[FFmpeg-devel] [PATCH] RTMP client support for lavf

Michael Niedermayer michaelni
Tue Jul 21 23:30:26 CEST 2009


On Tue, Jul 21, 2009 at 11:04:09AM +0300, Kostya wrote:
> On Mon, Jul 20, 2009 at 05:05:41PM +0200, Michael Niedermayer wrote:
> > On Sat, Jul 18, 2009 at 08:01:17PM +0300, Kostya wrote:
> > > On Sat, Jul 18, 2009 at 11:29:34AM +0200, Michael Niedermayer wrote:
> > > > On Fri, Jul 17, 2009 at 06:38:46PM +0300, Kostya wrote:
[...]
> [...]
> > > > > +//TODO: Move HMAC code somewhere. Eventually.
> > > > 
> > > > good idea!
> > > > also it should be a seperate patch
> > > 
> > > err, I've not found a place in libavcrypto to add it; also I suspect you
> > > want generic version of HMAC performing on, say, MD5 as well.
> > 
> > as you mention it, yes i surely would want that
>  
> Please wait until I design API for it. Meanwhile, I'll leave this here
> (since in most cases I need digest of two blocks and such calculation
> saves me some memcpy()s).
>  
[...]
> > [...]
> > 
> > > +/* needed for gethostname() */
> > > +#define _XOPEN_SOURCE 600
> > 
> > doxy
> 
> no, it's not

can you change that?
any reason why not?


[...]


> +static void gen_connect(URLContext *s, RTMPContext *rt, const char *proto,
> +                        const char *host, int port, const char *app)
> +{
> +    RTMPPacket pkt;
> +    uint8_t ver[32], *p;
> +    char tcurl[512];
> +
> +    ff_rtmp_packet_create(&pkt, RTMP_VIDEO_CHANNEL, RTMP_PT_INVOKE, 0, 4096);
> +    p = pkt.data;
> +
> +    snprintf(tcurl, sizeof(tcurl), "%s://%s:%d/%s", proto, host, port, app);
> +    ff_amf_write_string(&p, "connect");
> +    ff_amf_write_number(&p, 1.0);
> +    ff_amf_write_object_start(&p);
> +    ff_amf_write_field_name(&p, "app");
> +    ff_amf_write_string(&p, app);
> +
> +    snprintf(ver, sizeof(ver), "%s %d,%d,%d,%d", RTMP_CLIENT_PLATFORM, RTMP_CLIENT_VER1,
> +             RTMP_CLIENT_VER2, RTMP_CLIENT_VER3, RTMP_CLIENT_VER4);
> +    ff_amf_write_field_name(&p, "flashVer");
> +    ff_amf_write_string(&p, ver);
> +    ff_amf_write_field_name(&p, "tcUrl");
> +    ff_amf_write_string(&p, tcurl);
> +    ff_amf_write_field_name(&p, "fpad");
> +    ff_amf_write_bool(&p, 0);
> +    ff_amf_write_field_name(&p, "capabilities");
> +    ff_amf_write_number(&p, 15.0);
> +    ff_amf_write_field_name(&p, "audioCodecs");
> +    ff_amf_write_number(&p, 1639.0);
> +    ff_amf_write_field_name(&p, "videoCodecs");
> +    ff_amf_write_number(&p, 252.0);
> +    ff_amf_write_field_name(&p, "videoFunction");
> +    ff_amf_write_number(&p, 1.0);
> +    ff_amf_write_object_end(&p);
> +
> +    pkt.data_size = p - pkt.data;
> +
> +    ff_rtmp_packet_write(rt->stream, &pkt, rt->chunk_size, rt->prev_pkt[1]);
> +}
> +
> +static void gen_create_stream(URLContext *s, RTMPContext *rt)

I think you should document at the top of the file what the gen_ prefix
means, i think ive guessed it correctly but knowing it makes the code
more understandable ...


[...]
> +static int rtmp_handshake(URLContext *s, RTMPContext *rt)
> +{
> +    AVLFG rnd;
> +    uint8_t tosend    [RTMP_HANDSHAKE_PACKET_SIZE+1];
> +    uint8_t clientdata[RTMP_HANDSHAKE_PACKET_SIZE];
> +    uint8_t serverdata[RTMP_HANDSHAKE_PACKET_SIZE+1];
> +    int i;
> +    int server_pos, client_pos;

> +    uint8_t digest[32];
> +
> +    //av_log(s, AV_LOG_DEBUG, "Handshaking...\n");
> +
> +    av_lfg_init(&rnd, 0xDEADC0DE);
> +    // generate handshake packet - 1536 bytes of pseudorandom data
> +    tosend[0] = 3; //unencrypted data
> +    memset(tosend+1, 0, 4);
> +    //write client "version"
> +    tosend[5] = RTMP_CLIENT_VER1;
> +    tosend[6] = RTMP_CLIENT_VER2;
> +    tosend[7] = RTMP_CLIENT_VER3;
> +    tosend[8] = RTMP_CLIENT_VER4;

uint8_t digest[32]={ ...}



> +    for (i = 9; i <= RTMP_HANDSHAKE_PACKET_SIZE; i++)
> +        tosend[i] = av_lfg_get(&rnd) >> 24;
> +    client_pos = rtmp_handshake_imprint_with_digest(tosend + 1);
> +
> +    url_write(rt->stream, tosend, RTMP_HANDSHAKE_PACKET_SIZE + 1);
> +    i = url_read_complete(rt->stream, serverdata, RTMP_HANDSHAKE_PACKET_SIZE + 1);
> +    if (i != RTMP_HANDSHAKE_PACKET_SIZE + 1) {
> +        //av_log(s, AV_LOG_ERROR, "Cannot read RTMP handshake response\n");
> +        return -1;
> +    }
> +    i = url_read_complete(rt->stream, clientdata, RTMP_HANDSHAKE_PACKET_SIZE);
> +    if (i != RTMP_HANDSHAKE_PACKET_SIZE) {
> +        //av_log(s, AV_LOG_ERROR, "Cannot read RTMP handshake response\n");
> +        return -1;
> +    }
> +
> +    //av_log(s, AV_LOG_DEBUG, "Server version %d.%d.%d.%d\n",
> +    //       serverdata[5], serverdata[6], serverdata[7], serverdata[8]);
> +
> +    server_pos = rtmp_validate_digest(serverdata + 1, 772);
> +    if (!server_pos) {
> +        server_pos = rtmp_validate_digest(serverdata + 1, 8);
> +        if (!server_pos) {
> +            //av_log(s, AV_LOG_ERROR, "Server response validating failed\n");
> +            return -1;
> +        }

Is there a reason why the code fails if the validation fails?


[...]
> +static int rtmp_parse_result(URLContext *s, RTMPContext *rt, RTMPPacket *pkt)
> +{
> +    int i, t;
> +
> +    switch (pkt->type) {
> +    case RTMP_PT_CHUNK_SIZE:
> +        if (pkt->data_size != 4) {
> +            //av_log(s, AV_LOG_ERROR, "Chunk size change packet is not 4 (%d)\n",
> +            //       pkt->data_size);
> +            return -1;
> +        }
> +        rt->chunk_size = AV_RB32(pkt->data);
> +        if (rt->chunk_size <= 0) {
> +            //av_log(s, AV_LOG_ERROR, "Incorrect chunk size %d\n", rt->chunk_size);
> +            return -1;
> +        }

this leaves an invalid chunk_size in the context, is it guranteed that its 
not used?


> +        //av_log(s, AV_LOG_DEBUG, "New chunk size = %d\n", rt->chunk_size);
> +        break;
> +    case RTMP_PT_PING:
> +        t = AV_RB16(pkt->data);
> +        if (t == 6)
> +            gen_pong(s, rt, pkt);
> +        break;
> +    case RTMP_PT_INVOKE:
> +        if (!memcmp(pkt->data, "\002\000\006_error", 9)) {
> +            uint8_t tmpstr[256];
> +
> +            if (!ff_amf_find_field(pkt->data + 9, "description", tmpstr, sizeof(tmpstr)))

> +                av_log(NULL/*s*/, AV_LOG_ERROR, "Server error: %s\n",tmpstr);

it could be a CONTEXT
that is #defined appropriately depending on major ver


> +            return -1;
> +        }
> +        if (!memcmp(pkt->data, "\002\000\007_result", 10)) {
> +            switch (rt->state) {
> +            case STATE_HANDSHAKED:
> +                gen_create_stream(s, rt);
> +                rt->state = STATE_CONNECTING;
> +                break;
> +            case STATE_CONNECTING:
> +                //extract a number from result
> +                if (pkt->data[10] || pkt->data[19] != 5 || pkt->data[20]) {
> +                    av_log(NULL, AV_LOG_WARNING, "Unexpected reply on connect()\n");
> +                } else {
> +                    rt->main_channel_id = (int) av_int2dbl(AV_RB64(pkt->data + 21));
> +                }
> +                gen_play(s, rt);
> +                rt->state = STATE_READY;
> +                break;
> +            }
> +        }
> +        if (!memcmp(pkt->data, "\002\000\010onStatus", 11)) {
> +            const uint8_t* ptr = pkt->data + 11;
> +            uint8_t tmpstr[256];
> +            int t;
> +

> +            for (i = 0; i < 2; i++) {
> +                t = ff_amf_skip_data(ptr);

segfault

> +                if (t < 0)
> +                    return 1;
> +                ptr += t;
> +            }

> +            t = ff_amf_find_field(ptr, "level", tmpstr, sizeof(tmpstr));

segfault


> +            if (!t && !strcmp(tmpstr, "error")) {
> +                if (!ff_amf_find_field(ptr, "description", tmpstr, sizeof(tmpstr)))
> +                    av_log(NULL/*s*/, AV_LOG_ERROR, "Server error: %s\n",tmpstr);
> +                return -1;
> +            }
> +            t = ff_amf_find_field(ptr, "code", tmpstr, sizeof(tmpstr));
> +            if (!t && !strcmp(tmpstr, "NetStream.Play.Start")) {
> +                rt->state = STATE_PLAYING;
> +                return 0;
> +            }
> +        }
> +        break;
> +    }
> +    return 0;
> +}
> +

> +static int get_packet(URLContext *s, int for_header)
> +{
> +    RTMPContext *rt = s->priv_data;
> +    struct timespec ts;
> +    int ret;
> +
> +    ts.tv_sec = 0;
> +    ts.tv_nsec = 500000000;
> +
> +    for(;;) {
> +        RTMPPacket rpkt;
> +        int has_data = 0;
> +        if ((ret = ff_rtmp_packet_read(rt->stream, &rpkt,
> +                                    rt->chunk_size, rt->prev_pkt[0])) != 0) {
> +            if (ret > 0) {
> +                nanosleep(&ts, NULL);

ehm, shouldnt that support returning EAGAIN ...


[...]
> +/**
> + * URL syntax: rtmp://host[:port]/path
> + */

The text is good but its a little terse, missing what the function does ...


[...]
> +URLProtocol rtmp_protocol = {
> +    "rtmp",
> +    rtmp_open,
> +    rtmp_read,
> +    rtmp_write,
> +    NULL, /* seek */

speaking of seeking, doesnt rtmp support seeking of some kind?


[...]
> +int ff_rtmp_packet_read(URLContext *h, RTMPPacket *p,
> +                     int chunk_size, RTMPPacket *prev_pkt)
> +{
> +    uint8_t hdr, t, buf[16];
> +    int channel_id, timestamp, data_size, offset = 0, extra = 0;
> +    uint8_t type;
> +
> +    if (url_read(h, &hdr, 1) != 1) {
> +        return AVERROR(EIO);
> +    }
> +    channel_id = hdr & 0x3F;
> +
> +    hdr >>= 6;
> +    if (hdr == RTMP_PS_ONEBYTE) {
> +        //todo
> +        return -1;
> +    } else {
> +        if (url_read_complete(h, buf, 3) != 3) {
> +            return AVERROR(EIO);
> +        }
> +        timestamp = AV_RB24(buf);
> +        if (hdr != RTMP_PS_FOURBYTES) {
> +            if (url_read_complete(h, buf, 3) != 3) {
> +                return AVERROR(EIO);
> +            }
> +            data_size = AV_RB24(buf);
> +            if (url_read_complete(h, &type, 1) != 1) {
> +                return AVERROR(EIO);
> +            }
> +            if (hdr == RTMP_PS_TWELVEBYTES) {
> +                if (url_read_complete(h, buf, 4) != 4) {
> +                    return AVERROR(EIO);
> +                }
> +                extra = AV_RL32(buf);

extra is a signed int, its value depends on how many bits int has this
cant be correct


[...]
-- 
Michael     GnuPG fingerprint: 9FF2128B147EF6730BADF133611EC787040B0FAB

Into a blind darkness they enter who follow after the Ignorance,
they as if into a greater darkness enter who devote themselves
to the Knowledge alone. -- Isha Upanishad
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
URL: <http://lists.mplayerhq.hu/pipermail/ffmpeg-devel/attachments/20090721/10e47db1/attachment.pgp>



More information about the ffmpeg-devel mailing list