Commit | Line | Data |
---|---|---|
2ba45a60 DM |
1 | /* |
2 | * MMS protocol over TCP | |
3 | * Copyright (c) 2006,2007 Ryan Martell | |
4 | * Copyright (c) 2007 Björn Axelsson | |
5 | * Copyright (c) 2010 Zhentan Feng <spyfeng at gmail dot com> | |
6 | * | |
7 | * This file is part of FFmpeg. | |
8 | * | |
9 | * FFmpeg is free software; you can redistribute it and/or | |
10 | * modify it under the terms of the GNU Lesser General Public | |
11 | * License as published by the Free Software Foundation; either | |
12 | * version 2.1 of the License, or (at your option) any later version. | |
13 | * | |
14 | * FFmpeg is distributed in the hope that it will be useful, | |
15 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
16 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
17 | * Lesser General Public License for more details. | |
18 | * | |
19 | * You should have received a copy of the GNU Lesser General Public | |
20 | * License along with FFmpeg; if not, write to the Free Software | |
21 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA | |
22 | */ | |
23 | ||
24 | /* References | |
25 | * MMS protocol specification: | |
26 | * [1]http://msdn.microsoft.com/en-us/library/cc234711(PROT.10).aspx | |
27 | * ASF specification. Revision 01.20.03. | |
28 | * [2]http://msdn.microsoft.com/en-us/library/bb643323.aspx | |
29 | */ | |
30 | ||
31 | #include "avformat.h" | |
32 | #include "mms.h" | |
33 | #include "internal.h" | |
34 | #include "avio_internal.h" | |
35 | #include "libavutil/intreadwrite.h" | |
36 | #include "libavcodec/bytestream.h" | |
37 | #include "network.h" | |
38 | #include "url.h" | |
39 | ||
40 | #define LOCAL_ADDRESS 0xc0a80081 // FIXME get and use correct local ip address. | |
41 | #define LOCAL_PORT 1037 // as above. | |
42 | /** Client to server packet types. */ | |
43 | typedef enum { | |
44 | CS_PKT_INITIAL = 0x01, | |
45 | CS_PKT_PROTOCOL_SELECT = 0x02, | |
46 | CS_PKT_MEDIA_FILE_REQUEST = 0x05, | |
47 | CS_PKT_START_FROM_PKT_ID = 0x07, | |
48 | CS_PKT_STREAM_PAUSE = 0x09, | |
49 | CS_PKT_STREAM_CLOSE = 0x0d, | |
50 | CS_PKT_MEDIA_HEADER_REQUEST = 0x15, | |
51 | CS_PKT_TIMING_DATA_REQUEST = 0x18, | |
52 | CS_PKT_USER_PASSWORD = 0x1a, | |
53 | CS_PKT_KEEPALIVE = 0x1b, | |
54 | CS_PKT_STREAM_ID_REQUEST = 0x33, | |
55 | } MMSCSPacketType; | |
56 | ||
57 | /** Server to client packet types. */ | |
58 | typedef enum { | |
59 | /** Control packets. */ | |
60 | /*@{*/ | |
61 | SC_PKT_CLIENT_ACCEPTED = 0x01, | |
62 | SC_PKT_PROTOCOL_ACCEPTED = 0x02, | |
63 | SC_PKT_PROTOCOL_FAILED = 0x03, | |
64 | SC_PKT_MEDIA_PKT_FOLLOWS = 0x05, | |
65 | SC_PKT_MEDIA_FILE_DETAILS = 0x06, | |
66 | SC_PKT_HEADER_REQUEST_ACCEPTED = 0x11, | |
67 | SC_PKT_TIMING_TEST_REPLY = 0x15, | |
68 | SC_PKT_PASSWORD_REQUIRED = 0x1a, | |
69 | SC_PKT_KEEPALIVE = 0x1b, | |
70 | SC_PKT_STREAM_STOPPED = 0x1e, | |
71 | SC_PKT_STREAM_CHANGING = 0x20, | |
72 | SC_PKT_STREAM_ID_ACCEPTED = 0x21, | |
73 | /*@}*/ | |
74 | ||
75 | /** Pseudo packets. */ | |
76 | /*@{*/ | |
77 | SC_PKT_CANCEL = -1, | |
78 | SC_PKT_NO_DATA = -2, | |
79 | /*@}*/ | |
80 | ||
81 | /** Data packets. */ | |
82 | /*@{*/ | |
83 | SC_PKT_ASF_HEADER = 0x010000,// make it bigger than 0xFF in case of | |
84 | SC_PKT_ASF_MEDIA = 0x010001,// receiving false data packets. | |
85 | /*@}*/ | |
86 | } MMSSCPacketType; | |
87 | ||
88 | typedef struct { | |
89 | MMSContext mms; | |
90 | int outgoing_packet_seq; ///< Outgoing packet sequence number. | |
91 | char path[256]; ///< Path of the resource being asked for. | |
92 | char host[128]; ///< Host of the resources. | |
93 | int incoming_packet_seq; ///< Incoming packet sequence number. | |
94 | int incoming_flags; ///< Incoming packet flags. | |
95 | int packet_id; ///< Identifier for packets in the current stream. | |
96 | unsigned int header_packet_id; ///< default is 2. | |
97 | } MMSTContext; | |
98 | ||
99 | /** Create MMST command packet header */ | |
100 | static void start_command_packet(MMSTContext *mmst, MMSCSPacketType packet_type) | |
101 | { | |
102 | MMSContext *mms = &mmst->mms; | |
103 | mms->write_out_ptr = mms->out_buffer; | |
104 | ||
105 | bytestream_put_le32(&mms->write_out_ptr, 1); // start sequence | |
106 | bytestream_put_le32(&mms->write_out_ptr, 0xb00bface); | |
107 | bytestream_put_le32(&mms->write_out_ptr, 0); // Length starts from after the protocol type bytes | |
108 | bytestream_put_le32(&mms->write_out_ptr, MKTAG('M','M','S',' ')); | |
109 | bytestream_put_le32(&mms->write_out_ptr, 0); | |
110 | bytestream_put_le32(&mms->write_out_ptr, mmst->outgoing_packet_seq++); | |
111 | bytestream_put_le64(&mms->write_out_ptr, 0); // timestamp | |
112 | bytestream_put_le32(&mms->write_out_ptr, 0); | |
113 | bytestream_put_le16(&mms->write_out_ptr, packet_type); | |
114 | bytestream_put_le16(&mms->write_out_ptr, 3); // direction to server | |
115 | } | |
116 | ||
117 | /** Add prefixes to MMST command packet. */ | |
118 | static void insert_command_prefixes(MMSContext *mms, | |
119 | uint32_t prefix1, uint32_t prefix2) | |
120 | { | |
121 | bytestream_put_le32(&mms->write_out_ptr, prefix1); // first prefix | |
122 | bytestream_put_le32(&mms->write_out_ptr, prefix2); // second prefix | |
123 | } | |
124 | ||
125 | /** Send a prepared MMST command packet. */ | |
126 | static int send_command_packet(MMSTContext *mmst) | |
127 | { | |
128 | MMSContext *mms = &mmst->mms; | |
129 | int len= mms->write_out_ptr - mms->out_buffer; | |
130 | int exact_length = FFALIGN(len, 8); | |
131 | int first_length= exact_length - 16; | |
132 | int len8= first_length/8; | |
133 | int write_result; | |
134 | ||
135 | // update packet length fields. | |
136 | AV_WL32(mms->out_buffer + 8, first_length); | |
137 | AV_WL32(mms->out_buffer + 16, len8); | |
138 | AV_WL32(mms->out_buffer + 32, len8-2); | |
139 | memset(mms->write_out_ptr, 0, exact_length - len); | |
140 | ||
141 | // write it out. | |
142 | write_result= ffurl_write(mms->mms_hd, mms->out_buffer, exact_length); | |
143 | if(write_result != exact_length) { | |
144 | av_log(NULL, AV_LOG_ERROR, | |
145 | "Failed to write data of length %d: %d (%s)\n", | |
146 | exact_length, write_result, | |
147 | write_result < 0 ? strerror(AVUNERROR(write_result)) : | |
148 | "The server closed the connection"); | |
149 | return AVERROR(EIO); | |
150 | } | |
151 | ||
152 | return 0; | |
153 | } | |
154 | ||
155 | static int mms_put_utf16(MMSContext *mms, const uint8_t *src) | |
156 | { | |
157 | AVIOContext bic; | |
158 | int size = mms->write_out_ptr - mms->out_buffer; | |
159 | int len; | |
160 | ffio_init_context(&bic, mms->write_out_ptr, | |
161 | sizeof(mms->out_buffer) - size, 1, NULL, NULL, NULL, NULL); | |
162 | ||
163 | len = avio_put_str16le(&bic, src); | |
164 | if (len < 0) | |
165 | return len; | |
166 | mms->write_out_ptr += len; | |
167 | return 0; | |
168 | } | |
169 | ||
170 | static int send_time_test_data(MMSTContext *mmst) | |
171 | { | |
172 | start_command_packet(mmst, CS_PKT_TIMING_DATA_REQUEST); | |
173 | insert_command_prefixes(&mmst->mms, 0x00f0f0f0, 0x0004000b); | |
174 | return send_command_packet(mmst); | |
175 | } | |
176 | ||
177 | static int send_protocol_select(MMSTContext *mmst) | |
178 | { | |
179 | int ret; | |
180 | char data_string[256]; | |
181 | MMSContext *mms = &mmst->mms; | |
182 | ||
183 | start_command_packet(mmst, CS_PKT_PROTOCOL_SELECT); | |
184 | insert_command_prefixes(mms, 0, 0xffffffff); | |
185 | bytestream_put_le32(&mms->write_out_ptr, 0); // maxFunnelBytes | |
186 | bytestream_put_le32(&mms->write_out_ptr, 0x00989680); // maxbitRate | |
187 | bytestream_put_le32(&mms->write_out_ptr, 2); // funnelMode | |
188 | snprintf(data_string, sizeof(data_string), "\\\\%d.%d.%d.%d\\%s\\%d", | |
189 | (LOCAL_ADDRESS>>24)&0xff, | |
190 | (LOCAL_ADDRESS>>16)&0xff, | |
191 | (LOCAL_ADDRESS>>8)&0xff, | |
192 | LOCAL_ADDRESS&0xff, | |
193 | "TCP", // or UDP | |
194 | LOCAL_PORT); | |
195 | ||
196 | if ((ret = mms_put_utf16(mms, data_string)) < 0) | |
197 | return ret; | |
198 | return send_command_packet(mmst); | |
199 | } | |
200 | ||
201 | static int send_media_file_request(MMSTContext *mmst) | |
202 | { | |
203 | int ret; | |
204 | MMSContext *mms = &mmst->mms; | |
205 | start_command_packet(mmst, CS_PKT_MEDIA_FILE_REQUEST); | |
206 | insert_command_prefixes(mms, 1, 0xffffffff); | |
207 | bytestream_put_le32(&mms->write_out_ptr, 0); | |
208 | bytestream_put_le32(&mms->write_out_ptr, 0); | |
209 | if ((ret = mms_put_utf16(mms, mmst->path + 1)) < 0) // +1 for skip "/" | |
210 | return ret; | |
211 | ||
212 | return send_command_packet(mmst); | |
213 | } | |
214 | ||
215 | static void handle_packet_stream_changing_type(MMSTContext *mmst) | |
216 | { | |
217 | MMSContext *mms = &mmst->mms; | |
218 | av_dlog(NULL, "Stream changing!\n"); | |
219 | ||
220 | // 40 is the packet header size, 7 is the prefix size. | |
221 | mmst->header_packet_id= AV_RL32(mms->in_buffer + 40 + 7); | |
222 | av_dlog(NULL, "Changed header prefix to 0x%x", mmst->header_packet_id); | |
223 | } | |
224 | ||
225 | static int send_keepalive_packet(MMSTContext *mmst) | |
226 | { | |
227 | // respond to a keepalive with a keepalive... | |
228 | start_command_packet(mmst, CS_PKT_KEEPALIVE); | |
229 | insert_command_prefixes(&mmst->mms, 1, 0x100FFFF); | |
230 | return send_command_packet(mmst); | |
231 | } | |
232 | ||
233 | /** Pad media packets smaller than max_packet_size and/or adjust read position | |
234 | * after a seek. */ | |
235 | static void pad_media_packet(MMSContext *mms) | |
236 | { | |
237 | if(mms->remaining_in_len<mms->asf_packet_len) { | |
238 | int padding_size = mms->asf_packet_len - mms->remaining_in_len; | |
239 | memset(mms->in_buffer + mms->remaining_in_len, 0, padding_size); | |
240 | mms->remaining_in_len += padding_size; | |
241 | } | |
242 | } | |
243 | ||
244 | /** Read incoming MMST media, header or command packet. */ | |
245 | static MMSSCPacketType get_tcp_server_response(MMSTContext *mmst) | |
246 | { | |
247 | int read_result; | |
248 | MMSSCPacketType packet_type= -1; | |
249 | MMSContext *mms = &mmst->mms; | |
250 | for(;;) { | |
251 | read_result = ffurl_read_complete(mms->mms_hd, mms->in_buffer, 8); | |
252 | if (read_result != 8) { | |
253 | if(read_result < 0) { | |
254 | av_log(NULL, AV_LOG_ERROR, | |
255 | "Error reading packet header: %d (%s)\n", | |
256 | read_result, strerror(AVUNERROR(read_result))); | |
257 | packet_type = SC_PKT_CANCEL; | |
258 | } else { | |
259 | av_log(NULL, AV_LOG_ERROR, | |
260 | "The server closed the connection\n"); | |
261 | packet_type = SC_PKT_NO_DATA; | |
262 | } | |
263 | return packet_type; | |
264 | } | |
265 | ||
266 | // handle command packet. | |
267 | if(AV_RL32(mms->in_buffer + 4)==0xb00bface) { | |
268 | int length_remaining, hr; | |
269 | ||
270 | mmst->incoming_flags= mms->in_buffer[3]; | |
271 | read_result= ffurl_read_complete(mms->mms_hd, mms->in_buffer+8, 4); | |
272 | if(read_result != 4) { | |
273 | av_log(NULL, AV_LOG_ERROR, | |
274 | "Reading command packet length failed: %d (%s)\n", | |
275 | read_result, | |
276 | read_result < 0 ? strerror(AVUNERROR(read_result)) : | |
277 | "The server closed the connection"); | |
278 | return read_result < 0 ? read_result : AVERROR(EIO); | |
279 | } | |
280 | ||
281 | length_remaining= AV_RL32(mms->in_buffer+8) + 4; | |
282 | av_dlog(NULL, "Length remaining is %d\n", length_remaining); | |
283 | // read the rest of the packet. | |
284 | if (length_remaining < 0 | |
285 | || length_remaining > sizeof(mms->in_buffer) - 12) { | |
286 | av_log(NULL, AV_LOG_ERROR, | |
287 | "Incoming packet length %d exceeds bufsize %"SIZE_SPECIFIER"\n", | |
288 | length_remaining, sizeof(mms->in_buffer) - 12); | |
289 | return AVERROR_INVALIDDATA; | |
290 | } | |
291 | read_result = ffurl_read_complete(mms->mms_hd, mms->in_buffer + 12, | |
292 | length_remaining) ; | |
293 | if (read_result != length_remaining) { | |
294 | av_log(NULL, AV_LOG_ERROR, | |
295 | "Reading pkt data (length=%d) failed: %d (%s)\n", | |
296 | length_remaining, read_result, | |
297 | read_result < 0 ? strerror(AVUNERROR(read_result)) : | |
298 | "The server closed the connection"); | |
299 | return read_result < 0 ? read_result : AVERROR(EIO); | |
300 | } | |
301 | packet_type= AV_RL16(mms->in_buffer+36); | |
302 | if (read_result >= 44 && (hr = AV_RL32(mms->in_buffer + 40))) { | |
303 | av_log(NULL, AV_LOG_ERROR, | |
304 | "Server sent a message with packet type 0x%x and error status code 0x%08x\n", packet_type, hr); | |
305 | return AVERROR(EINVAL); | |
306 | } | |
307 | } else { | |
308 | int length_remaining; | |
309 | int packet_id_type; | |
310 | int tmp; | |
311 | ||
312 | // note we cache the first 8 bytes, | |
313 | // then fill up the buffer with the others | |
314 | tmp = AV_RL16(mms->in_buffer + 6); | |
315 | length_remaining = (tmp - 8) & 0xffff; | |
316 | mmst->incoming_packet_seq = AV_RL32(mms->in_buffer); | |
317 | packet_id_type = mms->in_buffer[4]; | |
318 | mmst->incoming_flags = mms->in_buffer[5]; | |
319 | ||
320 | if (length_remaining < 0 | |
321 | || length_remaining > sizeof(mms->in_buffer) - 8) { | |
322 | av_log(NULL, AV_LOG_ERROR, | |
323 | "Data length %d is invalid or too large (max=%"SIZE_SPECIFIER")\n", | |
324 | length_remaining, sizeof(mms->in_buffer)); | |
325 | return AVERROR_INVALIDDATA; | |
326 | } | |
327 | mms->remaining_in_len = length_remaining; | |
328 | mms->read_in_ptr = mms->in_buffer; | |
329 | read_result= ffurl_read_complete(mms->mms_hd, mms->in_buffer, length_remaining); | |
330 | if(read_result != length_remaining) { | |
331 | av_log(NULL, AV_LOG_ERROR, | |
332 | "Failed to read packet data of size %d: %d (%s)\n", | |
333 | length_remaining, read_result, | |
334 | read_result < 0 ? strerror(AVUNERROR(read_result)) : | |
335 | "The server closed the connection"); | |
336 | return read_result < 0 ? read_result : AVERROR(EIO); | |
337 | } | |
338 | ||
339 | // if we successfully read everything. | |
340 | if(packet_id_type == mmst->header_packet_id) { | |
341 | int err; | |
342 | packet_type = SC_PKT_ASF_HEADER; | |
343 | // Store the asf header | |
344 | if(!mms->header_parsed) { | |
345 | if ((err = av_reallocp(&mms->asf_header, | |
346 | mms->asf_header_size + | |
347 | mms->remaining_in_len)) < 0) { | |
348 | mms->asf_header_size = 0; | |
349 | return err; | |
350 | } | |
351 | memcpy(mms->asf_header + mms->asf_header_size, | |
352 | mms->read_in_ptr, mms->remaining_in_len); | |
353 | mms->asf_header_size += mms->remaining_in_len; | |
354 | } | |
355 | // 0x04 means asf header is sent in multiple packets. | |
356 | if (mmst->incoming_flags == 0x04) | |
357 | continue; | |
358 | } else if(packet_id_type == mmst->packet_id) { | |
359 | packet_type = SC_PKT_ASF_MEDIA; | |
360 | } else { | |
361 | av_dlog(NULL, "packet id type %d is old.", packet_id_type); | |
362 | continue; | |
363 | } | |
364 | } | |
365 | ||
366 | // preprocess some packet type | |
367 | if(packet_type == SC_PKT_KEEPALIVE) { | |
368 | send_keepalive_packet(mmst); | |
369 | continue; | |
370 | } else if(packet_type == SC_PKT_STREAM_CHANGING) { | |
371 | handle_packet_stream_changing_type(mmst); | |
372 | } else if(packet_type == SC_PKT_ASF_MEDIA) { | |
373 | pad_media_packet(mms); | |
374 | } | |
375 | return packet_type; | |
376 | } | |
377 | } | |
378 | ||
379 | static int mms_safe_send_recv(MMSTContext *mmst, | |
380 | int (*send_fun)(MMSTContext *mmst), | |
381 | const MMSSCPacketType expect_type) | |
382 | { | |
383 | MMSSCPacketType type; | |
384 | if(send_fun) { | |
385 | int ret = send_fun(mmst); | |
386 | if (ret < 0) { | |
387 | av_dlog(NULL, "Send Packet error before expecting recv packet %d\n", expect_type); | |
388 | return ret; | |
389 | } | |
390 | } | |
391 | ||
392 | if ((type = get_tcp_server_response(mmst)) != expect_type) { | |
393 | av_log(NULL, AV_LOG_ERROR, | |
394 | "Corrupt stream (unexpected packet type 0x%x, expected 0x%x)\n", | |
395 | type, expect_type); | |
396 | return AVERROR_INVALIDDATA; | |
397 | } else { | |
398 | return 0; | |
399 | } | |
400 | } | |
401 | ||
402 | static int send_media_header_request(MMSTContext *mmst) | |
403 | { | |
404 | MMSContext *mms = &mmst->mms; | |
405 | start_command_packet(mmst, CS_PKT_MEDIA_HEADER_REQUEST); | |
406 | insert_command_prefixes(mms, 1, 0); | |
407 | bytestream_put_le32(&mms->write_out_ptr, 0); | |
408 | bytestream_put_le32(&mms->write_out_ptr, 0x00800000); | |
409 | bytestream_put_le32(&mms->write_out_ptr, 0xffffffff); | |
410 | bytestream_put_le32(&mms->write_out_ptr, 0); | |
411 | bytestream_put_le32(&mms->write_out_ptr, 0); | |
412 | bytestream_put_le32(&mms->write_out_ptr, 0); | |
413 | ||
414 | // the media preroll value in milliseconds? | |
415 | bytestream_put_le32(&mms->write_out_ptr, 0); | |
416 | bytestream_put_le32(&mms->write_out_ptr, 0x40AC2000); | |
417 | bytestream_put_le32(&mms->write_out_ptr, 2); | |
418 | bytestream_put_le32(&mms->write_out_ptr, 0); | |
419 | ||
420 | return send_command_packet(mmst); | |
421 | } | |
422 | ||
423 | /** Send the initial handshake. */ | |
424 | static int send_startup_packet(MMSTContext *mmst) | |
425 | { | |
426 | char data_string[256]; | |
427 | int ret; | |
428 | MMSContext *mms = &mmst->mms; | |
429 | // SubscriberName is defined in MS specification linked below. | |
430 | // The guid value can be any valid value. | |
431 | // http://download.microsoft.com/ | |
432 | // download/9/5/E/95EF66AF-9026-4BB0-A41D-A4F81802D92C/%5BMS-WMSP%5D.pdf | |
433 | snprintf(data_string, sizeof(data_string), | |
434 | "NSPlayer/7.0.0.1956; {%s}; Host: %s", | |
435 | "7E667F5D-A661-495E-A512-F55686DDA178", mmst->host); | |
436 | ||
437 | start_command_packet(mmst, CS_PKT_INITIAL); | |
438 | insert_command_prefixes(mms, 0, 0x0004000b); | |
439 | bytestream_put_le32(&mms->write_out_ptr, 0x0003001c); | |
440 | if ((ret = mms_put_utf16(mms, data_string)) < 0) | |
441 | return ret; | |
442 | return send_command_packet(mmst); | |
443 | } | |
444 | ||
445 | /** Send MMST stream selection command based on the AVStream->discard values. */ | |
446 | static int send_stream_selection_request(MMSTContext *mmst) | |
447 | { | |
448 | int i; | |
449 | MMSContext *mms = &mmst->mms; | |
450 | // send the streams we want back... | |
451 | start_command_packet(mmst, CS_PKT_STREAM_ID_REQUEST); | |
452 | bytestream_put_le32(&mms->write_out_ptr, mms->stream_num); // stream nums | |
453 | for(i= 0; i<mms->stream_num; i++) { | |
454 | bytestream_put_le16(&mms->write_out_ptr, 0xffff); // flags | |
455 | bytestream_put_le16(&mms->write_out_ptr, mms->streams[i].id); // stream id | |
456 | bytestream_put_le16(&mms->write_out_ptr, 0); // selection | |
457 | } | |
458 | return send_command_packet(mmst); | |
459 | } | |
460 | ||
461 | static int send_close_packet(MMSTContext *mmst) | |
462 | { | |
463 | start_command_packet(mmst, CS_PKT_STREAM_CLOSE); | |
464 | insert_command_prefixes(&mmst->mms, 1, 1); | |
465 | ||
466 | return send_command_packet(mmst); | |
467 | } | |
468 | ||
469 | /** Close the MMSH/MMST connection */ | |
470 | static int mms_close(URLContext *h) | |
471 | { | |
472 | MMSTContext *mmst = (MMSTContext *)h->priv_data; | |
473 | MMSContext *mms = &mmst->mms; | |
474 | if(mms->mms_hd) { | |
475 | send_close_packet(mmst); | |
476 | ffurl_close(mms->mms_hd); | |
477 | } | |
478 | ||
479 | /* free all separately allocated pointers in mms */ | |
480 | av_free(mms->streams); | |
481 | av_free(mms->asf_header); | |
482 | ||
483 | return 0; | |
484 | } | |
485 | ||
486 | static int send_media_packet_request(MMSTContext *mmst) | |
487 | { | |
488 | MMSContext *mms = &mmst->mms; | |
489 | start_command_packet(mmst, CS_PKT_START_FROM_PKT_ID); | |
490 | insert_command_prefixes(mms, 1, 0x0001FFFF); | |
491 | bytestream_put_le64(&mms->write_out_ptr, 0); // seek timestamp | |
492 | bytestream_put_le32(&mms->write_out_ptr, 0xffffffff); // unknown | |
493 | bytestream_put_le32(&mms->write_out_ptr, 0xffffffff); // packet offset | |
494 | bytestream_put_byte(&mms->write_out_ptr, 0xff); // max stream time limit | |
495 | bytestream_put_byte(&mms->write_out_ptr, 0xff); // max stream time limit | |
496 | bytestream_put_byte(&mms->write_out_ptr, 0xff); // max stream time limit | |
497 | bytestream_put_byte(&mms->write_out_ptr, 0x00); // stream time limit flag | |
498 | ||
499 | mmst->packet_id++; // new packet_id | |
500 | bytestream_put_le32(&mms->write_out_ptr, mmst->packet_id); | |
501 | return send_command_packet(mmst); | |
502 | } | |
503 | ||
504 | ||
505 | static void clear_stream_buffers(MMSContext *mms) | |
506 | { | |
507 | mms->remaining_in_len = 0; | |
508 | mms->read_in_ptr = mms->in_buffer; | |
509 | } | |
510 | ||
511 | static int mms_open(URLContext *h, const char *uri, int flags) | |
512 | { | |
513 | MMSTContext *mmst = h->priv_data; | |
514 | MMSContext *mms; | |
515 | int port, err; | |
516 | char tcpname[256]; | |
517 | ||
518 | h->is_streamed = 1; | |
519 | mms = &mmst->mms; | |
520 | ||
521 | // only for MMS over TCP, so set proto = NULL | |
522 | av_url_split(NULL, 0, NULL, 0, | |
523 | mmst->host, sizeof(mmst->host), &port, mmst->path, | |
524 | sizeof(mmst->path), uri); | |
525 | ||
526 | if(port<0) | |
527 | port = 1755; // defaut mms protocol port | |
528 | ||
529 | // establish tcp connection. | |
530 | ff_url_join(tcpname, sizeof(tcpname), "tcp", NULL, mmst->host, port, NULL); | |
531 | err = ffurl_open(&mms->mms_hd, tcpname, AVIO_FLAG_READ_WRITE, | |
532 | &h->interrupt_callback, NULL); | |
533 | if (err) | |
534 | goto fail; | |
535 | ||
536 | mmst->packet_id = 3; // default, initial value. | |
537 | mmst->header_packet_id = 2; // default, initial value. | |
538 | err = mms_safe_send_recv(mmst, send_startup_packet, SC_PKT_CLIENT_ACCEPTED); | |
539 | if (err) | |
540 | goto fail; | |
541 | err = mms_safe_send_recv(mmst, send_time_test_data, SC_PKT_TIMING_TEST_REPLY); | |
542 | if (err) | |
543 | goto fail; | |
544 | err = mms_safe_send_recv(mmst, send_protocol_select, SC_PKT_PROTOCOL_ACCEPTED); | |
545 | if (err) | |
546 | goto fail; | |
547 | err = mms_safe_send_recv(mmst, send_media_file_request, SC_PKT_MEDIA_FILE_DETAILS); | |
548 | if (err) | |
549 | goto fail; | |
550 | err = mms_safe_send_recv(mmst, send_media_header_request, SC_PKT_HEADER_REQUEST_ACCEPTED); | |
551 | if (err) | |
552 | goto fail; | |
553 | err = mms_safe_send_recv(mmst, NULL, SC_PKT_ASF_HEADER); | |
554 | if (err) | |
555 | goto fail; | |
556 | if((mmst->incoming_flags != 0X08) && (mmst->incoming_flags != 0X0C)) { | |
557 | av_log(NULL, AV_LOG_ERROR, | |
558 | "The server does not support MMST (try MMSH or RTSP)\n"); | |
559 | err = AVERROR(EINVAL); | |
560 | goto fail; | |
561 | } | |
562 | err = ff_mms_asf_header_parser(mms); | |
563 | if (err) { | |
564 | av_dlog(NULL, "asf header parsed failed!\n"); | |
565 | goto fail; | |
566 | } | |
567 | mms->header_parsed = 1; | |
568 | ||
569 | if (!mms->asf_packet_len || !mms->stream_num) | |
570 | goto fail; | |
571 | ||
572 | clear_stream_buffers(mms); | |
573 | err = mms_safe_send_recv(mmst, send_stream_selection_request, SC_PKT_STREAM_ID_ACCEPTED); | |
574 | if (err) | |
575 | goto fail; | |
576 | // send media packet request | |
577 | err = mms_safe_send_recv(mmst, send_media_packet_request, SC_PKT_MEDIA_PKT_FOLLOWS); | |
578 | if (err) { | |
579 | goto fail; | |
580 | } | |
581 | av_dlog(NULL, "Leaving open (success)\n"); | |
582 | return 0; | |
583 | fail: | |
584 | mms_close(h); | |
585 | av_dlog(NULL, "Leaving open (failure: %d)\n", err); | |
586 | return err; | |
587 | } | |
588 | ||
589 | /** Read ASF data through the protocol. */ | |
590 | static int mms_read(URLContext *h, uint8_t *buf, int size) | |
591 | { | |
592 | /* TODO: see tcp.c:tcp_read() about a possible timeout scheme */ | |
593 | MMSTContext *mmst = h->priv_data; | |
594 | MMSContext *mms = &mmst->mms; | |
595 | int result = 0; | |
596 | ||
597 | do { | |
598 | if(mms->asf_header_read_size < mms->asf_header_size) { | |
599 | /* Read from ASF header buffer */ | |
600 | result = ff_mms_read_header(mms, buf, size); | |
601 | } else if(mms->remaining_in_len) { | |
602 | /* Read remaining packet data to buffer. | |
603 | * the result can not be zero because remaining_in_len is positive.*/ | |
604 | result = ff_mms_read_data(mms, buf, size); | |
605 | } else { | |
606 | /* Read from network */ | |
607 | int err = mms_safe_send_recv(mmst, NULL, SC_PKT_ASF_MEDIA); | |
608 | if (err == 0) { | |
609 | if(mms->remaining_in_len>mms->asf_packet_len) { | |
610 | av_log(NULL, AV_LOG_ERROR, | |
611 | "Incoming pktlen %d is larger than ASF pktsize %d\n", | |
612 | mms->remaining_in_len, mms->asf_packet_len); | |
613 | result= AVERROR(EIO); | |
614 | } else { | |
615 | // copy the data to the packet buffer. | |
616 | result = ff_mms_read_data(mms, buf, size); | |
617 | if (result == 0) { | |
618 | av_dlog(NULL, "Read ASF media packet size is zero!\n"); | |
619 | break; | |
620 | } | |
621 | } | |
622 | } else { | |
623 | av_dlog(NULL, "read packet error!\n"); | |
624 | break; | |
625 | } | |
626 | } | |
627 | } while(!result); // only return one packet. | |
628 | return result; | |
629 | } | |
630 | ||
631 | URLProtocol ff_mmst_protocol = { | |
632 | .name = "mmst", | |
633 | .url_open = mms_open, | |
634 | .url_read = mms_read, | |
635 | .url_close = mms_close, | |
636 | .priv_data_size = sizeof(MMSTContext), | |
637 | .flags = URL_PROTOCOL_FLAG_NETWORK, | |
638 | }; |