2020-02-28 15:18:39 +00:00
|
|
|
/**
|
|
|
|
* The MIT License (MIT)
|
|
|
|
*
|
2020-03-31 10:03:04 +00:00
|
|
|
* Copyright (c) 2013-2020 John
|
2020-02-28 15:18:39 +00:00
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
|
|
|
* this software and associated documentation files (the "Software"), to deal in
|
|
|
|
* the Software without restriction, including without limitation the rights to
|
|
|
|
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
|
|
|
* the Software, and to permit persons to whom the Software is furnished to do so,
|
|
|
|
* subject to the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be included in all
|
|
|
|
* copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
|
|
|
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
|
|
|
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <srs_app_rtc_conn.hpp>
|
|
|
|
|
|
|
|
using namespace std;
|
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
2020-03-11 11:21:44 +00:00
|
|
|
#include <fcntl.h>
|
|
|
|
#include <unistd.h>
|
2020-03-06 15:01:48 +00:00
|
|
|
|
2020-03-02 14:47:40 +00:00
|
|
|
#include <sstream>
|
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
#include <srs_core_autofree.hpp>
|
|
|
|
#include <srs_kernel_buffer.hpp>
|
2020-05-11 04:07:55 +00:00
|
|
|
#include <srs_kernel_rtc_rtp.hpp>
|
2020-02-28 15:18:39 +00:00
|
|
|
#include <srs_kernel_error.hpp>
|
2020-03-06 15:01:48 +00:00
|
|
|
#include <srs_kernel_log.hpp>
|
2020-05-11 04:07:55 +00:00
|
|
|
#include <srs_rtc_stun_stack.hpp>
|
2020-03-09 11:46:27 +00:00
|
|
|
#include <srs_rtmp_stack.hpp>
|
|
|
|
#include <srs_rtmp_msg_array.hpp>
|
2020-03-11 11:21:44 +00:00
|
|
|
#include <srs_app_utility.hpp>
|
2020-03-07 07:28:15 +00:00
|
|
|
#include <srs_app_config.hpp>
|
2020-05-11 04:07:55 +00:00
|
|
|
#include <srs_app_rtc_queue.hpp>
|
2020-03-09 11:46:27 +00:00
|
|
|
#include <srs_app_source.hpp>
|
|
|
|
#include <srs_app_server.hpp>
|
2020-03-07 07:28:15 +00:00
|
|
|
#include <srs_service_utility.hpp>
|
2020-03-17 09:56:37 +00:00
|
|
|
#include <srs_http_stack.hpp>
|
|
|
|
#include <srs_app_http_api.hpp>
|
2020-04-05 16:24:14 +00:00
|
|
|
#include <srs_app_statistic.hpp>
|
2020-04-08 15:24:59 +00:00
|
|
|
#include <srs_app_pithy_print.hpp>
|
2020-04-27 01:35:50 +00:00
|
|
|
#include <srs_service_st.hpp>
|
2020-05-11 03:45:20 +00:00
|
|
|
#include <srs_app_rtc_server.hpp>
|
2020-05-12 05:19:31 +00:00
|
|
|
#include <srs_app_rtc_source.hpp>
|
2020-02-28 15:18:39 +00:00
|
|
|
|
2020-04-23 09:08:21 +00:00
|
|
|
uint64_t SrsNtp::kMagicNtpFractionalUnit = 1ULL << 32;
|
|
|
|
|
|
|
|
SrsNtp::SrsNtp()
|
|
|
|
{
|
|
|
|
system_ms_ = 0;
|
|
|
|
ntp_ = 0;
|
|
|
|
ntp_second_ = 0;
|
|
|
|
ntp_fractions_ = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsNtp::~SrsNtp()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsNtp SrsNtp::from_time_ms(uint64_t ms)
|
|
|
|
{
|
|
|
|
SrsNtp srs_ntp;
|
|
|
|
srs_ntp.system_ms_ = ms;
|
|
|
|
srs_ntp.ntp_second_ = ms / 1000;
|
|
|
|
srs_ntp.ntp_fractions_ = (static_cast<double>(ms % 1000 / 1000.0)) * kMagicNtpFractionalUnit;
|
|
|
|
srs_ntp.ntp_ = (static_cast<uint64_t>(srs_ntp.ntp_second_) << 32) | srs_ntp.ntp_fractions_;
|
|
|
|
return srs_ntp;
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsNtp SrsNtp::to_time_ms(uint64_t ntp)
|
|
|
|
{
|
|
|
|
SrsNtp srs_ntp;
|
|
|
|
srs_ntp.ntp_ = ntp;
|
|
|
|
srs_ntp.ntp_second_ = (ntp & 0xFFFFFFFF00000000ULL) >> 32;
|
|
|
|
srs_ntp.ntp_fractions_ = (ntp & 0x00000000FFFFFFFFULL);
|
|
|
|
srs_ntp.system_ms_ = (static_cast<uint64_t>(srs_ntp.ntp_second_) * 1000) +
|
|
|
|
(static_cast<double>(static_cast<uint64_t>(srs_ntp.ntp_fractions_) * 1000.0) / kMagicNtpFractionalUnit);
|
|
|
|
return srs_ntp;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
SrsSecurityTransport::SrsSecurityTransport(SrsRtcConnection* s)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
2020-05-03 05:49:53 +00:00
|
|
|
session_ = s;
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-06-25 04:03:21 +00:00
|
|
|
dtls_ = new SrsDtls((ISrsDtlsCallback*)this);
|
2020-06-25 12:47:17 +00:00
|
|
|
srtp_ = new SrsSRTP();
|
2020-06-25 04:03:21 +00:00
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
handshake_done = false;
|
|
|
|
}
|
|
|
|
|
2020-06-25 04:03:21 +00:00
|
|
|
SrsSecurityTransport::~SrsSecurityTransport()
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
2020-06-25 04:03:21 +00:00
|
|
|
if (dtls_) {
|
|
|
|
srs_freep(dtls_);
|
|
|
|
dtls_ = NULL;
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
|
|
|
|
2020-06-25 12:47:17 +00:00
|
|
|
if (srtp_) {
|
|
|
|
srs_freep(srtp_);
|
|
|
|
srtp_ = NULL;
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-06-27 03:13:53 +00:00
|
|
|
srs_error_t SrsSecurityTransport::initialize(SrsSessionConfig* cfg)
|
2020-06-25 04:03:21 +00:00
|
|
|
{
|
2020-06-27 03:13:53 +00:00
|
|
|
return dtls_->initialize(cfg->dtls_role, cfg->dtls_version);
|
2020-06-25 04:03:21 +00:00
|
|
|
}
|
2020-03-30 07:16:29 +00:00
|
|
|
|
2020-06-27 03:13:53 +00:00
|
|
|
srs_error_t SrsSecurityTransport::start_active_handshake()
|
2020-06-25 04:03:21 +00:00
|
|
|
{
|
2020-06-27 03:13:53 +00:00
|
|
|
return dtls_->start_active_handshake();
|
2020-03-30 07:16:29 +00:00
|
|
|
}
|
|
|
|
|
2020-06-25 04:03:21 +00:00
|
|
|
srs_error_t SrsSecurityTransport::write_dtls_data(void* data, int size)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
2020-06-25 04:03:21 +00:00
|
|
|
if (size) {
|
|
|
|
if ((err = session_->sendonly_skt->sendto(data, size, 0)) != srs_success) {
|
2020-03-16 14:35:24 +00:00
|
|
|
return srs_error_wrap(err, "send dtls packet");
|
|
|
|
}
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-05-03 05:49:53 +00:00
|
|
|
if (session_->blackhole && session_->blackhole_addr && session_->blackhole_stfd) {
|
2020-04-27 01:35:50 +00:00
|
|
|
// Ignore any error for black-hole.
|
2020-07-07 08:37:34 +00:00
|
|
|
void* p = data; int len = size; SrsRtcConnection* s = session_;
|
2020-04-27 01:35:50 +00:00
|
|
|
srs_sendto(s->blackhole_stfd, p, len, (sockaddr*)s->blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
|
|
|
|
}
|
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-06-25 04:03:21 +00:00
|
|
|
srs_error_t SrsSecurityTransport::on_dtls(char* data, int nb_data)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
2020-06-25 04:03:21 +00:00
|
|
|
return dtls_->on_dtls(data, nb_data);
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-06-25 04:03:21 +00:00
|
|
|
srs_error_t SrsSecurityTransport::on_dtls_handshake_done()
|
2020-03-07 16:30:31 +00:00
|
|
|
{
|
2020-03-09 11:46:27 +00:00
|
|
|
srs_error_t err = srs_success;
|
2020-07-03 02:46:35 +00:00
|
|
|
|
|
|
|
if (handshake_done) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-12 01:55:35 +00:00
|
|
|
srs_trace("RTC session=%s, DTLS handshake done.", session_->id().c_str());
|
2020-03-07 16:30:31 +00:00
|
|
|
|
|
|
|
handshake_done = true;
|
2020-03-09 11:46:27 +00:00
|
|
|
if ((err = srtp_initialize()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "srtp init failed");
|
|
|
|
}
|
|
|
|
|
2020-05-03 05:49:53 +00:00
|
|
|
return session_->on_connection_established();
|
2020-03-07 16:30:31 +00:00
|
|
|
}
|
|
|
|
|
2020-06-25 04:03:21 +00:00
|
|
|
srs_error_t SrsSecurityTransport::on_dtls_application_data(const char* buf, const int nb_buf)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-03-16 14:35:24 +00:00
|
|
|
// TODO: process SCTP protocol(WebRTC datachannel support)
|
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-06-25 04:03:21 +00:00
|
|
|
srs_error_t SrsSecurityTransport::srtp_initialize()
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-06-25 06:50:14 +00:00
|
|
|
std::string send_key;
|
|
|
|
std::string recv_key;
|
2020-06-25 04:03:21 +00:00
|
|
|
|
2020-06-25 06:50:14 +00:00
|
|
|
if ((err = dtls_->get_srtp_key(recv_key, send_key)) != srs_success) {
|
2020-06-25 04:03:21 +00:00
|
|
|
return err;
|
2020-04-30 06:49:37 +00:00
|
|
|
}
|
2020-06-25 12:47:17 +00:00
|
|
|
|
|
|
|
if ((err = srtp_->initialize(recv_key, send_key)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "srtp init failed");
|
2020-03-07 16:30:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-06-25 12:47:17 +00:00
|
|
|
srs_error_t SrsSecurityTransport::protect_rtp(const char* plaintext, char* cipher, int& nb_cipher)
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
2020-06-25 12:47:17 +00:00
|
|
|
if (!srtp_) {
|
2020-06-25 06:50:14 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtp protect failed");
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
|
|
|
|
2020-06-25 12:47:17 +00:00
|
|
|
return srtp_->protect_rtp(plaintext, cipher, nb_cipher);
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsSecurityTransport::protect_rtcp(const char* plaintext, char* cipher, int& nb_cipher)
|
|
|
|
{
|
|
|
|
if (!srtp_) {
|
|
|
|
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtcp protect failed");
|
|
|
|
}
|
|
|
|
|
|
|
|
return srtp_->protect_rtcp(plaintext, cipher, nb_cipher);
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
|
|
|
|
2020-05-02 02:24:31 +00:00
|
|
|
// TODO: FIXME: Merge with protect_rtp.
|
2020-06-25 04:03:21 +00:00
|
|
|
srs_error_t SrsSecurityTransport::protect_rtp2(void* rtp_hdr, int* len_ptr)
|
2020-04-11 14:54:44 +00:00
|
|
|
{
|
2020-06-25 12:47:17 +00:00
|
|
|
if (!srtp_) {
|
2020-04-11 14:54:44 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtp protect");
|
|
|
|
}
|
|
|
|
|
2020-06-25 12:47:17 +00:00
|
|
|
return srtp_->protect_rtp2(rtp_hdr, len_ptr);
|
2020-04-11 14:54:44 +00:00
|
|
|
}
|
|
|
|
|
2020-06-25 12:47:17 +00:00
|
|
|
srs_error_t SrsSecurityTransport::unprotect_rtp(const char* cipher, char* plaintext, int& nb_plaintext)
|
2020-03-12 16:24:56 +00:00
|
|
|
{
|
2020-06-25 12:47:17 +00:00
|
|
|
if (!srtp_) {
|
2020-06-25 06:50:14 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_UNPROTECT, "rtp unprotect failed");
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
2020-06-25 06:50:14 +00:00
|
|
|
|
2020-06-25 12:47:17 +00:00
|
|
|
return srtp_->unprotect_rtp(cipher, plaintext, nb_plaintext);
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
|
|
|
|
2020-06-25 12:47:17 +00:00
|
|
|
srs_error_t SrsSecurityTransport::unprotect_rtcp(const char* cipher, char* plaintext, int& nb_plaintext)
|
2020-03-12 16:24:56 +00:00
|
|
|
{
|
2020-06-25 12:47:17 +00:00
|
|
|
if (!srtp_) {
|
2020-06-25 06:50:14 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_UNPROTECT, "rtcp unprotect failed");
|
2020-03-10 11:47:49 +00:00
|
|
|
}
|
|
|
|
|
2020-06-25 12:47:17 +00:00
|
|
|
return srtp_->unprotect_rtcp(cipher, plaintext, nb_plaintext);
|
2020-03-10 11:47:49 +00:00
|
|
|
}
|
|
|
|
|
2020-05-14 06:45:54 +00:00
|
|
|
SrsRtcOutgoingInfo::SrsRtcOutgoingInfo()
|
2020-04-13 08:50:24 +00:00
|
|
|
{
|
2020-04-16 01:25:18 +00:00
|
|
|
#if defined(SRS_DEBUG)
|
|
|
|
debug_id = 0;
|
|
|
|
#endif
|
|
|
|
|
2020-04-13 09:11:46 +00:00
|
|
|
nn_rtp_pkts = 0;
|
|
|
|
nn_audios = nn_extras = 0;
|
|
|
|
nn_videos = nn_samples = 0;
|
2020-04-17 08:36:56 +00:00
|
|
|
nn_bytes = nn_rtp_bytes = 0;
|
2020-04-16 02:05:17 +00:00
|
|
|
nn_padding_bytes = nn_paddings = 0;
|
2020-04-13 08:50:24 +00:00
|
|
|
}
|
|
|
|
|
2020-05-14 06:45:54 +00:00
|
|
|
SrsRtcOutgoingInfo::~SrsRtcOutgoingInfo()
|
2020-04-13 08:50:24 +00:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
SrsRtcPlayStream::SrsRtcPlayStream(SrsRtcConnection* s, SrsContextId parent_cid)
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
|
|
|
_parent_cid = parent_cid;
|
|
|
|
trd = new SrsDummyCoroutine();
|
|
|
|
|
2020-05-03 05:49:53 +00:00
|
|
|
session_ = s;
|
2020-04-16 11:33:10 +00:00
|
|
|
|
2020-04-18 02:04:45 +00:00
|
|
|
mw_msgs = 0;
|
|
|
|
realtime = true;
|
|
|
|
|
2020-05-04 06:47:58 +00:00
|
|
|
// TODO: FIXME: Config the capacity?
|
2020-05-14 10:33:31 +00:00
|
|
|
audio_queue_ = new SrsRtpRingBuffer(100);
|
|
|
|
video_queue_ = new SrsRtpRingBuffer(1000);
|
2020-05-04 06:47:58 +00:00
|
|
|
|
|
|
|
nn_simulate_nack_drop = 0;
|
2020-05-04 12:42:30 +00:00
|
|
|
nack_enabled_ = false;
|
2020-05-04 06:47:58 +00:00
|
|
|
|
2020-04-13 08:50:24 +00:00
|
|
|
_srs_config->subscribe(this);
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
SrsRtcPlayStream::~SrsRtcPlayStream()
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
2020-04-13 08:50:24 +00:00
|
|
|
_srs_config->unsubscribe(this);
|
|
|
|
|
2020-03-09 11:46:27 +00:00
|
|
|
srs_freep(trd);
|
2020-05-04 06:47:58 +00:00
|
|
|
srs_freep(audio_queue_);
|
|
|
|
srs_freep(video_queue_);
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::initialize(uint32_t vssrc, uint32_t assrc, uint16_t v_pt, uint16_t a_pt)
|
2020-03-30 07:16:29 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
video_ssrc = vssrc;
|
|
|
|
audio_ssrc = assrc;
|
|
|
|
|
|
|
|
video_payload_type = v_pt;
|
|
|
|
audio_payload_type = a_pt;
|
|
|
|
|
2020-05-04 12:42:30 +00:00
|
|
|
// TODO: FIXME: Support reload.
|
|
|
|
nack_enabled_ = _srs_config->get_rtc_nack_enabled(session_->req->vhost);
|
2020-06-28 03:40:49 +00:00
|
|
|
srs_trace("RTC player video(ssrc=%d, pt=%d), audio(ssrc=%d, pt=%d), nack=%d",
|
|
|
|
video_ssrc, video_payload_type, audio_ssrc, audio_payload_type, nack_enabled_);
|
2020-04-13 08:50:24 +00:00
|
|
|
|
2020-05-24 13:40:23 +00:00
|
|
|
if (_srs_rtc_hijacker) {
|
|
|
|
if ((err = _srs_rtc_hijacker->on_start_play(session_, this, session_->req)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "on start play");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-30 07:16:29 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::on_reload_vhost_play(string vhost)
|
2020-04-18 02:04:45 +00:00
|
|
|
{
|
2020-05-03 05:49:53 +00:00
|
|
|
SrsRequest* req = session_->req;
|
2020-04-18 02:04:45 +00:00
|
|
|
|
|
|
|
if (req->vhost != vhost) {
|
|
|
|
return srs_success;
|
2020-04-13 08:50:24 +00:00
|
|
|
}
|
|
|
|
|
2020-04-18 02:04:45 +00:00
|
|
|
realtime = _srs_config->get_realtime_enabled(req->vhost, true);
|
|
|
|
mw_msgs = _srs_config->get_mw_msgs(req->vhost, realtime, true);
|
|
|
|
|
2020-05-13 12:13:25 +00:00
|
|
|
srs_trace("Reload play realtime=%d, mw_msgs=%d", realtime, mw_msgs);
|
2020-04-18 02:04:45 +00:00
|
|
|
|
2020-04-13 08:50:24 +00:00
|
|
|
return srs_success;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::on_reload_vhost_realtime(string vhost)
|
2020-04-18 02:04:45 +00:00
|
|
|
{
|
|
|
|
return on_reload_vhost_play(vhost);
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
SrsContextId SrsRtcPlayStream::cid()
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
|
|
|
return trd->cid();
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::start()
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
2020-04-30 06:49:37 +00:00
|
|
|
|
2020-03-09 11:46:27 +00:00
|
|
|
srs_freep(trd);
|
2020-03-12 16:24:56 +00:00
|
|
|
trd = new SrsSTCoroutine("rtc_sender", this, _parent_cid);
|
2020-04-30 06:49:37 +00:00
|
|
|
|
2020-03-09 11:46:27 +00:00
|
|
|
if ((err = trd->start()) != srs_success) {
|
2020-03-12 16:24:56 +00:00
|
|
|
return srs_error_wrap(err, "rtc_sender");
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
2020-04-30 06:49:37 +00:00
|
|
|
|
2020-03-09 11:46:27 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
void SrsRtcPlayStream::stop()
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
|
|
|
trd->stop();
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
void SrsRtcPlayStream::stop_loop()
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
2020-03-09 11:46:27 +00:00
|
|
|
trd->interrupt();
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::cycle()
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-07-08 11:01:33 +00:00
|
|
|
SrsRtcStream* source = NULL;
|
2020-05-03 05:49:53 +00:00
|
|
|
SrsRequest* req = session_->req;
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-05-12 05:19:31 +00:00
|
|
|
if ((err = _srs_rtc_sources->fetch_or_create(req, &source)) != srs_success) {
|
2020-03-09 11:46:27 +00:00
|
|
|
return srs_error_wrap(err, "rtc fetch source failed");
|
|
|
|
}
|
|
|
|
|
2020-05-12 05:19:31 +00:00
|
|
|
SrsRtcConsumer* consumer = NULL;
|
|
|
|
SrsAutoFree(SrsRtcConsumer, consumer);
|
2020-05-13 12:13:25 +00:00
|
|
|
if ((err = source->create_consumer(consumer)) != srs_success) {
|
2020-04-18 02:35:30 +00:00
|
|
|
return srs_error_wrap(err, "rtc create consumer, source url=%s", req->get_stream_url().c_str());
|
2020-03-17 10:24:28 +00:00
|
|
|
}
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-05-02 23:43:05 +00:00
|
|
|
// TODO: FIXME: Dumps the SPS/PPS from gop cache, without other frames.
|
|
|
|
if ((err = source->consumer_dumps(consumer)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "dumps consumer, source url=%s", req->get_stream_url().c_str());
|
|
|
|
}
|
|
|
|
|
2020-04-18 02:04:45 +00:00
|
|
|
realtime = _srs_config->get_realtime_enabled(req->vhost, true);
|
|
|
|
mw_msgs = _srs_config->get_mw_msgs(req->vhost, realtime, true);
|
|
|
|
|
2020-06-18 03:45:43 +00:00
|
|
|
srs_trace("RTC source url=%s, source_id=[%d][%s], encrypt=%d, realtime=%d, mw_msgs=%d", req->get_stream_url().c_str(),
|
|
|
|
::getpid(), source->source_id().c_str(), session_->encrypt, realtime, mw_msgs);
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-04-08 15:24:59 +00:00
|
|
|
SrsPithyPrint* pprint = SrsPithyPrint::create_rtc_play();
|
|
|
|
SrsAutoFree(SrsPithyPrint, pprint);
|
|
|
|
|
2020-07-12 01:55:35 +00:00
|
|
|
srs_trace("RTC session=%s, start play", session_->id().c_str());
|
2020-04-16 10:37:37 +00:00
|
|
|
bool stat_enabled = _srs_config->get_rtc_server_perf_stat();
|
2020-04-14 05:47:23 +00:00
|
|
|
SrsStatistic* stat = SrsStatistic::instance();
|
2020-04-09 06:34:48 +00:00
|
|
|
|
2020-05-13 12:13:25 +00:00
|
|
|
// TODO: FIXME: Use cache for performance?
|
|
|
|
vector<SrsRtpPacket2*> pkts;
|
2020-05-14 06:45:54 +00:00
|
|
|
SrsRtcOutgoingInfo info;
|
2020-05-13 12:13:25 +00:00
|
|
|
|
2020-05-24 13:40:23 +00:00
|
|
|
if (_srs_rtc_hijacker) {
|
|
|
|
if ((err = _srs_rtc_hijacker->on_start_consume(session_, this, session_->req, consumer)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "on start consuming");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-09 11:46:27 +00:00
|
|
|
while (true) {
|
2020-04-09 00:20:55 +00:00
|
|
|
if ((err = trd->pull()) != srs_success) {
|
2020-03-12 16:24:56 +00:00
|
|
|
return srs_error_wrap(err, "rtc sender thread");
|
|
|
|
}
|
|
|
|
|
2020-05-13 12:13:25 +00:00
|
|
|
// Wait for amount of packets.
|
|
|
|
consumer->wait(mw_msgs);
|
2020-03-12 16:24:56 +00:00
|
|
|
|
2020-05-13 12:13:25 +00:00
|
|
|
// TODO: FIXME: Handle error.
|
|
|
|
consumer->dump_packets(pkts);
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-05-13 12:13:25 +00:00
|
|
|
int msg_count = (int)pkts.size();
|
|
|
|
if (!msg_count) {
|
2020-03-12 16:24:56 +00:00
|
|
|
continue;
|
|
|
|
}
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-05-13 12:13:25 +00:00
|
|
|
// Send-out all RTP packets and do cleanup.
|
|
|
|
// TODO: FIXME: Handle error.
|
2020-05-21 09:00:40 +00:00
|
|
|
send_packets(source, pkts, info);
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-04-11 13:03:37 +00:00
|
|
|
for (int i = 0; i < msg_count; i++) {
|
2020-05-13 12:13:25 +00:00
|
|
|
SrsRtpPacket2* pkt = pkts[i];
|
|
|
|
srs_freep(pkt);
|
2020-04-11 13:03:37 +00:00
|
|
|
}
|
2020-05-13 12:13:25 +00:00
|
|
|
pkts.clear();
|
2020-03-22 08:54:31 +00:00
|
|
|
|
2020-04-16 10:37:37 +00:00
|
|
|
// Stat for performance analysis.
|
2020-04-18 12:37:08 +00:00
|
|
|
if (!stat_enabled) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2020-04-14 13:49:49 +00:00
|
|
|
// Stat the original RAW AV frame, maybe h264+aac.
|
|
|
|
stat->perf_on_msgs(msg_count);
|
|
|
|
// Stat the RTC packets, RAW AV frame, maybe h.264+opus.
|
2020-05-13 12:13:25 +00:00
|
|
|
int nn_rtc_packets = srs_max(info.nn_audios, info.nn_extras) + info.nn_videos;
|
2020-04-14 23:10:41 +00:00
|
|
|
stat->perf_on_rtc_packets(nn_rtc_packets);
|
2020-04-14 13:49:49 +00:00
|
|
|
// Stat the RAW RTP packets, which maybe group by GSO.
|
2020-05-14 06:44:24 +00:00
|
|
|
stat->perf_on_rtp_packets(msg_count);
|
2020-04-18 12:37:08 +00:00
|
|
|
// Stat the bytes and paddings.
|
2020-05-13 12:13:25 +00:00
|
|
|
stat->perf_on_rtc_bytes(info.nn_bytes, info.nn_rtp_bytes, info.nn_padding_bytes);
|
2020-04-14 05:47:23 +00:00
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
pprint->elapse();
|
|
|
|
if (pprint->can_print()) {
|
|
|
|
// TODO: FIXME: Print stat like frame/s, packet/s, loss_packets.
|
2020-05-21 06:22:45 +00:00
|
|
|
srs_trace("-> RTC PLAY %d msgs, %d/%d packets, %d audios, %d extras, %d videos, %d samples, %d/%d/%d bytes, %d pad, %d/%d cache",
|
|
|
|
msg_count, msg_count, info.nn_rtp_pkts, info.nn_audios, info.nn_extras, info.nn_videos, info.nn_samples, info.nn_bytes,
|
2020-05-14 06:44:24 +00:00
|
|
|
info.nn_rtp_bytes, info.nn_padding_bytes, info.nn_paddings, msg_count, msg_count);
|
2020-04-10 11:21:47 +00:00
|
|
|
}
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
2020-03-22 08:54:31 +00:00
|
|
|
}
|
|
|
|
|
2020-07-08 11:01:33 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::send_packets(SrsRtcStream* source, const vector<SrsRtpPacket2*>& pkts, SrsRtcOutgoingInfo& info)
|
2020-05-13 12:13:25 +00:00
|
|
|
{
|
2020-03-18 10:12:37 +00:00
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-17 04:30:53 +00:00
|
|
|
// If DTLS is not OK, drop all messages.
|
2020-06-25 04:03:21 +00:00
|
|
|
if (!session_->transport_) {
|
2020-04-11 13:03:37 +00:00
|
|
|
return err;
|
2020-04-09 11:38:50 +00:00
|
|
|
}
|
2020-03-18 10:12:37 +00:00
|
|
|
|
2020-04-13 05:58:34 +00:00
|
|
|
// Covert kernel messages to RTP packets.
|
2020-05-13 12:13:25 +00:00
|
|
|
for (int i = 0; i < (int)pkts.size(); i++) {
|
|
|
|
SrsRtpPacket2* pkt = pkts[i];
|
2020-04-11 09:52:14 +00:00
|
|
|
|
2020-04-13 09:11:46 +00:00
|
|
|
// Update stats.
|
2020-05-13 12:13:25 +00:00
|
|
|
info.nn_bytes += pkt->nb_bytes();
|
2020-04-13 09:11:46 +00:00
|
|
|
|
2020-07-02 06:51:32 +00:00
|
|
|
// For audio, we transcoded AAC to opus in extra payloads.
|
2020-05-13 12:13:25 +00:00
|
|
|
if (pkt->is_audio()) {
|
|
|
|
info.nn_audios++;
|
2020-05-21 05:50:18 +00:00
|
|
|
pkt->header.set_ssrc(audio_ssrc);
|
|
|
|
pkt->header.set_payload_type(audio_payload_type);
|
|
|
|
|
|
|
|
// TODO: FIXME: Padding audio to the max payload in RTP packets.
|
2020-06-17 07:18:14 +00:00
|
|
|
} else {
|
|
|
|
info.nn_videos++;
|
|
|
|
pkt->header.set_ssrc(video_ssrc);
|
|
|
|
pkt->header.set_payload_type(video_payload_type);
|
2020-04-13 05:58:34 +00:00
|
|
|
}
|
2020-03-18 10:12:37 +00:00
|
|
|
|
2020-06-17 07:18:14 +00:00
|
|
|
// Detail log, should disable it in release version.
|
2020-06-28 03:40:49 +00:00
|
|
|
srs_info("RTC: Update PT=%u, SSRC=%#x, Time=%u, %u bytes", pkt->header.get_payload_type(), pkt->header.get_ssrc(),
|
|
|
|
pkt->header.get_timestamp(), pkt->nb_bytes());
|
2020-05-14 06:26:19 +00:00
|
|
|
}
|
|
|
|
|
2020-05-21 09:00:40 +00:00
|
|
|
// By default, we send packets by sendmmsg.
|
|
|
|
if ((err = do_send_packets(pkts, info)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "raw send");
|
|
|
|
}
|
|
|
|
|
2020-05-14 06:26:19 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::do_send_packets(const std::vector<SrsRtpPacket2*>& pkts, SrsRtcOutgoingInfo& info)
|
2020-04-09 11:38:50 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-30 10:19:40 +00:00
|
|
|
// Cache the encrypt flag and sender.
|
2020-05-03 05:49:53 +00:00
|
|
|
bool encrypt = session_->encrypt;
|
2020-04-13 15:40:30 +00:00
|
|
|
|
2020-05-13 12:13:25 +00:00
|
|
|
for (int i = 0; i < (int)pkts.size(); i++) {
|
|
|
|
SrsRtpPacket2* pkt = pkts.at(i);
|
2020-04-13 15:40:30 +00:00
|
|
|
|
2020-04-16 23:10:16 +00:00
|
|
|
// For this message, select the first iovec.
|
2020-05-21 06:22:45 +00:00
|
|
|
iovec* iov = new iovec();
|
|
|
|
SrsAutoFree(iovec, iov);
|
2020-04-15 14:46:06 +00:00
|
|
|
|
2020-05-29 09:07:49 +00:00
|
|
|
char* iov_base = new char[kRtpPacketSize];
|
|
|
|
SrsAutoFreeA(char, iov_base);
|
|
|
|
|
|
|
|
iov->iov_base = iov_base;
|
2020-04-16 23:10:16 +00:00
|
|
|
iov->iov_len = kRtpPacketSize;
|
2020-04-15 14:46:06 +00:00
|
|
|
|
2020-04-16 23:10:16 +00:00
|
|
|
// Marshal packet to bytes in iovec.
|
2020-04-13 07:37:32 +00:00
|
|
|
if (true) {
|
2020-04-16 23:10:16 +00:00
|
|
|
SrsBuffer stream((char*)iov->iov_base, iov->iov_len);
|
2020-05-13 12:13:25 +00:00
|
|
|
if ((err = pkt->encode(&stream)) != srs_success) {
|
2020-04-13 07:37:32 +00:00
|
|
|
return srs_error_wrap(err, "encode packet");
|
|
|
|
}
|
2020-04-16 23:10:16 +00:00
|
|
|
iov->iov_len = stream.pos();
|
2020-04-11 14:54:44 +00:00
|
|
|
}
|
2020-04-11 09:52:14 +00:00
|
|
|
|
2020-04-13 07:37:32 +00:00
|
|
|
// Whether encrypt the RTP bytes.
|
2020-04-17 05:02:54 +00:00
|
|
|
if (encrypt) {
|
2020-04-16 23:10:16 +00:00
|
|
|
int nn_encrypt = (int)iov->iov_len;
|
2020-06-25 04:03:21 +00:00
|
|
|
if ((err = session_->transport_->protect_rtp2(iov->iov_base, &nn_encrypt)) != srs_success) {
|
2020-04-13 07:37:32 +00:00
|
|
|
return srs_error_wrap(err, "srtp protect");
|
|
|
|
}
|
2020-04-16 23:10:16 +00:00
|
|
|
iov->iov_len = (size_t)nn_encrypt;
|
2020-04-13 07:24:41 +00:00
|
|
|
}
|
|
|
|
|
2020-05-04 06:47:58 +00:00
|
|
|
// Put final RTP packet to NACK/ARQ queue.
|
2020-05-04 12:42:30 +00:00
|
|
|
if (nack_enabled_) {
|
2020-05-04 06:47:58 +00:00
|
|
|
SrsRtpPacket2* nack = new SrsRtpPacket2();
|
2020-05-15 00:38:43 +00:00
|
|
|
nack->header = pkt->header;
|
2020-05-04 06:47:58 +00:00
|
|
|
|
|
|
|
// TODO: FIXME: Should avoid memory copying.
|
2020-05-14 06:44:24 +00:00
|
|
|
SrsRtpRawPayload* payload = new SrsRtpRawPayload();
|
|
|
|
nack->payload = payload;
|
|
|
|
|
2020-05-04 06:47:58 +00:00
|
|
|
payload->nn_payload = (int)iov->iov_len;
|
|
|
|
payload->payload = new char[payload->nn_payload];
|
|
|
|
memcpy((void*)payload->payload, iov->iov_base, iov->iov_len);
|
|
|
|
|
2020-05-29 09:07:49 +00:00
|
|
|
nack->shared_msg = new SrsSharedPtrMessage();
|
|
|
|
nack->shared_msg->wrap(payload->payload, payload->nn_payload);
|
|
|
|
|
2020-05-15 00:38:43 +00:00
|
|
|
if (nack->header.get_ssrc() == video_ssrc) {
|
|
|
|
video_queue_->set(nack->header.get_sequence(), nack);
|
2020-05-04 06:47:58 +00:00
|
|
|
} else {
|
2020-05-15 00:38:43 +00:00
|
|
|
audio_queue_->set(nack->header.get_sequence(), nack);
|
2020-05-04 06:47:58 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-13 12:13:25 +00:00
|
|
|
info.nn_rtp_bytes += (int)iov->iov_len;
|
2020-04-17 08:36:56 +00:00
|
|
|
|
2020-05-04 06:47:58 +00:00
|
|
|
// When we send out a packet, increase the stat counter.
|
2020-05-13 12:13:25 +00:00
|
|
|
info.nn_rtp_pkts++;
|
2020-04-14 12:12:14 +00:00
|
|
|
|
2020-05-04 06:47:58 +00:00
|
|
|
// For NACK simulator, drop packet.
|
|
|
|
if (nn_simulate_nack_drop) {
|
2020-05-15 00:38:43 +00:00
|
|
|
simulate_drop_packet(&pkt->header, (int)iov->iov_len);
|
2020-05-04 06:47:58 +00:00
|
|
|
iov->iov_len = 0;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2020-05-21 06:22:45 +00:00
|
|
|
// TODO: FIXME: Handle error.
|
|
|
|
session_->sendonly_skt->sendto(iov->iov_base, iov->iov_len, 0);
|
2020-06-17 07:18:14 +00:00
|
|
|
|
|
|
|
// Detail log, should disable it in release version.
|
|
|
|
srs_info("RTC: SEND PT=%u, SSRC=%#x, SEQ=%u, Time=%u, %u/%u bytes", pkt->header.get_payload_type(), pkt->header.get_ssrc(),
|
|
|
|
pkt->header.get_sequence(), pkt->header.get_timestamp(), pkt->nb_bytes(), iov->iov_len);
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-13 15:40:30 +00:00
|
|
|
return err;
|
|
|
|
}
|
2020-04-11 14:54:44 +00:00
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
void SrsRtcPlayStream::nack_fetch(vector<SrsRtpPacket2*>& pkts, uint32_t ssrc, uint16_t seq)
|
2020-05-04 06:47:58 +00:00
|
|
|
{
|
|
|
|
SrsRtpPacket2* pkt = NULL;
|
|
|
|
|
|
|
|
if (ssrc == video_ssrc) {
|
|
|
|
pkt = video_queue_->at(seq);
|
|
|
|
} else if (ssrc == audio_ssrc) {
|
|
|
|
pkt = audio_queue_->at(seq);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (pkt) {
|
|
|
|
pkts.push_back(pkt);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
void SrsRtcPlayStream::simulate_nack_drop(int nn)
|
2020-05-04 06:47:58 +00:00
|
|
|
{
|
|
|
|
nn_simulate_nack_drop = nn;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
void SrsRtcPlayStream::simulate_drop_packet(SrsRtpHeader* h, int nn_bytes)
|
2020-05-04 12:42:30 +00:00
|
|
|
{
|
|
|
|
srs_warn("RTC NACK simulator #%d drop seq=%u, ssrc=%u/%s, ts=%u, %d bytes", nn_simulate_nack_drop,
|
|
|
|
h->get_sequence(), h->get_ssrc(), (h->get_ssrc()==video_ssrc? "Video":"Audio"), h->get_timestamp(),
|
|
|
|
nn_bytes);
|
|
|
|
|
|
|
|
nn_simulate_nack_drop--;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::on_rtcp(char* data, int nb_data)
|
2020-05-08 08:25:09 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
char* ph = data;
|
|
|
|
int nb_left = nb_data;
|
|
|
|
while (nb_left) {
|
|
|
|
uint8_t payload_type = ph[1];
|
|
|
|
uint16_t length_4bytes = (((uint16_t)ph[2]) << 8) | ph[3];
|
|
|
|
|
|
|
|
int length = (length_4bytes + 1) * 4;
|
|
|
|
|
|
|
|
if (length > nb_data) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "invalid rtcp packet, length=%u", length);
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_verbose("on rtcp, payload_type=%u", payload_type);
|
|
|
|
|
|
|
|
switch (payload_type) {
|
|
|
|
case kSR: {
|
|
|
|
err = on_rtcp_sr(ph, length);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kRR: {
|
|
|
|
err = on_rtcp_rr(ph, length);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kSDES: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kBye: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kApp: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kRtpFb: {
|
|
|
|
err = on_rtcp_feedback(ph, length);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kPsFb: {
|
|
|
|
err = on_rtcp_ps_feedback(ph, length);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kXR: {
|
|
|
|
err = on_rtcp_xr(ph, length);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:{
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "unknown rtcp type=%u", payload_type);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (err != srs_success) {
|
|
|
|
return srs_error_wrap(err, "rtcp");
|
|
|
|
}
|
|
|
|
|
|
|
|
ph += length;
|
|
|
|
nb_left -= length;
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::on_rtcp_sr(char* buf, int nb_buf)
|
2020-05-08 08:25:09 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
// TODO: FIXME: Implements it.
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::on_rtcp_xr(char* buf, int nb_buf)
|
2020-05-08 08:25:09 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
// TODO: FIXME: Implements it.
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::on_rtcp_feedback(char* buf, int nb_buf)
|
2020-05-08 08:25:09 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
2020-05-09 03:11:36 +00:00
|
|
|
|
|
|
|
if (nb_buf < 12) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp feedback packet, nb_buf=%d", nb_buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
|
|
|
|
SrsAutoFree(SrsBuffer, stream);
|
|
|
|
|
|
|
|
// @see: https://tools.ietf.org/html/rfc4585#section-6.1
|
|
|
|
/*
|
|
|
|
0 1 2 3
|
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|V=2|P| FMT | PT | length |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| SSRC of packet sender |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| SSRC of media source |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
: Feedback Control Information (FCI) :
|
|
|
|
: :
|
|
|
|
*/
|
|
|
|
/*uint8_t first = */stream->read_1bytes();
|
|
|
|
//uint8_t version = first & 0xC0;
|
|
|
|
//uint8_t padding = first & 0x20;
|
|
|
|
//uint8_t fmt = first & 0x1F;
|
|
|
|
|
|
|
|
/*uint8_t payload_type = */stream->read_1bytes();
|
|
|
|
/*uint16_t length = */stream->read_2bytes();
|
|
|
|
/*uint32_t ssrc_of_sender = */stream->read_4bytes();
|
|
|
|
uint32_t ssrc_of_media_source = stream->read_4bytes();
|
|
|
|
|
|
|
|
/*
|
|
|
|
0 1 2 3
|
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| PID | BLP |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
*/
|
|
|
|
|
|
|
|
uint16_t pid = stream->read_2bytes();
|
|
|
|
int blp = stream->read_2bytes();
|
|
|
|
|
|
|
|
// TODO: FIXME: Support ARQ.
|
|
|
|
vector<SrsRtpPacket2*> resend_pkts;
|
|
|
|
nack_fetch(resend_pkts, ssrc_of_media_source, pid);
|
|
|
|
|
2020-06-16 08:17:33 +00:00
|
|
|
// If NACK disabled, print a log.
|
|
|
|
if (!nack_enabled_) {
|
|
|
|
srs_trace("RTC NACK seq=%u, ignored", pid);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-05-09 03:11:36 +00:00
|
|
|
uint16_t mask = 0x01;
|
|
|
|
for (int i = 1; i < 16 && blp; ++i, mask <<= 1) {
|
|
|
|
if (!(blp & mask)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t loss_seq = pid + i;
|
|
|
|
nack_fetch(resend_pkts, ssrc_of_media_source, loss_seq);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (int i = 0; i < (int)resend_pkts.size(); ++i) {
|
|
|
|
SrsRtpPacket2* pkt = resend_pkts[i];
|
|
|
|
|
|
|
|
char* data = new char[pkt->nb_bytes()];
|
|
|
|
SrsAutoFreeA(char, data);
|
|
|
|
|
|
|
|
SrsBuffer buf(data, pkt->nb_bytes());
|
|
|
|
|
|
|
|
// TODO: FIXME: Check error.
|
|
|
|
pkt->encode(&buf);
|
|
|
|
session_->sendonly_skt->sendto(data, pkt->nb_bytes(), 0);
|
|
|
|
|
2020-05-15 00:38:43 +00:00
|
|
|
SrsRtpHeader* h = &pkt->header;
|
2020-05-09 03:11:36 +00:00
|
|
|
srs_trace("RTC NACK ARQ seq=%u, ssrc=%u, ts=%u, %d bytes", h->get_sequence(),
|
|
|
|
h->get_ssrc(), h->get_timestamp(), pkt->nb_bytes());
|
|
|
|
}
|
|
|
|
|
2020-05-08 08:25:09 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::on_rtcp_ps_feedback(char* buf, int nb_buf)
|
2020-05-08 08:25:09 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if (nb_buf < 12) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp feedback packet, nb_buf=%d", nb_buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
|
|
|
|
SrsAutoFree(SrsBuffer, stream);
|
|
|
|
|
|
|
|
uint8_t first = stream->read_1bytes();
|
|
|
|
//uint8_t version = first & 0xC0;
|
|
|
|
//uint8_t padding = first & 0x20;
|
|
|
|
uint8_t fmt = first & 0x1F;
|
|
|
|
|
|
|
|
/*uint8_t payload_type = */stream->read_1bytes();
|
|
|
|
/*uint16_t length = */stream->read_2bytes();
|
|
|
|
/*uint32_t ssrc_of_sender = */stream->read_4bytes();
|
|
|
|
/*uint32_t ssrc_of_media_source = */stream->read_4bytes();
|
|
|
|
|
|
|
|
switch (fmt) {
|
|
|
|
case kPLI: {
|
2020-07-07 08:57:33 +00:00
|
|
|
ISrsRtcPublishStream* publisher = session_->source_->publish_stream();
|
2020-05-08 08:25:09 +00:00
|
|
|
if (publisher) {
|
|
|
|
publisher->request_keyframe();
|
|
|
|
srs_trace("RTC request PLI");
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kSLI: {
|
|
|
|
srs_verbose("sli");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kRPSI: {
|
|
|
|
srs_verbose("rpsi");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kAFB: {
|
|
|
|
srs_verbose("afb");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default: {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "unknown payload specific feedback=%u", fmt);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPlayStream::on_rtcp_rr(char* data, int nb_data)
|
2020-05-08 08:25:09 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
// TODO: FIXME: Implements it.
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
SrsRtcPublishStream::SrsRtcPublishStream(SrsRtcConnection* session)
|
2020-04-23 09:08:21 +00:00
|
|
|
{
|
2020-05-17 03:16:00 +00:00
|
|
|
report_timer = new SrsHourGlass(this, 200 * SRS_UTIME_MILLISECONDS);
|
2020-04-23 15:14:30 +00:00
|
|
|
|
2020-05-03 05:49:53 +00:00
|
|
|
session_ = session;
|
2020-05-14 10:33:31 +00:00
|
|
|
request_keyframe_ = false;
|
|
|
|
video_queue_ = new SrsRtpRingBuffer(1000);
|
2020-05-02 02:07:55 +00:00
|
|
|
video_nack_ = new SrsRtpNackForReceiver(video_queue_, 1000 * 2 / 3);
|
2020-05-14 10:33:31 +00:00
|
|
|
audio_queue_ = new SrsRtpRingBuffer(100);
|
2020-05-02 12:57:36 +00:00
|
|
|
audio_nack_ = new SrsRtpNackForReceiver(audio_queue_, 100 * 2 / 3);
|
2020-04-23 09:08:21 +00:00
|
|
|
|
|
|
|
source = NULL;
|
2020-05-04 09:49:39 +00:00
|
|
|
nn_simulate_nack_drop = 0;
|
2020-05-04 12:42:30 +00:00
|
|
|
nack_enabled_ = false;
|
2020-06-29 02:59:39 +00:00
|
|
|
pt_to_drop_ = 0;
|
2020-05-07 08:01:03 +00:00
|
|
|
|
|
|
|
nn_audio_frames = 0;
|
2020-07-02 06:51:32 +00:00
|
|
|
twcc_id_ = 0;
|
2020-05-19 10:14:48 +00:00
|
|
|
last_twcc_feedback_time_ = 0;
|
|
|
|
twcc_fb_count_ = 0;
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
SrsRtcPublishStream::~SrsRtcPublishStream()
|
2020-04-23 09:08:21 +00:00
|
|
|
{
|
2020-04-26 08:12:23 +00:00
|
|
|
// TODO: FIXME: Do unpublish when session timeout.
|
|
|
|
if (source) {
|
2020-07-07 08:57:33 +00:00
|
|
|
source->set_publish_stream(NULL);
|
2020-04-26 08:12:23 +00:00
|
|
|
source->on_unpublish();
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
srs_freep(report_timer);
|
2020-05-02 02:07:55 +00:00
|
|
|
srs_freep(video_nack_);
|
2020-05-02 01:53:49 +00:00
|
|
|
srs_freep(video_queue_);
|
2020-05-02 02:07:55 +00:00
|
|
|
srs_freep(audio_nack_);
|
2020-05-02 01:53:49 +00:00
|
|
|
srs_freep(audio_queue_);
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::initialize(uint32_t vssrc, uint32_t assrc, int twcc_id, SrsRequest* r)
|
2020-04-23 09:08:21 +00:00
|
|
|
{
|
2020-04-23 15:14:30 +00:00
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-23 09:08:21 +00:00
|
|
|
video_ssrc = vssrc;
|
|
|
|
audio_ssrc = assrc;
|
2020-04-26 08:12:23 +00:00
|
|
|
req = r;
|
2020-04-23 09:08:21 +00:00
|
|
|
|
2020-05-04 12:42:30 +00:00
|
|
|
// TODO: FIXME: Support reload.
|
|
|
|
nack_enabled_ = _srs_config->get_rtc_nack_enabled(session_->req->vhost);
|
2020-06-29 02:59:39 +00:00
|
|
|
pt_to_drop_ = (uint16_t)_srs_config->get_rtc_drop_for_pt(session_->req->vhost);
|
2020-07-02 06:51:32 +00:00
|
|
|
bool twcc_enabled = _srs_config->get_rtc_twcc_enabled(req->vhost);
|
|
|
|
if (twcc_enabled) {
|
|
|
|
twcc_id_ = twcc_id;
|
|
|
|
}
|
|
|
|
srs_trace("RTC publisher video(ssrc=%u), audio(ssrc=%u), nack=%d, pt-drop=%u, twcc=%u/%d",
|
|
|
|
video_ssrc, audio_ssrc, nack_enabled_, pt_to_drop_, twcc_enabled, twcc_id);
|
2020-05-04 12:42:30 +00:00
|
|
|
|
2020-07-02 06:51:32 +00:00
|
|
|
if (twcc_id_) {
|
|
|
|
extension_types_.register_by_uri(twcc_id_, kTWCCExt);
|
|
|
|
rtcp_twcc_.set_media_ssrc(video_ssrc);
|
|
|
|
}
|
2020-04-23 15:14:30 +00:00
|
|
|
|
2020-05-17 03:16:00 +00:00
|
|
|
if ((err = report_timer->tick(0 * SRS_UTIME_MILLISECONDS)) != srs_success) {
|
2020-04-23 15:14:30 +00:00
|
|
|
return srs_error_wrap(err, "hourglass tick");
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((err = report_timer->start()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "start report_timer");
|
|
|
|
}
|
|
|
|
|
2020-05-12 05:19:31 +00:00
|
|
|
if ((err = _srs_rtc_sources->fetch_or_create(req, &source)) != srs_success) {
|
2020-04-26 08:12:23 +00:00
|
|
|
return srs_error_wrap(err, "create source");
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((err = source->on_publish()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "on publish");
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:57:33 +00:00
|
|
|
source->set_publish_stream(this);
|
2020-04-30 00:24:15 +00:00
|
|
|
|
2020-05-22 10:44:32 +00:00
|
|
|
if (_srs_rtc_hijacker) {
|
|
|
|
if ((err = _srs_rtc_hijacker->on_start_publish(session_, this, req)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "on start publish");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
void SrsRtcPublishStream::check_send_nacks(SrsRtpNackForReceiver* nack, uint32_t ssrc)
|
2020-04-23 15:14:30 +00:00
|
|
|
{
|
2020-05-08 08:25:09 +00:00
|
|
|
// If DTLS is not OK, drop all messages.
|
2020-06-25 04:03:21 +00:00
|
|
|
if (!session_->transport_) {
|
2020-05-08 08:25:09 +00:00
|
|
|
return;
|
2020-04-23 16:06:59 +00:00
|
|
|
}
|
|
|
|
|
2020-05-08 08:25:09 +00:00
|
|
|
// @see: https://tools.ietf.org/html/rfc4585#section-6.1
|
|
|
|
vector<uint16_t> nack_seqs;
|
|
|
|
nack->get_nack_seqs(nack_seqs);
|
2020-05-17 00:40:11 +00:00
|
|
|
|
2020-05-08 08:25:09 +00:00
|
|
|
vector<uint16_t>::iterator iter = nack_seqs.begin();
|
|
|
|
while (iter != nack_seqs.end()) {
|
|
|
|
char buf[kRtpPacketSize];
|
|
|
|
SrsBuffer stream(buf, sizeof(buf));
|
|
|
|
// FIXME: Replace magic number.
|
|
|
|
stream.write_1bytes(0x81);
|
|
|
|
stream.write_1bytes(kRtpFb);
|
|
|
|
stream.write_2bytes(3);
|
|
|
|
stream.write_4bytes(ssrc); // TODO: FIXME: Should be 1?
|
|
|
|
stream.write_4bytes(ssrc); // TODO: FIXME: Should be 0?
|
|
|
|
uint16_t pid = *iter;
|
|
|
|
uint16_t blp = 0;
|
|
|
|
while (iter + 1 != nack_seqs.end() && (*(iter + 1) - pid <= 15)) {
|
|
|
|
blp |= (1 << (*(iter + 1) - pid - 1));
|
|
|
|
++iter;
|
|
|
|
}
|
2020-04-23 15:14:30 +00:00
|
|
|
|
2020-05-08 08:25:09 +00:00
|
|
|
stream.write_2bytes(pid);
|
|
|
|
stream.write_2bytes(blp);
|
2020-04-23 15:14:30 +00:00
|
|
|
|
2020-05-08 08:25:09 +00:00
|
|
|
if (session_->blackhole && session_->blackhole_addr && session_->blackhole_stfd) {
|
|
|
|
// Ignore any error for black-hole.
|
2020-07-07 08:37:34 +00:00
|
|
|
void* p = stream.data(); int len = stream.pos(); SrsRtcConnection* s = session_;
|
2020-05-08 08:25:09 +00:00
|
|
|
srs_sendto(s->blackhole_stfd, p, len, (sockaddr*)s->blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
|
|
|
|
}
|
2020-04-23 15:14:30 +00:00
|
|
|
|
2020-05-08 08:25:09 +00:00
|
|
|
char protected_buf[kRtpPacketSize];
|
|
|
|
int nb_protected_buf = stream.pos();
|
2020-04-23 15:14:30 +00:00
|
|
|
|
2020-05-08 08:25:09 +00:00
|
|
|
// FIXME: Merge nack rtcp into one packets.
|
2020-06-25 04:03:21 +00:00
|
|
|
if (session_->transport_->protect_rtcp(protected_buf, stream.data(), nb_protected_buf) == srs_success) {
|
2020-05-08 08:25:09 +00:00
|
|
|
// TODO: FIXME: Check error.
|
|
|
|
session_->sendonly_skt->sendto(protected_buf, nb_protected_buf, 0);
|
|
|
|
}
|
2020-04-23 15:14:30 +00:00
|
|
|
|
2020-05-08 08:25:09 +00:00
|
|
|
++iter;
|
2020-04-23 15:14:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::send_rtcp_rr(uint32_t ssrc, SrsRtpRingBuffer* rtp_queue)
|
2020-04-23 15:14:30 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-25 10:59:02 +00:00
|
|
|
// If DTLS is not OK, drop all messages.
|
2020-06-25 04:03:21 +00:00
|
|
|
if (!session_->transport_) {
|
2020-04-25 10:59:02 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-05-08 08:25:09 +00:00
|
|
|
// @see https://tools.ietf.org/html/rfc3550#section-6.4.2
|
2020-04-23 15:14:30 +00:00
|
|
|
char buf[kRtpPacketSize];
|
|
|
|
SrsBuffer stream(buf, sizeof(buf));
|
|
|
|
stream.write_1bytes(0x81);
|
|
|
|
stream.write_1bytes(kRR);
|
|
|
|
stream.write_2bytes(7);
|
2020-05-08 08:25:09 +00:00
|
|
|
stream.write_4bytes(ssrc); // TODO: FIXME: Should be 1?
|
2020-04-30 06:49:37 +00:00
|
|
|
|
2020-05-14 10:33:31 +00:00
|
|
|
// TODO: FIXME: Implements it.
|
|
|
|
// TODO: FIXME: See https://github.com/ossrs/srs/blob/f81d35d20f04ebec01915cb78a882e45b7ee8800/trunk/src/app/srs_app_rtc_queue.cpp
|
|
|
|
uint8_t fraction_lost = 0;
|
|
|
|
uint32_t cumulative_number_of_packets_lost = 0 & 0x7FFFFF;
|
2020-04-23 15:14:30 +00:00
|
|
|
uint32_t extended_highest_sequence = rtp_queue->get_extended_highest_sequence();
|
2020-05-14 10:33:31 +00:00
|
|
|
uint32_t interarrival_jitter = 0;
|
2020-04-30 06:49:37 +00:00
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
uint32_t rr_lsr = 0;
|
|
|
|
uint32_t rr_dlsr = 0;
|
|
|
|
|
|
|
|
const uint64_t& lsr_systime = last_sender_report_sys_time[ssrc];
|
|
|
|
const SrsNtp& lsr_ntp = last_sender_report_ntp[ssrc];
|
|
|
|
|
|
|
|
if (lsr_systime > 0) {
|
|
|
|
rr_lsr = (lsr_ntp.ntp_second_ << 16) | (lsr_ntp.ntp_fractions_ >> 16);
|
|
|
|
uint32_t dlsr = (srs_update_system_time() - lsr_systime) / 1000;
|
|
|
|
rr_dlsr = ((dlsr / 1000) << 16) | ((dlsr % 1000) * 65536 / 1000);
|
|
|
|
}
|
2020-04-30 06:49:37 +00:00
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
stream.write_4bytes(ssrc);
|
|
|
|
stream.write_1bytes(fraction_lost);
|
|
|
|
stream.write_3bytes(cumulative_number_of_packets_lost);
|
|
|
|
stream.write_4bytes(extended_highest_sequence);
|
|
|
|
stream.write_4bytes(interarrival_jitter);
|
|
|
|
stream.write_4bytes(rr_lsr);
|
|
|
|
stream.write_4bytes(rr_dlsr);
|
2020-04-30 06:49:37 +00:00
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
srs_verbose("RR ssrc=%u, fraction_lost=%u, cumulative_number_of_packets_lost=%u, extended_highest_sequence=%u, interarrival_jitter=%u",
|
|
|
|
ssrc, fraction_lost, cumulative_number_of_packets_lost, extended_highest_sequence, interarrival_jitter);
|
2020-04-30 06:49:37 +00:00
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
char protected_buf[kRtpPacketSize];
|
|
|
|
int nb_protected_buf = stream.pos();
|
2020-06-25 12:47:17 +00:00
|
|
|
if ((err = session_->transport_->protect_rtcp(stream.data(), protected_buf, nb_protected_buf)) != srs_success) {
|
2020-04-23 15:14:30 +00:00
|
|
|
return srs_error_wrap(err, "protect rtcp rr");
|
|
|
|
}
|
|
|
|
|
2020-04-25 10:59:02 +00:00
|
|
|
// TDOO: FIXME: Check error.
|
2020-05-03 05:49:53 +00:00
|
|
|
session_->sendonly_skt->sendto(protected_buf, nb_protected_buf, 0);
|
2020-04-23 15:14:30 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::send_rtcp_xr_rrtr(uint32_t ssrc)
|
2020-04-23 15:14:30 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
2020-04-25 10:59:02 +00:00
|
|
|
|
|
|
|
// If DTLS is not OK, drop all messages.
|
2020-06-25 04:03:21 +00:00
|
|
|
if (!session_->transport_) {
|
2020-04-25 10:59:02 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
/*
|
|
|
|
@see: http://www.rfc-editor.org/rfc/rfc3611.html#section-2
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
0 1 2 3
|
2020-04-23 15:14:30 +00:00
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|V=2|P|reserved | PT=XR=207 | length |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| SSRC |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
: report blocks :
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|
|
|
|
@see: http://www.rfc-editor.org/rfc/rfc3611.html#section-4.4
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
0 1 2 3
|
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| BT=4 | reserved | block length = 2 |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| NTP timestamp, most significant word |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| NTP timestamp, least significant word |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
2020-04-23 15:14:30 +00:00
|
|
|
*/
|
|
|
|
srs_utime_t now = srs_update_system_time();
|
|
|
|
SrsNtp cur_ntp = SrsNtp::from_time_ms(now / 1000);
|
|
|
|
|
|
|
|
char buf[kRtpPacketSize];
|
|
|
|
SrsBuffer stream(buf, sizeof(buf));
|
|
|
|
stream.write_1bytes(0x80);
|
|
|
|
stream.write_1bytes(kXR);
|
|
|
|
stream.write_2bytes(4);
|
|
|
|
stream.write_4bytes(ssrc);
|
|
|
|
stream.write_1bytes(4);
|
|
|
|
stream.write_1bytes(0);
|
|
|
|
stream.write_2bytes(2);
|
|
|
|
stream.write_4bytes(cur_ntp.ntp_second_);
|
|
|
|
stream.write_4bytes(cur_ntp.ntp_fractions_);
|
|
|
|
|
|
|
|
char protected_buf[kRtpPacketSize];
|
|
|
|
int nb_protected_buf = stream.pos();
|
2020-06-25 12:47:17 +00:00
|
|
|
if ((err = session_->transport_->protect_rtcp(stream.data(), protected_buf, nb_protected_buf)) != srs_success) {
|
2020-04-23 15:14:30 +00:00
|
|
|
return srs_error_wrap(err, "protect rtcp xr");
|
|
|
|
}
|
|
|
|
|
2020-04-25 10:59:02 +00:00
|
|
|
// TDOO: FIXME: Check error.
|
2020-05-03 05:49:53 +00:00
|
|
|
session_->sendonly_skt->sendto(protected_buf, nb_protected_buf, 0);
|
2020-04-23 15:14:30 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::send_rtcp_fb_pli(uint32_t ssrc)
|
2020-04-24 08:19:08 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-25 10:59:02 +00:00
|
|
|
// If DTLS is not OK, drop all messages.
|
2020-06-25 04:03:21 +00:00
|
|
|
if (!session_->transport_) {
|
2020-04-25 10:59:02 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-24 08:19:08 +00:00
|
|
|
char buf[kRtpPacketSize];
|
|
|
|
SrsBuffer stream(buf, sizeof(buf));
|
|
|
|
stream.write_1bytes(0x81);
|
|
|
|
stream.write_1bytes(kPsFb);
|
|
|
|
stream.write_2bytes(2);
|
|
|
|
stream.write_4bytes(ssrc);
|
|
|
|
stream.write_4bytes(ssrc);
|
2020-04-30 06:49:37 +00:00
|
|
|
|
2020-04-30 00:24:15 +00:00
|
|
|
srs_trace("RTC PLI ssrc=%u", ssrc);
|
2020-04-30 06:49:37 +00:00
|
|
|
|
2020-05-03 05:49:53 +00:00
|
|
|
if (session_->blackhole && session_->blackhole_addr && session_->blackhole_stfd) {
|
2020-05-03 01:00:05 +00:00
|
|
|
// Ignore any error for black-hole.
|
2020-07-07 08:37:34 +00:00
|
|
|
void* p = stream.data(); int len = stream.pos(); SrsRtcConnection* s = session_;
|
2020-05-03 01:00:05 +00:00
|
|
|
srs_sendto(s->blackhole_stfd, p, len, (sockaddr*)s->blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
|
|
|
|
}
|
|
|
|
|
2020-04-24 08:19:08 +00:00
|
|
|
char protected_buf[kRtpPacketSize];
|
|
|
|
int nb_protected_buf = stream.pos();
|
2020-06-25 12:47:17 +00:00
|
|
|
if ((err = session_->transport_->protect_rtcp(stream.data(), protected_buf, nb_protected_buf)) != srs_success) {
|
2020-04-24 08:19:08 +00:00
|
|
|
return srs_error_wrap(err, "protect rtcp psfb pli");
|
|
|
|
}
|
|
|
|
|
2020-04-25 10:59:02 +00:00
|
|
|
// TDOO: FIXME: Check error.
|
2020-05-03 05:49:53 +00:00
|
|
|
session_->sendonly_skt->sendto(protected_buf, nb_protected_buf, 0);
|
2020-04-24 08:19:08 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
2020-04-23 15:14:30 +00:00
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::on_twcc(uint16_t sn) {
|
2020-05-19 10:14:48 +00:00
|
|
|
srs_utime_t now = srs_get_system_time();
|
2020-06-28 06:01:58 +00:00
|
|
|
return rtcp_twcc_.recv_packet(sn, now);
|
2020-05-19 10:14:48 +00:00
|
|
|
}
|
2020-06-29 02:59:39 +00:00
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::on_rtp(char* data, int nb_data)
|
2020-04-30 02:00:07 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-05-17 13:32:53 +00:00
|
|
|
// For NACK simulator, drop packet.
|
|
|
|
if (nn_simulate_nack_drop) {
|
2020-06-27 08:14:11 +00:00
|
|
|
SrsBuffer b(data, nb_data); SrsRtpHeader h; h.decode(&b);
|
|
|
|
simulate_drop_packet(&h, nb_data);
|
2020-05-17 13:32:53 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-06-29 02:59:39 +00:00
|
|
|
// Decode the header first.
|
|
|
|
SrsRtpHeader h;
|
2020-07-02 06:51:32 +00:00
|
|
|
if (pt_to_drop_ && twcc_id_) {
|
2020-06-29 02:59:39 +00:00
|
|
|
SrsBuffer b(data, nb_data);
|
|
|
|
h.ignore_padding(true); h.set_extensions(&extension_types_);
|
2020-06-27 08:14:11 +00:00
|
|
|
if ((err = h.decode(&b)) != srs_success) {
|
2020-06-27 08:12:08 +00:00
|
|
|
return srs_error_wrap(err, "twcc decode header");
|
2020-06-27 06:37:35 +00:00
|
|
|
}
|
2020-06-29 02:59:39 +00:00
|
|
|
}
|
2020-06-27 06:37:35 +00:00
|
|
|
|
2020-06-29 02:59:39 +00:00
|
|
|
// We must parse the TWCC from RTP header before SRTP unprotect, because:
|
|
|
|
// 1. Client may send some padding packets with invalid SequenceNumber, which causes the SRTP fail.
|
|
|
|
// 2. Server may send multiple duplicated NACK to client, and got more than one ARQ packet, which also fail SRTP.
|
|
|
|
// so, we must parse the header before SRTP unprotect(which may fail and drop packet).
|
2020-07-02 06:51:32 +00:00
|
|
|
if (twcc_id_) {
|
2020-06-27 06:37:35 +00:00
|
|
|
uint16_t twcc_sn = 0;
|
2020-06-27 08:14:11 +00:00
|
|
|
if ((err = h.get_twcc_sequence_number(twcc_sn)) == srs_success) {
|
2020-06-27 06:37:35 +00:00
|
|
|
if((err = on_twcc(twcc_sn)) != srs_success) {
|
2020-06-27 08:12:08 +00:00
|
|
|
return srs_error_wrap(err, "on twcc");
|
2020-06-27 06:37:35 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
srs_error_reset(err);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-29 02:59:39 +00:00
|
|
|
// If payload type is configed to drop, ignore this packet.
|
|
|
|
if (pt_to_drop_ && pt_to_drop_ == h.get_payload_type()) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-05-17 13:32:53 +00:00
|
|
|
// Decrypt the cipher to plaintext RTP data.
|
|
|
|
int nb_unprotected_buf = nb_data;
|
|
|
|
char* unprotected_buf = new char[kRtpPacketSize];
|
2020-06-25 12:47:17 +00:00
|
|
|
if ((err = session_->transport_->unprotect_rtp(data, unprotected_buf, nb_unprotected_buf)) != srs_success) {
|
2020-05-17 13:32:53 +00:00
|
|
|
// We try to decode the RTP header for more detail error informations.
|
2020-06-27 08:14:11 +00:00
|
|
|
SrsBuffer b(data, nb_data); SrsRtpHeader h; h.decode(&b);
|
|
|
|
err = srs_error_wrap(err, "marker=%u, pt=%u, seq=%u, ts=%u, ssrc=%u, pad=%u, payload=%uB", h.get_marker(), h.get_payload_type(),
|
|
|
|
h.get_sequence(), h.get_timestamp(), h.get_ssrc(), h.get_padding(), nb_data - b.pos());
|
2020-05-17 13:32:53 +00:00
|
|
|
|
|
|
|
srs_freepa(unprotected_buf);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (session_->blackhole && session_->blackhole_addr && session_->blackhole_stfd) {
|
|
|
|
// Ignore any error for black-hole.
|
2020-07-07 08:37:34 +00:00
|
|
|
void* p = unprotected_buf; int len = nb_unprotected_buf; SrsRtcConnection* s = session_;
|
2020-05-17 13:32:53 +00:00
|
|
|
srs_sendto(s->blackhole_stfd, p, len, (sockaddr*)s->blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
|
|
|
|
}
|
|
|
|
|
|
|
|
char* buf = unprotected_buf;
|
|
|
|
int nb_buf = nb_unprotected_buf;
|
|
|
|
|
2020-05-14 10:33:31 +00:00
|
|
|
// Decode the RTP packet from buffer.
|
2020-05-02 01:15:49 +00:00
|
|
|
SrsRtpPacket2* pkt = new SrsRtpPacket2();
|
2020-05-15 00:11:03 +00:00
|
|
|
SrsAutoFree(SrsRtpPacket2, pkt);
|
|
|
|
|
2020-05-14 10:33:31 +00:00
|
|
|
if (true) {
|
|
|
|
pkt->set_decode_handler(this);
|
2020-06-26 07:24:37 +00:00
|
|
|
pkt->set_extension_types(&extension_types_);
|
2020-05-14 10:33:31 +00:00
|
|
|
pkt->shared_msg = new SrsSharedPtrMessage();
|
|
|
|
pkt->shared_msg->wrap(buf, nb_buf);
|
2020-05-02 01:15:49 +00:00
|
|
|
|
2020-05-14 10:33:31 +00:00
|
|
|
SrsBuffer b(buf, nb_buf);
|
2020-06-01 07:50:43 +00:00
|
|
|
if ((err = pkt->decode(&b)) != srs_success) {
|
2020-05-14 10:33:31 +00:00
|
|
|
return srs_error_wrap(err, "decode rtp packet");
|
|
|
|
}
|
2020-04-30 02:00:07 +00:00
|
|
|
}
|
|
|
|
|
2020-05-14 10:33:31 +00:00
|
|
|
// For source to consume packet.
|
2020-05-15 00:38:43 +00:00
|
|
|
uint32_t ssrc = pkt->header.get_ssrc();
|
2020-04-30 02:00:07 +00:00
|
|
|
if (ssrc == audio_ssrc) {
|
2020-05-22 10:44:32 +00:00
|
|
|
pkt->frame_type = SrsFrameTypeAudio;
|
2020-05-14 10:33:31 +00:00
|
|
|
if ((err = on_audio(pkt)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "on audio");
|
|
|
|
}
|
2020-04-30 02:00:07 +00:00
|
|
|
} else if (ssrc == video_ssrc) {
|
2020-05-22 10:44:32 +00:00
|
|
|
pkt->frame_type = SrsFrameTypeVideo;
|
2020-05-14 10:33:31 +00:00
|
|
|
if ((err = on_video(pkt)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "on video");
|
|
|
|
}
|
2020-05-02 01:15:49 +00:00
|
|
|
} else {
|
|
|
|
return srs_error_new(ERROR_RTC_RTP, "unknown ssrc=%u", ssrc);
|
2020-04-30 02:00:07 +00:00
|
|
|
}
|
2020-05-14 10:33:31 +00:00
|
|
|
|
|
|
|
// For NACK to handle packet.
|
|
|
|
if (nack_enabled_ && (err = on_nack(pkt)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "on nack");
|
|
|
|
}
|
|
|
|
|
2020-05-22 10:44:32 +00:00
|
|
|
if (_srs_rtc_hijacker) {
|
|
|
|
if ((err = _srs_rtc_hijacker->on_rtp_packet(session_, this, req, pkt->copy())) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "on rtp packet");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-14 10:33:31 +00:00
|
|
|
return err;
|
2020-04-30 02:00:07 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
void SrsRtcPublishStream::on_before_decode_payload(SrsRtpPacket2* pkt, SrsBuffer* buf, ISrsRtpPayloader** ppayload)
|
2020-04-23 15:14:30 +00:00
|
|
|
{
|
2020-05-02 01:15:49 +00:00
|
|
|
// No payload, ignore.
|
|
|
|
if (buf->empty()) {
|
|
|
|
return;
|
|
|
|
}
|
2020-04-23 15:14:30 +00:00
|
|
|
|
2020-05-15 00:38:43 +00:00
|
|
|
uint32_t ssrc = pkt->header.get_ssrc();
|
2020-05-02 01:15:49 +00:00
|
|
|
if (ssrc == audio_ssrc) {
|
2020-05-14 06:44:24 +00:00
|
|
|
*ppayload = new SrsRtpRawPayload();
|
2020-05-02 01:15:49 +00:00
|
|
|
} else if (ssrc == video_ssrc) {
|
|
|
|
uint8_t v = (uint8_t)pkt->nalu_type;
|
|
|
|
if (v == kStapA) {
|
|
|
|
*ppayload = new SrsRtpSTAPPayload();
|
|
|
|
} else if (v == kFuA) {
|
2020-05-14 06:44:24 +00:00
|
|
|
*ppayload = new SrsRtpFUAPayload2();
|
2020-05-02 01:15:49 +00:00
|
|
|
} else {
|
2020-05-14 06:44:24 +00:00
|
|
|
*ppayload = new SrsRtpRawPayload();
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
2020-04-24 08:19:08 +00:00
|
|
|
}
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::on_audio(SrsRtpPacket2* pkt)
|
2020-05-08 08:25:09 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-05-14 02:47:21 +00:00
|
|
|
pkt->frame_type = SrsFrameTypeAudio;
|
2020-05-08 08:25:09 +00:00
|
|
|
|
2020-05-14 02:47:21 +00:00
|
|
|
// TODO: FIXME: Error check.
|
|
|
|
source->on_rtp(pkt);
|
2020-05-08 08:25:09 +00:00
|
|
|
|
|
|
|
return err;
|
2020-04-26 05:30:17 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::on_video(SrsRtpPacket2* pkt)
|
2020-04-27 05:45:50 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-05-14 02:47:21 +00:00
|
|
|
pkt->frame_type = SrsFrameTypeVideo;
|
2020-04-27 05:45:50 +00:00
|
|
|
|
2020-05-14 02:47:21 +00:00
|
|
|
// TODO: FIXME: Error check.
|
|
|
|
source->on_rtp(pkt);
|
2020-05-02 01:15:49 +00:00
|
|
|
|
2020-05-14 10:33:31 +00:00
|
|
|
if (request_keyframe_) {
|
|
|
|
request_keyframe_ = false;
|
2020-05-02 01:15:49 +00:00
|
|
|
|
2020-05-04 12:42:30 +00:00
|
|
|
// TODO: FIXME: Check error.
|
|
|
|
send_rtcp_fb_pli(video_ssrc);
|
|
|
|
}
|
|
|
|
|
2020-05-14 10:33:31 +00:00
|
|
|
return err;
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::on_nack(SrsRtpPacket2* pkt)
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
2020-05-15 09:16:05 +00:00
|
|
|
|
|
|
|
SrsRtpNackForReceiver* nack_receiver = audio_nack_;
|
|
|
|
SrsRtpRingBuffer* ring_queue = audio_queue_;
|
|
|
|
|
2020-05-17 03:16:00 +00:00
|
|
|
// TODO: FIXME: use is_audio() to jugdement
|
2020-05-15 09:16:05 +00:00
|
|
|
uint32_t ssrc = pkt->header.get_ssrc();
|
2020-05-15 00:38:43 +00:00
|
|
|
uint16_t seq = pkt->header.get_sequence();
|
2020-05-15 09:16:05 +00:00
|
|
|
bool video = (ssrc == video_ssrc) ? true : false;
|
|
|
|
if (video) {
|
|
|
|
nack_receiver = video_nack_;
|
|
|
|
ring_queue = video_queue_;
|
|
|
|
}
|
|
|
|
|
2020-05-17 03:16:00 +00:00
|
|
|
// TODO: check whether is necessary?
|
|
|
|
nack_receiver->remove_timeout_packets();
|
|
|
|
|
2020-05-15 09:16:05 +00:00
|
|
|
SrsRtpNackInfo* nack_info = nack_receiver->find(seq);
|
2020-05-14 10:33:31 +00:00
|
|
|
if (nack_info) {
|
2020-05-17 03:16:00 +00:00
|
|
|
// seq had been received.
|
|
|
|
nack_receiver->remove(seq);
|
2020-05-02 01:15:49 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-05-15 09:16:05 +00:00
|
|
|
// insert check nack list
|
2020-05-14 10:33:31 +00:00
|
|
|
uint16_t nack_first = 0, nack_last = 0;
|
2020-05-15 09:16:05 +00:00
|
|
|
if (!ring_queue->update(seq, nack_first, nack_last)) {
|
|
|
|
srs_warn("too old seq %u, range [%u, %u]", seq, ring_queue->begin, ring_queue->end);
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
2020-05-14 10:33:31 +00:00
|
|
|
if (srs_rtp_seq_distance(nack_first, nack_last) > 0) {
|
|
|
|
srs_trace("update seq=%u, nack range [%u, %u]", seq, nack_first, nack_last);
|
2020-05-15 09:16:05 +00:00
|
|
|
nack_receiver->insert(nack_first, nack_last);
|
|
|
|
nack_receiver->check_queue_size();
|
2020-05-14 10:33:31 +00:00
|
|
|
}
|
2020-05-17 03:16:00 +00:00
|
|
|
|
|
|
|
// insert into video_queue and audio_queue
|
|
|
|
ring_queue->set(seq, pkt->copy());
|
|
|
|
// send_nack
|
|
|
|
check_send_nacks(nack_receiver, ssrc);
|
2020-05-08 08:25:09 +00:00
|
|
|
|
2020-05-14 10:33:31 +00:00
|
|
|
return err;
|
2020-05-08 08:25:09 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::send_periodic_twcc()
|
2020-06-28 06:01:58 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
srs_utime_t now = srs_get_system_time();
|
|
|
|
if(0 == last_twcc_feedback_time_) {
|
|
|
|
last_twcc_feedback_time_ = now;
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
srs_utime_t diff = now - last_twcc_feedback_time_;
|
|
|
|
if( diff >= 50 * SRS_UTIME_MILLISECONDS) {
|
|
|
|
last_twcc_feedback_time_ = now;
|
|
|
|
char pkt[kRtcpPacketSize];
|
|
|
|
SrsBuffer *buffer = new SrsBuffer(pkt, sizeof(pkt));
|
|
|
|
SrsAutoFree(SrsBuffer, buffer);
|
|
|
|
rtcp_twcc_.set_feedback_count(twcc_fb_count_);
|
|
|
|
twcc_fb_count_++;
|
|
|
|
if((err = rtcp_twcc_.encode(buffer)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "fail to generate twcc feedback packet");
|
|
|
|
}
|
|
|
|
int nb_protected_buf = buffer->pos();
|
|
|
|
char protected_buf[kRtpPacketSize];
|
|
|
|
if (session_->transport_->protect_rtcp(pkt, protected_buf, nb_protected_buf) == srs_success) {
|
|
|
|
session_->sendonly_skt->sendto(protected_buf, nb_protected_buf, 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::on_rtcp(char* data, int nb_data)
|
2020-05-14 02:47:21 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
char* ph = data;
|
|
|
|
int nb_left = nb_data;
|
|
|
|
while (nb_left) {
|
|
|
|
uint8_t payload_type = ph[1];
|
|
|
|
uint16_t length_4bytes = (((uint16_t)ph[2]) << 8) | ph[3];
|
|
|
|
|
|
|
|
int length = (length_4bytes + 1) * 4;
|
|
|
|
|
|
|
|
if (length > nb_data) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "invalid rtcp packet, length=%u", length);
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_verbose("on rtcp, payload_type=%u", payload_type);
|
|
|
|
|
|
|
|
switch (payload_type) {
|
|
|
|
case kSR: {
|
|
|
|
err = on_rtcp_sr(ph, length);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kRR: {
|
|
|
|
err = on_rtcp_rr(ph, length);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kSDES: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kBye: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kApp: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kRtpFb: {
|
|
|
|
err = on_rtcp_feedback(ph, length);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kPsFb: {
|
|
|
|
err = on_rtcp_ps_feedback(ph, length);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kXR: {
|
|
|
|
err = on_rtcp_xr(ph, length);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default:{
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "unknown rtcp type=%u", payload_type);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (err != srs_success) {
|
|
|
|
return srs_error_wrap(err, "rtcp");
|
|
|
|
}
|
|
|
|
|
|
|
|
ph += length;
|
|
|
|
nb_left -= length;
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::on_rtcp_sr(char* buf, int nb_buf)
|
2020-05-08 08:25:09 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if (nb_buf < 28) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp sender report packet, nb_buf=%d", nb_buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
|
|
|
|
SrsAutoFree(SrsBuffer, stream);
|
|
|
|
|
|
|
|
// @see: https://tools.ietf.org/html/rfc3550#section-6.4.1
|
|
|
|
/*
|
|
|
|
0 1 2 3
|
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
header |V=2|P| RC | PT=SR=200 | length |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| SSRC of sender |
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
sender | NTP timestamp, most significant word |
|
|
|
|
info +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| NTP timestamp, least significant word |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| RTP timestamp |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| sender's packet count |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| sender's octet count |
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
report | SSRC_1 (SSRC of first source) |
|
|
|
|
block +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
1 | fraction lost | cumulative number of packets lost |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| extended highest sequence number received |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| interarrival jitter |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| last SR (LSR) |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| delay since last SR (DLSR) |
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
report | SSRC_2 (SSRC of second source) |
|
|
|
|
block +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
2 : ... :
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
| profile-specific extensions |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
*/
|
|
|
|
uint8_t first = stream->read_1bytes();
|
|
|
|
uint8_t rc = first & 0x1F;
|
|
|
|
|
|
|
|
uint8_t payload_type = stream->read_1bytes();
|
|
|
|
srs_assert(payload_type == kSR);
|
|
|
|
uint16_t length = stream->read_2bytes();
|
|
|
|
|
|
|
|
if (((length + 1) * 4) != (rc * 24 + 28)) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtcp sender report packet, length=%u, rc=%u", length, rc);
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t ssrc_of_sender = stream->read_4bytes();
|
|
|
|
uint64_t ntp = stream->read_8bytes();
|
|
|
|
SrsNtp srs_ntp = SrsNtp::to_time_ms(ntp);
|
|
|
|
uint32_t rtp_time = stream->read_4bytes();
|
|
|
|
uint32_t sender_packet_count = stream->read_4bytes();
|
|
|
|
uint32_t sender_octec_count = stream->read_4bytes();
|
|
|
|
|
|
|
|
(void)sender_packet_count; (void)sender_octec_count; (void)rtp_time;
|
|
|
|
srs_verbose("sender report, ssrc_of_sender=%u, rtp_time=%u, sender_packet_count=%u, sender_octec_count=%u",
|
|
|
|
ssrc_of_sender, rtp_time, sender_packet_count, sender_octec_count);
|
|
|
|
|
|
|
|
for (int i = 0; i < rc; ++i) {
|
|
|
|
uint32_t ssrc = stream->read_4bytes();
|
|
|
|
uint8_t fraction_lost = stream->read_1bytes();
|
|
|
|
uint32_t cumulative_number_of_packets_lost = stream->read_3bytes();
|
|
|
|
uint32_t highest_seq = stream->read_4bytes();
|
|
|
|
uint32_t jitter = stream->read_4bytes();
|
|
|
|
uint32_t lst = stream->read_4bytes();
|
|
|
|
uint32_t dlsr = stream->read_4bytes();
|
|
|
|
|
|
|
|
(void)ssrc; (void)fraction_lost; (void)cumulative_number_of_packets_lost; (void)highest_seq; (void)jitter; (void)lst; (void)dlsr;
|
|
|
|
srs_verbose("sender report, ssrc=%u, fraction_lost=%u, cumulative_number_of_packets_lost=%u, highest_seq=%u, jitter=%u, lst=%u, dlst=%u",
|
|
|
|
ssrc, fraction_lost, cumulative_number_of_packets_lost, highest_seq, jitter, lst, dlsr);
|
|
|
|
}
|
|
|
|
|
|
|
|
last_sender_report_ntp[ssrc_of_sender] = srs_ntp;
|
|
|
|
last_sender_report_sys_time[ssrc_of_sender] = srs_update_system_time();
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::on_rtcp_xr(char* buf, int nb_buf)
|
2020-05-08 08:25:09 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
/*
|
|
|
|
@see: http://www.rfc-editor.org/rfc/rfc3611.html#section-2
|
|
|
|
|
|
|
|
0 1 2 3
|
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|V=2|P|reserved | PT=XR=207 | length |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| SSRC |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
: report blocks :
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
*/
|
|
|
|
|
|
|
|
SrsBuffer stream(buf, nb_buf);
|
|
|
|
/*uint8_t first = */stream.read_1bytes();
|
|
|
|
uint8_t pt = stream.read_1bytes();
|
|
|
|
srs_assert(pt == kXR);
|
|
|
|
uint16_t length = (stream.read_2bytes() + 1) * 4;
|
|
|
|
/*uint32_t ssrc = */stream.read_4bytes();
|
|
|
|
|
|
|
|
if (length != nb_buf) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid XR packet, length=%u, nb_buf=%d", length, nb_buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
while (stream.pos() + 4 < length) {
|
|
|
|
uint8_t bt = stream.read_1bytes();
|
|
|
|
stream.skip(1);
|
|
|
|
uint16_t block_length = (stream.read_2bytes() + 1) * 4;
|
|
|
|
|
|
|
|
if (stream.pos() + block_length - 4 > nb_buf) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid XR packet block, block_length=%u, nb_buf=%d", block_length, nb_buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bt == 5) {
|
|
|
|
for (int i = 4; i < block_length; i += 12) {
|
|
|
|
uint32_t ssrc = stream.read_4bytes();
|
|
|
|
uint32_t lrr = stream.read_4bytes();
|
|
|
|
uint32_t dlrr = stream.read_4bytes();
|
|
|
|
|
|
|
|
SrsNtp cur_ntp = SrsNtp::from_time_ms(srs_update_system_time() / 1000);
|
|
|
|
uint32_t compact_ntp = (cur_ntp.ntp_second_ << 16) | (cur_ntp.ntp_fractions_ >> 16);
|
|
|
|
|
|
|
|
int rtt_ntp = compact_ntp - lrr - dlrr;
|
|
|
|
int rtt = ((rtt_ntp * 1000) >> 16) + ((rtt_ntp >> 16) * 1000);
|
|
|
|
srs_verbose("ssrc=%u, compact_ntp=%u, lrr=%u, dlrr=%u, rtt=%d",
|
|
|
|
ssrc, compact_ntp, lrr, dlrr, rtt);
|
|
|
|
|
|
|
|
if (ssrc == video_ssrc) {
|
|
|
|
video_nack_->update_rtt(rtt);
|
|
|
|
} else if (ssrc == audio_ssrc) {
|
|
|
|
audio_nack_->update_rtt(rtt);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::on_rtcp_feedback(char* buf, int nb_buf)
|
2020-05-08 08:25:09 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
// TODO: FIXME: Implements it.
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::on_rtcp_ps_feedback(char* buf, int nb_buf)
|
2020-05-08 08:25:09 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if (nb_buf < 12) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp feedback packet, nb_buf=%d", nb_buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
|
|
|
|
SrsAutoFree(SrsBuffer, stream);
|
|
|
|
|
|
|
|
uint8_t first = stream->read_1bytes();
|
|
|
|
//uint8_t version = first & 0xC0;
|
|
|
|
//uint8_t padding = first & 0x20;
|
|
|
|
uint8_t fmt = first & 0x1F;
|
|
|
|
|
|
|
|
/*uint8_t payload_type = */stream->read_1bytes();
|
|
|
|
/*uint16_t length = */stream->read_2bytes();
|
|
|
|
/*uint32_t ssrc_of_sender = */stream->read_4bytes();
|
|
|
|
/*uint32_t ssrc_of_media_source = */stream->read_4bytes();
|
|
|
|
|
|
|
|
switch (fmt) {
|
|
|
|
case kPLI: {
|
|
|
|
srs_verbose("pli");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kSLI: {
|
|
|
|
srs_verbose("sli");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kRPSI: {
|
|
|
|
srs_verbose("rpsi");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kAFB: {
|
|
|
|
srs_verbose("afb");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default: {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "unknown payload specific feedback=%u", fmt);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::on_rtcp_rr(char* buf, int nb_buf)
|
2020-05-08 08:25:09 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if (nb_buf < 8) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp receiver report packet, nb_buf=%d", nb_buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
|
|
|
|
SrsAutoFree(SrsBuffer, stream);
|
|
|
|
|
|
|
|
// @see: https://tools.ietf.org/html/rfc3550#section-6.4.2
|
|
|
|
/*
|
|
|
|
0 1 2 3
|
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
header |V=2|P| RC | PT=RR=201 | length |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| SSRC of packet sender |
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
report | SSRC_1 (SSRC of first source) |
|
|
|
|
block +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
1 | fraction lost | cumulative number of packets lost |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| extended highest sequence number received |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| interarrival jitter |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| last SR (LSR) |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| delay since last SR (DLSR) |
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
report | SSRC_2 (SSRC of second source) |
|
|
|
|
block +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
2 : ... :
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
| profile-specific extensions |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
*/
|
|
|
|
uint8_t first = stream->read_1bytes();
|
|
|
|
//uint8_t version = first & 0xC0;
|
|
|
|
//uint8_t padding = first & 0x20;
|
|
|
|
uint8_t rc = first & 0x1F;
|
|
|
|
|
|
|
|
/*uint8_t payload_type = */stream->read_1bytes();
|
|
|
|
uint16_t length = stream->read_2bytes();
|
|
|
|
/*uint32_t ssrc_of_sender = */stream->read_4bytes();
|
|
|
|
|
|
|
|
if (((length + 1) * 4) != (rc * 24 + 8)) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtcp receiver packet, length=%u, rc=%u", length, rc);
|
|
|
|
}
|
|
|
|
|
|
|
|
for (int i = 0; i < rc; ++i) {
|
|
|
|
uint32_t ssrc = stream->read_4bytes();
|
|
|
|
uint8_t fraction_lost = stream->read_1bytes();
|
|
|
|
uint32_t cumulative_number_of_packets_lost = stream->read_3bytes();
|
|
|
|
uint32_t highest_seq = stream->read_4bytes();
|
|
|
|
uint32_t jitter = stream->read_4bytes();
|
|
|
|
uint32_t lst = stream->read_4bytes();
|
|
|
|
uint32_t dlsr = stream->read_4bytes();
|
|
|
|
|
|
|
|
(void)ssrc; (void)fraction_lost; (void)cumulative_number_of_packets_lost; (void)highest_seq; (void)jitter; (void)lst; (void)dlsr;
|
|
|
|
srs_verbose("ssrc=%u, fraction_lost=%u, cumulative_number_of_packets_lost=%u, highest_seq=%u, jitter=%u, lst=%u, dlst=%u",
|
|
|
|
ssrc, fraction_lost, cumulative_number_of_packets_lost, highest_seq, jitter, lst, dlsr);
|
|
|
|
}
|
2020-05-02 01:15:49 +00:00
|
|
|
|
2020-05-08 08:25:09 +00:00
|
|
|
return err;
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
void SrsRtcPublishStream::request_keyframe()
|
2020-04-30 00:24:15 +00:00
|
|
|
{
|
2020-07-05 15:26:55 +00:00
|
|
|
SrsContextId scid = _srs_context->get_id();
|
|
|
|
SrsContextId pcid = session_->context_id();
|
2020-06-18 03:45:43 +00:00
|
|
|
srs_trace("RTC play=[%d][%s] request keyframe from publish=[%d][%s]", ::getpid(), scid.c_str(), ::getpid(), pcid.c_str());
|
2020-04-30 00:24:15 +00:00
|
|
|
|
2020-05-14 10:33:31 +00:00
|
|
|
request_keyframe_ = true;
|
2020-04-30 00:24:15 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
srs_error_t SrsRtcPublishStream::notify(int type, srs_utime_t interval, srs_utime_t tick)
|
2020-04-26 05:30:17 +00:00
|
|
|
{
|
2020-04-30 06:49:37 +00:00
|
|
|
srs_error_t err = srs_success;
|
2020-06-28 11:39:42 +00:00
|
|
|
|
2020-04-30 06:49:37 +00:00
|
|
|
// TODO: FIXME: Check error.
|
2020-05-17 03:16:00 +00:00
|
|
|
send_rtcp_rr(video_ssrc, video_queue_);
|
|
|
|
send_rtcp_rr(audio_ssrc, audio_queue_);
|
|
|
|
send_rtcp_xr_rrtr(video_ssrc);
|
|
|
|
send_rtcp_xr_rrtr(audio_ssrc);
|
2020-06-28 11:39:42 +00:00
|
|
|
|
|
|
|
// TODO: FIXME: Check error.
|
|
|
|
// We should not depends on the received packet,
|
|
|
|
// instead we should send feedback every Nms.
|
2020-06-28 06:01:58 +00:00
|
|
|
send_periodic_twcc();
|
2020-05-15 10:13:03 +00:00
|
|
|
|
2020-04-30 06:49:37 +00:00
|
|
|
return err;
|
2020-04-26 05:30:17 +00:00
|
|
|
}
|
2020-04-23 09:08:21 +00:00
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
void SrsRtcPublishStream::simulate_nack_drop(int nn)
|
2020-05-04 06:47:58 +00:00
|
|
|
{
|
2020-05-04 09:49:39 +00:00
|
|
|
nn_simulate_nack_drop = nn;
|
2020-05-04 06:47:58 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 09:20:15 +00:00
|
|
|
void SrsRtcPublishStream::simulate_drop_packet(SrsRtpHeader* h, int nn_bytes)
|
2020-05-04 12:42:30 +00:00
|
|
|
{
|
|
|
|
srs_warn("RTC NACK simulator #%d drop seq=%u, ssrc=%u/%s, ts=%u, %d bytes", nn_simulate_nack_drop,
|
|
|
|
h->get_sequence(), h->get_ssrc(), (h->get_ssrc()==video_ssrc? "Video":"Audio"), h->get_timestamp(),
|
|
|
|
nn_bytes);
|
|
|
|
|
|
|
|
nn_simulate_nack_drop--;
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
SrsRtcConnection::SrsRtcConnection(SrsRtcServer* s)
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
2020-05-03 01:55:43 +00:00
|
|
|
req = NULL;
|
|
|
|
is_publisher_ = false;
|
2020-04-07 08:05:31 +00:00
|
|
|
encrypt = true;
|
2020-04-08 05:30:28 +00:00
|
|
|
|
2020-05-03 01:55:43 +00:00
|
|
|
source_ = NULL;
|
2020-05-03 05:49:53 +00:00
|
|
|
publisher_ = NULL;
|
|
|
|
player_ = NULL;
|
2020-04-30 06:49:37 +00:00
|
|
|
sendonly_skt = NULL;
|
2020-05-03 05:49:53 +00:00
|
|
|
server_ = s;
|
2020-06-25 04:03:21 +00:00
|
|
|
transport_ = new SrsSecurityTransport(this);
|
2020-04-26 11:00:36 +00:00
|
|
|
|
2020-05-05 23:37:00 +00:00
|
|
|
state_ = INIT;
|
2020-04-26 11:00:36 +00:00
|
|
|
last_stun_time = 0;
|
|
|
|
sessionStunTimeout = 0;
|
2020-05-21 13:59:30 +00:00
|
|
|
disposing_ = false;
|
2020-04-27 01:35:50 +00:00
|
|
|
|
|
|
|
blackhole = false;
|
|
|
|
blackhole_addr = NULL;
|
|
|
|
blackhole_stfd = NULL;
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
SrsRtcConnection::~SrsRtcConnection()
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
2020-05-03 05:49:53 +00:00
|
|
|
srs_freep(player_);
|
|
|
|
srs_freep(publisher_);
|
2020-06-25 04:03:21 +00:00
|
|
|
srs_freep(transport_);
|
2020-04-26 08:12:23 +00:00
|
|
|
srs_freep(req);
|
2020-04-27 01:35:50 +00:00
|
|
|
srs_close_stfd(blackhole_stfd);
|
|
|
|
srs_freep(blackhole_addr);
|
2020-04-30 06:49:37 +00:00
|
|
|
srs_freep(sendonly_skt);
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
SrsSdp* SrsRtcConnection::get_local_sdp()
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
|
|
|
return &local_sdp;
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
void SrsRtcConnection::set_local_sdp(const SrsSdp& sdp)
|
2020-03-30 07:16:29 +00:00
|
|
|
{
|
|
|
|
local_sdp = sdp;
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
SrsSdp* SrsRtcConnection::get_remote_sdp()
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
|
|
|
return &remote_sdp;
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
void SrsRtcConnection::set_remote_sdp(const SrsSdp& sdp)
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
|
|
|
remote_sdp = sdp;
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
SrsRtcConnectionStateType SrsRtcConnection::state()
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
2020-05-05 23:37:00 +00:00
|
|
|
return state_;
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
void SrsRtcConnection::set_state(SrsRtcConnectionStateType state)
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
2020-05-05 23:37:00 +00:00
|
|
|
state_ = state;
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
string SrsRtcConnection::id()
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
2020-05-04 06:47:58 +00:00
|
|
|
return peer_id_ + "/" + username_;
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
string SrsRtcConnection::peer_id()
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
2020-05-04 06:47:58 +00:00
|
|
|
return peer_id_;
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
void SrsRtcConnection::set_peer_id(string v)
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
2020-05-04 06:47:58 +00:00
|
|
|
peer_id_ = v;
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
string SrsRtcConnection::username()
|
2020-05-04 06:47:58 +00:00
|
|
|
{
|
|
|
|
return username_;
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
void SrsRtcConnection::set_encrypt(bool v)
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
|
|
|
encrypt = v;
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
void SrsRtcConnection::switch_to_context()
|
2020-03-17 04:33:08 +00:00
|
|
|
{
|
|
|
|
_srs_context->set_id(cid);
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
SrsContextId SrsRtcConnection::context_id()
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
|
|
|
return cid;
|
|
|
|
}
|
|
|
|
|
2020-07-08 11:01:33 +00:00
|
|
|
srs_error_t SrsRtcConnection::initialize(SrsRtcStream* source, SrsRequest* r, bool is_publisher, string username, SrsContextId context_id)
|
2020-04-26 11:00:36 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-05-04 06:47:58 +00:00
|
|
|
username_ = username;
|
2020-05-03 01:55:43 +00:00
|
|
|
req = r->copy();
|
|
|
|
cid = context_id;
|
|
|
|
is_publisher_ = is_publisher;
|
|
|
|
source_ = source;
|
|
|
|
|
2020-06-27 03:13:53 +00:00
|
|
|
SrsSessionConfig* cfg = &local_sdp.session_config_;
|
|
|
|
if ((err = transport_->initialize(cfg)) != srs_success) {
|
2020-04-26 11:00:36 +00:00
|
|
|
return srs_error_wrap(err, "init");
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: FIXME: Support reload.
|
|
|
|
sessionStunTimeout = _srs_config->get_rtc_stun_timeout(req->vhost);
|
|
|
|
last_stun_time = srs_get_system_time();
|
|
|
|
|
2020-04-27 01:35:50 +00:00
|
|
|
blackhole = _srs_config->get_rtc_server_black_hole();
|
|
|
|
|
2020-06-27 03:13:53 +00:00
|
|
|
srs_trace("RTC init session, DTLS(role=%s, version=%s), timeout=%dms, blackhole=%d",
|
|
|
|
cfg->dtls_role.c_str(), cfg->dtls_version.c_str(), srsu2msi(sessionStunTimeout), blackhole);
|
2020-04-27 01:35:50 +00:00
|
|
|
|
|
|
|
if (blackhole) {
|
2020-05-26 05:49:27 +00:00
|
|
|
string blackhole_ep = _srs_config->get_rtc_server_black_hole_addr();
|
2020-04-27 01:35:50 +00:00
|
|
|
if (!blackhole_ep.empty()) {
|
|
|
|
string host; int port;
|
|
|
|
srs_parse_hostport(blackhole_ep, host, port);
|
|
|
|
|
|
|
|
srs_freep(blackhole_addr);
|
|
|
|
blackhole_addr = new sockaddr_in();
|
|
|
|
blackhole_addr->sin_family = AF_INET;
|
|
|
|
blackhole_addr->sin_addr.s_addr = inet_addr(host.c_str());
|
|
|
|
blackhole_addr->sin_port = htons(port);
|
|
|
|
|
|
|
|
int fd = socket(AF_INET, SOCK_DGRAM, 0);
|
|
|
|
blackhole_stfd = srs_netfd_open_socket(fd);
|
|
|
|
srs_assert(blackhole_stfd);
|
|
|
|
|
|
|
|
srs_trace("RTC blackhole %s:%d, fd=%d", host.c_str(), port, fd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-26 11:00:36 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
srs_error_t SrsRtcConnection::on_stun(SrsUdpMuxSocket* skt, SrsStunPacket* r)
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-30 06:49:37 +00:00
|
|
|
if (!r->is_binding_request()) {
|
|
|
|
return err;
|
|
|
|
}
|
2020-03-06 15:01:48 +00:00
|
|
|
|
2020-04-30 06:49:37 +00:00
|
|
|
last_stun_time = srs_get_system_time();
|
2020-03-12 16:24:56 +00:00
|
|
|
|
2020-04-30 06:49:37 +00:00
|
|
|
// We are running in the ice-lite(server) mode. If client have multi network interface,
|
|
|
|
// we only choose one candidate pair which is determined by client.
|
2020-05-04 06:47:58 +00:00
|
|
|
if (!sendonly_skt || sendonly_skt->peer_id() != skt->peer_id()) {
|
2020-04-30 06:49:37 +00:00
|
|
|
update_sendonly_socket(skt);
|
|
|
|
}
|
2020-04-23 15:14:30 +00:00
|
|
|
|
2020-04-30 06:49:37 +00:00
|
|
|
// Write STUN messages to blackhole.
|
|
|
|
if (blackhole && blackhole_addr && blackhole_stfd) {
|
|
|
|
// Ignore any error for black-hole.
|
|
|
|
void* p = skt->data(); int len = skt->size();
|
|
|
|
srs_sendto(blackhole_stfd, p, len, (sockaddr*)blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((err = on_binding_request(r)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "stun binding request failed");
|
2020-03-22 08:54:31 +00:00
|
|
|
}
|
|
|
|
|
2020-02-28 15:18:39 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
srs_error_t SrsRtcConnection::on_dtls(char* data, int nb_data)
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
2020-06-25 04:03:21 +00:00
|
|
|
return transport_->on_dtls(data, nb_data);
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
2020-03-28 12:52:42 +00:00
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
srs_error_t SrsRtcConnection::on_rtcp(char* data, int nb_data)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
2020-03-07 16:30:31 +00:00
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-06-25 04:03:21 +00:00
|
|
|
if (transport_ == NULL) {
|
2020-05-02 01:15:49 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "recv unexpect rtp packet before dtls done");
|
2020-04-02 13:31:06 +00:00
|
|
|
}
|
|
|
|
|
2020-05-02 01:15:49 +00:00
|
|
|
char unprotected_buf[kRtpPacketSize];
|
|
|
|
int nb_unprotected_buf = nb_data;
|
2020-06-25 12:47:17 +00:00
|
|
|
if ((err = transport_->unprotect_rtcp(data, unprotected_buf, nb_unprotected_buf)) != srs_success) {
|
2020-05-02 01:15:49 +00:00
|
|
|
return srs_error_wrap(err, "rtcp unprotect failed");
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-05-02 01:15:49 +00:00
|
|
|
if (blackhole && blackhole_addr && blackhole_stfd) {
|
|
|
|
// Ignore any error for black-hole.
|
|
|
|
void* p = unprotected_buf; int len = nb_unprotected_buf;
|
|
|
|
srs_sendto(blackhole_stfd, p, len, (sockaddr*)blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
|
2020-03-07 16:30:31 +00:00
|
|
|
}
|
|
|
|
|
2020-05-08 08:25:09 +00:00
|
|
|
if (player_) {
|
|
|
|
return player_->on_rtcp(unprotected_buf, nb_unprotected_buf);
|
|
|
|
}
|
2020-05-02 01:15:49 +00:00
|
|
|
|
2020-05-08 08:25:09 +00:00
|
|
|
if (publisher_) {
|
|
|
|
return publisher_->on_rtcp(unprotected_buf, nb_unprotected_buf);
|
2020-04-27 01:35:50 +00:00
|
|
|
}
|
|
|
|
|
2020-03-07 16:30:31 +00:00
|
|
|
return err;
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
srs_error_t SrsRtcConnection::on_rtp(char* data, int nb_data)
|
2020-03-14 14:11:01 +00:00
|
|
|
{
|
2020-05-03 05:49:53 +00:00
|
|
|
if (publisher_ == NULL) {
|
2020-05-02 01:15:49 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "rtc publisher null");
|
2020-03-14 14:11:01 +00:00
|
|
|
}
|
|
|
|
|
2020-06-25 04:03:21 +00:00
|
|
|
if (transport_ == NULL) {
|
2020-05-02 01:15:49 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "recv unexpect rtp packet before dtls done");
|
|
|
|
}
|
2020-03-14 14:11:01 +00:00
|
|
|
|
2020-05-17 13:32:53 +00:00
|
|
|
return publisher_->on_rtp(data, nb_data);
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
srs_error_t SrsRtcConnection::on_connection_established()
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-05-02 23:22:07 +00:00
|
|
|
srs_trace("RTC %s session=%s, to=%dms connection established", (is_publisher_? "Publisher":"Subscriber"),
|
|
|
|
id().c_str(), srsu2msi(sessionStunTimeout));
|
2020-05-02 01:15:49 +00:00
|
|
|
|
2020-05-02 23:22:07 +00:00
|
|
|
if (is_publisher_) {
|
2020-05-02 01:15:49 +00:00
|
|
|
if ((err = start_publish()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "start publish");
|
|
|
|
}
|
2020-05-02 23:22:07 +00:00
|
|
|
} else {
|
2020-05-02 01:15:49 +00:00
|
|
|
if ((err = start_play()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "start play");
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
srs_error_t SrsRtcConnection::start_play()
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-07-02 06:51:11 +00:00
|
|
|
// If player is initialized, we think the session is started.
|
|
|
|
// To prevent play multiple times for the DTLS ARQ packet.
|
|
|
|
if (player_) {
|
|
|
|
return err;
|
|
|
|
}
|
2020-07-07 09:20:15 +00:00
|
|
|
player_ = new SrsRtcPlayStream(this, _srs_context->get_id());
|
2020-05-02 01:15:49 +00:00
|
|
|
|
|
|
|
uint32_t video_ssrc = 0;
|
|
|
|
uint32_t audio_ssrc = 0;
|
|
|
|
uint16_t video_payload_type = 0;
|
|
|
|
uint16_t audio_payload_type = 0;
|
|
|
|
for (size_t i = 0; i < local_sdp.media_descs_.size(); ++i) {
|
|
|
|
const SrsMediaDesc& media_desc = local_sdp.media_descs_[i];
|
|
|
|
if (media_desc.is_audio()) {
|
|
|
|
audio_ssrc = media_desc.ssrc_infos_[0].ssrc_;
|
|
|
|
audio_payload_type = media_desc.payload_types_[0].payload_type_;
|
|
|
|
} else if (media_desc.is_video()) {
|
|
|
|
video_ssrc = media_desc.ssrc_infos_[0].ssrc_;
|
|
|
|
video_payload_type = media_desc.payload_types_[0].payload_type_;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-07-02 08:28:37 +00:00
|
|
|
if ((err = player_->initialize(video_ssrc, audio_ssrc, video_payload_type, audio_payload_type)) != srs_success) {
|
2020-07-07 09:20:15 +00:00
|
|
|
return srs_error_wrap(err, "SrsRtcPlayStream init");
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
|
|
|
|
2020-05-03 05:49:53 +00:00
|
|
|
if ((err = player_->start()) != srs_success) {
|
2020-07-07 09:20:15 +00:00
|
|
|
return srs_error_wrap(err, "start SrsRtcPlayStream");
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
srs_error_t SrsRtcConnection::start_publish()
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-07-02 06:51:11 +00:00
|
|
|
// If publisher is initialized, we think the session is started.
|
|
|
|
// To prevent publish multiple times for the DTLS ARQ packet.
|
|
|
|
if (publisher_) {
|
|
|
|
return err;
|
|
|
|
}
|
2020-07-07 09:20:15 +00:00
|
|
|
publisher_ = new SrsRtcPublishStream(this);
|
2020-07-02 06:51:32 +00:00
|
|
|
|
2020-05-03 01:00:05 +00:00
|
|
|
// Request PLI for exists players?
|
2020-05-03 05:49:53 +00:00
|
|
|
//publisher_->request_keyframe();
|
2020-05-02 01:15:49 +00:00
|
|
|
|
|
|
|
uint32_t video_ssrc = 0;
|
|
|
|
uint32_t audio_ssrc = 0;
|
|
|
|
for (size_t i = 0; i < remote_sdp.media_descs_.size(); ++i) {
|
|
|
|
const SrsMediaDesc& media_desc = remote_sdp.media_descs_[i];
|
|
|
|
if (media_desc.is_audio()) {
|
|
|
|
if (!media_desc.ssrc_infos_.empty()) {
|
|
|
|
audio_ssrc = media_desc.ssrc_infos_[0].ssrc_;
|
|
|
|
}
|
|
|
|
} else if (media_desc.is_video()) {
|
|
|
|
if (!media_desc.ssrc_infos_.empty()) {
|
|
|
|
video_ssrc = media_desc.ssrc_infos_[0].ssrc_;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-19 10:14:48 +00:00
|
|
|
uint32_t twcc_ext_id = 0;
|
|
|
|
for (size_t i = 0; i < local_sdp.media_descs_.size(); ++i) {
|
|
|
|
const SrsMediaDesc& media_desc = remote_sdp.media_descs_[i];
|
|
|
|
map<int, string> extmaps = media_desc.get_extmaps();
|
|
|
|
for(map<int, string>::iterator it_ext = extmaps.begin(); it_ext != extmaps.end(); ++it_ext) {
|
|
|
|
if(kTWCCExt == it_ext->second) {
|
|
|
|
twcc_ext_id = it_ext->first;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (twcc_ext_id != 0){
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2020-05-22 10:14:15 +00:00
|
|
|
|
2020-05-02 01:15:49 +00:00
|
|
|
// FIXME: err process.
|
2020-05-19 10:14:48 +00:00
|
|
|
if ((err = publisher_->initialize(video_ssrc, audio_ssrc, twcc_ext_id, req)) != srs_success) {
|
2020-05-02 01:15:49 +00:00
|
|
|
return srs_error_wrap(err, "rtc publisher init");
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
bool SrsRtcConnection::is_stun_timeout()
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
|
|
|
return last_stun_time + sessionStunTimeout < srs_get_system_time();
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
void SrsRtcConnection::update_sendonly_socket(SrsUdpMuxSocket* skt)
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
|
|
|
if (sendonly_skt) {
|
|
|
|
srs_trace("session %s address changed, update %s -> %s",
|
2020-05-04 06:47:58 +00:00
|
|
|
id().c_str(), sendonly_skt->peer_id().c_str(), skt->peer_id().c_str());
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
srs_freep(sendonly_skt);
|
|
|
|
sendonly_skt = skt->copy_sendonly();
|
|
|
|
}
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
void SrsRtcConnection::simulate_nack_drop(int nn)
|
2020-05-04 06:47:58 +00:00
|
|
|
{
|
|
|
|
if (player_) {
|
|
|
|
player_->simulate_nack_drop(nn);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (publisher_) {
|
|
|
|
publisher_->simulate_nack_drop(nn);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-05-02 01:15:49 +00:00
|
|
|
#ifdef SRS_OSX
|
|
|
|
// These functions are similar to the older byteorder(3) family of functions.
|
|
|
|
// For example, be32toh() is identical to ntohl().
|
|
|
|
// @see https://linux.die.net/man/3/be32toh
|
|
|
|
#define be32toh ntohl
|
|
|
|
#endif
|
|
|
|
|
2020-07-07 08:37:34 +00:00
|
|
|
srs_error_t SrsRtcConnection::on_binding_request(SrsStunPacket* r)
|
2020-05-02 01:15:49 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
bool strict_check = _srs_config->get_rtc_stun_strict_check(req->vhost);
|
|
|
|
if (strict_check && r->get_ice_controlled()) {
|
|
|
|
// @see: https://tools.ietf.org/html/draft-ietf-ice-rfc5245bis-00#section-6.1.3.1
|
|
|
|
// TODO: Send 487 (Role Conflict) error response.
|
|
|
|
return srs_error_new(ERROR_RTC_STUN, "Peer must not in ice-controlled role in ice-lite mode.");
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsStunPacket stun_binding_response;
|
|
|
|
char buf[kRtpPacketSize];
|
|
|
|
SrsBuffer* stream = new SrsBuffer(buf, sizeof(buf));
|
|
|
|
SrsAutoFree(SrsBuffer, stream);
|
|
|
|
|
|
|
|
stun_binding_response.set_message_type(BindingResponse);
|
|
|
|
stun_binding_response.set_local_ufrag(r->get_remote_ufrag());
|
|
|
|
stun_binding_response.set_remote_ufrag(r->get_local_ufrag());
|
|
|
|
stun_binding_response.set_transcation_id(r->get_transcation_id());
|
|
|
|
// FIXME: inet_addr is deprecated, IPV6 support
|
|
|
|
stun_binding_response.set_mapped_address(be32toh(inet_addr(sendonly_skt->get_peer_ip().c_str())));
|
|
|
|
stun_binding_response.set_mapped_port(sendonly_skt->get_peer_port());
|
|
|
|
|
|
|
|
if ((err = stun_binding_response.encode(get_local_sdp()->get_ice_pwd(), stream)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "stun binding response encode failed");
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((err = sendonly_skt->sendto(stream->data(), stream->pos(), 0)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "stun binding response send failed");
|
|
|
|
}
|
|
|
|
|
2020-05-05 23:37:00 +00:00
|
|
|
if (state_ == WAITING_STUN) {
|
|
|
|
state_ = DOING_DTLS_HANDSHAKE;
|
2020-05-02 01:15:49 +00:00
|
|
|
|
2020-05-04 06:47:58 +00:00
|
|
|
peer_id_ = sendonly_skt->peer_id();
|
|
|
|
server_->insert_into_id_sessions(peer_id_, this);
|
2020-05-02 01:15:49 +00:00
|
|
|
|
2020-05-05 23:37:00 +00:00
|
|
|
state_ = DOING_DTLS_HANDSHAKE;
|
2020-07-12 01:55:35 +00:00
|
|
|
srs_trace("RTC session=%s, STUN done, waitting DTLS handshake.", id().c_str());
|
2020-06-27 03:13:53 +00:00
|
|
|
|
|
|
|
if((err = transport_->start_active_handshake()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "fail to dtls handshake");
|
|
|
|
}
|
2020-05-02 01:15:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (blackhole && blackhole_addr && blackhole_stfd) {
|
|
|
|
// Ignore any error for black-hole.
|
|
|
|
void* p = stream->data(); int len = stream->pos();
|
|
|
|
srs_sendto(blackhole_stfd, p, len, (sockaddr*)blackhole_addr, sizeof(sockaddr_in), SRS_UTIME_NO_TIMEOUT);
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-05-22 10:14:15 +00:00
|
|
|
ISrsRtcHijacker::ISrsRtcHijacker()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
ISrsRtcHijacker::~ISrsRtcHijacker()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
ISrsRtcHijacker* _srs_rtc_hijacker = NULL;
|
|
|
|
|