56 #define POLL_TIMEOUT_MS 100 
   57 #define READ_PACKET_TIMEOUT_S 10 
   58 #define MAX_TIMEOUTS READ_PACKET_TIMEOUT_S * 1000 / POLL_TIMEOUT_MS 
   59 #define SDP_MAX_SIZE 16384 
   60 #define RECVBUF_SIZE 10 * RTP_MAX_PACKET_LENGTH 
   61 #define DEFAULT_REORDERING_DELAY 100000 
   63 #define OFFSET(x) offsetof(RTSPState, x) 
   64 #define DEC AV_OPT_FLAG_DECODING_PARAM 
   65 #define ENC AV_OPT_FLAG_ENCODING_PARAM 
   67 #define RTSP_FLAG_OPTS(name, longname) \ 
   68     { name, longname, OFFSET(rtsp_flags), AV_OPT_TYPE_FLAGS, {.i64 = 0}, INT_MIN, INT_MAX, DEC, "rtsp_flags" }, \ 
   69     { "filter_src", "Only receive packets from the negotiated peer IP", 0, AV_OPT_TYPE_CONST, {.i64 = RTSP_FLAG_FILTER_SRC}, 0, 0, DEC, "rtsp_flags" }, \ 
   70     { "listen", "Wait for incoming connections", 0, AV_OPT_TYPE_CONST, {.i64 = RTSP_FLAG_LISTEN}, 0, 0, DEC, "rtsp_flags" } 
   72 #define RTSP_MEDIATYPE_OPTS(name, longname) \ 
   73     { name, longname, OFFSET(media_type_mask), AV_OPT_TYPE_FLAGS, { .i64 = (1 << (AVMEDIA_TYPE_DATA+1)) - 1 }, INT_MIN, INT_MAX, DEC, "allowed_media_types" }, \ 
   74     { "video", "Video", 0, AV_OPT_TYPE_CONST, {.i64 = 1 << AVMEDIA_TYPE_VIDEO}, 0, 0, DEC, "allowed_media_types" }, \ 
   75     { "audio", "Audio", 0, AV_OPT_TYPE_CONST, {.i64 = 1 << AVMEDIA_TYPE_AUDIO}, 0, 0, DEC, "allowed_media_types" }, \ 
   76     { "data", "Data", 0, AV_OPT_TYPE_CONST, {.i64 = 1 << AVMEDIA_TYPE_DATA}, 0, 0, DEC, "allowed_media_types" } 
   78 #define RTSP_REORDERING_OPTS() \ 
   79     { "reorder_queue_size", "Number of packets to buffer for handling of reordered packets", OFFSET(reordering_queue_size), AV_OPT_TYPE_INT, { .i64 = -1 }, -1, INT_MAX, DEC } 
   82     { 
"initial_pause",  
"Don't start playing the stream immediately", 
OFFSET(initial_pause), 
AV_OPT_TYPE_INT, {.i64 = 0}, 0, 1, 
DEC },
 
   84     { 
"rtsp_transport", 
"RTSP transport protocols", 
OFFSET(lower_transport_mask), 
AV_OPT_TYPE_FLAGS, {.i64 = 0}, INT_MIN, INT_MAX, 
DEC|
ENC, 
"rtsp_transport" }, \
 
   93     { 
"timeout", 
"Maximum timeout (in seconds) to wait for incoming connections. -1 is infinite. Implies flag listen", 
OFFSET(initial_timeout), 
AV_OPT_TYPE_INT, {.i64 = -1}, INT_MIN, INT_MAX, 
DEC },
 
  113                                  const char *sep, 
const char **pp)
 
  121     while (!strchr(sep, *p) && *p != 
'\0') {
 
  122         if ((q - buf) < buf_size - 1)
 
  134     if (**pp == 
'/') (*pp)++;
 
  138 static void get_word(
char *buf, 
int buf_size, 
const char **pp)
 
  173     memcpy(sock, ai->ai_addr, 
FFMIN(
sizeof(*sock), ai->ai_addrlen));
 
  187     if (handler->
alloc) {
 
  197                             int payload_type, 
const char *p)
 
  219         init_rtp_handler(handler, rtsp_st, codec);
 
  272                                 char *
value, 
int value_size)
 
  287 typedef struct SDPParseState {
 
  295                            int letter, 
const char *buf)
 
  298     char buf1[64], st_type[64];
 
  307     av_dlog(s, 
"sdp: %c='%s'\n", letter, buf);
 
  310     if (s1->skip_media && letter != 
'm')
 
  315         if (strcmp(buf1, 
"IN") != 0)
 
  318         if (strcmp(buf1, 
"IP4") && strcmp(buf1, 
"IP6"))
 
  330             s1->default_ip = sdp_ip;
 
  331             s1->default_ttl = ttl;
 
  351         get_word(st_type, 
sizeof(st_type), &p);
 
  352         if (!strcmp(st_type, 
"audio")) {
 
  354         } 
else if (!strcmp(st_type, 
"video")) {
 
  356         } 
else if (!strcmp(st_type, 
"application")) {
 
  369         rtsp_st->
sdp_ip = s1->default_ip;
 
  370         rtsp_st->
sdp_ttl = s1->default_ttl;
 
  376         if (!strcmp(buf1, 
"udp"))
 
  378         else if (strstr(buf1, 
"/AVPF") || strstr(buf1, 
"/SAVPF"))
 
  388                 if (!rt->
ts && CONFIG_RTPDEC)
 
  394                 init_rtp_handler(handler, rtsp_st, 
NULL);
 
  395                 if (handler && handler->
init)
 
  419                 init_rtp_handler(handler, rtsp_st, st->
codec);
 
  420                 if (handler && handler->
init)
 
  432                 if (!strncmp(p, 
"rtsp://", 7))
 
  443                 if (proto[0] == 
'\0') {
 
  457             payload_type = atoi(buf1);
 
  461                 sdp_parse_rtpmap(s, st, rtsp_st, payload_type, p);
 
  468             payload_type = atoi(buf1);
 
  486         } 
else if (
av_strstart(p, 
"IsRealDataType:integer;",&p)) {
 
  489         } 
else if (
av_strstart(p, 
"SampleRate:integer;", &p) &&
 
  535     SDPParseState sdp_parse_state = { { 0 } }, *s1 = &sdp_parse_state;
 
  549         while (*p != 
'\n' && *p != 
'\r' && *p != 
'\0') {
 
  550             if ((q - buf) < 
sizeof(buf) - 1)
 
  555         sdp_parse_line(s, s1, letter, buf);
 
  557         while (*p != 
'\n' && *p != 
'\0')
 
  622     if (rt->
ts && CONFIG_RTPDEC)
 
  633     if (reordering_queue_size < 0) {
 
  635             reordering_queue_size = 0;
 
  646     if (s->
oformat && CONFIG_RTSP_MUXER) {
 
  661     else if (CONFIG_RTPDEC)
 
  664                                          reordering_queue_size);
 
  683 #if CONFIG_RTSP_DEMUXER || CONFIG_RTSP_MUXER 
  684 static void rtsp_parse_range(
int *min_ptr, 
int *max_ptr, 
const char **pp)
 
  692     v = strtol(q, &p, 10);
 
  696         v = strtol(p, &p, 10);
 
  708     char transport_protocol[16];
 
  710     char lower_transport[16];
 
  724         get_word_sep(transport_protocol, 
sizeof(transport_protocol),
 
  728             lower_transport[0] = 
'\0';
 
  735         } 
else if (!
av_strcasecmp (transport_protocol, 
"x-pn-tng") ||
 
  738             get_word_sep(lower_transport, 
sizeof(lower_transport), 
"/;,", &p);
 
  743             lower_transport[0] = 
'\0';
 
  759         while (*p != 
'\0' && *p != 
',') {
 
  761             if (!strcmp(parameter, 
"port")) {
 
  766             } 
else if (!strcmp(parameter, 
"client_port")) {
 
  772             } 
else if (!strcmp(parameter, 
"server_port")) {
 
  778             } 
else if (!strcmp(parameter, 
"interleaved")) {
 
  784             } 
else if (!strcmp(parameter, 
"multicast")) {
 
  787             } 
else if (!strcmp(parameter, 
"ttl")) {
 
  791                     th->
ttl = strtol(p, &end, 10);
 
  794             } 
else if (!strcmp(parameter, 
"destination")) {
 
  800             } 
else if (!strcmp(parameter, 
"source")) {
 
  806             } 
else if (!strcmp(parameter, 
"mode")) {
 
  810                     if (!strcmp(buf, 
"record") ||
 
  811                         !strcmp(buf, 
"receive"))
 
  816             while (*p != 
';' && *p != 
'\0' && *p != 
',')
 
  828 static void handle_rtp_info(
RTSPState *rt, 
const char *url,
 
  829                             uint32_t seq, uint32_t rtptime)
 
  832     if (!rtptime || !url[0])
 
  848 static void rtsp_parse_rtp_info(
RTSPState *rt, 
const char *p)
 
  851     char key[20], value[1024], url[1024] = 
"";
 
  852     uint32_t seq = 0, rtptime = 0;
 
  864         if (!strcmp(key, 
"url"))
 
  866         else if (!strcmp(key, 
"seq"))
 
  867             seq = strtoul(value, 
NULL, 10);
 
  868         else if (!strcmp(key, 
"rtptime"))
 
  869             rtptime = strtoul(value, 
NULL, 10);
 
  871             handle_rtp_info(rt, url, seq, rtptime);
 
  880         handle_rtp_info(rt, url, seq, rtptime);
 
  894             (t = strtol(p, 
NULL, 10)) > 0) {
 
  900         rtsp_parse_transport(reply, p);
 
  902         reply->
seq = strtol(p, 
NULL, 10);
 
  917     } 
else if (
av_stristart(p, 
"WWW-Authenticate:", &p) && rt) {
 
  920     } 
else if (
av_stristart(p, 
"Authentication-Info:", &p) && rt) {
 
  923     } 
else if (
av_stristart(p, 
"Content-Base:", &p) && rt) {
 
  925         if (method && !strcmp(method, 
"DESCRIBE"))
 
  929         if (method && !strcmp(method, 
"PLAY"))
 
  930             rtsp_parse_rtp_info(rt, p);
 
  932         if (strstr(p, 
"GET_PARAMETER") &&
 
  933             method && !strcmp(method, 
"OPTIONS"))
 
  935     } 
else if (
av_stristart(p, 
"x-Accept-Dynamic-Rate:", &p) && rt) {
 
  956     av_dlog(s, 
"skipping RTP packet len=%d\n", len);
 
  961         if (len1 > 
sizeof(buf))
 
  971                        unsigned char **content_ptr,
 
  972                        int return_on_interleaved_data, 
const char *method)
 
  975     char buf[4096], buf1[1024], *q;
 
  978     int ret, content_length, line_count = 0, request = 0;
 
  979     unsigned char *content = 
NULL;
 
  985     memset(reply, 0, 
sizeof(*reply));
 
  993             av_dlog(s, 
"ret=%d c=%02x [%c]\n", ret, ch, ch);
 
 1000                 if (return_on_interleaved_data) {
 
 1004             } 
else if (ch != 
'\r') {
 
 1005                 if ((q - buf) < 
sizeof(buf) - 1)
 
 1011         av_dlog(s, 
"line='%s'\n", buf);
 
 1017         if (line_count == 0) {
 
 1020             if (!strncmp(buf1, 
"RTSP/", 5)) {
 
 1041     if (content_length > 0) {
 
 1043         content = 
av_malloc(content_length + 1);
 
 1045         content[content_length] = 
'\0';
 
 1048         *content_ptr = content;
 
 1055         const char* ptr = buf;
 
 1057         if (!strcmp(reply->
reason, 
"OPTIONS")) {
 
 1058             snprintf(buf, 
sizeof(buf), 
"RTSP/1.0 200 OK\r\n");
 
 1065             snprintf(buf, 
sizeof(buf), 
"RTSP/1.0 501 Not Implemented\r\n");
 
 1090     if (rt->
seq != reply->
seq) {
 
 1096     if (reply->
notice == 2101       ||
 
 1098         reply->
notice == 2306 ) {
 
 1100     } 
else if (reply->
notice >= 4400 && reply->
notice < 5500) {
 
 1102     } 
else if (reply->
notice == 2401  ||
 
 1123                                                const char *method, 
const char *url,
 
 1124                                                const char *headers,
 
 1125                                                const unsigned char *send_content,
 
 1126                                                int send_content_length)
 
 1129     char buf[4096], *out_buf;
 
 1135     snprintf(buf, 
sizeof(buf), 
"%s %s RTSP/1.0\r\n", method, url);
 
 1139     if (rt->
session_id[0] != 
'\0' && (!headers ||
 
 1140         !strstr(headers, 
"\nIf-Match:"))) {
 
 1145                                                  rt->
auth, url, method);
 
 1150     if (send_content_length > 0 && send_content)
 
 1151         av_strlcatf(buf, 
sizeof(buf), 
"Content-Length: %d\r\n", send_content_length);
 
 1157         out_buf = base64buf;
 
 1160     av_dlog(s, 
"Sending:\n%s--\n", buf);
 
 1163     if (send_content_length > 0 && send_content) {
 
 1166                                     "with content data not supported\n");
 
 1177                            const char *url, 
const char *headers)
 
 1179     return ff_rtsp_send_cmd_with_content_async(s, method, url, headers, 
NULL, 0);
 
 1184                      unsigned char **content_ptr)
 
 1187                                          content_ptr, 
NULL, 0);
 
 1191                                   const char *method, 
const char *url,
 
 1194                                   unsigned char **content_ptr,
 
 1195                                   const unsigned char *send_content,
 
 1196                                   int send_content_length)
 
 1200     int ret, attempts = 0;
 
 1204     if ((ret = ff_rtsp_send_cmd_with_content_async(s, method, url, header,
 
 1206                                                    send_content_length)))
 
 1230                               int lower_transport, 
const char *real_challenge)
 
 1233     int rtx = 0, j, i, err, 
interleave = 0, port_off;
 
 1237     const char *trans_pref;
 
 1240         trans_pref = 
"x-pn-tng";
 
 1242         trans_pref = 
"RAW/RAW";
 
 1244         trans_pref = 
"RTP/AVP";
 
 1254     port_off -= port_off & 0x01;
 
 1256     for (j = rt->
rtp_port_min + port_off, i = 0; i < rt->nb_rtsp_streams; ++i) {
 
 1257         char transport[2048];
 
 1293             while (j <= rt->rtp_port_max) {
 
 1295                             "?localport=%d", j);
 
 1309             snprintf(transport, 
sizeof(transport) - 1,
 
 1310                      "%s/UDP;", trans_pref);
 
 1312                 av_strlcat(transport, 
"unicast;", 
sizeof(transport));
 
 1314                      "client_port=%d", port);
 
 1317                 av_strlcatf(transport, 
sizeof(transport), 
"-%d", port + 1);
 
 1330             snprintf(transport, 
sizeof(transport) - 1,
 
 1331                      "%s/TCP;", trans_pref);
 
 1333                 av_strlcat(transport, 
"unicast;", 
sizeof(transport));
 
 1335                         "interleaved=%d-%d",
 
 1336                         interleave, interleave + 1);
 
 1341             snprintf(transport, 
sizeof(transport) - 1,
 
 1342                      "%s/UDP;multicast", trans_pref);
 
 1345             av_strlcat(transport, 
";mode=record", 
sizeof(transport));
 
 1348             av_strlcat(transport, 
";mode=play", 
sizeof(transport));
 
 1350                  "Transport: %s\r\n",
 
 1353             av_strlcat(cmd, 
"x-Dynamic-Rate: 0\r\n", 
sizeof(cmd));
 
 1355             char real_res[41], real_csum[9];
 
 1360                         "RealChallenge2: %s, sd=%s\r\n",
 
 1400             char url[1024], 
options[30] = 
"";
 
 1403                 av_strlcpy(options, 
"?connect=1", 
sizeof(options));
 
 1428             char url[1024], namebuf[50], optbuf[20] = 
"";
 
 1442                 snprintf(optbuf, 
sizeof(optbuf), 
"?ttl=%d", ttl);
 
 1443             getnameinfo((
struct sockaddr*) &addr, 
sizeof(addr),
 
 1446                         port, 
"%s", optbuf);
 
 1484     char host[1024], path[1024], tcpname[1024], cmd[2048], auth[128];
 
 1485     int port, err, tcp_fd;
 
 1487     int lower_transport_mask = 0;
 
 1488     char real_challenge[64] = 
"";
 
 1490     socklen_t peer_len = 
sizeof(peer);
 
 1517                  host, 
sizeof(host), &port, path, 
sizeof(path), s->
filename);
 
 1524     if (!lower_transport_mask)
 
 1533                                     "only UDP and TCP are supported for output.\n");
 
 1543                 host, port, 
"%s", path);
 
 1547         char httpname[1024];
 
 1548         char sessioncookie[17];
 
 1551         ff_url_join(httpname, 
sizeof(httpname), 
"http", auth, host, port, 
"%s", path);
 
 1552         snprintf(sessioncookie, 
sizeof(sessioncookie), 
"%08x%08x",
 
 1564                  "x-sessioncookie: %s\r\n" 
 1565                  "Accept: application/x-rtsp-tunnelled\r\n" 
 1566                  "Pragma: no-cache\r\n" 
 1567                  "Cache-Control: no-cache\r\n",
 
 1586                  "x-sessioncookie: %s\r\n" 
 1587                  "Content-Type: application/x-rtsp-tunnelled\r\n" 
 1588                  "Pragma: no-cache\r\n" 
 1589                  "Cache-Control: no-cache\r\n" 
 1590                  "Content-Length: 32767\r\n" 
 1591                  "Expires: Sun, 9 Jan 1972 00:00:00 GMT\r\n",
 
 1632     if (!getpeername(tcp_fd, (
struct sockaddr*) &peer, &peer_len)) {
 
 1633         getnameinfo((
struct sockaddr*) &peer, peer_len, host, 
sizeof(host),
 
 1652                        "ClientChallenge: 9e26d33f2984236010ef6253fb1887f7\r\n" 
 1653                        "PlayerStarttime: [28/03/2003:22:50:23 00:00]\r\n" 
 1654                        "CompanyID: KnKV4M4I/B2FjJ1TToLycw==\r\n" 
 1655                        "GUID: 00000000-0000-0000-0000-000000000000\r\n",
 
 1674     if (s->
iformat && CONFIG_RTSP_DEMUXER)
 
 1676     else if (CONFIG_RTSP_MUXER)
 
 1682         int lower_transport = 
ff_log2_tab[lower_transport_mask &
 
 1683                                   ~(lower_transport_mask - 1)];
 
 1687                                      real_challenge : 
NULL);
 
 1690         lower_transport_mask &= ~(1 << lower_transport);
 
 1691         if (lower_transport_mask == 0 && err == 1) {
 
 1692             err = 
AVERROR(EPROTONOSUPPORT);
 
 1719                            uint8_t *buf, 
int buf_size, int64_t wait_end)
 
 1723     int n, i, ret, tcp_fd, timeout_cnt = 0;
 
 1725     struct pollfd *p = rt->
p;
 
 1726     int *fds = 
NULL, fdsnum, fdsidx;
 
 1736             p[max_p].fd = tcp_fd;
 
 1737             p[max_p++].events = POLLIN;
 
 1751                            "Number of fds %d not supported\n", fdsnum);
 
 1754                 for (fdsidx = 0; fdsidx < fdsnum; fdsidx++) {
 
 1755                     p[max_p].fd       = fds[fdsidx];
 
 1756                     p[max_p++].events = POLLIN;
 
 1763             int j = 1 - (tcp_fd == -1);
 
 1768                     if (p[j].revents & POLLIN || p[j+1].revents & POLLIN) {
 
 1771                             *prtsp_st = rtsp_st;
 
 1778 #if CONFIG_RTSP_DEMUXER 
 1779             if (tcp_fd != -1 && p[0].revents & POLLIN) {
 
 1786                                    "Unable to answer to TEARDOWN\n");
 
 1802         } 
else if (n < 0 && errno != EINTR)
 
 1834                        "Unable to pick stream for packet - SSRC not known for " 
 1856     int64_t wait_end = 0;
 
 1867         } 
else if (rt->
ts && CONFIG_RTPDEC) {
 
 1878         } 
else if (ret == 1) {
 
 1887         int64_t first_queue_time = 0;
 
 1894             if (queue_time && (queue_time - first_queue_time < 0 ||
 
 1895                                !first_queue_time)) {
 
 1896                 first_queue_time = queue_time;
 
 1900         if (first_queue_time) {
 
 1901             wait_end = first_queue_time + s->
max_delay;
 
 1904             first_queue_st = 
NULL;
 
 1917 #if CONFIG_RTSP_DEMUXER 
 1934         len = pick_stream(s, &rtsp_st, rt->
recvbuf, len);
 
 1939     if (len == 
AVERROR(EAGAIN) && first_queue_st &&
 
 1941         rtsp_st = first_queue_st;
 
 1977                     if (rtpctx2 && st && st2 &&
 
 1996     } 
else if (rt->
ts && CONFIG_RTPDEC) {
 
 2022 #if CONFIG_SDP_DEMUXER 
 2028     while (p < p_end && *p != 
'\0') {
 
 2029         if (p + 
sizeof(
"c=IN IP") - 1 < p_end &&
 
 2033         while (p < p_end - 1 && *p != 
'\n') p++;
 
 2066     content[
size] =
'\0';
 
 2082                         "?localport=%d&ttl=%d&connect=%d", rtsp_st->
sdp_port,
 
 2108 static const AVClass sdp_demuxer_class = {
 
 2123     .priv_class     = &sdp_demuxer_class,
 
 2127 #if CONFIG_RTP_DEMUXER 
 2138     char host[500], sdp[500];
 
 2145     socklen_t addrlen = 
sizeof(addr);
 
 2157         ret = 
ffurl_read(in, recvbuf, 
sizeof(recvbuf));
 
 2167         if ((recvbuf[0] & 0xc0) != 0x80) {
 
 2176         payload_type = recvbuf[1] & 0x7f;
 
 2185                                 "without an SDP file describing it\n",
 
 2191                                   "properly you need an SDP file " 
 2199              "v=0\r\nc=IN IP%d %s\r\nm=%s %d RTP/AVP %d\r\n",
 
 2200              addr.ss_family == AF_INET ? 4 : 6, host,
 
 2203              port, payload_type);
 
 2214     ret = sdp_read_header(s);
 
 2225 static const AVClass rtp_demuxer_class = {
 
 2241     .priv_class     = &rtp_demuxer_class,