserved */
2017 ff_amf_write_number(&pp, rt->nb_streamid);
2018 /* By now we don't control which streams are removed in
2019 * deleteStream. There is no stream creation control
2020 * if a client creates more than 2^32 - 2 streams. */
2023 spkt.size = pp - spkt.data;
2024 ret = ff_rtmp_packet_write(rt->stream, &spkt, rt->out_chunk_size,
2025 &rt->prev_pkt[1], &rt->nb_prev_pkt[1]);
2026 ff_rtmp_packet_destroy(&spkt);
2031 * Read the AMF_NUMBER response ("_result") to a function call
2032 * (e.g. createStream()). This response should be made up of the AMF_STRING
2033 * "result", a NULL object and then the response encoded as AMF_NUMBER. On a
2034 * successful response, we will return set the value to number (otherwise number
2035 * will not be changed).
2037 * @return 0 if reading the value succeeds, negative value otherwise
2039 static int read_number_result(RTMPPacket *pkt, double *number)
2041 // We only need to fit "_result" in this.
2042 uint8_t strbuffer[8];
2047 bytestream2_init(&gbc, pkt->data, pkt->size);
2049 // Value 1/4: "_result" as AMF_STRING
2050 if (ff_amf_read_string(&gbc, strbuffer, sizeof(strbuffer), &stringlen))
2051 return AVERROR_INVALIDDATA;
2052 if (strcmp(strbuffer, "_result"))
2053 return AVERROR_INVALIDDATA;
2054 // Value 2/4: The callee reference number
2055 if (ff_amf_read_number(&gbc, &numbuffer))
2056 return AVERROR_INVALIDDATA;
2058 if (ff_amf_read_null(&gbc))
2059 return AVERROR_INVALIDDATA;
2060 // Value 4/4: The response as AMF_NUMBER
2061 if (ff_amf_read_number(&gbc, &numbuffer))
2062 return AVERROR_INVALIDDATA;
2064 *number = numbuffer;
2069 static int handle_invoke_result(URLContext *s, RTMPPacket *pkt)
2071 RTMPContext *rt = s->priv_data;
2072 char *tracked_method = NULL;
2075 if ((ret = find_tracked_method(s, pkt, 10, &tracked_method)) < 0)
2078 if (!tracked_method) {
2079 /* Ignore this reply when the current method is not tracked. */
2083 if (!strcmp(tracked_method, "connect")) {
2084 if (!rt->is_input) {
2085 if ((ret = gen_release_stream(s, rt)) < 0)
2088 if ((ret = gen_fcpublish_stream(s, rt)) < 0)
2091 if ((ret = gen_server_bw(s, rt)) < 0)
2095 if ((ret = gen_create_stream(s, rt)) < 0)
2099 /* Send the FCSubscribe command when the name of live
2100 * stream is defined by the user or if it's a live stream. */
2101 if (rt->subscribe) {
2102 if ((ret = gen_fcsubscribe_stream(s, rt, rt->subscribe)) < 0)
2104 } else if (rt->live == -1) {
2105 if ((ret = gen_fcsubscribe_stream(s, rt, rt->playpath)) < 0)
2109 } else if (!strcmp(tracked_method, "createStream")) {
2111 if (read_number_result(pkt, &stream_id)) {
2112 av_log(s, AV_LOG_WARNING, "Unexpected reply on connect()\n");
2114 rt->stream_id = stream_id;
2117 if (!rt->is_input) {
2118 if ((ret = gen_publish(s, rt)) < 0)
2121 if (rt->live != -1) {
2122 if ((ret = gen_get_stream_length(s, rt)) < 0)
2125 if ((ret = gen_play(s, rt)) < 0)
2127 if ((ret = gen_buffer_time(s, rt)) < 0)
2130 } else if (!strcmp(tracked_method, "getStreamLength")) {
2131 if (read_number_result(pkt, &rt->duration)) {
2132 av_log(s, AV_LOG_WARNING, "Unexpected reply on getStreamLength()\n");
2137 av_free(tracked_method);
2141 static int handle_invoke_status(URLContext *s, RTMPPacket *pkt)
2143 RTMPContext *rt = s->priv_data;
2144 const uint8_t *data_end = pkt->data + pkt->size;
2145 const uint8_t *ptr = pkt->data + RTMP_HEADER;
2146 uint8_t tmpstr[256];
2149 for (i = 0; i < 2; i++) {
2150 t = ff_amf_tag_size(ptr, data_end);
2156 t = ff_amf_get_field_value(ptr, data_end, "level", tmpstr, sizeof(tmpstr));
2157 if (!t && !strcmp(tmpstr, "error")) {
2158 t = ff_amf_get_field_value(ptr, data_end,
2159 "description", tmpstr, sizeof(tmpstr));
2160 if (t || !tmpstr[0])
2161 t = ff_amf_get_field_value(ptr, data_end, "code",
2162 tmpstr, sizeof(tmpstr));
2164 av_log(s, AV_LOG_ERROR, "Server error: %s\n", tmpstr);
2168 t = ff_amf_get_field_value(ptr, data_end, "code", tmpstr, sizeof(tmpstr));
2169 if (!t && !strcmp(tmpstr, "NetStream.Play.Start")) rt->state = STATE_PLAYING;
2170 if (!t && !strcmp(tmpstr, "NetStream.Play.Stop")) rt->state = STATE_STOPPED;
2171 if (!t && !strcmp(tmpstr, "NetStream.Play.UnpublishNotify")) rt->state = STATE_STOPPED;
2172 if (!t && !strcmp(tmpstr, "NetStream.Publish.Start")) rt->state = STATE_PUBLISHING;
2173 if (!t && !strcmp(tmpstr, "NetStream.Seek.Notify")) rt->state = STATE_PLAYING;
2178 static int handle_invoke(URLContext *s, RTMPPacket *pkt)
2180 RTMPContext *rt = s->priv_data;
2183 //TODO: check for the messages sent for wrong state?
2184 if (ff_amf_match_string(pkt->data, pkt->size, "_error")) {
2185 if ((ret = handle_invoke_error(s, pkt)) < 0)
2187 } else if (ff_amf_match_string(pkt->data, pkt->size, "_result")) {
2188 if ((ret = handle_invoke_result(s, pkt)) < 0)
2190 } else if (ff_amf_match_string(pkt->data, pkt->size, "onStatus")) {
2191 if ((ret = handle_invoke_status(s, pkt)) < 0)
2193 } else if (ff_amf_match_string(pkt->data, pkt->size, "onBWDone")) {
2194 if ((ret = gen_check_bw(s, rt)) < 0)
2196 } else if (ff_amf_match_string(pkt->data, pkt->size, "releaseStream") ||
2197 ff_amf_match_string(pkt->data, pkt->size, "FCPublish") ||
2198 ff_amf_match_string(pkt->data, pkt->size, "publish") ||
2199 ff_amf_match_string(pkt->data, pkt->size, "play") ||
2200 ff_amf_match_string(pkt->data, pkt->size, "_checkbw") ||
2201 ff_amf_match_string(pkt->data, pkt->size, "createStream")) {
2202 if ((ret = send_invoke_response(s, pkt)) < 0)
2209 static int update_offset(RTMPContext *rt, int size)
2213 // generate packet header and put data into buffer for FLV demuxer
2214 if (rt->flv_off < rt->flv_size) {
2215 // There is old unread data in the buffer, thus append at the end
2216 old_flv_size = rt->flv_size;
2217 rt->flv_size += size;
2219 // All data has been read, write the new data at the start of the buffer
2221 rt->flv_size = size;
2225 return old_flv_size;
2228 static int append_flv_data(RTMPContext *rt, RTMPPacket *pkt, int skip)
2230 int old_flv_size, ret;
2232 const uint8_t *data = pkt->data + skip;
2233 const int size = pkt->size - skip;
2234 uint32_t ts = pkt->timestamp;
2236 if (pkt->type == RTMP_PT_AUDIO) {
2238 } else if (pkt->type == RTMP_PT_VIDEO) {
2242 old_flv_size = update_offset(rt, size + 15);
2244 if ((ret = av_reallocp(&rt->flv_data, rt->flv_size)) < 0) {
2245 rt->flv_size = rt->flv_off = 0;
2248 bytestream2_init_writer(&pbc, rt->flv_data, rt->flv_size);
2249 bytestream2_skip_p(&pbc, old_flv_size);
2250 bytestream2_put_byte(&pbc, pkt->type);
2251 bytestream2_put_be24(&pbc, size);
2252 bytestream2_put_be24(&pbc, ts);
2253 bytestream2_put_byte(&pbc, ts >> 24);
2254 bytestream2_put_be24(&pbc, 0);
2255 bytestream2_put_buffer(&pbc, data, size);
2256 bytestream2_put_be32(&pbc, size + RTMP_HEADER);
2261 static int handle_notify(URLContext *s, RTMPPacket *pkt)
2263 RTMPContext *rt = s->priv_data;
2264 uint8_t commandbuffer[64];
2265 char statusmsg[128];
2266 int stringlen, ret, skip = 0;
2269 bytestream2_init(&gbc, pkt->data, pkt->size);
2270 if (ff_amf_read_string(&gbc, commandbuffer, sizeof(commandbuffer),
2272 return AVERROR_INVALIDDATA;
2274 if (!strcmp(commandbuffer, "onMetaData")) {
2275 // metadata properties should be stored in a mixed array
2276 if (bytestream2_get_byte(&gbc) == AMF_DATA_TYPE_MIXEDARRAY) {
2277 // We have found a metaData Array so flv can determine the streams
2279 rt->received_metadata = 1;
2280 // skip 32-bit max array index
2281 bytestream2_skip(&gbc, 4);
2282 while (bytestream2_get_bytes_left(&gbc) > 3) {
2283 if (ff_amf_get_string(&gbc, statusmsg, sizeof(statusmsg),
2285 return AVERROR_INVALIDDATA;
2286 // We do not care about the content of the property (yet).
2287 stringlen = ff_amf_tag_size(gbc.buffer, gbc.buffer_end);
2289 return AVERROR_INVALIDDATA;
2290 bytestream2_skip(&gbc, stringlen);
2292 // The presence of the following properties indicates that the
2293 // respective streams are present.
2294 if (!strcmp(statusmsg, "videocodecid")) {
2297 if (!strcmp(statusmsg, "audiocodecid")) {
2301 if (bytestream2_get_be24(&gbc) != AMF_END_OF_OBJECT)
2302 return AVERROR_INVALIDDATA;
2306 // Skip the @setDataFrame string and validate it is a notification
2307 if (!strcmp(commandbuffer, "@setDataFrame")) {
2308 skip = gbc.buffer - pkt->data;
2309 ret = ff_amf_read_string(&gbc, statusmsg,
2310 sizeof(statusmsg), &stringlen);
2312 return AVERROR_INVALIDDATA;
2315 return append_flv_data(rt, pkt, skip);
2319 * Parse received packet and possibly perform some action depending on
2320 * the packet contents.
2321 * @return 0 for no errors, negative values for serious errors which prevent
2322 * further communications, positive values for uncritical errors
2324 static int rtmp_parse_result(URLContext *s, RTMPContext *rt, RTMPPacket *pkt)
2329 ff_rtmp_packet_dump(s, pkt);
2332 switch (pkt->type) {
2333 case RTMP_PT_BYTES_READ:
2334 av_log(s, AV_LOG_TRACE, "received bytes read report\n");
2336 case RTMP_PT_CHUNK_SIZE:
2337 if ((ret = handle_chunk_size(s, pkt)) < 0)
2341 if ((ret = handle_ping(s, pkt)) < 0)
2344 case RTMP_PT_CLIENT_BW:
2345 if ((ret = handle_client_bw(s, pkt)) < 0)
2348 case RTMP_PT_SERVER_BW:
2349 if ((ret = handle_server_bw(s, pkt)) < 0)
2352 case RTMP_PT_INVOKE:
2353 if ((ret = handle_invoke(s, pkt)) < 0)
2358 case RTMP_PT_METADATA:
2359 case RTMP_PT_NOTIFY:
2360 /* Audio, Video and Metadata packets are parsed in get_packet() */
2363 av_log(s, AV_LOG_VERBOSE, "Unknown packet type received 0x%02X\n", pkt->type);
2369 static int handle_metadata(RTMPContext *rt, RTMPPacket *pkt)
2371 int ret, old_flv_size, type;
2372 const uint8_t *next;
2375 uint32_t ts, cts, pts = 0;
2377 old_flv_size = update_offset(rt, pkt->size);
2379 if ((ret = av_reallocp(&rt->flv_data, rt->flv_size)) < 0) {
2380 rt->flv_size = rt->flv_off = 0;
2385 p = rt->flv_data + old_flv_size;
2387 /* copy data while rewriting timestamps */
2388 ts = pkt->timestamp;
2390 while (next - pkt->data < pkt->size - RTMP_HEADER) {
2391 type = bytestream_get_byte(&next);
2392 size = bytestream_get_be24(&next);
2393 cts = bytestream_get_be24(&next);
2394 cts |= bytestream_get_byte(&next) << 24;
2399 if (size + 3 + 4 > pkt->data + pkt->size - next)
2401 bytestream_put_byte(&p, type);
2402 bytestream_put_be24(&p, size);
2403 bytestream_put_be24(&p, ts);
2404 bytestream_put_byte(&p, ts >> 24);
2405 memcpy(p, next, size + 3 + 4);
2407 bytestream_put_be32(&p, size + RTMP_HEADER);
2408 next += size + 3 + 4;
2410 if (p != rt->flv_data + rt->flv_size) {
2411 av_log(NULL, AV_LOG_WARNING, "Incomplete flv packets in "
2412 "RTMP_PT_METADATA packet\n");
2413 rt->flv_size = p - rt->flv_data;
2420 * Interact with the server by receiving and sending RTMP packets until
2421 * there is some significant data (media data or expected status notification).
2423 * @param s reading context
2424 * @param for_header non-zero value tells function to work until it
2425 * gets notification from the server that playing has been started,
2426 * otherwise function will work until some media data is received (or
2428 * @return 0 for successful operation, negative value in case of error
2430 static int get_packet(URLContext *s, int for_header)
2432 RTMPContext *rt = s->priv_data;
2435 if (rt->state == STATE_STOPPED)
2439 RTMPPacket rpkt = { 0 };
2440 if ((ret = ff_rtmp_packet_read(rt->stream, &rpkt,
2441 rt->in_chunk_size, &rt->prev_pkt[0],
2442 &rt->nb_prev_pkt[0])) <= 0) {
2444 return AVERROR(EAGAIN);
2446 return AVERROR(EIO);
2450 // Track timestamp for later use
2451 rt->last_timestamp = rpkt.timestamp;
2453 rt->bytes_read += ret;
2454 if (rt->bytes_read - rt->last_bytes_read > rt->client_report_size) {
2455 av_log(s, AV_LOG_DEBUG, "Sending bytes read report\n");
2456 if ((ret = gen_bytes_read(s, rt, rpkt.timestamp + 1)) < 0)
2458 rt->last_bytes_read = rt->bytes_read;
2461 ret = rtmp_parse_result(s, rt, &rpkt);
2463 // At this point we must check if we are in the seek state and continue
2464 // with the next packet. handle_invoke will get us out of this state
2465 // when the right message is encountered
2466 if (rt->state == STATE_SEEKING) {
2467 ff_rtmp_packet_destroy(&rpkt);
2468 // We continue, let the natural flow of things happen:
2469 // AVERROR(EAGAIN) or handle_invoke gets us out of here
2473 if (ret < 0) {//serious error in current packet
2474 ff_rtmp_packet_destroy(&rpkt);
2477 if (rt->do_reconnect && for_header) {
2478 ff_rtmp_packet_destroy(&rpkt);
2481 if (rt->state == STATE_STOPPED) {
2482 ff_rtmp_packet_destroy(&rpkt);
2485 if (for_header && (rt->state == STATE_PLAYING ||
2486 rt->state == STATE_PUBLISHING ||
2487 rt->state == STATE_SENDING ||
2488 rt->state == STATE_RECEIVING)) {
2489 ff_rtmp_packet_destroy(&rpkt);
2492 if (!rpkt.size || !rt->is_input) {
2493 ff_rtmp_packet_destroy(&rpkt);
2496 if (rpkt.type == RTMP_PT_VIDEO || rpkt.type == RTMP_PT_AUDIO) {
2497 ret = append_flv_data(rt, &rpkt, 0);
2498 ff_rtmp_packet_destroy(&rpkt);
2500 } else if (rpkt.type == RTMP_PT_NOTIFY) {
2501 ret = handle_notify(s, &rpkt);
2502 ff_rtmp_packet_destroy(&rpkt);
2504 } else if (rpkt.type == RTMP_PT_METADATA) {
2505 ret = handle_metadata(rt, &rpkt);
2506 ff_rtmp_packet_destroy(&rpkt);
2509 ff_rtmp_packet_destroy(&rpkt);
2513 static int rtmp_close(URLContext *h)
2515 RTMPContext *rt = h->priv_data;
2518 if (!rt->is_input) {
2519 rt->flv_data = NULL;
2520 if (rt->out_pkt.size)
2521 ff_rtmp_packet_destroy(&rt->out_pkt);
2522 if (rt->state > STATE_FCPUBLISH)
2523 ret = gen_fcunpublish_stream(h, rt);
2525 if (rt->state > STATE_HANDSHAKED)
2526 ret = gen_delete_stream(h, rt);
2527 for (i = 0; i < 2; i++) {
2528 for (j = 0; j < rt->nb_prev_pkt[i]; j++)
2529 ff_rtmp_packet_destroy(&rt->prev_pkt[i][j]);
2530 av_freep(&rt->prev_pkt[i]);
2533 free_tracked_methods(rt);
2534 av_freep(&rt->flv_data);
2535 ffurl_close(rt->stream);
2540 * Insert a fake onMetadata packet into the FLV stream to notify the FLV
2541 * demuxer about the duration of the stream.
2543 * This should only be done if there was no real onMetadata packet sent by the
2544 * server at the start of the stream and if we were able to retrieve a valid
2545 * duration via a getStreamLength call.
2547 * @return 0 for successful operation, negative value in case of error
2549 static int inject_fake_duration_metadata(RTMPContext *rt)
2551 // We need to insert the metadata packet directly after the FLV
2552 // header, i.e. we need to move all other already read data by the
2553 // size of our fake metadata packet.
2556 // Keep old flv_data pointer
2557 uint8_t* old_flv_data = rt->flv_data;
2558 // Allocate a new flv_data pointer with enough space for the additional package
2559 if (!(rt->flv_data = av_malloc(rt->flv_size + 55))) {
2560 rt->flv_data = old_flv_data;
2561 return AVERROR(ENOMEM);
2565 memcpy(rt->flv_data, old_flv_data, 13);
2566 // Copy remaining packets
2567 memcpy(rt->flv_data + 13 + 55, old_flv_data + 13, rt->flv_size - 13);
2568 // Increase the size by the injected packet
2570 // Delete the old FLV data
2571 av_freep(&old_flv_data);
2573 p = rt->flv_data + 13;
2574 bytestream_put_byte(&p, FLV_TAG_TYPE_META);
2575 bytestream_put_be24(&p, 40); // size of data part (sum of all parts below)
2576 bytestream_put_be24(&p, 0); // timestamp
2577 bytestream_put_be32(&p, 0); // reserved
2579 // first event name as a string
2580 bytestream_put_byte(&p, AMF_DATA_TYPE_STRING);
2581 // "onMetaData" as AMF string
2582 bytestream_put_be16(&p, 10);
2583 bytestream_put_buffer(&p, "onMetaData", 10);
2585 // mixed array (hash) with size and string/type/data tuples
2586 bytestream_put_byte(&p, AMF_DATA_TYPE_MIXEDARRAY);
2587 bytestream_put_be32(&p, 1); // metadata_count
2589 // "duration" as AMF string
2590 bytestream_put_be16(&p, 8);
2591 bytestream_put_buffer(&p, "duration", 8);
2592 bytestream_put_byte(&p, AMF_DATA_TYPE_NUMBER);
2593 bytestream_put_be64(&p, av_double2int(rt->duration));
2596 bytestream_put_be16(&p, 0); // Empty string
2597 bytestream_put_byte(&p, AMF_END_OF_OBJECT);
2598 bytestream_put_be32(&p, 40 + RTMP_HEADER); // size of data part (sum of all parts above)
2604 * Open RTMP connection and verify that the stream can be played.
2606 * URL syntax: rtmp://server[:port][/app][/playpath]
2607 * where 'app' is first one or two directories in the path
2608 * (e.g. /ondemand/, /flash/live/, etc.)
2609 * and 'playpath' is a file name (the rest of the path,
2610 * may be prefixed with "mp4:")
2612 static int rtmp_open(URLContext *s, const char *uri, int flags, AVDictionary **opts)
2614 RTMPContext *rt = s->priv_data;
2615 char proto[8], hostname[256], path[1024], auth[100], *fname;
2616 char *old_app, *qmark, *n, fname_buffer[1024];
2621 if (rt->listen_timeout > 0)
2624 rt->is_input = !(flags & AVIO_FLAG_WRITE);
2626 av_url_split(proto, sizeof(proto), auth, sizeof(auth),
2627 hostname, sizeof(hostname), &port,
2628 path, sizeof(path), s->filename);
2630 n = strchr(path, ' ');
2632 av_log(s, AV_LOG_WARNING,
2633 "Detected librtmp style URL parameters, these aren't supported "
2634 "by the libavformat internal RTMP handler currently enabled. "
2635 "See the documentation for the correct way to pass parameters.\n");
2636 *n = '\0'; // Trim not supported part
2640 char *ptr = strchr(auth, ':');
2643 av_strlcpy(rt->username, auth, sizeof(rt->username));
2644 av_strlcpy(rt->password, ptr + 1, sizeof(rt->password));
2648 if (rt->listen && strcmp(proto, "rtmp")) {
2649 av_log(s, AV_LOG_ERROR, "rtmp_listen not available for %s\n",
2651 return AVERROR(EINVAL);
2653 if (!strcmp(proto, "rtmpt") || !strcmp(proto, "rtmpts")) {
2654 if (!strcmp(proto, "rtmpts"))
2655 av_dict_set(opts, "ffrtmphttp_tls", "1", 1);
2657 /* open the http tunneling connection */
2658 ff_url_join(buf, sizeof(buf), "ffrtmphttp", NULL, hostname, port, NULL);
2659 } else if (!strcmp(proto, "rtmps")) {
2660 /* open the tls connection */
2662 port = RTMPS_DEFAULT_PORT;
2663 ff_url_join(buf, sizeof(buf), "tls", NULL, hostname, port, NULL);
2664 } else if (!strcmp(proto, "rtmpe") || (!strcmp(proto, "rtmpte"))) {
2665 if (!strcmp(proto, "rtmpte"))
2666 av_dict_set(opts, "ffrtmpcrypt_tunneling", "1", 1);
2668 /* open the encrypted connection */
2669 ff_url_join(buf, sizeof(buf), "ffrtmpcrypt", NULL, hostname, port, NULL);
2672 /* open the tcp connection */
2674 port = RTMP_DEFAULT_PORT;
2676 ff_url_join(buf, sizeof(buf), "tcp", NULL, hostname, port,
2677 "?listen&listen_timeout=%d",
2678 rt->listen_timeout * 1000);
2680 ff_url_join(buf, sizeof(buf), "tcp", NULL, hostname, port, NULL);
2684 if ((ret = ffurl_open_whitelist(&rt->stream, buf, AVIO_FLAG_READ_WRITE,
2685 &s->interrupt_callback, opts,
2686 s->protocol_whitelist, s->protocol_blacklist, s)) < 0) {
2687 av_log(s , AV_LOG_ERROR, "Cannot open connection %s\n", buf);
2691 if (rt->swfverify) {
2692 if ((ret = rtmp_calc_swfhash(s)) < 0)
2696 rt->state = STATE_START;
2697 if (!rt->listen && (ret = rtmp_handshake(s, rt)) < 0)
2699 if (rt->listen && (ret = rtmp_server_handshake(s, rt)) < 0)
2702 rt->out_chunk_size = 128;
2703 rt->in_chunk_size = 128; // Probably overwritten later
2704 rt->state = STATE_HANDSHAKED;
2706 // Keep the application name when it has been defined by the user.
2709 rt->app = av_malloc(APP_MAX_LENGTH);
2711 ret = AVERROR(ENOMEM);
2715 //extract "app" part from path
2716 qmark = strchr(path, '?');
2717 if (qmark && strstr(qmark, "slist=")) {
2719 // After slist we have the playpath, the full path is used as app
2720 av_strlcpy(rt->app, path + 1, APP_MAX_LENGTH);
2721 fname = strstr(path, "slist=") + 6;
2722 // Strip any further query parameters from fname
2723 amp = strchr(fname, '&');
2725 av_strlcpy(fname_buffer, fname, FFMIN(amp - fname + 1,
2726 sizeof(fname_buffer)));
2727 fname = fname_buffer;
2729 } else if (!strncmp(path, "/ondemand/", 10)) {
2731 memcpy(rt->app, "ondemand", 9);
2733 char *next = *path ? path + 1 : path;
2734 char *p = strchr(next, '/');
2737 // If name of application has been defined by the user, assume that
2738 // playpath is provided in the URL
2742 av_strlcpy(rt->app, next, APP_MAX_LENGTH);
2745 // make sure we do not mismatch a playpath for an application instance
2746 char *c = strchr(p + 1, ':');
2747 fname = strchr(p + 1, '/');
2748 if (!fname || (c && c < fname)) {
2750 av_strlcpy(rt->app, path + 1, FFMIN(p - path, APP_MAX_LENGTH));
2753 av_strlcpy(rt->app, path + 1, FFMIN(fname - path - 1, APP_MAX_LENGTH));
2759 // The name of application has been defined by the user, override it.
2760 if (strlen(old_app) >= APP_MAX_LENGTH) {
2761 ret = AVERROR(EINVAL);
2768 if (!rt->playpath) {
2769 rt->playpath = av_malloc(PLAYPATH_MAX_LENGTH);
2770 if (!rt->playpath) {
2771 ret = AVERROR(ENOMEM);
2776 int len = strlen(fname);
2777 if (!strchr(fname, ':') && len >= 4 &&
2778 (!strcmp(fname + len - 4, ".f4v") ||
2779 !strcmp(fname + len - 4, ".mp4"))) {
2780 memcpy(rt->playpath, "mp4:", 5);
2782 if (len >= 4 && !strcmp(fname + len - 4, ".flv"))
2783 fname[len - 4] = '\0';
2784 rt->playpath[0] = 0;
2786 av_strlcat(rt->playpath, fname, PLAYPATH_MAX_LENGTH);
2788 rt->playpath[0] = '\0';
2793 rt->tcurl = av_malloc(TCURL_MAX_LENGTH);
2795 ret = AVERROR(ENOMEM);
2798 ff_url_join(rt->tcurl, TCURL_MAX_LENGTH, proto, NULL, hostname,
2799 port, "/%s", rt->app);
2802 if (!rt->flashver) {
2803 rt->flashver = av_malloc(FLASHVER_MAX_LENGTH);
2804 if (!rt->flashver) {
2805 ret = AVERROR(ENOMEM);
2809 snprintf(rt->flashver, FLASHVER_MAX_LENGTH, "%s %d,%d,%d,%d",
2810 RTMP_CLIENT_PLATFORM, RTMP_CLIENT_VER1, RTMP_CLIENT_VER2,
2811 RTMP_CLIENT_VER3, RTMP_CLIENT_VER4);
2813 snprintf(rt->flashver, FLASHVER_MAX_LENGTH,
2814 "FMLE/3.0 (compatible; %s)", LIBAVFORMAT_IDENT);
2818 rt->client_report_size = 1048576;
2822 rt->received_metadata = 0;
2823 rt->last_bytes_read = 0;
2824 rt->server_bw = 2500000;
2827 av_log(s, AV_LOG_DEBUG, "Proto = %s, path = %s, app = %s, fname = %s\n",
2828 proto, path, rt->app, rt->playpath);
2830 if ((ret = gen_connect(s, rt)) < 0)
2833 if ((ret = read_connect(s, s->priv_data)) < 0)
2838 ret = get_packet(s, 1);
2839 } while (ret == AVERROR(EAGAIN));
2843 if (rt->do_reconnect) {
2845 ffurl_close(rt->stream);
2847 rt->do_reconnect = 0;
2849 for (i = 0; i < 2; i++)
2850 memset(rt->prev_pkt[i], 0,
2851 sizeof(**rt->prev_pkt) * rt->nb_prev_pkt[i]);
2852 free_tracked_methods(rt);
2857 // generate FLV header for demuxer
2859 if ((ret = av_reallocp(&rt->flv_data, rt->flv_size)) < 0)
2862 memcpy(rt->flv_data, "FLV\1\0\0\0\0\011\0\0\0\0", rt->flv_size);
2864 // Read packets until we reach the first A/V packet or read metadata.
2865 // If there was a metadata package in front of the A/V packets, we can
2866 // build the FLV header from this. If we do not receive any metadata,
2867 // the FLV decoder will allocate the needed streams when their first
2868 // audio or video packet arrives.
2869 while (!rt->has_audio && !rt->has_video && !rt->received_metadata) {
2870 if ((ret = get_packet(s, 0)) < 0)
2874 // Either after we have read the metadata or (if there is none) the
2875 // first packet of an A/V stream, we have a better knowledge about the
2876 // streams, so set the FLV header accordingly.
2877 if (rt->has_audio) {
2878 rt->flv_data[4] |= FLV_HEADER_FLAG_HASAUDIO;
2880 if (rt->has_video) {
2881 rt->flv_data[4] |= FLV_HEADER_FLAG_HASVIDEO;
2884 // If we received the first packet of an A/V stream and no metadata but
2885 // the server returned a valid duration, create a fake metadata packet
2886 // to inform the FLV decoder about the duration.
2887 if (!rt->received_metadata && rt->duration > 0) {
2888 if ((ret = inject_fake_duration_metadata(rt)) < 0)
2893 rt->flv_data = NULL;
2895 rt->skip_bytes = 13;
2898 s->max_packet_size = rt->stream->max_packet_size;
2908 static int rtmp_read(URLContext *s, uint8_t *buf, int size)
2910 RTMPContext *rt = s->priv_data;
2911 int orig_size = size;
2915 int data_left = rt->flv_size - rt->flv_off;
2917 if (data_left >= size) {
2918 memcpy(buf, rt->flv_data + rt->flv_off, size);
2919 rt->flv_off += size;
2922 if (data_left > 0) {
2923 memcpy(buf, rt->flv_data + rt->flv_off, data_left);
2926 rt->flv_off = rt->flv_size;
2929 if ((ret = get_packet(s, 0)) < 0)
2935 static int64_t rtmp_seek(URLContext *s, int stream_index, int64_t timestamp,
2938 RTMPContext *rt = s->priv_data;
2940 av_log(s, AV_LOG_DEBUG,
2941 "Seek on stream index %d at timestamp %"PRId64" with flags %08x\n",
2942 stream_index, timestamp, flags);
2943 if ((ret = gen_seek(s, rt, timestamp)) < 0) {
2944 av_log(s, AV_LOG_ERROR,
2945 "Unable to send seek command on stream index %d at timestamp "
2946 "%"PRId64" with flags %08x\n",
2947 stream_index, timestamp, flags);
2950 rt->flv_off = rt->flv_size;
2951 rt->state = STATE_SEEKING;
2955 static int rtmp_pause(URLContext *s, int pause)
2957 RTMPContext *rt = s->priv_data;
2959 av_log(s, AV_LOG_DEBUG, "Pause at timestamp %d\n",
2960 rt->last_timestamp);
2961 if ((ret = gen_pause(s, rt, pause, rt->last_timestamp)) < 0) {
2962 av_log(s, AV_LOG_ERROR, "Unable to send pause command at timestamp %d\n",
2963 rt->last_timestamp);
2969 static int rtmp_write(URLContext *s, const uint8_t *buf, int size)
2971 RTMPContext *rt = s->priv_data;
2972 int size_temp = size;
2973 int pktsize, pkttype, copy;
2975 const uint8_t *buf_temp = buf;
2980 if (rt->skip_bytes) {
2981 int skip = FFMIN(rt->skip_bytes, size_temp);
2984 rt->skip_bytes -= skip;
2988 if (rt->flv_header_bytes < RTMP_HEADER) {
2989 const uint8_t *header = rt->flv_header;
2990 int channel = RTMP_AUDIO_CHANNEL;
2992 copy = FFMIN(RTMP_HEADER - rt->flv_header_bytes, size_temp);
2993 bytestream_get_buffer(&buf_temp, rt->flv_header + rt->flv_header_bytes, copy);
2994 rt->flv_header_bytes += copy;
2996 if (rt->flv_header_bytes < RTMP_HEADER)
2999 pkttype = bytestream_get_byte(&header);
3000 pktsize = bytestream_get_be24(&header);
3001 ts = bytestream_get_be24(&header);
3002 ts |= bytestream_get_byte(&header) << 24;
3003 bytestream_get_be24(&header);
3004 rt->flv_size = pktsize;
3006 if (pkttype == RTMP_PT_VIDEO)
3007 channel = RTMP_VIDEO_CHANNEL;
3009 if (((pkttype == RTMP_PT_VIDEO || pkttype == RTMP_PT_AUDIO) && ts == 0) ||
3010 pkttype == RTMP_PT_NOTIFY) {
3011 if ((ret = ff_rtmp_check_alloc_array(&rt->prev_pkt[1],
3012 &rt->nb_prev_pkt[1],
3015 // Force sending a full 12 bytes header by clearing the
3016 // channel id, to make it not match a potential earlier
3017 // packet in the same channel.
3018 rt->prev_pkt[1][channel].channel_id = 0;
3021 //this can be a big packet, it's better to send it right here
3022 if ((ret = ff_rtmp_packet_create(&rt->out_pkt, channel,
3023 pkttype, ts, pktsize)) < 0)
3026 rt->out_pkt.extra = rt->stream_id;
3027 rt->flv_data = rt->out_pkt.data;
3030 copy = FFMIN(rt->flv_size - rt->flv_off, size_temp);
3031 bytestream_get_buffer(&buf_temp, rt->flv_data + rt->flv_off, copy);
3032 rt->flv_off += copy;
3035 if (rt->flv_off == rt->flv_size) {
3038 if (rt->out_pkt.type == RTMP_PT_NOTIFY) {
3039 // For onMetaData and |RtmpSampleAccess packets, we want
3040 // @setDataFrame prepended to the packet before it gets sent.
3041 // However, not all RTMP_PT_NOTIFY packets (e.g., onTextData
3043 uint8_t commandbuffer[64];
3047 bytestream2_init(&gbc, rt->flv_data, rt->flv_size);
3048 if (!ff_amf_read_string(&gbc, commandbuffer, sizeof(commandbuffer),
3050 if (!strcmp(commandbuffer, "onMetaData") ||
3051 !strcmp(commandbuffer, "|RtmpSampleAccess")) {
3053 if ((ret = av_reallocp(&rt->out_pkt.data, rt->out_pkt.size + 16)) < 0) {
3054 rt->flv_size = rt->flv_off = rt->flv_header_bytes = 0;
3057 memmove(rt->out_pkt.data + 16, rt->out_pkt.data, rt->out_pkt.size);
3058 rt->out_pkt.size += 16;
3059 ptr = rt->out_pkt.data;
3060 ff_amf_write_string(&ptr, "@setDataFrame");
3065 if ((ret = rtmp_send_packet(rt, &rt->out_pkt, 0)) < 0)
3069 rt->flv_header_bytes = 0;
3070 rt->flv_nb_packets++;
3072 } while (buf_temp - buf < size);
3074 if (rt->flv_nb_packets < rt->flush_interval)
3076 rt->flv_nb_packets = 0;
3078 /* set stream into nonblocking mode */
3079 rt->stream->flags |= AVIO_FLAG_NONBLOCK;
3081 /* try to read one byte from the stream */
3082 ret = ffurl_read(rt->stream, &c, 1);
3084 /* switch the stream back into blocking mode */
3085 rt->stream->flags &= ~AVIO_FLAG_NONBLOCK;
3087 if (ret == AVERROR(EAGAIN)) {
3088 /* no incoming data to handle */
3090 } else if (ret < 0) {
3092 } else if (ret == 1) {
3093 RTMPPacket rpkt = { 0 };
3095 if ((ret = ff_rtmp_packet_read_internal(rt->stream, &rpkt,
3098 &rt->nb_prev_pkt[0], c)) <= 0)
3101 if ((ret = rtmp_parse_result(s, rt, &rpkt)) < 0)
3104 ff_rtmp_packet_destroy(&rpkt);
3110 #define OFFSET(x) offsetof(RTMPContext, x)
3111 #define DEC AV_OPT_FLAG_DECODING_PARAM
3112 #define ENC AV_OPT_FLAG_ENCODING_PARAM
3114 static const AVOption rtmp_options[] = {
3115 {"rtmp_app", "Name of application to connect to on the RTMP server", OFFSET(app), AV_OPT_TYPE_STRING, {.str = NULL }, 0, 0, DEC|ENC},
3116 {"rtmp_buffer", "Set buffer time in milliseconds. The default is 3000.", OFFSET(client_buffer_time), AV_OPT_TYPE_INT, {.i64 = 3000}, 0, INT_MAX, DEC|ENC},
3117 {"rtmp_conn", "Append arbitrary AMF data to the Connect message", OFFSET(conn), AV_OPT_TYPE_STRING, {.str = NULL }, 0, 0, DEC|ENC},
3118 {"rtmp_flashver", "Version of the Flash plugin used to run the SWF player.", OFFSET(flashver), AV_OPT_TYPE_STRING, {.str = NULL }, 0, 0, DEC|ENC},
3119 {"rtmp_flush_interval", "Number of packets flushed in the same request (RTMPT only).", OFFSET(flush_interval), AV_OPT_TYPE_INT, {.i64 = 10}, 0, INT_MAX, ENC},
3120 {"rtmp_live", "Specify that the media is a live stream.", OFFSET(live), AV_OPT_TYPE_INT, {.i64 = -2}, INT_MIN, INT_MAX, DEC, "rtmp_live"},
3121 {"any", "both", 0, AV_OPT_TYPE_CONST, {.i64 = -2}, 0, 0, DEC, "rtmp_live"},
3122 {"live", "live stream", 0, AV_OPT_TYPE_CONST, {.i64 = -1}, 0, 0, DEC, "rtmp_live"},
3123 {"recorded", "recorded stream", 0, AV_OPT_TYPE_CONST, {.i64 = 0}, 0, 0, DEC, "rtmp_live"},
3124 {"rtmp_pageurl", "URL of the web page in which the media was embedded. By default no value will be sent.", OFFSET(pageurl), AV_OPT_TYPE_STRING, {.str = NULL }, 0, 0, DEC},
3125 {"rtmp_playpath", "Stream identifier to play or to publish", OFFSET(playpath), AV_OPT_TYPE_STRING, {.str = NULL }, 0, 0, DEC|ENC},
3126 {"rtmp_subscribe", "Name of live stream to subscribe to. Defaults to rtmp_playpath.", OFFSET(subscribe), AV_OPT_TYPE_STRING, {.str = NULL }, 0, 0, DEC},
3127 {"rtmp_swfhash", "SHA256 hash of the decompressed SWF file (32 bytes).", OFFSET(swfhash), AV_OPT_TYPE_BINARY, .flags = DEC},
3128 {"rtmp_swfsize", "Size of the decompressed SWF file, required for SWFVerification.", OFFSET(swfsize), AV_OPT_TYPE_INT, {.i64 = 0}, 0, INT_MAX, DEC},
3129 {"rtmp_swfurl", "URL of the SWF player. By default no value will be sent", OFFSET(swfurl), AV_OPT_TYPE_STRING, {.str = NULL }, 0, 0, DEC|ENC},
3130 {"rtmp_swfverify", "URL to player swf file, compute hash/size automatically.", OFFSET(swfverify), AV_OPT_TYPE_STRING, {.str = NULL }, 0, 0, DEC},
3131 {"rtmp_tcurl", "URL of the target stream. Defaults to proto://host[:port]/app.", OFFSET(tcurl), AV_OPT_TYPE_STRING, {.str = NULL }, 0, 0, DEC|ENC},
3132 {"rtmp_listen", "Listen for incoming rtmp connections", OFFSET(listen), AV_OPT_TYPE_INT, {.i64 = 0}, INT_MIN, INT_MAX, DEC, "rtmp_listen" },
3133 {"listen", "Listen for incoming rtmp connections", OFFSET(listen), AV_OPT_TYPE_INT, {.i64 = 0}, INT_MIN, INT_MAX, DEC, "rtmp_listen" },
3134 {"timeout", "Maximum timeout (in seconds) to wait for incoming connections. -1 is infinite. Implies -rtmp_listen 1", OFFSET(listen_timeout), AV_OPT_TYPE_INT, {.i64 = -1}, INT_MIN, INT_MAX, DEC, "rtmp_listen" },
3138 #define RTMP_PROTOCOL(flavor) \
3139 static const AVClass flavor##_class = { \
3140 .class_name = #flavor, \
3141 .item_name = av_default_item_name, \
3142 .option = rtmp_options, \
3143 .version = LIBAVUTIL_VERSION_INT, \
3146 const URLProtocol ff_##flavor##_protocol = { \
3148 .url_open2 = rtmp_open, \
3149 .url_read = rtmp_read, \
3150 .url_read_seek = rtmp_seek, \
3151 .url_read_pause = rtmp_pause, \
3152 .url_write = rtmp_write, \
3153 .url_close = rtmp_close, \
3154 .priv_data_size = sizeof(RTMPContext), \
3155 .flags = URL_PROTOCOL_FLAG_NETWORK, \
3156 .priv_data_class= &flavor##_class, \
3161 RTMP_PROTOCOL(rtmpe)
3162 RTMP_PROTOCOL(rtmps)
3163 RTMP_PROTOCOL(rtmpt)
3164 RTMP_PROTOCOL(rtmpte)
3165 RTMP_PROTOCOL(rtmpts)