54 #define POLL_TIMEOUT_MS 100
55 #define READ_PACKET_TIMEOUT_S 10
56 #define MAX_TIMEOUTS READ_PACKET_TIMEOUT_S * 1000 / POLL_TIMEOUT_MS
57 #define SDP_MAX_SIZE 16384
58 #define RECVBUF_SIZE 10 * RTP_MAX_PACKET_LENGTH
60 #define OFFSET(x) offsetof(RTSPState, x)
61 #define DEC AV_OPT_FLAG_DECODING_PARAM
62 #define ENC AV_OPT_FLAG_ENCODING_PARAM
64 #define RTSP_FLAG_OPTS(name, longname) \
65 { name, longname, OFFSET(rtsp_flags), AV_OPT_TYPE_FLAGS, {0}, INT_MIN, INT_MAX, DEC, "rtsp_flags" }, \
66 { "filter_src", "Only receive packets from the negotiated peer IP", 0, AV_OPT_TYPE_CONST, {RTSP_FLAG_FILTER_SRC}, 0, 0, DEC, "rtsp_flags" }
68 #define RTSP_MEDIATYPE_OPTS(name, longname) \
69 { name, longname, OFFSET(media_type_mask), AV_OPT_TYPE_FLAGS, { (1 << (AVMEDIA_TYPE_DATA+1)) - 1 }, INT_MIN, INT_MAX, DEC, "allowed_media_types" }, \
70 { "video", "Video", 0, AV_OPT_TYPE_CONST, {1 << AVMEDIA_TYPE_VIDEO}, 0, 0, DEC, "allowed_media_types" }, \
71 { "audio", "Audio", 0, AV_OPT_TYPE_CONST, {1 << AVMEDIA_TYPE_AUDIO}, 0, 0, DEC, "allowed_media_types" }, \
72 { "data", "Data", 0, AV_OPT_TYPE_CONST, {1 << AVMEDIA_TYPE_DATA}, 0, 0, DEC, "allowed_media_types" }
75 {
"initial_pause",
"Don't start playing the stream immediately",
OFFSET(initial_pause),
AV_OPT_TYPE_INT, {0}, 0, 1,
DEC },
77 {
"rtsp_transport",
"RTSP transport protocols",
OFFSET(lower_transport_mask),
AV_OPT_TYPE_FLAGS, {0}, INT_MIN, INT_MAX,
DEC|
ENC,
"rtsp_transport" }, \
99 const char *sep,
const char **pp)
107 while (!strchr(sep, *p) && *p !=
'\0') {
108 if ((q - buf) < buf_size - 1)
120 if (**pp ==
'/') (*pp)++;
124 static void get_word(
char *buf,
int buf_size,
const char **pp)
158 memset(&hints, 0,
sizeof(hints));
175 if (handler->
alloc) {
185 int payload_type,
const char *p)
202 init_rtp_handler(handler, rtsp_st, codec);
264 char *value,
int value_size)
279 typedef struct SDPParseState {
287 int letter,
const char *buf)
290 char buf1[64], st_type[64];
299 av_dlog(s,
"sdp: %c='%s'\n", letter, buf);
302 if (s1->skip_media && letter !=
'm')
307 if (strcmp(buf1,
"IN") != 0)
310 if (strcmp(buf1,
"IP4") && strcmp(buf1,
"IP6"))
322 s1->default_ip = sdp_ip;
323 s1->default_ttl = ttl;
343 get_word(st_type,
sizeof(st_type), &p);
344 if (!strcmp(st_type,
"audio")) {
346 }
else if (!strcmp(st_type,
"video")) {
348 }
else if (!strcmp(st_type,
"application")) {
361 rtsp_st->
sdp_ip = s1->default_ip;
362 rtsp_st->
sdp_ttl = s1->default_ttl;
392 init_rtp_handler(handler, rtsp_st, st->
codec);
393 if (handler && handler->
init)
405 if (!strncmp(p,
"rtsp://", 7))
416 if (proto[0] ==
'\0') {
430 payload_type = atoi(buf1);
433 sdp_parse_rtpmap(s, st, rtsp_st, payload_type, p);
439 payload_type = atoi(buf1);
457 }
else if (
av_strstart(p,
"IsRealDataType:integer;",&p)) {
460 }
else if (
av_strstart(p,
"SampleRate:integer;", &p) &&
497 SDPParseState sdp_parse_state, *s1 = &sdp_parse_state;
499 memset(s1, 0,
sizeof(SDPParseState));
512 while (*p !=
'\n' && *p !=
'\r' && *p !=
'\0') {
513 if ((q - buf) <
sizeof(buf) - 1)
518 sdp_parse_line(s, s1, letter, buf);
520 while (*p !=
'\n' && *p !=
'\0')
629 #if CONFIG_RTSP_DEMUXER || CONFIG_RTSP_MUXER
630 static void rtsp_parse_range(
int *min_ptr,
int *max_ptr,
const char **pp)
637 v = strtol(p, (
char **)&p, 10);
641 v = strtol(p, (
char **)&p, 10);
653 char transport_protocol[16];
655 char lower_transport[16];
669 get_word_sep(transport_protocol,
sizeof(transport_protocol),
673 lower_transport[0] =
'\0';
680 }
else if (!
av_strcasecmp (transport_protocol,
"x-pn-tng") ||
683 get_word_sep(lower_transport,
sizeof(lower_transport),
"/;,", &p);
695 while (*p !=
'\0' && *p !=
',') {
697 if (!strcmp(parameter,
"port")) {
702 }
else if (!strcmp(parameter,
"client_port")) {
708 }
else if (!strcmp(parameter,
"server_port")) {
714 }
else if (!strcmp(parameter,
"interleaved")) {
720 }
else if (!strcmp(parameter,
"multicast")) {
723 }
else if (!strcmp(parameter,
"ttl")) {
726 th->
ttl = strtol(p, (
char **)&p, 10);
728 }
else if (!strcmp(parameter,
"destination")) {
734 }
else if (!strcmp(parameter,
"source")) {
742 while (*p !=
';' && *p !=
'\0' && *p !=
',')
754 static void handle_rtp_info(
RTSPState *rt,
const char *url,
755 uint32_t seq, uint32_t rtptime)
758 if (!rtptime || !url[0])
774 static void rtsp_parse_rtp_info(
RTSPState *rt,
const char *p)
777 char key[20], value[1024], url[1024] =
"";
778 uint32_t seq = 0, rtptime = 0;
790 if (!strcmp(key,
"url"))
792 else if (!strcmp(key,
"seq"))
793 seq = strtoul(value,
NULL, 10);
794 else if (!strcmp(key,
"rtptime"))
795 rtptime = strtoul(value,
NULL, 10);
797 handle_rtp_info(rt, url, seq, rtptime);
806 handle_rtp_info(rt, url, seq, rtptime);
820 (t = strtol(p,
NULL, 10)) > 0) {
826 rtsp_parse_transport(reply, p);
828 reply->
seq = strtol(p,
NULL, 10);
843 }
else if (
av_stristart(p,
"WWW-Authenticate:", &p) && rt) {
846 }
else if (
av_stristart(p,
"Authentication-Info:", &p) && rt) {
849 }
else if (
av_stristart(p,
"Content-Base:", &p) && rt) {
851 if (method && !strcmp(method,
"DESCRIBE"))
855 if (method && !strcmp(method,
"PLAY"))
856 rtsp_parse_rtp_info(rt, p);
858 if (strstr(p,
"GET_PARAMETER") &&
859 method && !strcmp(method,
"OPTIONS"))
861 }
else if (
av_stristart(p,
"x-Accept-Dynamic-Rate:", &p) && rt) {
879 av_dlog(s,
"skipping RTP packet len=%d\n", len);
884 if (len1 >
sizeof(buf))
894 unsigned char **content_ptr,
895 int return_on_interleaved_data,
const char *method)
898 char buf[4096], buf1[1024], *q;
901 int ret, content_length, line_count = 0;
902 unsigned char *content =
NULL;
904 memset(reply, 0,
sizeof(*reply));
912 av_dlog(s,
"ret=%d c=%02x [%c]\n", ret, ch, ch);
919 if (return_on_interleaved_data) {
923 }
else if (ch !=
'\r') {
924 if ((q - buf) <
sizeof(buf) - 1)
930 av_dlog(s,
"line='%s'\n", buf);
936 if (line_count == 0) {
954 if (content_length > 0) {
958 content[content_length] =
'\0';
961 *content_ptr = content;
965 if (rt->
seq != reply->
seq) {
971 if (reply->
notice == 2101 ||
975 }
else if (reply->
notice >= 4400 && reply->
notice < 5500) {
977 }
else if (reply->
notice == 2401 ||
998 const char *method,
const char *url,
1000 const unsigned char *send_content,
1001 int send_content_length)
1004 char buf[4096], *out_buf;
1010 snprintf(buf,
sizeof(buf),
"%s %s RTSP/1.0\r\n", method, url);
1014 if (rt->
session_id[0] !=
'\0' && (!headers ||
1015 !strstr(headers,
"\nIf-Match:"))) {
1020 rt->
auth, url, method);
1025 if (send_content_length > 0 && send_content)
1026 av_strlcatf(buf,
sizeof(buf),
"Content-Length: %d\r\n", send_content_length);
1032 out_buf = base64buf;
1035 av_dlog(s,
"Sending:\n%s--\n", buf);
1038 if (send_content_length > 0 && send_content) {
1041 "with content data not supported\n");
1052 const char *url,
const char *headers)
1054 return ff_rtsp_send_cmd_with_content_async(s, method, url, headers,
NULL, 0);
1059 unsigned char **content_ptr)
1062 content_ptr,
NULL, 0);
1066 const char *method,
const char *url,
1069 unsigned char **content_ptr,
1070 const unsigned char *send_content,
1071 int send_content_length)
1079 if ((ret = ff_rtsp_send_cmd_with_content_async(s, method, url, header,
1081 send_content_length)))
1103 int lower_transport,
const char *real_challenge)
1110 const char *trans_pref;
1113 trans_pref =
"x-pn-tng";
1115 trans_pref =
"RTP/AVP";
1125 char transport[2048];
1164 "?localport=%d", j);
1180 snprintf(transport,
sizeof(transport) - 1,
1181 "%s/UDP;", trans_pref);
1183 av_strlcat(transport,
"unicast;",
sizeof(transport));
1185 "client_port=%d", port);
1188 av_strlcatf(transport,
sizeof(transport),
"-%d", port + 1);
1200 snprintf(transport,
sizeof(transport) - 1,
1201 "%s/TCP;", trans_pref);
1203 av_strlcat(transport,
"unicast;",
sizeof(transport));
1205 "interleaved=%d-%d",
1206 interleave, interleave + 1);
1211 snprintf(transport,
sizeof(transport) - 1,
1212 "%s/UDP;multicast", trans_pref);
1215 av_strlcat(transport,
";mode=receive",
sizeof(transport));
1218 av_strlcat(transport,
";mode=play",
sizeof(transport));
1219 snprintf(cmd,
sizeof(cmd),
1220 "Transport: %s\r\n",
1223 av_strlcat(cmd,
"x-Dynamic-Rate: 0\r\n",
sizeof(cmd));
1225 char real_res[41], real_csum[9];
1230 "RealChallenge2: %s, sd=%s\r\n",
1270 char url[1024],
options[30] =
"";
1273 av_strlcpy(options,
"?connect=1",
sizeof(options));
1298 char url[1024], namebuf[50];
1311 getnameinfo((
struct sockaddr*) &addr,
sizeof(addr),
1314 port,
"?ttl=%d", ttl);
1352 char host[1024], path[1024], tcpname[1024], cmd[2048], auth[128];
1353 char *option_list, *
option, *filename;
1354 int port, err, tcp_fd;
1356 int lower_transport_mask = 0;
1357 char real_challenge[64] =
"";
1359 socklen_t peer_len =
sizeof(peer);
1376 host,
sizeof(host), &port, path,
sizeof(path), s->
filename);
1383 #if FF_API_RTSP_URL_OPTIONS
1385 option_list = strrchr(path,
'?');
1389 filename = option_list;
1390 while (option_list) {
1393 option = ++option_list;
1394 option_list = strchr(option_list,
'&');
1399 if (!strcmp(option,
"udp")) {
1401 }
else if (!strcmp(option,
"multicast")) {
1403 }
else if (!strcmp(option,
"tcp")) {
1405 }
else if(!strcmp(option,
"http")) {
1408 }
else if (!strcmp(option,
"filter_src")) {
1413 int len = strlen(option);
1414 memmove(++filename, option, len);
1416 if (option_list) *filename =
'&';
1421 "deprecated, use -rtsp_transport "
1422 "and -rtsp_flags instead.\n");
1428 if (!lower_transport_mask)
1437 "only UDP and TCP are supported for output.\n");
1447 host, port,
"%s", path);
1451 char httpname[1024];
1452 char sessioncookie[17];
1455 ff_url_join(httpname,
sizeof(httpname),
"http", auth, host, port,
"%s", path);
1456 snprintf(sessioncookie,
sizeof(sessioncookie),
"%08x%08x",
1467 snprintf(headers,
sizeof(headers),
1468 "x-sessioncookie: %s\r\n"
1469 "Accept: application/x-rtsp-tunnelled\r\n"
1470 "Pragma: no-cache\r\n"
1471 "Cache-Control: no-cache\r\n",
1489 snprintf(headers,
sizeof(headers),
1490 "x-sessioncookie: %s\r\n"
1491 "Content-Type: application/x-rtsp-tunnelled\r\n"
1492 "Pragma: no-cache\r\n"
1493 "Cache-Control: no-cache\r\n"
1494 "Content-Length: 32767\r\n"
1495 "Expires: Sun, 9 Jan 1972 00:00:00 GMT\r\n",
1536 if (!getpeername(tcp_fd, (
struct sockaddr*) &peer, &peer_len)) {
1537 getnameinfo((
struct sockaddr*) &peer, peer_len, host,
sizeof(host),
1556 "ClientChallenge: 9e26d33f2984236010ef6253fb1887f7\r\n"
1557 "PlayerStarttime: [28/03/2003:22:50:23 00:00]\r\n"
1558 "CompanyID: KnKV4M4I/B2FjJ1TToLycw==\r\n"
1559 "GUID: 00000000-0000-0000-0000-000000000000\r\n",
1586 int lower_transport =
ff_log2_tab[lower_transport_mask &
1587 ~(lower_transport_mask - 1)];
1591 real_challenge :
NULL);
1594 lower_transport_mask &= ~(1 << lower_transport);
1595 if (lower_transport_mask == 0 && err == 1) {
1596 err =
AVERROR(EPROTONOSUPPORT);
1623 uint8_t *buf,
int buf_size, int64_t wait_end)
1627 int n, i, ret, tcp_fd, timeout_cnt = 0;
1629 struct pollfd *p = rt->
p;
1639 p[max_p].fd = tcp_fd;
1640 p[max_p++].events = POLLIN;
1648 p[max_p++].events = POLLIN;
1650 p[max_p++].events = POLLIN;
1655 int j = 1 - (tcp_fd == -1);
1660 if (p[j].revents & POLLIN || p[j+1].revents & POLLIN) {
1663 *prtsp_st = rtsp_st;
1670 #if CONFIG_RTSP_DEMUXER
1671 if (tcp_fd != -1 && p[0].revents & POLLIN) {
1684 }
else if (n < 0 && errno != EINTR)
1694 int64_t wait_end = 0;
1708 }
else if (ret == 1) {
1717 int64_t first_queue_time = 0;
1724 if (queue_time && (queue_time - first_queue_time < 0 ||
1725 !first_queue_time)) {
1726 first_queue_time = queue_time;
1730 if (first_queue_time) {
1731 wait_end = first_queue_time + s->
max_delay;
1734 first_queue_st =
NULL;
1747 #if CONFIG_RTSP_DEMUXER
1759 if (len ==
AVERROR(EAGAIN) && first_queue_st &&
1761 rtsp_st = first_queue_st;
1791 if (rtpctx2 && st && st2 &&
1822 #if CONFIG_SDP_DEMUXER
1828 while (p < p_end && *p !=
'\0') {
1829 if (p +
sizeof(
"c=IN IP") - 1 < p_end &&
1833 while (p < p_end - 1 && *p !=
'\n') p++;
1861 content[
size] =
'\0';
1876 "?localport=%d&ttl=%d&connect=%d", rtsp_st->
sdp_port,
1901 static const AVClass sdp_demuxer_class = {
1916 .priv_class = &sdp_demuxer_class
1920 #if CONFIG_RTP_DEMUXER
1931 uint8_t recvbuf[1500];
1932 char host[500], sdp[500];
1939 socklen_t addrlen =
sizeof(addr);
1951 ret =
ffurl_read(in, recvbuf,
sizeof(recvbuf));
1961 if ((recvbuf[0] & 0xc0) != 0x80) {
1967 payload_type = recvbuf[1] & 0x7f;
1974 memset(&codec, 0,
sizeof(codec));
1977 "without an SDP file describing it\n",
1983 "properly you need an SDP file "
1990 snprintf(sdp,
sizeof(sdp),
1991 "v=0\r\nc=IN IP%d %s\r\nm=%s %d RTP/AVP %d\r\n",
1992 addr.ss_family == AF_INET ? 4 : 6, host,
1995 port, payload_type);
2006 ret = sdp_read_header(s, ap);
2017 static const AVClass rtp_demuxer_class = {
2033 .priv_class = &rtp_demuxer_class