1
0
Fork 0
mirror of https://github.com/ossrs/srs.git synced 2025-02-24 15:04:20 +00:00
srs/trunk/src/app/srs_app_rtc_conn.cpp

3053 lines
97 KiB
C++
Raw Normal View History

2020-02-28 15:18:39 +00:00
/**
* The MIT License (MIT)
*
2020-03-31 10:03:04 +00:00
* Copyright (c) 2013-2020 John
2020-02-28 15:18:39 +00:00
*
* Permission is hereby granted, free of charge, to any person obtaining a copy of
* this software and associated documentation files (the "Software"), to deal in
* the Software without restriction, including without limitation the rights to
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
* the Software, and to permit persons to whom the Software is furnished to do so,
* subject to the following conditions:
*
* The above copyright notice and this permission notice shall be included in all
* copies or substantial portions of the Software.
*
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
*/
#include <srs_app_rtc_conn.hpp>
using namespace std;
2020-03-06 15:01:48 +00:00
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <stdlib.h>
2020-03-11 11:21:44 +00:00
#include <fcntl.h>
#include <unistd.h>
2020-03-06 15:01:48 +00:00
2020-04-13 15:40:30 +00:00
#include <netinet/udp.h>
2020-04-20 12:25:23 +00:00
// Define macro for UDP GSO.
// @see https://github.com/torvalds/linux/blob/master/tools/testing/selftests/net/udpgso.c
2020-04-13 15:40:30 +00:00
#ifndef UDP_SEGMENT
#define UDP_SEGMENT 103
#endif
2020-03-02 14:47:40 +00:00
#include <sstream>
2020-03-06 15:01:48 +00:00
#include <srs_core_autofree.hpp>
#include <srs_kernel_buffer.hpp>
2020-05-11 04:07:55 +00:00
#include <srs_kernel_rtc_rtp.hpp>
2020-02-28 15:18:39 +00:00
#include <srs_kernel_error.hpp>
2020-03-06 15:01:48 +00:00
#include <srs_kernel_log.hpp>
2020-05-11 04:07:55 +00:00
#include <srs_rtc_stun_stack.hpp>
#include <srs_rtmp_stack.hpp>
#include <srs_rtmp_msg_array.hpp>
2020-05-11 04:07:55 +00:00
#include <srs_app_rtc_dtls.hpp>
2020-03-11 11:21:44 +00:00
#include <srs_app_utility.hpp>
#include <srs_app_config.hpp>
#include <srs_app_rtc.hpp>
2020-05-11 04:07:55 +00:00
#include <srs_app_rtc_queue.hpp>
#include <srs_app_source.hpp>
#include <srs_app_server.hpp>
#include <srs_service_utility.hpp>
#include <srs_http_stack.hpp>
#include <srs_app_http_api.hpp>
2020-04-05 16:24:14 +00:00
#include <srs_app_statistic.hpp>
#include <srs_app_pithy_print.hpp>
2020-04-27 01:35:50 +00:00
#include <srs_service_st.hpp>
2020-05-11 03:45:20 +00:00
#include <srs_app_rtc_server.hpp>
2020-05-12 05:19:31 +00:00
#include <srs_app_rtc_source.hpp>
2020-02-28 15:18:39 +00:00
// The RTP payload max size, reserved some paddings for SRTP as such:
// kRtpPacketSize = kRtpMaxPayloadSize + paddings
// For example, if kRtpPacketSize is 1500, recommend to set kRtpMaxPayloadSize to 1400,
// which reserves 100 bytes for SRTP or paddings.
const int kRtpMaxPayloadSize = kRtpPacketSize - 200;
2020-05-05 23:37:00 +00:00
string gen_random_str(int len)
2020-03-06 15:01:48 +00:00
{
static string random_table = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
string ret;
ret.reserve(len);
for (int i = 0; i < len; ++i) {
ret.append(1, random_table[random() % random_table.size()]);
}
return ret;
}
const int SRTP_MASTER_KEY_KEY_LEN = 16;
const int SRTP_MASTER_KEY_SALT_LEN = 14;
2020-04-23 09:08:21 +00:00
uint64_t SrsNtp::kMagicNtpFractionalUnit = 1ULL << 32;
SrsNtp::SrsNtp()
{
system_ms_ = 0;
ntp_ = 0;
ntp_second_ = 0;
ntp_fractions_ = 0;
}
SrsNtp::~SrsNtp()
{
}
SrsNtp SrsNtp::from_time_ms(uint64_t ms)
{
SrsNtp srs_ntp;
srs_ntp.system_ms_ = ms;
srs_ntp.ntp_second_ = ms / 1000;
srs_ntp.ntp_fractions_ = (static_cast<double>(ms % 1000 / 1000.0)) * kMagicNtpFractionalUnit;
srs_ntp.ntp_ = (static_cast<uint64_t>(srs_ntp.ntp_second_) << 32) | srs_ntp.ntp_fractions_;
return srs_ntp;
}
SrsNtp SrsNtp::to_time_ms(uint64_t ntp)
{
SrsNtp srs_ntp;
srs_ntp.ntp_ = ntp;
srs_ntp.ntp_second_ = (ntp & 0xFFFFFFFF00000000ULL) >> 32;
srs_ntp.ntp_fractions_ = (ntp & 0x00000000FFFFFFFFULL);
srs_ntp.system_ms_ = (static_cast<uint64_t>(srs_ntp.ntp_second_) * 1000) +
(static_cast<double>(static_cast<uint64_t>(srs_ntp.ntp_fractions_) * 1000.0) / kMagicNtpFractionalUnit);
return srs_ntp;
}
2020-05-03 05:49:53 +00:00
SrsRtcDtls::SrsRtcDtls(SrsRtcSession* s)
2020-03-06 15:01:48 +00:00
{
2020-05-03 05:49:53 +00:00
session_ = s;
2020-03-06 15:01:48 +00:00
dtls = NULL;
bio_in = NULL;
bio_out = NULL;
client_key = "";
server_key = "";
srtp_send = NULL;
srtp_recv = NULL;
handshake_done = false;
}
2020-05-03 05:49:53 +00:00
SrsRtcDtls::~SrsRtcDtls()
2020-03-06 15:01:48 +00:00
{
if (dtls) {
// this function will free bio_in and bio_out
SSL_free(dtls);
dtls = NULL;
}
if (srtp_send) {
srtp_dealloc(srtp_send);
}
if (srtp_recv) {
srtp_dealloc(srtp_recv);
}
2020-03-06 15:01:48 +00:00
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::initialize(SrsRequest* r)
2020-03-30 07:16:29 +00:00
{
srs_error_t err = srs_success;
2020-04-26 08:12:23 +00:00
if ((err = SrsDtls::instance()->init(r)) != srs_success) {
2020-04-03 07:03:09 +00:00
return srs_error_wrap(err, "DTLS init");
}
2020-04-03 07:08:52 +00:00
// TODO: FIXME: Support config by vhost to use RSA or ECDSA certificate.
2020-03-30 07:16:29 +00:00
if ((dtls = SSL_new(SrsDtls::instance()->get_dtls_ctx())) == NULL) {
return srs_error_new(ERROR_OpenSslCreateSSL, "SSL_new dtls");
}
// Dtls setup passive, as server role.
SSL_set_accept_state(dtls);
if ((bio_in = BIO_new(BIO_s_mem())) == NULL) {
return srs_error_new(ERROR_OpenSslBIONew, "BIO_new in");
}
if ((bio_out = BIO_new(BIO_s_mem())) == NULL) {
BIO_free(bio_in);
return srs_error_new(ERROR_OpenSslBIONew, "BIO_new out");
}
SSL_set_bio(dtls, bio_in, bio_out);
return err;
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::handshake()
2020-03-06 15:01:48 +00:00
{
srs_error_t err = srs_success;
2020-04-09 00:20:55 +00:00
int ret = SSL_do_handshake(dtls);
2020-03-06 15:01:48 +00:00
unsigned char *out_bio_data;
int out_bio_len = BIO_get_mem_data(bio_out, &out_bio_data);
int ssl_err = SSL_get_error(dtls, ret);
switch(ssl_err) {
case SSL_ERROR_NONE: {
2020-04-30 06:49:37 +00:00
if ((err = on_dtls_handshake_done()) != srs_success) {
return srs_error_wrap(err, "dtls handshake done handle");
}
break;
2020-03-06 15:01:48 +00:00
}
case SSL_ERROR_WANT_READ: {
break;
}
case SSL_ERROR_WANT_WRITE: {
break;
}
default: {
break;
}
}
2020-04-27 01:35:50 +00:00
if (out_bio_len) {
2020-05-03 05:49:53 +00:00
if ((err = session_->sendonly_skt->sendto(out_bio_data, out_bio_len, 0)) != srs_success) {
return srs_error_wrap(err, "send dtls packet");
}
2020-03-06 15:01:48 +00:00
}
2020-05-03 05:49:53 +00:00
if (session_->blackhole && session_->blackhole_addr && session_->blackhole_stfd) {
2020-04-27 01:35:50 +00:00
// Ignore any error for black-hole.
2020-05-03 05:49:53 +00:00
void* p = out_bio_data; int len = out_bio_len; SrsRtcSession* s = session_;
2020-04-27 01:35:50 +00:00
srs_sendto(s->blackhole_stfd, p, len, (sockaddr*)s->blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
}
2020-03-06 15:01:48 +00:00
return err;
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::on_dtls(char* data, int nb_data)
2020-03-06 15:01:48 +00:00
{
srs_error_t err = srs_success;
2020-04-09 00:20:55 +00:00
if (BIO_reset(bio_in) != 1) {
return srs_error_new(ERROR_OpenSslBIOReset, "BIO_reset");
}
if (BIO_reset(bio_out) != 1) {
return srs_error_new(ERROR_OpenSslBIOReset, "BIO_reset");
}
2020-03-06 15:01:48 +00:00
2020-04-30 06:49:37 +00:00
if (BIO_write(bio_in, data, nb_data) <= 0) {
// TODO: 0 or -1 maybe block, use BIO_should_retry to check.
return srs_error_new(ERROR_OpenSslBIOWrite, "BIO_write");
}
2020-03-06 15:01:48 +00:00
2020-05-03 05:49:53 +00:00
if (session_->blackhole && session_->blackhole_addr && session_->blackhole_stfd) {
2020-04-27 01:35:50 +00:00
// Ignore any error for black-hole.
2020-05-03 05:49:53 +00:00
void* p = data; int len = nb_data; SrsRtcSession* s = session_;
2020-04-27 01:35:50 +00:00
srs_sendto(s->blackhole_stfd, p, len, (sockaddr*)s->blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
}
if (!handshake_done) {
2020-04-30 06:49:37 +00:00
err = handshake();
} else {
2020-03-06 15:01:48 +00:00
while (BIO_ctrl_pending(bio_in) > 0) {
char dtls_read_buf[8092];
int nb = SSL_read(dtls, dtls_read_buf, sizeof(dtls_read_buf));
if (nb > 0) {
if ((err =on_dtls_application_data(dtls_read_buf, nb)) != srs_success) {
return srs_error_wrap(err, "dtls application data process");
}
2020-03-06 15:01:48 +00:00
}
}
}
2020-04-09 00:20:55 +00:00
return err;
2020-03-06 15:01:48 +00:00
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::on_dtls_handshake_done()
2020-03-07 16:30:31 +00:00
{
srs_error_t err = srs_success;
2020-05-03 05:49:53 +00:00
srs_trace("rtc session=%s, DTLS handshake done.", session_->id().c_str());
2020-03-07 16:30:31 +00:00
handshake_done = true;
if ((err = srtp_initialize()) != srs_success) {
return srs_error_wrap(err, "srtp init failed");
}
2020-05-03 05:49:53 +00:00
return session_->on_connection_established();
2020-03-07 16:30:31 +00:00
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::on_dtls_application_data(const char* buf, const int nb_buf)
2020-03-06 15:01:48 +00:00
{
srs_error_t err = srs_success;
// TODO: process SCTP protocol(WebRTC datachannel support)
2020-03-06 15:01:48 +00:00
return err;
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::srtp_initialize()
2020-03-06 15:01:48 +00:00
{
srs_error_t err = srs_success;
2020-04-09 00:20:55 +00:00
unsigned char material[SRTP_MASTER_KEY_LEN * 2] = {0}; // client(SRTP_MASTER_KEY_KEY_LEN + SRTP_MASTER_KEY_SALT_LEN) + server
static const string dtls_srtp_lable = "EXTRACTOR-dtls_srtp";
2020-04-27 01:35:50 +00:00
if (!SSL_export_keying_material(dtls, material, sizeof(material), dtls_srtp_lable.c_str(), dtls_srtp_lable.size(), NULL, 0, 0)) {
return srs_error_new(ERROR_RTC_SRTP_INIT, "SSL_export_keying_material failed");
2020-04-30 06:49:37 +00:00
}
2020-03-06 15:01:48 +00:00
2020-04-09 00:20:55 +00:00
size_t offset = 0;
2020-03-06 15:01:48 +00:00
2020-04-09 00:20:55 +00:00
std::string client_master_key(reinterpret_cast<char*>(material), SRTP_MASTER_KEY_KEY_LEN);
offset += SRTP_MASTER_KEY_KEY_LEN;
std::string server_master_key(reinterpret_cast<char*>(material + offset), SRTP_MASTER_KEY_KEY_LEN);
offset += SRTP_MASTER_KEY_KEY_LEN;
std::string client_master_salt(reinterpret_cast<char*>(material + offset), SRTP_MASTER_KEY_SALT_LEN);
offset += SRTP_MASTER_KEY_SALT_LEN;
std::string server_master_salt(reinterpret_cast<char*>(material + offset), SRTP_MASTER_KEY_SALT_LEN);
2020-03-06 15:01:48 +00:00
2020-04-09 00:20:55 +00:00
client_key = client_master_key + client_master_salt;
server_key = server_master_key + server_master_salt;
2020-03-06 15:01:48 +00:00
if ((err = srtp_send_init()) != srs_success) {
return srs_error_wrap(err, "srtp send init failed");
2020-03-07 16:30:31 +00:00
}
if ((err = srtp_recv_init()) != srs_success) {
return srs_error_wrap(err, "srtp recv init failed");
2020-03-07 16:30:31 +00:00
}
return err;
2020-03-06 15:01:48 +00:00
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::srtp_send_init()
2020-03-06 15:01:48 +00:00
{
srs_error_t err = srs_success;
srtp_policy_t policy;
bzero(&policy, sizeof(policy));
2020-04-02 04:28:47 +00:00
// TODO: Maybe we can use SRTP-GCM in future.
// @see https://bugs.chromium.org/p/chromium/issues/detail?id=713701
// @see https://groups.google.com/forum/#!topic/discuss-webrtc/PvCbWSetVAQ
2020-03-06 15:01:48 +00:00
srtp_crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtp);
srtp_crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtcp);
policy.ssrc.type = ssrc_any_outbound;
2020-04-30 06:49:37 +00:00
2020-03-06 15:01:48 +00:00
policy.ssrc.value = 0;
2020-03-07 16:30:31 +00:00
// TODO: adjust window_size
policy.window_size = 8192;
2020-03-06 15:01:48 +00:00
policy.allow_repeat_tx = 1;
policy.next = NULL;
2020-03-30 07:16:29 +00:00
uint8_t *key = new uint8_t[server_key.size()];
memcpy(key, server_key.data(), server_key.size());
2020-03-06 15:01:48 +00:00
policy.key = key;
2020-03-30 07:16:29 +00:00
if (srtp_create(&srtp_send, &policy) != srtp_err_status_ok) {
srs_freepa(key);
return srs_error_new(ERROR_RTC_SRTP_INIT, "srtp_create failed");
2020-03-06 15:01:48 +00:00
}
srs_freepa(key);
2020-03-06 15:01:48 +00:00
return err;
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::srtp_recv_init()
2020-03-06 15:01:48 +00:00
{
srs_error_t err = srs_success;
srtp_policy_t policy;
bzero(&policy, sizeof(policy));
srtp_crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtp);
srtp_crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtcp);
policy.ssrc.type = ssrc_any_inbound;
policy.ssrc.value = 0;
2020-03-07 16:30:31 +00:00
// TODO: adjust window_size
policy.window_size = 8192;
2020-03-06 15:01:48 +00:00
policy.allow_repeat_tx = 1;
policy.next = NULL;
2020-03-30 07:16:29 +00:00
uint8_t *key = new uint8_t[client_key.size()];
memcpy(key, client_key.data(), client_key.size());
2020-03-06 15:01:48 +00:00
policy.key = key;
2020-03-30 07:16:29 +00:00
if (srtp_create(&srtp_recv, &policy) != srtp_err_status_ok) {
srs_freepa(key);
return srs_error_new(ERROR_RTC_SRTP_INIT, "srtp_create failed");
2020-03-06 15:01:48 +00:00
}
srs_freepa(key);
2020-03-06 15:01:48 +00:00
2020-03-02 14:47:40 +00:00
return err;
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::protect_rtp(char* out_buf, const char* in_buf, int& nb_out_buf)
{
srs_error_t err = srs_success;
if (srtp_send) {
memcpy(out_buf, in_buf, nb_out_buf);
if (srtp_protect(srtp_send, out_buf, &nb_out_buf) != 0) {
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtp protect failed");
}
return err;
}
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtp protect failed");
}
2020-05-02 02:24:31 +00:00
// TODO: FIXME: Merge with protect_rtp.
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::protect_rtp2(void* rtp_hdr, int* len_ptr)
{
srs_error_t err = srs_success;
if (!srtp_send) {
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtp protect");
}
2020-04-13 07:24:41 +00:00
if (srtp_protect(srtp_send, rtp_hdr, len_ptr) != 0) {
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtp protect");
}
return err;
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::unprotect_rtp(char* out_buf, const char* in_buf, int& nb_out_buf)
{
srs_error_t err = srs_success;
if (srtp_recv) {
memcpy(out_buf, in_buf, nb_out_buf);
if (srtp_unprotect(srtp_recv, out_buf, &nb_out_buf) != 0) {
return srs_error_new(ERROR_RTC_SRTP_UNPROTECT, "rtp unprotect failed");
}
return err;
}
return srs_error_new(ERROR_RTC_SRTP_UNPROTECT, "rtp unprotect failed");
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::protect_rtcp(char* out_buf, const char* in_buf, int& nb_out_buf)
2020-03-10 11:47:49 +00:00
{
srs_error_t err = srs_success;
if (srtp_send) {
memcpy(out_buf, in_buf, nb_out_buf);
if (srtp_protect_rtcp(srtp_send, out_buf, &nb_out_buf) != 0) {
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtcp protect failed");
}
return err;
}
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtcp protect failed");
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcDtls::unprotect_rtcp(char* out_buf, const char* in_buf, int& nb_out_buf)
{
srs_error_t err = srs_success;
if (srtp_recv) {
memcpy(out_buf, in_buf, nb_out_buf);
2020-03-30 07:16:29 +00:00
if (srtp_unprotect_rtcp(srtp_recv, out_buf, &nb_out_buf) != srtp_err_status_ok) {
return srs_error_new(ERROR_RTC_SRTP_UNPROTECT, "rtcp unprotect failed");
2020-03-10 11:47:49 +00:00
}
return err;
}
return srs_error_new(ERROR_RTC_SRTP_UNPROTECT, "rtcp unprotect failed");
2020-03-10 11:47:49 +00:00
}
2020-05-03 05:49:53 +00:00
SrsRtcOutgoingPackets::SrsRtcOutgoingPackets(int nn_cache_max)
2020-04-13 08:50:24 +00:00
{
2020-04-16 01:25:18 +00:00
#if defined(SRS_DEBUG)
debug_id = 0;
#endif
2020-04-15 13:59:27 +00:00
use_gso = false;
should_merge_nalus = false;
2020-04-13 08:50:24 +00:00
2020-04-13 09:11:46 +00:00
nn_rtp_pkts = 0;
nn_audios = nn_extras = 0;
nn_videos = nn_samples = 0;
2020-04-17 08:36:56 +00:00
nn_bytes = nn_rtp_bytes = 0;
2020-04-16 02:05:17 +00:00
nn_padding_bytes = nn_paddings = 0;
2020-04-17 04:30:53 +00:00
nn_dropped = 0;
2020-04-15 14:46:06 +00:00
cursor = 0;
2020-04-18 12:37:08 +00:00
nn_cache = nn_cache_max;
2020-04-19 01:32:09 +00:00
// TODO: FIXME: We should allocate a smaller cache, and increase it when exhausted.
2020-04-18 12:37:08 +00:00
cache = new SrsRtpPacket2[nn_cache];
2020-04-13 08:50:24 +00:00
}
2020-05-03 05:49:53 +00:00
SrsRtcOutgoingPackets::~SrsRtcOutgoingPackets()
2020-04-13 08:50:24 +00:00
{
2020-04-18 12:37:08 +00:00
srs_freepa(cache);
nn_cache = 0;
2020-04-15 13:59:27 +00:00
}
2020-05-03 05:49:53 +00:00
void SrsRtcOutgoingPackets::reset(bool gso, bool merge_nalus)
2020-04-15 13:59:27 +00:00
{
2020-04-15 14:46:06 +00:00
for (int i = 0; i < cursor; i++) {
2020-04-18 12:37:08 +00:00
SrsRtpPacket2* packet = cache + i;
2020-04-15 14:46:06 +00:00
packet->reset();
2020-04-13 08:50:24 +00:00
}
2020-04-16 01:07:42 +00:00
2020-04-16 01:25:18 +00:00
#if defined(SRS_DEBUG)
debug_id++;
#endif
2020-04-13 15:40:30 +00:00
use_gso = gso;
2020-04-13 08:50:24 +00:00
should_merge_nalus = merge_nalus;
2020-04-13 09:11:46 +00:00
nn_rtp_pkts = 0;
nn_audios = nn_extras = 0;
nn_videos = nn_samples = 0;
2020-04-17 08:36:56 +00:00
nn_bytes = nn_rtp_bytes = 0;
2020-04-16 02:05:17 +00:00
nn_padding_bytes = nn_paddings = 0;
2020-04-17 04:30:53 +00:00
nn_dropped = 0;
2020-04-15 14:46:06 +00:00
cursor = 0;
2020-04-13 08:50:24 +00:00
}
2020-05-03 05:49:53 +00:00
SrsRtpPacket2* SrsRtcOutgoingPackets::fetch()
2020-04-13 08:50:24 +00:00
{
2020-04-18 12:37:08 +00:00
if (cursor >= nn_cache) {
return NULL;
2020-04-13 08:50:24 +00:00
}
2020-04-18 12:37:08 +00:00
return cache + (cursor++);
2020-04-15 14:46:06 +00:00
}
2020-05-03 05:49:53 +00:00
SrsRtpPacket2* SrsRtcOutgoingPackets::back()
2020-04-15 14:46:06 +00:00
{
srs_assert(cursor > 0);
2020-04-18 12:37:08 +00:00
return cache + cursor - 1;
2020-04-15 14:46:06 +00:00
}
2020-05-03 05:49:53 +00:00
int SrsRtcOutgoingPackets::size()
2020-04-15 14:46:06 +00:00
{
return cursor;
}
2020-05-03 05:49:53 +00:00
int SrsRtcOutgoingPackets::capacity()
2020-04-16 04:35:36 +00:00
{
2020-04-18 12:37:08 +00:00
return nn_cache;
2020-04-16 04:35:36 +00:00
}
2020-05-03 05:49:53 +00:00
SrsRtpPacket2* SrsRtcOutgoingPackets::at(int index)
2020-04-15 14:46:06 +00:00
{
srs_assert(index < cursor);
2020-04-18 12:37:08 +00:00
return cache + index;
2020-04-13 08:50:24 +00:00
}
SrsRtcPlayer::SrsRtcPlayer(SrsRtcSession* s, int parent_cid)
{
_parent_cid = parent_cid;
trd = new SrsDummyCoroutine();
2020-05-03 05:49:53 +00:00
session_ = s;
2020-04-16 11:33:10 +00:00
2020-04-13 08:50:24 +00:00
gso = false;
merge_nalus = false;
2020-04-15 07:58:17 +00:00
max_padding = 0;
2020-04-11 09:52:14 +00:00
2020-04-11 10:39:46 +00:00
audio_timestamp = 0;
audio_sequence = 0;
video_sequence = 0;
2020-04-13 08:50:24 +00:00
mw_sleep = 0;
mw_msgs = 0;
realtime = true;
2020-05-04 06:47:58 +00:00
// TODO: FIXME: Config the capacity?
audio_queue_ = new SrsRtpRingBuffer<SrsRtpPacket2*>(100);
video_queue_ = new SrsRtpRingBuffer<SrsRtpPacket2*>(1000);
2020-05-04 06:47:58 +00:00
nn_simulate_nack_drop = 0;
2020-05-04 12:42:30 +00:00
nack_enabled_ = false;
2020-05-04 06:47:58 +00:00
2020-04-13 08:50:24 +00:00
_srs_config->subscribe(this);
}
SrsRtcPlayer::~SrsRtcPlayer()
{
2020-04-13 08:50:24 +00:00
_srs_config->unsubscribe(this);
srs_freep(trd);
2020-05-04 06:47:58 +00:00
srs_freep(audio_queue_);
srs_freep(video_queue_);
}
srs_error_t SrsRtcPlayer::initialize(const uint32_t& vssrc, const uint32_t& assrc, const uint16_t& v_pt, const uint16_t& a_pt)
2020-03-30 07:16:29 +00:00
{
srs_error_t err = srs_success;
video_ssrc = vssrc;
audio_ssrc = assrc;
video_payload_type = v_pt;
audio_payload_type = a_pt;
2020-04-13 08:50:24 +00:00
gso = _srs_config->get_rtc_server_gso();
merge_nalus = _srs_config->get_rtc_server_merge_nalus();
2020-04-15 07:58:17 +00:00
max_padding = _srs_config->get_rtc_server_padding();
2020-05-04 12:42:30 +00:00
// TODO: FIXME: Support reload.
nack_enabled_ = _srs_config->get_rtc_nack_enabled(session_->req->vhost);
srs_trace("RTC publisher video(ssrc=%d, pt=%d), audio(ssrc=%d, pt=%d), package(gso=%d, merge_nalus=%d), padding=%d, nack=%d",
video_ssrc, video_payload_type, audio_ssrc, audio_payload_type, gso, merge_nalus, max_padding, nack_enabled_);
2020-04-13 08:50:24 +00:00
2020-03-30 07:16:29 +00:00
return err;
}
srs_error_t SrsRtcPlayer::on_reload_rtc_server()
2020-04-13 08:50:24 +00:00
{
gso = _srs_config->get_rtc_server_gso();
merge_nalus = _srs_config->get_rtc_server_merge_nalus();
max_padding = _srs_config->get_rtc_server_padding();
2020-04-13 08:50:24 +00:00
srs_trace("Reload rtc_server gso=%d, merge_nalus=%d, max_padding=%d", gso, merge_nalus, max_padding);
2020-04-13 08:50:24 +00:00
return srs_success;
}
srs_error_t SrsRtcPlayer::on_reload_vhost_play(string vhost)
{
2020-05-03 05:49:53 +00:00
SrsRequest* req = session_->req;
if (req->vhost != vhost) {
return srs_success;
2020-04-13 08:50:24 +00:00
}
realtime = _srs_config->get_realtime_enabled(req->vhost, true);
mw_msgs = _srs_config->get_mw_msgs(req->vhost, realtime, true);
mw_sleep = _srs_config->get_mw_sleep(req->vhost, true);
srs_trace("Reload play realtime=%d, mw_msgs=%d, mw_sleep=%d", realtime, mw_msgs, mw_sleep);
2020-04-13 08:50:24 +00:00
return srs_success;
}
srs_error_t SrsRtcPlayer::on_reload_vhost_realtime(string vhost)
{
return on_reload_vhost_play(vhost);
}
int SrsRtcPlayer::cid()
{
return trd->cid();
}
srs_error_t SrsRtcPlayer::start()
{
srs_error_t err = srs_success;
2020-04-30 06:49:37 +00:00
srs_freep(trd);
trd = new SrsSTCoroutine("rtc_sender", this, _parent_cid);
2020-04-30 06:49:37 +00:00
if ((err = trd->start()) != srs_success) {
return srs_error_wrap(err, "rtc_sender");
}
2020-04-30 06:49:37 +00:00
return err;
}
void SrsRtcPlayer::stop()
{
trd->stop();
}
void SrsRtcPlayer::stop_loop()
2020-02-28 15:18:39 +00:00
{
trd->interrupt();
}
srs_error_t SrsRtcPlayer::cycle()
{
srs_error_t err = srs_success;
2020-05-12 05:19:31 +00:00
SrsRtcSource* source = NULL;
2020-05-03 05:49:53 +00:00
SrsRequest* req = session_->req;
2020-05-12 05:19:31 +00:00
if ((err = _srs_rtc_sources->fetch_or_create(req, &source)) != srs_success) {
return srs_error_wrap(err, "rtc fetch source failed");
}
2020-05-12 05:19:31 +00:00
SrsRtcConsumer* consumer = NULL;
SrsAutoFree(SrsRtcConsumer, consumer);
if ((err = source->create_consumer(NULL, consumer)) != srs_success) {
2020-04-18 02:35:30 +00:00
return srs_error_wrap(err, "rtc create consumer, source url=%s", req->get_stream_url().c_str());
}
// TODO: FIXME: Dumps the SPS/PPS from gop cache, without other frames.
if ((err = source->consumer_dumps(consumer)) != srs_success) {
return srs_error_wrap(err, "dumps consumer, source url=%s", req->get_stream_url().c_str());
}
realtime = _srs_config->get_realtime_enabled(req->vhost, true);
mw_sleep = _srs_config->get_mw_sleep(req->vhost, true);
mw_msgs = _srs_config->get_mw_msgs(req->vhost, realtime, true);
2020-04-18 02:35:30 +00:00
// We merged write more messages, so we need larger queue.
2020-05-03 05:49:53 +00:00
ISrsUdpSender* sender = session_->sendonly_skt->sender();
2020-04-18 02:35:30 +00:00
if (mw_msgs > 2) {
sender->set_extra_ratio(150);
} else if (mw_msgs > 0) {
sender->set_extra_ratio(80);
}
srs_trace("RTC source url=%s, source_id=[%d][%d], encrypt=%d, realtime=%d, mw_sleep=%dms, mw_msgs=%d", req->get_stream_url().c_str(),
2020-05-03 05:49:53 +00:00
::getpid(), source->source_id(), session_->encrypt, realtime, srsu2msi(mw_sleep), mw_msgs);
SrsMessageArray msgs(SRS_PERF_MW_MSGS);
2020-05-03 05:49:53 +00:00
SrsRtcOutgoingPackets pkts(SRS_PERF_RTC_RTP_PACKETS);
SrsPithyPrint* pprint = SrsPithyPrint::create_rtc_play();
SrsAutoFree(SrsPithyPrint, pprint);
2020-05-03 05:49:53 +00:00
srs_trace("rtc session=%s, start play", session_->id().c_str());
bool stat_enabled = _srs_config->get_rtc_server_perf_stat();
2020-04-14 05:47:23 +00:00
SrsStatistic* stat = SrsStatistic::instance();
2020-04-09 06:34:48 +00:00
while (true) {
2020-04-09 00:20:55 +00:00
if ((err = trd->pull()) != srs_success) {
return srs_error_wrap(err, "rtc sender thread");
}
#ifdef SRS_PERF_QUEUE_COND_WAIT
2020-04-18 00:33:35 +00:00
// Wait for amount of messages or a duration.
consumer->wait(mw_msgs, mw_sleep);
#endif
2020-04-18 00:33:35 +00:00
// Try to read some messages.
int msg_count = 0;
if ((err = consumer->dump_packets(&msgs, msg_count)) != srs_success) {
continue;
}
if (msg_count <= 0) {
#ifndef SRS_PERF_QUEUE_COND_WAIT
srs_usleep(mw_sleep);
#endif
continue;
}
2020-04-15 13:59:27 +00:00
// Transmux and send out messages.
pkts.reset(gso, merge_nalus);
2020-04-16 11:33:10 +00:00
if ((err = send_messages(source, msgs.msgs, msg_count, pkts)) != srs_success) {
srs_warn("send err %s", srs_error_summary(err).c_str()); srs_error_reset(err);
}
2020-04-15 13:59:27 +00:00
// Do cleanup messages.
for (int i = 0; i < msg_count; i++) {
SrsSharedPtrMessage* msg = msgs.msgs[i];
srs_freep(msg);
}
// Stat for performance analysis.
2020-04-18 12:37:08 +00:00
if (!stat_enabled) {
continue;
}
2020-04-14 13:49:49 +00:00
// Stat the original RAW AV frame, maybe h264+aac.
stat->perf_on_msgs(msg_count);
// Stat the RTC packets, RAW AV frame, maybe h.264+opus.
2020-04-14 23:10:41 +00:00
int nn_rtc_packets = srs_max(pkts.nn_audios, pkts.nn_extras) + pkts.nn_videos;
stat->perf_on_rtc_packets(nn_rtc_packets);
2020-04-14 13:49:49 +00:00
// Stat the RAW RTP packets, which maybe group by GSO.
2020-04-18 12:37:08 +00:00
stat->perf_on_rtp_packets(pkts.size());
2020-04-14 13:49:49 +00:00
// Stat the RTP packets going into kernel.
2020-04-14 22:44:09 +00:00
stat->perf_on_gso_packets(pkts.nn_rtp_pkts);
2020-04-18 12:37:08 +00:00
// Stat the bytes and paddings.
stat->perf_on_rtc_bytes(pkts.nn_bytes, pkts.nn_rtp_bytes, pkts.nn_padding_bytes);
// Stat the messages and dropped count.
stat->perf_on_dropped(msg_count, nn_rtc_packets, pkts.nn_dropped);
2020-04-17 08:36:56 +00:00
2020-04-14 23:10:41 +00:00
#if defined(SRS_DEBUG)
2020-04-18 12:37:08 +00:00
srs_trace("RTC PLAY perf, msgs %d/%d, rtp %d, gso %d, %d audios, %d extras, %d videos, %d samples, %d/%d/%d bytes",
msg_count, nn_rtc_packets, pkts.size(), pkts.nn_rtp_pkts, pkts.nn_audios, pkts.nn_extras, pkts.nn_videos,
pkts.nn_samples, pkts.nn_bytes, pkts.nn_rtp_bytes, pkts.nn_padding_bytes);
2020-04-14 23:10:41 +00:00
#endif
2020-04-14 05:47:23 +00:00
2020-04-10 11:21:47 +00:00
pprint->elapse();
if (pprint->can_print()) {
// TODO: FIXME: Print stat like frame/s, packet/s, loss_packets.
2020-04-17 08:36:56 +00:00
srs_trace("-> RTC PLAY %d/%d msgs, %d/%d packets, %d audios, %d extras, %d videos, %d samples, %d/%d/%d bytes, %d pad, %d/%d cache",
2020-04-17 04:30:53 +00:00
msg_count, pkts.nn_dropped, pkts.size(), pkts.nn_rtp_pkts, pkts.nn_audios, pkts.nn_extras, pkts.nn_videos, pkts.nn_samples, pkts.nn_bytes,
2020-04-17 08:36:56 +00:00
pkts.nn_rtp_bytes, pkts.nn_padding_bytes, pkts.nn_paddings, pkts.size(), pkts.capacity());
2020-04-10 11:21:47 +00:00
}
}
}
srs_error_t SrsRtcPlayer::send_messages(
2020-05-12 05:19:31 +00:00
SrsRtcSource* source, SrsSharedPtrMessage** msgs, int nb_msgs, SrsRtcOutgoingPackets& packets
) {
srs_error_t err = srs_success;
2020-04-17 04:30:53 +00:00
// If DTLS is not OK, drop all messages.
2020-05-03 05:49:53 +00:00
if (!session_->dtls_) {
return err;
2020-04-09 11:38:50 +00:00
}
2020-04-13 05:58:34 +00:00
// Covert kernel messages to RTP packets.
2020-04-13 07:24:41 +00:00
if ((err = messages_to_packets(source, msgs, nb_msgs, packets)) != srs_success) {
2020-04-13 15:40:30 +00:00
return srs_error_wrap(err, "messages to packets");
2020-04-13 07:24:41 +00:00
}
#ifndef SRS_OSX
2020-04-13 15:40:30 +00:00
// If enabled GSO, send out some packets in a msghdr.
2020-05-04 06:47:58 +00:00
// @remark When NACK simulator is on, we don't use GSO.
if (packets.use_gso && !nn_simulate_nack_drop) {
2020-04-16 11:33:10 +00:00
if ((err = send_packets_gso(packets)) != srs_success) {
2020-04-13 15:40:30 +00:00
return srs_error_wrap(err, "gso send");
}
2020-04-13 08:50:24 +00:00
return err;
2020-04-13 07:24:41 +00:00
}
2020-04-13 15:40:30 +00:00
#endif
// By default, we send packets by sendmmsg.
2020-04-16 11:33:10 +00:00
if ((err = send_packets(packets)) != srs_success) {
2020-04-13 15:40:30 +00:00
return srs_error_wrap(err, "raw send");
}
2020-04-13 07:24:41 +00:00
return err;
}
srs_error_t SrsRtcPlayer::messages_to_packets(
2020-05-12 05:19:31 +00:00
SrsRtcSource* source, SrsSharedPtrMessage** msgs, int nb_msgs, SrsRtcOutgoingPackets& packets
2020-04-13 07:24:41 +00:00
) {
srs_error_t err = srs_success;
2020-04-09 01:56:13 +00:00
2020-05-03 05:49:53 +00:00
ISrsUdpSender* sender = session_->sendonly_skt->sender();
2020-04-30 10:19:40 +00:00
2020-04-09 00:20:55 +00:00
for (int i = 0; i < nb_msgs; i++) {
SrsSharedPtrMessage* msg = msgs[i];
2020-04-11 09:52:14 +00:00
2020-04-17 04:30:53 +00:00
// If overflow, drop all messages.
if (sender->overflow()) {
packets.nn_dropped += nb_msgs - i;
return err;
}
2020-04-13 09:11:46 +00:00
// Update stats.
2020-04-13 08:50:24 +00:00
packets.nn_bytes += msg->size;
2020-04-13 09:11:46 +00:00
int nn_extra_payloads = msg->nn_extra_payloads();
packets.nn_extras += nn_extra_payloads;
int nn_samples = msg->nn_samples();
packets.nn_samples += nn_samples;
// For audio, we transcoded AAC to opus in extra payloads.
2020-04-13 05:58:34 +00:00
if (msg->is_audio()) {
2020-04-13 08:50:24 +00:00
packets.nn_audios++;
2020-04-13 09:11:46 +00:00
for (int i = 0; i < nn_extra_payloads; i++) {
2020-04-11 09:52:14 +00:00
SrsSample* sample = msg->extra_payloads() + i;
2020-04-30 02:00:07 +00:00
if ((err = package_opus(sample, packets, msg->nn_max_extra_payloads())) != srs_success) {
return srs_error_wrap(err, "opus package");
2020-04-11 09:52:14 +00:00
}
}
2020-04-13 05:58:34 +00:00
continue;
}
2020-04-13 09:11:46 +00:00
// For video, we should process all NALUs in samples.
2020-04-13 08:50:24 +00:00
packets.nn_videos++;
2020-04-13 05:58:34 +00:00
// Well, for each IDR, we append a SPS/PPS before it, which is packaged in STAP-A.
if (msg->has_idr()) {
2020-04-30 02:00:07 +00:00
if ((err = package_stap_a(source, msg, packets)) != srs_success) {
2020-04-13 05:58:34 +00:00
return srs_error_wrap(err, "packet stap-a");
2020-03-30 07:16:29 +00:00
}
2020-04-13 05:58:34 +00:00
}
2020-04-11 17:13:31 +00:00
2020-04-13 09:11:46 +00:00
// If merge Nalus, we pcakges all NALUs(samples) as one NALU, in a RTP or FUA packet.
if (packets.should_merge_nalus && nn_samples > 1) {
2020-04-30 02:00:07 +00:00
if ((err = package_nalus(msg, packets)) != srs_success) {
2020-04-13 09:11:46 +00:00
return srs_error_wrap(err, "packet stap-a");
}
continue;
2020-04-13 05:58:34 +00:00
}
2020-03-30 07:16:29 +00:00
2020-04-13 09:11:46 +00:00
// By default, we package each NALU(sample) to a RTP or FUA packet.
for (int i = 0; i < nn_samples; i++) {
2020-04-13 05:58:34 +00:00
SrsSample* sample = msg->samples() + i;
2020-04-11 17:13:31 +00:00
2020-04-13 05:58:34 +00:00
// We always ignore bframe here, if config to discard bframe,
// the bframe flag will not be set.
if (sample->bframe) {
continue;
2020-03-30 07:16:29 +00:00
}
2020-04-13 05:58:34 +00:00
if (sample->size <= kRtpMaxPayloadSize) {
2020-04-30 02:00:07 +00:00
if ((err = package_single_nalu(msg, sample, packets)) != srs_success) {
2020-04-13 05:58:34 +00:00
return srs_error_wrap(err, "packet single nalu");
}
} else {
2020-04-30 02:00:07 +00:00
if ((err = package_fu_a(msg, sample, kRtpMaxPayloadSize, packets)) != srs_success) {
2020-04-13 05:58:34 +00:00
return srs_error_wrap(err, "packet fu-a");
}
2020-04-13 09:11:46 +00:00
}
2020-04-13 09:11:46 +00:00
if (i == nn_samples - 1) {
2020-04-15 14:46:06 +00:00
packets.back()->rtp_header.set_marker(true);
}
2020-04-13 05:58:34 +00:00
}
}
return err;
2020-04-09 11:38:50 +00:00
}
2020-03-11 11:21:44 +00:00
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcPlayer::send_packets(SrsRtcOutgoingPackets& packets)
2020-04-09 11:38:50 +00:00
{
srs_error_t err = srs_success;
2020-04-30 10:19:40 +00:00
// Cache the encrypt flag and sender.
2020-05-03 05:49:53 +00:00
bool encrypt = session_->encrypt;
ISrsUdpSender* sender = session_->sendonly_skt->sender();
2020-04-13 15:40:30 +00:00
2020-04-15 14:46:06 +00:00
int nn_packets = packets.size();
for (int i = 0; i < nn_packets; i++) {
SrsRtpPacket2* packet = packets.at(i);
2020-04-13 15:40:30 +00:00
2020-04-13 07:37:32 +00:00
// Fetch a cached message from queue.
// TODO: FIXME: Maybe encrypt in async, so the state of mhdr maybe not ready.
srs_mmsghdr* mhdr = NULL;
2020-04-13 07:37:32 +00:00
if ((err = sender->fetch(&mhdr)) != srs_success) {
return srs_error_wrap(err, "fetch msghdr");
}
// For this message, select the first iovec.
iovec* iov = mhdr->msg_hdr.msg_iov;
mhdr->msg_hdr.msg_iovlen = 1;
2020-04-15 14:46:06 +00:00
if (!iov->iov_base) {
iov->iov_base = new char[kRtpPacketSize];
2020-04-15 14:46:06 +00:00
}
iov->iov_len = kRtpPacketSize;
2020-04-15 14:46:06 +00:00
// Marshal packet to bytes in iovec.
2020-04-13 07:37:32 +00:00
if (true) {
SrsBuffer stream((char*)iov->iov_base, iov->iov_len);
2020-04-13 07:37:32 +00:00
if ((err = packet->encode(&stream)) != srs_success) {
return srs_error_wrap(err, "encode packet");
}
iov->iov_len = stream.pos();
}
2020-04-11 09:52:14 +00:00
2020-04-13 07:37:32 +00:00
// Whether encrypt the RTP bytes.
2020-04-17 05:02:54 +00:00
if (encrypt) {
int nn_encrypt = (int)iov->iov_len;
2020-05-03 05:49:53 +00:00
if ((err = session_->dtls_->protect_rtp2(iov->iov_base, &nn_encrypt)) != srs_success) {
2020-04-13 07:37:32 +00:00
return srs_error_wrap(err, "srtp protect");
}
iov->iov_len = (size_t)nn_encrypt;
2020-04-13 07:24:41 +00:00
}
2020-05-04 06:47:58 +00:00
// Put final RTP packet to NACK/ARQ queue.
2020-05-04 12:42:30 +00:00
if (nack_enabled_) {
2020-05-04 06:47:58 +00:00
SrsRtpPacket2* nack = new SrsRtpPacket2();
nack->rtp_header = packet->rtp_header;
nack->padding = packet->padding;
// TODO: FIXME: Should avoid memory copying.
SrsRtpRawPayload* payload = nack->reuse_raw();
payload->nn_payload = (int)iov->iov_len;
payload->payload = new char[payload->nn_payload];
memcpy((void*)payload->payload, iov->iov_base, iov->iov_len);
if (nack->rtp_header.get_ssrc() == video_ssrc) {
video_queue_->set(nack->rtp_header.get_sequence(), nack);
} else {
audio_queue_->set(nack->rtp_header.get_sequence(), nack);
}
}
2020-04-17 08:36:56 +00:00
packets.nn_rtp_bytes += (int)iov->iov_len;
// Set the address and control information.
2020-05-03 05:49:53 +00:00
sockaddr_in* addr = (sockaddr_in*)session_->sendonly_skt->peer_addr();
socklen_t addrlen = (socklen_t)session_->sendonly_skt->peer_addrlen();
2020-04-13 07:37:32 +00:00
mhdr->msg_hdr.msg_name = (sockaddr_in*)addr;
mhdr->msg_hdr.msg_namelen = (socklen_t)addrlen;
2020-04-14 02:58:53 +00:00
mhdr->msg_hdr.msg_controllen = 0;
2020-05-04 06:47:58 +00:00
// When we send out a packet, increase the stat counter.
2020-04-14 12:12:14 +00:00
packets.nn_rtp_pkts++;
2020-05-04 06:47:58 +00:00
// For NACK simulator, drop packet.
if (nn_simulate_nack_drop) {
2020-05-04 12:42:30 +00:00
simulate_drop_packet(&packet->rtp_header, (int)iov->iov_len);
2020-05-04 06:47:58 +00:00
iov->iov_len = 0;
continue;
}
2020-04-13 07:37:32 +00:00
if ((err = sender->sendmmsg(mhdr)) != srs_success) {
return srs_error_wrap(err, "send msghdr");
}
}
return err;
2020-04-09 11:38:50 +00:00
}
2020-04-13 15:40:30 +00:00
// TODO: FIXME: We can gather and pad audios, because they have similar size.
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcPlayer::send_packets_gso(SrsRtcOutgoingPackets& packets)
2020-04-09 11:38:50 +00:00
{
srs_error_t err = srs_success;
2020-04-30 10:19:40 +00:00
// Cache the encrypt flag and sender.
2020-05-03 05:49:53 +00:00
bool encrypt = session_->encrypt;
ISrsUdpSender* sender = session_->sendonly_skt->sender();
2020-04-17 05:02:54 +00:00
2020-04-13 15:40:30 +00:00
// Previous handler, if has the same size, we can use GSO.
srs_mmsghdr* gso_mhdr = NULL; int gso_size = 0; int gso_encrypt = 0; int gso_cursor = 0;
2020-04-13 15:40:30 +00:00
// GSO, N packets has same length, the final one may not.
2020-04-16 04:18:52 +00:00
bool using_gso = false; bool gso_final = false;
// The message will marshal in iovec.
iovec* iov = NULL;
2020-04-13 15:40:30 +00:00
2020-04-15 14:46:06 +00:00
int nn_packets = packets.size();
2020-04-13 15:40:30 +00:00
for (int i = 0; i < nn_packets; i++) {
2020-04-15 14:46:06 +00:00
SrsRtpPacket2* packet = packets.at(i);
2020-04-15 07:58:17 +00:00
int nn_packet = packet->nb_bytes();
2020-04-16 03:22:25 +00:00
int padding = 0;
2020-04-13 15:40:30 +00:00
2020-04-15 07:58:17 +00:00
SrsRtpPacket2* next_packet = NULL;
int nn_next_packet = 0;
2020-04-17 02:42:04 +00:00
if (max_padding > 0) {
if (i < nn_packets - 1) {
next_packet = (i < nn_packets - 1)? packets.at(i + 1):NULL;
nn_next_packet = next_packet? next_packet->nb_bytes() : 0;
}
2020-04-13 15:40:30 +00:00
2020-04-17 02:42:04 +00:00
// Padding the packet to next or GSO size.
if (next_packet) {
if (!using_gso) {
// Padding to the next packet to merge with it.
if (nn_next_packet > nn_packet) {
padding = nn_next_packet - nn_packet;
}
} else {
// Padding to GSO size for next one to merge with us.
if (nn_next_packet < gso_size) {
padding = gso_size - nn_packet;
}
2020-04-16 02:58:20 +00:00
}
2020-04-13 15:40:30 +00:00
2020-04-17 02:42:04 +00:00
// Reset padding if exceed max.
if (padding > max_padding) {
padding = 0;
}
2020-04-13 15:40:30 +00:00
2020-04-17 02:42:04 +00:00
if (padding > 0) {
2020-04-15 07:58:17 +00:00
#if defined(SRS_DEBUG)
2020-04-17 02:42:04 +00:00
srs_trace("#%d, Padding %d bytes %d=>%d, packets %d, max_padding %d", packets.debug_id,
padding, nn_packet, nn_packet + padding, nn_packets, max_padding);
2020-04-15 07:58:17 +00:00
#endif
2020-04-17 10:04:52 +00:00
packet->add_padding(padding);
2020-04-17 02:42:04 +00:00
nn_packet += padding;
packets.nn_paddings++;
packets.nn_padding_bytes += padding;
}
2020-04-13 15:40:30 +00:00
}
2020-04-15 07:58:17 +00:00
}
2020-04-15 07:58:17 +00:00
// Check whether we can use GSO to send it.
if (using_gso && !gso_final) {
gso_final = (gso_size != nn_packet);
2020-04-13 15:40:30 +00:00
}
2020-04-15 07:58:17 +00:00
if (next_packet) {
2020-04-13 15:40:30 +00:00
// If not GSO, maybe the first fresh packet, we should see whether the next packet is smaller than this one,
// if smaller, we can still enter GSO.
2020-04-16 04:18:52 +00:00
if (!using_gso) {
using_gso = (nn_packet >= nn_next_packet);
2020-04-13 15:40:30 +00:00
}
2020-04-09 11:38:50 +00:00
2020-04-13 15:40:30 +00:00
// If GSO, but next is bigger than this one, we must enter the final state.
if (using_gso && !gso_final) {
2020-04-13 15:40:30 +00:00
gso_final = (nn_packet < nn_next_packet);
}
}
2020-04-13 15:40:30 +00:00
// For GSO, reuse mhdr if possible.
srs_mmsghdr* mhdr = gso_mhdr;
if (!mhdr) {
// Fetch a cached message from queue.
// TODO: FIXME: Maybe encrypt in async, so the state of mhdr maybe not ready.
2020-04-14 02:58:53 +00:00
if ((err = sender->fetch(&mhdr)) != srs_success) {
return srs_error_wrap(err, "fetch msghdr");
}
// Now, GSO will use this message and size.
gso_mhdr = mhdr;
gso_size = nn_packet;
}
// For this message, select a new iovec.
if (!iov) {
iov = mhdr->msg_hdr.msg_iov;
} else {
iov++;
}
gso_cursor++;
mhdr->msg_hdr.msg_iovlen = gso_cursor;
if (gso_cursor > SRS_PERF_RTC_GSO_IOVS && !iov->iov_base) {
iov->iov_base = new char[kRtpPacketSize];
}
2020-04-13 15:40:30 +00:00
iov->iov_len = kRtpPacketSize;
// Marshal packet to bytes in iovec.
2020-04-13 15:40:30 +00:00
if (true) {
SrsBuffer stream((char*)iov->iov_base, iov->iov_len);
if ((err = packet->encode(&stream)) != srs_success) {
return srs_error_wrap(err, "encode packet");
}
iov->iov_len = stream.pos();
}
// Whether encrypt the RTP bytes.
2020-04-17 05:02:54 +00:00
if (encrypt) {
2020-04-13 15:40:30 +00:00
int nn_encrypt = (int)iov->iov_len;
2020-05-03 05:49:53 +00:00
if ((err = session_->dtls_->protect_rtp2(iov->iov_base, &nn_encrypt)) != srs_success) {
2020-04-13 15:40:30 +00:00
return srs_error_wrap(err, "srtp protect");
}
iov->iov_len = (size_t)nn_encrypt;
}
2020-05-04 06:47:58 +00:00
// Put final RTP packet to NACK/ARQ queue.
2020-05-04 12:42:30 +00:00
if (nack_enabled_) {
2020-05-04 06:47:58 +00:00
SrsRtpPacket2* nack = new SrsRtpPacket2();
nack->rtp_header = packet->rtp_header;
nack->padding = packet->padding;
// TODO: FIXME: Should avoid memory copying.
SrsRtpRawPayload* payload = nack->reuse_raw();
payload->nn_payload = (int)iov->iov_len;
payload->payload = new char[payload->nn_payload];
memcpy((void*)payload->payload, iov->iov_base, iov->iov_len);
if (nack->rtp_header.get_ssrc() == video_ssrc) {
video_queue_->set(nack->rtp_header.get_sequence(), nack);
} else {
audio_queue_->set(nack->rtp_header.get_sequence(), nack);
}
}
2020-04-17 08:36:56 +00:00
packets.nn_rtp_bytes += (int)iov->iov_len;
2020-04-13 15:40:30 +00:00
// If GSO, they must has same size, except the final one.
2020-04-16 04:18:52 +00:00
if (using_gso && !gso_final && gso_encrypt && gso_encrypt != (int)iov->iov_len) {
2020-04-13 15:40:30 +00:00
return srs_error_new(ERROR_RTC_RTP_MUXER, "GSO size=%d/%d, encrypt=%d/%d", gso_size, nn_packet, gso_encrypt, iov->iov_len);
}
2020-04-16 04:18:52 +00:00
if (using_gso && !gso_final) {
2020-04-13 15:40:30 +00:00
gso_encrypt = iov->iov_len;
}
// If exceed the max GSO size, set to final.
if (using_gso && gso_cursor + 1 >= SRS_PERF_RTC_GSO_MAX) {
2020-04-13 15:40:30 +00:00
gso_final = true;
}
// For last message, or final gso, or determined not using GSO, send it now.
2020-04-16 04:18:52 +00:00
bool do_send = (i == nn_packets - 1 || gso_final || !using_gso);
2020-04-14 02:05:55 +00:00
#if defined(SRS_DEBUG)
2020-04-14 12:12:14 +00:00
bool is_video = packet->rtp_header.get_payload_type() == video_payload_type;
2020-04-16 03:22:25 +00:00
srs_trace("#%d, Packet %s SSRC=%d, SN=%d, %d/%d bytes", packets.debug_id, is_video? "Video":"Audio",
packet->rtp_header.get_ssrc(), packet->rtp_header.get_sequence(), nn_packet - padding, padding);
2020-04-14 02:05:55 +00:00
if (do_send) {
for (int j = 0; j < (int)mhdr->msg_hdr.msg_iovlen; j++) {
iovec* iov = mhdr->msg_hdr.msg_iov + j;
2020-04-16 04:18:52 +00:00
srs_trace("#%d, %s #%d/%d/%d, %d/%d bytes, size %d/%d", packets.debug_id, (using_gso? "GSO":"RAW"), j,
2020-04-16 03:22:25 +00:00
gso_cursor + 1, mhdr->msg_hdr.msg_iovlen, iov->iov_len, padding, gso_size, gso_encrypt);
2020-04-14 02:05:55 +00:00
}
}
#endif
if (do_send) {
// Set the address and control information.
2020-05-03 05:49:53 +00:00
sockaddr_in* addr = (sockaddr_in*)session_->sendonly_skt->peer_addr();
socklen_t addrlen = (socklen_t)session_->sendonly_skt->peer_addrlen();
2020-04-13 15:40:30 +00:00
mhdr->msg_hdr.msg_name = (sockaddr_in*)addr;
mhdr->msg_hdr.msg_namelen = (socklen_t)addrlen;
mhdr->msg_hdr.msg_controllen = 0;
#ifndef SRS_OSX
2020-04-16 04:18:52 +00:00
if (using_gso) {
mhdr->msg_hdr.msg_controllen = CMSG_SPACE(sizeof(uint16_t));
2020-04-13 15:40:30 +00:00
if (!mhdr->msg_hdr.msg_control) {
mhdr->msg_hdr.msg_control = new char[mhdr->msg_hdr.msg_controllen];
}
cmsghdr* cm = CMSG_FIRSTHDR(&mhdr->msg_hdr);
cm->cmsg_level = SOL_UDP;
cm->cmsg_type = UDP_SEGMENT;
cm->cmsg_len = CMSG_LEN(sizeof(uint16_t));
*((uint16_t*)CMSG_DATA(cm)) = gso_encrypt;
}
#endif
2020-04-13 15:40:30 +00:00
2020-04-14 12:12:14 +00:00
// When we send out a packet, we commit a RTP packet.
packets.nn_rtp_pkts++;
2020-04-13 15:40:30 +00:00
if ((err = sender->sendmmsg(mhdr)) != srs_success) {
return srs_error_wrap(err, "send msghdr");
}
// Reset the GSO flag.
gso_mhdr = NULL; gso_size = 0; gso_encrypt = 0; gso_cursor = 0;
using_gso = gso_final = false; iov = NULL;
}
2020-04-11 09:52:14 +00:00
}
2020-04-14 12:12:14 +00:00
#if defined(SRS_DEBUG)
2020-04-17 08:36:56 +00:00
srs_trace("#%d, RTC PLAY summary, rtp %d/%d, videos %d/%d, audios %d/%d, pad %d/%d/%d", packets.debug_id, packets.size(),
2020-04-16 02:05:17 +00:00
packets.nn_rtp_pkts, packets.nn_videos, packets.nn_samples, packets.nn_audios, packets.nn_extras, packets.nn_paddings,
2020-04-17 08:36:56 +00:00
packets.nn_padding_bytes, packets.nn_rtp_bytes);
2020-04-14 12:12:14 +00:00
#endif
2020-04-13 15:40:30 +00:00
return err;
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcPlayer::package_nalus(SrsSharedPtrMessage* msg, SrsRtcOutgoingPackets& packets)
2020-04-13 09:11:46 +00:00
{
srs_error_t err = srs_success;
SrsRtpRawNALUs* raw = new SrsRtpRawNALUs();
for (int i = 0; i < msg->nn_samples(); i++) {
SrsSample* sample = msg->samples() + i;
// We always ignore bframe here, if config to discard bframe,
// the bframe flag will not be set.
if (sample->bframe) {
continue;
}
raw->push_back(sample->copy());
}
// Ignore empty.
int nn_bytes = raw->nb_bytes();
if (nn_bytes <= 0) {
srs_freep(raw);
return err;
}
if (nn_bytes < kRtpMaxPayloadSize) {
// Package NALUs in a single RTP packet.
2020-04-15 14:46:06 +00:00
SrsRtpPacket2* packet = packets.fetch();
2020-04-18 12:37:08 +00:00
if (!packet) {
srs_freep(raw);
return srs_error_new(ERROR_RTC_RTP_MUXER, "cache empty");
}
packet->rtp_header.set_timestamp(msg->timestamp * 90);
packet->rtp_header.set_sequence(video_sequence++);
packet->rtp_header.set_ssrc(video_ssrc);
packet->rtp_header.set_payload_type(video_payload_type);
packet->payload = raw;
} else {
2020-04-19 05:16:48 +00:00
// We must free it, should never use RTP packets to free it,
// because more than one RTP packet will refer to it.
SrsAutoFree(SrsRtpRawNALUs, raw);
// Package NALUs in FU-A RTP packets.
int fu_payload_size = kRtpMaxPayloadSize;
// The first byte is store in FU-A header.
uint8_t header = raw->skip_first_byte();
uint8_t nal_type = header & kNalTypeMask;
int nb_left = nn_bytes - 1;
int num_of_packet = 1 + (nn_bytes - 1) / fu_payload_size;
for (int i = 0; i < num_of_packet; ++i) {
int packet_size = srs_min(nb_left, fu_payload_size);
2020-04-15 14:46:06 +00:00
SrsRtpPacket2* packet = packets.fetch();
2020-04-18 12:37:08 +00:00
if (!packet) {
srs_freep(raw);
return srs_error_new(ERROR_RTC_RTP_MUXER, "cache empty");
}
packet->rtp_header.set_timestamp(msg->timestamp * 90);
packet->rtp_header.set_sequence(video_sequence++);
packet->rtp_header.set_ssrc(video_ssrc);
packet->rtp_header.set_payload_type(video_payload_type);
SrsRtpFUAPayload* fua = new SrsRtpFUAPayload();
packet->payload = fua;
fua->nri = (SrsAvcNaluType)header;
fua->nalu_type = (SrsAvcNaluType)nal_type;
fua->start = bool(i == 0);
fua->end = bool(i == num_of_packet - 1);
if ((err = raw->read_samples(fua->nalus, packet_size)) != srs_success) {
return srs_error_wrap(err, "read samples %d bytes, left %d, total %d", packet_size, nb_left, nn_bytes);
}
nb_left -= packet_size;
}
}
2020-04-15 14:46:06 +00:00
if (packets.size() > 0) {
packets.back()->rtp_header.set_marker(true);
}
return err;
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcPlayer::package_opus(SrsSample* sample, SrsRtcOutgoingPackets& packets, int nn_max_payload)
{
srs_error_t err = srs_success;
2020-04-15 14:46:06 +00:00
SrsRtpPacket2* packet = packets.fetch();
2020-04-18 12:37:08 +00:00
if (!packet) {
return srs_error_new(ERROR_RTC_RTP_MUXER, "cache empty");
}
packet->rtp_header.set_marker(true);
packet->rtp_header.set_timestamp(audio_timestamp);
packet->rtp_header.set_sequence(audio_sequence++);
packet->rtp_header.set_ssrc(audio_ssrc);
packet->rtp_header.set_payload_type(audio_payload_type);
SrsRtpRawPayload* raw = packet->reuse_raw();
raw->payload = sample->bytes;
raw->nn_payload = sample->size;
2020-04-17 10:04:52 +00:00
if (max_padding > 0) {
if (sample->size < nn_max_payload && nn_max_payload - sample->size < max_padding) {
int padding = nn_max_payload - sample->size;
packet->set_padding(padding);
#if defined(SRS_DEBUG)
srs_trace("#%d, Fast Padding %d bytes %d=>%d, SN=%d, max_payload %d, max_padding %d", packets.debug_id,
padding, sample->size, sample->size + padding, packet->rtp_header.get_sequence(), nn_max_payload, max_padding);
#endif
}
}
2020-04-11 09:52:14 +00:00
// TODO: FIXME: Why 960? Need Refactoring?
2020-04-11 10:39:46 +00:00
audio_timestamp += 960;
2020-04-11 09:52:14 +00:00
return err;
}
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcPlayer::package_fu_a(SrsSharedPtrMessage* msg, SrsSample* sample, int fu_payload_size, SrsRtcOutgoingPackets& packets)
{
srs_error_t err = srs_success;
char* p = sample->bytes + 1;
int nb_left = sample->size - 1;
uint8_t header = sample->bytes[0];
uint8_t nal_type = header & kNalTypeMask;
2020-04-13 05:58:34 +00:00
int num_of_packet = 1 + (sample->size - 1) / fu_payload_size;
for (int i = 0; i < num_of_packet; ++i) {
2020-04-13 05:58:34 +00:00
int packet_size = srs_min(nb_left, fu_payload_size);
2020-04-15 14:46:06 +00:00
SrsRtpPacket2* packet = packets.fetch();
2020-04-18 12:37:08 +00:00
if (!packet) {
return srs_error_new(ERROR_RTC_RTP_MUXER, "cache empty");
}
2020-04-11 17:01:39 +00:00
packet->rtp_header.set_timestamp(msg->timestamp * 90);
packet->rtp_header.set_sequence(video_sequence++);
packet->rtp_header.set_ssrc(video_ssrc);
packet->rtp_header.set_payload_type(video_payload_type);
2020-04-18 12:37:08 +00:00
SrsRtpFUAPayload2* fua = packet->reuse_fua();
2020-04-11 17:01:39 +00:00
fua->nri = (SrsAvcNaluType)header;
fua->nalu_type = (SrsAvcNaluType)nal_type;
fua->start = bool(i == 0);
fua->end = bool(i == num_of_packet - 1);
2020-04-18 12:37:08 +00:00
fua->payload = p;
fua->size = packet_size;
2020-04-11 17:01:39 +00:00
p += packet_size;
nb_left -= packet_size;
}
return err;
}
// Single NAL Unit Packet @see https://tools.ietf.org/html/rfc6184#section-5.6
2020-05-03 05:49:53 +00:00
srs_error_t SrsRtcPlayer::package_single_nalu(SrsSharedPtrMessage* msg, SrsSample* sample, SrsRtcOutgoingPackets& packets)
{
srs_error_t err = srs_success;
2020-04-15 14:46:06 +00:00
SrsRtpPacket2* packet = packets.fetch();
2020-04-18 12:37:08 +00:00
if (!packet) {
return srs_error_new(ERROR_RTC_RTP_MUXER, "cache empty");
}
2020-04-11 17:01:39 +00:00
packet->rtp_header.set_timestamp(msg->timestamp * 90);
packet->rtp_header.set_sequence(video_sequence++);
packet->rtp_header.set_ssrc(video_ssrc);
packet->rtp_header.set_payload_type(video_payload_type);
SrsRtpRawPayload* raw = packet->reuse_raw();
raw->payload = sample->bytes;
raw->nn_payload = sample->size;
return err;
}
2020-05-12 05:19:31 +00:00
srs_error_t SrsRtcPlayer::package_stap_a(SrsRtcSource* source, SrsSharedPtrMessage* msg, SrsRtcOutgoingPackets& packets)
{
srs_error_t err = srs_success;
SrsMetaCache* meta = source->cached_meta();
if (!meta) {
return err;
}
SrsFormat* format = meta->vsh_format();
if (!format || !format->vcodec) {
return err;
}
const vector<char>& sps = format->vcodec->sequenceParameterSetNALUnit;
const vector<char>& pps = format->vcodec->pictureParameterSetNALUnit;
if (sps.empty() || pps.empty()) {
return srs_error_new(ERROR_RTC_RTP_MUXER, "sps/pps empty");
}
2020-04-15 14:46:06 +00:00
SrsRtpPacket2* packet = packets.fetch();
2020-04-18 12:37:08 +00:00
if (!packet) {
return srs_error_new(ERROR_RTC_RTP_MUXER, "cache empty");
}
packet->rtp_header.set_marker(false);
2020-04-11 17:01:39 +00:00
packet->rtp_header.set_timestamp(msg->timestamp * 90);
packet->rtp_header.set_sequence(video_sequence++);
packet->rtp_header.set_ssrc(video_ssrc);
packet->rtp_header.set_payload_type(video_payload_type);
SrsRtpSTAPPayload* stap = new SrsRtpSTAPPayload();
2020-04-11 17:08:21 +00:00
packet->payload = stap;
uint8_t header = sps[0];
2020-04-11 17:01:39 +00:00
stap->nri = (SrsAvcNaluType)header;
2020-04-11 17:08:21 +00:00
if (true) {
SrsSample* sample = new SrsSample();
sample->bytes = (char*)&sps[0];
sample->size = (int)sps.size();
stap->nalus.push_back(sample);
}
2020-04-11 17:08:21 +00:00
if (true) {
SrsSample* sample = new SrsSample();
sample->bytes = (char*)&pps[0];
sample->size = (int)pps.size();
stap->nalus.push_back(sample);
}
2020-05-02 12:57:36 +00:00
srs_trace("RTC STAP-A seq=%u, sps %d, pps %d bytes", packet->rtp_header.get_sequence(), sps.size(), pps.size());
return err;
}
2020-05-04 06:47:58 +00:00
void SrsRtcPlayer::nack_fetch(vector<SrsRtpPacket2*>& pkts, uint32_t ssrc, uint16_t seq)
{
SrsRtpPacket2* pkt = NULL;
if (ssrc == video_ssrc) {
pkt = video_queue_->at(seq);
} else if (ssrc == audio_ssrc) {
pkt = audio_queue_->at(seq);
}
if (pkt) {
pkts.push_back(pkt);
}
}
void SrsRtcPlayer::simulate_nack_drop(int nn)
{
nn_simulate_nack_drop = nn;
}
2020-05-04 12:42:30 +00:00
void SrsRtcPlayer::simulate_drop_packet(SrsRtpHeader* h, int nn_bytes)
{
srs_warn("RTC NACK simulator #%d drop seq=%u, ssrc=%u/%s, ts=%u, %d bytes", nn_simulate_nack_drop,
h->get_sequence(), h->get_ssrc(), (h->get_ssrc()==video_ssrc? "Video":"Audio"), h->get_timestamp(),
nn_bytes);
nn_simulate_nack_drop--;
}
2020-05-08 08:25:09 +00:00
srs_error_t SrsRtcPlayer::on_rtcp(char* data, int nb_data)
{
srs_error_t err = srs_success;
char* ph = data;
int nb_left = nb_data;
while (nb_left) {
uint8_t payload_type = ph[1];
uint16_t length_4bytes = (((uint16_t)ph[2]) << 8) | ph[3];
int length = (length_4bytes + 1) * 4;
if (length > nb_data) {
return srs_error_new(ERROR_RTC_RTCP, "invalid rtcp packet, length=%u", length);
}
srs_verbose("on rtcp, payload_type=%u", payload_type);
switch (payload_type) {
case kSR: {
err = on_rtcp_sr(ph, length);
break;
}
case kRR: {
err = on_rtcp_rr(ph, length);
break;
}
case kSDES: {
break;
}
case kBye: {
break;
}
case kApp: {
break;
}
case kRtpFb: {
err = on_rtcp_feedback(ph, length);
break;
}
case kPsFb: {
err = on_rtcp_ps_feedback(ph, length);
break;
}
case kXR: {
err = on_rtcp_xr(ph, length);
break;
}
default:{
return srs_error_new(ERROR_RTC_RTCP_CHECK, "unknown rtcp type=%u", payload_type);
break;
}
}
if (err != srs_success) {
return srs_error_wrap(err, "rtcp");
}
ph += length;
nb_left -= length;
}
return err;
}
srs_error_t SrsRtcPlayer::on_rtcp_sr(char* buf, int nb_buf)
{
srs_error_t err = srs_success;
// TODO: FIXME: Implements it.
return err;
}
srs_error_t SrsRtcPlayer::on_rtcp_xr(char* buf, int nb_buf)
{
srs_error_t err = srs_success;
// TODO: FIXME: Implements it.
return err;
}
2020-05-09 03:11:36 +00:00
srs_error_t SrsRtcPlayer::on_rtcp_feedback(char* buf, int nb_buf)
2020-05-08 08:25:09 +00:00
{
srs_error_t err = srs_success;
2020-05-09 03:11:36 +00:00
if (nb_buf < 12) {
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp feedback packet, nb_buf=%d", nb_buf);
}
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
SrsAutoFree(SrsBuffer, stream);
// @see: https://tools.ietf.org/html/rfc4585#section-6.1
/*
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|V=2|P| FMT | PT | length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| SSRC of packet sender |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| SSRC of media source |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
: Feedback Control Information (FCI) :
: :
*/
/*uint8_t first = */stream->read_1bytes();
//uint8_t version = first & 0xC0;
//uint8_t padding = first & 0x20;
//uint8_t fmt = first & 0x1F;
/*uint8_t payload_type = */stream->read_1bytes();
/*uint16_t length = */stream->read_2bytes();
/*uint32_t ssrc_of_sender = */stream->read_4bytes();
uint32_t ssrc_of_media_source = stream->read_4bytes();
/*
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| PID | BLP |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
*/
uint16_t pid = stream->read_2bytes();
int blp = stream->read_2bytes();
// TODO: FIXME: Support ARQ.
vector<SrsRtpPacket2*> resend_pkts;
nack_fetch(resend_pkts, ssrc_of_media_source, pid);
uint16_t mask = 0x01;
for (int i = 1; i < 16 && blp; ++i, mask <<= 1) {
if (!(blp & mask)) {
continue;
}
uint32_t loss_seq = pid + i;
nack_fetch(resend_pkts, ssrc_of_media_source, loss_seq);
}
for (int i = 0; i < (int)resend_pkts.size(); ++i) {
SrsRtpPacket2* pkt = resend_pkts[i];
char* data = new char[pkt->nb_bytes()];
SrsAutoFreeA(char, data);
SrsBuffer buf(data, pkt->nb_bytes());
// TODO: FIXME: Check error.
pkt->encode(&buf);
session_->sendonly_skt->sendto(data, pkt->nb_bytes(), 0);
SrsRtpHeader* h = &pkt->rtp_header;
srs_trace("RTC NACK ARQ seq=%u, ssrc=%u, ts=%u, %d bytes", h->get_sequence(),
h->get_ssrc(), h->get_timestamp(), pkt->nb_bytes());
}
2020-05-08 08:25:09 +00:00
return err;
}
srs_error_t SrsRtcPlayer::on_rtcp_ps_feedback(char* buf, int nb_buf)
{
srs_error_t err = srs_success;
if (nb_buf < 12) {
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp feedback packet, nb_buf=%d", nb_buf);
}
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
SrsAutoFree(SrsBuffer, stream);
uint8_t first = stream->read_1bytes();
//uint8_t version = first & 0xC0;
//uint8_t padding = first & 0x20;
uint8_t fmt = first & 0x1F;
/*uint8_t payload_type = */stream->read_1bytes();
/*uint16_t length = */stream->read_2bytes();
/*uint32_t ssrc_of_sender = */stream->read_4bytes();
/*uint32_t ssrc_of_media_source = */stream->read_4bytes();
switch (fmt) {
case kPLI: {
SrsRtcPublisher* publisher = session_->source_->rtc_publisher();
if (publisher) {
publisher->request_keyframe();
srs_trace("RTC request PLI");
}
break;
}
case kSLI: {
srs_verbose("sli");
break;
}
case kRPSI: {
srs_verbose("rpsi");
break;
}
case kAFB: {
srs_verbose("afb");
break;
}
default: {
return srs_error_new(ERROR_RTC_RTCP, "unknown payload specific feedback=%u", fmt);
}
}
return err;
}
srs_error_t SrsRtcPlayer::on_rtcp_rr(char* data, int nb_data)
{
srs_error_t err = srs_success;
// TODO: FIXME: Implements it.
return err;
}
2020-04-23 09:08:21 +00:00
SrsRtcPublisher::SrsRtcPublisher(SrsRtcSession* session)
{
2020-04-26 08:12:23 +00:00
report_timer = new SrsHourGlass(this, 200 * SRS_UTIME_MILLISECONDS);
2020-04-23 15:14:30 +00:00
2020-05-03 05:49:53 +00:00
session_ = session;
2020-05-02 12:57:36 +00:00
video_queue_ = new SrsRtpVideoQueue(1000);
2020-05-02 02:07:55 +00:00
video_nack_ = new SrsRtpNackForReceiver(video_queue_, 1000 * 2 / 3);
2020-05-02 12:57:36 +00:00
audio_queue_ = new SrsRtpAudioQueue(100);
audio_nack_ = new SrsRtpNackForReceiver(audio_queue_, 100 * 2 / 3);
2020-04-23 09:08:21 +00:00
source = NULL;
nn_simulate_nack_drop = 0;
2020-05-04 12:42:30 +00:00
nack_enabled_ = false;
2020-05-07 08:01:03 +00:00
nn_audio_frames = 0;
2020-04-23 09:08:21 +00:00
}
SrsRtcPublisher::~SrsRtcPublisher()
{
source->set_rtc_publisher(NULL);
2020-04-26 08:12:23 +00:00
// TODO: FIXME: Do unpublish when session timeout.
if (source) {
source->on_unpublish();
}
2020-04-23 15:14:30 +00:00
srs_freep(report_timer);
2020-05-02 02:07:55 +00:00
srs_freep(video_nack_);
srs_freep(video_queue_);
2020-05-02 02:07:55 +00:00
srs_freep(audio_nack_);
srs_freep(audio_queue_);
2020-04-23 09:08:21 +00:00
}
2020-04-30 06:49:37 +00:00
srs_error_t SrsRtcPublisher::initialize(uint32_t vssrc, uint32_t assrc, SrsRequest* r)
2020-04-23 09:08:21 +00:00
{
2020-04-23 15:14:30 +00:00
srs_error_t err = srs_success;
2020-04-23 09:08:21 +00:00
video_ssrc = vssrc;
audio_ssrc = assrc;
2020-04-26 08:12:23 +00:00
req = r;
2020-04-23 09:08:21 +00:00
2020-05-04 12:42:30 +00:00
// TODO: FIXME: Support reload.
nack_enabled_ = _srs_config->get_rtc_nack_enabled(session_->req->vhost);
srs_trace("RTC player video(ssrc=%u), audio(ssrc=%u), nack=%d",
video_ssrc, audio_ssrc, nack_enabled_);
2020-04-23 15:14:30 +00:00
if ((err = report_timer->tick(0 * SRS_UTIME_MILLISECONDS)) != srs_success) {
return srs_error_wrap(err, "hourglass tick");
}
if ((err = report_timer->start()) != srs_success) {
return srs_error_wrap(err, "start report_timer");
}
2020-05-12 05:19:31 +00:00
if ((err = _srs_rtc_sources->fetch_or_create(req, &source)) != srs_success) {
2020-04-26 08:12:23 +00:00
return srs_error_wrap(err, "create source");
}
if ((err = source->on_publish()) != srs_success) {
return srs_error_wrap(err, "on publish");
}
source->set_rtc_publisher(this);
2020-04-23 15:14:30 +00:00
return err;
}
2020-05-08 08:25:09 +00:00
void SrsRtcPublisher::check_send_nacks(SrsRtpNackForReceiver* nack, uint32_t ssrc)
2020-04-23 15:14:30 +00:00
{
2020-05-08 08:25:09 +00:00
// If DTLS is not OK, drop all messages.
if (!session_->dtls_) {
return;
}
2020-05-08 08:25:09 +00:00
// @see: https://tools.ietf.org/html/rfc4585#section-6.1
vector<uint16_t> nack_seqs;
nack->get_nack_seqs(nack_seqs);
vector<uint16_t>::iterator iter = nack_seqs.begin();
while (iter != nack_seqs.end()) {
char buf[kRtpPacketSize];
SrsBuffer stream(buf, sizeof(buf));
// FIXME: Replace magic number.
stream.write_1bytes(0x81);
stream.write_1bytes(kRtpFb);
stream.write_2bytes(3);
stream.write_4bytes(ssrc); // TODO: FIXME: Should be 1?
stream.write_4bytes(ssrc); // TODO: FIXME: Should be 0?
uint16_t pid = *iter;
uint16_t blp = 0;
while (iter + 1 != nack_seqs.end() && (*(iter + 1) - pid <= 15)) {
blp |= (1 << (*(iter + 1) - pid - 1));
++iter;
}
2020-04-23 15:14:30 +00:00
2020-05-08 08:25:09 +00:00
stream.write_2bytes(pid);
stream.write_2bytes(blp);
2020-04-23 15:14:30 +00:00
2020-05-08 08:25:09 +00:00
if (session_->blackhole && session_->blackhole_addr && session_->blackhole_stfd) {
// Ignore any error for black-hole.
void* p = stream.data(); int len = stream.pos(); SrsRtcSession* s = session_;
srs_sendto(s->blackhole_stfd, p, len, (sockaddr*)s->blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
}
2020-04-23 15:14:30 +00:00
2020-05-08 08:25:09 +00:00
char protected_buf[kRtpPacketSize];
int nb_protected_buf = stream.pos();
2020-04-23 15:14:30 +00:00
2020-05-08 08:25:09 +00:00
// FIXME: Merge nack rtcp into one packets.
if (session_->dtls_->protect_rtcp(protected_buf, stream.data(), nb_protected_buf) == srs_success) {
// TODO: FIXME: Check error.
session_->sendonly_skt->sendto(protected_buf, nb_protected_buf, 0);
}
2020-04-23 15:14:30 +00:00
2020-05-08 08:25:09 +00:00
++iter;
2020-04-23 15:14:30 +00:00
}
}
2020-05-08 08:25:09 +00:00
srs_error_t SrsRtcPublisher::send_rtcp_rr(uint32_t ssrc, SrsRtpQueue* rtp_queue)
2020-04-23 15:14:30 +00:00
{
srs_error_t err = srs_success;
2020-04-25 10:59:02 +00:00
// If DTLS is not OK, drop all messages.
2020-05-03 05:49:53 +00:00
if (!session_->dtls_) {
2020-04-25 10:59:02 +00:00
return err;
}
2020-05-08 08:25:09 +00:00
// @see https://tools.ietf.org/html/rfc3550#section-6.4.2
2020-04-23 15:14:30 +00:00
char buf[kRtpPacketSize];
SrsBuffer stream(buf, sizeof(buf));
stream.write_1bytes(0x81);
stream.write_1bytes(kRR);
stream.write_2bytes(7);
2020-05-08 08:25:09 +00:00
stream.write_4bytes(ssrc); // TODO: FIXME: Should be 1?
2020-04-30 06:49:37 +00:00
2020-04-23 15:14:30 +00:00
uint8_t fraction_lost = rtp_queue->get_fraction_lost();
uint32_t cumulative_number_of_packets_lost = rtp_queue->get_cumulative_number_of_packets_lost() & 0x7FFFFF;
uint32_t extended_highest_sequence = rtp_queue->get_extended_highest_sequence();
uint32_t interarrival_jitter = rtp_queue->get_interarrival_jitter();
2020-04-30 06:49:37 +00:00
2020-04-23 15:14:30 +00:00
uint32_t rr_lsr = 0;
uint32_t rr_dlsr = 0;
const uint64_t& lsr_systime = last_sender_report_sys_time[ssrc];
const SrsNtp& lsr_ntp = last_sender_report_ntp[ssrc];
if (lsr_systime > 0) {
rr_lsr = (lsr_ntp.ntp_second_ << 16) | (lsr_ntp.ntp_fractions_ >> 16);
uint32_t dlsr = (srs_update_system_time() - lsr_systime) / 1000;
rr_dlsr = ((dlsr / 1000) << 16) | ((dlsr % 1000) * 65536 / 1000);
}
2020-04-30 06:49:37 +00:00
2020-04-23 15:14:30 +00:00
stream.write_4bytes(ssrc);
stream.write_1bytes(fraction_lost);
stream.write_3bytes(cumulative_number_of_packets_lost);
stream.write_4bytes(extended_highest_sequence);
stream.write_4bytes(interarrival_jitter);
stream.write_4bytes(rr_lsr);
stream.write_4bytes(rr_dlsr);
2020-04-30 06:49:37 +00:00
2020-04-23 15:14:30 +00:00
srs_verbose("RR ssrc=%u, fraction_lost=%u, cumulative_number_of_packets_lost=%u, extended_highest_sequence=%u, interarrival_jitter=%u",
ssrc, fraction_lost, cumulative_number_of_packets_lost, extended_highest_sequence, interarrival_jitter);
2020-04-30 06:49:37 +00:00
2020-04-23 15:14:30 +00:00
char protected_buf[kRtpPacketSize];
int nb_protected_buf = stream.pos();
2020-05-03 05:49:53 +00:00
if ((err = session_->dtls_->protect_rtcp(protected_buf, stream.data(), nb_protected_buf)) != srs_success) {
2020-04-23 15:14:30 +00:00
return srs_error_wrap(err, "protect rtcp rr");
}
2020-04-25 10:59:02 +00:00
// TDOO: FIXME: Check error.
2020-05-03 05:49:53 +00:00
session_->sendonly_skt->sendto(protected_buf, nb_protected_buf, 0);
2020-04-23 15:14:30 +00:00
return err;
}
2020-04-30 06:49:37 +00:00
srs_error_t SrsRtcPublisher::send_rtcp_xr_rrtr(uint32_t ssrc)
2020-04-23 15:14:30 +00:00
{
srs_error_t err = srs_success;
2020-04-25 10:59:02 +00:00
// If DTLS is not OK, drop all messages.
2020-05-03 05:49:53 +00:00
if (!session_->dtls_) {
2020-04-25 10:59:02 +00:00
return err;
}
2020-04-23 15:14:30 +00:00
/*
@see: http://www.rfc-editor.org/rfc/rfc3611.html#section-2
0 1 2 3
2020-04-23 15:14:30 +00:00
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|V=2|P|reserved | PT=XR=207 | length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| SSRC |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
: report blocks :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
@see: http://www.rfc-editor.org/rfc/rfc3611.html#section-4.4
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| BT=4 | reserved | block length = 2 |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| NTP timestamp, most significant word |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| NTP timestamp, least significant word |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2020-04-23 15:14:30 +00:00
*/
srs_utime_t now = srs_update_system_time();
SrsNtp cur_ntp = SrsNtp::from_time_ms(now / 1000);
char buf[kRtpPacketSize];
SrsBuffer stream(buf, sizeof(buf));
stream.write_1bytes(0x80);
stream.write_1bytes(kXR);
stream.write_2bytes(4);
stream.write_4bytes(ssrc);
stream.write_1bytes(4);
stream.write_1bytes(0);
stream.write_2bytes(2);
stream.write_4bytes(cur_ntp.ntp_second_);
stream.write_4bytes(cur_ntp.ntp_fractions_);
char protected_buf[kRtpPacketSize];
int nb_protected_buf = stream.pos();
2020-05-03 05:49:53 +00:00
if ((err = session_->dtls_->protect_rtcp(protected_buf, stream.data(), nb_protected_buf)) != srs_success) {
2020-04-23 15:14:30 +00:00
return srs_error_wrap(err, "protect rtcp xr");
}
2020-04-25 10:59:02 +00:00
// TDOO: FIXME: Check error.
2020-05-03 05:49:53 +00:00
session_->sendonly_skt->sendto(protected_buf, nb_protected_buf, 0);
2020-04-23 15:14:30 +00:00
return err;
}
2020-04-30 06:49:37 +00:00
srs_error_t SrsRtcPublisher::send_rtcp_fb_pli(uint32_t ssrc)
2020-04-24 08:19:08 +00:00
{
srs_error_t err = srs_success;
2020-04-25 10:59:02 +00:00
// If DTLS is not OK, drop all messages.
2020-05-03 05:49:53 +00:00
if (!session_->dtls_) {
2020-04-25 10:59:02 +00:00
return err;
}
2020-04-24 08:19:08 +00:00
char buf[kRtpPacketSize];
SrsBuffer stream(buf, sizeof(buf));
stream.write_1bytes(0x81);
stream.write_1bytes(kPsFb);
stream.write_2bytes(2);
stream.write_4bytes(ssrc);
stream.write_4bytes(ssrc);
2020-04-30 06:49:37 +00:00
srs_trace("RTC PLI ssrc=%u", ssrc);
2020-04-30 06:49:37 +00:00
2020-05-03 05:49:53 +00:00
if (session_->blackhole && session_->blackhole_addr && session_->blackhole_stfd) {
// Ignore any error for black-hole.
2020-05-03 05:49:53 +00:00
void* p = stream.data(); int len = stream.pos(); SrsRtcSession* s = session_;
srs_sendto(s->blackhole_stfd, p, len, (sockaddr*)s->blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
}
2020-04-24 08:19:08 +00:00
char protected_buf[kRtpPacketSize];
int nb_protected_buf = stream.pos();
2020-05-03 05:49:53 +00:00
if ((err = session_->dtls_->protect_rtcp(protected_buf, stream.data(), nb_protected_buf)) != srs_success) {
2020-04-24 08:19:08 +00:00
return srs_error_wrap(err, "protect rtcp psfb pli");
}
2020-04-25 10:59:02 +00:00
// TDOO: FIXME: Check error.
2020-05-03 05:49:53 +00:00
session_->sendonly_skt->sendto(protected_buf, nb_protected_buf, 0);
2020-04-24 08:19:08 +00:00
return err;
}
2020-04-23 15:14:30 +00:00
2020-04-30 06:49:37 +00:00
srs_error_t SrsRtcPublisher::on_rtp(char* buf, int nb_buf)
2020-04-30 02:00:07 +00:00
{
srs_error_t err = srs_success;
SrsRtpPacket2* pkt = new SrsRtpPacket2();
pkt->set_decode_handler(this);
2020-05-03 23:40:02 +00:00
pkt->original_bytes = buf;
SrsBuffer b(buf, nb_buf);
if ((err = pkt->decode(&b)) != srs_success) {
return srs_error_wrap(err, "decode rtp packet");
2020-04-30 02:00:07 +00:00
}
// For NACK simulator, drop packet.
if (nn_simulate_nack_drop) {
2020-05-04 12:42:30 +00:00
simulate_drop_packet(&pkt->rtp_header, nb_buf);
srs_freep(pkt);
return err;
}
2020-04-30 02:00:07 +00:00
uint32_t ssrc = pkt->rtp_header.get_ssrc();
if (ssrc == audio_ssrc) {
2020-04-30 06:49:37 +00:00
return on_audio(pkt);
2020-04-30 02:00:07 +00:00
} else if (ssrc == video_ssrc) {
2020-04-30 06:49:37 +00:00
return on_video(pkt);
} else {
srs_freep(pkt);
return srs_error_new(ERROR_RTC_RTP, "unknown ssrc=%u", ssrc);
2020-04-30 02:00:07 +00:00
}
}
void SrsRtcPublisher::on_before_decode_payload(SrsRtpPacket2* pkt, SrsBuffer* buf, ISrsCodec** ppayload)
2020-04-23 15:14:30 +00:00
{
// No payload, ignore.
if (buf->empty()) {
return;
}
2020-04-23 15:14:30 +00:00
uint32_t ssrc = pkt->rtp_header.get_ssrc();
if (ssrc == audio_ssrc) {
*ppayload = pkt->reuse_raw();
} else if (ssrc == video_ssrc) {
uint8_t v = (uint8_t)pkt->nalu_type;
if (v == kStapA) {
*ppayload = new SrsRtpSTAPPayload();
} else if (v == kFuA) {
*ppayload = pkt->reuse_fua();
} else {
*ppayload = pkt->reuse_raw();
}
2020-04-24 08:19:08 +00:00
}
}
2020-05-08 08:25:09 +00:00
srs_error_t SrsRtcPublisher::on_rtcp(char* data, int nb_data)
{
srs_error_t err = srs_success;
char* ph = data;
int nb_left = nb_data;
while (nb_left) {
uint8_t payload_type = ph[1];
uint16_t length_4bytes = (((uint16_t)ph[2]) << 8) | ph[3];
int length = (length_4bytes + 1) * 4;
if (length > nb_data) {
return srs_error_new(ERROR_RTC_RTCP, "invalid rtcp packet, length=%u", length);
}
srs_verbose("on rtcp, payload_type=%u", payload_type);
switch (payload_type) {
case kSR: {
err = on_rtcp_sr(ph, length);
break;
}
case kRR: {
err = on_rtcp_rr(ph, length);
break;
}
case kSDES: {
break;
}
case kBye: {
break;
}
case kApp: {
break;
}
case kRtpFb: {
err = on_rtcp_feedback(ph, length);
break;
}
case kPsFb: {
err = on_rtcp_ps_feedback(ph, length);
break;
}
case kXR: {
err = on_rtcp_xr(ph, length);
break;
}
default:{
return srs_error_new(ERROR_RTC_RTCP_CHECK, "unknown rtcp type=%u", payload_type);
break;
}
}
if (err != srs_success) {
return srs_error_wrap(err, "rtcp");
}
ph += length;
nb_left -= length;
}
return err;
}
srs_error_t SrsRtcPublisher::on_audio(SrsRtpPacket2* pkt)
{
srs_error_t err = srs_success;
2020-05-04 12:42:30 +00:00
std::vector<SrsRtpPacket2*> frames;
2020-04-23 09:08:21 +00:00
2020-05-04 12:42:30 +00:00
if (nack_enabled_) {
// TODO: FIXME: Error check.
audio_queue_->consume(audio_nack_, pkt);
2020-04-23 15:14:30 +00:00
2020-05-04 12:42:30 +00:00
check_send_nacks(audio_nack_, audio_ssrc);
// Collect all audio frames.
audio_queue_->collect_frames(audio_nack_, frames);
} else {
// TODO: FIXME: Error check.
audio_queue_->consume(NULL, pkt);
// Collect all audio frames.
audio_queue_->collect_frames(NULL, frames);
}
for (size_t i = 0; i < frames.size(); ++i) {
SrsRtpPacket2* frame = frames[i];
2020-05-03 06:28:51 +00:00
// TODO: FIXME: Check error.
on_audio_frame(frame);
srs_freep(frame);
}
return err;
}
srs_error_t SrsRtcPublisher::on_audio_frame(SrsRtpPacket2* frame)
2020-04-27 05:45:50 +00:00
{
srs_error_t err = srs_success;
SrsRtpRawPayload* payload = dynamic_cast<SrsRtpRawPayload*>(frame->payload);
2020-04-27 05:45:50 +00:00
if (!payload) {
return srs_error_new(ERROR_RTC_RTP_MUXER, "OPUS payload");
}
// TODO: FIXME: Transcode OPUS to AAC.
if (!payload->nn_payload) {
return err;
}
SrsMessageHeader header;
header.message_type = RTMP_MSG_AudioMessage;
// TODO: FIXME: Maybe the tbn is not 90k.
header.timestamp = frame->rtp_header.get_timestamp() / 90;
SrsSharedPtrMessage msg;
// TODO: FIXME: Check error.
msg.create(&header, NULL, 0);
SrsSample sample;
sample.size = payload->nn_payload;
sample.bytes = new char[sample.size];
memcpy((void*)sample.bytes, payload->payload, sample.size);
msg.set_extra_payloads(&sample, 1);
// TODO: FIXME: Check error.
source->on_rtc_audio(&msg);
2020-05-07 08:01:03 +00:00
if (nn_audio_frames++ == 0) {
SrsRtpHeader* h = &frame->rtp_header;
srs_trace("RTC got Opus seq=%u, ssrc=%u, ts=%u, %d bytes", h->get_sequence(), h->get_ssrc(), h->get_timestamp(), payload->nn_payload);
}
return err;
}
srs_error_t SrsRtcPublisher::on_video(SrsRtpPacket2* pkt)
{
2020-05-04 12:42:30 +00:00
std::vector<SrsRtpPacket2*> frames;
2020-04-27 05:45:50 +00:00
2020-05-04 12:42:30 +00:00
if (nack_enabled_) {
// TODO: FIXME: Error check.
video_queue_->consume(video_nack_, pkt);
2020-04-27 05:45:50 +00:00
2020-05-04 12:42:30 +00:00
check_send_nacks(video_nack_, video_ssrc);
2020-04-27 05:45:50 +00:00
2020-05-04 12:42:30 +00:00
// Collect video frames.
video_queue_->collect_frames(video_nack_, frames);
} else {
// TODO: FIXME: Error check.
video_queue_->consume(NULL, pkt);
// Collect video frames.
video_queue_->collect_frames(NULL, frames);
}
2020-04-23 09:08:21 +00:00
for (size_t i = 0; i < frames.size(); ++i) {
SrsRtpPacket2* frame = frames[i];
// TODO: FIXME: Check error.
on_video_frame(frame);
2020-04-23 09:08:21 +00:00
srs_freep(frame);
}
2020-04-23 09:08:21 +00:00
2020-05-04 12:42:30 +00:00
if (video_queue_->should_request_key_frame()) {
// TODO: FIXME: Check error.
send_rtcp_fb_pli(video_ssrc);
}
return srs_success;
}
srs_error_t SrsRtcPublisher::on_video_frame(SrsRtpPacket2* frame)
{
srs_error_t err = srs_success;
int64_t timestamp = frame->rtp_header.get_timestamp();
// No FU-A, because we convert it to RAW RTP packet.
if (frame->nalu_type == (SrsAvcNaluType)kFuA) {
return srs_error_new(ERROR_RTC_RTP_MUXER, "invalid FU-A");
}
// For STAP-A, it must be SPS/PPS, and only one packet.
if (frame->nalu_type == (SrsAvcNaluType)kStapA) {
SrsRtpSTAPPayload* payload = dynamic_cast<SrsRtpSTAPPayload*>(frame->payload);
if (!payload) {
return srs_error_new(ERROR_RTC_RTP_MUXER, "STAP-A payload");
}
2020-05-02 12:57:36 +00:00
SrsSample* sps = payload->get_sps();
SrsSample* pps = payload->get_pps();
if (!sps || !sps->size) {
return srs_error_new(ERROR_RTC_RTP_MUXER, "STAP-A payload no sps");
}
if (!pps || !pps->size) {
return srs_error_new(ERROR_RTC_RTP_MUXER, "STAP-A payload no pps");
}
// TODO: FIXME: Directly covert to sample for performance.
// 5 bytes flv tag header.
2020-05-02 12:57:36 +00:00
// 5 bytes sps/pps sequence header.
// 6 bytes size for sps/pps, each is 3 bytes.
int nn_payload = sps->size + pps->size + 5 + 5 + 6;
char* data = new char[nn_payload];
SrsBuffer buf(data, nn_payload);
2020-05-02 12:57:36 +00:00
buf.write_1bytes(0x17); // Keyframe.
buf.write_1bytes(0x00); // Sequence header.
buf.write_3bytes(0x00); // CTS.
2020-05-02 12:57:36 +00:00
// FIXME: Replace magic number for avc_demux_sps_pps.
buf.write_1bytes(0x01); // configurationVersion
buf.write_1bytes(0x42); // AVCProfileIndication, 0x42 = Baseline
buf.write_1bytes(0xC0); // profile_compatibility
buf.write_1bytes(0x1f); // AVCLevelIndication, 0x1f = Level3.1
buf.write_1bytes(0x03); // lengthSizeMinusOne, size of length for NALU.
2020-05-02 12:57:36 +00:00
buf.write_1bytes(0x01); // numOfSequenceParameterSets
buf.write_2bytes(sps->size); // sequenceParameterSetLength
buf.write_bytes(sps->bytes, sps->size); // sps
2020-05-02 12:57:36 +00:00
buf.write_1bytes(0x01); // numOfPictureParameterSets
buf.write_2bytes(pps->size); // pictureParameterSetLength
buf.write_bytes(pps->bytes, pps->size); // pps
SrsMessageHeader header;
header.message_type = RTMP_MSG_VideoMessage;
// TODO: FIXME: Maybe the tbn is not 90k.
2020-05-02 12:57:36 +00:00
header.timestamp = (timestamp / 90) & 0x3fffffff;
SrsCommonMessage* shared_video = new SrsCommonMessage();
SrsAutoFree(SrsCommonMessage, shared_video);
// TODO: FIXME: Check error.
shared_video->create(&header, data, nn_payload);
return source->on_video(shared_video);
2020-04-23 09:08:21 +00:00
}
// For RAW NALU, should be one RAW packet.
SrsRtpRawPayload* payload = dynamic_cast<SrsRtpRawPayload*>(frame->payload);
if (!payload) {
return srs_error_new(ERROR_RTC_RTP_MUXER, "RAW-NALU payload");
}
if (!payload->nn_payload) {
return err;
}
// TODO: FIXME: Directly covert to sample for performance.
// 5 bytes FLV tag header.
2020-05-02 12:57:36 +00:00
// 4 bytes NALU IBMF header, define by sequence header.
int nn_payload = payload->nn_payload + 5 + 4;
char* data = new char[nn_payload];
2020-05-02 12:57:36 +00:00
SrsBuffer buf(data, nn_payload);
if (frame->nalu_type == SrsAvcNaluTypeIDR) {
2020-05-02 12:57:36 +00:00
buf.write_1bytes(0x17); // Keyframe.
2020-05-07 08:01:03 +00:00
SrsRtpHeader* h = &frame->rtp_header;
srs_trace("RTC got IDR seq=%u, ssrc=%u, ts=%u, %d bytes", h->get_sequence(), h->get_ssrc(), h->get_timestamp(), nn_payload);
} else {
2020-05-02 12:57:36 +00:00
buf.write_1bytes(0x27); // Not-Keyframe.
}
2020-05-02 12:57:36 +00:00
buf.write_1bytes(0x01); // Not-SequenceHeader.
buf.write_3bytes(0x00); // CTS.
2020-05-08 08:25:09 +00:00
buf.write_4bytes(payload->nn_payload); // Size of NALU.
buf.write_bytes(payload->payload, payload->nn_payload); // NALU.
SrsMessageHeader header;
header.message_type = RTMP_MSG_VideoMessage;
// TODO: FIXME: Maybe the tbn is not 90k.
header.timestamp = (timestamp / 90) & 0x3fffffff;
SrsCommonMessage* shared_video = new SrsCommonMessage();
SrsAutoFree(SrsCommonMessage, shared_video);
// TODO: FIXME: Check error.
shared_video->create(&header, data, nn_payload);
return source->on_video(shared_video);
}
srs_error_t SrsRtcPublisher::on_rtcp_sr(char* buf, int nb_buf)
{
srs_error_t err = srs_success;
if (nb_buf < 28) {
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp sender report packet, nb_buf=%d", nb_buf);
}
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
SrsAutoFree(SrsBuffer, stream);
// @see: https://tools.ietf.org/html/rfc3550#section-6.4.1
/*
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
header |V=2|P| RC | PT=SR=200 | length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| SSRC of sender |
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
sender | NTP timestamp, most significant word |
info +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| NTP timestamp, least significant word |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| RTP timestamp |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| sender's packet count |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| sender's octet count |
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
report | SSRC_1 (SSRC of first source) |
block +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1 | fraction lost | cumulative number of packets lost |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| extended highest sequence number received |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| interarrival jitter |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| last SR (LSR) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| delay since last SR (DLSR) |
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
report | SSRC_2 (SSRC of second source) |
block +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2 : ... :
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
| profile-specific extensions |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
*/
uint8_t first = stream->read_1bytes();
uint8_t rc = first & 0x1F;
uint8_t payload_type = stream->read_1bytes();
srs_assert(payload_type == kSR);
uint16_t length = stream->read_2bytes();
if (((length + 1) * 4) != (rc * 24 + 28)) {
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtcp sender report packet, length=%u, rc=%u", length, rc);
}
uint32_t ssrc_of_sender = stream->read_4bytes();
uint64_t ntp = stream->read_8bytes();
SrsNtp srs_ntp = SrsNtp::to_time_ms(ntp);
uint32_t rtp_time = stream->read_4bytes();
uint32_t sender_packet_count = stream->read_4bytes();
uint32_t sender_octec_count = stream->read_4bytes();
(void)sender_packet_count; (void)sender_octec_count; (void)rtp_time;
srs_verbose("sender report, ssrc_of_sender=%u, rtp_time=%u, sender_packet_count=%u, sender_octec_count=%u",
ssrc_of_sender, rtp_time, sender_packet_count, sender_octec_count);
for (int i = 0; i < rc; ++i) {
uint32_t ssrc = stream->read_4bytes();
uint8_t fraction_lost = stream->read_1bytes();
uint32_t cumulative_number_of_packets_lost = stream->read_3bytes();
uint32_t highest_seq = stream->read_4bytes();
uint32_t jitter = stream->read_4bytes();
uint32_t lst = stream->read_4bytes();
uint32_t dlsr = stream->read_4bytes();
(void)ssrc; (void)fraction_lost; (void)cumulative_number_of_packets_lost; (void)highest_seq; (void)jitter; (void)lst; (void)dlsr;
srs_verbose("sender report, ssrc=%u, fraction_lost=%u, cumulative_number_of_packets_lost=%u, highest_seq=%u, jitter=%u, lst=%u, dlst=%u",
ssrc, fraction_lost, cumulative_number_of_packets_lost, highest_seq, jitter, lst, dlsr);
}
last_sender_report_ntp[ssrc_of_sender] = srs_ntp;
last_sender_report_sys_time[ssrc_of_sender] = srs_update_system_time();
return err;
}
srs_error_t SrsRtcPublisher::on_rtcp_xr(char* buf, int nb_buf)
{
srs_error_t err = srs_success;
/*
@see: http://www.rfc-editor.org/rfc/rfc3611.html#section-2
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|V=2|P|reserved | PT=XR=207 | length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| SSRC |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
: report blocks :
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
*/
SrsBuffer stream(buf, nb_buf);
/*uint8_t first = */stream.read_1bytes();
uint8_t pt = stream.read_1bytes();
srs_assert(pt == kXR);
uint16_t length = (stream.read_2bytes() + 1) * 4;
/*uint32_t ssrc = */stream.read_4bytes();
if (length != nb_buf) {
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid XR packet, length=%u, nb_buf=%d", length, nb_buf);
}
while (stream.pos() + 4 < length) {
uint8_t bt = stream.read_1bytes();
stream.skip(1);
uint16_t block_length = (stream.read_2bytes() + 1) * 4;
if (stream.pos() + block_length - 4 > nb_buf) {
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid XR packet block, block_length=%u, nb_buf=%d", block_length, nb_buf);
}
if (bt == 5) {
for (int i = 4; i < block_length; i += 12) {
uint32_t ssrc = stream.read_4bytes();
uint32_t lrr = stream.read_4bytes();
uint32_t dlrr = stream.read_4bytes();
SrsNtp cur_ntp = SrsNtp::from_time_ms(srs_update_system_time() / 1000);
uint32_t compact_ntp = (cur_ntp.ntp_second_ << 16) | (cur_ntp.ntp_fractions_ >> 16);
int rtt_ntp = compact_ntp - lrr - dlrr;
int rtt = ((rtt_ntp * 1000) >> 16) + ((rtt_ntp >> 16) * 1000);
srs_verbose("ssrc=%u, compact_ntp=%u, lrr=%u, dlrr=%u, rtt=%d",
ssrc, compact_ntp, lrr, dlrr, rtt);
if (ssrc == video_ssrc) {
video_nack_->update_rtt(rtt);
} else if (ssrc == audio_ssrc) {
audio_nack_->update_rtt(rtt);
}
}
}
}
return err;
}
srs_error_t SrsRtcPublisher::on_rtcp_feedback(char* buf, int nb_buf)
{
srs_error_t err = srs_success;
// TODO: FIXME: Implements it.
return err;
}
srs_error_t SrsRtcPublisher::on_rtcp_ps_feedback(char* buf, int nb_buf)
{
srs_error_t err = srs_success;
if (nb_buf < 12) {
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp feedback packet, nb_buf=%d", nb_buf);
}
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
SrsAutoFree(SrsBuffer, stream);
uint8_t first = stream->read_1bytes();
//uint8_t version = first & 0xC0;
//uint8_t padding = first & 0x20;
uint8_t fmt = first & 0x1F;
/*uint8_t payload_type = */stream->read_1bytes();
/*uint16_t length = */stream->read_2bytes();
/*uint32_t ssrc_of_sender = */stream->read_4bytes();
/*uint32_t ssrc_of_media_source = */stream->read_4bytes();
switch (fmt) {
case kPLI: {
srs_verbose("pli");
break;
}
case kSLI: {
srs_verbose("sli");
break;
}
case kRPSI: {
srs_verbose("rpsi");
break;
}
case kAFB: {
srs_verbose("afb");
break;
}
default: {
return srs_error_new(ERROR_RTC_RTCP, "unknown payload specific feedback=%u", fmt);
}
}
return err;
}
srs_error_t SrsRtcPublisher::on_rtcp_rr(char* buf, int nb_buf)
{
srs_error_t err = srs_success;
if (nb_buf < 8) {
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp receiver report packet, nb_buf=%d", nb_buf);
}
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
SrsAutoFree(SrsBuffer, stream);
// @see: https://tools.ietf.org/html/rfc3550#section-6.4.2
/*
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
header |V=2|P| RC | PT=RR=201 | length |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| SSRC of packet sender |
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
report | SSRC_1 (SSRC of first source) |
block +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
1 | fraction lost | cumulative number of packets lost |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| extended highest sequence number received |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| interarrival jitter |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| last SR (LSR) |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| delay since last SR (DLSR) |
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
report | SSRC_2 (SSRC of second source) |
block +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
2 : ... :
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
| profile-specific extensions |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
*/
uint8_t first = stream->read_1bytes();
//uint8_t version = first & 0xC0;
//uint8_t padding = first & 0x20;
uint8_t rc = first & 0x1F;
/*uint8_t payload_type = */stream->read_1bytes();
uint16_t length = stream->read_2bytes();
/*uint32_t ssrc_of_sender = */stream->read_4bytes();
if (((length + 1) * 4) != (rc * 24 + 8)) {
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtcp receiver packet, length=%u, rc=%u", length, rc);
}
for (int i = 0; i < rc; ++i) {
uint32_t ssrc = stream->read_4bytes();
uint8_t fraction_lost = stream->read_1bytes();
uint32_t cumulative_number_of_packets_lost = stream->read_3bytes();
uint32_t highest_seq = stream->read_4bytes();
uint32_t jitter = stream->read_4bytes();
uint32_t lst = stream->read_4bytes();
uint32_t dlsr = stream->read_4bytes();
(void)ssrc; (void)fraction_lost; (void)cumulative_number_of_packets_lost; (void)highest_seq; (void)jitter; (void)lst; (void)dlsr;
srs_verbose("ssrc=%u, fraction_lost=%u, cumulative_number_of_packets_lost=%u, highest_seq=%u, jitter=%u, lst=%u, dlst=%u",
ssrc, fraction_lost, cumulative_number_of_packets_lost, highest_seq, jitter, lst, dlsr);
}
2020-05-08 08:25:09 +00:00
return err;
2020-04-23 09:08:21 +00:00
}
void SrsRtcPublisher::request_keyframe()
{
int scid = _srs_context->get_id();
2020-05-03 05:49:53 +00:00
int pcid = session_->context_id();
srs_trace("RTC play=[%d][%d] request keyframe from publish=[%d][%d]", ::getpid(), scid, ::getpid(), pcid);
video_queue_->request_keyframe();
}
srs_error_t SrsRtcPublisher::notify(int type, srs_utime_t interval, srs_utime_t tick)
{
2020-04-30 06:49:37 +00:00
srs_error_t err = srs_success;
2020-04-30 06:49:37 +00:00
// TODO: FIXME: Check error.
send_rtcp_rr(video_ssrc, video_queue_);
send_rtcp_rr(audio_ssrc, audio_queue_);
2020-04-30 06:49:37 +00:00
send_rtcp_xr_rrtr(video_ssrc);
send_rtcp_xr_rrtr(audio_ssrc);
return err;
}
2020-04-23 09:08:21 +00:00
2020-05-04 06:47:58 +00:00
void SrsRtcPublisher::simulate_nack_drop(int nn)
{
nn_simulate_nack_drop = nn;
2020-05-04 06:47:58 +00:00
}
2020-05-04 12:42:30 +00:00
void SrsRtcPublisher::simulate_drop_packet(SrsRtpHeader* h, int nn_bytes)
{
srs_warn("RTC NACK simulator #%d drop seq=%u, ssrc=%u/%s, ts=%u, %d bytes", nn_simulate_nack_drop,
h->get_sequence(), h->get_ssrc(), (h->get_ssrc()==video_ssrc? "Video":"Audio"), h->get_timestamp(),
nn_bytes);
nn_simulate_nack_drop--;
}
2020-05-03 01:55:43 +00:00
SrsRtcSession::SrsRtcSession(SrsRtcServer* s)
{
2020-05-03 01:55:43 +00:00
req = NULL;
cid = 0;
is_publisher_ = false;
encrypt = true;
2020-05-03 01:55:43 +00:00
source_ = NULL;
2020-05-03 05:49:53 +00:00
publisher_ = NULL;
player_ = NULL;
2020-04-30 06:49:37 +00:00
sendonly_skt = NULL;
2020-05-03 05:49:53 +00:00
server_ = s;
dtls_ = new SrsRtcDtls(this);
2020-04-26 11:00:36 +00:00
2020-05-05 23:37:00 +00:00
state_ = INIT;
2020-04-26 11:00:36 +00:00
last_stun_time = 0;
sessionStunTimeout = 0;
2020-04-27 01:35:50 +00:00
blackhole = false;
blackhole_addr = NULL;
blackhole_stfd = NULL;
2020-02-28 15:18:39 +00:00
}
SrsRtcSession::~SrsRtcSession()
{
2020-05-03 05:49:53 +00:00
srs_freep(player_);
srs_freep(publisher_);
srs_freep(dtls_);
2020-04-26 08:12:23 +00:00
srs_freep(req);
2020-04-27 01:35:50 +00:00
srs_close_stfd(blackhole_stfd);
srs_freep(blackhole_addr);
2020-04-30 06:49:37 +00:00
srs_freep(sendonly_skt);
2020-02-28 15:18:39 +00:00
}
SrsSdp* SrsRtcSession::get_local_sdp()
{
return &local_sdp;
}
2020-03-30 07:16:29 +00:00
void SrsRtcSession::set_local_sdp(const SrsSdp& sdp)
{
local_sdp = sdp;
}
SrsSdp* SrsRtcSession::get_remote_sdp()
{
return &remote_sdp;
}
void SrsRtcSession::set_remote_sdp(const SrsSdp& sdp)
{
remote_sdp = sdp;
}
2020-05-05 23:37:00 +00:00
SrsRtcSessionStateType SrsRtcSession::state()
{
2020-05-05 23:37:00 +00:00
return state_;
}
2020-05-05 23:37:00 +00:00
void SrsRtcSession::set_state(SrsRtcSessionStateType state)
{
2020-05-05 23:37:00 +00:00
state_ = state;
}
2020-05-04 06:47:58 +00:00
string SrsRtcSession::id()
{
2020-05-04 06:47:58 +00:00
return peer_id_ + "/" + username_;
}
2020-05-04 06:47:58 +00:00
string SrsRtcSession::peer_id()
{
2020-05-04 06:47:58 +00:00
return peer_id_;
}
2020-05-04 06:47:58 +00:00
void SrsRtcSession::set_peer_id(string v)
{
2020-05-04 06:47:58 +00:00
peer_id_ = v;
}
string SrsRtcSession::username()
{
return username_;
}
void SrsRtcSession::set_encrypt(bool v)
{
encrypt = v;
}
void SrsRtcSession::switch_to_context()
{
_srs_context->set_id(cid);
}
int SrsRtcSession::context_id()
{
return cid;
}
2020-05-12 05:19:31 +00:00
srs_error_t SrsRtcSession::initialize(SrsRtcSource* source, SrsRequest* r, bool is_publisher, string username, int context_id)
2020-04-26 11:00:36 +00:00
{
srs_error_t err = srs_success;
2020-05-04 06:47:58 +00:00
username_ = username;
2020-05-03 01:55:43 +00:00
req = r->copy();
cid = context_id;
is_publisher_ = is_publisher;
source_ = source;
2020-05-03 05:49:53 +00:00
if ((err = dtls_->initialize(req)) != srs_success) {
2020-04-26 11:00:36 +00:00
return srs_error_wrap(err, "init");
}
// TODO: FIXME: Support reload.
sessionStunTimeout = _srs_config->get_rtc_stun_timeout(req->vhost);
last_stun_time = srs_get_system_time();
2020-04-27 01:35:50 +00:00
blackhole = _srs_config->get_rtc_server_black_hole();
srs_trace("RTC init session, timeout=%dms, blackhole=%d", srsu2msi(sessionStunTimeout), blackhole);
if (blackhole) {
string blackhole_ep = _srs_config->get_rtc_server_black_hole_publisher();
if (!blackhole_ep.empty()) {
string host; int port;
srs_parse_hostport(blackhole_ep, host, port);
srs_freep(blackhole_addr);
blackhole_addr = new sockaddr_in();
blackhole_addr->sin_family = AF_INET;
blackhole_addr->sin_addr.s_addr = inet_addr(host.c_str());
blackhole_addr->sin_port = htons(port);
int fd = socket(AF_INET, SOCK_DGRAM, 0);
blackhole_stfd = srs_netfd_open_socket(fd);
srs_assert(blackhole_stfd);
srs_trace("RTC blackhole %s:%d, fd=%d", host.c_str(), port, fd);
}
}
2020-04-26 11:00:36 +00:00
return err;
}
2020-04-30 06:49:37 +00:00
srs_error_t SrsRtcSession::on_stun(SrsUdpMuxSocket* skt, SrsStunPacket* r)
2020-02-28 15:18:39 +00:00
{
srs_error_t err = srs_success;
2020-04-30 06:49:37 +00:00
if (!r->is_binding_request()) {
return err;
}
2020-03-06 15:01:48 +00:00
2020-04-30 06:49:37 +00:00
last_stun_time = srs_get_system_time();
2020-04-30 06:49:37 +00:00
// We are running in the ice-lite(server) mode. If client have multi network interface,
// we only choose one candidate pair which is determined by client.
2020-05-04 06:47:58 +00:00
if (!sendonly_skt || sendonly_skt->peer_id() != skt->peer_id()) {
2020-04-30 06:49:37 +00:00
update_sendonly_socket(skt);
}
2020-04-23 15:14:30 +00:00
2020-04-30 06:49:37 +00:00
// Write STUN messages to blackhole.
if (blackhole && blackhole_addr && blackhole_stfd) {
// Ignore any error for black-hole.
void* p = skt->data(); int len = skt->size();
srs_sendto(blackhole_stfd, p, len, (sockaddr*)blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
}
if ((err = on_binding_request(r)) != srs_success) {
return srs_error_wrap(err, "stun binding request failed");
}
2020-02-28 15:18:39 +00:00
return err;
}
srs_error_t SrsRtcSession::on_dtls(char* data, int nb_data)
{
2020-05-03 05:49:53 +00:00
return dtls_->on_dtls(data, nb_data);
}
2020-03-28 12:52:42 +00:00
srs_error_t SrsRtcSession::on_rtcp(char* data, int nb_data)
2020-03-06 15:01:48 +00:00
{
2020-03-07 16:30:31 +00:00
srs_error_t err = srs_success;
2020-05-03 05:49:53 +00:00
if (dtls_ == NULL) {
return srs_error_new(ERROR_RTC_RTCP, "recv unexpect rtp packet before dtls done");
}
char unprotected_buf[kRtpPacketSize];
int nb_unprotected_buf = nb_data;
2020-05-03 05:49:53 +00:00
if ((err = dtls_->unprotect_rtcp(unprotected_buf, data, nb_unprotected_buf)) != srs_success) {
return srs_error_wrap(err, "rtcp unprotect failed");
2020-03-06 15:01:48 +00:00
}
if (blackhole && blackhole_addr && blackhole_stfd) {
// Ignore any error for black-hole.
void* p = unprotected_buf; int len = nb_unprotected_buf;
srs_sendto(blackhole_stfd, p, len, (sockaddr*)blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
2020-03-07 16:30:31 +00:00
}
2020-05-08 08:25:09 +00:00
if (player_) {
return player_->on_rtcp(unprotected_buf, nb_unprotected_buf);
}
2020-05-08 08:25:09 +00:00
if (publisher_) {
return publisher_->on_rtcp(unprotected_buf, nb_unprotected_buf);
2020-04-27 01:35:50 +00:00
}
2020-03-07 16:30:31 +00:00
return err;
2020-03-06 15:01:48 +00:00
}
srs_error_t SrsRtcSession::on_rtp(char* data, int nb_data)
{
srs_error_t err = srs_success;
2020-05-03 05:49:53 +00:00
if (publisher_ == NULL) {
return srs_error_new(ERROR_RTC_RTCP, "rtc publisher null");
}
2020-05-03 05:49:53 +00:00
if (dtls_ == NULL) {
return srs_error_new(ERROR_RTC_RTCP, "recv unexpect rtp packet before dtls done");
}
int nb_unprotected_buf = nb_data;
char* unprotected_buf = new char[kRtpPacketSize];
2020-05-03 05:49:53 +00:00
if ((err = dtls_->unprotect_rtp(unprotected_buf, data, nb_unprotected_buf)) != srs_success) {
srs_freepa(unprotected_buf);
return srs_error_wrap(err, "rtp unprotect failed");
}
if (blackhole && blackhole_addr && blackhole_stfd) {
// Ignore any error for black-hole.
void* p = unprotected_buf; int len = nb_unprotected_buf;
srs_sendto(blackhole_stfd, p, len, (sockaddr*)blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
}
2020-05-03 05:49:53 +00:00
return publisher_->on_rtp(unprotected_buf, nb_unprotected_buf);
}
srs_error_t SrsRtcSession::on_connection_established()
{
srs_error_t err = srs_success;
srs_trace("RTC %s session=%s, to=%dms connection established", (is_publisher_? "Publisher":"Subscriber"),
id().c_str(), srsu2msi(sessionStunTimeout));
if (is_publisher_) {
if ((err = start_publish()) != srs_success) {
return srs_error_wrap(err, "start publish");
}
} else {
if ((err = start_play()) != srs_success) {
return srs_error_wrap(err, "start play");
}
}
return err;
}
srs_error_t SrsRtcSession::start_play()
{
srs_error_t err = srs_success;
2020-05-03 05:49:53 +00:00
srs_freep(player_);
player_ = new SrsRtcPlayer(this, _srs_context->get_id());
uint32_t video_ssrc = 0;
uint32_t audio_ssrc = 0;
uint16_t video_payload_type = 0;
uint16_t audio_payload_type = 0;
for (size_t i = 0; i < local_sdp.media_descs_.size(); ++i) {
const SrsMediaDesc& media_desc = local_sdp.media_descs_[i];
if (media_desc.is_audio()) {
audio_ssrc = media_desc.ssrc_infos_[0].ssrc_;
audio_payload_type = media_desc.payload_types_[0].payload_type_;
} else if (media_desc.is_video()) {
video_ssrc = media_desc.ssrc_infos_[0].ssrc_;
video_payload_type = media_desc.payload_types_[0].payload_type_;
}
}
2020-05-03 05:49:53 +00:00
if ((err = player_->initialize(video_ssrc, audio_ssrc, video_payload_type, audio_payload_type)) != srs_success) {
return srs_error_wrap(err, "SrsRtcPlayer init");
}
2020-05-03 05:49:53 +00:00
if ((err = player_->start()) != srs_success) {
return srs_error_wrap(err, "start SrsRtcPlayer");
}
return err;
}
srs_error_t SrsRtcSession::start_publish()
{
srs_error_t err = srs_success;
2020-05-03 05:49:53 +00:00
srs_freep(publisher_);
publisher_ = new SrsRtcPublisher(this);
// Request PLI for exists players?
2020-05-03 05:49:53 +00:00
//publisher_->request_keyframe();
uint32_t video_ssrc = 0;
uint32_t audio_ssrc = 0;
for (size_t i = 0; i < remote_sdp.media_descs_.size(); ++i) {
const SrsMediaDesc& media_desc = remote_sdp.media_descs_[i];
if (media_desc.is_audio()) {
if (!media_desc.ssrc_infos_.empty()) {
audio_ssrc = media_desc.ssrc_infos_[0].ssrc_;
}
} else if (media_desc.is_video()) {
if (!media_desc.ssrc_infos_.empty()) {
video_ssrc = media_desc.ssrc_infos_[0].ssrc_;
}
}
}
// FIXME: err process.
2020-05-03 05:49:53 +00:00
if ((err = publisher_->initialize(video_ssrc, audio_ssrc, req)) != srs_success) {
return srs_error_wrap(err, "rtc publisher init");
}
return err;
}
bool SrsRtcSession::is_stun_timeout()
{
return last_stun_time + sessionStunTimeout < srs_get_system_time();
}
void SrsRtcSession::update_sendonly_socket(SrsUdpMuxSocket* skt)
{
if (sendonly_skt) {
srs_trace("session %s address changed, update %s -> %s",
2020-05-04 06:47:58 +00:00
id().c_str(), sendonly_skt->peer_id().c_str(), skt->peer_id().c_str());
}
srs_freep(sendonly_skt);
sendonly_skt = skt->copy_sendonly();
}
2020-05-04 06:47:58 +00:00
void SrsRtcSession::simulate_nack_drop(int nn)
{
if (player_) {
player_->simulate_nack_drop(nn);
}
if (publisher_) {
publisher_->simulate_nack_drop(nn);
}
}
#ifdef SRS_OSX
// These functions are similar to the older byteorder(3) family of functions.
// For example, be32toh() is identical to ntohl().
// @see https://linux.die.net/man/3/be32toh
#define be32toh ntohl
#endif
srs_error_t SrsRtcSession::on_binding_request(SrsStunPacket* r)
{
srs_error_t err = srs_success;
bool strict_check = _srs_config->get_rtc_stun_strict_check(req->vhost);
if (strict_check && r->get_ice_controlled()) {
// @see: https://tools.ietf.org/html/draft-ietf-ice-rfc5245bis-00#section-6.1.3.1
// TODO: Send 487 (Role Conflict) error response.
return srs_error_new(ERROR_RTC_STUN, "Peer must not in ice-controlled role in ice-lite mode.");
}
SrsStunPacket stun_binding_response;
char buf[kRtpPacketSize];
SrsBuffer* stream = new SrsBuffer(buf, sizeof(buf));
SrsAutoFree(SrsBuffer, stream);
stun_binding_response.set_message_type(BindingResponse);
stun_binding_response.set_local_ufrag(r->get_remote_ufrag());
stun_binding_response.set_remote_ufrag(r->get_local_ufrag());
stun_binding_response.set_transcation_id(r->get_transcation_id());
// FIXME: inet_addr is deprecated, IPV6 support
stun_binding_response.set_mapped_address(be32toh(inet_addr(sendonly_skt->get_peer_ip().c_str())));
stun_binding_response.set_mapped_port(sendonly_skt->get_peer_port());
if ((err = stun_binding_response.encode(get_local_sdp()->get_ice_pwd(), stream)) != srs_success) {
return srs_error_wrap(err, "stun binding response encode failed");
}
if ((err = sendonly_skt->sendto(stream->data(), stream->pos(), 0)) != srs_success) {
return srs_error_wrap(err, "stun binding response send failed");
}
2020-05-05 23:37:00 +00:00
if (state_ == WAITING_STUN) {
state_ = DOING_DTLS_HANDSHAKE;
2020-05-04 06:47:58 +00:00
peer_id_ = sendonly_skt->peer_id();
server_->insert_into_id_sessions(peer_id_, this);
2020-05-05 23:37:00 +00:00
state_ = DOING_DTLS_HANDSHAKE;
srs_trace("rtc session=%s, STUN done, waitting DTLS handshake.", id().c_str());
}
if (blackhole && blackhole_addr && blackhole_stfd) {
// Ignore any error for black-hole.
void* p = stream->data(); int len = stream->pos();
srs_sendto(blackhole_stfd, p, len, (sockaddr*)blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
}
return err;
}