1 /*
2 * RTP network protocol
3 * Copyright (c) 2002 Fabrice Bellard
4 *
5 * This file is part of FFmpeg.
6 *
7 * FFmpeg is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation; either
10 * version 2.1 of the License, or (at your option) any later version.
11 *
12 * FFmpeg is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with FFmpeg; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22 /**
23 * @file
24 * RTP protocol
25 */
26
35
36 #include <stdarg.h>
40 #include <fcntl.h>
41 #if HAVE_POLL_H
42 #include <poll.h>
43 #endif
44
65
66 #define OFFSET(x) offsetof(RTPContext, x)
67 #define D AV_OPT_FLAG_DECODING_PARAM
68 #define E AV_OPT_FLAG_ENCODING_PARAM
71 {
"buffer_size",
"Send/Receive buffer size (in bytes)",
OFFSET(buffer_size),
AV_OPT_TYPE_INT, { .i64 = -1 }, -1, INT_MAX, .flags =
D|
E },
72 {
"rtcp_port",
"Custom rtcp port",
OFFSET(rtcp_port),
AV_OPT_TYPE_INT, { .i64 = -1 }, -1, INT_MAX, .flags =
D|
E },
73 {
"local_rtpport",
"Local rtp port",
OFFSET(local_rtpport),
AV_OPT_TYPE_INT, { .i64 = -1 }, -1, INT_MAX, .flags =
D|
E },
74 {
"local_rtcpport",
"Local rtcp port",
OFFSET(local_rtcpport),
AV_OPT_TYPE_INT, { .i64 = -1 }, -1, INT_MAX, .flags =
D|
E },
76 {
"write_to_source",
"Send packets to the source address of the latest received packet",
OFFSET(write_to_source),
AV_OPT_TYPE_BOOL, { .i64 = 0 }, 0, 1, .flags =
D|
E },
77 {
"pkt_size",
"Maximum packet size",
OFFSET(pkt_size),
AV_OPT_TYPE_INT, { .i64 = -1 }, -1, INT_MAX, .flags =
D|
E },
79 {
"timeout",
"set timeout (in microseconds) of socket I/O operations",
OFFSET(rw_timeout),
AV_OPT_TYPE_INT64, { .i64 = -1 }, -1, INT64_MAX, .flags =
D|
E },
85 };
86
92 };
93
94 /**
95 * If no filename is given to av_open_input_file because you want to
96 * get the local port first, then you must call this function to set
97 * the remote server address.
98 *
99 * @param h media file context
100 * @param uri of the remote server
101 * @return zero if no error.
102 */
103
105 {
107 char hostname[256];
108 int port, rtcp_port;
109 const char *p;
110
111 char buf[1024];
112 char path[1024];
113
115 path, sizeof(path), uri);
116 rtcp_port = port + 1;
117
118 p = strchr(uri, '?');
119 if (p) {
121 rtcp_port = strtol(buf,
NULL, 10);
122 }
123 }
124
125 ff_url_join(buf,
sizeof(buf),
"udp",
NULL, hostname, port,
"%s", path);
127
128 ff_url_join(buf,
sizeof(buf),
"udp",
NULL, hostname, rtcp_port,
"%s", path);
130 return 0;
131 }
132
134 {
135 if (
ss->ss_family == AF_INET)
136 return ntohs(((
const struct sockaddr_in *)
ss)->sin_port);
137 #if HAVE_STRUCT_SOCKADDR_IN6
138 if (
ss->ss_family == AF_INET6)
139 return ntohs(((
const struct sockaddr_in6 *)
ss)->sin6_port);
140 #endif
141 return 0;
142 }
143
145 {
146 if (
ss->ss_family == AF_INET)
147 ((
struct sockaddr_in *)
ss)->sin_port = htons(port);
148 #if HAVE_STRUCT_SOCKADDR_IN6
149 else if (
ss->ss_family == AF_INET6)
150 ((
struct sockaddr_in6 *)
ss)->sin6_port = htons(port);
151 #endif
152 }
153
154 /**
155 * add option to url of the form:
156 * "http://host:port/path?option1=val1&option2=val2...
157 */
158
159 static av_printf_format(3, 4) void url_add_option(
char *buf,
int buf_size, const
char *fmt, ...)
160 {
161 char buf1[1024];
162 va_list ap;
163
164 va_start(ap, fmt);
165 if (strchr(buf, '?'))
167 else
171 va_end(ap);
172 }
173
175 char *buf, int buf_size,
176 const char *hostname,
177 const char *localaddr,
178 int port, int local_port,
179 const char *include_sources,
180 const char *exclude_sources)
181 {
183 if (local_port >= 0)
184 url_add_option(buf, buf_size, "localport=%d", local_port);
186 url_add_option(buf, buf_size,
"ttl=%d",
s->ttl);
187 if (
s->buffer_size >= 0)
188 url_add_option(buf, buf_size,
"buffer_size=%d",
s->buffer_size);
189 if (
s->pkt_size >= 0)
190 url_add_option(buf, buf_size,
"pkt_size=%d",
s->pkt_size);
192 url_add_option(buf, buf_size, "connect=1");
194 url_add_option(buf, buf_size,
"dscp=%d",
s->dscp);
195 url_add_option(buf, buf_size, "fifo_size=0");
196 if (include_sources && include_sources[0])
197 url_add_option(buf, buf_size, "sources=%s", include_sources);
198 if (exclude_sources && exclude_sources[0])
199 url_add_option(buf, buf_size, "block=%s", exclude_sources);
200 if (localaddr && localaddr[0])
201 url_add_option(buf, buf_size, "localaddr=%s", localaddr);
202 }
203
204 /**
205 * url syntax: rtp://host:port[?option=val...]
206 * option: 'ttl=n' : set the ttl value (for multicast only)
207 * 'rtcpport=n' : set the remote rtcp port to n
208 * 'localrtpport=n' : set the local rtp port to n
209 * 'localrtcpport=n' : set the local rtcp port to n
210 * 'pkt_size=n' : set max packet size
211 * 'connect=0/1' : do a connect() on the UDP socket
212 * 'sources=ip[,ip]' : list allowed source IP addresses
213 * 'block=ip[,ip]' : list disallowed source IP addresses
214 * 'write_to_source=0/1' : send packets to the source address of the latest received packet
215 * 'dscp=n' : set DSCP value to n (QoS)
216 * deprecated option:
217 * 'localport=n' : set the local port to n
218 *
219 * if rtcpport isn't set the rtcp port will be the rtp port + 1
220 * if local rtp port isn't set any available port will be used for the local
221 * rtp and rtcp ports
222 * if the local rtcp port is not set it will be the local rtp port + 1
223 */
224
226 {
229 int rtp_port;
230 char hostname[256], include_sources[1024] = "", exclude_sources[1024] = "";
231 char *
sources = include_sources, *
block = exclude_sources;
232 char *fec_protocol =
NULL;
233 char buf[1024];
234 char path[1024];
235 const char *p;
236 int i, max_retry_count = 3;
237 int rtcpflags;
238
240 path, sizeof(path), uri);
241 /* extract parameters */
242 if (
s->rtcp_port < 0)
243 s->rtcp_port = rtp_port + 1;
244
245 p = strchr(uri, '?');
246 if (p) {
248 s->ttl = strtol(buf,
NULL, 10);
249 }
251 s->rtcp_port = strtol(buf,
NULL, 10);
252 }
254 s->local_rtpport = strtol(buf,
NULL, 10);
255 }
257 s->local_rtpport = strtol(buf,
NULL, 10);
258 }
260 s->local_rtcpport = strtol(buf,
NULL, 10);
261 }
263 s->pkt_size = strtol(buf,
NULL, 10);
264 }
266 s->connect = strtol(buf,
NULL, 10);
267 }
269 s->write_to_source = strtol(buf,
NULL, 10);
270 }
272 s->dscp = strtol(buf,
NULL, 10);
273 }
275 s->rw_timeout = strtol(buf,
NULL, 10);
276 }
278 av_strlcpy(include_sources, buf,
sizeof(include_sources));
280 } else {
283 }
285 av_strlcpy(exclude_sources, buf,
sizeof(exclude_sources));
287 } else {
290 }
296 }
297 }
298 if (
s->rw_timeout >= 0)
299 h->rw_timeout =
s->rw_timeout;
300
301 if (
s->fec_options_str) {
302 p =
s->fec_options_str;
303
307 }
308 if (strcmp(fec_protocol, "prompeg")) {
311 }
312
313 p =
s->fec_options_str + strlen(fec_protocol);
314 while (*p && *p == '=') p++;
315
319 }
322 }
323 }
324
325 for (
i = 0;
i < max_retry_count;
i++) {
327 hostname,
s->localaddr, rtp_port,
s->local_rtpport,
330 NULL,
h->protocol_whitelist,
h->protocol_blacklist,
h) < 0)
333 if(
s->local_rtpport == 65535) {
334 s->local_rtpport = -1;
335 continue;
336 }
338 if (
s->local_rtcpport < 0) {
339 s->local_rtcpport =
s->local_rtpport + 1;
341 hostname,
s->localaddr,
s->rtcp_port,
s->local_rtcpport,
344 &
h->interrupt_callback,
NULL,
345 h->protocol_whitelist,
h->protocol_blacklist,
h) < 0) {
346 s->local_rtpport =
s->local_rtcpport = -1;
347 continue;
348 }
349 break;
350 }
352 hostname,
s->localaddr,
s->rtcp_port,
s->local_rtcpport,
355 NULL,
h->protocol_whitelist,
h->protocol_blacklist,
h) < 0)
357 break;
358 }
359
361 if (fec_protocol) {
364 &fec_opts,
h->protocol_whitelist,
h->protocol_blacklist,
h) < 0)
366 }
367
368 /* just to ease handle access. XXX: need to suppress direct handle
369 access */
372
373 h->max_packet_size =
s->rtp_hd->max_packet_size;
375
378
379 return 0;
380
388 }
389
391 {
394 struct pollfd p[2] = {{
s->rtp_fd, POLLIN, 0}, {
s->rtcp_fd, POLLIN, 0}};
397 socklen_t *addr_lens[2] = { &
s->last_rtp_source_len, &
s->last_rtcp_source_len };
399
400 for(;;) {
403 n = poll(p, 2, poll_delay);
404 if (n > 0) {
405 /* first try RTCP, then RTP */
406 for (
i = 1;
i >= 0;
i--) {
407 if (!(p[
i].revents & POLLIN))
408 continue;
409 *addr_lens[
i] =
sizeof(*addrs[
i]);
410 len = recvfrom(p[
i].fd, buf,
size, 0,
411 (
struct sockaddr *)addrs[
i], addr_lens[
i]);
415 continue;
417 }
419 continue;
421 }
422 }
else if (n == 0 &&
h->rw_timeout > 0 && --runs <= 0) {
424 } else if (n < 0) {
426 continue;
428 }
431 }
432 }
433
435 {
439
442
445 "make sure the RTP muxer is used\n");
446
447 if (
s->write_to_source) {
448 int fd;
450 socklen_t *source_len, temp_len;
451 if (!
s->last_rtp_source.ss_family && !
s->last_rtcp_source.ss_family) {
453 "Unable to send packet to source, no packets received yet\n");
454 // Intentionally not returning an error here
456 }
457
461 source_len = &
s->last_rtcp_source_len;
462 } else {
465 source_len = &
s->last_rtp_source_len;
466 }
469 source_len = &temp_len;
471 temp_source =
s->last_rtp_source;
472 temp_len =
s->last_rtp_source_len;
475 "Not received any RTCP packets yet, inferring peer port "
476 "from the RTP port\n");
477 } else {
478 temp_source =
s->last_rtcp_source;
479 temp_len =
s->last_rtcp_source_len;
482 "Not received any RTP packets yet, inferring peer port "
483 "from the RTCP port\n");
484 }
485 }
486
491 }
493 *source_len);
494
496 }
497
499 /* RTCP payload type */
501 } else {
502 /* RTP payload type */
504 }
505
508 }
509
513 return ret_fec;
514 }
515 }
516
518 }
519
521 {
523
525
529 return 0;
530 }
531
532 /**
533 * Return the local rtp port used by the RTP connection
534 * @param h media file context
535 * @return the local port number
536 */
537
539 {
542 }
543
544 /**
545 * Return the local rtcp port used by the RTP connection
546 * @param h media file context
547 * @return the local port number
548 */
549
551 {
554 }
555
557 int *numhandles)
558 {
560 int *hs = *handles =
av_malloc(
sizeof(**handles) * 2);
561 if (!hs)
565 *numhandles = 2;
566 return 0;
567 }
568
580 };