rtsp: Support receiving plain data over UDP without any RTP encapsulation
[libav.git] / libavformat / rtsp.c
1 /*
2 * RTSP/SDP client
3 * Copyright (c) 2002 Fabrice Bellard
4 *
5 * This file is part of Libav.
6 *
7 * Libav is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation; either
10 * version 2.1 of the License, or (at your option) any later version.
11 *
12 * Libav is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with Libav; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22 #include "libavutil/base64.h"
23 #include "libavutil/avstring.h"
24 #include "libavutil/intreadwrite.h"
25 #include "libavutil/mathematics.h"
26 #include "libavutil/parseutils.h"
27 #include "libavutil/random_seed.h"
28 #include "libavutil/dict.h"
29 #include "libavutil/opt.h"
30 #include "libavutil/time.h"
31 #include "avformat.h"
32 #include "avio_internal.h"
33
34 #if HAVE_POLL_H
35 #include <poll.h>
36 #endif
37 #include "internal.h"
38 #include "network.h"
39 #include "os_support.h"
40 #include "http.h"
41 #include "rtsp.h"
42
43 #include "rtpdec.h"
44 #include "rdt.h"
45 #include "rtpdec_formats.h"
46 #include "rtpenc_chain.h"
47 #include "url.h"
48 #include "rtpenc.h"
49
50 //#define DEBUG
51
52 /* Timeout values for socket poll, in ms,
53 * and read_packet(), in seconds */
54 #define POLL_TIMEOUT_MS 100
55 #define READ_PACKET_TIMEOUT_S 10
56 #define MAX_TIMEOUTS READ_PACKET_TIMEOUT_S * 1000 / POLL_TIMEOUT_MS
57 #define SDP_MAX_SIZE 16384
58 #define RECVBUF_SIZE 10 * RTP_MAX_PACKET_LENGTH
59 #define DEFAULT_REORDERING_DELAY 100000
60
61 #define OFFSET(x) offsetof(RTSPState, x)
62 #define DEC AV_OPT_FLAG_DECODING_PARAM
63 #define ENC AV_OPT_FLAG_ENCODING_PARAM
64
65 #define RTSP_FLAG_OPTS(name, longname) \
66 { name, longname, OFFSET(rtsp_flags), AV_OPT_TYPE_FLAGS, {0}, INT_MIN, INT_MAX, DEC, "rtsp_flags" }, \
67 { "filter_src", "Only receive packets from the negotiated peer IP", 0, AV_OPT_TYPE_CONST, {RTSP_FLAG_FILTER_SRC}, 0, 0, DEC, "rtsp_flags" }, \
68 { "listen", "Wait for incoming connections", 0, AV_OPT_TYPE_CONST, {RTSP_FLAG_LISTEN}, 0, 0, DEC, "rtsp_flags" }
69
70 #define RTSP_MEDIATYPE_OPTS(name, longname) \
71 { name, longname, OFFSET(media_type_mask), AV_OPT_TYPE_FLAGS, { (1 << (AVMEDIA_TYPE_DATA+1)) - 1 }, INT_MIN, INT_MAX, DEC, "allowed_media_types" }, \
72 { "video", "Video", 0, AV_OPT_TYPE_CONST, {1 << AVMEDIA_TYPE_VIDEO}, 0, 0, DEC, "allowed_media_types" }, \
73 { "audio", "Audio", 0, AV_OPT_TYPE_CONST, {1 << AVMEDIA_TYPE_AUDIO}, 0, 0, DEC, "allowed_media_types" }, \
74 { "data", "Data", 0, AV_OPT_TYPE_CONST, {1 << AVMEDIA_TYPE_DATA}, 0, 0, DEC, "allowed_media_types" }
75
76 const AVOption ff_rtsp_options[] = {
77 { "initial_pause", "Don't start playing the stream immediately", OFFSET(initial_pause), AV_OPT_TYPE_INT, {0}, 0, 1, DEC },
78 FF_RTP_FLAG_OPTS(RTSPState, rtp_muxer_flags),
79 { "rtsp_transport", "RTSP transport protocols", OFFSET(lower_transport_mask), AV_OPT_TYPE_FLAGS, {0}, INT_MIN, INT_MAX, DEC|ENC, "rtsp_transport" }, \
80 { "udp", "UDP", 0, AV_OPT_TYPE_CONST, {1 << RTSP_LOWER_TRANSPORT_UDP}, 0, 0, DEC|ENC, "rtsp_transport" }, \
81 { "tcp", "TCP", 0, AV_OPT_TYPE_CONST, {1 << RTSP_LOWER_TRANSPORT_TCP}, 0, 0, DEC|ENC, "rtsp_transport" }, \
82 { "udp_multicast", "UDP multicast", 0, AV_OPT_TYPE_CONST, {1 << RTSP_LOWER_TRANSPORT_UDP_MULTICAST}, 0, 0, DEC, "rtsp_transport" },
83 { "http", "HTTP tunneling", 0, AV_OPT_TYPE_CONST, {(1 << RTSP_LOWER_TRANSPORT_HTTP)}, 0, 0, DEC, "rtsp_transport" },
84 RTSP_FLAG_OPTS("rtsp_flags", "RTSP flags"),
85 RTSP_MEDIATYPE_OPTS("allowed_media_types", "Media types to accept from the server"),
86 { "min_port", "Minimum local UDP port", OFFSET(rtp_port_min), AV_OPT_TYPE_INT, {RTSP_RTP_PORT_MIN}, 0, 65535, DEC|ENC },
87 { "max_port", "Maximum local UDP port", OFFSET(rtp_port_max), AV_OPT_TYPE_INT, {RTSP_RTP_PORT_MAX}, 0, 65535, DEC|ENC },
88 { "timeout", "Maximum timeout (in seconds) to wait for incoming connections. -1 is infinite. Implies flag listen", OFFSET(initial_timeout), AV_OPT_TYPE_INT, {-1}, INT_MIN, INT_MAX, DEC },
89 { NULL },
90 };
91
92 static const AVOption sdp_options[] = {
93 RTSP_FLAG_OPTS("sdp_flags", "SDP flags"),
94 RTSP_MEDIATYPE_OPTS("allowed_media_types", "Media types to accept from the server"),
95 { NULL },
96 };
97
98 static const AVOption rtp_options[] = {
99 RTSP_FLAG_OPTS("rtp_flags", "RTP flags"),
100 { NULL },
101 };
102
103 static void get_word_until_chars(char *buf, int buf_size,
104 const char *sep, const char **pp)
105 {
106 const char *p;
107 char *q;
108
109 p = *pp;
110 p += strspn(p, SPACE_CHARS);
111 q = buf;
112 while (!strchr(sep, *p) && *p != '\0') {
113 if ((q - buf) < buf_size - 1)
114 *q++ = *p;
115 p++;
116 }
117 if (buf_size > 0)
118 *q = '\0';
119 *pp = p;
120 }
121
122 static void get_word_sep(char *buf, int buf_size, const char *sep,
123 const char **pp)
124 {
125 if (**pp == '/') (*pp)++;
126 get_word_until_chars(buf, buf_size, sep, pp);
127 }
128
129 static void get_word(char *buf, int buf_size, const char **pp)
130 {
131 get_word_until_chars(buf, buf_size, SPACE_CHARS, pp);
132 }
133
134 /** Parse a string p in the form of Range:npt=xx-xx, and determine the start
135 * and end time.
136 * Used for seeking in the rtp stream.
137 */
138 static void rtsp_parse_range_npt(const char *p, int64_t *start, int64_t *end)
139 {
140 char buf[256];
141
142 p += strspn(p, SPACE_CHARS);
143 if (!av_stristart(p, "npt=", &p))
144 return;
145
146 *start = AV_NOPTS_VALUE;
147 *end = AV_NOPTS_VALUE;
148
149 get_word_sep(buf, sizeof(buf), "-", &p);
150 av_parse_time(start, buf, 1);
151 if (*p == '-') {
152 p++;
153 get_word_sep(buf, sizeof(buf), "-", &p);
154 av_parse_time(end, buf, 1);
155 }
156 // av_log(NULL, AV_LOG_DEBUG, "Range Start: %lld\n", *start);
157 // av_log(NULL, AV_LOG_DEBUG, "Range End: %lld\n", *end);
158 }
159
160 static int get_sockaddr(const char *buf, struct sockaddr_storage *sock)
161 {
162 struct addrinfo hints = { 0 }, *ai = NULL;
163 hints.ai_flags = AI_NUMERICHOST;
164 if (getaddrinfo(buf, NULL, &hints, &ai))
165 return -1;
166 memcpy(sock, ai->ai_addr, FFMIN(sizeof(*sock), ai->ai_addrlen));
167 freeaddrinfo(ai);
168 return 0;
169 }
170
171 #if CONFIG_RTPDEC
172 static void init_rtp_handler(RTPDynamicProtocolHandler *handler,
173 RTSPStream *rtsp_st, AVCodecContext *codec)
174 {
175 if (!handler)
176 return;
177 codec->codec_id = handler->codec_id;
178 rtsp_st->dynamic_handler = handler;
179 if (handler->alloc) {
180 rtsp_st->dynamic_protocol_context = handler->alloc();
181 if (!rtsp_st->dynamic_protocol_context)
182 rtsp_st->dynamic_handler = NULL;
183 }
184 }
185
186 /* parse the rtpmap description: <codec_name>/<clock_rate>[/<other params>] */
187 static int sdp_parse_rtpmap(AVFormatContext *s,
188 AVStream *st, RTSPStream *rtsp_st,
189 int payload_type, const char *p)
190 {
191 AVCodecContext *codec = st->codec;
192 char buf[256];
193 int i;
194 AVCodec *c;
195 const char *c_name;
196
197 /* Loop into AVRtpDynamicPayloadTypes[] and AVRtpPayloadTypes[] and
198 * see if we can handle this kind of payload.
199 * The space should normally not be there but some Real streams or
200 * particular servers ("RealServer Version 6.1.3.970", see issue 1658)
201 * have a trailing space. */
202 get_word_sep(buf, sizeof(buf), "/ ", &p);
203 if (payload_type < RTP_PT_PRIVATE) {
204 /* We are in a standard case
205 * (from http://www.iana.org/assignments/rtp-parameters). */
206 /* search into AVRtpPayloadTypes[] */
207 codec->codec_id = ff_rtp_codec_id(buf, codec->codec_type);
208 }
209
210 if (codec->codec_id == AV_CODEC_ID_NONE) {
211 RTPDynamicProtocolHandler *handler =
212 ff_rtp_handler_find_by_name(buf, codec->codec_type);
213 init_rtp_handler(handler, rtsp_st, codec);
214 /* If no dynamic handler was found, check with the list of standard
215 * allocated types, if such a stream for some reason happens to
216 * use a private payload type. This isn't handled in rtpdec.c, since
217 * the format name from the rtpmap line never is passed into rtpdec. */
218 if (!rtsp_st->dynamic_handler)
219 codec->codec_id = ff_rtp_codec_id(buf, codec->codec_type);
220 }
221
222 c = avcodec_find_decoder(codec->codec_id);
223 if (c && c->name)
224 c_name = c->name;
225 else
226 c_name = "(null)";
227
228 get_word_sep(buf, sizeof(buf), "/", &p);
229 i = atoi(buf);
230 switch (codec->codec_type) {
231 case AVMEDIA_TYPE_AUDIO:
232 av_log(s, AV_LOG_DEBUG, "audio codec set to: %s\n", c_name);
233 codec->sample_rate = RTSP_DEFAULT_AUDIO_SAMPLERATE;
234 codec->channels = RTSP_DEFAULT_NB_AUDIO_CHANNELS;
235 if (i > 0) {
236 codec->sample_rate = i;
237 avpriv_set_pts_info(st, 32, 1, codec->sample_rate);
238 get_word_sep(buf, sizeof(buf), "/", &p);
239 i = atoi(buf);
240 if (i > 0)
241 codec->channels = i;
242 // TODO: there is a bug here; if it is a mono stream, and
243 // less than 22000Hz, faad upconverts to stereo and twice
244 // the frequency. No problem, but the sample rate is being
245 // set here by the sdp line. Patch on its way. (rdm)
246 }
247 av_log(s, AV_LOG_DEBUG, "audio samplerate set to: %i\n",
248 codec->sample_rate);
249 av_log(s, AV_LOG_DEBUG, "audio channels set to: %i\n",
250 codec->channels);
251 break;
252 case AVMEDIA_TYPE_VIDEO:
253 av_log(s, AV_LOG_DEBUG, "video codec set to: %s\n", c_name);
254 if (i > 0)
255 avpriv_set_pts_info(st, 32, 1, i);
256 break;
257 default:
258 break;
259 }
260 if (rtsp_st->dynamic_handler && rtsp_st->dynamic_handler->init)
261 rtsp_st->dynamic_handler->init(s, st->index,
262 rtsp_st->dynamic_protocol_context);
263 return 0;
264 }
265
266 /* parse the attribute line from the fmtp a line of an sdp response. This
267 * is broken out as a function because it is used in rtp_h264.c, which is
268 * forthcoming. */
269 int ff_rtsp_next_attr_and_value(const char **p, char *attr, int attr_size,
270 char *value, int value_size)
271 {
272 *p += strspn(*p, SPACE_CHARS);
273 if (**p) {
274 get_word_sep(attr, attr_size, "=", p);
275 if (**p == '=')
276 (*p)++;
277 get_word_sep(value, value_size, ";", p);
278 if (**p == ';')
279 (*p)++;
280 return 1;
281 }
282 return 0;
283 }
284
285 typedef struct SDPParseState {
286 /* SDP only */
287 struct sockaddr_storage default_ip;
288 int default_ttl;
289 int skip_media; ///< set if an unknown m= line occurs
290 } SDPParseState;
291
292 static void sdp_parse_line(AVFormatContext *s, SDPParseState *s1,
293 int letter, const char *buf)
294 {
295 RTSPState *rt = s->priv_data;
296 char buf1[64], st_type[64];
297 const char *p;
298 enum AVMediaType codec_type;
299 int payload_type, i;
300 AVStream *st;
301 RTSPStream *rtsp_st;
302 struct sockaddr_storage sdp_ip;
303 int ttl;
304
305 av_dlog(s, "sdp: %c='%s'\n", letter, buf);
306
307 p = buf;
308 if (s1->skip_media && letter != 'm')
309 return;
310 switch (letter) {
311 case 'c':
312 get_word(buf1, sizeof(buf1), &p);
313 if (strcmp(buf1, "IN") != 0)
314 return;
315 get_word(buf1, sizeof(buf1), &p);
316 if (strcmp(buf1, "IP4") && strcmp(buf1, "IP6"))
317 return;
318 get_word_sep(buf1, sizeof(buf1), "/", &p);
319 if (get_sockaddr(buf1, &sdp_ip))
320 return;
321 ttl = 16;
322 if (*p == '/') {
323 p++;
324 get_word_sep(buf1, sizeof(buf1), "/", &p);
325 ttl = atoi(buf1);
326 }
327 if (s->nb_streams == 0) {
328 s1->default_ip = sdp_ip;
329 s1->default_ttl = ttl;
330 } else {
331 rtsp_st = rt->rtsp_streams[rt->nb_rtsp_streams - 1];
332 rtsp_st->sdp_ip = sdp_ip;
333 rtsp_st->sdp_ttl = ttl;
334 }
335 break;
336 case 's':
337 av_dict_set(&s->metadata, "title", p, 0);
338 break;
339 case 'i':
340 if (s->nb_streams == 0) {
341 av_dict_set(&s->metadata, "comment", p, 0);
342 break;
343 }
344 break;
345 case 'm':
346 /* new stream */
347 s1->skip_media = 0;
348 codec_type = AVMEDIA_TYPE_UNKNOWN;
349 get_word(st_type, sizeof(st_type), &p);
350 if (!strcmp(st_type, "audio")) {
351 codec_type = AVMEDIA_TYPE_AUDIO;
352 } else if (!strcmp(st_type, "video")) {
353 codec_type = AVMEDIA_TYPE_VIDEO;
354 } else if (!strcmp(st_type, "application")) {
355 codec_type = AVMEDIA_TYPE_DATA;
356 }
357 if (codec_type == AVMEDIA_TYPE_UNKNOWN || !(rt->media_type_mask & (1 << codec_type))) {
358 s1->skip_media = 1;
359 return;
360 }
361 rtsp_st = av_mallocz(sizeof(RTSPStream));
362 if (!rtsp_st)
363 return;
364 rtsp_st->stream_index = -1;
365 dynarray_add(&rt->rtsp_streams, &rt->nb_rtsp_streams, rtsp_st);
366
367 rtsp_st->sdp_ip = s1->default_ip;
368 rtsp_st->sdp_ttl = s1->default_ttl;
369
370 get_word(buf1, sizeof(buf1), &p); /* port */
371 rtsp_st->sdp_port = atoi(buf1);
372
373 get_word(buf1, sizeof(buf1), &p); /* protocol */
374 if (!strcmp(buf1, "udp"))
375 rt->transport = RTSP_TRANSPORT_RAW;
376
377 /* XXX: handle list of formats */
378 get_word(buf1, sizeof(buf1), &p); /* format list */
379 rtsp_st->sdp_payload_type = atoi(buf1);
380
381 if (!strcmp(ff_rtp_enc_name(rtsp_st->sdp_payload_type), "MP2T")) {
382 /* no corresponding stream */
383 } else if (rt->server_type == RTSP_SERVER_WMS &&
384 codec_type == AVMEDIA_TYPE_DATA) {
385 /* RTX stream, a stream that carries all the other actual
386 * audio/video streams. Don't expose this to the callers. */
387 } else {
388 st = avformat_new_stream(s, NULL);
389 if (!st)
390 return;
391 st->id = rt->nb_rtsp_streams - 1;
392 rtsp_st->stream_index = st->index;
393 st->codec->codec_type = codec_type;
394 if (rtsp_st->sdp_payload_type < RTP_PT_PRIVATE) {
395 RTPDynamicProtocolHandler *handler;
396 /* if standard payload type, we can find the codec right now */
397 ff_rtp_get_codec_info(st->codec, rtsp_st->sdp_payload_type);
398 if (st->codec->codec_type == AVMEDIA_TYPE_AUDIO &&
399 st->codec->sample_rate > 0)
400 avpriv_set_pts_info(st, 32, 1, st->codec->sample_rate);
401 /* Even static payload types may need a custom depacketizer */
402 handler = ff_rtp_handler_find_by_id(
403 rtsp_st->sdp_payload_type, st->codec->codec_type);
404 init_rtp_handler(handler, rtsp_st, st->codec);
405 if (handler && handler->init)
406 handler->init(s, st->index,
407 rtsp_st->dynamic_protocol_context);
408 }
409 }
410 /* put a default control url */
411 av_strlcpy(rtsp_st->control_url, rt->control_uri,
412 sizeof(rtsp_st->control_url));
413 break;
414 case 'a':
415 if (av_strstart(p, "control:", &p)) {
416 if (s->nb_streams == 0) {
417 if (!strncmp(p, "rtsp://", 7))
418 av_strlcpy(rt->control_uri, p,
419 sizeof(rt->control_uri));
420 } else {
421 char proto[32];
422 /* get the control url */
423 rtsp_st = rt->rtsp_streams[rt->nb_rtsp_streams - 1];
424
425 /* XXX: may need to add full url resolution */
426 av_url_split(proto, sizeof(proto), NULL, 0, NULL, 0,
427 NULL, NULL, 0, p);
428 if (proto[0] == '\0') {
429 /* relative control URL */
430 if (rtsp_st->control_url[strlen(rtsp_st->control_url)-1]!='/')
431 av_strlcat(rtsp_st->control_url, "/",
432 sizeof(rtsp_st->control_url));
433 av_strlcat(rtsp_st->control_url, p,
434 sizeof(rtsp_st->control_url));
435 } else
436 av_strlcpy(rtsp_st->control_url, p,
437 sizeof(rtsp_st->control_url));
438 }
439 } else if (av_strstart(p, "rtpmap:", &p) && s->nb_streams > 0) {
440 /* NOTE: rtpmap is only supported AFTER the 'm=' tag */
441 get_word(buf1, sizeof(buf1), &p);
442 payload_type = atoi(buf1);
443 rtsp_st = rt->rtsp_streams[rt->nb_rtsp_streams - 1];
444 if (rtsp_st->stream_index >= 0) {
445 st = s->streams[rtsp_st->stream_index];
446 sdp_parse_rtpmap(s, st, rtsp_st, payload_type, p);
447 }
448 } else if (av_strstart(p, "fmtp:", &p) ||
449 av_strstart(p, "framesize:", &p)) {
450 /* NOTE: fmtp is only supported AFTER the 'a=rtpmap:xxx' tag */
451 // let dynamic protocol handlers have a stab at the line.
452 get_word(buf1, sizeof(buf1), &p);
453 payload_type = atoi(buf1);
454 for (i = 0; i < rt->nb_rtsp_streams; i++) {
455 rtsp_st = rt->rtsp_streams[i];
456 if (rtsp_st->sdp_payload_type == payload_type &&
457 rtsp_st->dynamic_handler &&
458 rtsp_st->dynamic_handler->parse_sdp_a_line)
459 rtsp_st->dynamic_handler->parse_sdp_a_line(s, i,
460 rtsp_st->dynamic_protocol_context, buf);
461 }
462 } else if (av_strstart(p, "range:", &p)) {
463 int64_t start, end;
464
465 // this is so that seeking on a streamed file can work.
466 rtsp_parse_range_npt(p, &start, &end);
467 s->start_time = start;
468 /* AV_NOPTS_VALUE means live broadcast (and can't seek) */
469 s->duration = (end == AV_NOPTS_VALUE) ?
470 AV_NOPTS_VALUE : end - start;
471 } else if (av_strstart(p, "IsRealDataType:integer;",&p)) {
472 if (atoi(p) == 1)
473 rt->transport = RTSP_TRANSPORT_RDT;
474 } else if (av_strstart(p, "SampleRate:integer;", &p) &&
475 s->nb_streams > 0) {
476 st = s->streams[s->nb_streams - 1];
477 st->codec->sample_rate = atoi(p);
478 } else {
479 if (rt->server_type == RTSP_SERVER_WMS)
480 ff_wms_parse_sdp_a_line(s, p);
481 if (s->nb_streams > 0) {
482 rtsp_st = rt->rtsp_streams[rt->nb_rtsp_streams - 1];
483
484 if (rt->server_type == RTSP_SERVER_REAL)
485 ff_real_parse_sdp_a_line(s, rtsp_st->stream_index, p);
486
487 if (rtsp_st->dynamic_handler &&
488 rtsp_st->dynamic_handler->parse_sdp_a_line)
489 rtsp_st->dynamic_handler->parse_sdp_a_line(s,
490 rtsp_st->stream_index,
491 rtsp_st->dynamic_protocol_context, buf);
492 }
493 }
494 break;
495 }
496 }
497
498 int ff_sdp_parse(AVFormatContext *s, const char *content)
499 {
500 RTSPState *rt = s->priv_data;
501 const char *p;
502 int letter;
503 /* Some SDP lines, particularly for Realmedia or ASF RTSP streams,
504 * contain long SDP lines containing complete ASF Headers (several
505 * kB) or arrays of MDPR (RM stream descriptor) headers plus
506 * "rulebooks" describing their properties. Therefore, the SDP line
507 * buffer is large.
508 *
509 * The Vorbis FMTP line can be up to 16KB - see xiph_parse_sdp_line
510 * in rtpdec_xiph.c. */
511 char buf[16384], *q;
512 SDPParseState sdp_parse_state = { { 0 } }, *s1 = &sdp_parse_state;
513
514 p = content;
515 for (;;) {
516 p += strspn(p, SPACE_CHARS);
517 letter = *p;
518 if (letter == '\0')
519 break;
520 p++;
521 if (*p != '=')
522 goto next_line;
523 p++;
524 /* get the content */
525 q = buf;
526 while (*p != '\n' && *p != '\r' && *p != '\0') {
527 if ((q - buf) < sizeof(buf) - 1)
528 *q++ = *p;
529 p++;
530 }
531 *q = '\0';
532 sdp_parse_line(s, s1, letter, buf);
533 next_line:
534 while (*p != '\n' && *p != '\0')
535 p++;
536 if (*p == '\n')
537 p++;
538 }
539 rt->p = av_malloc(sizeof(struct pollfd)*2*(rt->nb_rtsp_streams+1));
540 if (!rt->p) return AVERROR(ENOMEM);
541 return 0;
542 }
543 #endif /* CONFIG_RTPDEC */
544
545 void ff_rtsp_undo_setup(AVFormatContext *s)
546 {
547 RTSPState *rt = s->priv_data;
548 int i;
549
550 for (i = 0; i < rt->nb_rtsp_streams; i++) {
551 RTSPStream *rtsp_st = rt->rtsp_streams[i];
552 if (!rtsp_st)
553 continue;
554 if (rtsp_st->transport_priv) {
555 if (s->oformat) {
556 AVFormatContext *rtpctx = rtsp_st->transport_priv;
557 av_write_trailer(rtpctx);
558 if (rt->lower_transport == RTSP_LOWER_TRANSPORT_TCP) {
559 uint8_t *ptr;
560 avio_close_dyn_buf(rtpctx->pb, &ptr);
561 av_free(ptr);
562 } else {
563 avio_close(rtpctx->pb);
564 }
565 avformat_free_context(rtpctx);
566 } else if (rt->transport == RTSP_TRANSPORT_RDT && CONFIG_RTPDEC)
567 ff_rdt_parse_close(rtsp_st->transport_priv);
568 else if (rt->transport == RTSP_TRANSPORT_RAW && CONFIG_RTPDEC)
569 ff_rtp_parse_close(rtsp_st->transport_priv);
570 }
571 rtsp_st->transport_priv = NULL;
572 if (rtsp_st->rtp_handle)
573 ffurl_close(rtsp_st->rtp_handle);
574 rtsp_st->rtp_handle = NULL;
575 }
576 }
577
578 /* close and free RTSP streams */
579 void ff_rtsp_close_streams(AVFormatContext *s)
580 {
581 RTSPState *rt = s->priv_data;
582 int i;
583 RTSPStream *rtsp_st;
584
585 ff_rtsp_undo_setup(s);
586 for (i = 0; i < rt->nb_rtsp_streams; i++) {
587 rtsp_st = rt->rtsp_streams[i];
588 if (rtsp_st) {
589 if (rtsp_st->dynamic_handler && rtsp_st->dynamic_protocol_context)
590 rtsp_st->dynamic_handler->free(
591 rtsp_st->dynamic_protocol_context);
592 av_free(rtsp_st);
593 }
594 }
595 av_free(rt->rtsp_streams);
596 if (rt->asf_ctx) {
597 avformat_close_input(&rt->asf_ctx);
598 }
599 av_free(rt->p);
600 av_free(rt->recvbuf);
601 }
602
603 int ff_rtsp_open_transport_ctx(AVFormatContext *s, RTSPStream *rtsp_st)
604 {
605 RTSPState *rt = s->priv_data;
606 AVStream *st = NULL;
607
608 /* open the RTP context */
609 if (rtsp_st->stream_index >= 0)
610 st = s->streams[rtsp_st->stream_index];
611 if (!st)
612 s->ctx_flags |= AVFMTCTX_NOHEADER;
613
614 if (s->oformat && CONFIG_RTSP_MUXER) {
615 int ret = ff_rtp_chain_mux_open(&rtsp_st->transport_priv, s, st,
616 rtsp_st->rtp_handle,
617 RTSP_TCP_MAX_PACKET_SIZE);
618 /* Ownership of rtp_handle is passed to the rtp mux context */
619 rtsp_st->rtp_handle = NULL;
620 if (ret < 0)
621 return ret;
622 } else if (rt->transport == RTSP_TRANSPORT_RAW) {
623 return 0; // Don't need to open any parser here
624 } else if (rt->transport == RTSP_TRANSPORT_RDT && CONFIG_RTPDEC)
625 rtsp_st->transport_priv = ff_rdt_parse_open(s, st->index,
626 rtsp_st->dynamic_protocol_context,
627 rtsp_st->dynamic_handler);
628 else if (CONFIG_RTPDEC)
629 rtsp_st->transport_priv = ff_rtp_parse_open(s, st, rtsp_st->rtp_handle,
630 rtsp_st->sdp_payload_type,
631 (rt->lower_transport == RTSP_LOWER_TRANSPORT_TCP || !s->max_delay)
632 ? 0 : RTP_REORDER_QUEUE_DEFAULT_SIZE);
633
634 if (!rtsp_st->transport_priv) {
635 return AVERROR(ENOMEM);
636 } else if (rt->transport == RTSP_TRANSPORT_RTP && CONFIG_RTPDEC) {
637 if (rtsp_st->dynamic_handler) {
638 ff_rtp_parse_set_dynamic_protocol(rtsp_st->transport_priv,
639 rtsp_st->dynamic_protocol_context,
640 rtsp_st->dynamic_handler);
641 }
642 }
643
644 return 0;
645 }
646
647 #if CONFIG_RTSP_DEMUXER || CONFIG_RTSP_MUXER
648 static void rtsp_parse_range(int *min_ptr, int *max_ptr, const char **pp)
649 {
650 const char *q;
651 char *p;
652 int v;
653
654 q = *pp;
655 q += strspn(q, SPACE_CHARS);
656 v = strtol(q, &p, 10);
657 if (*p == '-') {
658 p++;
659 *min_ptr = v;
660 v = strtol(p, &p, 10);
661 *max_ptr = v;
662 } else {
663 *min_ptr = v;
664 *max_ptr = v;
665 }
666 *pp = p;
667 }
668
669 /* XXX: only one transport specification is parsed */
670 static void rtsp_parse_transport(RTSPMessageHeader *reply, const char *p)
671 {
672 char transport_protocol[16];
673 char profile[16];
674 char lower_transport[16];
675 char parameter[16];
676 RTSPTransportField *th;
677 char buf[256];
678
679 reply->nb_transports = 0;
680
681 for (;;) {
682 p += strspn(p, SPACE_CHARS);
683 if (*p == '\0')
684 break;
685
686 th = &reply->transports[reply->nb_transports];
687
688 get_word_sep(transport_protocol, sizeof(transport_protocol),
689 "/", &p);
690 if (!av_strcasecmp (transport_protocol, "rtp")) {
691 get_word_sep(profile, sizeof(profile), "/;,", &p);
692 lower_transport[0] = '\0';
693 /* rtp/avp/<protocol> */
694 if (*p == '/') {
695 get_word_sep(lower_transport, sizeof(lower_transport),
696 ";,", &p);
697 }
698 th->transport = RTSP_TRANSPORT_RTP;
699 } else if (!av_strcasecmp (transport_protocol, "x-pn-tng") ||
700 !av_strcasecmp (transport_protocol, "x-real-rdt")) {
701 /* x-pn-tng/<protocol> */
702 get_word_sep(lower_transport, sizeof(lower_transport), "/;,", &p);
703 profile[0] = '\0';
704 th->transport = RTSP_TRANSPORT_RDT;
705 } else if (!av_strcasecmp(transport_protocol, "raw")) {
706 get_word_sep(profile, sizeof(profile), "/;,", &p);
707 lower_transport[0] = '\0';
708 /* raw/raw/<protocol> */
709 if (*p == '/') {
710 get_word_sep(lower_transport, sizeof(lower_transport),
711 ";,", &p);
712 }
713 th->transport = RTSP_TRANSPORT_RAW;
714 }
715 if (!av_strcasecmp(lower_transport, "TCP"))
716 th->lower_transport = RTSP_LOWER_TRANSPORT_TCP;
717 else
718 th->lower_transport = RTSP_LOWER_TRANSPORT_UDP;
719
720 if (*p == ';')
721 p++;
722 /* get each parameter */
723 while (*p != '\0' && *p != ',') {
724 get_word_sep(parameter, sizeof(parameter), "=;,", &p);
725 if (!strcmp(parameter, "port")) {
726 if (*p == '=') {
727 p++;
728 rtsp_parse_range(&th->port_min, &th->port_max, &p);
729 }
730 } else if (!strcmp(parameter, "client_port")) {
731 if (*p == '=') {
732 p++;
733 rtsp_parse_range(&th->client_port_min,
734 &th->client_port_max, &p);
735 }
736 } else if (!strcmp(parameter, "server_port")) {
737 if (*p == '=') {
738 p++;
739 rtsp_parse_range(&th->server_port_min,
740 &th->server_port_max, &p);
741 }
742 } else if (!strcmp(parameter, "interleaved")) {
743 if (*p == '=') {
744 p++;
745 rtsp_parse_range(&th->interleaved_min,
746 &th->interleaved_max, &p);
747 }
748 } else if (!strcmp(parameter, "multicast")) {
749 if (th->lower_transport == RTSP_LOWER_TRANSPORT_UDP)
750 th->lower_transport = RTSP_LOWER_TRANSPORT_UDP_MULTICAST;
751 } else if (!strcmp(parameter, "ttl")) {
752 if (*p == '=') {
753 p++;
754 th->ttl = strtol(p, (char **)&p, 10);
755 }
756 } else if (!strcmp(parameter, "destination")) {
757 if (*p == '=') {
758 p++;
759 get_word_sep(buf, sizeof(buf), ";,", &p);
760 get_sockaddr(buf, &th->destination);
761 }
762 } else if (!strcmp(parameter, "source")) {
763 if (*p == '=') {
764 p++;
765 get_word_sep(buf, sizeof(buf), ";,", &p);
766 av_strlcpy(th->source, buf, sizeof(th->source));
767 }
768 } else if (!strcmp(parameter, "mode")) {
769 if (*p == '=') {
770 p++;
771 get_word_sep(buf, sizeof(buf), ";, ", &p);
772 if (!strcmp(buf, "record") ||
773 !strcmp(buf, "receive"))
774 th->mode_record = 1;
775 }
776 }
777
778 while (*p != ';' && *p != '\0' && *p != ',')
779 p++;
780 if (*p == ';')
781 p++;
782 }
783 if (*p == ',')
784 p++;
785
786 reply->nb_transports++;
787 }
788 }
789
790 static void handle_rtp_info(RTSPState *rt, const char *url,
791 uint32_t seq, uint32_t rtptime)
792 {
793 int i;
794 if (!rtptime || !url[0])
795 return;
796 if (rt->transport != RTSP_TRANSPORT_RTP)
797 return;
798 for (i = 0; i < rt->nb_rtsp_streams; i++) {
799 RTSPStream *rtsp_st = rt->rtsp_streams[i];
800 RTPDemuxContext *rtpctx = rtsp_st->transport_priv;
801 if (!rtpctx)
802 continue;
803 if (!strcmp(rtsp_st->control_url, url)) {
804 rtpctx->base_timestamp = rtptime;
805 break;
806 }
807 }
808 }
809
810 static void rtsp_parse_rtp_info(RTSPState *rt, const char *p)
811 {
812 int read = 0;
813 char key[20], value[1024], url[1024] = "";
814 uint32_t seq = 0, rtptime = 0;
815
816 for (;;) {
817 p += strspn(p, SPACE_CHARS);
818 if (!*p)
819 break;
820 get_word_sep(key, sizeof(key), "=", &p);
821 if (*p != '=')
822 break;
823 p++;
824 get_word_sep(value, sizeof(value), ";, ", &p);
825 read++;
826 if (!strcmp(key, "url"))
827 av_strlcpy(url, value, sizeof(url));
828 else if (!strcmp(key, "seq"))
829 seq = strtoul(value, NULL, 10);
830 else if (!strcmp(key, "rtptime"))
831 rtptime = strtoul(value, NULL, 10);
832 if (*p == ',') {
833 handle_rtp_info(rt, url, seq, rtptime);
834 url[0] = '\0';
835 seq = rtptime = 0;
836 read = 0;
837 }
838 if (*p)
839 p++;
840 }
841 if (read > 0)
842 handle_rtp_info(rt, url, seq, rtptime);
843 }
844
845 void ff_rtsp_parse_line(RTSPMessageHeader *reply, const char *buf,
846 RTSPState *rt, const char *method)
847 {
848 const char *p;
849
850 /* NOTE: we do case independent match for broken servers */
851 p = buf;
852 if (av_stristart(p, "Session:", &p)) {
853 int t;
854 get_word_sep(reply->session_id, sizeof(reply->session_id), ";", &p);
855 if (av_stristart(p, ";timeout=", &p) &&
856 (t = strtol(p, NULL, 10)) > 0) {
857 reply->timeout = t;
858 }
859 } else if (av_stristart(p, "Content-Length:", &p)) {
860 reply->content_length = strtol(p, NULL, 10);
861 } else if (av_stristart(p, "Transport:", &p)) {
862 rtsp_parse_transport(reply, p);
863 } else if (av_stristart(p, "CSeq:", &p)) {
864 reply->seq = strtol(p, NULL, 10);
865 } else if (av_stristart(p, "Range:", &p)) {
866 rtsp_parse_range_npt(p, &reply->range_start, &reply->range_end);
867 } else if (av_stristart(p, "RealChallenge1:", &p)) {
868 p += strspn(p, SPACE_CHARS);
869 av_strlcpy(reply->real_challenge, p, sizeof(reply->real_challenge));
870 } else if (av_stristart(p, "Server:", &p)) {
871 p += strspn(p, SPACE_CHARS);
872 av_strlcpy(reply->server, p, sizeof(reply->server));
873 } else if (av_stristart(p, "Notice:", &p) ||
874 av_stristart(p, "X-Notice:", &p)) {
875 reply->notice = strtol(p, NULL, 10);
876 } else if (av_stristart(p, "Location:", &p)) {
877 p += strspn(p, SPACE_CHARS);
878 av_strlcpy(reply->location, p , sizeof(reply->location));
879 } else if (av_stristart(p, "WWW-Authenticate:", &p) && rt) {
880 p += strspn(p, SPACE_CHARS);
881 ff_http_auth_handle_header(&rt->auth_state, "WWW-Authenticate", p);
882 } else if (av_stristart(p, "Authentication-Info:", &p) && rt) {
883 p += strspn(p, SPACE_CHARS);
884 ff_http_auth_handle_header(&rt->auth_state, "Authentication-Info", p);
885 } else if (av_stristart(p, "Content-Base:", &p) && rt) {
886 p += strspn(p, SPACE_CHARS);
887 if (method && !strcmp(method, "DESCRIBE"))
888 av_strlcpy(rt->control_uri, p , sizeof(rt->control_uri));
889 } else if (av_stristart(p, "RTP-Info:", &p) && rt) {
890 p += strspn(p, SPACE_CHARS);
891 if (method && !strcmp(method, "PLAY"))
892 rtsp_parse_rtp_info(rt, p);
893 } else if (av_stristart(p, "Public:", &p) && rt) {
894 if (strstr(p, "GET_PARAMETER") &&
895 method && !strcmp(method, "OPTIONS"))
896 rt->get_parameter_supported = 1;
897 } else if (av_stristart(p, "x-Accept-Dynamic-Rate:", &p) && rt) {
898 p += strspn(p, SPACE_CHARS);
899 rt->accept_dynamic_rate = atoi(p);
900 } else if (av_stristart(p, "Content-Type:", &p)) {
901 p += strspn(p, SPACE_CHARS);
902 av_strlcpy(reply->content_type, p, sizeof(reply->content_type));
903 }
904 }
905
906 /* skip a RTP/TCP interleaved packet */
907 void ff_rtsp_skip_packet(AVFormatContext *s)
908 {
909 RTSPState *rt = s->priv_data;
910 int ret, len, len1;
911 uint8_t buf[1024];
912
913 ret = ffurl_read_complete(rt->rtsp_hd, buf, 3);
914 if (ret != 3)
915 return;
916 len = AV_RB16(buf + 1);
917
918 av_dlog(s, "skipping RTP packet len=%d\n", len);
919
920 /* skip payload */
921 while (len > 0) {
922 len1 = len;
923 if (len1 > sizeof(buf))
924 len1 = sizeof(buf);
925 ret = ffurl_read_complete(rt->rtsp_hd, buf, len1);
926 if (ret != len1)
927 return;
928 len -= len1;
929 }
930 }
931
932 int ff_rtsp_read_reply(AVFormatContext *s, RTSPMessageHeader *reply,
933 unsigned char **content_ptr,
934 int return_on_interleaved_data, const char *method)
935 {
936 RTSPState *rt = s->priv_data;
937 char buf[4096], buf1[1024], *q;
938 unsigned char ch;
939 const char *p;
940 int ret, content_length, line_count = 0, request = 0;
941 unsigned char *content = NULL;
942
943 start:
944 line_count = 0;
945 request = 0;
946 content = NULL;
947 memset(reply, 0, sizeof(*reply));
948
949 /* parse reply (XXX: use buffers) */
950 rt->last_reply[0] = '\0';
951 for (;;) {
952 q = buf;
953 for (;;) {
954 ret = ffurl_read_complete(rt->rtsp_hd, &ch, 1);
955 av_dlog(s, "ret=%d c=%02x [%c]\n", ret, ch, ch);
956 if (ret != 1)
957 return AVERROR_EOF;
958 if (ch == '\n')
959 break;
960 if (ch == '$') {
961 /* XXX: only parse it if first char on line ? */
962 if (return_on_interleaved_data) {
963 return 1;
964 } else
965 ff_rtsp_skip_packet(s);
966 } else if (ch != '\r') {
967 if ((q - buf) < sizeof(buf) - 1)
968 *q++ = ch;
969 }
970 }
971 *q = '\0';
972
973 av_dlog(s, "line='%s'\n", buf);
974
975 /* test if last line */
976 if (buf[0] == '\0')
977 break;
978 p = buf;
979 if (line_count == 0) {
980 /* get reply code */
981 get_word(buf1, sizeof(buf1), &p);
982 if (!strncmp(buf1, "RTSP/", 5)) {
983 get_word(buf1, sizeof(buf1), &p);
984 reply->status_code = atoi(buf1);
985 av_strlcpy(reply->reason, p, sizeof(reply->reason));
986 } else {
987 av_strlcpy(reply->reason, buf1, sizeof(reply->reason)); // method
988 get_word(buf1, sizeof(buf1), &p); // object
989 request = 1;
990 }
991 } else {
992 ff_rtsp_parse_line(reply, p, rt, method);
993 av_strlcat(rt->last_reply, p, sizeof(rt->last_reply));
994 av_strlcat(rt->last_reply, "\n", sizeof(rt->last_reply));
995 }
996 line_count++;
997 }
998
999 if (rt->session_id[0] == '\0' && reply->session_id[0] != '\0' && !request)
1000 av_strlcpy(rt->session_id, reply->session_id, sizeof(rt->session_id));
1001
1002 content_length = reply->content_length;
1003 if (content_length > 0) {
1004 /* leave some room for a trailing '\0' (useful for simple parsing) */
1005 content = av_malloc(content_length + 1);
1006 ffurl_read_complete(rt->rtsp_hd, content, content_length);
1007 content[content_length] = '\0';
1008 }
1009 if (content_ptr)
1010 *content_ptr = content;
1011 else
1012 av_free(content);
1013
1014 if (request) {
1015 char buf[1024];
1016 char base64buf[AV_BASE64_SIZE(sizeof(buf))];
1017 const char* ptr = buf;
1018
1019 if (!strcmp(reply->reason, "OPTIONS")) {
1020 snprintf(buf, sizeof(buf), "RTSP/1.0 200 OK\r\n");
1021 if (reply->seq)
1022 av_strlcatf(buf, sizeof(buf), "CSeq: %d\r\n", reply->seq);
1023 if (reply->session_id[0])
1024 av_strlcatf(buf, sizeof(buf), "Session: %s\r\n",
1025 reply->session_id);
1026 } else {
1027 snprintf(buf, sizeof(buf), "RTSP/1.0 501 Not Implemented\r\n");
1028 }
1029 av_strlcat(buf, "\r\n", sizeof(buf));
1030
1031 if (rt->control_transport == RTSP_MODE_TUNNEL) {
1032 av_base64_encode(base64buf, sizeof(base64buf), buf, strlen(buf));
1033 ptr = base64buf;
1034 }
1035 ffurl_write(rt->rtsp_hd_out, ptr, strlen(ptr));
1036
1037 rt->last_cmd_time = av_gettime();
1038 /* Even if the request from the server had data, it is not the data
1039 * that the caller wants or expects. The memory could also be leaked
1040 * if the actual following reply has content data. */
1041 if (content_ptr)
1042 av_freep(content_ptr);
1043 /* If method is set, this is called from ff_rtsp_send_cmd,
1044 * where a reply to exactly this request is awaited. For
1045 * callers from within packet receiving, we just want to
1046 * return to the caller and go back to receiving packets. */
1047 if (method)
1048 goto start;
1049 return 0;
1050 }
1051
1052 if (rt->seq != reply->seq) {
1053 av_log(s, AV_LOG_WARNING, "CSeq %d expected, %d received.\n",
1054 rt->seq, reply->seq);
1055 }
1056
1057 /* EOS */
1058 if (reply->notice == 2101 /* End-of-Stream Reached */ ||
1059 reply->notice == 2104 /* Start-of-Stream Reached */ ||
1060 reply->notice == 2306 /* Continuous Feed Terminated */) {
1061 rt->state = RTSP_STATE_IDLE;
1062 } else if (reply->notice >= 4400 && reply->notice < 5500) {
1063 return AVERROR(EIO); /* data or server error */
1064 } else if (reply->notice == 2401 /* Ticket Expired */ ||
1065 (reply->notice >= 5500 && reply->notice < 5600) /* end of term */ )
1066 return AVERROR(EPERM);
1067
1068 return 0;
1069 }
1070
1071 /**
1072 * Send a command to the RTSP server without waiting for the reply.
1073 *
1074 * @param s RTSP (de)muxer context
1075 * @param method the method for the request
1076 * @param url the target url for the request
1077 * @param headers extra header lines to include in the request
1078 * @param send_content if non-null, the data to send as request body content
1079 * @param send_content_length the length of the send_content data, or 0 if
1080 * send_content is null
1081 *
1082 * @return zero if success, nonzero otherwise
1083 */
1084 static int ff_rtsp_send_cmd_with_content_async(AVFormatContext *s,
1085 const char *method, const char *url,
1086 const char *headers,
1087 const unsigned char *send_content,
1088 int send_content_length)
1089 {
1090 RTSPState *rt = s->priv_data;
1091 char buf[4096], *out_buf;
1092 char base64buf[AV_BASE64_SIZE(sizeof(buf))];
1093
1094 /* Add in RTSP headers */
1095 out_buf = buf;
1096 rt->seq++;
1097 snprintf(buf, sizeof(buf), "%s %s RTSP/1.0\r\n", method, url);
1098 if (headers)
1099 av_strlcat(buf, headers, sizeof(buf));
1100 av_strlcatf(buf, sizeof(buf), "CSeq: %d\r\n", rt->seq);
1101 if (rt->session_id[0] != '\0' && (!headers ||
1102 !strstr(headers, "\nIf-Match:"))) {
1103 av_strlcatf(buf, sizeof(buf), "Session: %s\r\n", rt->session_id);
1104 }
1105 if (rt->auth[0]) {
1106 char *str = ff_http_auth_create_response(&rt->auth_state,
1107 rt->auth, url, method);
1108 if (str)
1109 av_strlcat(buf, str, sizeof(buf));
1110 av_free(str);
1111 }
1112 if (send_content_length > 0 && send_content)
1113 av_strlcatf(buf, sizeof(buf), "Content-Length: %d\r\n", send_content_length);
1114 av_strlcat(buf, "\r\n", sizeof(buf));
1115
1116 /* base64 encode rtsp if tunneling */
1117 if (rt->control_transport == RTSP_MODE_TUNNEL) {
1118 av_base64_encode(base64buf, sizeof(base64buf), buf, strlen(buf));
1119 out_buf = base64buf;
1120 }
1121
1122 av_dlog(s, "Sending:\n%s--\n", buf);
1123
1124 ffurl_write(rt->rtsp_hd_out, out_buf, strlen(out_buf));
1125 if (send_content_length > 0 && send_content) {
1126 if (rt->control_transport == RTSP_MODE_TUNNEL) {
1127 av_log(s, AV_LOG_ERROR, "tunneling of RTSP requests "
1128 "with content data not supported\n");
1129 return AVERROR_PATCHWELCOME;
1130 }
1131 ffurl_write(rt->rtsp_hd_out, send_content, send_content_length);
1132 }
1133 rt->last_cmd_time = av_gettime();
1134
1135 return 0;
1136 }
1137
1138 int ff_rtsp_send_cmd_async(AVFormatContext *s, const char *method,
1139 const char *url, const char *headers)
1140 {
1141 return ff_rtsp_send_cmd_with_content_async(s, method, url, headers, NULL, 0);
1142 }
1143
1144 int ff_rtsp_send_cmd(AVFormatContext *s, const char *method, const char *url,
1145 const char *headers, RTSPMessageHeader *reply,
1146 unsigned char **content_ptr)
1147 {
1148 return ff_rtsp_send_cmd_with_content(s, method, url, headers, reply,
1149 content_ptr, NULL, 0);
1150 }
1151
1152 int ff_rtsp_send_cmd_with_content(AVFormatContext *s,
1153 const char *method, const char *url,
1154 const char *header,
1155 RTSPMessageHeader *reply,
1156 unsigned char **content_ptr,
1157 const unsigned char *send_content,
1158 int send_content_length)
1159 {
1160 RTSPState *rt = s->priv_data;
1161 HTTPAuthType cur_auth_type;
1162 int ret, attempts = 0;
1163
1164 retry:
1165 cur_auth_type = rt->auth_state.auth_type;
1166 if ((ret = ff_rtsp_send_cmd_with_content_async(s, method, url, header,
1167 send_content,
1168 send_content_length)))
1169 return ret;
1170
1171 if ((ret = ff_rtsp_read_reply(s, reply, content_ptr, 0, method) ) < 0)
1172 return ret;
1173 attempts++;
1174
1175 if (reply->status_code == 401 &&
1176 (cur_auth_type == HTTP_AUTH_NONE || rt->auth_state.stale) &&
1177 rt->auth_state.auth_type != HTTP_AUTH_NONE && attempts < 2)
1178 goto retry;
1179
1180 if (reply->status_code > 400){
1181 av_log(s, AV_LOG_ERROR, "method %s failed: %d%s\n",
1182 method,
1183 reply->status_code,
1184 reply->reason);
1185 av_log(s, AV_LOG_DEBUG, "%s\n", rt->last_reply);
1186 }
1187
1188 return 0;
1189 }
1190
1191 int ff_rtsp_make_setup_request(AVFormatContext *s, const char *host, int port,
1192 int lower_transport, const char *real_challenge)
1193 {
1194 RTSPState *rt = s->priv_data;
1195 int rtx = 0, j, i, err, interleave = 0, port_off;
1196 RTSPStream *rtsp_st;
1197 RTSPMessageHeader reply1, *reply = &reply1;
1198 char cmd[2048];
1199 const char *trans_pref;
1200
1201 if (rt->transport == RTSP_TRANSPORT_RDT)
1202 trans_pref = "x-pn-tng";
1203 else if (rt->transport == RTSP_TRANSPORT_RAW)
1204 trans_pref = "RAW/RAW";
1205 else
1206 trans_pref = "RTP/AVP";
1207
1208 /* default timeout: 1 minute */
1209 rt->timeout = 60;
1210
1211 /* for each stream, make the setup request */
1212 /* XXX: we assume the same server is used for the control of each
1213 * RTSP stream */
1214
1215 /* Choose a random starting offset within the first half of the
1216 * port range, to allow for a number of ports to try even if the offset
1217 * happens to be at the end of the random range. */
1218 port_off = av_get_random_seed() % ((rt->rtp_port_max - rt->rtp_port_min)/2);
1219 /* even random offset */
1220 port_off -= port_off & 0x01;
1221
1222 for (j = rt->rtp_port_min + port_off, i = 0; i < rt->nb_rtsp_streams; ++i) {
1223 char transport[2048];
1224
1225 /*
1226 * WMS serves all UDP data over a single connection, the RTX, which
1227 * isn't necessarily the first in the SDP but has to be the first
1228 * to be set up, else the second/third SETUP will fail with a 461.
1229 */
1230 if (lower_transport == RTSP_LOWER_TRANSPORT_UDP &&
1231 rt->server_type == RTSP_SERVER_WMS) {
1232 if (i == 0) {
1233 /* rtx first */
1234 for (rtx = 0; rtx < rt->nb_rtsp_streams; rtx++) {
1235 int len = strlen(rt->rtsp_streams[rtx]->control_url);
1236 if (len >= 4 &&
1237 !strcmp(rt->rtsp_streams[rtx]->control_url + len - 4,
1238 "/rtx"))
1239 break;
1240 }
1241 if (rtx == rt->nb_rtsp_streams)
1242 return -1; /* no RTX found */
1243 rtsp_st = rt->rtsp_streams[rtx];
1244 } else
1245 rtsp_st = rt->rtsp_streams[i > rtx ? i : i - 1];
1246 } else
1247 rtsp_st = rt->rtsp_streams[i];
1248
1249 /* RTP/UDP */
1250 if (lower_transport == RTSP_LOWER_TRANSPORT_UDP) {
1251 char buf[256];
1252
1253 if (rt->server_type == RTSP_SERVER_WMS && i > 1) {
1254 port = reply->transports[0].client_port_min;
1255 goto have_port;
1256 }
1257
1258 /* first try in specified port range */
1259 while (j <= rt->rtp_port_max) {
1260 ff_url_join(buf, sizeof(buf), "rtp", NULL, host, -1,
1261 "?localport=%d", j);
1262 /* we will use two ports per rtp stream (rtp and rtcp) */
1263 j += 2;
1264 if (!ffurl_open(&rtsp_st->rtp_handle, buf, AVIO_FLAG_READ_WRITE,
1265 &s->interrupt_callback, NULL))
1266 goto rtp_opened;
1267 }
1268
1269 av_log(s, AV_LOG_ERROR, "Unable to open an input RTP port\n");
1270 err = AVERROR(EIO);
1271 goto fail;
1272
1273 rtp_opened:
1274 port = ff_rtp_get_local_rtp_port(rtsp_st->rtp_handle);
1275 have_port:
1276 snprintf(transport, sizeof(transport) - 1,
1277 "%s/UDP;", trans_pref);
1278 if (rt->server_type != RTSP_SERVER_REAL)
1279 av_strlcat(transport, "unicast;", sizeof(transport));
1280 av_strlcatf(transport, sizeof(transport),
1281 "client_port=%d", port);
1282 if (rt->transport == RTSP_TRANSPORT_RTP &&
1283 !(rt->server_type == RTSP_SERVER_WMS && i > 0))
1284 av_strlcatf(transport, sizeof(transport), "-%d", port + 1);
1285 }
1286
1287 /* RTP/TCP */
1288 else if (lower_transport == RTSP_LOWER_TRANSPORT_TCP) {
1289 /* For WMS streams, the application streams are only used for
1290 * UDP. When trying to set it up for TCP streams, the server
1291 * will return an error. Therefore, we skip those streams. */
1292 if (rt->server_type == RTSP_SERVER_WMS &&
1293 (rtsp_st->stream_index < 0 ||
1294 s->streams[rtsp_st->stream_index]->codec->codec_type ==
1295 AVMEDIA_TYPE_DATA))
1296 continue;
1297 snprintf(transport, sizeof(transport) - 1,
1298 "%s/TCP;", trans_pref);
1299 if (rt->transport != RTSP_TRANSPORT_RDT)
1300 av_strlcat(transport, "unicast;", sizeof(transport));
1301 av_strlcatf(transport, sizeof(transport),
1302 "interleaved=%d-%d",
1303 interleave, interleave + 1);
1304 interleave += 2;
1305 }
1306
1307 else if (lower_transport == RTSP_LOWER_TRANSPORT_UDP_MULTICAST) {
1308 snprintf(transport, sizeof(transport) - 1,
1309 "%s/UDP;multicast", trans_pref);
1310 }
1311 if (s->oformat) {
1312 av_strlcat(transport, ";mode=record", sizeof(transport));
1313 } else if (rt->server_type == RTSP_SERVER_REAL ||
1314 rt->server_type == RTSP_SERVER_WMS)
1315 av_strlcat(transport, ";mode=play", sizeof(transport));
1316 snprintf(cmd, sizeof(cmd),
1317 "Transport: %s\r\n",
1318 transport);
1319 if (rt->accept_dynamic_rate)
1320 av_strlcat(cmd, "x-Dynamic-Rate: 0\r\n", sizeof(cmd));
1321 if (i == 0 && rt->server_type == RTSP_SERVER_REAL && CONFIG_RTPDEC) {
1322 char real_res[41], real_csum[9];
1323 ff_rdt_calc_response_and_checksum(real_res, real_csum,
1324 real_challenge);
1325 av_strlcatf(cmd, sizeof(cmd),
1326 "If-Match: %s\r\n"
1327 "RealChallenge2: %s, sd=%s\r\n",
1328 rt->session_id, real_res, real_csum);
1329 }
1330 ff_rtsp_send_cmd(s, "SETUP", rtsp_st->control_url, cmd, reply, NULL);
1331 if (reply->status_code == 461 /* Unsupported protocol */ && i == 0) {
1332 err = 1;
1333 goto fail;
1334 } else if (reply->status_code != RTSP_STATUS_OK ||
1335 reply->nb_transports != 1) {
1336 err = AVERROR_INVALIDDATA;
1337 goto fail;
1338 }
1339
1340 /* XXX: same protocol for all streams is required */
1341 if (i > 0) {
1342 if (reply->transports[0].lower_transport != rt->lower_transport ||
1343 reply->transports[0].transport != rt->transport) {
1344 err = AVERROR_INVALIDDATA;
1345 goto fail;
1346 }
1347 } else {
1348 rt->lower_transport = reply->transports[0].lower_transport;
1349 rt->transport = reply->transports[0].transport;
1350 }
1351
1352 /* Fail if the server responded with another lower transport mode
1353 * than what we requested. */
1354 if (reply->transports[0].lower_transport != lower_transport) {
1355 av_log(s, AV_LOG_ERROR, "Nonmatching transport in server reply\n");
1356 err = AVERROR_INVALIDDATA;
1357 goto fail;
1358 }
1359
1360 switch(reply->transports[0].lower_transport) {
1361 case RTSP_LOWER_TRANSPORT_TCP:
1362 rtsp_st->interleaved_min = reply->transports[0].interleaved_min;
1363 rtsp_st->interleaved_max = reply->transports[0].interleaved_max;
1364 break;
1365
1366 case RTSP_LOWER_TRANSPORT_UDP: {
1367 char url[1024], options[30] = "";
1368
1369 if (rt->rtsp_flags & RTSP_FLAG_FILTER_SRC)
1370 av_strlcpy(options, "?connect=1", sizeof(options));
1371 /* Use source address if specified */
1372 if (reply->transports[0].source[0]) {
1373 ff_url_join(url, sizeof(url), "rtp", NULL,
1374 reply->transports[0].source,
1375 reply->transports[0].server_port_min, "%s", options);
1376 } else {
1377 ff_url_join(url, sizeof(url), "rtp", NULL, host,
1378 reply->transports[0].server_port_min, "%s", options);
1379 }
1380 if (!(rt->server_type == RTSP_SERVER_WMS && i > 1) &&
1381 ff_rtp_set_remote_url(rtsp_st->rtp_handle, url) < 0) {
1382 err = AVERROR_INVALIDDATA;
1383 goto fail;
1384 }
1385 /* Try to initialize the connection state in a
1386 * potential NAT router by sending dummy packets.
1387 * RTP/RTCP dummy packets are used for RDT, too.
1388 */
1389 if (!(rt->server_type == RTSP_SERVER_WMS && i > 1) && s->iformat &&
1390 CONFIG_RTPDEC)
1391 ff_rtp_send_punch_packets(rtsp_st->rtp_handle);
1392 break;
1393 }
1394 case RTSP_LOWER_TRANSPORT_UDP_MULTICAST: {
1395 char url[1024], namebuf[50], optbuf[20] = "";
1396 struct sockaddr_storage addr;
1397 int port, ttl;
1398
1399 if (reply->transports[0].destination.ss_family) {
1400 addr = reply->transports[0].destination;
1401 port = reply->transports[0].port_min;
1402 ttl = reply->transports[0].ttl;
1403 } else {
1404 addr = rtsp_st->sdp_ip;
1405 port = rtsp_st->sdp_port;
1406 ttl = rtsp_st->sdp_ttl;
1407 }
1408 if (ttl > 0)
1409 snprintf(optbuf, sizeof(optbuf), "?ttl=%d", ttl);
1410 getnameinfo((struct sockaddr*) &addr, sizeof(addr),
1411 namebuf, sizeof(namebuf), NULL, 0, NI_NUMERICHOST);
1412 ff_url_join(url, sizeof(url), "rtp", NULL, namebuf,
1413 port, "%s", optbuf);
1414 if (ffurl_open(&rtsp_st->rtp_handle, url, AVIO_FLAG_READ_WRITE,
1415 &s->interrupt_callback, NULL) < 0) {
1416 err = AVERROR_INVALIDDATA;
1417 goto fail;
1418 }
1419 break;
1420 }
1421 }
1422
1423 if ((err = ff_rtsp_open_transport_ctx(s, rtsp_st)))
1424 goto fail;
1425 }
1426
1427 if (rt->nb_rtsp_streams && reply->timeout > 0)
1428 rt->timeout = reply->timeout;
1429
1430 if (rt->server_type == RTSP_SERVER_REAL)
1431 rt->need_subscription = 1;
1432
1433 return 0;
1434
1435 fail:
1436 ff_rtsp_undo_setup(s);
1437 return err;
1438 }
1439
1440 void ff_rtsp_close_connections(AVFormatContext *s)
1441 {
1442 RTSPState *rt = s->priv_data;
1443 if (rt->rtsp_hd_out != rt->rtsp_hd) ffurl_close(rt->rtsp_hd_out);
1444 ffurl_close(rt->rtsp_hd);
1445 rt->rtsp_hd = rt->rtsp_hd_out = NULL;
1446 }
1447
1448 int ff_rtsp_connect(AVFormatContext *s)
1449 {
1450 RTSPState *rt = s->priv_data;
1451 char host[1024], path[1024], tcpname[1024], cmd[2048], auth[128];
1452 int port, err, tcp_fd;
1453 RTSPMessageHeader reply1 = {0}, *reply = &reply1;
1454 int lower_transport_mask = 0;
1455 char real_challenge[64] = "";
1456 struct sockaddr_storage peer;
1457 socklen_t peer_len = sizeof(peer);
1458
1459 if (rt->rtp_port_max < rt->rtp_port_min) {
1460 av_log(s, AV_LOG_ERROR, "Invalid UDP port range, max port %d less "
1461 "than min port %d\n", rt->rtp_port_max,
1462 rt->rtp_port_min);
1463 return AVERROR(EINVAL);
1464 }
1465
1466 if (!ff_network_init())
1467 return AVERROR(EIO);
1468
1469 if (s->max_delay < 0) /* Not set by the caller */
1470 s->max_delay = s->iformat ? DEFAULT_REORDERING_DELAY : 0;
1471
1472 rt->control_transport = RTSP_MODE_PLAIN;
1473 if (rt->lower_transport_mask & (1 << RTSP_LOWER_TRANSPORT_HTTP)) {
1474 rt->lower_transport_mask = 1 << RTSP_LOWER_TRANSPORT_TCP;
1475 rt->control_transport = RTSP_MODE_TUNNEL;
1476 }
1477 /* Only pass through valid flags from here */
1478 rt->lower_transport_mask &= (1 << RTSP_LOWER_TRANSPORT_NB) - 1;
1479
1480 redirect:
1481 lower_transport_mask = rt->lower_transport_mask;
1482 /* extract hostname and port */
1483 av_url_split(NULL, 0, auth, sizeof(auth),
1484 host, sizeof(host), &port, path, sizeof(path), s->filename);
1485 if (*auth) {
1486 av_strlcpy(rt->auth, auth, sizeof(rt->auth));
1487 }
1488 if (port < 0)
1489 port = RTSP_DEFAULT_PORT;
1490
1491 if (!lower_transport_mask)
1492 lower_transport_mask = (1 << RTSP_LOWER_TRANSPORT_NB) - 1;
1493
1494 if (s->oformat) {
1495 /* Only UDP or TCP - UDP multicast isn't supported. */
1496 lower_transport_mask &= (1 << RTSP_LOWER_TRANSPORT_UDP) |
1497 (1 << RTSP_LOWER_TRANSPORT_TCP);
1498 if (!lower_transport_mask || rt->control_transport == RTSP_MODE_TUNNEL) {
1499 av_log(s, AV_LOG_ERROR, "Unsupported lower transport method, "
1500 "only UDP and TCP are supported for output.\n");
1501 err = AVERROR(EINVAL);
1502 goto fail;
1503 }
1504 }
1505
1506 /* Construct the URI used in request; this is similar to s->filename,
1507 * but with authentication credentials removed and RTSP specific options
1508 * stripped out. */
1509 ff_url_join(rt->control_uri, sizeof(rt->control_uri), "rtsp", NULL,
1510 host, port, "%s", path);
1511
1512 if (rt->control_transport == RTSP_MODE_TUNNEL) {
1513 /* set up initial handshake for tunneling */
1514 char httpname[1024];
1515 char sessioncookie[17];
1516 char headers[1024];
1517
1518 ff_url_join(httpname, sizeof(httpname), "http", auth, host, port, "%s", path);
1519 snprintf(sessioncookie, sizeof(sessioncookie), "%08x%08x",
1520 av_get_random_seed(), av_get_random_seed());
1521
1522 /* GET requests */
1523 if (ffurl_alloc(&rt->rtsp_hd, httpname, AVIO_FLAG_READ,
1524 &s->interrupt_callback) < 0) {
1525 err = AVERROR(EIO);
1526 goto fail;
1527 }
1528
1529 /* generate GET headers */
1530 snprintf(headers, sizeof(headers),
1531 "x-sessioncookie: %s\r\n"
1532 "Accept: application/x-rtsp-tunnelled\r\n"
1533 "Pragma: no-cache\r\n"
1534 "Cache-Control: no-cache\r\n",
1535 sessioncookie);
1536 av_opt_set(rt->rtsp_hd->priv_data, "headers", headers, 0);
1537
1538 /* complete the connection */
1539 if (ffurl_connect(rt->rtsp_hd, NULL)) {
1540 err = AVERROR(EIO);
1541 goto fail;
1542 }
1543
1544 /* POST requests */
1545 if (ffurl_alloc(&rt->rtsp_hd_out, httpname, AVIO_FLAG_WRITE,
1546 &s->interrupt_callback) < 0 ) {
1547 err = AVERROR(EIO);
1548 goto fail;
1549 }
1550
1551 /* generate POST headers */
1552 snprintf(headers, sizeof(headers),
1553 "x-sessioncookie: %s\r\n"
1554 "Content-Type: application/x-rtsp-tunnelled\r\n"
1555 "Pragma: no-cache\r\n"
1556 "Cache-Control: no-cache\r\n"
1557 "Content-Length: 32767\r\n"
1558 "Expires: Sun, 9 Jan 1972 00:00:00 GMT\r\n",
1559 sessioncookie);
1560 av_opt_set(rt->rtsp_hd_out->priv_data, "headers", headers, 0);
1561 av_opt_set(rt->rtsp_hd_out->priv_data, "chunked_post", "0", 0);
1562
1563 /* Initialize the authentication state for the POST session. The HTTP
1564 * protocol implementation doesn't properly handle multi-pass
1565 * authentication for POST requests, since it would require one of
1566 * the following:
1567 * - implementing Expect: 100-continue, which many HTTP servers
1568 * don't support anyway, even less the RTSP servers that do HTTP
1569 * tunneling
1570 * - sending the whole POST data until getting a 401 reply specifying
1571 * what authentication method to use, then resending all that data
1572 * - waiting for potential 401 replies directly after sending the
1573 * POST header (waiting for some unspecified time)
1574 * Therefore, we copy the full auth state, which works for both basic
1575 * and digest. (For digest, we would have to synchronize the nonce
1576 * count variable between the two sessions, if we'd do more requests
1577 * with the original session, though.)
1578 */
1579 ff_http_init_auth_state(rt->rtsp_hd_out, rt->rtsp_hd);
1580
1581 /* complete the connection */
1582 if (ffurl_connect(rt->rtsp_hd_out, NULL)) {
1583 err = AVERROR(EIO);
1584 goto fail;
1585 }
1586 } else {
1587 /* open the tcp connection */
1588 ff_url_join(tcpname, sizeof(tcpname), "tcp", NULL, host, port, NULL);
1589 if (ffurl_open(&rt->rtsp_hd, tcpname, AVIO_FLAG_READ_WRITE,
1590 &s->interrupt_callback, NULL) < 0) {
1591 err = AVERROR(EIO);
1592 goto fail;
1593 }
1594 rt->rtsp_hd_out = rt->rtsp_hd;
1595 }
1596 rt->seq = 0;
1597
1598 tcp_fd = ffurl_get_file_handle(rt->rtsp_hd);
1599 if (!getpeername(tcp_fd, (struct sockaddr*) &peer, &peer_len)) {
1600 getnameinfo((struct sockaddr*) &peer, peer_len, host, sizeof(host),
1601 NULL, 0, NI_NUMERICHOST);
1602 }
1603
1604 /* request options supported by the server; this also detects server
1605 * type */
1606 for (rt->server_type = RTSP_SERVER_RTP;;) {
1607 cmd[0] = 0;
1608 if (rt->server_type == RTSP_SERVER_REAL)
1609 av_strlcat(cmd,
1610 /*
1611 * The following entries are required for proper
1612 * streaming from a Realmedia server. They are
1613 * interdependent in some way although we currently
1614 * don't quite understand how. Values were copied
1615 * from mplayer SVN r23589.
1616 * ClientChallenge is a 16-byte ID in hex
1617 * CompanyID is a 16-byte ID in base64
1618 */
1619 "ClientChallenge: 9e26d33f2984236010ef6253fb1887f7\r\n"
1620 "PlayerStarttime: [28/03/2003:22:50:23 00:00]\r\n"
1621 "CompanyID: KnKV4M4I/B2FjJ1TToLycw==\r\n"
1622 "GUID: 00000000-0000-0000-0000-000000000000\r\n",
1623 sizeof(cmd));
1624 ff_rtsp_send_cmd(s, "OPTIONS", rt->control_uri, cmd, reply, NULL);
1625 if (reply->status_code != RTSP_STATUS_OK) {
1626 err = AVERROR_INVALIDDATA;
1627 goto fail;
1628 }
1629
1630 /* detect server type if not standard-compliant RTP */
1631 if (rt->server_type != RTSP_SERVER_REAL && reply->real_challenge[0]) {
1632 rt->server_type = RTSP_SERVER_REAL;
1633 continue;
1634 } else if (!av_strncasecmp(reply->server, "WMServer/", 9)) {
1635 rt->server_type = RTSP_SERVER_WMS;
1636 } else if (rt->server_type == RTSP_SERVER_REAL)
1637 strcpy(real_challenge, reply->real_challenge);
1638 break;
1639 }
1640
1641 if (s->iformat && CONFIG_RTSP_DEMUXER)
1642 err = ff_rtsp_setup_input_streams(s, reply);
1643 else if (CONFIG_RTSP_MUXER)
1644 err = ff_rtsp_setup_output_streams(s, host);
1645 if (err)
1646 goto fail;
1647
1648 do {
1649 int lower_transport = ff_log2_tab[lower_transport_mask &
1650 ~(lower_transport_mask - 1)];
1651
1652 err = ff_rtsp_make_setup_request(s, host, port, lower_transport,
1653 rt->server_type == RTSP_SERVER_REAL ?
1654 real_challenge : NULL);
1655 if (err < 0)
1656 goto fail;
1657 lower_transport_mask &= ~(1 << lower_transport);
1658 if (lower_transport_mask == 0 && err == 1) {
1659 err = AVERROR(EPROTONOSUPPORT);
1660 goto fail;
1661 }
1662 } while (err);
1663
1664 rt->lower_transport_mask = lower_transport_mask;
1665 av_strlcpy(rt->real_challenge, real_challenge, sizeof(rt->real_challenge));
1666 rt->state = RTSP_STATE_IDLE;
1667 rt->seek_timestamp = 0; /* default is to start stream at position zero */
1668 return 0;
1669 fail:
1670 ff_rtsp_close_streams(s);
1671 ff_rtsp_close_connections(s);
1672 if (reply->status_code >=300 && reply->status_code < 400 && s->iformat) {
1673 av_strlcpy(s->filename, reply->location, sizeof(s->filename));
1674 av_log(s, AV_LOG_INFO, "Status %d: Redirecting to %s\n",
1675 reply->status_code,
1676 s->filename);
1677 goto redirect;
1678 }
1679 ff_network_close();
1680 return err;
1681 }
1682 #endif /* CONFIG_RTSP_DEMUXER || CONFIG_RTSP_MUXER */
1683
1684 #if CONFIG_RTPDEC
1685 static int udp_read_packet(AVFormatContext *s, RTSPStream **prtsp_st,
1686 uint8_t *buf, int buf_size, int64_t wait_end)
1687 {
1688 RTSPState *rt = s->priv_data;
1689 RTSPStream *rtsp_st;
1690 int n, i, ret, tcp_fd, timeout_cnt = 0;
1691 int max_p = 0;
1692 struct pollfd *p = rt->p;
1693
1694 for (;;) {
1695 if (ff_check_interrupt(&s->interrupt_callback))
1696 return AVERROR_EXIT;
1697 if (wait_end && wait_end - av_gettime() < 0)
1698 return AVERROR(EAGAIN);
1699 max_p = 0;
1700 if (rt->rtsp_hd) {
1701 tcp_fd = ffurl_get_file_handle(rt->rtsp_hd);
1702 p[max_p].fd = tcp_fd;
1703 p[max_p++].events = POLLIN;
1704 } else {
1705 tcp_fd = -1;
1706 }
1707 for (i = 0; i < rt->nb_rtsp_streams; i++) {
1708 rtsp_st = rt->rtsp_streams[i];
1709 if (rtsp_st->rtp_handle) {
1710 p[max_p].fd = ffurl_get_file_handle(rtsp_st->rtp_handle);
1711 p[max_p++].events = POLLIN;
1712 p[max_p].fd = ff_rtp_get_rtcp_file_handle(rtsp_st->rtp_handle);
1713 p[max_p++].events = POLLIN;
1714 }
1715 }
1716 n = poll(p, max_p, POLL_TIMEOUT_MS);
1717 if (n > 0) {
1718 int j = 1 - (tcp_fd == -1);
1719 timeout_cnt = 0;
1720 for (i = 0; i < rt->nb_rtsp_streams; i++) {
1721 rtsp_st = rt->rtsp_streams[i];
1722 if (rtsp_st->rtp_handle) {
1723 if (p[j].revents & POLLIN || p[j+1].revents & POLLIN) {
1724 ret = ffurl_read(rtsp_st->rtp_handle, buf, buf_size);
1725 if (ret > 0) {
1726 *prtsp_st = rtsp_st;
1727 return ret;
1728 }
1729 }
1730 j+=2;
1731 }
1732 }
1733 #if CONFIG_RTSP_DEMUXER
1734 if (tcp_fd != -1 && p[0].revents & POLLIN) {
1735 if (rt->rtsp_flags & RTSP_FLAG_LISTEN) {
1736 if (rt->state == RTSP_STATE_STREAMING) {
1737 if (!ff_rtsp_parse_streaming_commands(s))
1738 return AVERROR_EOF;
1739 else
1740 av_log(s, AV_LOG_WARNING,
1741 "Unable to answer to TEARDOWN\n");
1742 } else
1743 return 0;
1744 } else {
1745 RTSPMessageHeader reply;
1746 ret = ff_rtsp_read_reply(s, &reply, NULL, 0, NULL);
1747 if (ret < 0)
1748 return ret;
1749 /* XXX: parse message */
1750 if (rt->state != RTSP_STATE_STREAMING)
1751 return 0;
1752 }
1753 }
1754 #endif
1755 } else if (n == 0 && ++timeout_cnt >= MAX_TIMEOUTS) {
1756 return AVERROR(ETIMEDOUT);
1757 } else if (n < 0 && errno != EINTR)
1758 return AVERROR(errno);
1759 }
1760 }
1761
1762 int ff_rtsp_fetch_packet(AVFormatContext *s, AVPacket *pkt)
1763 {
1764 RTSPState *rt = s->priv_data;
1765 int ret, len;
1766 RTSPStream *rtsp_st, *first_queue_st = NULL;
1767 int64_t wait_end = 0;
1768
1769 if (rt->nb_byes == rt->nb_rtsp_streams)
1770 return AVERROR_EOF;
1771
1772 /* get next frames from the same RTP packet */
1773 if (rt->cur_transport_priv) {
1774 if (rt->transport == RTSP_TRANSPORT_RDT) {
1775 ret = ff_rdt_parse_packet(rt->cur_transport_priv, pkt, NULL, 0);
1776 } else
1777 ret = ff_rtp_parse_packet(rt->cur_transport_priv, pkt, NULL, 0);
1778 if (ret == 0) {
1779 rt->cur_transport_priv = NULL;
1780 return 0;
1781 } else if (ret == 1) {
1782 return 0;
1783 } else
1784 rt->cur_transport_priv = NULL;
1785 }
1786
1787 if (rt->transport == RTSP_TRANSPORT_RTP) {
1788 int i;
1789 int64_t first_queue_time = 0;
1790 for (i = 0; i < rt->nb_rtsp_streams; i++) {
1791 RTPDemuxContext *rtpctx = rt->rtsp_streams[i]->transport_priv;
1792 int64_t queue_time;
1793 if (!rtpctx)
1794 continue;
1795 queue_time = ff_rtp_queued_packet_time(rtpctx);
1796 if (queue_time && (queue_time - first_queue_time < 0 ||
1797 !first_queue_time)) {
1798 first_queue_time = queue_time;
1799 first_queue_st = rt->rtsp_streams[i];
1800 }
1801 }
1802 if (first_queue_time)
1803 wait_end = first_queue_time + s->max_delay;
1804 }
1805
1806 /* read next RTP packet */
1807 redo:
1808 if (!rt->recvbuf) {
1809 rt->recvbuf = av_malloc(RECVBUF_SIZE);
1810 if (!rt->recvbuf)
1811 return AVERROR(ENOMEM);
1812 }
1813
1814 switch(rt->lower_transport) {
1815 default:
1816 #if CONFIG_RTSP_DEMUXER
1817 case RTSP_LOWER_TRANSPORT_TCP:
1818 len = ff_rtsp_tcp_read_packet(s, &rtsp_st, rt->recvbuf, RECVBUF_SIZE);
1819 break;
1820 #endif
1821 case RTSP_LOWER_TRANSPORT_UDP:
1822 case RTSP_LOWER_TRANSPORT_UDP_MULTICAST:
1823 len = udp_read_packet(s, &rtsp_st, rt->recvbuf, RECVBUF_SIZE, wait_end);
1824 if (len > 0 && rtsp_st->transport_priv && rt->transport == RTSP_TRANSPORT_RTP)
1825 ff_rtp_check_and_send_back_rr(rtsp_st->transport_priv, len);
1826 break;
1827 }
1828 if (len == AVERROR(EAGAIN) && first_queue_st &&
1829 rt->transport == RTSP_TRANSPORT_RTP) {
1830 rtsp_st = first_queue_st;
1831 ret = ff_rtp_parse_packet(rtsp_st->transport_priv, pkt, NULL, 0);
1832 goto end;
1833 }
1834 if (len < 0)
1835 return len;
1836 if (len == 0)
1837 return AVERROR_EOF;
1838 if (rt->transport == RTSP_TRANSPORT_RDT) {
1839 ret = ff_rdt_parse_packet(rtsp_st->transport_priv, pkt, &rt->recvbuf, len);
1840 } else if (rt->transport == RTSP_TRANSPORT_RTP) {
1841 ret = ff_rtp_parse_packet(rtsp_st->transport_priv, pkt, &rt->recvbuf, len);
1842 if (ret < 0) {
1843 /* Either bad packet, or a RTCP packet. Check if the
1844 * first_rtcp_ntp_time field was initialized. */
1845 RTPDemuxContext *rtpctx = rtsp_st->transport_priv;
1846 if (rtpctx->first_rtcp_ntp_time != AV_NOPTS_VALUE) {
1847 /* first_rtcp_ntp_time has been initialized for this stream,
1848 * copy the same value to all other uninitialized streams,
1849 * in order to map their timestamp origin to the same ntp time
1850 * as this one. */
1851 int i;
1852 AVStream *st = NULL;
1853 if (rtsp_st->stream_index >= 0)
1854 st = s->streams[rtsp_st->stream_index];
1855 for (i = 0; i < rt->nb_rtsp_streams; i++) {
1856 RTPDemuxContext *rtpctx2 = rt->rtsp_streams[i]->transport_priv;
1857 AVStream *st2 = NULL;
1858 if (rt->rtsp_streams[i]->stream_index >= 0)
1859 st2 = s->streams[rt->rtsp_streams[i]->stream_index];
1860 if (rtpctx2 && st && st2 &&
1861 rtpctx2->first_rtcp_ntp_time == AV_NOPTS_VALUE) {
1862 rtpctx2->first_rtcp_ntp_time = rtpctx->first_rtcp_ntp_time;
1863 rtpctx2->rtcp_ts_offset = av_rescale_q(
1864 rtpctx->rtcp_ts_offset, st->time_base,
1865 st2->time_base);
1866 }
1867 }
1868 }
1869 if (ret == -RTCP_BYE) {
1870 rt->nb_byes++;
1871
1872 av_log(s, AV_LOG_DEBUG, "Received BYE for stream %d (%d/%d)\n",
1873 rtsp_st->stream_index, rt->nb_byes, rt->nb_rtsp_streams);
1874
1875 if (rt->nb_byes == rt->nb_rtsp_streams)
1876 return AVERROR_EOF;
1877 }
1878 }
1879 } else {
1880 return AVERROR_INVALIDDATA;
1881 }
1882 end:
1883 if (ret < 0)
1884 goto redo;
1885 if (ret == 1)
1886 /* more packets may follow, so we save the RTP context */
1887 rt->cur_transport_priv = rtsp_st->transport_priv;
1888
1889 return ret;
1890 }
1891 #endif /* CONFIG_RTPDEC */
1892
1893 #if CONFIG_SDP_DEMUXER
1894 static int sdp_probe(AVProbeData *p1)
1895 {
1896 const char *p = p1->buf, *p_end = p1->buf + p1->buf_size;
1897
1898 /* we look for a line beginning "c=IN IP" */
1899 while (p < p_end && *p != '\0') {
1900 if (p + sizeof("c=IN IP") - 1 < p_end &&
1901 av_strstart(p, "c=IN IP", NULL))
1902 return AVPROBE_SCORE_MAX / 2;
1903
1904 while (p < p_end - 1 && *p != '\n') p++;
1905 if (++p >= p_end)
1906 break;
1907 if (*p == '\r')
1908 p++;
1909 }
1910 return 0;
1911 }
1912
1913 static int sdp_read_header(AVFormatContext *s)
1914 {
1915 RTSPState *rt = s->priv_data;
1916 RTSPStream *rtsp_st;
1917 int size, i, err;
1918 char *content;
1919 char url[1024];
1920
1921 if (!ff_network_init())
1922 return AVERROR(EIO);
1923
1924 if (s->max_delay < 0) /* Not set by the caller */
1925 s->max_delay = DEFAULT_REORDERING_DELAY;
1926
1927 /* read the whole sdp file */
1928 /* XXX: better loading */
1929 content = av_malloc(SDP_MAX_SIZE);
1930 size = avio_read(s->pb, content, SDP_MAX_SIZE - 1);
1931 if (size <= 0) {
1932 av_free(content);
1933 return AVERROR_INVALIDDATA;
1934 }
1935 content[size] ='\0';
1936
1937 err = ff_sdp_parse(s, content);
1938 av_free(content);
1939 if (err) goto fail;
1940
1941 /* open each RTP stream */
1942 for (i = 0; i < rt->nb_rtsp_streams; i++) {
1943 char namebuf[50];
1944 rtsp_st = rt->rtsp_streams[i];
1945
1946 getnameinfo((struct sockaddr*) &rtsp_st->sdp_ip, sizeof(rtsp_st->sdp_ip),
1947 namebuf, sizeof(namebuf), NULL, 0, NI_NUMERICHOST);
1948 ff_url_join(url, sizeof(url), "rtp", NULL,
1949 namebuf, rtsp_st->sdp_port,
1950 "?localport=%d&ttl=%d&connect=%d", rtsp_st->sdp_port,
1951 rtsp_st->sdp_ttl,
1952 rt->rtsp_flags & RTSP_FLAG_FILTER_SRC ? 1 : 0);
1953 if (ffurl_open(&rtsp_st->rtp_handle, url, AVIO_FLAG_READ_WRITE,
1954 &s->interrupt_callback, NULL) < 0) {
1955 err = AVERROR_INVALIDDATA;
1956 goto fail;
1957 }
1958 if ((err = ff_rtsp_open_transport_ctx(s, rtsp_st)))
1959 goto fail;
1960 }
1961 return 0;
1962 fail:
1963 ff_rtsp_close_streams(s);
1964 ff_network_close();
1965 return err;
1966 }
1967
1968 static int sdp_read_close(AVFormatContext *s)
1969 {
1970 ff_rtsp_close_streams(s);
1971 ff_network_close();
1972 return 0;
1973 }
1974
1975 static const AVClass sdp_demuxer_class = {
1976 .class_name = "SDP demuxer",
1977 .item_name = av_default_item_name,
1978 .option = sdp_options,
1979 .version = LIBAVUTIL_VERSION_INT,
1980 };
1981
1982 AVInputFormat ff_sdp_demuxer = {
1983 .name = "sdp",
1984 .long_name = NULL_IF_CONFIG_SMALL("SDP"),
1985 .priv_data_size = sizeof(RTSPState),
1986 .read_probe = sdp_probe,
1987 .read_header = sdp_read_header,
1988 .read_packet = ff_rtsp_fetch_packet,
1989 .read_close = sdp_read_close,
1990 .priv_class = &sdp_demuxer_class,
1991 };
1992 #endif /* CONFIG_SDP_DEMUXER */
1993
1994 #if CONFIG_RTP_DEMUXER
1995 static int rtp_probe(AVProbeData *p)
1996 {
1997 if (av_strstart(p->filename, "rtp:", NULL))
1998 return AVPROBE_SCORE_MAX;
1999 return 0;
2000 }
2001
2002 static int rtp_read_header(AVFormatContext *s)
2003 {
2004 uint8_t recvbuf[1500];
2005 char host[500], sdp[500];
2006 int ret, port;
2007 URLContext* in = NULL;
2008 int payload_type;
2009 AVCodecContext codec = { 0 };
2010 struct sockaddr_storage addr;
2011 AVIOContext pb;
2012 socklen_t addrlen = sizeof(addr);
2013 RTSPState *rt = s->priv_data;
2014
2015 if (!ff_network_init())
2016 return AVERROR(EIO);
2017
2018 ret = ffurl_open(&in, s->filename, AVIO_FLAG_READ,
2019 &s->interrupt_callback, NULL);
2020 if (ret)
2021 goto fail;
2022
2023 while (1) {
2024 ret = ffurl_read(in, recvbuf, sizeof(recvbuf));
2025 if (ret == AVERROR(EAGAIN))
2026 continue;
2027 if (ret < 0)
2028 goto fail;
2029 if (ret < 12) {
2030 av_log(s, AV_LOG_WARNING, "Received too short packet\n");
2031 continue;
2032 }
2033
2034 if ((recvbuf[0] & 0xc0) != 0x80) {
2035 av_log(s, AV_LOG_WARNING, "Unsupported RTP version packet "
2036 "received\n");
2037 continue;
2038 }
2039
2040 if (RTP_PT_IS_RTCP(recvbuf[1]))
2041 continue;
2042
2043 payload_type = recvbuf[1] & 0x7f;
2044 break;
2045 }
2046 getsockname(ffurl_get_file_handle(in), (struct sockaddr*) &addr, &addrlen);
2047 ffurl_close(in);
2048 in = NULL;
2049
2050 if (ff_rtp_get_codec_info(&codec, payload_type)) {
2051 av_log(s, AV_LOG_ERROR, "Unable to receive RTP payload type %d "
2052 "without an SDP file describing it\n",
2053 payload_type);
2054 goto fail;
2055 }
2056 if (codec.codec_type != AVMEDIA_TYPE_DATA) {
2057 av_log(s, AV_LOG_WARNING, "Guessing on RTP content - if not received "
2058 "properly you need an SDP file "
2059 "describing it\n");
2060 }
2061
2062 av_url_split(NULL, 0, NULL, 0, host, sizeof(host), &port,
2063 NULL, 0, s->filename);
2064
2065 snprintf(sdp, sizeof(sdp),
2066 "v=0\r\nc=IN IP%d %s\r\nm=%s %d RTP/AVP %d\r\n",
2067 addr.ss_family == AF_INET ? 4 : 6, host,
2068 codec.codec_type == AVMEDIA_TYPE_DATA ? "application" :
2069 codec.codec_type == AVMEDIA_TYPE_VIDEO ? "video" : "audio",
2070 port, payload_type);
2071 av_log(s, AV_LOG_VERBOSE, "SDP:\n%s\n", sdp);
2072
2073 ffio_init_context(&pb, sdp, strlen(sdp), 0, NULL, NULL, NULL, NULL);
2074 s->pb = &pb;
2075
2076 /* sdp_read_header initializes this again */
2077 ff_network_close();
2078
2079 rt->media_type_mask = (1 << (AVMEDIA_TYPE_DATA+1)) - 1;
2080
2081 ret = sdp_read_header(s);
2082 s->pb = NULL;
2083 return ret;
2084
2085 fail:
2086 if (in)
2087 ffurl_close(in);
2088 ff_network_close();
2089 return ret;
2090 }
2091
2092 static const AVClass rtp_demuxer_class = {
2093 .class_name = "RTP demuxer",
2094 .item_name = av_default_item_name,
2095 .option = rtp_options,
2096 .version = LIBAVUTIL_VERSION_INT,
2097 };
2098
2099 AVInputFormat ff_rtp_demuxer = {
2100 .name = "rtp",
2101 .long_name = NULL_IF_CONFIG_SMALL("RTP input"),
2102 .priv_data_size = sizeof(RTSPState),
2103 .read_probe = rtp_probe,
2104 .read_header = rtp_read_header,
2105 .read_packet = ff_rtsp_fetch_packet,
2106 .read_close = sdp_read_close,
2107 .flags = AVFMT_NOFILE,
2108 .priv_class = &rtp_demuxer_class,
2109 };
2110 #endif /* CONFIG_RTP_DEMUXER */