1 /*
2 * RTP network protocol
3 * Copyright (c) 2002 Fabrice Bellard
4 *
5 * This file is part of FFmpeg.
6 *
7 * FFmpeg is free software; you can redistribute it and/or
8 * modify it under the terms of the GNU Lesser General Public
9 * License as published by the Free Software Foundation; either
10 * version 2.1 of the License, or (at your option) any later version.
11 *
12 * FFmpeg is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * Lesser General Public License for more details.
16 *
17 * You should have received a copy of the GNU Lesser General Public
18 * License along with FFmpeg; if not, write to the Free Software
19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
20 */
21
22 /**
23 * @file
24 * RTP protocol
25 */
26
34
35 #include <stdarg.h>
39 #include <fcntl.h>
40 #if HAVE_POLL_H
41 #include <sys/poll.h>
42 #endif
43
52
53 /**
54 * If no filename is given to av_open_input_file because you want to
55 * get the local port first, then you must call this function to set
56 * the remote server address.
57 *
58 * @param h media file context
59 * @param uri of the remote server
60 * @return zero if no error.
61 */
62
64 {
66 char hostname[256];
67 int port, rtcp_port;
68 const char *p;
69
71 char path[1024];
72
73 av_url_split(NULL, 0, NULL, 0, hostname,
sizeof(hostname), &port,
74 path, sizeof(path), uri);
75 rtcp_port = port + 1;
76
77 p = strchr(uri, '?');
78 if (p) {
80 rtcp_port = strtol(buf, NULL, 10);
81 }
82 }
83
84 ff_url_join(buf,
sizeof(buf),
"udp", NULL, hostname, port,
"%s", path);
86
87 ff_url_join(buf,
sizeof(buf),
"udp", NULL, hostname, rtcp_port,
"%s", path);
89 return 0;
90 }
91
94 {
95 struct addrinfo hints = { 0 }, *res = 0;
96 int error;
97 char service[16];
98
99 snprintf(service,
sizeof(service),
"%d", port);
103 if ((error =
getaddrinfo(hostname, service, &hints, &res))) {
104 res = NULL;
106 }
107
108 return res;
109 }
110
113 {
115 return 1;
117 return (((const struct sockaddr_in *)a)->sin_addr.s_addr !=
118 ((const struct sockaddr_in *)b)->sin_addr.s_addr);
119 }
120
121 #if HAVE_STRUCT_SOCKADDR_IN6
123 const uint8_t *s6_addr_a = ((
const struct sockaddr_in6 *)a)->sin6_addr.s6_addr;
124 const uint8_t *s6_addr_b = ((
const struct sockaddr_in6 *)b)->sin6_addr.s6_addr;
125 return memcmp(s6_addr_a, s6_addr_b, 16);
126 }
127 #endif
128 return 1;
129 }
130
132 {
134 return ntohs(((const struct sockaddr_in *)ss)->sin_port);
135 #if HAVE_STRUCT_SOCKADDR_IN6
137 return ntohs(((const struct sockaddr_in6 *)ss)->sin6_port);
138 #endif
139 return 0;
140 }
141
143 {
145 ((struct sockaddr_in *)ss)->sin_port = htons(port);
146 #if HAVE_STRUCT_SOCKADDR_IN6
147 else if (ss->ss_family == AF_INET6)
148 ((struct sockaddr_in6 *)ss)->sin6_port = htons(port);
149 #endif
150 }
151
153 {
154 int i;
158 return 1;
159 }
160 }
164 return 0;
165 }
166 return 1;
167 }
168 return 0;
169 }
170
171 /**
172 * add option to url of the form:
173 * "http://host:port/path?option1=val1&option2=val2...
174 */
175
177 {
178 char buf1[1024];
179 va_list ap;
180
181 va_start(ap, fmt);
182 if (strchr(buf, '?'))
184 else
188 va_end(ap);
189 }
190
192 const char *hostname, int port,
193 int local_port, int ttl,
194 int max_packet_size, int connect,
195 const char *include_sources,
196 const char *exclude_sources)
197 {
198 ff_url_join(buf, buf_size,
"udp", NULL, hostname, port, NULL);
199 if (local_port >= 0)
200 url_add_option(buf, buf_size, "localport=%d", local_port);
201 if (ttl >= 0)
202 url_add_option(buf, buf_size, "ttl=%d", ttl);
203 if (max_packet_size >=0)
204 url_add_option(buf, buf_size, "pkt_size=%d", max_packet_size);
205 if (connect)
206 url_add_option(buf, buf_size, "connect=1");
207 url_add_option(buf, buf_size, "fifo_size=0");
208 if (include_sources && include_sources[0])
209 url_add_option(buf, buf_size, "sources=%s", include_sources);
210 if (exclude_sources && exclude_sources[0])
211 url_add_option(buf, buf_size, "block=%s", exclude_sources);
212 }
213
216 int *address_list_size_ptr)
217 {
220 char tmp =
'0円', *p =
buf, *next;
221
222 /* Resolve all of the IPs */
223
224 while (p && p[0]) {
225 next = strchr(p, ',');
226
227 if (next) {
228 tmp = *next;
229 *next = '0円';
230 }
231
233 if (ai) {
235 if (!source_addr)
236 break;
237
240 dynarray_add(address_list_ptr, address_list_size_ptr, source_addr);
241 } else {
243 }
244
245 if (next) {
246 *next = tmp;
247 p = next + 1;
248 } else {
249 p = NULL;
250 }
251 }
252 }
253
254 /**
255 * url syntax: rtp://host:port[?option=val...]
256 * option: 'ttl=n' : set the ttl value (for multicast only)
257 * 'rtcpport=n' : set the remote rtcp port to n
258 * 'localrtpport=n' : set the local rtp port to n
259 * 'localrtcpport=n' : set the local rtcp port to n
260 * 'pkt_size=n' : set max packet size
261 * 'connect=0/1' : do a connect() on the UDP socket
262 * 'sources=ip[,ip]' : list allowed source IP addresses
263 * 'block=ip[,ip]' : list disallowed source IP addresses
264 * 'write_to_source=0/1' : send packets to the source address of the latest received packet
265 * deprecated option:
266 * 'localport=n' : set the local port to n
267 *
268 * if rtcpport isn't set the rtcp port will be the rtp port + 1
269 * if local rtp port isn't set any available port will be used for the local
270 * rtp and rtcp ports
271 * if the local rtcp port is not set it will be the local rtp port + 1
272 */
273
275 {
277 int rtp_port, rtcp_port,
278 ttl, connect,
279 local_rtp_port, local_rtcp_port, max_packet_size;
280 char hostname[256], include_sources[1024] = "", exclude_sources[1024] = "";
282 char path[1024];
283 const char *p;
284 int i, max_retry_count = 3;
285
286 av_url_split(NULL, 0, NULL, 0, hostname,
sizeof(hostname), &rtp_port,
287 path, sizeof(path), uri);
288 /* extract parameters */
289 ttl = -1;
290 rtcp_port = rtp_port+1;
291 local_rtp_port = -1;
292 local_rtcp_port = -1;
293 max_packet_size = -1;
294 connect = 0;
295
296 p = strchr(uri, '?');
297 if (p) {
299 ttl = strtol(buf, NULL, 10);
300 }
302 rtcp_port = strtol(buf, NULL, 10);
303 }
305 local_rtp_port = strtol(buf, NULL, 10);
306 }
308 local_rtp_port = strtol(buf, NULL, 10);
309 }
311 local_rtcp_port = strtol(buf, NULL, 10);
312 }
314 max_packet_size = strtol(buf, NULL, 10);
315 }
317 connect = strtol(buf, NULL, 10);
318 }
321 }
323 av_strlcpy(include_sources, buf,
sizeof(include_sources));
325 }
327 av_strlcpy(exclude_sources, buf,
sizeof(exclude_sources));
329 }
330 }
331
332 for (i = 0;i < max_retry_count;i++) {
334 hostname, rtp_port, local_rtp_port, ttl, max_packet_size,
335 connect, include_sources, exclude_sources);
337 goto fail;
339 if(local_rtp_port == 65535) {
340 local_rtp_port = -1;
341 continue;
342 }
343 if (local_rtcp_port<0) {
344 local_rtcp_port = local_rtp_port + 1;
346 hostname, rtcp_port, local_rtcp_port, ttl, max_packet_size,
347 connect, include_sources, exclude_sources);
349 local_rtp_port = local_rtcp_port = -1;
350 continue;
351 }
352 break;
353 }
355 hostname, rtcp_port, local_rtcp_port, ttl, max_packet_size,
356 connect, include_sources, exclude_sources);
358 goto fail;
359 break;
360 }
361
362 /* just to ease handle access. XXX: need to suppress direct handle
363 access */
366
369 return 0;
370
371 fail:
377 }
378
380 {
383 struct pollfd p[2] = {{s->
rtp_fd, POLLIN, 0}, {s->
rtcp_fd, POLLIN, 0}};
387
388 for(;;) {
391 n = poll(p, 2, poll_delay);
392 if (n > 0) {
393 /* first try RTCP, then RTP */
394 for (i = 1; i >= 0; i--) {
395 if (!(p[i].revents & POLLIN))
396 continue;
397 *addr_lens[i] = sizeof(*addrs[i]);
398 len = recvfrom(p[i].fd, buf, size, 0,
399 (struct sockaddr *)addrs[i], addr_lens[i]);
400 if (len < 0) {
403 continue;
405 }
407 continue;
409 }
410 } else if (n < 0) {
412 continue;
414 }
417 }
419 }
420
422 {
426
427 if (size < 2)
429
431 int fd;
433 socklen_t *source_len, temp_len;
436 "Unable to send packet to source, no packets received yet\n");
437 // Intentionally not returning an error here
439 }
440
445 } else {
447 source = &s->last_rtp_source;
449 }
451 source = &temp_source;
452 source_len = &temp_len;
454 temp_source = s->last_rtp_source;
458 "Not received any RTCP packets yet, inferring peer port "
459 "from the RTP port\n");
460 } else {
465 "Not received any RTP packets yet, inferring peer port "
466 "from the RTCP port\n");
467 }
468 }
469
472 if (ret < 0)
474 }
475 ret = sendto(fd, buf, size, 0, (struct sockaddr *) source,
476 *source_len);
477
479 }
480
482 /* RTCP payload type */
484 } else {
485 /* RTP payload type */
487 }
488
491 }
492
494 {
496 int i;
497
504
507 return 0;
508 }
509
510 /**
511 * Return the local rtp port used by the RTP connection
512 * @param h media file context
513 * @return the local port number
514 */
515
517 {
520 }
521
522 /**
523 * Return the local rtcp port used by the RTP connection
524 * @param h media file context
525 * @return the local port number
526 */
527
529 {
532 }
533
535 {
538 }
539
541 int *numhandles)
542 {
544 int *hs = *handles =
av_malloc(
sizeof(**handles) * 2);
545 if (!hs)
549 *numhandles = 2;
550 return 0;
551 }
552
563 };