2020-02-28 15:18:39 +00:00
|
|
|
/**
|
|
|
|
* The MIT License (MIT)
|
|
|
|
*
|
2020-03-31 10:03:04 +00:00
|
|
|
* Copyright (c) 2013-2020 John
|
2020-02-28 15:18:39 +00:00
|
|
|
*
|
|
|
|
* Permission is hereby granted, free of charge, to any person obtaining a copy of
|
|
|
|
* this software and associated documentation files (the "Software"), to deal in
|
|
|
|
* the Software without restriction, including without limitation the rights to
|
|
|
|
* use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of
|
|
|
|
* the Software, and to permit persons to whom the Software is furnished to do so,
|
|
|
|
* subject to the following conditions:
|
|
|
|
*
|
|
|
|
* The above copyright notice and this permission notice shall be included in all
|
|
|
|
* copies or substantial portions of the Software.
|
|
|
|
*
|
|
|
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
|
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR
|
|
|
|
* COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER
|
|
|
|
* IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
|
|
|
|
* CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include <srs_app_rtc_conn.hpp>
|
|
|
|
|
|
|
|
using namespace std;
|
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
|
|
|
#include <stdlib.h>
|
2020-03-11 11:21:44 +00:00
|
|
|
#include <fcntl.h>
|
|
|
|
#include <unistd.h>
|
2020-03-06 15:01:48 +00:00
|
|
|
|
2020-04-13 15:40:30 +00:00
|
|
|
#include <netinet/udp.h>
|
2020-04-20 12:25:23 +00:00
|
|
|
// Define macro for UDP GSO.
|
|
|
|
// @see https://github.com/torvalds/linux/blob/master/tools/testing/selftests/net/udpgso.c
|
2020-04-13 15:40:30 +00:00
|
|
|
#ifndef UDP_SEGMENT
|
|
|
|
#define UDP_SEGMENT 103
|
|
|
|
#endif
|
|
|
|
|
2020-03-02 14:47:40 +00:00
|
|
|
#include <sstream>
|
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
#include <srs_core_autofree.hpp>
|
|
|
|
#include <srs_kernel_buffer.hpp>
|
2020-03-13 12:34:40 +00:00
|
|
|
#include <srs_kernel_rtp.hpp>
|
2020-02-28 15:18:39 +00:00
|
|
|
#include <srs_kernel_error.hpp>
|
2020-03-06 15:01:48 +00:00
|
|
|
#include <srs_kernel_log.hpp>
|
2020-02-28 15:18:39 +00:00
|
|
|
#include <srs_stun_stack.hpp>
|
2020-03-09 11:46:27 +00:00
|
|
|
#include <srs_rtmp_stack.hpp>
|
|
|
|
#include <srs_rtmp_msg_array.hpp>
|
2020-03-06 15:01:48 +00:00
|
|
|
#include <srs_app_dtls.hpp>
|
2020-03-11 11:21:44 +00:00
|
|
|
#include <srs_app_utility.hpp>
|
2020-03-07 07:28:15 +00:00
|
|
|
#include <srs_app_config.hpp>
|
2020-03-21 13:26:30 +00:00
|
|
|
#include <srs_app_rtc.hpp>
|
2020-04-23 09:08:21 +00:00
|
|
|
#include <srs_app_rtp_queue.hpp>
|
2020-03-09 11:46:27 +00:00
|
|
|
#include <srs_app_source.hpp>
|
|
|
|
#include <srs_app_server.hpp>
|
2020-03-07 07:28:15 +00:00
|
|
|
#include <srs_service_utility.hpp>
|
2020-03-17 09:56:37 +00:00
|
|
|
#include <srs_http_stack.hpp>
|
|
|
|
#include <srs_app_http_api.hpp>
|
2020-04-05 16:24:14 +00:00
|
|
|
#include <srs_app_statistic.hpp>
|
2020-04-08 15:24:59 +00:00
|
|
|
#include <srs_app_pithy_print.hpp>
|
2020-02-28 15:18:39 +00:00
|
|
|
|
2020-04-15 02:44:26 +00:00
|
|
|
// The RTP payload max size, reserved some paddings for SRTP as such:
|
|
|
|
// kRtpPacketSize = kRtpMaxPayloadSize + paddings
|
|
|
|
// For example, if kRtpPacketSize is 1500, recommend to set kRtpMaxPayloadSize to 1400,
|
|
|
|
// which reserves 100 bytes for SRTP or paddings.
|
2020-04-15 04:05:27 +00:00
|
|
|
const int kRtpMaxPayloadSize = kRtpPacketSize - 200;
|
2020-04-15 02:44:26 +00:00
|
|
|
|
2020-03-14 14:11:01 +00:00
|
|
|
static bool is_stun(const uint8_t* data, const int size)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
2020-02-28 15:18:39 +00:00
|
|
|
return data != NULL && size > 0 && (data[0] == 0 || data[0] == 1);
|
|
|
|
}
|
|
|
|
|
2020-03-14 14:11:01 +00:00
|
|
|
static bool is_dtls(const uint8_t* data, size_t len)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
2020-04-09 00:20:55 +00:00
|
|
|
return (len >= 13 && (data[0] > 19 && data[0] < 64));
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-03-14 14:11:01 +00:00
|
|
|
static bool is_rtp_or_rtcp(const uint8_t* data, size_t len)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
2020-04-09 00:20:55 +00:00
|
|
|
return (len >= 12 && (data[0] & 0xC0) == 0x80);
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-03-14 14:11:01 +00:00
|
|
|
static bool is_rtcp(const uint8_t* data, size_t len)
|
2020-03-12 16:24:56 +00:00
|
|
|
{
|
2020-03-14 14:11:01 +00:00
|
|
|
return (len >= 12) && (data[0] & 0x80) && (data[1] >= 200 && data[1] <= 209);
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
static string gen_random_str(int len)
|
|
|
|
{
|
|
|
|
static string random_table = "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
|
|
|
|
|
|
|
|
string ret;
|
|
|
|
ret.reserve(len);
|
|
|
|
for (int i = 0; i < len; ++i) {
|
|
|
|
ret.append(1, random_table[random() % random_table.size()]);
|
|
|
|
}
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
const int SRTP_MASTER_KEY_KEY_LEN = 16;
|
|
|
|
const int SRTP_MASTER_KEY_SALT_LEN = 14;
|
|
|
|
|
2020-03-30 07:16:29 +00:00
|
|
|
static std::vector<std::string> get_candidate_ips()
|
2020-03-07 07:28:15 +00:00
|
|
|
{
|
|
|
|
std::vector<std::string> candidate_ips;
|
|
|
|
|
2020-03-21 13:26:30 +00:00
|
|
|
string candidate = _srs_config->get_rtc_server_candidates();
|
2020-03-07 07:28:15 +00:00
|
|
|
if (candidate == "*" || candidate == "0.0.0.0") {
|
|
|
|
std::vector<std::string> tmp = srs_get_local_ips();
|
2020-03-17 01:16:52 +00:00
|
|
|
for (int i = 0; i < (int)tmp.size(); ++i) {
|
2020-03-07 07:28:15 +00:00
|
|
|
if (tmp[i] != "127.0.0.1") {
|
|
|
|
candidate_ips.push_back(tmp[i]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
candidate_ips.push_back(candidate);
|
|
|
|
}
|
|
|
|
|
|
|
|
return candidate_ips;
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
|
|
|
|
static int cal_rtp_frame_size(const vector<SrsRtpSharedPacket*>& frame, int& frame_size, vector<uint32_t>& nalu_lens)
|
|
|
|
{
|
|
|
|
uint32_t nalu_len = 0;
|
|
|
|
for (size_t n = 0; n < frame.size(); ++n) {
|
|
|
|
SrsRtpH264Header* rtp_h264_header = dynamic_cast<SrsRtpH264Header*>(frame[n]->rtp_payload_header);
|
|
|
|
for (size_t j = 0; j < rtp_h264_header->nalu_offset.size(); ++j) {
|
|
|
|
if (rtp_h264_header->nalu_type != kFuA) {
|
|
|
|
uint8_t* p = reinterpret_cast<uint8_t*>(frame[n]->rtp_payload() + rtp_h264_header->nalu_offset[j].first);
|
|
|
|
if (((p[0] & kNalTypeMask) != SrsAvcNaluTypeAccessUnitDelimiter) &&
|
|
|
|
((p[0] & kNalTypeMask) != SrsAvcNaluTypeSEI) &&
|
|
|
|
((p[0] & kNalTypeMask) != SrsAvcNaluTypeSPS) &&
|
|
|
|
((p[0] & kNalTypeMask) != SrsAvcNaluTypePPS)) {
|
|
|
|
frame_size += rtp_h264_header->nalu_offset[j].second + 4;
|
|
|
|
nalu_lens.push_back(rtp_h264_header->nalu_offset[j].second);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (frame[n]->rtp_payload_header->is_first_packet_of_frame) {
|
|
|
|
frame_size += 5;
|
|
|
|
nalu_len += 1;
|
|
|
|
}
|
|
|
|
frame_size += rtp_h264_header->nalu_offset[j].second;
|
|
|
|
nalu_len += rtp_h264_header->nalu_offset[j].second;
|
|
|
|
|
|
|
|
if (frame[n]->rtp_payload_header->is_last_packet_of_frame) {
|
|
|
|
nalu_lens.push_back(nalu_len);
|
|
|
|
nalu_len = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return frame_size;
|
|
|
|
}
|
2020-04-23 09:08:21 +00:00
|
|
|
|
|
|
|
uint64_t SrsNtp::kMagicNtpFractionalUnit = 1ULL << 32;
|
|
|
|
|
|
|
|
SrsNtp::SrsNtp()
|
|
|
|
{
|
|
|
|
system_ms_ = 0;
|
|
|
|
ntp_ = 0;
|
|
|
|
ntp_second_ = 0;
|
|
|
|
ntp_fractions_ = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsNtp::~SrsNtp()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsNtp SrsNtp::from_time_ms(uint64_t ms)
|
|
|
|
{
|
|
|
|
SrsNtp srs_ntp;
|
|
|
|
srs_ntp.system_ms_ = ms;
|
|
|
|
srs_ntp.ntp_second_ = ms / 1000;
|
|
|
|
srs_ntp.ntp_fractions_ = (static_cast<double>(ms % 1000 / 1000.0)) * kMagicNtpFractionalUnit;
|
|
|
|
srs_ntp.ntp_ = (static_cast<uint64_t>(srs_ntp.ntp_second_) << 32) | srs_ntp.ntp_fractions_;
|
|
|
|
return srs_ntp;
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsNtp SrsNtp::to_time_ms(uint64_t ntp)
|
|
|
|
{
|
|
|
|
SrsNtp srs_ntp;
|
|
|
|
srs_ntp.ntp_ = ntp;
|
|
|
|
srs_ntp.ntp_second_ = (ntp & 0xFFFFFFFF00000000ULL) >> 32;
|
|
|
|
srs_ntp.ntp_fractions_ = (ntp & 0x00000000FFFFFFFFULL);
|
|
|
|
srs_ntp.system_ms_ = (static_cast<uint64_t>(srs_ntp.ntp_second_) * 1000) +
|
|
|
|
(static_cast<double>(static_cast<uint64_t>(srs_ntp.ntp_fractions_) * 1000.0) / kMagicNtpFractionalUnit);
|
|
|
|
return srs_ntp;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2020-03-09 11:46:27 +00:00
|
|
|
SrsDtlsSession::SrsDtlsSession(SrsRtcSession* s)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
2020-03-09 11:46:27 +00:00
|
|
|
rtc_session = s;
|
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
dtls = NULL;
|
|
|
|
bio_in = NULL;
|
|
|
|
bio_out = NULL;
|
|
|
|
|
|
|
|
client_key = "";
|
|
|
|
server_key = "";
|
|
|
|
|
|
|
|
srtp_send = NULL;
|
|
|
|
srtp_recv = NULL;
|
|
|
|
|
|
|
|
handshake_done = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsDtlsSession::~SrsDtlsSession()
|
|
|
|
{
|
2020-03-12 16:24:56 +00:00
|
|
|
if (dtls) {
|
|
|
|
// this function will free bio_in and bio_out
|
|
|
|
SSL_free(dtls);
|
|
|
|
dtls = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (srtp_send) {
|
|
|
|
srtp_dealloc(srtp_send);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (srtp_recv) {
|
|
|
|
srtp_dealloc(srtp_recv);
|
|
|
|
}
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-04-26 08:12:23 +00:00
|
|
|
srs_error_t SrsDtlsSession::initialize(SrsRequest* r)
|
2020-03-30 07:16:29 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-26 08:12:23 +00:00
|
|
|
if ((err = SrsDtls::instance()->init(r)) != srs_success) {
|
2020-04-03 07:03:09 +00:00
|
|
|
return srs_error_wrap(err, "DTLS init");
|
|
|
|
}
|
|
|
|
|
2020-04-03 07:08:52 +00:00
|
|
|
// TODO: FIXME: Support config by vhost to use RSA or ECDSA certificate.
|
2020-03-30 07:16:29 +00:00
|
|
|
if ((dtls = SSL_new(SrsDtls::instance()->get_dtls_ctx())) == NULL) {
|
|
|
|
return srs_error_new(ERROR_OpenSslCreateSSL, "SSL_new dtls");
|
|
|
|
}
|
|
|
|
|
|
|
|
// Dtls setup passive, as server role.
|
|
|
|
SSL_set_accept_state(dtls);
|
|
|
|
|
|
|
|
if ((bio_in = BIO_new(BIO_s_mem())) == NULL) {
|
|
|
|
return srs_error_new(ERROR_OpenSslBIONew, "BIO_new in");
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((bio_out = BIO_new(BIO_s_mem())) == NULL) {
|
|
|
|
BIO_free(bio_in);
|
|
|
|
return srs_error_new(ERROR_OpenSslBIONew, "BIO_new out");
|
|
|
|
}
|
|
|
|
|
|
|
|
SSL_set_bio(dtls, bio_in, bio_out);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsDtlsSession::handshake(SrsUdpMuxSocket* skt)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-09 00:20:55 +00:00
|
|
|
int ret = SSL_do_handshake(dtls);
|
2020-03-06 15:01:48 +00:00
|
|
|
|
|
|
|
unsigned char *out_bio_data;
|
|
|
|
int out_bio_len = BIO_get_mem_data(bio_out, &out_bio_data);
|
|
|
|
|
|
|
|
int ssl_err = SSL_get_error(dtls, ret);
|
|
|
|
switch(ssl_err) {
|
|
|
|
case SSL_ERROR_NONE: {
|
2020-04-10 11:21:47 +00:00
|
|
|
if ((err = on_dtls_handshake_done(skt)) != srs_success) {
|
2020-03-16 14:35:24 +00:00
|
|
|
return srs_error_wrap(err, "dtls handshake done handle");
|
|
|
|
}
|
|
|
|
break;
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
case SSL_ERROR_WANT_READ: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case SSL_ERROR_WANT_WRITE: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
default: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (out_bio_len) {
|
2020-04-10 11:21:47 +00:00
|
|
|
if ((err = skt->sendto(out_bio_data, out_bio_len, 0)) != srs_success) {
|
2020-03-16 14:35:24 +00:00
|
|
|
return srs_error_wrap(err, "send dtls packet");
|
|
|
|
}
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsDtlsSession::on_dtls(SrsUdpMuxSocket* skt)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
2020-04-09 00:20:55 +00:00
|
|
|
if (BIO_reset(bio_in) != 1) {
|
2020-03-16 14:35:24 +00:00
|
|
|
return srs_error_new(ERROR_OpenSslBIOReset, "BIO_reset");
|
|
|
|
}
|
|
|
|
if (BIO_reset(bio_out) != 1) {
|
|
|
|
return srs_error_new(ERROR_OpenSslBIOReset, "BIO_reset");
|
|
|
|
}
|
2020-03-06 15:01:48 +00:00
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
if (BIO_write(bio_in, skt->data(), skt->size()) <= 0) {
|
2020-03-16 14:35:24 +00:00
|
|
|
// TODO: 0 or -1 maybe block, use BIO_should_retry to check.
|
|
|
|
return srs_error_new(ERROR_OpenSslBIOWrite, "BIO_write");
|
|
|
|
}
|
2020-03-06 15:01:48 +00:00
|
|
|
|
2020-03-16 14:35:24 +00:00
|
|
|
if (! handshake_done) {
|
2020-04-10 11:21:47 +00:00
|
|
|
err = handshake(skt);
|
2020-03-16 14:35:24 +00:00
|
|
|
} else {
|
2020-03-06 15:01:48 +00:00
|
|
|
while (BIO_ctrl_pending(bio_in) > 0) {
|
|
|
|
char dtls_read_buf[8092];
|
|
|
|
int nb = SSL_read(dtls, dtls_read_buf, sizeof(dtls_read_buf));
|
|
|
|
|
|
|
|
if (nb > 0) {
|
2020-03-16 14:35:24 +00:00
|
|
|
if ((err =on_dtls_application_data(dtls_read_buf, nb)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "dtls application data process");
|
|
|
|
}
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-09 00:20:55 +00:00
|
|
|
return err;
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsDtlsSession::on_dtls_handshake_done(SrsUdpMuxSocket* skt)
|
2020-03-07 16:30:31 +00:00
|
|
|
{
|
2020-03-09 11:46:27 +00:00
|
|
|
srs_error_t err = srs_success;
|
2020-04-09 06:34:48 +00:00
|
|
|
srs_trace("rtc session=%s, DTLS handshake done.", rtc_session->id().c_str());
|
2020-03-07 16:30:31 +00:00
|
|
|
|
|
|
|
handshake_done = true;
|
2020-03-09 11:46:27 +00:00
|
|
|
if ((err = srtp_initialize()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "srtp init failed");
|
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
return rtc_session->on_connection_established(skt);
|
2020-03-07 16:30:31 +00:00
|
|
|
}
|
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
srs_error_t SrsDtlsSession::on_dtls_application_data(const char* buf, const int nb_buf)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-03-16 14:35:24 +00:00
|
|
|
// TODO: process SCTP protocol(WebRTC datachannel support)
|
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-03-09 11:46:27 +00:00
|
|
|
srs_error_t SrsDtlsSession::srtp_initialize()
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-09 00:20:55 +00:00
|
|
|
unsigned char material[SRTP_MASTER_KEY_LEN * 2] = {0}; // client(SRTP_MASTER_KEY_KEY_LEN + SRTP_MASTER_KEY_SALT_LEN) + server
|
|
|
|
static const string dtls_srtp_lable = "EXTRACTOR-dtls_srtp";
|
|
|
|
if (! SSL_export_keying_material(dtls, material, sizeof(material), dtls_srtp_lable.c_str(), dtls_srtp_lable.size(), NULL, 0, 0)) {
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_INIT, "SSL_export_keying_material failed");
|
2020-04-09 00:20:55 +00:00
|
|
|
}
|
2020-03-06 15:01:48 +00:00
|
|
|
|
2020-04-09 00:20:55 +00:00
|
|
|
size_t offset = 0;
|
2020-03-06 15:01:48 +00:00
|
|
|
|
2020-04-09 00:20:55 +00:00
|
|
|
std::string client_master_key(reinterpret_cast<char*>(material), SRTP_MASTER_KEY_KEY_LEN);
|
|
|
|
offset += SRTP_MASTER_KEY_KEY_LEN;
|
|
|
|
std::string server_master_key(reinterpret_cast<char*>(material + offset), SRTP_MASTER_KEY_KEY_LEN);
|
|
|
|
offset += SRTP_MASTER_KEY_KEY_LEN;
|
|
|
|
std::string client_master_salt(reinterpret_cast<char*>(material + offset), SRTP_MASTER_KEY_SALT_LEN);
|
|
|
|
offset += SRTP_MASTER_KEY_SALT_LEN;
|
|
|
|
std::string server_master_salt(reinterpret_cast<char*>(material + offset), SRTP_MASTER_KEY_SALT_LEN);
|
2020-03-06 15:01:48 +00:00
|
|
|
|
2020-04-09 00:20:55 +00:00
|
|
|
client_key = client_master_key + client_master_salt;
|
|
|
|
server_key = server_master_key + server_master_salt;
|
2020-03-06 15:01:48 +00:00
|
|
|
|
2020-03-17 10:33:05 +00:00
|
|
|
if ((err = srtp_send_init()) != srs_success) {
|
2020-03-12 16:24:56 +00:00
|
|
|
return srs_error_wrap(err, "srtp send init failed");
|
2020-03-07 16:30:31 +00:00
|
|
|
}
|
|
|
|
|
2020-03-17 10:33:05 +00:00
|
|
|
if ((err = srtp_recv_init()) != srs_success) {
|
2020-03-12 16:24:56 +00:00
|
|
|
return srs_error_wrap(err, "srtp recv init failed");
|
2020-03-07 16:30:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-03-12 16:24:56 +00:00
|
|
|
srs_error_t SrsDtlsSession::srtp_send_init()
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
srtp_policy_t policy;
|
|
|
|
bzero(&policy, sizeof(policy));
|
|
|
|
|
2020-04-02 04:28:47 +00:00
|
|
|
// TODO: Maybe we can use SRTP-GCM in future.
|
|
|
|
// @see https://bugs.chromium.org/p/chromium/issues/detail?id=713701
|
|
|
|
// @see https://groups.google.com/forum/#!topic/discuss-webrtc/PvCbWSetVAQ
|
2020-03-06 15:01:48 +00:00
|
|
|
srtp_crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtp);
|
|
|
|
srtp_crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtcp);
|
|
|
|
|
|
|
|
policy.ssrc.type = ssrc_any_outbound;
|
|
|
|
|
|
|
|
policy.ssrc.value = 0;
|
2020-03-07 16:30:31 +00:00
|
|
|
// TODO: adjust window_size
|
|
|
|
policy.window_size = 8192;
|
2020-03-06 15:01:48 +00:00
|
|
|
policy.allow_repeat_tx = 1;
|
|
|
|
policy.next = NULL;
|
|
|
|
|
2020-03-30 07:16:29 +00:00
|
|
|
uint8_t *key = new uint8_t[server_key.size()];
|
|
|
|
memcpy(key, server_key.data(), server_key.size());
|
2020-03-06 15:01:48 +00:00
|
|
|
policy.key = key;
|
|
|
|
|
2020-03-30 07:16:29 +00:00
|
|
|
if (srtp_create(&srtp_send, &policy) != srtp_err_status_ok) {
|
2020-03-12 16:24:56 +00:00
|
|
|
srs_freepa(key);
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_INIT, "srtp_create failed");
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-03-12 16:24:56 +00:00
|
|
|
srs_freepa(key);
|
2020-03-06 15:01:48 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-03-12 16:24:56 +00:00
|
|
|
srs_error_t SrsDtlsSession::srtp_recv_init()
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
srtp_policy_t policy;
|
|
|
|
bzero(&policy, sizeof(policy));
|
|
|
|
|
|
|
|
srtp_crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtp);
|
|
|
|
srtp_crypto_policy_set_aes_cm_128_hmac_sha1_80(&policy.rtcp);
|
|
|
|
|
|
|
|
policy.ssrc.type = ssrc_any_inbound;
|
|
|
|
|
|
|
|
policy.ssrc.value = 0;
|
2020-03-07 16:30:31 +00:00
|
|
|
// TODO: adjust window_size
|
|
|
|
policy.window_size = 8192;
|
2020-03-06 15:01:48 +00:00
|
|
|
policy.allow_repeat_tx = 1;
|
|
|
|
policy.next = NULL;
|
|
|
|
|
2020-03-30 07:16:29 +00:00
|
|
|
uint8_t *key = new uint8_t[client_key.size()];
|
|
|
|
memcpy(key, client_key.data(), client_key.size());
|
2020-03-06 15:01:48 +00:00
|
|
|
policy.key = key;
|
|
|
|
|
2020-03-30 07:16:29 +00:00
|
|
|
if (srtp_create(&srtp_recv, &policy) != srtp_err_status_ok) {
|
2020-03-12 16:24:56 +00:00
|
|
|
srs_freepa(key);
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_INIT, "srtp_create failed");
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-03-12 16:24:56 +00:00
|
|
|
srs_freepa(key);
|
2020-03-06 15:01:48 +00:00
|
|
|
|
2020-03-02 14:47:40 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-03-12 16:24:56 +00:00
|
|
|
srs_error_t SrsDtlsSession::protect_rtp(char* out_buf, const char* in_buf, int& nb_out_buf)
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if (srtp_send) {
|
2020-03-12 16:24:56 +00:00
|
|
|
memcpy(out_buf, in_buf, nb_out_buf);
|
|
|
|
if (srtp_protect(srtp_send, out_buf, &nb_out_buf) != 0) {
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtp protect failed");
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtp protect failed");
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
|
|
|
|
2020-04-13 07:24:41 +00:00
|
|
|
srs_error_t SrsDtlsSession::protect_rtp2(void* rtp_hdr, int* len_ptr)
|
2020-04-11 14:54:44 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if (!srtp_send) {
|
|
|
|
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtp protect");
|
|
|
|
}
|
|
|
|
|
2020-04-13 07:24:41 +00:00
|
|
|
if (srtp_protect(srtp_send, rtp_hdr, len_ptr) != 0) {
|
2020-04-11 14:54:44 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtp protect");
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-03-12 16:24:56 +00:00
|
|
|
srs_error_t SrsDtlsSession::unprotect_rtp(char* out_buf, const char* in_buf, int& nb_out_buf)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if (srtp_recv) {
|
|
|
|
memcpy(out_buf, in_buf, nb_out_buf);
|
|
|
|
if (srtp_unprotect(srtp_recv, out_buf, &nb_out_buf) != 0) {
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_UNPROTECT, "rtp unprotect failed");
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_UNPROTECT, "rtp unprotect failed");
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsDtlsSession::protect_rtcp(char* out_buf, const char* in_buf, int& nb_out_buf)
|
2020-03-10 11:47:49 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if (srtp_send) {
|
2020-03-12 16:24:56 +00:00
|
|
|
memcpy(out_buf, in_buf, nb_out_buf);
|
|
|
|
if (srtp_protect_rtcp(srtp_send, out_buf, &nb_out_buf) != 0) {
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtcp protect failed");
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_PROTECT, "rtcp protect failed");
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsDtlsSession::unprotect_rtcp(char* out_buf, const char* in_buf, int& nb_out_buf)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if (srtp_recv) {
|
|
|
|
memcpy(out_buf, in_buf, nb_out_buf);
|
2020-03-30 07:16:29 +00:00
|
|
|
if (srtp_unprotect_rtcp(srtp_recv, out_buf, &nb_out_buf) != srtp_err_status_ok) {
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_UNPROTECT, "rtcp unprotect failed");
|
2020-03-10 11:47:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_SRTP_UNPROTECT, "rtcp unprotect failed");
|
2020-03-10 11:47:49 +00:00
|
|
|
}
|
|
|
|
|
2020-04-18 12:37:08 +00:00
|
|
|
SrsRtcPackets::SrsRtcPackets(int nn_cache_max)
|
2020-04-13 08:50:24 +00:00
|
|
|
{
|
2020-04-16 01:25:18 +00:00
|
|
|
#if defined(SRS_DEBUG)
|
|
|
|
debug_id = 0;
|
|
|
|
#endif
|
|
|
|
|
2020-04-15 13:59:27 +00:00
|
|
|
use_gso = false;
|
|
|
|
should_merge_nalus = false;
|
2020-04-13 08:50:24 +00:00
|
|
|
|
2020-04-13 09:11:46 +00:00
|
|
|
nn_rtp_pkts = 0;
|
|
|
|
nn_audios = nn_extras = 0;
|
|
|
|
nn_videos = nn_samples = 0;
|
2020-04-17 08:36:56 +00:00
|
|
|
nn_bytes = nn_rtp_bytes = 0;
|
2020-04-16 02:05:17 +00:00
|
|
|
nn_padding_bytes = nn_paddings = 0;
|
2020-04-17 04:30:53 +00:00
|
|
|
nn_dropped = 0;
|
2020-04-15 14:46:06 +00:00
|
|
|
|
|
|
|
cursor = 0;
|
2020-04-18 12:37:08 +00:00
|
|
|
nn_cache = nn_cache_max;
|
2020-04-19 01:32:09 +00:00
|
|
|
// TODO: FIXME: We should allocate a smaller cache, and increase it when exhausted.
|
2020-04-18 12:37:08 +00:00
|
|
|
cache = new SrsRtpPacket2[nn_cache];
|
2020-04-13 08:50:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
SrsRtcPackets::~SrsRtcPackets()
|
|
|
|
{
|
2020-04-18 12:37:08 +00:00
|
|
|
srs_freepa(cache);
|
|
|
|
nn_cache = 0;
|
2020-04-15 13:59:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
void SrsRtcPackets::reset(bool gso, bool merge_nalus)
|
|
|
|
{
|
2020-04-15 14:46:06 +00:00
|
|
|
for (int i = 0; i < cursor; i++) {
|
2020-04-18 12:37:08 +00:00
|
|
|
SrsRtpPacket2* packet = cache + i;
|
2020-04-15 14:46:06 +00:00
|
|
|
packet->reset();
|
2020-04-13 08:50:24 +00:00
|
|
|
}
|
2020-04-16 01:07:42 +00:00
|
|
|
|
2020-04-16 01:25:18 +00:00
|
|
|
#if defined(SRS_DEBUG)
|
|
|
|
debug_id++;
|
|
|
|
#endif
|
|
|
|
|
2020-04-13 15:40:30 +00:00
|
|
|
use_gso = gso;
|
2020-04-13 08:50:24 +00:00
|
|
|
should_merge_nalus = merge_nalus;
|
|
|
|
|
2020-04-13 09:11:46 +00:00
|
|
|
nn_rtp_pkts = 0;
|
|
|
|
nn_audios = nn_extras = 0;
|
|
|
|
nn_videos = nn_samples = 0;
|
2020-04-17 08:36:56 +00:00
|
|
|
nn_bytes = nn_rtp_bytes = 0;
|
2020-04-16 02:05:17 +00:00
|
|
|
nn_padding_bytes = nn_paddings = 0;
|
2020-04-17 04:30:53 +00:00
|
|
|
nn_dropped = 0;
|
2020-04-15 14:46:06 +00:00
|
|
|
|
|
|
|
cursor = 0;
|
2020-04-13 08:50:24 +00:00
|
|
|
}
|
|
|
|
|
2020-04-15 14:46:06 +00:00
|
|
|
SrsRtpPacket2* SrsRtcPackets::fetch()
|
2020-04-13 08:50:24 +00:00
|
|
|
{
|
2020-04-18 12:37:08 +00:00
|
|
|
if (cursor >= nn_cache) {
|
|
|
|
return NULL;
|
2020-04-13 08:50:24 +00:00
|
|
|
}
|
2020-04-18 12:37:08 +00:00
|
|
|
return cache + (cursor++);
|
2020-04-15 14:46:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
SrsRtpPacket2* SrsRtcPackets::back()
|
|
|
|
{
|
|
|
|
srs_assert(cursor > 0);
|
2020-04-18 12:37:08 +00:00
|
|
|
return cache + cursor - 1;
|
2020-04-15 14:46:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
int SrsRtcPackets::size()
|
|
|
|
{
|
|
|
|
return cursor;
|
|
|
|
}
|
|
|
|
|
2020-04-16 04:35:36 +00:00
|
|
|
int SrsRtcPackets::capacity()
|
|
|
|
{
|
2020-04-18 12:37:08 +00:00
|
|
|
return nn_cache;
|
2020-04-16 04:35:36 +00:00
|
|
|
}
|
|
|
|
|
2020-04-15 14:46:06 +00:00
|
|
|
SrsRtpPacket2* SrsRtcPackets::at(int index)
|
|
|
|
{
|
|
|
|
srs_assert(index < cursor);
|
2020-04-18 12:37:08 +00:00
|
|
|
return cache + index;
|
2020-04-13 08:50:24 +00:00
|
|
|
}
|
|
|
|
|
2020-03-12 16:24:56 +00:00
|
|
|
SrsRtcSenderThread::SrsRtcSenderThread(SrsRtcSession* s, SrsUdpMuxSocket* u, int parent_cid)
|
2020-03-22 08:54:31 +00:00
|
|
|
: sendonly_ukt(NULL)
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
|
|
|
_parent_cid = parent_cid;
|
|
|
|
trd = new SrsDummyCoroutine();
|
|
|
|
|
|
|
|
rtc_session = s;
|
2020-03-22 08:54:31 +00:00
|
|
|
sendonly_ukt = u->copy_sendonly();
|
2020-04-16 11:33:10 +00:00
|
|
|
sender = u->sender();
|
|
|
|
|
2020-04-13 08:50:24 +00:00
|
|
|
gso = false;
|
|
|
|
merge_nalus = false;
|
2020-04-15 07:58:17 +00:00
|
|
|
max_padding = 0;
|
2020-04-11 09:52:14 +00:00
|
|
|
|
2020-04-11 10:39:46 +00:00
|
|
|
audio_timestamp = 0;
|
|
|
|
audio_sequence = 0;
|
2020-04-11 13:03:37 +00:00
|
|
|
|
|
|
|
video_sequence = 0;
|
2020-04-13 08:50:24 +00:00
|
|
|
|
2020-04-18 02:04:45 +00:00
|
|
|
mw_sleep = 0;
|
|
|
|
mw_msgs = 0;
|
|
|
|
realtime = true;
|
|
|
|
|
2020-04-13 08:50:24 +00:00
|
|
|
_srs_config->subscribe(this);
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
SrsRtcSenderThread::~SrsRtcSenderThread()
|
|
|
|
{
|
2020-04-13 08:50:24 +00:00
|
|
|
_srs_config->unsubscribe(this);
|
|
|
|
|
2020-03-09 11:46:27 +00:00
|
|
|
srs_freep(trd);
|
2020-03-22 08:54:31 +00:00
|
|
|
srs_freep(sendonly_ukt);
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
|
|
|
|
2020-03-30 07:16:29 +00:00
|
|
|
srs_error_t SrsRtcSenderThread::initialize(const uint32_t& vssrc, const uint32_t& assrc, const uint16_t& v_pt, const uint16_t& a_pt)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
video_ssrc = vssrc;
|
|
|
|
audio_ssrc = assrc;
|
|
|
|
|
|
|
|
video_payload_type = v_pt;
|
|
|
|
audio_payload_type = a_pt;
|
|
|
|
|
2020-04-13 08:50:24 +00:00
|
|
|
gso = _srs_config->get_rtc_server_gso();
|
|
|
|
merge_nalus = _srs_config->get_rtc_server_merge_nalus();
|
2020-04-15 07:58:17 +00:00
|
|
|
max_padding = _srs_config->get_rtc_server_padding();
|
|
|
|
srs_trace("RTC sender video(ssrc=%d, pt=%d), audio(ssrc=%d, pt=%d), package(gso=%d, merge_nalus=%d), padding=%d",
|
|
|
|
video_ssrc, video_payload_type, audio_ssrc, audio_payload_type, gso, merge_nalus, max_padding);
|
2020-04-13 08:50:24 +00:00
|
|
|
|
2020-03-30 07:16:29 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-13 08:50:24 +00:00
|
|
|
srs_error_t SrsRtcSenderThread::on_reload_rtc_server()
|
|
|
|
{
|
2020-04-18 02:04:45 +00:00
|
|
|
gso = _srs_config->get_rtc_server_gso();
|
|
|
|
merge_nalus = _srs_config->get_rtc_server_merge_nalus();
|
|
|
|
max_padding = _srs_config->get_rtc_server_padding();
|
2020-04-13 08:50:24 +00:00
|
|
|
|
2020-04-18 02:04:45 +00:00
|
|
|
srs_trace("Reload rtc_server gso=%d, merge_nalus=%d, max_padding=%d", gso, merge_nalus, max_padding);
|
2020-04-13 08:50:24 +00:00
|
|
|
|
2020-04-18 02:04:45 +00:00
|
|
|
return srs_success;
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsRtcSenderThread::on_reload_vhost_play(string vhost)
|
|
|
|
{
|
2020-04-26 08:12:23 +00:00
|
|
|
SrsRequest* req = rtc_session->req;
|
2020-04-18 02:04:45 +00:00
|
|
|
|
|
|
|
if (req->vhost != vhost) {
|
|
|
|
return srs_success;
|
2020-04-13 08:50:24 +00:00
|
|
|
}
|
|
|
|
|
2020-04-18 02:04:45 +00:00
|
|
|
realtime = _srs_config->get_realtime_enabled(req->vhost, true);
|
|
|
|
mw_msgs = _srs_config->get_mw_msgs(req->vhost, realtime, true);
|
|
|
|
mw_sleep = _srs_config->get_mw_sleep(req->vhost, true);
|
|
|
|
|
|
|
|
srs_trace("Reload play realtime=%d, mw_msgs=%d, mw_sleep=%d", realtime, mw_msgs, mw_sleep);
|
|
|
|
|
2020-04-13 08:50:24 +00:00
|
|
|
return srs_success;
|
|
|
|
}
|
|
|
|
|
2020-04-18 02:04:45 +00:00
|
|
|
srs_error_t SrsRtcSenderThread::on_reload_vhost_realtime(string vhost)
|
|
|
|
{
|
|
|
|
return on_reload_vhost_play(vhost);
|
|
|
|
}
|
|
|
|
|
2020-03-09 11:46:27 +00:00
|
|
|
int SrsRtcSenderThread::cid()
|
|
|
|
{
|
|
|
|
return trd->cid();
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsRtcSenderThread::start()
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
srs_freep(trd);
|
2020-03-12 16:24:56 +00:00
|
|
|
trd = new SrsSTCoroutine("rtc_sender", this, _parent_cid);
|
2020-03-09 11:46:27 +00:00
|
|
|
|
|
|
|
if ((err = trd->start()) != srs_success) {
|
2020-03-12 16:24:56 +00:00
|
|
|
return srs_error_wrap(err, "rtc_sender");
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
void SrsRtcSenderThread::stop()
|
|
|
|
{
|
|
|
|
trd->stop();
|
|
|
|
}
|
|
|
|
|
|
|
|
void SrsRtcSenderThread::stop_loop()
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
2020-03-09 11:46:27 +00:00
|
|
|
trd->interrupt();
|
|
|
|
}
|
|
|
|
|
2020-04-13 05:58:34 +00:00
|
|
|
void SrsRtcSenderThread::update_sendonly_socket(SrsUdpMuxSocket* skt)
|
|
|
|
{
|
|
|
|
srs_trace("session %s address changed, update %s -> %s",
|
|
|
|
rtc_session->id().c_str(), sendonly_ukt->get_peer_id().c_str(), skt->get_peer_id().c_str());
|
|
|
|
|
|
|
|
srs_freep(sendonly_ukt);
|
|
|
|
sendonly_ukt = skt->copy_sendonly();
|
2020-04-16 11:33:10 +00:00
|
|
|
sender = skt->sender();
|
2020-04-13 05:58:34 +00:00
|
|
|
}
|
2020-03-09 11:46:27 +00:00
|
|
|
|
|
|
|
srs_error_t SrsRtcSenderThread::cycle()
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-09 00:20:55 +00:00
|
|
|
SrsSource* source = NULL;
|
2020-04-26 08:12:23 +00:00
|
|
|
SrsRequest* req = rtc_session->req;
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-03-17 09:56:37 +00:00
|
|
|
// TODO: FIXME: Should refactor it, directly use http server as handler.
|
|
|
|
ISrsSourceHandler* handler = _srs_hybrid->srs()->instance();
|
2020-04-18 02:35:30 +00:00
|
|
|
if ((err = _srs_sources->fetch_or_create(req, handler, &source)) != srs_success) {
|
2020-03-09 11:46:27 +00:00
|
|
|
return srs_error_wrap(err, "rtc fetch source failed");
|
|
|
|
}
|
|
|
|
|
2020-04-09 00:20:55 +00:00
|
|
|
SrsConsumer* consumer = NULL;
|
2020-04-04 07:36:35 +00:00
|
|
|
SrsAutoFree(SrsConsumer, consumer);
|
2020-03-17 10:33:05 +00:00
|
|
|
if ((err = source->create_consumer(NULL, consumer)) != srs_success) {
|
2020-04-18 02:35:30 +00:00
|
|
|
return srs_error_wrap(err, "rtc create consumer, source url=%s", req->get_stream_url().c_str());
|
2020-03-17 10:24:28 +00:00
|
|
|
}
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-04-18 12:37:08 +00:00
|
|
|
// For RTC, we enable pass-timestamp mode, ignore the timestamp in queue, never depends on the duration,
|
|
|
|
// because RTC allows the audio and video has its own timebase, that is the audio timestamp and video timestamp
|
|
|
|
// maybe not monotonically increase.
|
|
|
|
// In this mode, we use mw_msgs to set the delay. We never shrink the consumer queue, instead, we dumps the
|
|
|
|
// messages and drop them if the shared sender queue is full.
|
|
|
|
consumer->enable_pass_timestamp();
|
|
|
|
|
2020-04-18 02:04:45 +00:00
|
|
|
realtime = _srs_config->get_realtime_enabled(req->vhost, true);
|
|
|
|
mw_sleep = _srs_config->get_mw_sleep(req->vhost, true);
|
|
|
|
mw_msgs = _srs_config->get_mw_msgs(req->vhost, realtime, true);
|
|
|
|
|
2020-04-18 02:35:30 +00:00
|
|
|
// We merged write more messages, so we need larger queue.
|
|
|
|
if (mw_msgs > 2) {
|
|
|
|
sender->set_extra_ratio(150);
|
|
|
|
} else if (mw_msgs > 0) {
|
|
|
|
sender->set_extra_ratio(80);
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_trace("RTC source url=%s, source_id=[%d][%d], encrypt=%d, realtime=%d, mw_sleep=%dms, mw_msgs=%d", req->get_stream_url().c_str(),
|
2020-04-18 02:04:45 +00:00
|
|
|
::getpid(), source->source_id(), rtc_session->encrypt, realtime, srsu2msi(mw_sleep), mw_msgs);
|
2020-04-04 07:36:35 +00:00
|
|
|
|
|
|
|
SrsMessageArray msgs(SRS_PERF_MW_MSGS);
|
2020-04-18 12:37:08 +00:00
|
|
|
SrsRtcPackets pkts(SRS_PERF_RTC_RTP_PACKETS);
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-04-08 15:24:59 +00:00
|
|
|
SrsPithyPrint* pprint = SrsPithyPrint::create_rtc_play();
|
|
|
|
SrsAutoFree(SrsPithyPrint, pprint);
|
|
|
|
|
2020-04-09 06:34:48 +00:00
|
|
|
srs_trace("rtc session=%s, start play", rtc_session->id().c_str());
|
2020-04-16 10:37:37 +00:00
|
|
|
bool stat_enabled = _srs_config->get_rtc_server_perf_stat();
|
2020-04-14 05:47:23 +00:00
|
|
|
SrsStatistic* stat = SrsStatistic::instance();
|
2020-04-09 06:34:48 +00:00
|
|
|
|
2020-03-09 11:46:27 +00:00
|
|
|
while (true) {
|
2020-04-09 00:20:55 +00:00
|
|
|
if ((err = trd->pull()) != srs_success) {
|
2020-03-12 16:24:56 +00:00
|
|
|
return srs_error_wrap(err, "rtc sender thread");
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef SRS_PERF_QUEUE_COND_WAIT
|
2020-04-18 00:33:35 +00:00
|
|
|
// Wait for amount of messages or a duration.
|
2020-04-18 02:04:45 +00:00
|
|
|
consumer->wait(mw_msgs, mw_sleep);
|
2020-03-12 16:24:56 +00:00
|
|
|
#endif
|
|
|
|
|
2020-04-18 00:33:35 +00:00
|
|
|
// Try to read some messages.
|
2020-03-09 11:46:27 +00:00
|
|
|
int msg_count = 0;
|
2020-03-17 10:33:05 +00:00
|
|
|
if ((err = consumer->dump_packets(&msgs, msg_count)) != srs_success) {
|
2020-03-09 11:46:27 +00:00
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2020-04-16 10:52:17 +00:00
|
|
|
if (msg_count <= 0) {
|
2020-03-12 16:24:56 +00:00
|
|
|
#ifndef SRS_PERF_QUEUE_COND_WAIT
|
|
|
|
srs_usleep(mw_sleep);
|
|
|
|
#endif
|
|
|
|
continue;
|
|
|
|
}
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-04-15 13:59:27 +00:00
|
|
|
// Transmux and send out messages.
|
|
|
|
pkts.reset(gso, merge_nalus);
|
|
|
|
|
2020-04-16 11:33:10 +00:00
|
|
|
if ((err = send_messages(source, msgs.msgs, msg_count, pkts)) != srs_success) {
|
2020-04-11 13:03:37 +00:00
|
|
|
srs_warn("send err %s", srs_error_summary(err).c_str()); srs_error_reset(err);
|
|
|
|
}
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-04-15 13:59:27 +00:00
|
|
|
// Do cleanup messages.
|
2020-04-11 13:03:37 +00:00
|
|
|
for (int i = 0; i < msg_count; i++) {
|
|
|
|
SrsSharedPtrMessage* msg = msgs.msgs[i];
|
|
|
|
srs_freep(msg);
|
|
|
|
}
|
2020-03-22 08:54:31 +00:00
|
|
|
|
2020-04-16 10:37:37 +00:00
|
|
|
// Stat for performance analysis.
|
2020-04-18 12:37:08 +00:00
|
|
|
if (!stat_enabled) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2020-04-14 13:49:49 +00:00
|
|
|
// Stat the original RAW AV frame, maybe h264+aac.
|
|
|
|
stat->perf_on_msgs(msg_count);
|
|
|
|
// Stat the RTC packets, RAW AV frame, maybe h.264+opus.
|
2020-04-14 23:10:41 +00:00
|
|
|
int nn_rtc_packets = srs_max(pkts.nn_audios, pkts.nn_extras) + pkts.nn_videos;
|
|
|
|
stat->perf_on_rtc_packets(nn_rtc_packets);
|
2020-04-14 13:49:49 +00:00
|
|
|
// Stat the RAW RTP packets, which maybe group by GSO.
|
2020-04-18 12:37:08 +00:00
|
|
|
stat->perf_on_rtp_packets(pkts.size());
|
2020-04-14 13:49:49 +00:00
|
|
|
// Stat the RTP packets going into kernel.
|
2020-04-14 22:44:09 +00:00
|
|
|
stat->perf_on_gso_packets(pkts.nn_rtp_pkts);
|
2020-04-18 12:37:08 +00:00
|
|
|
// Stat the bytes and paddings.
|
|
|
|
stat->perf_on_rtc_bytes(pkts.nn_bytes, pkts.nn_rtp_bytes, pkts.nn_padding_bytes);
|
|
|
|
// Stat the messages and dropped count.
|
|
|
|
stat->perf_on_dropped(msg_count, nn_rtc_packets, pkts.nn_dropped);
|
2020-04-17 08:36:56 +00:00
|
|
|
|
2020-04-14 23:10:41 +00:00
|
|
|
#if defined(SRS_DEBUG)
|
2020-04-18 12:37:08 +00:00
|
|
|
srs_trace("RTC PLAY perf, msgs %d/%d, rtp %d, gso %d, %d audios, %d extras, %d videos, %d samples, %d/%d/%d bytes",
|
|
|
|
msg_count, nn_rtc_packets, pkts.size(), pkts.nn_rtp_pkts, pkts.nn_audios, pkts.nn_extras, pkts.nn_videos,
|
|
|
|
pkts.nn_samples, pkts.nn_bytes, pkts.nn_rtp_bytes, pkts.nn_padding_bytes);
|
2020-04-14 23:10:41 +00:00
|
|
|
#endif
|
2020-04-14 05:47:23 +00:00
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
pprint->elapse();
|
|
|
|
if (pprint->can_print()) {
|
|
|
|
// TODO: FIXME: Print stat like frame/s, packet/s, loss_packets.
|
2020-04-17 08:36:56 +00:00
|
|
|
srs_trace("-> RTC PLAY %d/%d msgs, %d/%d packets, %d audios, %d extras, %d videos, %d samples, %d/%d/%d bytes, %d pad, %d/%d cache",
|
2020-04-17 04:30:53 +00:00
|
|
|
msg_count, pkts.nn_dropped, pkts.size(), pkts.nn_rtp_pkts, pkts.nn_audios, pkts.nn_extras, pkts.nn_videos, pkts.nn_samples, pkts.nn_bytes,
|
2020-04-17 08:36:56 +00:00
|
|
|
pkts.nn_rtp_bytes, pkts.nn_padding_bytes, pkts.nn_paddings, pkts.size(), pkts.capacity());
|
2020-04-10 11:21:47 +00:00
|
|
|
}
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
2020-03-22 08:54:31 +00:00
|
|
|
}
|
|
|
|
|
2020-04-11 13:03:37 +00:00
|
|
|
srs_error_t SrsRtcSenderThread::send_messages(
|
2020-04-16 11:33:10 +00:00
|
|
|
SrsSource* source, SrsSharedPtrMessage** msgs, int nb_msgs, SrsRtcPackets& packets
|
2020-04-11 13:03:37 +00:00
|
|
|
) {
|
2020-03-18 10:12:37 +00:00
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-17 04:30:53 +00:00
|
|
|
// If DTLS is not OK, drop all messages.
|
2020-04-09 11:38:50 +00:00
|
|
|
if (!rtc_session->dtls_session) {
|
2020-04-11 13:03:37 +00:00
|
|
|
return err;
|
2020-04-09 11:38:50 +00:00
|
|
|
}
|
2020-03-18 10:12:37 +00:00
|
|
|
|
2020-04-13 05:58:34 +00:00
|
|
|
// Covert kernel messages to RTP packets.
|
2020-04-13 07:24:41 +00:00
|
|
|
if ((err = messages_to_packets(source, msgs, nb_msgs, packets)) != srs_success) {
|
2020-04-13 15:40:30 +00:00
|
|
|
return srs_error_wrap(err, "messages to packets");
|
2020-04-13 07:24:41 +00:00
|
|
|
}
|
|
|
|
|
2020-04-13 15:40:30 +00:00
|
|
|
#ifndef SRS_AUTO_OSX
|
|
|
|
// If enabled GSO, send out some packets in a msghdr.
|
|
|
|
if (packets.use_gso) {
|
2020-04-16 11:33:10 +00:00
|
|
|
if ((err = send_packets_gso(packets)) != srs_success) {
|
2020-04-13 15:40:30 +00:00
|
|
|
return srs_error_wrap(err, "gso send");
|
|
|
|
}
|
2020-04-13 08:50:24 +00:00
|
|
|
return err;
|
2020-04-13 07:24:41 +00:00
|
|
|
}
|
2020-04-13 15:40:30 +00:00
|
|
|
#endif
|
|
|
|
|
|
|
|
// By default, we send packets by sendmmsg.
|
2020-04-16 11:33:10 +00:00
|
|
|
if ((err = send_packets(packets)) != srs_success) {
|
2020-04-13 15:40:30 +00:00
|
|
|
return srs_error_wrap(err, "raw send");
|
|
|
|
}
|
2020-04-13 07:24:41 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsRtcSenderThread::messages_to_packets(
|
2020-04-13 08:50:24 +00:00
|
|
|
SrsSource* source, SrsSharedPtrMessage** msgs, int nb_msgs, SrsRtcPackets& packets
|
2020-04-13 07:24:41 +00:00
|
|
|
) {
|
|
|
|
srs_error_t err = srs_success;
|
2020-04-09 01:56:13 +00:00
|
|
|
|
2020-04-09 00:20:55 +00:00
|
|
|
for (int i = 0; i < nb_msgs; i++) {
|
2020-03-12 16:24:56 +00:00
|
|
|
SrsSharedPtrMessage* msg = msgs[i];
|
2020-04-11 09:52:14 +00:00
|
|
|
|
2020-04-17 04:30:53 +00:00
|
|
|
// If overflow, drop all messages.
|
|
|
|
if (sender->overflow()) {
|
|
|
|
packets.nn_dropped += nb_msgs - i;
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-13 09:11:46 +00:00
|
|
|
// Update stats.
|
2020-04-13 08:50:24 +00:00
|
|
|
packets.nn_bytes += msg->size;
|
|
|
|
|
2020-04-13 09:11:46 +00:00
|
|
|
int nn_extra_payloads = msg->nn_extra_payloads();
|
|
|
|
packets.nn_extras += nn_extra_payloads;
|
|
|
|
|
|
|
|
int nn_samples = msg->nn_samples();
|
|
|
|
packets.nn_samples += nn_samples;
|
|
|
|
|
|
|
|
// For audio, we transcoded AAC to opus in extra payloads.
|
2020-04-13 05:58:34 +00:00
|
|
|
if (msg->is_audio()) {
|
2020-04-13 08:50:24 +00:00
|
|
|
packets.nn_audios++;
|
|
|
|
|
2020-04-13 09:11:46 +00:00
|
|
|
for (int i = 0; i < nn_extra_payloads; i++) {
|
2020-04-11 09:52:14 +00:00
|
|
|
SrsSample* sample = msg->extra_payloads() + i;
|
2020-04-17 10:04:52 +00:00
|
|
|
if ((err = packet_opus(sample, packets, msg->nn_max_extra_payloads())) != srs_success) {
|
2020-04-11 13:03:37 +00:00
|
|
|
return srs_error_wrap(err, "opus package");
|
2020-04-11 09:52:14 +00:00
|
|
|
}
|
2020-03-18 10:12:37 +00:00
|
|
|
}
|
2020-04-13 05:58:34 +00:00
|
|
|
continue;
|
|
|
|
}
|
2020-03-18 10:12:37 +00:00
|
|
|
|
2020-04-13 09:11:46 +00:00
|
|
|
// For video, we should process all NALUs in samples.
|
2020-04-13 08:50:24 +00:00
|
|
|
packets.nn_videos++;
|
|
|
|
|
2020-04-13 05:58:34 +00:00
|
|
|
// Well, for each IDR, we append a SPS/PPS before it, which is packaged in STAP-A.
|
|
|
|
if (msg->has_idr()) {
|
2020-04-15 14:46:06 +00:00
|
|
|
if ((err = packet_stap_a(source, msg, packets)) != srs_success) {
|
2020-04-13 05:58:34 +00:00
|
|
|
return srs_error_wrap(err, "packet stap-a");
|
2020-03-30 07:16:29 +00:00
|
|
|
}
|
2020-04-13 05:58:34 +00:00
|
|
|
}
|
2020-04-11 17:13:31 +00:00
|
|
|
|
2020-04-13 09:11:46 +00:00
|
|
|
// If merge Nalus, we pcakges all NALUs(samples) as one NALU, in a RTP or FUA packet.
|
|
|
|
if (packets.should_merge_nalus && nn_samples > 1) {
|
|
|
|
if ((err = packet_nalus(msg, packets)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "packet stap-a");
|
|
|
|
}
|
|
|
|
continue;
|
2020-04-13 05:58:34 +00:00
|
|
|
}
|
2020-03-30 07:16:29 +00:00
|
|
|
|
2020-04-13 09:11:46 +00:00
|
|
|
// By default, we package each NALU(sample) to a RTP or FUA packet.
|
2020-04-13 11:23:17 +00:00
|
|
|
for (int i = 0; i < nn_samples; i++) {
|
2020-04-13 05:58:34 +00:00
|
|
|
SrsSample* sample = msg->samples() + i;
|
2020-04-11 17:13:31 +00:00
|
|
|
|
2020-04-13 05:58:34 +00:00
|
|
|
// We always ignore bframe here, if config to discard bframe,
|
|
|
|
// the bframe flag will not be set.
|
|
|
|
if (sample->bframe) {
|
|
|
|
continue;
|
2020-03-30 07:16:29 +00:00
|
|
|
}
|
|
|
|
|
2020-04-13 05:58:34 +00:00
|
|
|
if (sample->size <= kRtpMaxPayloadSize) {
|
2020-04-15 14:46:06 +00:00
|
|
|
if ((err = packet_single_nalu(msg, sample, packets)) != srs_success) {
|
2020-04-13 05:58:34 +00:00
|
|
|
return srs_error_wrap(err, "packet single nalu");
|
2020-04-07 08:05:31 +00:00
|
|
|
}
|
|
|
|
} else {
|
2020-04-13 05:58:34 +00:00
|
|
|
if ((err = packet_fu_a(msg, sample, kRtpMaxPayloadSize, packets)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "packet fu-a");
|
2020-04-11 13:03:37 +00:00
|
|
|
}
|
2020-04-13 09:11:46 +00:00
|
|
|
}
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-13 09:11:46 +00:00
|
|
|
if (i == nn_samples - 1) {
|
2020-04-15 14:46:06 +00:00
|
|
|
packets.back()->rtp_header.set_marker(true);
|
2020-03-18 10:12:37 +00:00
|
|
|
}
|
2020-04-13 05:58:34 +00:00
|
|
|
}
|
|
|
|
}
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-04-11 13:03:37 +00:00
|
|
|
return err;
|
2020-04-09 11:38:50 +00:00
|
|
|
}
|
2020-03-11 11:21:44 +00:00
|
|
|
|
2020-04-16 11:33:10 +00:00
|
|
|
srs_error_t SrsRtcSenderThread::send_packets(SrsRtcPackets& packets)
|
2020-04-09 11:38:50 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-17 05:02:54 +00:00
|
|
|
// Cache the encrypt flag.
|
|
|
|
bool encrypt = rtc_session->encrypt;
|
2020-04-13 15:40:30 +00:00
|
|
|
|
2020-04-15 14:46:06 +00:00
|
|
|
int nn_packets = packets.size();
|
|
|
|
for (int i = 0; i < nn_packets; i++) {
|
|
|
|
SrsRtpPacket2* packet = packets.at(i);
|
2020-04-13 15:40:30 +00:00
|
|
|
|
2020-04-13 07:37:32 +00:00
|
|
|
// Fetch a cached message from queue.
|
|
|
|
// TODO: FIXME: Maybe encrypt in async, so the state of mhdr maybe not ready.
|
|
|
|
mmsghdr* mhdr = NULL;
|
|
|
|
if ((err = sender->fetch(&mhdr)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "fetch msghdr");
|
|
|
|
}
|
|
|
|
|
2020-04-16 23:10:16 +00:00
|
|
|
// For this message, select the first iovec.
|
|
|
|
iovec* iov = mhdr->msg_hdr.msg_iov;
|
|
|
|
mhdr->msg_hdr.msg_iovlen = 1;
|
2020-04-15 14:46:06 +00:00
|
|
|
|
2020-04-16 23:10:16 +00:00
|
|
|
if (!iov->iov_base) {
|
|
|
|
iov->iov_base = new char[kRtpPacketSize];
|
2020-04-15 14:46:06 +00:00
|
|
|
}
|
2020-04-16 23:10:16 +00:00
|
|
|
iov->iov_len = kRtpPacketSize;
|
2020-04-15 14:46:06 +00:00
|
|
|
|
2020-04-16 23:10:16 +00:00
|
|
|
// Marshal packet to bytes in iovec.
|
2020-04-13 07:37:32 +00:00
|
|
|
if (true) {
|
2020-04-16 23:10:16 +00:00
|
|
|
SrsBuffer stream((char*)iov->iov_base, iov->iov_len);
|
2020-04-13 07:37:32 +00:00
|
|
|
if ((err = packet->encode(&stream)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "encode packet");
|
|
|
|
}
|
2020-04-16 23:10:16 +00:00
|
|
|
iov->iov_len = stream.pos();
|
2020-04-11 14:54:44 +00:00
|
|
|
}
|
2020-04-11 09:52:14 +00:00
|
|
|
|
2020-04-13 07:37:32 +00:00
|
|
|
// Whether encrypt the RTP bytes.
|
2020-04-17 05:02:54 +00:00
|
|
|
if (encrypt) {
|
2020-04-16 23:10:16 +00:00
|
|
|
int nn_encrypt = (int)iov->iov_len;
|
|
|
|
if ((err = rtc_session->dtls_session->protect_rtp2(iov->iov_base, &nn_encrypt)) != srs_success) {
|
2020-04-13 07:37:32 +00:00
|
|
|
return srs_error_wrap(err, "srtp protect");
|
|
|
|
}
|
2020-04-16 23:10:16 +00:00
|
|
|
iov->iov_len = (size_t)nn_encrypt;
|
2020-04-13 07:24:41 +00:00
|
|
|
}
|
|
|
|
|
2020-04-17 08:36:56 +00:00
|
|
|
packets.nn_rtp_bytes += (int)iov->iov_len;
|
|
|
|
|
2020-04-16 23:10:16 +00:00
|
|
|
// Set the address and control information.
|
2020-04-16 11:33:10 +00:00
|
|
|
sockaddr_in* addr = (sockaddr_in*)sendonly_ukt->peer_addr();
|
|
|
|
socklen_t addrlen = (socklen_t)sendonly_ukt->peer_addrlen();
|
2020-04-11 14:54:44 +00:00
|
|
|
|
2020-04-13 07:37:32 +00:00
|
|
|
mhdr->msg_hdr.msg_name = (sockaddr_in*)addr;
|
|
|
|
mhdr->msg_hdr.msg_namelen = (socklen_t)addrlen;
|
2020-04-14 02:58:53 +00:00
|
|
|
mhdr->msg_hdr.msg_controllen = 0;
|
2020-04-11 14:54:44 +00:00
|
|
|
|
2020-04-14 12:12:14 +00:00
|
|
|
// When we send out a packet, we commit a RTP packet.
|
|
|
|
packets.nn_rtp_pkts++;
|
|
|
|
|
2020-04-13 07:37:32 +00:00
|
|
|
if ((err = sender->sendmmsg(mhdr)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "send msghdr");
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
|
|
|
}
|
2020-04-11 13:03:37 +00:00
|
|
|
|
|
|
|
return err;
|
2020-04-09 11:38:50 +00:00
|
|
|
}
|
2020-03-09 11:46:27 +00:00
|
|
|
|
2020-04-13 15:40:30 +00:00
|
|
|
// TODO: FIXME: We can gather and pad audios, because they have similar size.
|
2020-04-16 11:33:10 +00:00
|
|
|
srs_error_t SrsRtcSenderThread::send_packets_gso(SrsRtcPackets& packets)
|
2020-04-09 11:38:50 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-17 05:02:54 +00:00
|
|
|
// Cache the encrypt flag.
|
|
|
|
bool encrypt = rtc_session->encrypt;
|
|
|
|
|
2020-04-13 15:40:30 +00:00
|
|
|
// Previous handler, if has the same size, we can use GSO.
|
|
|
|
mmsghdr* gso_mhdr = NULL; int gso_size = 0; int gso_encrypt = 0; int gso_cursor = 0;
|
|
|
|
// GSO, N packets has same length, the final one may not.
|
2020-04-16 04:18:52 +00:00
|
|
|
bool using_gso = false; bool gso_final = false;
|
2020-04-16 23:58:11 +00:00
|
|
|
// The message will marshal in iovec.
|
|
|
|
iovec* iov = NULL;
|
2020-04-13 15:40:30 +00:00
|
|
|
|
2020-04-15 14:46:06 +00:00
|
|
|
int nn_packets = packets.size();
|
2020-04-13 15:40:30 +00:00
|
|
|
for (int i = 0; i < nn_packets; i++) {
|
2020-04-15 14:46:06 +00:00
|
|
|
SrsRtpPacket2* packet = packets.at(i);
|
2020-04-15 07:58:17 +00:00
|
|
|
int nn_packet = packet->nb_bytes();
|
2020-04-16 03:22:25 +00:00
|
|
|
int padding = 0;
|
2020-04-13 15:40:30 +00:00
|
|
|
|
2020-04-15 07:58:17 +00:00
|
|
|
SrsRtpPacket2* next_packet = NULL;
|
|
|
|
int nn_next_packet = 0;
|
2020-04-17 02:42:04 +00:00
|
|
|
if (max_padding > 0) {
|
|
|
|
if (i < nn_packets - 1) {
|
|
|
|
next_packet = (i < nn_packets - 1)? packets.at(i + 1):NULL;
|
|
|
|
nn_next_packet = next_packet? next_packet->nb_bytes() : 0;
|
|
|
|
}
|
2020-04-13 15:40:30 +00:00
|
|
|
|
2020-04-17 02:42:04 +00:00
|
|
|
// Padding the packet to next or GSO size.
|
|
|
|
if (next_packet) {
|
|
|
|
if (!using_gso) {
|
|
|
|
// Padding to the next packet to merge with it.
|
|
|
|
if (nn_next_packet > nn_packet) {
|
|
|
|
padding = nn_next_packet - nn_packet;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// Padding to GSO size for next one to merge with us.
|
|
|
|
if (nn_next_packet < gso_size) {
|
|
|
|
padding = gso_size - nn_packet;
|
|
|
|
}
|
2020-04-16 02:58:20 +00:00
|
|
|
}
|
2020-04-13 15:40:30 +00:00
|
|
|
|
2020-04-17 02:42:04 +00:00
|
|
|
// Reset padding if exceed max.
|
|
|
|
if (padding > max_padding) {
|
|
|
|
padding = 0;
|
|
|
|
}
|
2020-04-13 15:40:30 +00:00
|
|
|
|
2020-04-17 02:42:04 +00:00
|
|
|
if (padding > 0) {
|
2020-04-15 07:58:17 +00:00
|
|
|
#if defined(SRS_DEBUG)
|
2020-04-17 02:42:04 +00:00
|
|
|
srs_trace("#%d, Padding %d bytes %d=>%d, packets %d, max_padding %d", packets.debug_id,
|
|
|
|
padding, nn_packet, nn_packet + padding, nn_packets, max_padding);
|
2020-04-15 07:58:17 +00:00
|
|
|
#endif
|
2020-04-17 10:04:52 +00:00
|
|
|
packet->add_padding(padding);
|
2020-04-17 02:42:04 +00:00
|
|
|
nn_packet += padding;
|
|
|
|
packets.nn_paddings++;
|
|
|
|
packets.nn_padding_bytes += padding;
|
|
|
|
}
|
2020-04-13 15:40:30 +00:00
|
|
|
}
|
2020-04-15 07:58:17 +00:00
|
|
|
}
|
2020-04-13 01:13:12 +00:00
|
|
|
|
2020-04-15 07:58:17 +00:00
|
|
|
// Check whether we can use GSO to send it.
|
2020-04-16 23:58:11 +00:00
|
|
|
if (using_gso && !gso_final) {
|
|
|
|
gso_final = (gso_size != nn_packet);
|
2020-04-13 15:40:30 +00:00
|
|
|
}
|
|
|
|
|
2020-04-15 07:58:17 +00:00
|
|
|
if (next_packet) {
|
2020-04-13 15:40:30 +00:00
|
|
|
// If not GSO, maybe the first fresh packet, we should see whether the next packet is smaller than this one,
|
|
|
|
// if smaller, we can still enter GSO.
|
2020-04-16 04:18:52 +00:00
|
|
|
if (!using_gso) {
|
|
|
|
using_gso = (nn_packet >= nn_next_packet);
|
2020-04-13 15:40:30 +00:00
|
|
|
}
|
2020-04-09 11:38:50 +00:00
|
|
|
|
2020-04-13 15:40:30 +00:00
|
|
|
// If GSO, but next is bigger than this one, we must enter the final state.
|
2020-04-16 23:58:11 +00:00
|
|
|
if (using_gso && !gso_final) {
|
2020-04-13 15:40:30 +00:00
|
|
|
gso_final = (nn_packet < nn_next_packet);
|
|
|
|
}
|
2020-04-11 14:54:44 +00:00
|
|
|
}
|
2020-04-13 15:40:30 +00:00
|
|
|
|
2020-04-16 23:58:11 +00:00
|
|
|
// For GSO, reuse mhdr if possible.
|
|
|
|
mmsghdr* mhdr = gso_mhdr;
|
2020-04-14 01:20:21 +00:00
|
|
|
if (!mhdr) {
|
|
|
|
// Fetch a cached message from queue.
|
|
|
|
// TODO: FIXME: Maybe encrypt in async, so the state of mhdr maybe not ready.
|
2020-04-14 02:58:53 +00:00
|
|
|
if ((err = sender->fetch(&mhdr)) != srs_success) {
|
2020-04-14 01:20:21 +00:00
|
|
|
return srs_error_wrap(err, "fetch msghdr");
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now, GSO will use this message and size.
|
2020-04-16 23:58:11 +00:00
|
|
|
gso_mhdr = mhdr;
|
|
|
|
gso_size = nn_packet;
|
2020-04-14 01:20:21 +00:00
|
|
|
}
|
|
|
|
|
2020-04-16 23:10:16 +00:00
|
|
|
// For this message, select a new iovec.
|
2020-04-16 23:58:11 +00:00
|
|
|
if (!iov) {
|
|
|
|
iov = mhdr->msg_hdr.msg_iov;
|
|
|
|
} else {
|
|
|
|
iov++;
|
|
|
|
}
|
2020-04-16 23:10:16 +00:00
|
|
|
gso_cursor++;
|
2020-04-16 23:58:11 +00:00
|
|
|
mhdr->msg_hdr.msg_iovlen = gso_cursor;
|
2020-04-16 23:10:16 +00:00
|
|
|
|
2020-04-16 23:58:11 +00:00
|
|
|
if (gso_cursor > SRS_PERF_RTC_GSO_IOVS && !iov->iov_base) {
|
2020-04-16 23:10:16 +00:00
|
|
|
iov->iov_base = new char[kRtpPacketSize];
|
|
|
|
}
|
2020-04-13 15:40:30 +00:00
|
|
|
iov->iov_len = kRtpPacketSize;
|
|
|
|
|
2020-04-16 23:10:16 +00:00
|
|
|
// Marshal packet to bytes in iovec.
|
2020-04-13 15:40:30 +00:00
|
|
|
if (true) {
|
|
|
|
SrsBuffer stream((char*)iov->iov_base, iov->iov_len);
|
|
|
|
if ((err = packet->encode(&stream)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "encode packet");
|
|
|
|
}
|
|
|
|
iov->iov_len = stream.pos();
|
|
|
|
}
|
|
|
|
|
|
|
|
// Whether encrypt the RTP bytes.
|
2020-04-17 05:02:54 +00:00
|
|
|
if (encrypt) {
|
2020-04-13 15:40:30 +00:00
|
|
|
int nn_encrypt = (int)iov->iov_len;
|
|
|
|
if ((err = rtc_session->dtls_session->protect_rtp2(iov->iov_base, &nn_encrypt)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "srtp protect");
|
|
|
|
}
|
|
|
|
iov->iov_len = (size_t)nn_encrypt;
|
|
|
|
}
|
|
|
|
|
2020-04-17 08:36:56 +00:00
|
|
|
packets.nn_rtp_bytes += (int)iov->iov_len;
|
|
|
|
|
2020-04-13 15:40:30 +00:00
|
|
|
// If GSO, they must has same size, except the final one.
|
2020-04-16 04:18:52 +00:00
|
|
|
if (using_gso && !gso_final && gso_encrypt && gso_encrypt != (int)iov->iov_len) {
|
2020-04-13 15:40:30 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTP_MUXER, "GSO size=%d/%d, encrypt=%d/%d", gso_size, nn_packet, gso_encrypt, iov->iov_len);
|
|
|
|
}
|
|
|
|
|
2020-04-16 04:18:52 +00:00
|
|
|
if (using_gso && !gso_final) {
|
2020-04-13 15:40:30 +00:00
|
|
|
gso_encrypt = iov->iov_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
// If exceed the max GSO size, set to final.
|
2020-04-16 23:10:16 +00:00
|
|
|
if (using_gso && gso_cursor + 1 >= SRS_PERF_RTC_GSO_MAX) {
|
2020-04-13 15:40:30 +00:00
|
|
|
gso_final = true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// For last message, or final gso, or determined not using GSO, send it now.
|
2020-04-16 04:18:52 +00:00
|
|
|
bool do_send = (i == nn_packets - 1 || gso_final || !using_gso);
|
2020-04-14 02:05:55 +00:00
|
|
|
|
|
|
|
#if defined(SRS_DEBUG)
|
2020-04-14 12:12:14 +00:00
|
|
|
bool is_video = packet->rtp_header.get_payload_type() == video_payload_type;
|
2020-04-16 03:22:25 +00:00
|
|
|
srs_trace("#%d, Packet %s SSRC=%d, SN=%d, %d/%d bytes", packets.debug_id, is_video? "Video":"Audio",
|
|
|
|
packet->rtp_header.get_ssrc(), packet->rtp_header.get_sequence(), nn_packet - padding, padding);
|
2020-04-14 02:05:55 +00:00
|
|
|
if (do_send) {
|
|
|
|
for (int j = 0; j < (int)mhdr->msg_hdr.msg_iovlen; j++) {
|
|
|
|
iovec* iov = mhdr->msg_hdr.msg_iov + j;
|
2020-04-16 04:18:52 +00:00
|
|
|
srs_trace("#%d, %s #%d/%d/%d, %d/%d bytes, size %d/%d", packets.debug_id, (using_gso? "GSO":"RAW"), j,
|
2020-04-16 03:22:25 +00:00
|
|
|
gso_cursor + 1, mhdr->msg_hdr.msg_iovlen, iov->iov_len, padding, gso_size, gso_encrypt);
|
2020-04-14 02:05:55 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
if (do_send) {
|
2020-04-16 23:10:16 +00:00
|
|
|
// Set the address and control information.
|
2020-04-16 11:33:10 +00:00
|
|
|
sockaddr_in* addr = (sockaddr_in*)sendonly_ukt->peer_addr();
|
|
|
|
socklen_t addrlen = (socklen_t)sendonly_ukt->peer_addrlen();
|
2020-04-13 15:40:30 +00:00
|
|
|
|
|
|
|
mhdr->msg_hdr.msg_name = (sockaddr_in*)addr;
|
|
|
|
mhdr->msg_hdr.msg_namelen = (socklen_t)addrlen;
|
|
|
|
mhdr->msg_hdr.msg_controllen = 0;
|
|
|
|
|
|
|
|
#ifndef SRS_AUTO_OSX
|
2020-04-16 04:18:52 +00:00
|
|
|
if (using_gso) {
|
2020-04-14 01:20:21 +00:00
|
|
|
mhdr->msg_hdr.msg_controllen = CMSG_SPACE(sizeof(uint16_t));
|
2020-04-13 15:40:30 +00:00
|
|
|
if (!mhdr->msg_hdr.msg_control) {
|
|
|
|
mhdr->msg_hdr.msg_control = new char[mhdr->msg_hdr.msg_controllen];
|
|
|
|
}
|
|
|
|
|
|
|
|
cmsghdr* cm = CMSG_FIRSTHDR(&mhdr->msg_hdr);
|
|
|
|
cm->cmsg_level = SOL_UDP;
|
|
|
|
cm->cmsg_type = UDP_SEGMENT;
|
|
|
|
cm->cmsg_len = CMSG_LEN(sizeof(uint16_t));
|
|
|
|
*((uint16_t*)CMSG_DATA(cm)) = gso_encrypt;
|
|
|
|
}
|
2020-04-14 01:20:21 +00:00
|
|
|
#endif
|
2020-04-13 15:40:30 +00:00
|
|
|
|
2020-04-14 12:12:14 +00:00
|
|
|
// When we send out a packet, we commit a RTP packet.
|
|
|
|
packets.nn_rtp_pkts++;
|
|
|
|
|
2020-04-13 15:40:30 +00:00
|
|
|
if ((err = sender->sendmmsg(mhdr)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "send msghdr");
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reset the GSO flag.
|
|
|
|
gso_mhdr = NULL; gso_size = 0; gso_encrypt = 0; gso_cursor = 0;
|
2020-04-16 23:58:11 +00:00
|
|
|
using_gso = gso_final = false; iov = NULL;
|
2020-04-11 14:54:44 +00:00
|
|
|
}
|
2020-04-11 09:52:14 +00:00
|
|
|
}
|
|
|
|
|
2020-04-14 12:12:14 +00:00
|
|
|
#if defined(SRS_DEBUG)
|
2020-04-17 08:36:56 +00:00
|
|
|
srs_trace("#%d, RTC PLAY summary, rtp %d/%d, videos %d/%d, audios %d/%d, pad %d/%d/%d", packets.debug_id, packets.size(),
|
2020-04-16 02:05:17 +00:00
|
|
|
packets.nn_rtp_pkts, packets.nn_videos, packets.nn_samples, packets.nn_audios, packets.nn_extras, packets.nn_paddings,
|
2020-04-17 08:36:56 +00:00
|
|
|
packets.nn_padding_bytes, packets.nn_rtp_bytes);
|
2020-04-14 12:12:14 +00:00
|
|
|
#endif
|
2020-04-11 14:54:44 +00:00
|
|
|
|
2020-04-13 15:40:30 +00:00
|
|
|
return err;
|
|
|
|
}
|
2020-04-11 14:54:44 +00:00
|
|
|
|
2020-04-13 09:11:46 +00:00
|
|
|
srs_error_t SrsRtcSenderThread::packet_nalus(SrsSharedPtrMessage* msg, SrsRtcPackets& packets)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
2020-04-13 11:23:17 +00:00
|
|
|
|
|
|
|
SrsRtpRawNALUs* raw = new SrsRtpRawNALUs();
|
|
|
|
|
|
|
|
for (int i = 0; i < msg->nn_samples(); i++) {
|
|
|
|
SrsSample* sample = msg->samples() + i;
|
|
|
|
|
|
|
|
// We always ignore bframe here, if config to discard bframe,
|
|
|
|
// the bframe flag will not be set.
|
|
|
|
if (sample->bframe) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
raw->push_back(sample->copy());
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ignore empty.
|
|
|
|
int nn_bytes = raw->nb_bytes();
|
|
|
|
if (nn_bytes <= 0) {
|
|
|
|
srs_freep(raw);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nn_bytes < kRtpMaxPayloadSize) {
|
|
|
|
// Package NALUs in a single RTP packet.
|
2020-04-15 14:46:06 +00:00
|
|
|
SrsRtpPacket2* packet = packets.fetch();
|
2020-04-18 12:37:08 +00:00
|
|
|
if (!packet) {
|
|
|
|
srs_freep(raw);
|
|
|
|
return srs_error_new(ERROR_RTC_RTP_MUXER, "cache empty");
|
|
|
|
}
|
2020-04-16 06:51:36 +00:00
|
|
|
|
2020-04-13 11:23:17 +00:00
|
|
|
packet->rtp_header.set_timestamp(msg->timestamp * 90);
|
|
|
|
packet->rtp_header.set_sequence(video_sequence++);
|
|
|
|
packet->rtp_header.set_ssrc(video_ssrc);
|
|
|
|
packet->rtp_header.set_payload_type(video_payload_type);
|
2020-04-16 06:51:36 +00:00
|
|
|
|
2020-04-13 11:23:17 +00:00
|
|
|
packet->payload = raw;
|
|
|
|
} else {
|
2020-04-19 05:16:48 +00:00
|
|
|
// We must free it, should never use RTP packets to free it,
|
|
|
|
// because more than one RTP packet will refer to it.
|
2020-04-13 11:23:17 +00:00
|
|
|
SrsAutoFree(SrsRtpRawNALUs, raw);
|
|
|
|
|
|
|
|
// Package NALUs in FU-A RTP packets.
|
|
|
|
int fu_payload_size = kRtpMaxPayloadSize;
|
|
|
|
|
|
|
|
// The first byte is store in FU-A header.
|
|
|
|
uint8_t header = raw->skip_first_byte();
|
|
|
|
uint8_t nal_type = header & kNalTypeMask;
|
|
|
|
int nb_left = nn_bytes - 1;
|
|
|
|
|
|
|
|
int num_of_packet = 1 + (nn_bytes - 1) / fu_payload_size;
|
|
|
|
for (int i = 0; i < num_of_packet; ++i) {
|
|
|
|
int packet_size = srs_min(nb_left, fu_payload_size);
|
|
|
|
|
2020-04-15 14:46:06 +00:00
|
|
|
SrsRtpPacket2* packet = packets.fetch();
|
2020-04-18 12:37:08 +00:00
|
|
|
if (!packet) {
|
|
|
|
srs_freep(raw);
|
|
|
|
return srs_error_new(ERROR_RTC_RTP_MUXER, "cache empty");
|
|
|
|
}
|
2020-04-13 11:23:17 +00:00
|
|
|
|
|
|
|
packet->rtp_header.set_timestamp(msg->timestamp * 90);
|
|
|
|
packet->rtp_header.set_sequence(video_sequence++);
|
|
|
|
packet->rtp_header.set_ssrc(video_ssrc);
|
|
|
|
packet->rtp_header.set_payload_type(video_payload_type);
|
|
|
|
|
|
|
|
SrsRtpFUAPayload* fua = new SrsRtpFUAPayload();
|
|
|
|
packet->payload = fua;
|
|
|
|
|
|
|
|
fua->nri = (SrsAvcNaluType)header;
|
|
|
|
fua->nalu_type = (SrsAvcNaluType)nal_type;
|
|
|
|
fua->start = bool(i == 0);
|
|
|
|
fua->end = bool(i == num_of_packet - 1);
|
|
|
|
|
|
|
|
if ((err = raw->read_samples(fua->nalus, packet_size)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "read samples %d bytes, left %d, total %d", packet_size, nb_left, nn_bytes);
|
|
|
|
}
|
|
|
|
|
|
|
|
nb_left -= packet_size;
|
|
|
|
}
|
2020-04-13 01:13:12 +00:00
|
|
|
}
|
2020-04-13 11:23:17 +00:00
|
|
|
|
2020-04-15 14:46:06 +00:00
|
|
|
if (packets.size() > 0) {
|
|
|
|
packets.back()->rtp_header.set_marker(true);
|
2020-04-13 11:23:17 +00:00
|
|
|
}
|
|
|
|
|
2020-04-11 14:54:44 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-17 10:04:52 +00:00
|
|
|
srs_error_t SrsRtcSenderThread::packet_opus(SrsSample* sample, SrsRtcPackets& packets, int nn_max_payload)
|
2020-04-11 14:54:44 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-15 14:46:06 +00:00
|
|
|
SrsRtpPacket2* packet = packets.fetch();
|
2020-04-18 12:37:08 +00:00
|
|
|
if (!packet) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTP_MUXER, "cache empty");
|
|
|
|
}
|
2020-04-11 14:54:44 +00:00
|
|
|
packet->rtp_header.set_marker(true);
|
|
|
|
packet->rtp_header.set_timestamp(audio_timestamp);
|
|
|
|
packet->rtp_header.set_sequence(audio_sequence++);
|
|
|
|
packet->rtp_header.set_ssrc(audio_ssrc);
|
|
|
|
packet->rtp_header.set_payload_type(audio_payload_type);
|
|
|
|
|
2020-04-16 06:28:59 +00:00
|
|
|
SrsRtpRawPayload* raw = packet->reuse_raw();
|
2020-04-11 15:57:04 +00:00
|
|
|
raw->payload = sample->bytes;
|
|
|
|
raw->nn_payload = sample->size;
|
2020-04-11 14:54:44 +00:00
|
|
|
|
2020-04-17 10:04:52 +00:00
|
|
|
if (max_padding > 0) {
|
|
|
|
if (sample->size < nn_max_payload && nn_max_payload - sample->size < max_padding) {
|
|
|
|
int padding = nn_max_payload - sample->size;
|
|
|
|
packet->set_padding(padding);
|
|
|
|
|
|
|
|
#if defined(SRS_DEBUG)
|
|
|
|
srs_trace("#%d, Fast Padding %d bytes %d=>%d, SN=%d, max_payload %d, max_padding %d", packets.debug_id,
|
|
|
|
padding, sample->size, sample->size + padding, packet->rtp_header.get_sequence(), nn_max_payload, max_padding);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
}
|
2020-04-11 14:54:44 +00:00
|
|
|
|
2020-04-11 09:52:14 +00:00
|
|
|
// TODO: FIXME: Why 960? Need Refactoring?
|
2020-04-11 10:39:46 +00:00
|
|
|
audio_timestamp += 960;
|
2020-04-11 09:52:14 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-13 08:50:24 +00:00
|
|
|
srs_error_t SrsRtcSenderThread::packet_fu_a(SrsSharedPtrMessage* msg, SrsSample* sample, int fu_payload_size, SrsRtcPackets& packets)
|
2020-04-11 13:03:37 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
char* p = sample->bytes + 1;
|
|
|
|
int nb_left = sample->size - 1;
|
|
|
|
uint8_t header = sample->bytes[0];
|
|
|
|
uint8_t nal_type = header & kNalTypeMask;
|
|
|
|
|
2020-04-13 05:58:34 +00:00
|
|
|
int num_of_packet = 1 + (sample->size - 1) / fu_payload_size;
|
2020-04-11 13:03:37 +00:00
|
|
|
for (int i = 0; i < num_of_packet; ++i) {
|
2020-04-13 05:58:34 +00:00
|
|
|
int packet_size = srs_min(nb_left, fu_payload_size);
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-15 14:46:06 +00:00
|
|
|
SrsRtpPacket2* packet = packets.fetch();
|
2020-04-18 12:37:08 +00:00
|
|
|
if (!packet) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTP_MUXER, "cache empty");
|
|
|
|
}
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-11 17:01:39 +00:00
|
|
|
packet->rtp_header.set_timestamp(msg->timestamp * 90);
|
|
|
|
packet->rtp_header.set_sequence(video_sequence++);
|
|
|
|
packet->rtp_header.set_ssrc(video_ssrc);
|
|
|
|
packet->rtp_header.set_payload_type(video_payload_type);
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-18 12:37:08 +00:00
|
|
|
SrsRtpFUAPayload2* fua = packet->reuse_fua();
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-11 17:01:39 +00:00
|
|
|
fua->nri = (SrsAvcNaluType)header;
|
|
|
|
fua->nalu_type = (SrsAvcNaluType)nal_type;
|
|
|
|
fua->start = bool(i == 0);
|
|
|
|
fua->end = bool(i == num_of_packet - 1);
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-18 12:37:08 +00:00
|
|
|
fua->payload = p;
|
|
|
|
fua->size = packet_size;
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-11 17:01:39 +00:00
|
|
|
p += packet_size;
|
|
|
|
nb_left -= packet_size;
|
2020-04-11 13:03:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Single NAL Unit Packet @see https://tools.ietf.org/html/rfc6184#section-5.6
|
2020-04-15 14:46:06 +00:00
|
|
|
srs_error_t SrsRtcSenderThread::packet_single_nalu(SrsSharedPtrMessage* msg, SrsSample* sample, SrsRtcPackets& packets)
|
2020-04-11 13:03:37 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-15 14:46:06 +00:00
|
|
|
SrsRtpPacket2* packet = packets.fetch();
|
2020-04-18 12:37:08 +00:00
|
|
|
if (!packet) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTP_MUXER, "cache empty");
|
|
|
|
}
|
2020-04-11 17:01:39 +00:00
|
|
|
packet->rtp_header.set_timestamp(msg->timestamp * 90);
|
|
|
|
packet->rtp_header.set_sequence(video_sequence++);
|
|
|
|
packet->rtp_header.set_ssrc(video_ssrc);
|
|
|
|
packet->rtp_header.set_payload_type(video_payload_type);
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-16 06:51:36 +00:00
|
|
|
SrsRtpRawPayload* raw = packet->reuse_raw();
|
|
|
|
raw->payload = sample->bytes;
|
|
|
|
raw->nn_payload = sample->size;
|
2020-04-11 13:03:37 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-15 14:46:06 +00:00
|
|
|
srs_error_t SrsRtcSenderThread::packet_stap_a(SrsSource* source, SrsSharedPtrMessage* msg, SrsRtcPackets& packets)
|
2020-04-11 13:03:37 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
SrsMetaCache* meta = source->cached_meta();
|
|
|
|
if (!meta) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsFormat* format = meta->vsh_format();
|
|
|
|
if (!format || !format->vcodec) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
const vector<char>& sps = format->vcodec->sequenceParameterSetNALUnit;
|
|
|
|
const vector<char>& pps = format->vcodec->pictureParameterSetNALUnit;
|
|
|
|
if (sps.empty() || pps.empty()) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTP_MUXER, "sps/pps empty");
|
|
|
|
}
|
|
|
|
|
2020-04-15 14:46:06 +00:00
|
|
|
SrsRtpPacket2* packet = packets.fetch();
|
2020-04-18 12:37:08 +00:00
|
|
|
if (!packet) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTP_MUXER, "cache empty");
|
|
|
|
}
|
2020-04-11 15:57:04 +00:00
|
|
|
packet->rtp_header.set_marker(false);
|
2020-04-11 17:01:39 +00:00
|
|
|
packet->rtp_header.set_timestamp(msg->timestamp * 90);
|
2020-04-11 15:57:04 +00:00
|
|
|
packet->rtp_header.set_sequence(video_sequence++);
|
|
|
|
packet->rtp_header.set_ssrc(video_ssrc);
|
|
|
|
packet->rtp_header.set_payload_type(video_payload_type);
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-11 15:57:04 +00:00
|
|
|
SrsRtpSTAPPayload* stap = new SrsRtpSTAPPayload();
|
2020-04-11 17:08:21 +00:00
|
|
|
packet->payload = stap;
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-11 15:57:04 +00:00
|
|
|
uint8_t header = sps[0];
|
2020-04-11 17:01:39 +00:00
|
|
|
stap->nri = (SrsAvcNaluType)header;
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-11 17:08:21 +00:00
|
|
|
if (true) {
|
|
|
|
SrsSample* sample = new SrsSample();
|
|
|
|
sample->bytes = (char*)&sps[0];
|
|
|
|
sample->size = (int)sps.size();
|
|
|
|
stap->nalus.push_back(sample);
|
|
|
|
}
|
2020-04-11 13:03:37 +00:00
|
|
|
|
2020-04-11 17:08:21 +00:00
|
|
|
if (true) {
|
|
|
|
SrsSample* sample = new SrsSample();
|
|
|
|
sample->bytes = (char*)&pps[0];
|
|
|
|
sample->size = (int)pps.size();
|
|
|
|
stap->nalus.push_back(sample);
|
|
|
|
}
|
2020-04-11 13:03:37 +00:00
|
|
|
|
|
|
|
return err;
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
|
|
|
|
2020-04-23 09:08:21 +00:00
|
|
|
SrsRtcPublisher::SrsRtcPublisher(SrsRtcSession* session)
|
|
|
|
{
|
2020-04-23 15:14:30 +00:00
|
|
|
sendonly_ukt = NULL;
|
|
|
|
|
2020-04-26 08:12:23 +00:00
|
|
|
report_timer = new SrsHourGlass(this, 200 * SRS_UTIME_MILLISECONDS);
|
2020-04-23 15:14:30 +00:00
|
|
|
|
2020-04-23 09:08:21 +00:00
|
|
|
rtc_session = session;
|
|
|
|
rtp_h264_demuxer = new SrsRtpH264Demuxer();
|
2020-04-24 08:19:08 +00:00
|
|
|
rtp_opus_demuxer = new SrsRtpOpusDemuxer();
|
2020-04-23 09:08:21 +00:00
|
|
|
rtp_video_queue = new SrsRtpQueue(1000);
|
|
|
|
rtp_audio_queue = new SrsRtpQueue(100, true);
|
|
|
|
|
|
|
|
source = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsRtcPublisher::~SrsRtcPublisher()
|
|
|
|
{
|
2020-04-26 08:12:23 +00:00
|
|
|
// TODO: FIXME: Do unpublish when session timeout.
|
|
|
|
if (source) {
|
|
|
|
source->on_unpublish();
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
srs_freep(report_timer);
|
2020-04-23 09:08:21 +00:00
|
|
|
srs_freep(rtp_h264_demuxer);
|
2020-04-24 08:19:08 +00:00
|
|
|
srs_freep(rtp_opus_demuxer);
|
2020-04-23 09:08:21 +00:00
|
|
|
srs_freep(rtp_video_queue);
|
|
|
|
srs_freep(rtp_audio_queue);
|
|
|
|
}
|
|
|
|
|
2020-04-26 08:12:23 +00:00
|
|
|
srs_error_t SrsRtcPublisher::initialize(SrsUdpMuxSocket* skt, uint32_t vssrc, uint32_t assrc, SrsRequest* r)
|
2020-04-23 09:08:21 +00:00
|
|
|
{
|
2020-04-23 15:14:30 +00:00
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
sendonly_ukt = skt;
|
|
|
|
|
2020-04-23 09:08:21 +00:00
|
|
|
video_ssrc = vssrc;
|
|
|
|
audio_ssrc = assrc;
|
2020-04-26 08:12:23 +00:00
|
|
|
req = r;
|
2020-04-23 09:08:21 +00:00
|
|
|
|
|
|
|
srs_verbose("video_ssrc=%u, audio_ssrc=%u", video_ssrc, audio_ssrc);
|
2020-04-23 15:14:30 +00:00
|
|
|
|
|
|
|
if ((err = report_timer->tick(0 * SRS_UTIME_MILLISECONDS)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "hourglass tick");
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((err = report_timer->start()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "start report_timer");
|
|
|
|
}
|
|
|
|
|
2020-04-26 08:12:23 +00:00
|
|
|
// TODO: FIXME: Should refactor it, directly use http server as handler.
|
|
|
|
ISrsSourceHandler* handler = _srs_hybrid->srs()->instance();
|
|
|
|
if ((err = _srs_sources->fetch_or_create(req, handler, &source)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "create source");
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((err = source->on_publish()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "on publish");
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-23 09:08:21 +00:00
|
|
|
srs_error_t SrsRtcPublisher::on_rtp(SrsUdpMuxSocket* skt, char* buf, int nb_buf)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
SrsRtpSharedPacket* rtp_shared_pkt = new SrsRtpSharedPacket();
|
2020-04-23 09:08:21 +00:00
|
|
|
SrsAutoFree(SrsRtpSharedPacket, rtp_shared_pkt);
|
|
|
|
if ((err = rtp_shared_pkt->decode(buf, nb_buf)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "rtp packet decode failed");
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t ssrc = rtp_shared_pkt->rtp_header.get_ssrc();
|
|
|
|
|
|
|
|
if (ssrc == audio_ssrc) {
|
|
|
|
return on_audio(skt, rtp_shared_pkt);
|
|
|
|
} else if (ssrc == video_ssrc) {
|
|
|
|
return on_video(skt, rtp_shared_pkt);
|
|
|
|
}
|
|
|
|
|
|
|
|
return srs_error_new(ERROR_RTC_RTP, "unknown ssrc=%u", ssrc);
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
srs_error_t SrsRtcPublisher::on_rtcp_sender_report(char* buf, int nb_buf, SrsUdpMuxSocket* skt)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-23 16:06:59 +00:00
|
|
|
if (nb_buf < 28) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp sender report packet, nb_buf=%d", nb_buf);
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
|
|
|
|
SrsAutoFree(SrsBuffer, stream);
|
|
|
|
|
|
|
|
// @see: https://tools.ietf.org/html/rfc3550#section-6.4.1
|
|
|
|
/*
|
2020-04-25 14:30:55 +00:00
|
|
|
0 1 2 3
|
2020-04-23 15:14:30 +00:00
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
header |V=2|P| RC | PT=SR=200 | length |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| SSRC of sender |
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
sender | NTP timestamp, most significant word |
|
|
|
|
info +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| NTP timestamp, least significant word |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| RTP timestamp |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| sender's packet count |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| sender's octet count |
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
report | SSRC_1 (SSRC of first source) |
|
|
|
|
block +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
1 | fraction lost | cumulative number of packets lost |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| extended highest sequence number received |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| interarrival jitter |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| last SR (LSR) |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| delay since last SR (DLSR) |
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
report | SSRC_2 (SSRC of second source) |
|
|
|
|
block +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
2 : ... :
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
| profile-specific extensions |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
*/
|
|
|
|
uint8_t first = stream->read_1bytes();
|
|
|
|
uint8_t rc = first & 0x1F;
|
|
|
|
|
|
|
|
uint8_t payload_type = stream->read_1bytes();
|
|
|
|
srs_assert(payload_type == kSR);
|
|
|
|
uint16_t length = stream->read_2bytes();
|
|
|
|
|
|
|
|
if (((length + 1) * 4) != (rc * 24 + 28)) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtcp sender report packet, length=%u, rc=%u", length, rc);
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t ssrc_of_sender = stream->read_4bytes();
|
|
|
|
uint64_t ntp = stream->read_8bytes();
|
|
|
|
SrsNtp srs_ntp = SrsNtp::to_time_ms(ntp);
|
|
|
|
uint32_t rtp_time = stream->read_4bytes();
|
|
|
|
uint32_t sender_packet_count = stream->read_4bytes();
|
|
|
|
uint32_t sender_octec_count = stream->read_4bytes();
|
|
|
|
|
2020-04-26 05:30:17 +00:00
|
|
|
(void)sender_packet_count; (void)sender_octec_count; (void)rtp_time;
|
2020-04-23 15:14:30 +00:00
|
|
|
srs_verbose("sender report, ssrc_of_sender=%u, rtp_time=%u, sender_packet_count=%u, sender_octec_count=%u",
|
|
|
|
ssrc_of_sender, rtp_time, sender_packet_count, sender_octec_count);
|
|
|
|
|
|
|
|
for (int i = 0; i < rc; ++i) {
|
|
|
|
uint32_t ssrc = stream->read_4bytes();
|
|
|
|
uint8_t fraction_lost = stream->read_1bytes();
|
|
|
|
uint32_t cumulative_number_of_packets_lost = stream->read_3bytes();
|
|
|
|
uint32_t highest_seq = stream->read_4bytes();
|
|
|
|
uint32_t jitter = stream->read_4bytes();
|
|
|
|
uint32_t lst = stream->read_4bytes();
|
|
|
|
uint32_t dlsr = stream->read_4bytes();
|
|
|
|
|
|
|
|
(void)ssrc; (void)fraction_lost; (void)cumulative_number_of_packets_lost; (void)highest_seq; (void)jitter; (void)lst; (void)dlsr;
|
|
|
|
srs_verbose("sender report, ssrc=%u, fraction_lost=%u, cumulative_number_of_packets_lost=%u, highest_seq=%u, jitter=%u, lst=%u, dlst=%u",
|
|
|
|
ssrc, fraction_lost, cumulative_number_of_packets_lost, highest_seq, jitter, lst, dlsr);
|
|
|
|
}
|
|
|
|
|
|
|
|
last_sender_report_ntp[ssrc_of_sender] = srs_ntp;
|
|
|
|
last_sender_report_sys_time[ssrc_of_sender] = srs_update_system_time();
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsRtcPublisher::on_rtcp_xr(char* buf, int nb_buf, SrsUdpMuxSocket* skt)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
/*
|
|
|
|
@see: http://www.rfc-editor.org/rfc/rfc3611.html#section-2
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
0 1 2 3
|
2020-04-23 15:14:30 +00:00
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|V=2|P|reserved | PT=XR=207 | length |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| SSRC |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
: report blocks :
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
*/
|
|
|
|
|
|
|
|
SrsBuffer stream(buf, nb_buf);
|
2020-04-24 08:19:08 +00:00
|
|
|
/*uint8_t first = */stream.read_1bytes();
|
2020-04-23 15:14:30 +00:00
|
|
|
uint8_t pt = stream.read_1bytes();
|
2020-04-24 08:19:08 +00:00
|
|
|
srs_assert(pt == kXR);
|
2020-04-23 15:14:30 +00:00
|
|
|
uint16_t length = (stream.read_2bytes() + 1) * 4;
|
2020-04-24 08:19:08 +00:00
|
|
|
/*uint32_t ssrc = */stream.read_4bytes();
|
2020-04-23 15:14:30 +00:00
|
|
|
|
|
|
|
if (length != nb_buf) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid XR packet, length=%u, nb_buf=%d", length, nb_buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
while (stream.pos() + 4 < length) {
|
|
|
|
uint8_t bt = stream.read_1bytes();
|
|
|
|
stream.skip(1);
|
|
|
|
uint16_t block_length = (stream.read_2bytes() + 1) * 4;
|
|
|
|
|
|
|
|
if (stream.pos() + block_length - 4 > nb_buf) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid XR packet block, block_length=%u, nb_buf=%d", block_length, nb_buf);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (bt == 5) {
|
|
|
|
for (int i = 4; i < block_length; i += 12) {
|
|
|
|
uint32_t ssrc = stream.read_4bytes();
|
|
|
|
uint32_t lrr = stream.read_4bytes();
|
|
|
|
uint32_t dlrr = stream.read_4bytes();
|
|
|
|
|
|
|
|
SrsNtp cur_ntp = SrsNtp::from_time_ms(srs_update_system_time() / 1000);
|
|
|
|
uint32_t compact_ntp = (cur_ntp.ntp_second_ << 16) | (cur_ntp.ntp_fractions_ >> 16);
|
|
|
|
|
|
|
|
int rtt_ntp = compact_ntp - lrr - dlrr;
|
|
|
|
int rtt = ((rtt_ntp * 1000) >> 16) + ((rtt_ntp >> 16) * 1000);
|
2020-04-26 05:30:17 +00:00
|
|
|
srs_verbose("ssrc=%u, compact_ntp=%u, lrr=%u, dlrr=%u, rtt=%d",
|
2020-04-23 15:14:30 +00:00
|
|
|
ssrc, compact_ntp, lrr, dlrr, rtt);
|
|
|
|
|
|
|
|
if (ssrc == video_ssrc) {
|
|
|
|
rtp_video_queue->update_rtt(rtt);
|
|
|
|
} else if (ssrc == audio_ssrc) {
|
|
|
|
rtp_audio_queue->update_rtt(rtt);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-26 05:30:17 +00:00
|
|
|
void SrsRtcPublisher::check_send_nacks(SrsRtpQueue* rtp_queue, uint32_t ssrc, SrsUdpMuxSocket* skt)
|
|
|
|
{
|
|
|
|
// If DTLS is not OK, drop all messages.
|
|
|
|
if (!rtc_session->dtls_session) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
vector<uint16_t> nack_seqs;
|
|
|
|
rtp_queue->nack_.get_nack_seqs(nack_seqs);
|
|
|
|
vector<uint16_t>::iterator iter = nack_seqs.begin();
|
|
|
|
while (iter != nack_seqs.end()) {
|
|
|
|
char buf[kRtpPacketSize];
|
|
|
|
SrsBuffer stream(buf, sizeof(buf));
|
|
|
|
// FIXME: Replace magic number.
|
|
|
|
stream.write_1bytes(0x81);
|
|
|
|
stream.write_1bytes(kRtpFb);
|
|
|
|
stream.write_2bytes(3);
|
|
|
|
stream.write_4bytes(ssrc);
|
|
|
|
stream.write_4bytes(ssrc);
|
|
|
|
uint16_t pid = *iter;
|
|
|
|
uint16_t blp = 0;
|
|
|
|
while (iter + 1 != nack_seqs.end() && (*(iter + 1) - pid <= 15)) {
|
|
|
|
blp |= (1 << (*(iter + 1) - pid - 1));
|
|
|
|
++iter;
|
|
|
|
}
|
|
|
|
|
|
|
|
stream.write_2bytes(pid);
|
|
|
|
stream.write_2bytes(blp);
|
|
|
|
|
|
|
|
char protected_buf[kRtpPacketSize];
|
|
|
|
int nb_protected_buf = stream.pos();
|
|
|
|
|
|
|
|
// FIXME: Merge nack rtcp into one packets.
|
|
|
|
if (rtc_session->dtls_session->protect_rtcp(protected_buf, stream.data(), nb_protected_buf) == srs_success) {
|
|
|
|
// TODO: FIXME: Check error.
|
|
|
|
skt->sendto(protected_buf, nb_protected_buf, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
++iter;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
srs_error_t SrsRtcPublisher::send_rtcp_rr(SrsUdpMuxSocket* skt, uint32_t ssrc, SrsRtpQueue* rtp_queue)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-25 10:59:02 +00:00
|
|
|
// If DTLS is not OK, drop all messages.
|
|
|
|
if (!rtc_session->dtls_session) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
char buf[kRtpPacketSize];
|
|
|
|
SrsBuffer stream(buf, sizeof(buf));
|
|
|
|
stream.write_1bytes(0x81);
|
|
|
|
stream.write_1bytes(kRR);
|
|
|
|
stream.write_2bytes(7);
|
|
|
|
stream.write_4bytes(ssrc);
|
|
|
|
|
|
|
|
uint8_t fraction_lost = rtp_queue->get_fraction_lost();
|
|
|
|
uint32_t cumulative_number_of_packets_lost = rtp_queue->get_cumulative_number_of_packets_lost() & 0x7FFFFF;
|
|
|
|
uint32_t extended_highest_sequence = rtp_queue->get_extended_highest_sequence();
|
|
|
|
uint32_t interarrival_jitter = rtp_queue->get_interarrival_jitter();
|
|
|
|
|
|
|
|
uint32_t rr_lsr = 0;
|
|
|
|
uint32_t rr_dlsr = 0;
|
|
|
|
|
|
|
|
const uint64_t& lsr_systime = last_sender_report_sys_time[ssrc];
|
|
|
|
const SrsNtp& lsr_ntp = last_sender_report_ntp[ssrc];
|
|
|
|
|
|
|
|
if (lsr_systime > 0) {
|
|
|
|
rr_lsr = (lsr_ntp.ntp_second_ << 16) | (lsr_ntp.ntp_fractions_ >> 16);
|
|
|
|
uint32_t dlsr = (srs_update_system_time() - lsr_systime) / 1000;
|
|
|
|
rr_dlsr = ((dlsr / 1000) << 16) | ((dlsr % 1000) * 65536 / 1000);
|
|
|
|
}
|
|
|
|
|
|
|
|
stream.write_4bytes(ssrc);
|
|
|
|
stream.write_1bytes(fraction_lost);
|
|
|
|
stream.write_3bytes(cumulative_number_of_packets_lost);
|
|
|
|
stream.write_4bytes(extended_highest_sequence);
|
|
|
|
stream.write_4bytes(interarrival_jitter);
|
|
|
|
stream.write_4bytes(rr_lsr);
|
|
|
|
stream.write_4bytes(rr_dlsr);
|
|
|
|
|
|
|
|
srs_verbose("RR ssrc=%u, fraction_lost=%u, cumulative_number_of_packets_lost=%u, extended_highest_sequence=%u, interarrival_jitter=%u",
|
|
|
|
ssrc, fraction_lost, cumulative_number_of_packets_lost, extended_highest_sequence, interarrival_jitter);
|
|
|
|
|
|
|
|
char protected_buf[kRtpPacketSize];
|
|
|
|
int nb_protected_buf = stream.pos();
|
|
|
|
if ((err = rtc_session->dtls_session->protect_rtcp(protected_buf, stream.data(), nb_protected_buf)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "protect rtcp rr");
|
|
|
|
}
|
|
|
|
|
2020-04-25 10:59:02 +00:00
|
|
|
// TDOO: FIXME: Check error.
|
2020-04-23 15:14:30 +00:00
|
|
|
skt->sendto(protected_buf, nb_protected_buf, 0);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsRtcPublisher::send_rtcp_xr_rrtr(SrsUdpMuxSocket* skt, uint32_t ssrc)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
2020-04-25 10:59:02 +00:00
|
|
|
|
|
|
|
// If DTLS is not OK, drop all messages.
|
|
|
|
if (!rtc_session->dtls_session) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
/*
|
|
|
|
@see: http://www.rfc-editor.org/rfc/rfc3611.html#section-2
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
0 1 2 3
|
2020-04-23 15:14:30 +00:00
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|V=2|P|reserved | PT=XR=207 | length |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| SSRC |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
: report blocks :
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|
|
|
|
@see: http://www.rfc-editor.org/rfc/rfc3611.html#section-4.4
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
0 1 2 3
|
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| BT=4 | reserved | block length = 2 |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| NTP timestamp, most significant word |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| NTP timestamp, least significant word |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
2020-04-23 15:14:30 +00:00
|
|
|
*/
|
|
|
|
srs_utime_t now = srs_update_system_time();
|
|
|
|
SrsNtp cur_ntp = SrsNtp::from_time_ms(now / 1000);
|
|
|
|
|
|
|
|
char buf[kRtpPacketSize];
|
|
|
|
SrsBuffer stream(buf, sizeof(buf));
|
|
|
|
stream.write_1bytes(0x80);
|
|
|
|
stream.write_1bytes(kXR);
|
|
|
|
stream.write_2bytes(4);
|
|
|
|
stream.write_4bytes(ssrc);
|
|
|
|
stream.write_1bytes(4);
|
|
|
|
stream.write_1bytes(0);
|
|
|
|
stream.write_2bytes(2);
|
|
|
|
stream.write_4bytes(cur_ntp.ntp_second_);
|
|
|
|
stream.write_4bytes(cur_ntp.ntp_fractions_);
|
|
|
|
|
|
|
|
char protected_buf[kRtpPacketSize];
|
|
|
|
int nb_protected_buf = stream.pos();
|
|
|
|
if ((err = rtc_session->dtls_session->protect_rtcp(protected_buf, stream.data(), nb_protected_buf)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "protect rtcp xr");
|
|
|
|
}
|
|
|
|
|
2020-04-25 10:59:02 +00:00
|
|
|
// TDOO: FIXME: Check error.
|
2020-04-23 15:14:30 +00:00
|
|
|
skt->sendto(protected_buf, nb_protected_buf, 0);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-24 08:19:08 +00:00
|
|
|
srs_error_t SrsRtcPublisher::send_rtcp_fb_pli(SrsUdpMuxSocket* skt, uint32_t ssrc)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-25 10:59:02 +00:00
|
|
|
// If DTLS is not OK, drop all messages.
|
|
|
|
if (!rtc_session->dtls_session) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-24 08:19:08 +00:00
|
|
|
char buf[kRtpPacketSize];
|
|
|
|
SrsBuffer stream(buf, sizeof(buf));
|
|
|
|
stream.write_1bytes(0x81);
|
|
|
|
stream.write_1bytes(kPsFb);
|
|
|
|
stream.write_2bytes(2);
|
|
|
|
stream.write_4bytes(ssrc);
|
|
|
|
stream.write_4bytes(ssrc);
|
|
|
|
|
|
|
|
srs_verbose("PLI ssrc=%u", ssrc);
|
|
|
|
|
|
|
|
char protected_buf[kRtpPacketSize];
|
|
|
|
int nb_protected_buf = stream.pos();
|
|
|
|
if ((err = rtc_session->dtls_session->protect_rtcp(protected_buf, stream.data(), nb_protected_buf)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "protect rtcp psfb pli");
|
|
|
|
}
|
|
|
|
|
2020-04-25 10:59:02 +00:00
|
|
|
// TDOO: FIXME: Check error.
|
2020-04-24 08:19:08 +00:00
|
|
|
skt->sendto(protected_buf, nb_protected_buf, 0);
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
2020-04-23 15:14:30 +00:00
|
|
|
|
|
|
|
srs_error_t SrsRtcPublisher::on_audio(SrsUdpMuxSocket* skt, SrsRtpSharedPacket* rtp_pkt)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-23 09:08:21 +00:00
|
|
|
rtp_pkt->rtp_payload_header = new SrsRtpOpusHeader();
|
2020-04-24 08:19:08 +00:00
|
|
|
if ((err = rtp_opus_demuxer->parse(rtp_pkt)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "rtp opus demux failed");
|
|
|
|
}
|
2020-04-23 09:08:21 +00:00
|
|
|
|
|
|
|
rtp_audio_queue->insert(rtp_pkt);
|
|
|
|
|
2020-04-24 08:19:08 +00:00
|
|
|
if (rtp_audio_queue->get_and_clean_if_needed_rqeuest_key_frame()) {
|
|
|
|
send_rtcp_fb_pli(skt, audio_ssrc);
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
check_send_nacks(rtp_audio_queue, audio_ssrc, skt);
|
|
|
|
|
|
|
|
return collect_audio_frame();
|
|
|
|
}
|
|
|
|
|
2020-04-23 09:08:21 +00:00
|
|
|
srs_error_t SrsRtcPublisher::on_video(SrsUdpMuxSocket* skt, SrsRtpSharedPacket* rtp_pkt)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
rtp_pkt->rtp_payload_header = new SrsRtpH264Header();
|
|
|
|
|
|
|
|
if ((err = rtp_h264_demuxer->parse(rtp_pkt)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "rtp h264 demux failed");
|
|
|
|
}
|
|
|
|
|
|
|
|
rtp_video_queue->insert(rtp_pkt);
|
|
|
|
|
2020-04-24 08:19:08 +00:00
|
|
|
if (rtp_video_queue->get_and_clean_if_needed_rqeuest_key_frame()) {
|
|
|
|
send_rtcp_fb_pli(skt, video_ssrc);
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
check_send_nacks(rtp_video_queue, video_ssrc, skt);
|
|
|
|
|
|
|
|
return collect_video_frame();
|
|
|
|
}
|
|
|
|
|
2020-04-26 05:30:17 +00:00
|
|
|
srs_error_t SrsRtcPublisher::collect_audio_frame()
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
std::vector<std::vector<SrsRtpSharedPacket*> > frames;
|
|
|
|
rtp_audio_queue->get_and_clean_collected_frames(frames);
|
|
|
|
|
|
|
|
for (size_t i = 0; i < frames.size(); ++i) {
|
|
|
|
if (! frames[i].empty()) {
|
|
|
|
srs_verbose("collect %d audio frames, seq range %u,%u",
|
|
|
|
frames.size(), frames[i].front()->rtp_header.get_sequence(), frames[i].back()->rtp_header.get_sequence());
|
|
|
|
}
|
|
|
|
|
|
|
|
for (size_t n = 0; n < frames[i].size(); ++n) {
|
|
|
|
srs_freep(frames[i][n]);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
srs_error_t SrsRtcPublisher::collect_video_frame()
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-23 09:08:21 +00:00
|
|
|
std::vector<std::vector<SrsRtpSharedPacket*> > frames;
|
|
|
|
rtp_video_queue->get_and_clean_collected_frames(frames);
|
|
|
|
|
|
|
|
for (size_t i = 0; i < frames.size(); ++i) {
|
|
|
|
if (! frames[i].empty()) {
|
2020-04-23 15:14:30 +00:00
|
|
|
srs_verbose("collect %d video frames, seq range %u,%u",
|
|
|
|
frames.size(), frames[i].front()->rtp_header.get_sequence(),
|
|
|
|
frames[i].back()->rtp_header.get_sequence());
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
int frame_size = 5;
|
|
|
|
vector<uint32_t> nalu_lens;
|
|
|
|
cal_rtp_frame_size(frames[i], frame_size, nalu_lens);
|
2020-04-23 09:08:21 +00:00
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
uint8_t* frame_buffer = new uint8_t[frame_size];
|
|
|
|
// Skip flv video tag header.
|
|
|
|
int frame_buffer_index = 5;
|
2020-04-23 09:08:21 +00:00
|
|
|
|
|
|
|
bool video_header_change = false;
|
|
|
|
int64_t timestamp = 0;
|
|
|
|
|
|
|
|
bool idr = false;
|
|
|
|
size_t len_index = 0;
|
|
|
|
for (size_t n = 0; n < frames[i].size(); ++n) {
|
|
|
|
SrsRtpH264Header* rtp_h264_header = dynamic_cast<SrsRtpH264Header*>(frames[i][n]->rtp_payload_header);
|
|
|
|
for (size_t j = 0; j < rtp_h264_header->nalu_offset.size(); ++j) {
|
|
|
|
timestamp = frames[i][n]->rtp_header.get_timestamp();
|
|
|
|
|
|
|
|
uint8_t* p = reinterpret_cast<uint8_t*>(frames[i][n]->rtp_payload() + rtp_h264_header->nalu_offset[j].first);
|
|
|
|
if (rtp_h264_header->nalu_type != kFuA) {
|
|
|
|
if ((p[0] & kNalTypeMask) == SrsAvcNaluTypeSPS) {
|
|
|
|
string cur_sps = string((char*)p, rtp_h264_header->nalu_offset[j].second);
|
|
|
|
if (! cur_sps.empty() && sps != cur_sps) {
|
|
|
|
video_header_change = true;
|
|
|
|
sps = cur_sps;
|
|
|
|
}
|
|
|
|
} else if ((p[0] & kNalTypeMask) == SrsAvcNaluTypePPS) {
|
|
|
|
string cur_pps = string((char*)p, rtp_h264_header->nalu_offset[j].second);
|
|
|
|
if (! cur_pps.empty() && pps != cur_pps) {
|
|
|
|
video_header_change = true;
|
|
|
|
pps = cur_pps;
|
|
|
|
}
|
|
|
|
} else if (((p[0] & kNalTypeMask) != SrsAvcNaluTypeAccessUnitDelimiter) && ((p[0] & kNalTypeMask) != SrsAvcNaluTypeSEI)) {
|
2020-04-23 15:14:30 +00:00
|
|
|
uint32_t len = nalu_lens[len_index++];
|
|
|
|
SrsBuffer stream((char*)frame_buffer + frame_buffer_index, 4);
|
2020-04-23 09:08:21 +00:00
|
|
|
stream.write_4bytes(len);
|
2020-04-23 15:14:30 +00:00
|
|
|
frame_buffer_index += 4;
|
|
|
|
memcpy(frame_buffer + frame_buffer_index, p, rtp_h264_header->nalu_offset[j].second);
|
|
|
|
frame_buffer_index += rtp_h264_header->nalu_offset[j].second;
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (frames[i][n]->rtp_payload_header->is_first_packet_of_frame) {
|
2020-04-23 15:14:30 +00:00
|
|
|
uint32_t len = nalu_lens[len_index++];
|
|
|
|
SrsBuffer stream((char*)frame_buffer + frame_buffer_index, 4);
|
2020-04-23 09:08:21 +00:00
|
|
|
stream.write_4bytes(len);
|
2020-04-23 15:14:30 +00:00
|
|
|
frame_buffer_index += 4;
|
|
|
|
frame_buffer[frame_buffer_index++] = rtp_h264_header->nalu_header;
|
2020-04-23 09:08:21 +00:00
|
|
|
|
|
|
|
if ((rtp_h264_header->nalu_header & kNalTypeMask) == SrsAvcNaluTypeIDR) {
|
|
|
|
idr = true;
|
|
|
|
}
|
|
|
|
}
|
2020-04-23 15:14:30 +00:00
|
|
|
memcpy(frame_buffer + frame_buffer_index, frames[i][n]->rtp_payload() + rtp_h264_header->nalu_offset[j].first,
|
2020-04-23 09:08:21 +00:00
|
|
|
rtp_h264_header->nalu_offset[j].second);
|
2020-04-23 15:14:30 +00:00
|
|
|
frame_buffer_index += rtp_h264_header->nalu_offset[j].second;
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
srs_freep(frames[i][n]);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (video_header_change) {
|
|
|
|
srs_verbose("sps/pps change or init");
|
|
|
|
|
|
|
|
uint8_t* video_header = new uint8_t[1500];
|
|
|
|
SrsBuffer *stream = new SrsBuffer((char*)video_header, 1500);
|
|
|
|
SrsAutoFree(SrsBuffer, stream);
|
|
|
|
stream->write_1bytes(0x17);
|
|
|
|
stream->write_1bytes(0x00);
|
|
|
|
stream->write_1bytes(0x00);
|
|
|
|
stream->write_1bytes(0x00);
|
|
|
|
stream->write_1bytes(0x00);
|
|
|
|
|
2020-04-23 15:14:30 +00:00
|
|
|
// FIXME: Replace magic number.
|
2020-04-23 09:08:21 +00:00
|
|
|
stream->write_1bytes(0x01);
|
|
|
|
stream->write_1bytes(0x42);
|
|
|
|
stream->write_1bytes(0xC0);
|
|
|
|
stream->write_1bytes(0x1E);
|
|
|
|
stream->write_1bytes(0xFF);
|
|
|
|
stream->write_1bytes(0xE1);
|
|
|
|
|
|
|
|
stream->write_2bytes(sps.size());
|
|
|
|
stream->write_string(sps);
|
|
|
|
|
|
|
|
stream->write_1bytes(0x01);
|
|
|
|
|
|
|
|
stream->write_2bytes(pps.size());
|
|
|
|
stream->write_string(pps);
|
|
|
|
|
|
|
|
SrsMessageHeader header;
|
|
|
|
header.message_type = 9;
|
2020-04-26 05:30:17 +00:00
|
|
|
// TODO: FIXME: Maybe the tbn is not 90k.
|
2020-04-23 09:08:21 +00:00
|
|
|
header.timestamp = timestamp / 90;
|
|
|
|
SrsCommonMessage* shared_video = new SrsCommonMessage();
|
|
|
|
SrsAutoFree(SrsCommonMessage, shared_video);
|
|
|
|
shared_video->create(&header, reinterpret_cast<char*>(video_header), stream->pos());
|
|
|
|
srs_error_t e = source->on_video(shared_video);
|
|
|
|
if (e != srs_success) {
|
|
|
|
srs_warn("on video header err=%s", srs_error_desc(e).c_str());
|
2020-04-23 15:14:30 +00:00
|
|
|
srs_error_reset(e);
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
srs_verbose("rtp on video header");
|
|
|
|
}
|
|
|
|
|
2020-04-26 05:30:17 +00:00
|
|
|
if (!sps.empty() && !pps.empty()) {
|
2020-04-23 09:08:21 +00:00
|
|
|
if (idr) {
|
2020-04-23 15:14:30 +00:00
|
|
|
frame_buffer[0] = 0x17;
|
2020-04-23 09:08:21 +00:00
|
|
|
} else {
|
2020-04-23 15:14:30 +00:00
|
|
|
frame_buffer[0] = 0x27;
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
2020-04-23 15:14:30 +00:00
|
|
|
frame_buffer[1] = 0x01;
|
|
|
|
frame_buffer[2] = 0x00;
|
|
|
|
frame_buffer[3] = 0x00;
|
|
|
|
frame_buffer[4] = 0x00;
|
2020-04-23 09:08:21 +00:00
|
|
|
|
|
|
|
SrsMessageHeader header;
|
|
|
|
header.message_type = 9;
|
2020-04-26 05:30:17 +00:00
|
|
|
// TODO: FIXME: Maybe the tbn is not 90k.
|
2020-04-23 09:08:21 +00:00
|
|
|
header.timestamp = timestamp / 90;
|
|
|
|
SrsCommonMessage* shared_video = new SrsCommonMessage();
|
|
|
|
SrsAutoFree(SrsCommonMessage, shared_video);
|
2020-04-23 15:14:30 +00:00
|
|
|
shared_video->create(&header, reinterpret_cast<char*>(frame_buffer), frame_buffer_index);
|
2020-04-23 09:08:21 +00:00
|
|
|
srs_error_t e = source->on_video(shared_video);
|
|
|
|
if (e != srs_success) {
|
|
|
|
srs_warn("on video err=%s", srs_error_desc(e).c_str());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-26 05:30:17 +00:00
|
|
|
void SrsRtcPublisher::update_sendonly_socket(SrsUdpMuxSocket* skt)
|
|
|
|
{
|
|
|
|
srs_trace("session %s address changed, update %s -> %s",
|
|
|
|
rtc_session->id().c_str(), sendonly_ukt->get_peer_id().c_str(), skt->get_peer_id().c_str());
|
|
|
|
|
|
|
|
srs_freep(sendonly_ukt);
|
|
|
|
sendonly_ukt = skt->copy_sendonly();
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsRtcPublisher::notify(int type, srs_utime_t interval, srs_utime_t tick)
|
|
|
|
{
|
|
|
|
if (sendonly_ukt) {
|
|
|
|
// TODO: FIXME: Check error.
|
|
|
|
send_rtcp_rr(sendonly_ukt, video_ssrc, rtp_video_queue);
|
|
|
|
send_rtcp_rr(sendonly_ukt, audio_ssrc, rtp_audio_queue);
|
|
|
|
send_rtcp_xr_rrtr(sendonly_ukt, video_ssrc);
|
|
|
|
send_rtcp_xr_rrtr(sendonly_ukt, audio_ssrc);
|
|
|
|
}
|
|
|
|
|
|
|
|
return srs_success;
|
|
|
|
}
|
2020-04-23 09:08:21 +00:00
|
|
|
|
2020-04-26 08:12:23 +00:00
|
|
|
SrsRtcSession::SrsRtcSession(SrsRtcServer* s, SrsRequest* r, const std::string& un, int context_id)
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
2020-03-12 16:24:56 +00:00
|
|
|
username = un;
|
2020-04-26 08:12:23 +00:00
|
|
|
req = r->copy();
|
2020-03-17 04:33:08 +00:00
|
|
|
cid = context_id;
|
2020-04-07 08:05:31 +00:00
|
|
|
encrypt = true;
|
2020-04-08 05:30:28 +00:00
|
|
|
|
2020-04-26 11:00:36 +00:00
|
|
|
source = NULL;
|
2020-04-25 14:30:55 +00:00
|
|
|
publisher = NULL;
|
2020-04-26 11:00:36 +00:00
|
|
|
sender = NULL;
|
|
|
|
rtc_server = s;
|
|
|
|
dtls_session = new SrsDtlsSession(this);
|
|
|
|
|
|
|
|
session_state = INIT;
|
|
|
|
last_stun_time = 0;
|
|
|
|
sessionStunTimeout = 0;
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
SrsRtcSession::~SrsRtcSession()
|
|
|
|
{
|
2020-04-25 14:30:55 +00:00
|
|
|
srs_freep(sender);
|
|
|
|
srs_freep(publisher);
|
2020-03-12 16:24:56 +00:00
|
|
|
srs_freep(dtls_session);
|
2020-04-26 08:12:23 +00:00
|
|
|
srs_freep(req);
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-03-30 07:16:29 +00:00
|
|
|
void SrsRtcSession::set_local_sdp(const SrsSdp& sdp)
|
|
|
|
{
|
|
|
|
local_sdp = sdp;
|
|
|
|
}
|
|
|
|
|
2020-03-17 04:33:08 +00:00
|
|
|
void SrsRtcSession::switch_to_context()
|
|
|
|
{
|
|
|
|
_srs_context->set_id(cid);
|
|
|
|
}
|
|
|
|
|
2020-04-26 11:00:36 +00:00
|
|
|
srs_error_t SrsRtcSession::initialize()
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if ((err = dtls_session->initialize(req)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "init");
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: FIXME: Support reload.
|
|
|
|
sessionStunTimeout = _srs_config->get_rtc_stun_timeout(req->vhost);
|
|
|
|
last_stun_time = srs_get_system_time();
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcSession::on_stun(SrsUdpMuxSocket* skt, SrsStunPacket* stun_req)
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-03-07 16:30:31 +00:00
|
|
|
if (stun_req->is_binding_request()) {
|
2020-04-10 11:21:47 +00:00
|
|
|
if ((err = on_binding_request(skt, stun_req)) != srs_success) {
|
2020-03-07 16:30:31 +00:00
|
|
|
return srs_error_wrap(err, "stun binding request failed");
|
|
|
|
}
|
2020-03-06 15:01:48 +00:00
|
|
|
|
2020-04-02 13:31:06 +00:00
|
|
|
last_stun_time = srs_get_system_time();
|
2020-03-12 16:24:56 +00:00
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
if (sender && sender->sendonly_ukt) {
|
2020-04-02 13:31:06 +00:00
|
|
|
// We are running in the ice-lite(server) mode. If client have multi network interface,
|
|
|
|
// we only choose one candidate pair which is determined by client.
|
2020-04-25 14:30:55 +00:00
|
|
|
if (stun_req->get_use_candidate() && sender->sendonly_ukt->get_peer_id() != skt->get_peer_id()) {
|
|
|
|
sender->update_sendonly_socket(skt);
|
2020-04-02 13:31:06 +00:00
|
|
|
}
|
2020-03-22 08:54:31 +00:00
|
|
|
}
|
2020-04-23 15:14:30 +00:00
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
if (publisher && publisher->sendonly_ukt) {
|
2020-04-23 15:14:30 +00:00
|
|
|
// We are running in the ice-lite(server) mode. If client have multi network interface,
|
|
|
|
// we only choose one candidate pair which is determined by client.
|
2020-04-25 14:30:55 +00:00
|
|
|
if (stun_req->get_use_candidate() && publisher->sendonly_ukt->get_peer_id() != skt->get_peer_id()) {
|
|
|
|
publisher->update_sendonly_socket(skt);
|
2020-04-23 15:14:30 +00:00
|
|
|
}
|
|
|
|
}
|
2020-03-22 08:54:31 +00:00
|
|
|
}
|
|
|
|
|
2020-02-28 15:18:39 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-03-28 12:52:42 +00:00
|
|
|
#ifdef SRS_AUTO_OSX
|
|
|
|
// These functions are similar to the older byteorder(3) family of functions.
|
|
|
|
// For example, be32toh() is identical to ntohl().
|
|
|
|
// @see https://linux.die.net/man/3/be32toh
|
|
|
|
#define be32toh ntohl
|
|
|
|
#endif
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcSession::on_binding_request(SrsUdpMuxSocket* skt, SrsStunPacket* stun_req)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
2020-03-07 16:30:31 +00:00
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-26 08:12:23 +00:00
|
|
|
bool strict_check = _srs_config->get_rtc_stun_strict_check(req->vhost);
|
2020-04-08 15:24:59 +00:00
|
|
|
if (strict_check && stun_req->get_ice_controlled()) {
|
|
|
|
// @see: https://tools.ietf.org/html/draft-ietf-ice-rfc5245bis-00#section-6.1.3.1
|
|
|
|
// TODO: Send 487 (Role Conflict) error response.
|
2020-04-02 13:31:06 +00:00
|
|
|
return srs_error_new(ERROR_RTC_STUN, "Peer must not in ice-controlled role in ice-lite mode.");
|
|
|
|
}
|
|
|
|
|
2020-03-07 16:30:31 +00:00
|
|
|
SrsStunPacket stun_binding_response;
|
2020-04-09 11:38:50 +00:00
|
|
|
char buf[kRtpPacketSize];
|
2020-03-07 16:30:31 +00:00
|
|
|
SrsBuffer* stream = new SrsBuffer(buf, sizeof(buf));
|
|
|
|
SrsAutoFree(SrsBuffer, stream);
|
|
|
|
|
|
|
|
stun_binding_response.set_message_type(BindingResponse);
|
|
|
|
stun_binding_response.set_local_ufrag(stun_req->get_remote_ufrag());
|
|
|
|
stun_binding_response.set_remote_ufrag(stun_req->get_local_ufrag());
|
|
|
|
stun_binding_response.set_transcation_id(stun_req->get_transcation_id());
|
|
|
|
// FIXME: inet_addr is deprecated, IPV6 support
|
2020-04-10 11:21:47 +00:00
|
|
|
stun_binding_response.set_mapped_address(be32toh(inet_addr(skt->get_peer_ip().c_str())));
|
|
|
|
stun_binding_response.set_mapped_port(skt->get_peer_port());
|
2020-03-07 16:30:31 +00:00
|
|
|
|
2020-03-16 14:35:24 +00:00
|
|
|
if ((err = stun_binding_response.encode(get_local_sdp()->get_ice_pwd(), stream)) != srs_success) {
|
2020-03-07 16:30:31 +00:00
|
|
|
return srs_error_wrap(err, "stun binding response encode failed");
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
if ((err = skt->sendto(stream->data(), stream->pos(), 0)) != srs_success) {
|
2020-03-07 16:30:31 +00:00
|
|
|
return srs_error_wrap(err, "stun binding response send failed");
|
|
|
|
}
|
|
|
|
|
|
|
|
if (get_session_state() == WAITING_STUN) {
|
|
|
|
set_session_state(DOING_DTLS_HANDSHAKE);
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
peer_id = skt->get_peer_id();
|
2020-03-07 16:30:31 +00:00
|
|
|
rtc_server->insert_into_id_sessions(peer_id, this);
|
2020-04-09 06:34:48 +00:00
|
|
|
|
|
|
|
set_session_state(DOING_DTLS_HANDSHAKE);
|
|
|
|
srs_trace("rtc session=%s, STUN done, waitting DTLS handshake.", id().c_str());
|
2020-03-07 16:30:31 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcSession::on_rtcp_feedback(char* buf, int nb_buf, SrsUdpMuxSocket* skt)
|
2020-03-14 14:11:01 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if (nb_buf < 12) {
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp feedback packet, nb_buf=%d", nb_buf);
|
2020-03-14 14:11:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
|
|
|
|
SrsAutoFree(SrsBuffer, stream);
|
|
|
|
|
|
|
|
// @see: https://tools.ietf.org/html/rfc4585#section-6.1
|
|
|
|
/*
|
2020-04-09 00:20:55 +00:00
|
|
|
0 1 2 3
|
2020-03-14 14:11:01 +00:00
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
|V=2|P| FMT | PT | length |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| SSRC of packet sender |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| SSRC of media source |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
: Feedback Control Information (FCI) :
|
|
|
|
: :
|
|
|
|
*/
|
2020-03-17 01:16:52 +00:00
|
|
|
/*uint8_t first = */stream->read_1bytes();
|
|
|
|
//uint8_t version = first & 0xC0;
|
|
|
|
//uint8_t padding = first & 0x20;
|
|
|
|
//uint8_t fmt = first & 0x1F;
|
2020-03-14 14:11:01 +00:00
|
|
|
|
2020-03-17 01:16:52 +00:00
|
|
|
/*uint8_t payload_type = */stream->read_1bytes();
|
|
|
|
/*uint16_t length = */stream->read_2bytes();
|
|
|
|
/*uint32_t ssrc_of_sender = */stream->read_4bytes();
|
|
|
|
/*uint32_t ssrc_of_media_source = */stream->read_4bytes();
|
2020-03-14 14:11:01 +00:00
|
|
|
|
|
|
|
/*
|
2020-04-09 00:20:55 +00:00
|
|
|
0 1 2 3
|
2020-03-14 14:11:01 +00:00
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| PID | BLP |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
2020-04-09 00:20:55 +00:00
|
|
|
*/
|
2020-03-14 14:11:01 +00:00
|
|
|
|
|
|
|
uint16_t pid = stream->read_2bytes();
|
|
|
|
int blp = stream->read_2bytes();
|
|
|
|
|
|
|
|
srs_verbose("pid=%u, blp=%d", pid, blp);
|
|
|
|
|
|
|
|
vector<SrsRtpSharedPacket*> resend_pkts;
|
2020-04-26 08:12:23 +00:00
|
|
|
// TODO: FIXME: Support ARQ.
|
|
|
|
SrsRtpSharedPacket* pkt = NULL; // source->find_rtp_packet(pid);
|
2020-03-14 14:11:01 +00:00
|
|
|
if (pkt) {
|
|
|
|
resend_pkts.push_back(pkt);
|
|
|
|
}
|
|
|
|
|
|
|
|
uint16_t mask = 0x01;
|
2020-04-01 06:37:14 +00:00
|
|
|
for (int i = 1; i < 16 && blp; ++i, mask <<= 1) {
|
2020-03-14 14:11:01 +00:00
|
|
|
if (! (blp & mask)) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t loss_seq = pid + i;
|
|
|
|
|
2020-04-26 08:12:23 +00:00
|
|
|
// TODO: FIXME: Support ARQ.
|
|
|
|
(void)loss_seq;
|
|
|
|
SrsRtpSharedPacket* pkt = NULL; // source->find_rtp_packet(loss_seq);
|
2020-03-14 14:11:01 +00:00
|
|
|
if (! pkt) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
resend_pkts.push_back(pkt);
|
|
|
|
}
|
|
|
|
|
2020-03-17 01:16:52 +00:00
|
|
|
for (int i = 0; i < (int)resend_pkts.size(); ++i) {
|
2020-03-14 14:11:01 +00:00
|
|
|
if (dtls_session) {
|
2020-04-09 01:56:13 +00:00
|
|
|
char* protected_buf = new char[kRtpPacketSize];
|
2020-03-14 14:11:01 +00:00
|
|
|
int nb_protected_buf = resend_pkts[i]->size;
|
|
|
|
|
2020-04-08 06:45:26 +00:00
|
|
|
srs_verbose("resend pkt sequence=%u", resend_pkts[i]->rtp_header.get_sequence());
|
2020-03-14 14:11:01 +00:00
|
|
|
|
2020-04-25 10:59:02 +00:00
|
|
|
// TODO: FIXME: Check error.
|
2020-03-14 14:11:01 +00:00
|
|
|
dtls_session->protect_rtp(protected_buf, resend_pkts[i]->payload, nb_protected_buf);
|
2020-04-10 11:21:47 +00:00
|
|
|
skt->sendto(protected_buf, nb_protected_buf, 0);
|
2020-03-14 14:11:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcSession::on_rtcp_ps_feedback(char* buf, int nb_buf, SrsUdpMuxSocket* skt)
|
2020-03-14 14:11:01 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if (nb_buf < 12) {
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp feedback packet, nb_buf=%d", nb_buf);
|
2020-03-14 14:11:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
|
|
|
|
SrsAutoFree(SrsBuffer, stream);
|
|
|
|
|
|
|
|
uint8_t first = stream->read_1bytes();
|
2020-03-17 01:16:52 +00:00
|
|
|
//uint8_t version = first & 0xC0;
|
|
|
|
//uint8_t padding = first & 0x20;
|
2020-03-14 14:11:01 +00:00
|
|
|
uint8_t fmt = first & 0x1F;
|
|
|
|
|
2020-03-17 01:16:52 +00:00
|
|
|
// TODO: FIXME: Dead code?
|
|
|
|
/*uint8_t payload_type = */stream->read_1bytes();
|
|
|
|
/*uint16_t length = */stream->read_2bytes();
|
|
|
|
/*uint32_t ssrc_of_sender = */stream->read_4bytes();
|
|
|
|
/*uint32_t ssrc_of_media_source = */stream->read_4bytes();
|
2020-03-14 14:11:01 +00:00
|
|
|
|
|
|
|
switch (fmt) {
|
|
|
|
case kPLI: {
|
|
|
|
srs_verbose("pli");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kSLI: {
|
|
|
|
srs_verbose("sli");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kRPSI: {
|
|
|
|
srs_verbose("rpsi");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kAFB: {
|
|
|
|
srs_verbose("afb");
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
default: {
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "unknown payload specific feedback=%u", fmt);
|
2020-03-14 14:11:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-23 09:08:21 +00:00
|
|
|
srs_error_t SrsRtcSession::on_rtcp_xr(char* buf, int nb_buf, SrsUdpMuxSocket* skt)
|
|
|
|
{
|
2020-04-25 14:30:55 +00:00
|
|
|
if (publisher == NULL) {
|
2020-04-23 16:06:59 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "rtc publisher null");
|
|
|
|
}
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
return publisher->on_rtcp_xr(buf, nb_buf, skt);
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsRtcSession::on_rtcp_sender_report(char* buf, int nb_buf, SrsUdpMuxSocket* skt)
|
|
|
|
{
|
2020-04-25 14:30:55 +00:00
|
|
|
if (publisher == NULL) {
|
2020-04-23 16:06:59 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "rtc publisher null");
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
return publisher->on_rtcp_sender_report(buf, nb_buf, skt);
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcSession::on_rtcp_receiver_report(char* buf, int nb_buf, SrsUdpMuxSocket* skt)
|
2020-03-14 14:11:01 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if (nb_buf < 8) {
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtp receiver report packet, nb_buf=%d", nb_buf);
|
2020-03-14 14:11:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
SrsBuffer* stream = new SrsBuffer(buf, nb_buf);
|
|
|
|
SrsAutoFree(SrsBuffer, stream);
|
|
|
|
|
|
|
|
// @see: https://tools.ietf.org/html/rfc3550#section-6.4.2
|
|
|
|
/*
|
2020-04-09 00:20:55 +00:00
|
|
|
0 1 2 3
|
2020-03-14 14:11:01 +00:00
|
|
|
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
header |V=2|P| RC | PT=RR=201 | length |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| SSRC of packet sender |
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
report | SSRC_1 (SSRC of first source) |
|
|
|
|
block +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
1 | fraction lost | cumulative number of packets lost |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| extended highest sequence number received |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| interarrival jitter |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| last SR (LSR) |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
| delay since last SR (DLSR) |
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
report | SSRC_2 (SSRC of second source) |
|
|
|
|
block +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
2 : ... :
|
|
|
|
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
|
|
|
| profile-specific extensions |
|
|
|
|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|
|
|
|
*/
|
|
|
|
uint8_t first = stream->read_1bytes();
|
2020-03-17 01:16:52 +00:00
|
|
|
//uint8_t version = first & 0xC0;
|
|
|
|
//uint8_t padding = first & 0x20;
|
2020-03-14 14:11:01 +00:00
|
|
|
uint8_t rc = first & 0x1F;
|
|
|
|
|
2020-03-17 01:16:52 +00:00
|
|
|
/*uint8_t payload_type = */stream->read_1bytes();
|
2020-03-14 14:11:01 +00:00
|
|
|
uint16_t length = stream->read_2bytes();
|
2020-03-17 01:16:52 +00:00
|
|
|
/*uint32_t ssrc_of_sender = */stream->read_4bytes();
|
2020-03-14 14:11:01 +00:00
|
|
|
|
|
|
|
if (((length + 1) * 4) != (rc * 24 + 8)) {
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "invalid rtcp receiver packet, length=%u, rc=%u", length, rc);
|
2020-03-14 14:11:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
for (int i = 0; i < rc; ++i) {
|
|
|
|
uint32_t ssrc = stream->read_4bytes();
|
|
|
|
uint8_t fraction_lost = stream->read_1bytes();
|
|
|
|
uint32_t cumulative_number_of_packets_lost = stream->read_3bytes();
|
|
|
|
uint32_t highest_seq = stream->read_4bytes();
|
|
|
|
uint32_t jitter = stream->read_4bytes();
|
|
|
|
uint32_t lst = stream->read_4bytes();
|
|
|
|
uint32_t dlsr = stream->read_4bytes();
|
|
|
|
|
2020-03-17 01:16:52 +00:00
|
|
|
(void)ssrc; (void)fraction_lost; (void)cumulative_number_of_packets_lost; (void)highest_seq; (void)jitter; (void)lst; (void)dlsr;
|
2020-03-14 14:11:01 +00:00
|
|
|
srs_verbose("ssrc=%u, fraction_lost=%u, cumulative_number_of_packets_lost=%u, highest_seq=%u, jitter=%u, lst=%u, dlst=%u",
|
|
|
|
ssrc, fraction_lost, cumulative_number_of_packets_lost, highest_seq, jitter, lst, dlsr);
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcSession::on_connection_established(SrsUdpMuxSocket* skt)
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
2020-04-23 16:06:59 +00:00
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
srs_trace("rtc session=%s, to=%dms connection established", id().c_str(), srsu2msi(sessionStunTimeout));
|
|
|
|
|
|
|
|
if (! local_sdp.media_descs_.empty() &&
|
|
|
|
(local_sdp.media_descs_.back().recvonly_ || local_sdp.media_descs_.back().sendrecv_)) {
|
|
|
|
if ((err = start_publish(skt)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "start publish");
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
2020-04-23 16:06:59 +00:00
|
|
|
}
|
2020-04-23 09:08:21 +00:00
|
|
|
|
2020-04-23 16:06:59 +00:00
|
|
|
if (! local_sdp.media_descs_.empty() &&
|
|
|
|
(local_sdp.media_descs_.back().sendonly_ || local_sdp.media_descs_.back().sendrecv_)) {
|
|
|
|
if ((err = start_play(skt)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "start play");
|
|
|
|
}
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
|
|
|
|
2020-04-23 16:06:59 +00:00
|
|
|
return err;
|
2020-03-09 11:46:27 +00:00
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcSession::start_play(SrsUdpMuxSocket* skt)
|
2020-03-09 11:46:27 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
srs_freep(sender);
|
|
|
|
sender = new SrsRtcSenderThread(this, skt, _srs_context->get_id());
|
2020-03-30 07:16:29 +00:00
|
|
|
|
|
|
|
uint32_t video_ssrc = 0;
|
|
|
|
uint32_t audio_ssrc = 0;
|
|
|
|
uint16_t video_payload_type = 0;
|
|
|
|
uint16_t audio_payload_type = 0;
|
2020-04-01 06:56:31 +00:00
|
|
|
for (size_t i = 0; i < local_sdp.media_descs_.size(); ++i) {
|
2020-03-30 07:16:29 +00:00
|
|
|
const SrsMediaDesc& media_desc = local_sdp.media_descs_[i];
|
|
|
|
if (media_desc.is_audio()) {
|
|
|
|
audio_ssrc = media_desc.ssrc_infos_[0].ssrc_;
|
|
|
|
audio_payload_type = media_desc.payload_types_[0].payload_type_;
|
|
|
|
} else if (media_desc.is_video()) {
|
|
|
|
video_ssrc = media_desc.ssrc_infos_[0].ssrc_;
|
|
|
|
video_payload_type = media_desc.payload_types_[0].payload_type_;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
if ((err = sender->initialize(video_ssrc, audio_ssrc, video_payload_type, audio_payload_type)) != srs_success) {
|
2020-03-30 07:16:29 +00:00
|
|
|
return srs_error_wrap(err, "SrsRtcSenderThread init");
|
|
|
|
}
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
if ((err = sender->start()) != srs_success) {
|
2020-03-16 14:35:24 +00:00
|
|
|
return srs_error_wrap(err, "start SrsRtcSenderThread");
|
|
|
|
}
|
2020-03-09 11:46:27 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-23 16:06:59 +00:00
|
|
|
srs_error_t SrsRtcSession::start_publish(SrsUdpMuxSocket* skt)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
srs_freep(publisher);
|
|
|
|
publisher = new SrsRtcPublisher(this);
|
2020-04-23 16:06:59 +00:00
|
|
|
|
|
|
|
uint32_t video_ssrc = 0;
|
|
|
|
uint32_t audio_ssrc = 0;
|
|
|
|
for (size_t i = 0; i < remote_sdp.media_descs_.size(); ++i) {
|
|
|
|
const SrsMediaDesc& media_desc = remote_sdp.media_descs_[i];
|
|
|
|
if (media_desc.is_audio()) {
|
|
|
|
if (! media_desc.ssrc_infos_.empty()) {
|
|
|
|
audio_ssrc = media_desc.ssrc_infos_[0].ssrc_;
|
|
|
|
}
|
|
|
|
} else if (media_desc.is_video()) {
|
|
|
|
if (! media_desc.ssrc_infos_.empty()) {
|
|
|
|
video_ssrc = media_desc.ssrc_infos_[0].ssrc_;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// FIXME: err process.
|
2020-04-26 08:12:23 +00:00
|
|
|
if ((err = publisher->initialize(skt, video_ssrc, audio_ssrc, req)) != srs_success) {
|
2020-04-23 16:06:59 +00:00
|
|
|
return srs_error_wrap(err, "rtc publisher init");
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-08 05:30:28 +00:00
|
|
|
bool SrsRtcSession::is_stun_timeout()
|
|
|
|
{
|
|
|
|
return last_stun_time + sessionStunTimeout < srs_get_system_time();
|
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcSession::on_dtls(SrsUdpMuxSocket* skt)
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
2020-04-10 11:21:47 +00:00
|
|
|
return dtls_session->on_dtls(skt);
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcSession::on_rtcp(SrsUdpMuxSocket* skt)
|
2020-03-12 16:24:56 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
2020-03-14 14:11:01 +00:00
|
|
|
|
2020-03-12 16:24:56 +00:00
|
|
|
if (dtls_session == NULL) {
|
2020-03-16 14:35:24 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "recv unexpect rtp packet before dtls done");
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
2020-03-11 11:21:44 +00:00
|
|
|
|
2020-04-09 11:38:50 +00:00
|
|
|
char unprotected_buf[kRtpPacketSize];
|
2020-04-10 11:21:47 +00:00
|
|
|
int nb_unprotected_buf = skt->size();
|
|
|
|
if ((err = dtls_session->unprotect_rtcp(unprotected_buf, skt->data(), nb_unprotected_buf)) != srs_success) {
|
2020-03-12 16:24:56 +00:00
|
|
|
return srs_error_wrap(err, "rtcp unprotect failed");
|
2020-03-11 11:21:44 +00:00
|
|
|
}
|
|
|
|
|
2020-03-14 14:11:01 +00:00
|
|
|
char* ph = unprotected_buf;
|
|
|
|
int nb_left = nb_unprotected_buf;
|
|
|
|
while (nb_left) {
|
|
|
|
uint8_t payload_type = ph[1];
|
|
|
|
uint16_t length_4bytes = (((uint16_t)ph[2]) << 8) | ph[3];
|
2020-03-12 16:24:56 +00:00
|
|
|
|
2020-03-14 14:11:01 +00:00
|
|
|
int length = (length_4bytes + 1) * 4;
|
|
|
|
|
|
|
|
if (length > nb_unprotected_buf) {
|
2020-03-16 14:35:24 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "invalid rtcp packet, length=%u", length);
|
2020-03-14 14:11:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
srs_verbose("on rtcp, payload_type=%u", payload_type);
|
|
|
|
|
|
|
|
switch (payload_type) {
|
|
|
|
case kSR: {
|
2020-04-23 09:08:21 +00:00
|
|
|
err = on_rtcp_sender_report(ph, length, skt);
|
2020-03-14 14:11:01 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kRR: {
|
2020-04-10 11:21:47 +00:00
|
|
|
err = on_rtcp_receiver_report(ph, length, skt);
|
2020-03-14 14:11:01 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kSDES: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kBye: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kApp: {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kRtpFb: {
|
2020-04-10 11:21:47 +00:00
|
|
|
err = on_rtcp_feedback(ph, length, skt);
|
2020-03-14 14:11:01 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case kPsFb: {
|
2020-04-10 11:21:47 +00:00
|
|
|
err = on_rtcp_ps_feedback(ph, length, skt);
|
2020-03-14 14:11:01 +00:00
|
|
|
break;
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
2020-04-25 14:30:55 +00:00
|
|
|
case kXR: {
|
2020-04-23 09:08:21 +00:00
|
|
|
err = on_rtcp_xr(ph, length, skt);
|
|
|
|
break;
|
2020-03-14 14:11:01 +00:00
|
|
|
}
|
|
|
|
default:{
|
2020-03-18 10:12:37 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP_CHECK, "unknown rtcp type=%u", payload_type);
|
2020-03-14 14:11:01 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-16 14:35:24 +00:00
|
|
|
if (err != srs_success) {
|
|
|
|
return srs_error_wrap(err, "rtcp");
|
2020-03-14 14:11:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ph += length;
|
|
|
|
nb_left -= length;
|
2020-03-10 11:47:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-23 09:08:21 +00:00
|
|
|
srs_error_t SrsRtcSession::on_rtp(SrsUdpMuxSocket* skt)
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
if (publisher == NULL) {
|
2020-04-23 16:06:59 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "rtc publisher null");
|
|
|
|
}
|
|
|
|
|
2020-04-23 09:08:21 +00:00
|
|
|
if (dtls_session == NULL) {
|
|
|
|
return srs_error_new(ERROR_RTC_RTCP, "recv unexpect rtp packet before dtls done");
|
|
|
|
}
|
|
|
|
|
|
|
|
char* unprotected_buf = new char[1460];
|
|
|
|
int nb_unprotected_buf = skt->size();
|
|
|
|
if ((err = dtls_session->unprotect_rtp(unprotected_buf, skt->data(), nb_unprotected_buf)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "rtp unprotect failed");
|
|
|
|
}
|
|
|
|
|
2020-04-25 14:30:55 +00:00
|
|
|
return publisher->on_rtp(skt, unprotected_buf, nb_unprotected_buf);
|
2020-04-23 09:08:21 +00:00
|
|
|
}
|
|
|
|
|
2020-04-13 01:13:12 +00:00
|
|
|
SrsUdpMuxSender::SrsUdpMuxSender(SrsRtcServer* s)
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
2020-04-13 01:13:12 +00:00
|
|
|
lfd = NULL;
|
|
|
|
server = s;
|
2020-04-05 08:53:08 +00:00
|
|
|
|
|
|
|
waiting_msgs = false;
|
|
|
|
cond = srs_cond_new();
|
|
|
|
trd = new SrsDummyCoroutine();
|
2020-04-09 11:38:50 +00:00
|
|
|
|
|
|
|
cache_pos = 0;
|
2020-04-17 04:30:53 +00:00
|
|
|
max_sendmmsg = 0;
|
|
|
|
queue_length = 0;
|
2020-04-18 02:35:30 +00:00
|
|
|
extra_ratio = 0;
|
|
|
|
extra_queue = 0;
|
|
|
|
gso = false;
|
|
|
|
nn_senders = 0;
|
2020-04-10 10:14:33 +00:00
|
|
|
|
|
|
|
_srs_config->subscribe(this);
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-04-13 01:13:12 +00:00
|
|
|
SrsUdpMuxSender::~SrsUdpMuxSender()
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
2020-04-10 10:14:33 +00:00
|
|
|
_srs_config->unsubscribe(this);
|
2020-04-05 08:53:08 +00:00
|
|
|
|
|
|
|
srs_freep(trd);
|
|
|
|
srs_cond_destroy(cond);
|
2020-04-07 11:47:04 +00:00
|
|
|
|
2020-04-09 11:38:50 +00:00
|
|
|
free_mhdrs(hotspot);
|
|
|
|
hotspot.clear();
|
|
|
|
|
|
|
|
free_mhdrs(cache);
|
|
|
|
cache.clear();
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-04-17 04:30:53 +00:00
|
|
|
srs_error_t SrsUdpMuxSender::initialize(srs_netfd_t fd, int senders)
|
2020-04-13 01:13:12 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
lfd = fd;
|
|
|
|
|
|
|
|
srs_freep(trd);
|
|
|
|
trd = new SrsSTCoroutine("udp", this);
|
|
|
|
if ((err = trd->start()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "start coroutine");
|
|
|
|
}
|
|
|
|
|
|
|
|
max_sendmmsg = _srs_config->get_rtc_server_sendmmsg();
|
2020-04-18 02:35:30 +00:00
|
|
|
gso = _srs_config->get_rtc_server_gso();
|
2020-04-17 04:30:53 +00:00
|
|
|
queue_length = srs_max(128, _srs_config->get_rtc_server_queue_length());
|
2020-04-18 02:35:30 +00:00
|
|
|
nn_senders = senders;
|
2020-04-17 06:24:24 +00:00
|
|
|
|
|
|
|
// For no GSO, we need larger queue.
|
|
|
|
if (!gso) {
|
|
|
|
queue_length *= 2;
|
|
|
|
}
|
|
|
|
|
2020-04-18 02:35:30 +00:00
|
|
|
srs_trace("RTC sender #%d init ok, max_sendmmsg=%d, gso=%d, queue_max=%dx%d, extra_ratio=%d/%d", srs_netfd_fileno(fd),
|
|
|
|
max_sendmmsg, gso, queue_length, nn_senders, extra_ratio, extra_queue);
|
2020-04-13 01:13:12 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
void SrsUdpMuxSender::free_mhdrs(std::vector<mmsghdr>& mhdrs)
|
|
|
|
{
|
2020-04-16 23:10:16 +00:00
|
|
|
int nn_mhdrs = (int)mhdrs.size();
|
|
|
|
for (int i = 0; i < nn_mhdrs; i++) {
|
|
|
|
// @see https://linux.die.net/man/2/sendmmsg
|
|
|
|
// @see https://linux.die.net/man/2/sendmsg
|
2020-04-13 01:13:12 +00:00
|
|
|
mmsghdr* hdr = &mhdrs[i];
|
|
|
|
|
2020-04-13 15:40:30 +00:00
|
|
|
// Free control for GSO.
|
|
|
|
char* msg_control = (char*)hdr->msg_hdr.msg_control;
|
2020-04-16 23:10:16 +00:00
|
|
|
srs_freepa(msg_control);
|
2020-04-13 15:40:30 +00:00
|
|
|
|
|
|
|
// Free iovec.
|
2020-04-16 23:10:16 +00:00
|
|
|
for (int j = SRS_PERF_RTC_GSO_MAX - 1; j >= 0 ; j--) {
|
2020-04-13 01:13:12 +00:00
|
|
|
iovec* iov = hdr->msg_hdr.msg_iov + j;
|
|
|
|
char* data = (char*)iov->iov_base;
|
2020-04-16 23:10:16 +00:00
|
|
|
srs_freepa(data);
|
2020-04-15 14:11:03 +00:00
|
|
|
srs_freepa(iov);
|
2020-04-13 01:13:12 +00:00
|
|
|
}
|
|
|
|
}
|
2020-04-13 15:40:30 +00:00
|
|
|
mhdrs.clear();
|
2020-04-13 01:13:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsUdpMuxSender::fetch(mmsghdr** pphdr)
|
|
|
|
{
|
|
|
|
// TODO: FIXME: Maybe need to shrink?
|
|
|
|
if (cache_pos >= (int)cache.size()) {
|
2020-04-16 23:10:16 +00:00
|
|
|
// @see https://linux.die.net/man/2/sendmmsg
|
|
|
|
// @see https://linux.die.net/man/2/sendmsg
|
2020-04-13 01:13:12 +00:00
|
|
|
mmsghdr mhdr;
|
|
|
|
|
|
|
|
mhdr.msg_len = 0;
|
2020-04-16 23:10:16 +00:00
|
|
|
mhdr.msg_hdr.msg_flags = 0;
|
|
|
|
mhdr.msg_hdr.msg_control = NULL;
|
2020-04-13 01:13:12 +00:00
|
|
|
|
2020-04-16 23:10:16 +00:00
|
|
|
mhdr.msg_hdr.msg_iovlen = SRS_PERF_RTC_GSO_MAX;
|
2020-04-15 14:11:03 +00:00
|
|
|
mhdr.msg_hdr.msg_iov = new iovec[mhdr.msg_hdr.msg_iovlen];
|
2020-04-16 23:10:16 +00:00
|
|
|
memset((void*)mhdr.msg_hdr.msg_iov, 0, sizeof(iovec) * mhdr.msg_hdr.msg_iovlen);
|
2020-04-15 14:11:03 +00:00
|
|
|
|
2020-04-16 23:10:16 +00:00
|
|
|
for (int i = 0; i < SRS_PERF_RTC_GSO_IOVS; i++) {
|
2020-04-15 14:11:03 +00:00
|
|
|
iovec* p = mhdr.msg_hdr.msg_iov + i;
|
|
|
|
p->iov_base = new char[kRtpPacketSize];
|
|
|
|
}
|
2020-04-13 01:13:12 +00:00
|
|
|
|
|
|
|
cache.push_back(mhdr);
|
|
|
|
}
|
|
|
|
|
|
|
|
*pphdr = &cache[cache_pos++];
|
|
|
|
return srs_success;
|
|
|
|
}
|
|
|
|
|
2020-04-17 04:30:53 +00:00
|
|
|
bool SrsUdpMuxSender::overflow()
|
|
|
|
{
|
2020-04-18 02:35:30 +00:00
|
|
|
return cache_pos > queue_length + extra_queue;
|
|
|
|
}
|
|
|
|
|
|
|
|
void SrsUdpMuxSender::set_extra_ratio(int r)
|
|
|
|
{
|
|
|
|
// We use the larger extra ratio, because all vhosts shares the senders.
|
|
|
|
if (extra_ratio > r) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
extra_ratio = r;
|
|
|
|
extra_queue = queue_length * r / 100;
|
|
|
|
|
|
|
|
srs_trace("RTC sender #%d extra queue, max_sendmmsg=%d, gso=%d, queue_max=%dx%d, extra_ratio=%d/%d, cache=%d/%d/%d", srs_netfd_fileno(lfd),
|
|
|
|
max_sendmmsg, gso, queue_length, nn_senders, extra_ratio, extra_queue, cache_pos, (int)cache.size(), (int)hotspot.size());
|
2020-04-17 04:30:53 +00:00
|
|
|
}
|
|
|
|
|
2020-04-13 01:13:12 +00:00
|
|
|
srs_error_t SrsUdpMuxSender::sendmmsg(mmsghdr* hdr)
|
|
|
|
{
|
|
|
|
if (waiting_msgs) {
|
|
|
|
waiting_msgs = false;
|
|
|
|
srs_cond_signal(cond);
|
|
|
|
}
|
|
|
|
|
|
|
|
return srs_success;
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsUdpMuxSender::cycle()
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-04-14 01:20:21 +00:00
|
|
|
uint64_t nn_msgs = 0; uint64_t nn_msgs_last = 0; int nn_msgs_max = 0;
|
2020-04-18 14:55:38 +00:00
|
|
|
uint64_t nn_bytes = 0; int nn_bytes_max = 0;
|
2020-04-14 01:20:21 +00:00
|
|
|
uint64_t nn_gso_msgs = 0; uint64_t nn_gso_iovs = 0; int nn_gso_msgs_max = 0; int nn_gso_iovs_max = 0;
|
|
|
|
int nn_loop = 0; int nn_wait = 0;
|
2020-04-13 01:13:12 +00:00
|
|
|
srs_utime_t time_last = srs_get_system_time();
|
2020-04-16 10:37:37 +00:00
|
|
|
|
|
|
|
bool stat_enabled = _srs_config->get_rtc_server_perf_stat();
|
2020-04-13 01:13:12 +00:00
|
|
|
SrsStatistic* stat = SrsStatistic::instance();
|
|
|
|
|
2020-04-13 01:32:48 +00:00
|
|
|
SrsPithyPrint* pprint = SrsPithyPrint::create_rtc_send(srs_netfd_fileno(lfd));
|
2020-04-13 01:13:12 +00:00
|
|
|
SrsAutoFree(SrsPithyPrint, pprint);
|
|
|
|
|
|
|
|
while (true) {
|
|
|
|
if ((err = trd->pull()) != srs_success) {
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
nn_loop++;
|
|
|
|
|
|
|
|
int pos = cache_pos;
|
2020-04-14 01:20:21 +00:00
|
|
|
int gso_iovs = 0;
|
2020-04-16 11:33:10 +00:00
|
|
|
if (pos <= 0) {
|
2020-04-13 01:13:12 +00:00
|
|
|
waiting_msgs = true;
|
|
|
|
nn_wait++;
|
|
|
|
srs_cond_wait(cond);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
// We are working on hotspot now.
|
|
|
|
cache.swap(hotspot);
|
|
|
|
cache_pos = 0;
|
|
|
|
|
2020-04-16 11:33:10 +00:00
|
|
|
int gso_pos = 0;
|
2020-04-18 14:55:38 +00:00
|
|
|
int nn_writen = 0;
|
2020-04-14 02:58:53 +00:00
|
|
|
if (pos > 0) {
|
2020-04-14 01:20:21 +00:00
|
|
|
// Send out all messages.
|
2020-04-16 23:10:16 +00:00
|
|
|
// @see https://linux.die.net/man/2/sendmmsg
|
|
|
|
// @see https://linux.die.net/man/2/sendmsg
|
2020-04-14 02:05:55 +00:00
|
|
|
mmsghdr* p = &hotspot[0]; mmsghdr* end = p + pos;
|
2020-04-14 01:20:21 +00:00
|
|
|
for (p = &hotspot[0]; p < end; p += max_sendmmsg) {
|
|
|
|
int vlen = (int)(end - p);
|
|
|
|
vlen = srs_min(max_sendmmsg, vlen);
|
|
|
|
|
|
|
|
int r0 = srs_sendmmsg(lfd, p, (unsigned int)vlen, 0, SRS_UTIME_NO_TIMEOUT);
|
|
|
|
if (r0 != vlen) {
|
|
|
|
srs_warn("sendmmsg %d msgs, %d done", vlen, r0);
|
|
|
|
}
|
|
|
|
|
2020-04-16 10:37:37 +00:00
|
|
|
if (stat_enabled) {
|
|
|
|
stat->perf_on_sendmmsg_packets(vlen);
|
|
|
|
}
|
2020-04-14 01:20:21 +00:00
|
|
|
}
|
2020-04-18 14:55:38 +00:00
|
|
|
|
|
|
|
// Collect informations for GSO.
|
|
|
|
if (stat_enabled) {
|
|
|
|
// Stat the messages, iovs and bytes.
|
|
|
|
// @see https://linux.die.net/man/2/sendmmsg
|
|
|
|
// @see https://linux.die.net/man/2/sendmsg
|
|
|
|
for (int i = 0; i < pos; i++) {
|
|
|
|
mmsghdr* mhdr = &hotspot[i];
|
|
|
|
|
|
|
|
nn_writen += (int)mhdr->msg_len;
|
|
|
|
|
|
|
|
int real_iovs = mhdr->msg_hdr.msg_iovlen;
|
|
|
|
gso_pos++; nn_gso_msgs++; nn_gso_iovs += real_iovs;
|
|
|
|
gso_iovs += real_iovs;
|
|
|
|
}
|
2020-04-14 01:20:21 +00:00
|
|
|
}
|
2020-04-13 01:13:12 +00:00
|
|
|
}
|
|
|
|
|
2020-04-18 12:37:08 +00:00
|
|
|
if (!stat_enabled) {
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
2020-04-13 01:13:12 +00:00
|
|
|
// Increase total messages.
|
2020-04-17 02:42:04 +00:00
|
|
|
nn_msgs += pos + gso_iovs;
|
2020-04-13 01:13:12 +00:00
|
|
|
nn_msgs_max = srs_max(pos, nn_msgs_max);
|
2020-04-18 14:55:38 +00:00
|
|
|
nn_bytes += nn_writen;
|
|
|
|
nn_bytes_max = srs_max(nn_bytes_max, nn_writen);
|
2020-04-14 01:20:21 +00:00
|
|
|
nn_gso_msgs_max = srs_max(gso_pos, nn_gso_msgs_max);
|
|
|
|
nn_gso_iovs_max = srs_max(gso_iovs, nn_gso_iovs_max);
|
2020-04-13 01:13:12 +00:00
|
|
|
|
|
|
|
pprint->elapse();
|
|
|
|
if (pprint->can_print()) {
|
|
|
|
// TODO: FIXME: Extract a PPS calculator.
|
|
|
|
int pps_average = 0; int pps_last = 0;
|
|
|
|
if (true) {
|
|
|
|
if (srs_get_system_time() > srs_get_system_startup_time()) {
|
|
|
|
pps_average = (int)(nn_msgs * SRS_UTIME_SECONDS / (srs_get_system_time() - srs_get_system_startup_time()));
|
|
|
|
}
|
|
|
|
if (srs_get_system_time() > time_last) {
|
|
|
|
pps_last = (int)((nn_msgs - nn_msgs_last) * SRS_UTIME_SECONDS / (srs_get_system_time() - time_last));
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
string pps_unit = "";
|
|
|
|
if (pps_last > 10000 || pps_average > 10000) {
|
|
|
|
pps_unit = "(w)"; pps_last /= 10000; pps_average /= 10000;
|
|
|
|
} else if (pps_last > 1000 || pps_average > 1000) {
|
|
|
|
pps_unit = "(k)"; pps_last /= 1000; pps_average /= 1000;
|
|
|
|
}
|
|
|
|
|
2020-04-16 05:49:37 +00:00
|
|
|
int nn_cache = 0;
|
2020-04-16 10:25:11 +00:00
|
|
|
int nn_hotspot_size = (int)hotspot.size();
|
|
|
|
for (int i = 0; i < nn_hotspot_size; i++) {
|
|
|
|
mmsghdr* hdr = &hotspot[i];
|
|
|
|
nn_cache += hdr->msg_hdr.msg_iovlen;
|
2020-04-16 05:49:37 +00:00
|
|
|
}
|
|
|
|
|
2020-04-18 14:55:38 +00:00
|
|
|
srs_trace("-> RTC SEND #%d, sessions %d, udp %d/%d/%" PRId64 ", gso %d/%d/%" PRId64 ", iovs %d/%d/%" PRId64 ", pps %d/%d%s, cache %d/%d, bytes %d/%" PRId64,
|
2020-04-16 05:49:37 +00:00
|
|
|
srs_netfd_fileno(lfd), (int)server->nn_sessions(), pos, nn_msgs_max, nn_msgs, gso_pos, nn_gso_msgs_max, nn_gso_msgs, gso_iovs,
|
2020-04-18 14:55:38 +00:00
|
|
|
nn_gso_iovs_max, nn_gso_iovs, pps_average, pps_last, pps_unit.c_str(), (int)hotspot.size(), nn_cache, nn_bytes_max, nn_bytes);
|
2020-04-13 01:13:12 +00:00
|
|
|
nn_msgs_last = nn_msgs; time_last = srs_get_system_time();
|
|
|
|
nn_loop = nn_wait = nn_msgs_max = 0;
|
2020-04-14 01:20:21 +00:00
|
|
|
nn_gso_msgs_max = 0; nn_gso_iovs_max = 0;
|
2020-04-18 14:55:38 +00:00
|
|
|
nn_bytes_max = 0;
|
2020-04-13 01:13:12 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsUdpMuxSender::on_reload_rtc_server()
|
|
|
|
{
|
2020-04-14 01:20:21 +00:00
|
|
|
if (true) {
|
|
|
|
int v = _srs_config->get_rtc_server_sendmmsg();
|
|
|
|
if (max_sendmmsg != v) {
|
|
|
|
srs_trace("Reload max_sendmmsg %d=>%d", max_sendmmsg, v);
|
|
|
|
max_sendmmsg = v;
|
|
|
|
}
|
2020-04-13 01:13:12 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return srs_success;
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsRtcServer::SrsRtcServer()
|
|
|
|
{
|
|
|
|
timer = new SrsHourGlass(this, 1 * SRS_UTIME_SECONDS);
|
|
|
|
}
|
|
|
|
|
|
|
|
SrsRtcServer::~SrsRtcServer()
|
|
|
|
{
|
|
|
|
srs_freep(timer);
|
|
|
|
|
|
|
|
if (true) {
|
|
|
|
vector<SrsUdpMuxListener*>::iterator it;
|
|
|
|
for (it = listeners.begin(); it != listeners.end(); ++it) {
|
|
|
|
SrsUdpMuxListener* listener = *it;
|
|
|
|
srs_freep(listener);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (true) {
|
|
|
|
vector<SrsUdpMuxSender*>::iterator it;
|
|
|
|
for (it = senders.begin(); it != senders.end(); ++it) {
|
|
|
|
SrsUdpMuxSender* sender = *it;
|
|
|
|
srs_freep(sender);
|
|
|
|
}
|
|
|
|
}
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t SrsRtcServer::initialize()
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-03-19 04:58:04 +00:00
|
|
|
if ((err = timer->tick(1 * SRS_UTIME_SECONDS)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "hourglass tick");
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((err = timer->start()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "start timer");
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
|
|
|
|
2020-04-13 01:13:12 +00:00
|
|
|
srs_trace("RTC server init ok");
|
2020-04-05 08:53:08 +00:00
|
|
|
|
2020-02-28 15:18:39 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-03-17 10:11:03 +00:00
|
|
|
srs_error_t SrsRtcServer::listen_udp()
|
2020-03-17 09:56:37 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-03-21 13:26:30 +00:00
|
|
|
if (!_srs_config->get_rtc_server_enabled()) {
|
2020-03-17 09:56:37 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-03-21 13:26:30 +00:00
|
|
|
int port = _srs_config->get_rtc_server_listen();
|
2020-03-17 09:56:37 +00:00
|
|
|
if (port <= 0) {
|
|
|
|
return srs_error_new(ERROR_RTC_PORT, "invalid port=%d", port);
|
|
|
|
}
|
|
|
|
|
|
|
|
string ip = srs_any_address_for_listener();
|
2020-04-12 00:55:43 +00:00
|
|
|
srs_assert(listeners.empty());
|
2020-03-17 09:56:37 +00:00
|
|
|
|
2020-04-12 00:55:43 +00:00
|
|
|
int nn_listeners = _srs_config->get_rtc_server_reuseport();
|
|
|
|
for (int i = 0; i < nn_listeners; i++) {
|
2020-04-13 01:13:12 +00:00
|
|
|
SrsUdpMuxSender* sender = new SrsUdpMuxSender(this);
|
|
|
|
SrsUdpMuxListener* listener = new SrsUdpMuxListener(this, sender, ip, port);
|
2020-03-17 09:56:37 +00:00
|
|
|
|
2020-04-12 00:55:43 +00:00
|
|
|
if ((err = listener->listen()) != srs_success) {
|
|
|
|
srs_freep(listener);
|
|
|
|
return srs_error_wrap(err, "listen %s:%d", ip.c_str(), port);
|
|
|
|
}
|
2020-03-17 09:56:37 +00:00
|
|
|
|
2020-04-17 04:30:53 +00:00
|
|
|
if ((err = sender->initialize(listener->stfd(), nn_listeners)) != srs_success) {
|
2020-04-13 01:13:12 +00:00
|
|
|
return srs_error_wrap(err, "init sender");
|
|
|
|
}
|
2020-03-17 09:56:37 +00:00
|
|
|
|
2020-04-12 00:55:43 +00:00
|
|
|
srs_trace("rtc listen at udp://%s:%d, fd=%d", ip.c_str(), port, listener->fd());
|
|
|
|
listeners.push_back(listener);
|
2020-04-13 01:13:12 +00:00
|
|
|
senders.push_back(sender);
|
2020-04-12 00:55:43 +00:00
|
|
|
}
|
2020-03-17 09:56:37 +00:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcServer::on_udp_packet(SrsUdpMuxSocket* skt)
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
2020-04-10 11:21:47 +00:00
|
|
|
if (is_stun(reinterpret_cast<const uint8_t*>(skt->data()), skt->size())) {
|
|
|
|
return on_stun(skt);
|
|
|
|
} else if (is_dtls(reinterpret_cast<const uint8_t*>(skt->data()), skt->size())) {
|
|
|
|
return on_dtls(skt);
|
|
|
|
} else if (is_rtp_or_rtcp(reinterpret_cast<const uint8_t*>(skt->data()), skt->size())) {
|
|
|
|
return on_rtp_or_rtcp(skt);
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-03-16 14:35:24 +00:00
|
|
|
return srs_error_new(ERROR_RTC_UDP, "unknown udp packet type");
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-03-17 10:11:03 +00:00
|
|
|
srs_error_t SrsRtcServer::listen_api()
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
// TODO: FIXME: Fetch api from hybrid manager.
|
|
|
|
SrsHttpServeMux* http_api_mux = _srs_hybrid->srs()->instance()->api_server();
|
2020-03-30 07:16:29 +00:00
|
|
|
if ((err = http_api_mux->handle("/rtc/v1/play/", new SrsGoApiRtcPlay(this))) != srs_success) {
|
2020-04-23 09:08:21 +00:00
|
|
|
return srs_error_wrap(err, "handle play");
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((err = http_api_mux->handle("/rtc/v1/publish/", new SrsGoApiRtcPublish(this))) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "handle publish");
|
2020-03-17 10:11:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-04-26 08:12:23 +00:00
|
|
|
srs_error_t SrsRtcServer::create_rtc_session(
|
|
|
|
SrsRequest* req, const SrsSdp& remote_sdp, SrsSdp& local_sdp, const std::string& mock_eip, bool publish,
|
|
|
|
SrsRtcSession** psession
|
|
|
|
) {
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
SrsSource* source = NULL;
|
|
|
|
|
|
|
|
// TODO: FIXME: Should refactor it, directly use http server as handler.
|
|
|
|
ISrsSourceHandler* handler = _srs_hybrid->srs()->instance();
|
|
|
|
if ((err = _srs_sources->fetch_or_create(req, handler, &source)) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "create source");
|
|
|
|
}
|
|
|
|
|
|
|
|
// TODO: FIXME: Refine the API for stream status manage.
|
|
|
|
if (!source->can_publish(false)) {
|
|
|
|
return srs_error_new(ERROR_RTC_SOURCE_BUSY, "stream %s busy", req->get_stream_url().c_str());
|
|
|
|
}
|
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
std::string local_pwd = gen_random_str(32);
|
2020-03-07 16:30:31 +00:00
|
|
|
std::string local_ufrag = "";
|
2020-03-12 16:24:56 +00:00
|
|
|
std::string username = "";
|
2020-03-06 15:01:48 +00:00
|
|
|
while (true) {
|
2020-03-07 16:30:31 +00:00
|
|
|
local_ufrag = gen_random_str(8);
|
|
|
|
|
2020-03-12 16:24:56 +00:00
|
|
|
username = local_ufrag + ":" + remote_sdp.get_ice_ufrag();
|
|
|
|
if (! map_username_session.count(username))
|
2020-03-06 15:01:48 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2020-03-17 04:33:08 +00:00
|
|
|
int cid = _srs_context->get_id();
|
2020-03-17 09:56:37 +00:00
|
|
|
SrsRtcSession* session = new SrsRtcSession(this, req, username, cid);
|
2020-04-26 11:00:36 +00:00
|
|
|
if ((err = session->initialize()) != srs_success) {
|
|
|
|
srs_freep(session);
|
|
|
|
return srs_error_wrap(err, "init");
|
|
|
|
}
|
|
|
|
|
2020-03-12 16:24:56 +00:00
|
|
|
map_username_session.insert(make_pair(username, session));
|
2020-04-26 11:00:36 +00:00
|
|
|
*psession = session;
|
2020-03-12 16:24:56 +00:00
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
local_sdp.set_ice_ufrag(local_ufrag);
|
|
|
|
local_sdp.set_ice_pwd(local_pwd);
|
2020-03-30 07:16:29 +00:00
|
|
|
local_sdp.set_fingerprint_algo("sha-256");
|
|
|
|
local_sdp.set_fingerprint(SrsDtls::instance()->get_fingerprint());
|
2020-04-07 03:36:26 +00:00
|
|
|
|
|
|
|
// We allows to mock the eip of server.
|
|
|
|
if (!mock_eip.empty()) {
|
|
|
|
local_sdp.add_candidate(mock_eip, _srs_config->get_rtc_server_listen(), "host");
|
|
|
|
} else {
|
|
|
|
std::vector<string> candidate_ips = get_candidate_ips();
|
|
|
|
for (int i = 0; i < (int)candidate_ips.size(); ++i) {
|
|
|
|
local_sdp.add_candidate(candidate_ips[i], _srs_config->get_rtc_server_listen(), "host");
|
|
|
|
}
|
2020-03-30 07:16:29 +00:00
|
|
|
}
|
2020-03-06 15:01:48 +00:00
|
|
|
|
|
|
|
session->set_remote_sdp(remote_sdp);
|
|
|
|
session->set_local_sdp(local_sdp);
|
|
|
|
|
|
|
|
session->set_session_state(WAITING_STUN);
|
|
|
|
|
2020-04-26 08:12:23 +00:00
|
|
|
return err;
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-03-07 16:30:31 +00:00
|
|
|
SrsRtcSession* SrsRtcServer::find_rtc_session_by_peer_id(const string& peer_id)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
2020-03-07 16:30:31 +00:00
|
|
|
map<string, SrsRtcSession*>::iterator iter = map_id_session.find(peer_id);
|
|
|
|
if (iter == map_id_session.end()) {
|
2020-03-06 15:01:48 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return iter->second;
|
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcServer::on_stun(SrsUdpMuxSocket* skt)
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-03-06 15:01:48 +00:00
|
|
|
SrsStunPacket stun_req;
|
2020-04-10 11:21:47 +00:00
|
|
|
if ((err = stun_req.decode(skt->data(), skt->size())) != srs_success) {
|
2020-03-07 16:30:31 +00:00
|
|
|
return srs_error_wrap(err, "decode stun packet failed");
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-04-02 13:31:06 +00:00
|
|
|
srs_verbose("recv stun packet from %s, use-candidate=%d, ice-controlled=%d, ice-controlling=%d",
|
2020-04-10 11:21:47 +00:00
|
|
|
skt->get_peer_id().c_str(), stun_req.get_use_candidate(), stun_req.get_ice_controlled(), stun_req.get_ice_controlling());
|
2020-04-02 13:31:06 +00:00
|
|
|
|
2020-03-07 16:30:31 +00:00
|
|
|
std::string username = stun_req.get_username();
|
|
|
|
SrsRtcSession* rtc_session = find_rtc_session_by_username(username);
|
2020-02-28 15:18:39 +00:00
|
|
|
if (rtc_session == NULL) {
|
2020-03-16 14:35:24 +00:00
|
|
|
return srs_error_new(ERROR_RTC_STUN, "can not find rtc_session, stun username=%s", username.c_str());
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-03-17 04:33:08 +00:00
|
|
|
// Now, we got the RTC session to handle the packet, switch to its context
|
|
|
|
// to make all logs write to the "correct" pid+cid.
|
|
|
|
rtc_session->switch_to_context();
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
return rtc_session->on_stun(skt, &stun_req);
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcServer::on_dtls(SrsUdpMuxSocket* skt)
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
2020-04-10 11:21:47 +00:00
|
|
|
SrsRtcSession* rtc_session = find_rtc_session_by_peer_id(skt->get_peer_id());
|
2020-03-06 15:01:48 +00:00
|
|
|
|
|
|
|
if (rtc_session == NULL) {
|
2020-04-10 11:21:47 +00:00
|
|
|
return srs_error_new(ERROR_RTC_DTLS, "can not find rtc session by peer_id=%s", skt->get_peer_id().c_str());
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
|
|
|
|
2020-03-17 04:33:08 +00:00
|
|
|
// Now, we got the RTC session to handle the packet, switch to its context
|
|
|
|
// to make all logs write to the "correct" pid+cid.
|
|
|
|
rtc_session->switch_to_context();
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
return rtc_session->on_dtls(skt);
|
2020-02-28 15:18:39 +00:00
|
|
|
}
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
srs_error_t SrsRtcServer::on_rtp_or_rtcp(SrsUdpMuxSocket* skt)
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
2020-03-10 11:47:49 +00:00
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
SrsRtcSession* rtc_session = find_rtc_session_by_peer_id(skt->get_peer_id());
|
2020-03-10 11:47:49 +00:00
|
|
|
|
|
|
|
if (rtc_session == NULL) {
|
2020-04-10 11:21:47 +00:00
|
|
|
return srs_error_new(ERROR_RTC_RTP, "can not find rtc session by peer_id=%s", skt->get_peer_id().c_str());
|
2020-03-10 11:47:49 +00:00
|
|
|
}
|
|
|
|
|
2020-03-17 04:33:08 +00:00
|
|
|
// Now, we got the RTC session to handle the packet, switch to its context
|
|
|
|
// to make all logs write to the "correct" pid+cid.
|
|
|
|
rtc_session->switch_to_context();
|
|
|
|
|
2020-04-10 11:21:47 +00:00
|
|
|
if (is_rtcp(reinterpret_cast<const uint8_t*>(skt->data()), skt->size())) {
|
|
|
|
err = rtc_session->on_rtcp(skt);
|
2020-03-12 16:24:56 +00:00
|
|
|
} else {
|
2020-04-23 09:08:21 +00:00
|
|
|
err = rtc_session->on_rtp(skt);
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
2020-03-10 11:47:49 +00:00
|
|
|
|
2020-02-28 15:18:39 +00:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2020-03-07 16:30:31 +00:00
|
|
|
SrsRtcSession* SrsRtcServer::find_rtc_session_by_username(const std::string& username)
|
2020-02-28 15:18:39 +00:00
|
|
|
{
|
2020-03-07 16:30:31 +00:00
|
|
|
map<string, SrsRtcSession*>::iterator iter = map_username_session.find(username);
|
|
|
|
if (iter == map_username_session.end()) {
|
2020-02-28 15:18:39 +00:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return iter->second;
|
|
|
|
}
|
2020-03-06 15:01:48 +00:00
|
|
|
|
2020-03-07 16:30:31 +00:00
|
|
|
bool SrsRtcServer::insert_into_id_sessions(const string& peer_id, SrsRtcSession* rtc_session)
|
2020-03-06 15:01:48 +00:00
|
|
|
{
|
2020-03-07 16:30:31 +00:00
|
|
|
return map_id_session.insert(make_pair(peer_id, rtc_session)).second;
|
2020-03-06 15:01:48 +00:00
|
|
|
}
|
2020-03-12 16:24:56 +00:00
|
|
|
|
|
|
|
void SrsRtcServer::check_and_clean_timeout_session()
|
|
|
|
{
|
|
|
|
map<string, SrsRtcSession*>::iterator iter = map_username_session.begin();
|
|
|
|
while (iter != map_username_session.end()) {
|
|
|
|
SrsRtcSession* session = iter->second;
|
|
|
|
if (session == NULL) {
|
|
|
|
map_username_session.erase(iter++);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (session->is_stun_timeout()) {
|
2020-03-17 04:41:50 +00:00
|
|
|
// Now, we got the RTC session to cleanup, switch to its context
|
|
|
|
// to make all logs write to the "correct" pid+cid.
|
|
|
|
session->switch_to_context();
|
|
|
|
|
2020-04-09 06:34:48 +00:00
|
|
|
srs_trace("rtc session=%s, STUN timeout", session->id().c_str());
|
2020-03-12 16:24:56 +00:00
|
|
|
map_username_session.erase(iter++);
|
|
|
|
map_id_session.erase(session->get_peer_id());
|
|
|
|
delete session;
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
|
|
|
|
++iter;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-03-19 04:58:04 +00:00
|
|
|
srs_error_t SrsRtcServer::notify(int type, srs_utime_t interval, srs_utime_t tick)
|
2020-03-12 16:24:56 +00:00
|
|
|
{
|
2020-03-19 04:58:04 +00:00
|
|
|
check_and_clean_timeout_session();
|
|
|
|
return srs_success;
|
2020-03-12 16:24:56 +00:00
|
|
|
}
|
2020-03-17 09:56:37 +00:00
|
|
|
|
|
|
|
RtcServerAdapter::RtcServerAdapter()
|
|
|
|
{
|
|
|
|
rtc = new SrsRtcServer();
|
|
|
|
}
|
|
|
|
|
|
|
|
RtcServerAdapter::~RtcServerAdapter()
|
|
|
|
{
|
|
|
|
srs_freep(rtc);
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t RtcServerAdapter::initialize()
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
|
|
|
if ((err = rtc->initialize()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "rtc server initialize");
|
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
srs_error_t RtcServerAdapter::run()
|
|
|
|
{
|
|
|
|
srs_error_t err = srs_success;
|
|
|
|
|
2020-03-17 10:11:03 +00:00
|
|
|
if ((err = rtc->listen_udp()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "listen udp");
|
2020-03-17 09:56:37 +00:00
|
|
|
}
|
|
|
|
|
2020-03-17 10:11:03 +00:00
|
|
|
if ((err = rtc->listen_api()) != srs_success) {
|
|
|
|
return srs_error_wrap(err, "listen api");
|
2020-03-17 09:56:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
void RtcServerAdapter::stop()
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|