2013-03-17 07:45:21 +08:00
//
// ZoneMinder RTSP Class Implementation, $Date$, $Revision$
// Copyright (C) 2001-2008 Philip Coombes
//
// This program is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License
// as published by the Free Software Foundation; either version 2
// of the License, or (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program; if not, write to the Free Software
2016-12-26 23:23:16 +08:00
// Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
2013-03-17 07:45:21 +08:00
//
# include "zm_rtsp.h"
2021-02-04 11:47:28 +08:00
# include "zm_config.h"
2013-03-17 07:45:21 +08:00
# include "zm_rtp_data.h"
# include "zm_rtp_ctrl.h"
# include "zm_db.h"
2021-02-07 05:02:09 +08:00
# include <algorithm>
2013-03-17 07:45:21 +08:00
int RtspThread : : smMinDataPort = 0 ;
int RtspThread : : smMaxDataPort = 0 ;
2020-05-08 01:43:05 +08:00
RtspThread : : PortSet RtspThread : : smAssignedPorts ;
2013-03-17 07:45:21 +08:00
2020-05-08 01:43:05 +08:00
bool RtspThread : : sendCommand ( std : : string message ) {
2016-04-04 22:11:48 +08:00
if ( mNeedAuth ) {
2021-04-04 06:30:18 +08:00
StringVector parts = Split ( message , " " ) ;
2020-05-08 01:43:05 +08:00
if ( parts . size ( ) > 1 )
2016-04-04 22:11:48 +08:00
message + = mAuthenticator - > getAuthHeader ( parts [ 0 ] , parts [ 1 ] ) ;
}
2020-05-08 01:43:05 +08:00
message + = stringtf ( " User-Agent: ZoneMinder/%s \r \n " , ZM_VERSION ) ;
message + = stringtf ( " CSeq: %d \r \n \r \n " , + + mSeq ) ;
Debug ( 2 , " Sending RTSP message: %s " , message . c_str ( ) ) ;
2017-11-17 20:52:26 +08:00
if ( mMethod = = RTP_RTSP_HTTP ) {
2021-04-04 06:39:40 +08:00
message = Base64Encode ( message ) ;
2019-04-29 00:05:32 +08:00
Debug ( 2 , " Sending encoded RTSP message: %s " , message . c_str ( ) ) ;
if ( mRtspSocket2 . send ( message . c_str ( ) , message . size ( ) ) ! = ( int ) message . length ( ) ) {
Error ( " Unable to send message '%s': %s " , message . c_str ( ) , strerror ( errno ) ) ;
return false ;
2013-03-17 07:45:21 +08:00
}
2017-11-17 20:52:26 +08:00
} else {
2019-04-29 00:05:32 +08:00
if ( mRtspSocket . send ( message . c_str ( ) , message . size ( ) ) ! = ( int ) message . length ( ) ) {
Error ( " Unable to send message '%s': %s " , message . c_str ( ) , strerror ( errno ) ) ;
return false ;
2013-03-17 07:45:21 +08:00
}
2016-04-04 22:11:48 +08:00
}
2019-04-29 00:05:32 +08:00
return true ;
2013-03-17 07:45:21 +08:00
}
2020-05-08 01:43:05 +08:00
bool RtspThread : : recvResponse ( std : : string & response ) {
if ( mRtspSocket . recv ( response ) < 0 )
2019-04-29 00:05:32 +08:00
Error ( " Recv failed; %s " , strerror ( errno ) ) ;
Debug ( 2 , " Received RTSP response: %s (%zd bytes) " , response . c_str ( ) , response . size ( ) ) ;
2016-04-04 22:11:48 +08:00
float respVer = 0 ;
respCode = - 1 ;
char respText [ ZM_NETWORK_BUFSIZ ] ;
2019-04-29 00:05:32 +08:00
if ( sscanf ( response . c_str ( ) , " RTSP/%f %3d %[^ \r \n ] \r \n " , & respVer , & respCode , respText ) ! = 3 ) {
2017-11-17 20:52:26 +08:00
if ( isalnum ( response [ 0 ] ) ) {
2019-04-29 00:05:32 +08:00
Error ( " Response parse failure in '%s' " , response . c_str ( ) ) ;
2017-11-17 20:52:26 +08:00
} else {
2019-04-29 00:05:32 +08:00
Error ( " Response parse failure, %zd bytes follow " , response . size ( ) ) ;
2016-04-04 22:11:48 +08:00
if ( response . size ( ) )
2021-02-07 05:02:09 +08:00
Hexdump ( Logger : : ERROR , response . data ( ) , std : : min ( int ( response . size ( ) ) , 16 ) ) ;
2013-03-17 07:45:21 +08:00
}
2019-04-29 00:05:32 +08:00
return false ;
2016-04-04 22:11:48 +08:00
}
2019-04-29 00:05:32 +08:00
if ( respCode = = 401 ) {
2020-05-08 01:43:05 +08:00
Debug ( 2 , " Got 401 access denied response code, check WWW-Authenticate header and retry " ) ;
2016-04-04 22:11:48 +08:00
mAuthenticator - > checkAuthResponse ( response ) ;
mNeedAuth = true ;
2019-04-29 00:05:32 +08:00
return false ;
2017-11-17 20:52:26 +08:00
} else if ( respCode ! = 200 ) {
2019-04-29 00:05:32 +08:00
Error ( " Unexpected response code %d, text is '%s' " , respCode , respText ) ;
return false ;
2016-04-04 22:11:48 +08:00
}
2019-04-29 00:05:32 +08:00
return true ;
2020-05-08 01:43:05 +08:00
} // end RtspThread::recvResponse
2013-03-17 07:45:21 +08:00
2017-11-17 20:52:26 +08:00
int RtspThread : : requestPorts ( ) {
if ( ! smMinDataPort ) {
2016-04-04 22:11:48 +08:00
char sql [ ZM_SQL_SML_BUFSIZ ] ;
2019-04-29 00:05:32 +08:00
//FIXME Why not load specifically by Id? This will get ineffeicient with a lot of monitors
2020-05-08 01:43:05 +08:00
strncpy ( sql , " SELECT `Id` FROM `Monitors` WHERE `Function` != 'None' AND `Type` = 'Remote' AND `Protocol` = 'rtsp' AND `Method` = 'rtpUni' ORDER BY `Id` ASC " , sizeof ( sql ) ) ;
2013-03-17 07:45:21 +08:00
2021-03-03 07:35:07 +08:00
MYSQL_RES * result = zmDbFetch ( sql ) ;
2020-05-08 01:43:05 +08:00
int nMonitors = mysql_num_rows ( result ) ;
2016-04-04 22:11:48 +08:00
int position = 0 ;
2017-11-17 20:52:26 +08:00
if ( nMonitors ) {
2019-04-29 00:05:32 +08:00
for ( int i = 0 ; MYSQL_ROW dbrow = mysql_fetch_row ( result ) ; i + + ) {
2016-04-04 22:11:48 +08:00
int id = atoi ( dbrow [ 0 ] ) ;
2017-11-17 20:52:26 +08:00
if ( mId = = id ) {
2016-04-04 22:11:48 +08:00
position = i ;
break ;
2013-03-17 07:45:21 +08:00
}
2016-04-04 22:11:48 +08:00
}
2017-11-17 20:52:26 +08:00
} else {
2016-04-04 22:11:48 +08:00
// Minor hack for testing when not strictly enabled
nMonitors = 1 ;
position = 0 ;
}
mysql_free_result ( result ) ;
int portRange = int ( ( ( config . max_rtp_port - config . min_rtp_port ) + 1 ) / nMonitors ) ;
smMinDataPort = config . min_rtp_port + ( position * portRange ) ;
smMaxDataPort = smMinDataPort + portRange - 1 ;
2020-05-08 01:43:05 +08:00
Debug ( 2 , " Assigned RTP port range is %d-%d " , smMinDataPort , smMaxDataPort ) ;
2016-04-04 22:11:48 +08:00
}
2017-11-17 20:52:26 +08:00
for ( int i = smMinDataPort ; i < = smMaxDataPort ; i + + ) {
2019-04-29 00:05:32 +08:00
PortSet : : const_iterator iter = smAssignedPorts . find ( i ) ;
2017-11-17 20:52:26 +08:00
if ( iter = = smAssignedPorts . end ( ) ) {
2019-04-29 00:05:32 +08:00
smAssignedPorts . insert ( i ) ;
return i ;
2016-04-04 22:11:48 +08:00
}
}
2019-04-29 00:05:32 +08:00
Panic ( " Can assign RTP port, no ports left in pool " ) ;
return - 1 ;
2013-03-17 07:45:21 +08:00
}
2020-05-08 01:43:05 +08:00
void RtspThread : : releasePorts ( int port ) {
2016-04-04 22:11:48 +08:00
if ( port > 0 )
2019-04-29 00:05:32 +08:00
smAssignedPorts . erase ( port ) ;
2013-03-17 07:45:21 +08:00
}
2019-04-29 00:05:32 +08:00
RtspThread : : RtspThread (
int id ,
RtspMethod method ,
const std : : string & protocol ,
const std : : string & host ,
const std : : string & port ,
const std : : string & path ,
const std : : string & auth ,
bool rtsp_describe ) :
2020-05-08 01:43:05 +08:00
mId ( id ) ,
mMethod ( method ) ,
mProtocol ( protocol ) ,
mHost ( host ) ,
mPort ( port ) ,
mPath ( path ) ,
mRtspDescribe ( rtsp_describe ) ,
mSessDesc ( 0 ) ,
mFormatContext ( 0 ) ,
mSeq ( 0 ) ,
mSession ( 0 ) ,
mSsrc ( 0 ) ,
mDist ( UNDEFINED ) ,
mRtpTime ( 0 ) ,
2021-03-03 02:56:35 +08:00
mTerminate ( false )
2013-03-17 07:45:21 +08:00
{
2016-04-04 22:11:48 +08:00
mUrl = mProtocol + " :// " + mHost + " : " + mPort ;
2017-11-17 20:52:26 +08:00
if ( ! mPath . empty ( ) ) {
2016-04-04 22:11:48 +08:00
if ( mPath [ 0 ] = = ' / ' )
mUrl + = mPath ;
2014-04-29 05:37:31 +08:00
else
2016-04-04 22:11:48 +08:00
mUrl + = ' / ' + mPath ;
}
mSsrc = rand ( ) ;
2020-05-08 01:43:05 +08:00
Debug ( 2 , " RTSP Local SSRC is %x, url is %s " , mSsrc , mUrl . c_str ( ) ) ;
2016-04-04 22:11:48 +08:00
if ( mMethod = = RTP_RTSP_HTTP )
2019-04-29 00:05:32 +08:00
mHttpSession = stringtf ( " %d " , rand ( ) ) ;
2016-04-04 22:11:48 +08:00
mNeedAuth = false ;
2021-04-04 06:30:18 +08:00
StringVector parts = Split ( auth , " : " ) ;
2021-04-29 06:13:16 +08:00
Debug ( 2 , " # of auth parts %zu " , parts . size ( ) ) ;
2020-05-08 01:43:05 +08:00
if ( parts . size ( ) > 1 )
2016-04-04 22:11:48 +08:00
mAuthenticator = new zm : : Authenticator ( parts [ 0 ] , parts [ 1 ] ) ;
else
mAuthenticator = new zm : : Authenticator ( parts [ 0 ] , " " ) ;
2021-03-03 02:56:35 +08:00
mThread = std : : thread ( & RtspThread : : Run , this ) ;
2013-03-17 07:45:21 +08:00
}
2017-11-17 20:52:26 +08:00
RtspThread : : ~ RtspThread ( ) {
2021-03-03 02:56:35 +08:00
Stop ( ) ;
if ( mThread . joinable ( ) )
mThread . join ( ) ;
2017-11-17 20:52:26 +08:00
if ( mFormatContext ) {
2020-05-08 01:43:05 +08:00
avformat_free_context ( mFormatContext ) ;
2020-08-26 07:45:48 +08:00
mFormatContext = nullptr ;
2016-04-04 22:11:48 +08:00
}
2017-11-17 20:52:26 +08:00
if ( mSessDesc ) {
2016-04-04 22:11:48 +08:00
delete mSessDesc ;
2020-08-26 07:45:48 +08:00
mSessDesc = nullptr ;
2016-04-04 22:11:48 +08:00
}
delete mAuthenticator ;
2020-08-26 07:45:48 +08:00
mAuthenticator = nullptr ;
2013-03-17 07:45:21 +08:00
}
2021-03-03 02:56:35 +08:00
void RtspThread : : Run ( ) {
2016-04-04 22:11:48 +08:00
std : : string message ;
std : : string response ;
2020-05-08 01:43:05 +08:00
response . reserve ( ZM_NETWORK_BUFSIZ ) ;
2016-04-04 22:11:48 +08:00
2020-05-08 01:43:05 +08:00
if ( ! mRtspSocket . connect ( mHost . c_str ( ) , mPort . c_str ( ) ) )
Fatal ( " Unable to connect RTSP socket " ) ;
2016-04-04 22:11:48 +08:00
//Select select( 0.25 );
//select.addReader( &mRtspSocket );
//while ( select.wait() )
//{
//mRtspSocket.recv( response );
//Debug( 4, "Drained %d bytes from RTSP socket", response.size() );
//}
bool authTried = false ;
2017-11-17 20:52:26 +08:00
if ( mMethod = = RTP_RTSP_HTTP ) {
2019-04-29 00:05:32 +08:00
if ( ! mRtspSocket2 . connect ( mHost . c_str ( ) , mPort . c_str ( ) ) )
Fatal ( " Unable to connect auxiliary RTSP/HTTP socket " ) ;
2013-03-17 07:45:21 +08:00
//Select select( 0.25 );
2016-04-04 22:11:48 +08:00
//select.addReader( &mRtspSocket2 );
2013-03-17 07:45:21 +08:00
//while ( select.wait() )
//{
2016-04-04 22:11:48 +08:00
//mRtspSocket2.recv( response );
//Debug( 4, "Drained %d bytes from HTTP socket", response.size() );
2013-03-17 07:45:21 +08:00
//}
2014-04-29 05:37:31 +08:00
2016-04-04 22:11:48 +08:00
//possibly retry sending the message for authentication
int respCode = - 1 ;
char respText [ 256 ] ;
do {
message = " GET " + mPath + " HTTP/1.0 \r \n " ;
message + = " X-SessionCookie: " + mHttpSession + " \r \n " ;
if ( mNeedAuth ) {
message + = mAuthenticator - > getAuthHeader ( " GET " , mPath ) ;
authTried = true ;
}
2020-05-08 01:43:05 +08:00
message + = " Accept: application/x-rtsp-tunnelled \r \n \r \n " ;
Debug ( 2 , " Sending HTTP message: %s " , message . c_str ( ) ) ;
if ( mRtspSocket . send ( message . c_str ( ) , message . size ( ) ) ! = ( int ) message . length ( ) ) {
2019-04-29 00:05:32 +08:00
Error ( " Unable to send message '%s': %s " , message . c_str ( ) , strerror ( errno ) ) ;
2021-03-03 02:56:35 +08:00
return ;
2016-04-04 22:11:48 +08:00
}
2020-05-08 01:43:05 +08:00
if ( mRtspSocket . recv ( response ) < 0 ) {
2019-04-29 00:05:32 +08:00
Error ( " Recv failed; %s " , strerror ( errno ) ) ;
2021-03-03 02:56:35 +08:00
return ;
2016-04-04 22:11:48 +08:00
}
2019-04-29 00:05:32 +08:00
Debug ( 2 , " Received HTTP response: %s (%zd bytes) " , response . c_str ( ) , response . size ( ) ) ;
2016-04-04 22:11:48 +08:00
float respVer = 0 ;
respCode = - 1 ;
2020-05-08 01:43:05 +08:00
if ( sscanf ( response . c_str ( ) , " HTTP/%f %3d %[^ \r \n ] \r \n " , & respVer , & respCode , respText ) ! = 3 ) {
2017-11-17 20:52:26 +08:00
if ( isalnum ( response [ 0 ] ) ) {
2020-05-08 01:43:05 +08:00
Error ( " Response parse failure in '%s' " , response . c_str ( ) ) ;
2017-11-17 20:52:26 +08:00
} else {
2020-05-08 01:43:05 +08:00
Error ( " Response parse failure, %zd bytes follow " , response . size ( ) ) ;
2016-05-06 20:32:21 +08:00
if ( response . size ( ) )
2021-02-07 05:02:09 +08:00
Hexdump ( Logger : : ERROR , response . data ( ) , std : : min ( int ( response . size ( ) ) , 16 ) ) ;
2013-03-17 07:45:21 +08:00
}
2021-03-03 02:56:35 +08:00
return ;
2016-04-04 22:11:48 +08:00
}
// If Server requests authentication, check WWW-Authenticate header and fill required fields
// for requested authentication method
2019-04-29 00:05:32 +08:00
if ( respCode = = 401 & & ! authTried ) {
2016-04-04 22:11:48 +08:00
mNeedAuth = true ;
mAuthenticator - > checkAuthResponse ( response ) ;
Debug ( 2 , " Processed 401 response " ) ;
mRtspSocket . close ( ) ;
2019-04-29 00:05:32 +08:00
if ( ! mRtspSocket . connect ( mHost . c_str ( ) , mPort . c_str ( ) ) )
Fatal ( " Unable to reconnect RTSP socket " ) ;
2016-04-04 22:11:48 +08:00
Debug ( 2 , " connection should be reopened now " ) ;
}
} while ( respCode = = 401 & & ! authTried ) ;
2017-11-17 20:52:26 +08:00
if ( respCode ! = 200 ) {
2019-04-29 00:05:32 +08:00
Error ( " Unexpected response code %d, text is '%s' " , respCode , respText ) ;
2021-03-03 02:56:35 +08:00
return ;
2016-04-04 22:11:48 +08:00
}
2015-01-31 22:31:27 +08:00
2016-04-04 22:11:48 +08:00
message = " POST " + mPath + " HTTP/1.0 \r \n " ;
message + = " X-SessionCookie: " + mHttpSession + " \r \n " ;
if ( mNeedAuth )
message + = mAuthenticator - > getAuthHeader ( " POST " , mPath ) ;
message + = " Content-Length: 32767 \r \n " ;
message + = " Content-Type: application/x-rtsp-tunnelled \r \n " ;
message + = " \r \n " ;
2020-05-08 01:43:05 +08:00
Debug ( 2 , " Sending HTTP message: %s " , message . c_str ( ) ) ;
if ( mRtspSocket2 . send ( message . c_str ( ) , message . size ( ) ) ! = ( int ) message . length ( ) ) {
Error ( " Unable to send message '%s': %s " , message . c_str ( ) , strerror ( errno ) ) ;
2021-03-03 02:56:35 +08:00
return ;
2015-08-21 23:29:54 +08:00
}
2020-05-08 01:43:05 +08:00
} // end if ( mMethod == RTP_RTSP_HTTP )
2015-01-31 22:31:27 +08:00
2016-04-04 22:11:48 +08:00
std : : string localHost = " " ;
int localPorts [ 2 ] = { 0 , 0 } ;
2013-03-17 07:45:21 +08:00
2016-04-04 22:11:48 +08:00
// Request supported RTSP commands by the server
message = " OPTIONS " + mUrl + " RTSP/1.0 \r \n " ;
2020-05-08 01:43:05 +08:00
if ( ! sendCommand ( message ) )
2021-03-03 02:56:35 +08:00
return ;
2013-03-17 07:45:21 +08:00
2016-04-04 22:11:48 +08:00
// A negative return here may indicate auth failure, but we will have setup the auth mechanisms so we need to retry.
2019-04-29 00:05:32 +08:00
if ( ! recvResponse ( response ) ) {
2016-04-04 22:11:48 +08:00
if ( mNeedAuth ) {
2020-05-08 01:43:05 +08:00
Debug ( 2 , " Resending OPTIONS due to possible auth requirement " ) ;
2019-04-29 00:05:32 +08:00
if ( ! sendCommand ( message ) )
2021-03-03 02:56:35 +08:00
return ;
2019-04-29 00:05:32 +08:00
if ( ! recvResponse ( response ) )
2021-03-03 02:56:35 +08:00
return ;
2016-04-04 22:11:48 +08:00
} else {
2021-03-03 02:56:35 +08:00
return ;
2013-03-17 07:45:21 +08:00
}
2016-04-04 22:11:48 +08:00
} // end if failed response maybe due to auth
char publicLine [ 256 ] = " " ;
2021-04-04 06:30:18 +08:00
StringVector lines = Split ( response , " \r \n " ) ;
2016-04-04 22:11:48 +08:00
for ( size_t i = 0 ; i < lines . size ( ) ; i + + )
2019-04-29 00:05:32 +08:00
sscanf ( lines [ i ] . c_str ( ) , " Public: %[^ \r \n ] \r \n " , publicLine ) ;
2016-04-04 22:11:48 +08:00
// Check if the server supports the GET_PARAMETER command
// If yes, it is likely that the server will request this command as a keepalive message
bool sendKeepalive = false ;
if ( publicLine [ 0 ] & & strstr ( publicLine , " GET_PARAMETER " ) )
sendKeepalive = true ;
message = " DESCRIBE " + mUrl + " RTSP/1.0 \r \n " ;
bool res ;
do {
2020-05-08 01:43:05 +08:00
if ( mNeedAuth )
2016-04-04 22:11:48 +08:00
authTried = true ;
2019-04-29 00:05:32 +08:00
sendCommand ( message ) ;
2020-05-08 01:43:05 +08:00
// FIXME Why sleep 1?
2021-06-14 02:29:53 +08:00
std : : this_thread : : sleep_for ( Microseconds ( 10 ) ) ;
2019-04-29 00:05:32 +08:00
res = recvResponse ( response ) ;
if ( ! res & & respCode = = 401 )
2016-04-04 22:11:48 +08:00
mNeedAuth = true ;
} while ( ! res & & respCode = = 401 & & ! authTried ) ;
const std : : string endOfHeaders = " \r \n \r \n " ;
2019-04-29 00:05:32 +08:00
size_t sdpStart = response . find ( endOfHeaders ) ;
if ( sdpStart = = std : : string : : npos )
2021-03-03 02:56:35 +08:00
return ;
2013-03-17 07:45:21 +08:00
2017-11-17 20:52:26 +08:00
if ( mRtspDescribe ) {
2019-04-29 00:05:32 +08:00
std : : string DescHeader = response . substr ( 0 , sdpStart ) ;
Debug ( 1 , " Processing DESCRIBE response header '%s' " , DescHeader . c_str ( ) ) ;
2013-03-17 07:45:21 +08:00
2021-04-04 06:30:18 +08:00
lines = Split ( DescHeader , " \r \n " ) ;
2017-11-17 20:52:26 +08:00
for ( size_t i = 0 ; i < lines . size ( ) ; i + + ) {
2019-04-29 00:05:32 +08:00
// If the device sends us a url value for Content-Base in the response header, we should use that instead
if ( ( lines [ i ] . size ( ) > 13 ) & & ( lines [ i ] . substr ( 0 , 13 ) = = " Content-Base: " ) ) {
2021-04-04 05:30:59 +08:00
mUrl = TrimSpaces ( lines [ i ] . substr ( 13 ) ) ;
2019-04-29 00:05:32 +08:00
Info ( " Received new Content-Base in DESCRIBE response header. Updated device Url to: '%s' " , mUrl . c_str ( ) ) ;
break ;
2016-04-04 22:11:48 +08:00
}
2019-04-29 00:05:32 +08:00
} // end foreach line
} // end if mRtspDescribe
2016-04-04 22:11:48 +08:00
sdpStart + = endOfHeaders . length ( ) ;
2019-04-29 00:05:32 +08:00
std : : string sdp = response . substr ( sdpStart ) ;
Debug ( 1 , " Processing SDP '%s' " , sdp . c_str ( ) ) ;
2016-04-04 22:11:48 +08:00
2017-11-17 20:52:26 +08:00
try {
2016-04-04 22:11:48 +08:00
mSessDesc = new SessionDescriptor ( mUrl , sdp ) ;
mFormatContext = mSessDesc - > generateFormatContext ( ) ;
2020-12-28 01:03:44 +08:00
} catch ( const Exception & e ) {
2021-04-29 06:13:16 +08:00
Error ( " %s " , e . getMessage ( ) . c_str ( ) ) ;
2021-03-03 02:56:35 +08:00
return ;
2016-04-04 22:11:48 +08:00
}
#if 0
// New method using ffmpeg native functions
std : : string authUrl = mUrl ;
if ( ! mAuth . empty ( ) )
authUrl . insert ( authUrl . find ( " :// " ) + 3 , mAuth + " @ " ) ;
2020-08-26 07:45:48 +08:00
if ( av_open_input_file ( & mFormatContext , authUrl . c_str ( ) , nullptr , 0 , nullptr ) ! = 0 )
2016-04-04 22:11:48 +08:00
{
Error ( " Unable to open input '%s' " , authUrl . c_str ( ) ) ;
return ( - 1 ) ;
}
2013-03-17 07:45:21 +08:00
# endif
2016-04-04 22:11:48 +08:00
uint32_t rtpClock = 0 ;
std : : string trackUrl = mUrl ;
std : : string controlUrl ;
2018-11-14 07:13:55 +08:00
_AVCODECID codecId = AV_CODEC_ID_NONE ;
2016-04-04 22:11:48 +08:00
2017-11-17 20:52:26 +08:00
if ( mFormatContext - > nb_streams > = 1 ) {
for ( unsigned int i = 0 ; i < mFormatContext - > nb_streams ; i + + ) {
2021-01-29 22:53:48 +08:00
SessionDescriptor : : MediaDescriptor * mediaDesc = mSessDesc - > getStream ( i ) ;
2021-06-05 23:01:46 +08:00
if ( mFormatContext - > streams [ i ] - > codecpar - > codec_type = = AVMEDIA_TYPE_VIDEO ) {
2016-04-04 22:11:48 +08:00
// Check if control Url is absolute or relative
controlUrl = mediaDesc - > getControlUrl ( ) ;
RtspThread: Fix a stack-buffer-overflow reported by ASAN
==8109==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fab9b156480 at pc 0x7fabaebef57b bp 0x7fab9b154640 sp 0x7fab9b153df0
READ of size 32 at 0x7fab9b156480 thread T2
#0 0x7fabaebef57a (/lib/x86_64-linux-gnu/libasan.so.5+0xb857a)
#1 0x561c0a9e24eb in bool std::__equal<true>::equal<char>(char const*, char const*, char const*) /usr/include/c++/8/bits/stl_algobase.h:814
#2 0x561c0a9dfa8e in bool std::__equal_aux<char*, char*>(char*, char*, char*) /usr/include/c++/8/bits/stl_algobase.h:831
#3 0x561c0a9dd982 in bool std::equal<__gnu_cxx::__normal_iterator<char*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >
, __gnu_cxx::__normal_iterator<char*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > > >(__gnu_cxx::__normal_iterator<char*,
std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> > >, __gnu_cxx::__normal_iterator<char*, std::__cxx11::basic_string<char, std::c
har_traits<char>, std::allocator<char> > >, __gnu_cxx::__normal_iterator<char*, std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char>
> >) /usr/include/c++/8/bits/stl_algobase.h:1049
#4 0x561c0a9cf75a in RtspThread::Run() /root/zoneminder/src/zm_rtsp.cpp:411
#5 0x561c0a9df6e9 in void std::__invoke_impl<void, void (RtspThread::*)(), RtspThread*>(std::__invoke_memfun_deref, void (RtspThread::*&&)(), RtspThread*&
&) /usr/include/c++/8/bits/invoke.h:73
#6 0x561c0a9dd4ae in std::__invoke_result<void (RtspThread::*)(), RtspThread*>::type std::__invoke<void (RtspThread::*)(), RtspThread*>(void (RtspThread::
*&&)(), RtspThread*&&) (/root/zoneminder/cmake-build-debug-remote/src/zmc+0x1544ae)
#7 0x561c0a9e6a1a in decltype (__invoke((_S_declval<0ul>)(), (_S_declval<1ul>)())) std::thread::_Invoker<std::tuple<void (RtspThread::*)(), RtspThread*> >
::_M_invoke<0ul, 1ul>(std::_Index_tuple<0ul, 1ul>) /usr/include/c++/8/thread:244
#8 0x561c0a9e698d in std::thread::_Invoker<std::tuple<void (RtspThread::*)(), RtspThread*> >::operator()() /usr/include/c++/8/thread:253
#9 0x561c0a9e68ff in std::thread::_State_impl<std::thread::_Invoker<std::tuple<void (RtspThread::*)(), RtspThread*> > >::_M_run() /usr/include/c++/8/threa
d:196
#10 0x7fabaca57b2e (/lib/x86_64-linux-gnu/libstdc++.so.6+0xbbb2e)
#11 0x7fabae50dfa2 in start_thread /build/glibc-vjB4T1/glibc-2.28/nptl/pthread_create.c:486
#12 0x7fabac7354ce in clone (/lib/x86_64-linux-gnu/libc.so.6+0xf94ce)
2021-04-11 17:37:03 +08:00
if ( trackUrl = = controlUrl ) {
2016-04-04 22:11:48 +08:00
trackUrl = controlUrl ;
2017-11-17 20:52:26 +08:00
} else {
2021-01-29 22:53:48 +08:00
if ( * trackUrl . rbegin ( ) ! = ' / ' ) {
2016-04-04 22:11:48 +08:00
trackUrl + = " / " + controlUrl ;
} else {
trackUrl + = controlUrl ;
}
2013-03-17 07:45:21 +08:00
}
2016-04-04 22:11:48 +08:00
rtpClock = mediaDesc - > getClock ( ) ;
2021-02-10 02:07:16 +08:00
codecId = mFormatContext - > streams [ i ] - > codecpar - > codec_id ;
2016-04-04 22:11:48 +08:00
break ;
2021-01-28 05:14:17 +08:00
} // end if is video
} // end foreach stream
} // end if have stream
2013-03-17 07:45:21 +08:00
2020-12-28 01:03:44 +08:00
switch ( mMethod ) {
2016-04-04 22:11:48 +08:00
case RTP_UNICAST :
localPorts [ 0 ] = requestPorts ( ) ;
localPorts [ 1 ] = localPorts [ 0 ] + 1 ;
2013-03-17 07:45:21 +08:00
2021-01-29 22:53:48 +08:00
message = " SETUP " + trackUrl + " RTSP/1.0 \r \n Transport: RTP/AVP;unicast;client_port= "
+ stringtf ( " %d " , localPorts [ 0 ] ) + " - " + stringtf ( " %d " , localPorts [ 1 ] ) + " \r \n " ;
2016-04-04 22:11:48 +08:00
break ;
case RTP_MULTICAST :
message = " SETUP " + trackUrl + " RTSP/1.0 \r \n Transport: RTP/AVP;multicast \r \n " ;
break ;
case RTP_RTSP :
case RTP_RTSP_HTTP :
message = " SETUP " + trackUrl + " RTSP/1.0 \r \n Transport: RTP/AVP/TCP;unicast \r \n " ;
break ;
default :
2021-01-29 22:53:48 +08:00
Panic ( " Got unexpected method %d " , mMethod ) ;
2016-04-04 22:11:48 +08:00
break ;
}
2013-03-17 07:45:21 +08:00
2020-12-28 01:03:44 +08:00
if ( ! sendCommand ( message ) )
2021-03-03 02:56:35 +08:00
return ;
2020-12-28 01:03:44 +08:00
if ( ! recvResponse ( response ) )
2021-03-03 02:56:35 +08:00
return ;
2013-03-17 07:45:21 +08:00
2021-04-04 06:30:18 +08:00
lines = Split ( response , " \r \n " ) ;
2016-04-04 22:11:48 +08:00
std : : string session ;
2021-06-14 03:15:18 +08:00
Seconds timeout = Seconds ( 0 ) ;
2016-04-04 22:11:48 +08:00
char transport [ 256 ] = " " ;
2013-03-17 07:45:21 +08:00
2017-11-17 20:52:26 +08:00
for ( size_t i = 0 ; i < lines . size ( ) ; i + + ) {
2021-01-29 22:53:48 +08:00
if ( ( lines [ i ] . size ( ) > 8 ) & & ( lines [ i ] . substr ( 0 , 8 ) = = " Session: " ) ) {
2021-04-04 06:30:18 +08:00
StringVector sessionLine = Split ( lines [ i ] . substr ( 9 ) , " ; " ) ;
2021-04-04 05:30:59 +08:00
session = TrimSpaces ( sessionLine [ 0 ] ) ;
2021-06-14 03:15:18 +08:00
if ( sessionLine . size ( ) = = 2 ) {
int32 timeout_val = 0 ;
sscanf ( TrimSpaces ( sessionLine [ 1 ] ) . c_str ( ) , " timeout=%d " , & timeout_val ) ;
timeout = Seconds ( timeout_val ) ;
}
2013-03-17 07:45:21 +08:00
}
2020-12-28 01:03:44 +08:00
sscanf ( lines [ i ] . c_str ( ) , " Transport: %s " , transport ) ;
2016-04-04 22:11:48 +08:00
}
if ( session . empty ( ) )
2020-12-28 01:03:44 +08:00
Fatal ( " Unable to get session identifier from response '%s' " , response . c_str ( ) ) ;
2016-04-04 22:11:48 +08:00
2021-06-15 02:09:30 +08:00
Debug ( 2 , " Got RTSP session %s, timeout % " PRIi64 " secs " ,
session . c_str ( ) ,
static_cast < int64 > ( Seconds ( timeout ) . count ( ) ) ) ;
2016-04-04 22:11:48 +08:00
if ( ! transport [ 0 ] )
2020-12-28 01:03:44 +08:00
Fatal ( " Unable to get transport details from response '%s' " , response . c_str ( ) ) ;
2016-04-04 22:11:48 +08:00
2020-12-28 01:03:44 +08:00
Debug ( 2 , " Got RTSP transport %s " , transport ) ;
2016-04-04 22:11:48 +08:00
std : : string method = " " ;
int remotePorts [ 2 ] = { 0 , 0 } ;
int remoteChannels [ 2 ] = { 0 , 0 } ;
std : : string distribution = " " ;
unsigned long ssrc = 0 ;
2021-04-04 06:30:18 +08:00
StringVector parts = Split ( transport , " ; " ) ;
2017-11-17 20:52:26 +08:00
for ( size_t i = 0 ; i < parts . size ( ) ; i + + ) {
2016-04-04 22:11:48 +08:00
if ( parts [ i ] = = " unicast " | | parts [ i ] = = " multicast " )
distribution = parts [ i ] ;
2021-04-04 05:51:12 +08:00
else if ( StartsWith ( parts [ i ] , " server_port= " ) ) {
2016-04-04 22:11:48 +08:00
method = " RTP/UNICAST " ;
2021-04-04 06:30:18 +08:00
StringVector subparts = Split ( parts [ i ] , " = " ) ;
StringVector ports = Split ( subparts [ 1 ] , " - " ) ;
2020-08-26 07:45:48 +08:00
remotePorts [ 0 ] = strtol ( ports [ 0 ] . c_str ( ) , nullptr , 10 ) ;
remotePorts [ 1 ] = strtol ( ports [ 1 ] . c_str ( ) , nullptr , 10 ) ;
2021-04-04 05:51:12 +08:00
} else if ( StartsWith ( parts [ i ] , " interleaved= " ) ) {
2016-04-04 22:11:48 +08:00
method = " RTP/RTSP " ;
2021-04-04 06:30:18 +08:00
StringVector subparts = Split ( parts [ i ] , " = " ) ;
StringVector channels = Split ( subparts [ 1 ] , " - " ) ;
2020-08-26 07:45:48 +08:00
remoteChannels [ 0 ] = strtol ( channels [ 0 ] . c_str ( ) , nullptr , 10 ) ;
remoteChannels [ 1 ] = strtol ( channels [ 1 ] . c_str ( ) , nullptr , 10 ) ;
2021-04-04 05:51:12 +08:00
} else if ( StartsWith ( parts [ i ] , " port= " ) ) {
2016-04-04 22:11:48 +08:00
method = " RTP/MULTICAST " ;
2021-04-04 06:30:18 +08:00
StringVector subparts = Split ( parts [ i ] , " = " ) ;
StringVector ports = Split ( subparts [ 1 ] , " - " ) ;
2020-08-26 07:45:48 +08:00
localPorts [ 0 ] = strtol ( ports [ 0 ] . c_str ( ) , nullptr , 10 ) ;
localPorts [ 1 ] = strtol ( ports [ 1 ] . c_str ( ) , nullptr , 10 ) ;
2021-04-04 05:51:12 +08:00
} else if ( StartsWith ( parts [ i ] , " destination= " ) ) {
2021-04-04 06:30:18 +08:00
StringVector subparts = Split ( parts [ i ] , " = " ) ;
2016-04-04 22:11:48 +08:00
localHost = subparts [ 1 ] ;
2021-04-04 05:51:12 +08:00
} else if ( StartsWith ( parts [ i ] , " ssrc= " ) ) {
2021-04-04 06:30:18 +08:00
StringVector subparts = Split ( parts [ i ] , " = " ) ;
2020-08-26 07:45:48 +08:00
ssrc = strtoll ( subparts [ 1 ] . c_str ( ) , nullptr , 16 ) ;
2016-04-04 22:11:48 +08:00
}
}
Debug ( 2 , " RTSP Method is %s " , method . c_str ( ) ) ;
Debug ( 2 , " RTSP Distribution is %s " , distribution . c_str ( ) ) ;
Debug ( 2 , " RTSP SSRC is %lx " , ssrc ) ;
Debug ( 2 , " RTSP Local Host is %s " , localHost . c_str ( ) ) ;
Debug ( 2 , " RTSP Local Ports are %d/%d " , localPorts [ 0 ] , localPorts [ 1 ] ) ;
Debug ( 2 , " RTSP Remote Ports are %d/%d " , remotePorts [ 0 ] , remotePorts [ 1 ] ) ;
Debug ( 2 , " RTSP Remote Channels are %d/%d " , remoteChannels [ 0 ] , remoteChannels [ 1 ] ) ;
message = " PLAY " + mUrl + " RTSP/1.0 \r \n Session: " + session + " \r \n Range: npt=0.000- \r \n " ;
2020-12-28 01:03:44 +08:00
if ( ! sendCommand ( message ) )
2021-03-03 02:56:35 +08:00
return ;
2020-12-28 01:03:44 +08:00
if ( ! recvResponse ( response ) )
2021-03-03 02:56:35 +08:00
return ;
2013-03-17 07:45:21 +08:00
2021-04-04 06:30:18 +08:00
lines = Split ( response , " \r \n " ) ;
2016-04-04 22:11:48 +08:00
std : : string rtpInfo ;
2017-11-17 20:52:26 +08:00
for ( size_t i = 0 ; i < lines . size ( ) ; i + + ) {
2020-12-28 01:03:44 +08:00
if ( ( lines [ i ] . size ( ) > 9 ) & & ( lines [ i ] . substr ( 0 , 9 ) = = " RTP-Info: " ) )
2021-04-04 05:30:59 +08:00
rtpInfo = TrimSpaces ( lines [ i ] . substr ( 9 ) ) ;
2020-12-28 01:03:44 +08:00
// Check for a timeout again. Some rtsp devices don't send a timeout until after the PLAY command is sent
2021-06-14 03:15:18 +08:00
if ( ( lines [ i ] . size ( ) > 8 ) & & ( lines [ i ] . substr ( 0 , 8 ) = = " Session: " ) & & ( timeout = = Seconds ( 0 ) ) ) {
2021-04-04 06:30:18 +08:00
StringVector sessionLine = Split ( lines [ i ] . substr ( 9 ) , " ; " ) ;
2021-06-14 03:15:18 +08:00
if ( sessionLine . size ( ) = = 2 ) {
int32 timeout_val = 0 ;
sscanf ( TrimSpaces ( sessionLine [ 1 ] ) . c_str ( ) , " timeout=%d " , & timeout_val ) ;
timeout = Seconds ( timeout_val ) ;
}
if ( timeout > Seconds ( 0 ) ) {
2021-06-15 02:09:30 +08:00
Debug ( 2 , " Got timeout % " PRIi64 " secs from PLAY command response " ,
static_cast < int64 > ( Seconds ( timeout ) . count ( ) ) ) ;
2021-06-14 03:15:18 +08:00
}
2014-12-02 07:15:08 +08:00
}
2016-04-04 22:11:48 +08:00
}
int seq = 0 ;
unsigned long rtpTime = 0 ;
StringVector streams ;
2017-11-17 20:52:26 +08:00
if ( rtpInfo . empty ( ) ) {
2016-04-04 22:11:48 +08:00
Debug ( 1 , " RTP Info Empty. Starting values for Sequence and Rtptime shall be zero. " ) ;
2017-11-17 20:52:26 +08:00
} else {
2016-04-04 22:11:48 +08:00
Debug ( 2 , " Got RTP Info %s " , rtpInfo . c_str ( ) ) ;
// More than one stream can be included in the RTP Info
2021-04-04 06:30:18 +08:00
streams = Split ( rtpInfo . c_str ( ) , " , " ) ;
2017-11-17 20:52:26 +08:00
for ( size_t i = 0 ; i < streams . size ( ) ; i + + ) {
2016-04-04 22:11:48 +08:00
// We want the stream that matches the trackUrl we are using
2017-11-17 20:52:26 +08:00
if ( streams [ i ] . find ( controlUrl . c_str ( ) ) ! = std : : string : : npos ) {
2016-04-04 22:11:48 +08:00
// Parse the sequence and rtptime values
2021-04-04 06:30:18 +08:00
parts = Split ( streams [ i ] . c_str ( ) , " ; " ) ;
2017-11-17 20:52:26 +08:00
for ( size_t j = 0 ; j < parts . size ( ) ; j + + ) {
2021-04-04 05:51:12 +08:00
if ( StartsWith ( parts [ j ] , " seq= " ) ) {
2021-04-04 06:30:18 +08:00
StringVector subparts = Split ( parts [ j ] , " = " ) ;
2020-08-26 07:45:48 +08:00
seq = strtol ( subparts [ 1 ] . c_str ( ) , nullptr , 10 ) ;
2021-04-04 05:51:12 +08:00
} else if ( StartsWith ( parts [ j ] , " rtptime= " ) ) {
2021-04-04 06:30:18 +08:00
StringVector subparts = Split ( parts [ j ] , " = " ) ;
2020-08-26 07:45:48 +08:00
rtpTime = strtol ( subparts [ 1 ] . c_str ( ) , nullptr , 10 ) ;
2016-04-04 22:11:48 +08:00
}
2013-03-17 07:45:21 +08:00
}
2016-04-04 22:11:48 +08:00
break ;
}
2013-03-17 07:45:21 +08:00
}
2016-04-04 22:11:48 +08:00
}
2013-03-17 07:45:21 +08:00
2016-04-04 22:11:48 +08:00
Debug ( 2 , " RTSP Seq is %d " , seq ) ;
Debug ( 2 , " RTSP Rtptime is %ld " , rtpTime ) ;
2013-03-17 07:45:21 +08:00
2021-06-14 03:15:18 +08:00
TimePoint lastKeepalive = std : : chrono : : steady_clock : : now ( ) ;
TimePoint now ;
2016-04-04 22:11:48 +08:00
message = " GET_PARAMETER " + mUrl + " RTSP/1.0 \r \n Session: " + session + " \r \n " ;
2014-11-08 00:39:50 +08:00
2017-11-17 20:52:26 +08:00
switch ( mMethod ) {
2016-04-04 22:11:48 +08:00
case RTP_UNICAST :
2013-03-17 07:45:21 +08:00
{
2016-04-04 22:11:48 +08:00
RtpSource * source = new RtpSource ( mId , " " , localPorts [ 0 ] , mHost , remotePorts [ 0 ] , ssrc , seq , rtpClock , rtpTime , codecId ) ;
mSources [ ssrc ] = source ;
RtpDataThread rtpDataThread ( * this , * source ) ;
RtpCtrlThread rtpCtrlThread ( * this , * source ) ;
2021-03-03 02:56:35 +08:00
while ( ! mTerminate ) {
2021-06-14 03:15:18 +08:00
now = std : : chrono : : steady_clock : : now ( ) ;
2016-04-04 22:11:48 +08:00
// Send a keepalive message if the server supports this feature and we are close to the timeout expiration
2021-06-14 03:15:18 +08:00
Debug ( 5 , " sendkeepalive %d, timeout % " PRIi64 " s, now: % " PRIi64 " s last: % " PRIi64 " s since: % " PRIi64 " s " ,
2021-04-29 06:13:16 +08:00
sendKeepalive ,
2021-06-14 03:15:18 +08:00
static_cast < int64 > ( Seconds ( timeout ) . count ( ) ) ,
static_cast < int64 > ( std : : chrono : : duration_cast < Seconds > ( now . time_since_epoch ( ) ) . count ( ) ) ,
static_cast < int64 > ( std : : chrono : : duration_cast < Seconds > ( lastKeepalive . time_since_epoch ( ) ) . count ( ) ) ,
static_cast < int64 > ( std : : chrono : : duration_cast < Seconds > ( ( now - lastKeepalive ) ) . count ( ) ) ) ;
if ( sendKeepalive & & ( timeout > Seconds ( 0 ) ) & & ( ( now - lastKeepalive ) > ( timeout - Seconds ( 5 ) ) ) ) {
if ( ! sendCommand ( message ) )
2021-03-03 02:56:35 +08:00
return ;
2016-04-04 22:11:48 +08:00
lastKeepalive = now ;
}
2021-06-14 02:29:53 +08:00
std : : this_thread : : sleep_for ( Microseconds ( 100 ) ) ;
2016-04-04 22:11:48 +08:00
}
2013-03-17 07:45:21 +08:00
#if 0
2016-04-04 22:11:48 +08:00
message = " PAUSE " + mUrl + " RTSP/1.0 \r \n Session: " + session + " \r \n " ;
if ( ! sendCommand ( message ) )
return ( - 1 ) ;
if ( ! recvResponse ( response ) )
return ( - 1 ) ;
2013-03-17 07:45:21 +08:00
# endif
2016-04-04 22:11:48 +08:00
message = " TEARDOWN " + mUrl + " RTSP/1.0 \r \n Session: " + session + " \r \n " ;
if ( ! sendCommand ( message ) )
2021-03-03 02:56:35 +08:00
return ;
2016-04-04 22:11:48 +08:00
if ( ! recvResponse ( response ) )
2021-03-03 02:56:35 +08:00
return ;
2013-03-17 07:45:21 +08:00
2021-03-03 07:40:57 +08:00
rtpDataThread . Stop ( ) ;
2021-03-03 07:35:34 +08:00
rtpCtrlThread . Stop ( ) ;
2013-03-17 07:45:21 +08:00
2016-04-04 22:11:48 +08:00
//rtpDataThread.kill( SIGTERM );
//rtpCtrlThread.kill( SIGTERM );
2013-03-17 07:45:21 +08:00
2016-04-04 22:11:48 +08:00
delete mSources [ ssrc ] ;
mSources . clear ( ) ;
2013-03-17 07:45:21 +08:00
2016-04-04 22:11:48 +08:00
releasePorts ( localPorts [ 0 ] ) ;
2013-03-17 07:45:21 +08:00
2016-04-04 22:11:48 +08:00
break ;
}
case RTP_RTSP :
case RTP_RTSP_HTTP :
{
RtpSource * source = new RtpSource ( mId , " " , remoteChannels [ 0 ] , mHost , remoteChannels [ 0 ] , ssrc , seq , rtpClock , rtpTime , codecId ) ;
mSources [ ssrc ] = source ;
// These never actually run
RtpDataThread rtpDataThread ( * this , * source ) ;
RtpCtrlThread rtpCtrlThread ( * this , * source ) ;
2021-06-13 23:29:43 +08:00
zm : : Select select ( Milliseconds ( config . http_timeout ) ) ;
2016-04-04 22:11:48 +08:00
select . addReader ( & mRtspSocket ) ;
Buffer buffer ( ZM_NETWORK_BUFSIZ ) ;
std : : string keepaliveMessage = " OPTIONS " + mUrl + " RTSP/1.0 \r \n " ;
std : : string keepaliveResponse = " RTSP/1.0 200 OK \r \n " ;
2021-03-03 02:56:35 +08:00
while ( ! mTerminate & & select . wait ( ) > = 0 ) {
2021-06-07 01:11:11 +08:00
zm : : Select : : CommsList readable = select . getReadable ( ) ;
2017-11-17 20:52:26 +08:00
if ( readable . size ( ) = = 0 ) {
2016-04-04 22:11:48 +08:00
Error ( " RTSP timed out " ) ;
break ;
}
2013-03-17 07:45:21 +08:00
2016-04-04 22:11:48 +08:00
static char tempBuffer [ ZM_NETWORK_BUFSIZ ] ;
ssize_t nBytes = mRtspSocket . recv ( tempBuffer , sizeof ( tempBuffer ) ) ;
buffer . append ( tempBuffer , nBytes ) ;
Debug ( 4 , " Read %zd bytes on sd %d, %d total " , nBytes , mRtspSocket . getReadDesc ( ) , buffer . size ( ) ) ;
2013-03-17 07:45:21 +08:00
2017-11-17 20:52:26 +08:00
while ( buffer . size ( ) > 0 ) {
if ( buffer [ 0 ] = = ' $ ' ) {
2017-01-12 03:25:12 +08:00
if ( buffer . size ( ) < 4 )
break ;
2016-04-04 22:11:48 +08:00
unsigned char channel = buffer [ 1 ] ;
unsigned short len = ntohs ( * ( ( unsigned short * ) ( buffer + 2 ) ) ) ;
2013-03-17 07:45:21 +08:00
2016-04-04 22:11:48 +08:00
Debug ( 4 , " Got %d bytes left, expecting %d byte packet on channel %d " , buffer . size ( ) , len , channel ) ;
2017-11-17 20:52:26 +08:00
if ( ( unsigned short ) buffer . size ( ) < ( len + 4 ) ) {
2016-04-04 22:11:48 +08:00
Debug ( 4 , " Missing %d bytes, rereading " , ( len + 4 ) - buffer . size ( ) ) ;
break ;
}
2017-11-17 20:52:26 +08:00
if ( channel = = remoteChannels [ 0 ] ) {
2020-05-08 01:43:05 +08:00
Debug ( 4 , " Got %d bytes on data channel %d, packet length is %d " , buffer . size ( ) , channel , len ) ;
Hexdump ( 4 , ( char * ) buffer , 16 ) ;
rtpDataThread . recvPacket ( buffer + 4 , len ) ;
2019-04-29 00:05:32 +08:00
} else if ( channel = = remoteChannels [ 1 ] ) {
2016-04-04 22:11:48 +08:00
// len = ntohs( *((unsigned short *)(buffer+2)) );
// Debug( 4, "Got %d bytes on control channel %d", nBytes, channel );
2020-05-08 01:43:05 +08:00
Debug ( 4 , " Got %d bytes on control channel %d, packet length is %d " , buffer . size ( ) , channel , len ) ;
Hexdump ( 4 , ( char * ) buffer , 16 ) ;
rtpCtrlThread . recvPackets ( buffer + 4 , len ) ;
2019-04-29 00:05:32 +08:00
} else {
2020-05-08 01:43:05 +08:00
Error ( " Unexpected channel selector %d in RTSP interleaved data " , buffer [ 1 ] ) ;
2016-04-04 22:11:48 +08:00
buffer . clear ( ) ;
break ;
}
2020-05-08 01:43:05 +08:00
buffer . consume ( len + 4 ) ;
2016-04-04 22:11:48 +08:00
nBytes - = len + 4 ;
2019-04-29 00:05:32 +08:00
} else {
if ( keepaliveResponse . compare ( 0 , keepaliveResponse . size ( ) , ( char * ) buffer , keepaliveResponse . size ( ) ) = = 0 ) {
2016-04-04 22:11:48 +08:00
Debug ( 4 , " Got keepalive response '%s' " , ( char * ) buffer ) ;
//buffer.consume( keepaliveResponse.size() );
2019-04-29 00:05:32 +08:00
if ( char * charPtr = ( char * ) memchr ( ( char * ) buffer , ' $ ' , buffer . size ( ) ) ) {
2016-04-04 22:11:48 +08:00
int discardBytes = charPtr - ( char * ) buffer ;
buffer - = discardBytes ;
2019-04-29 00:05:32 +08:00
} else {
2016-04-04 22:11:48 +08:00
buffer . clear ( ) ;
}
2019-04-29 00:05:32 +08:00
} else {
if ( char * charPtr = ( char * ) memchr ( ( char * ) buffer , ' $ ' , buffer . size ( ) ) ) {
2016-04-04 22:11:48 +08:00
int discardBytes = charPtr - ( char * ) buffer ;
Warning ( " Unexpected format RTSP interleaved data, resyncing by %d bytes " , discardBytes ) ;
Hexdump ( - 1 , ( char * ) buffer , discardBytes ) ;
buffer - = discardBytes ;
2019-04-29 00:05:32 +08:00
} else {
2016-04-04 22:11:48 +08:00
Warning ( " Unexpected format RTSP interleaved data, dumping %d bytes " , buffer . size ( ) ) ;
Hexdump ( - 1 , ( char * ) buffer , 32 ) ;
buffer . clear ( ) ;
}
}
}
}
// Send a keepalive message if the server supports this feature and we are close to the timeout expiration
// FIXME: Is this really necessary when using tcp ?
2021-06-14 03:15:18 +08:00
now = std : : chrono : : steady_clock : : now ( ) ;
2016-04-04 22:11:48 +08:00
// Send a keepalive message if the server supports this feature and we are close to the timeout expiration
2021-06-14 03:15:18 +08:00
Debug ( 5 , " sendkeepalive %d, timeout % " PRIi64 " s, now: % " PRIi64 " s last: % " PRIi64 " s since: % " PRIi64 " s " ,
2021-04-29 06:13:16 +08:00
sendKeepalive ,
2021-06-14 03:15:18 +08:00
static_cast < int64 > ( Seconds ( timeout ) . count ( ) ) ,
static_cast < int64 > ( std : : chrono : : duration_cast < Seconds > ( now . time_since_epoch ( ) ) . count ( ) ) ,
static_cast < int64 > ( std : : chrono : : duration_cast < Seconds > ( lastKeepalive . time_since_epoch ( ) ) . count ( ) ) ,
static_cast < int64 > ( std : : chrono : : duration_cast < Seconds > ( ( now - lastKeepalive ) ) . count ( ) ) ) ;
if ( sendKeepalive & & ( timeout > Seconds ( 0 ) ) & & ( ( now - lastKeepalive ) > ( timeout - Seconds ( 5 ) ) ) ) {
if ( ! sendCommand ( message ) ) {
2021-03-03 02:56:35 +08:00
return ;
2021-06-14 03:15:18 +08:00
}
2016-04-04 22:11:48 +08:00
lastKeepalive = now ;
}
2021-06-14 03:15:18 +08:00
buffer . tidy ( true ) ;
2016-04-04 22:11:48 +08:00
}
2013-03-17 07:45:21 +08:00
#if 0
2016-04-04 22:11:48 +08:00
message = " PAUSE " + mUrl + " RTSP/1.0 \r \n Session: " + session + " \r \n " ;
if ( ! sendCommand ( message ) )
return ( - 1 ) ;
if ( ! recvResponse ( response ) )
return ( - 1 ) ;
2013-03-17 07:45:21 +08:00
# endif
2016-04-04 22:11:48 +08:00
// Send a teardown message but don't expect a response as this may not be implemented on the server when using TCP
message = " TEARDOWN " + mUrl + " RTSP/1.0 \r \n Session: " + session + " \r \n " ;
if ( ! sendCommand ( message ) )
2021-03-03 02:56:35 +08:00
return ;
2016-04-04 22:11:48 +08:00
delete mSources [ ssrc ] ;
mSources . clear ( ) ;
break ;
}
case RTP_MULTICAST :
{
RtpSource * source = new RtpSource ( mId , localHost , localPorts [ 0 ] , mHost , remotePorts [ 0 ] , ssrc , seq , rtpClock , rtpTime , codecId ) ;
mSources [ ssrc ] = source ;
RtpDataThread rtpDataThread ( * this , * source ) ;
RtpCtrlThread rtpCtrlThread ( * this , * source ) ;
2021-03-03 02:56:35 +08:00
while ( ! mTerminate ) {
2016-04-04 22:11:48 +08:00
// Send a keepalive message if the server supports this feature and we are close to the timeout expiration
2021-06-14 03:15:18 +08:00
if ( sendKeepalive & & ( timeout > Seconds ( 0 ) )
& & ( ( std : : chrono : : steady_clock : : now ( ) - lastKeepalive ) > ( timeout - Seconds ( 5 ) ) ) ) {
if ( ! sendCommand ( message ) ) {
2021-03-03 02:56:35 +08:00
return ;
2021-06-14 03:15:18 +08:00
}
lastKeepalive = std : : chrono : : steady_clock : : now ( ) ;
2013-03-17 07:45:21 +08:00
}
2021-06-14 02:29:53 +08:00
std : : this_thread : : sleep_for ( Microseconds ( 100 ) ) ;
2016-04-04 22:11:48 +08:00
}
#if 0
message = " PAUSE " + mUrl + " RTSP/1.0 \r \n Session: " + session + " \r \n " ;
if ( ! sendCommand ( message ) )
return ( - 1 ) ;
if ( ! recvResponse ( response ) )
return ( - 1 ) ;
# endif
message = " TEARDOWN " + mUrl + " RTSP/1.0 \r \n Session: " + session + " \r \n " ;
2019-04-29 00:05:32 +08:00
if ( ! sendCommand ( message ) )
2021-03-03 02:56:35 +08:00
return ;
2019-04-29 00:05:32 +08:00
if ( ! recvResponse ( response ) )
2021-03-03 02:56:35 +08:00
return ;
2016-04-04 22:11:48 +08:00
2021-03-03 07:40:57 +08:00
rtpDataThread . Stop ( ) ;
2021-03-03 07:35:34 +08:00
rtpCtrlThread . Stop ( ) ;
2016-04-04 22:11:48 +08:00
delete mSources [ ssrc ] ;
mSources . clear ( ) ;
releasePorts ( localPorts [ 0 ] ) ;
break ;
}
default :
2019-04-29 00:05:32 +08:00
Panic ( " Got unexpected method %d " , mMethod ) ;
2016-04-04 22:11:48 +08:00
break ;
}
2013-03-17 07:45:21 +08:00
2021-03-03 02:56:35 +08:00
return ;
2013-03-17 07:45:21 +08:00
}