Mercurial > mplayer.hg
annotate libmpdemux/asf_mmst_streaming.c @ 10677:1229ac59645c
Missing options in spanish version
author | nauj27 |
---|---|
date | Wed, 20 Aug 2003 13:11:10 +0000 |
parents | 620cc649f519 |
children | 48bb1fd37d2a |
rev | line source |
---|---|
6092 | 1 // mmst implementation taken from the xine-mms plugin made by majormms (http://geocities.com/majormms/) |
2 // | |
3 // ported to mplayer by Abhijeet Phatak <abhijeetphatak@yahoo.com> | |
4 // date : 16 April 2002 | |
5 // | |
6 // information about the mms protocol can be find at http://get.to/sdp | |
7 // | |
8 | |
9 | |
10 #include <stdio.h> | |
11 #include <stdlib.h> | |
12 #include <string.h> | |
13 #include <unistd.h> | |
14 #include <errno.h> | |
7880 | 15 #include <inttypes.h> |
6092 | 16 |
17 #include "config.h" | |
18 | |
10281 | 19 #ifndef HAVE_WINSOCK2 |
20 #define closesocket close | |
21 #else | |
22 #include <winsock2.h> | |
23 #endif | |
24 | |
6092 | 25 #include "url.h" |
26 #include "asf.h" | |
27 | |
28 #include "stream.h" | |
29 | |
30 #include "network.h" | |
31 | |
32 #define BUF_SIZE 102400 | |
33 | |
34 typedef struct | |
35 { | |
36 uint8_t buf[BUF_SIZE]; | |
37 int num_bytes; | |
38 | |
39 } command_t; | |
40 | |
7880 | 41 static int seq_num; |
42 static int num_stream_ids; | |
43 static int stream_ids[20]; | |
6092 | 44 |
45 static int get_data (int s, char *buf, size_t count); | |
46 | |
47 static void put_32 (command_t *cmd, uint32_t value) | |
48 { | |
49 cmd->buf[cmd->num_bytes ] = value % 256; | |
50 value = value >> 8; | |
51 cmd->buf[cmd->num_bytes+1] = value % 256 ; | |
52 value = value >> 8; | |
53 cmd->buf[cmd->num_bytes+2] = value % 256 ; | |
54 value = value >> 8; | |
55 cmd->buf[cmd->num_bytes+3] = value % 256 ; | |
56 | |
57 cmd->num_bytes += 4; | |
58 } | |
59 | |
60 static uint32_t get_32 (unsigned char *cmd, int offset) | |
61 { | |
62 uint32_t ret; | |
63 | |
64 ret = cmd[offset] ; | |
65 ret |= cmd[offset+1]<<8 ; | |
66 ret |= cmd[offset+2]<<16 ; | |
67 ret |= cmd[offset+3]<<24 ; | |
68 | |
69 return ret; | |
70 } | |
71 | |
72 static void send_command (int s, int command, uint32_t switches, | |
73 uint32_t extra, int length, | |
74 char *data) | |
75 { | |
76 command_t cmd; | |
77 int len8; | |
78 | |
79 len8 = (length + (length%8)) / 8; | |
80 | |
81 cmd.num_bytes = 0; | |
82 | |
83 put_32 (&cmd, 0x00000001); /* start sequence */ | |
84 put_32 (&cmd, 0xB00BFACE); /* #-)) */ | |
85 put_32 (&cmd, length + 32); | |
86 put_32 (&cmd, 0x20534d4d); /* protocol type "MMS " */ | |
87 put_32 (&cmd, len8 + 4); | |
88 put_32 (&cmd, seq_num); | |
89 seq_num++; | |
90 put_32 (&cmd, 0x0); /* unknown */ | |
91 put_32 (&cmd, 0x0); | |
92 put_32 (&cmd, len8+2); | |
93 put_32 (&cmd, 0x00030000 | command); /* dir | command */ | |
94 put_32 (&cmd, switches); | |
95 put_32 (&cmd, extra); | |
96 | |
97 memcpy (&cmd.buf[48], data, length); | |
98 | |
10206
35e306346e59
Using recv/send instead read/write for proper MinGW support (it's a 4.2BSD standard). Patch by FloDt <flodt8@yahoo.de>
alex
parents:
10183
diff
changeset
|
99 if (send (s, cmd.buf, length+48, 0) != (length+48)) { |
6092 | 100 printf ("write error\n"); |
101 } | |
102 } | |
103 | |
104 static void string_utf16(char *dest, char *src, int len) | |
105 { | |
106 int i; | |
107 | |
108 memset (dest, 0, 1000); | |
109 | |
110 for (i=0; i<len; i++) { | |
111 dest[i*2] = src[i]; | |
112 dest[i*2+1] = 0; | |
113 } | |
114 | |
115 dest[i*2] = 0; | |
116 dest[i*2+1] = 0; | |
117 } | |
118 | |
119 static void get_answer (int s) | |
120 { | |
121 char data[BUF_SIZE]; | |
122 int command = 0x1b; | |
123 | |
124 while (command == 0x1b) { | |
125 int len; | |
126 | |
10206
35e306346e59
Using recv/send instead read/write for proper MinGW support (it's a 4.2BSD standard). Patch by FloDt <flodt8@yahoo.de>
alex
parents:
10183
diff
changeset
|
127 len = recv (s, data, BUF_SIZE, 0) ; |
6092 | 128 if (!len) { |
129 printf ("\nalert! eof\n"); | |
130 return; | |
131 } | |
132 | |
133 command = get_32 (data, 36) & 0xFFFF; | |
134 | |
135 if (command == 0x1b) | |
136 send_command (s, 0x1b, 0, 0, 0, data); | |
137 } | |
138 } | |
139 | |
140 static int get_data (int s, char *buf, size_t count) | |
141 { | |
7953 | 142 ssize_t len; |
143 size_t total = 0; | |
6092 | 144 |
145 while (total < count) { | |
146 | |
10206
35e306346e59
Using recv/send instead read/write for proper MinGW support (it's a 4.2BSD standard). Patch by FloDt <flodt8@yahoo.de>
alex
parents:
10183
diff
changeset
|
147 len = recv (s, &buf[total], count-total, 0); |
6092 | 148 |
149 if (len<0) { | |
150 perror ("read error:"); | |
151 return 0; | |
152 } | |
153 | |
154 total += len; | |
155 | |
156 if (len != 0) { | |
157 // printf ("[%d/%d]", total, count); | |
158 fflush (stdout); | |
159 } | |
160 | |
161 } | |
162 | |
163 return 1; | |
164 | |
165 } | |
166 | |
167 static int get_header (int s, uint8_t *header, streaming_ctrl_t *streaming_ctrl) | |
168 { | |
169 unsigned char pre_header[8]; | |
7953 | 170 int header_len; |
6092 | 171 |
172 header_len = 0; | |
173 | |
174 while (1) { | |
175 if (!get_data (s, pre_header, 8)) { | |
176 printf ("pre-header read failed\n"); | |
177 return 0; | |
178 } | |
179 if (pre_header[4] == 0x02) { | |
180 | |
181 int packet_len; | |
182 | |
183 packet_len = (pre_header[7] << 8 | pre_header[6]) - 8; | |
184 | |
185 // printf ("asf header packet detected, len=%d\n", packet_len); | |
186 | |
187 if (!get_data (s, &header[header_len], packet_len)) { | |
188 printf ("header data read failed\n"); | |
189 return 0; | |
190 } | |
191 | |
192 header_len += packet_len; | |
193 | |
194 if ( (header[header_len-1] == 1) && (header[header_len-2]==1)) { | |
195 | |
196 | |
197 if( streaming_bufferize( streaming_ctrl, header, header_len )<0 ) { | |
198 return -1; | |
199 } | |
200 | |
201 // printf ("get header packet finished\n"); | |
202 | |
203 return (header_len); | |
204 | |
205 } | |
206 | |
207 } else { | |
208 | |
7953 | 209 int32_t packet_len; |
6092 | 210 int command; |
211 char data[BUF_SIZE]; | |
212 | |
7953 | 213 if (!get_data (s, (char*)&packet_len, 4)) { |
6092 | 214 printf ("packet_len read failed\n"); |
215 return 0; | |
216 } | |
217 | |
7953 | 218 packet_len = get_32 ((unsigned char*)&packet_len, 0) + 4; |
6092 | 219 |
220 // printf ("command packet detected, len=%d\n", packet_len); | |
221 | |
222 if (!get_data (s, data, packet_len)) { | |
223 printf ("command data read failed\n"); | |
224 return 0; | |
225 } | |
226 | |
227 command = get_32 (data, 24) & 0xFFFF; | |
228 | |
229 // printf ("command: %02x\n", command); | |
230 | |
231 if (command == 0x1b) | |
232 send_command (s, 0x1b, 0, 0, 0, data); | |
233 | |
234 } | |
235 | |
236 // printf ("get header packet succ\n"); | |
237 } | |
238 } | |
239 | |
7880 | 240 static int interp_header (uint8_t *header, int header_len) |
6092 | 241 { |
242 int i; | |
7472
c4434bdf6e51
tons of warning fixes, also some 10l bugfixes, including Dominik's PVA bug
arpi
parents:
7309
diff
changeset
|
243 int packet_length=-1; |
6092 | 244 |
245 /* | |
246 * parse header | |
247 */ | |
248 | |
249 i = 30; | |
250 while (i<header_len) { | |
251 | |
252 uint64_t guid_1, guid_2, length; | |
253 | |
254 guid_2 = (uint64_t)header[i] | ((uint64_t)header[i+1]<<8) | |
255 | ((uint64_t)header[i+2]<<16) | ((uint64_t)header[i+3]<<24) | |
256 | ((uint64_t)header[i+4]<<32) | ((uint64_t)header[i+5]<<40) | |
257 | ((uint64_t)header[i+6]<<48) | ((uint64_t)header[i+7]<<56); | |
258 i += 8; | |
259 | |
260 guid_1 = (uint64_t)header[i] | ((uint64_t)header[i+1]<<8) | |
261 | ((uint64_t)header[i+2]<<16) | ((uint64_t)header[i+3]<<24) | |
262 | ((uint64_t)header[i+4]<<32) | ((uint64_t)header[i+5]<<40) | |
263 | ((uint64_t)header[i+6]<<48) | ((uint64_t)header[i+7]<<56); | |
264 i += 8; | |
265 | |
266 // printf ("guid found: %016llx%016llx\n", guid_1, guid_2); | |
267 | |
268 length = (uint64_t)header[i] | ((uint64_t)header[i+1]<<8) | |
269 | ((uint64_t)header[i+2]<<16) | ((uint64_t)header[i+3]<<24) | |
270 | ((uint64_t)header[i+4]<<32) | ((uint64_t)header[i+5]<<40) | |
271 | ((uint64_t)header[i+6]<<48) | ((uint64_t)header[i+7]<<56); | |
272 | |
273 i += 8; | |
274 | |
275 if ( (guid_1 == 0x6cce6200aa00d9a6) && (guid_2 == 0x11cf668e75b22630) ) { | |
276 printf ("header object\n"); | |
277 } else if ((guid_1 == 0x6cce6200aa00d9a6) && (guid_2 == 0x11cf668e75b22636)) { | |
278 printf ("data object\n"); | |
279 } else if ((guid_1 == 0x6553200cc000e48e) && (guid_2 == 0x11cfa9478cabdca1)) { | |
280 | |
281 packet_length = get_32(header, i+92-24); | |
282 | |
283 printf ("file object, packet length = %d (%d)\n", | |
284 packet_length, get_32(header, i+96-24)); | |
285 | |
286 | |
287 } else if ((guid_1 == 0x6553200cc000e68e) && (guid_2 == 0x11cfa9b7b7dc0791)) { | |
288 | |
289 int stream_id = header[i+48] | header[i+49] << 8; | |
290 | |
291 printf ("stream object, stream id: %d\n", stream_id); | |
292 | |
293 stream_ids[num_stream_ids] = stream_id; | |
294 num_stream_ids++; | |
295 | |
296 } else { | |
297 printf ("unknown object\n"); | |
298 } | |
299 | |
300 // printf ("length : %lld\n", length); | |
301 | |
302 i += length-24; | |
303 | |
304 } | |
305 | |
306 return packet_length; | |
307 | |
308 } | |
309 | |
310 | |
7880 | 311 static int get_media_packet (int s, int padding, streaming_ctrl_t *stream_ctrl) { |
6092 | 312 unsigned char pre_header[8]; |
313 char data[BUF_SIZE]; | |
7880 | 314 |
315 if (!get_data (s, pre_header, 8)) { | |
316 printf ("pre-header read failed\n"); | |
317 return 0; | |
318 } | |
319 | |
320 // for (i=0; i<8; i++) | |
321 // printf ("pre_header[%d] = %02x (%d)\n", | |
322 // i, pre_header[i], pre_header[i]); | |
323 | |
324 if (pre_header[4] == 0x04) { | |
325 | |
326 int packet_len; | |
327 | |
328 packet_len = (pre_header[7] << 8 | pre_header[6]) - 8; | |
329 | |
330 // printf ("asf media packet detected, len=%d\n", packet_len); | |
331 | |
332 if (!get_data (s, data, packet_len)) { | |
333 printf ("media data read failed\n"); | |
334 return 0; | |
335 } | |
336 | |
337 streaming_bufferize(stream_ctrl, data, padding); | |
338 | |
339 } else { | |
340 | |
7953 | 341 int32_t packet_len; |
342 int command; | |
7880 | 343 |
7953 | 344 if (!get_data (s, (char*)&packet_len, 4)) { |
7880 | 345 printf ("packet_len read failed\n"); |
346 return 0; | |
347 } | |
348 | |
7953 | 349 packet_len = get_32 ((unsigned char*)&packet_len, 0) + 4; |
7880 | 350 |
351 if (!get_data (s, data, packet_len)) { | |
352 printf ("command data read failed\n"); | |
353 return 0; | |
354 } | |
355 | |
356 if ( (pre_header[7] != 0xb0) || (pre_header[6] != 0x0b) | |
357 || (pre_header[5] != 0xfa) || (pre_header[4] != 0xce) ) { | |
358 | |
359 printf ("missing signature\n"); | |
360 return -1; | |
361 } | |
362 | |
363 command = get_32 (data, 24) & 0xFFFF; | |
364 | |
7977 | 365 // printf ("\ncommand packet detected, len=%d cmd=0x%X\n", packet_len, command); |
7880 | 366 |
367 if (command == 0x1b) | |
368 send_command (s, 0x1b, 0, 0, 0, data); | |
369 else if (command == 0x1e) { | |
370 printf ("everything done. Thank you for downloading a media file containing proprietary and patentend technology.\n"); | |
371 return 0; | |
372 } | |
373 else if (command == 0x21 ) { | |
374 // Looks like it's new in WMS9 | |
375 // Unknown command, but ignoring it seems to work. | |
376 return 0; | |
377 } | |
378 else if (command != 0x05) { | |
379 printf ("unknown command %02x\n", command); | |
380 return -1; | |
381 } | |
382 } | |
383 | |
384 // printf ("get media packet succ\n"); | |
385 | |
386 return 1; | |
387 } | |
6092 | 388 |
389 | |
7880 | 390 static int packet_length1; |
6092 | 391 |
392 int | |
393 asf_mmst_streaming_read( int fd, char *buffer, int size, streaming_ctrl_t *stream_ctrl ) | |
394 { | |
7880 | 395 int len; |
396 | |
397 while( stream_ctrl->buffer_size==0 ) { | |
398 // buffer is empty - fill it! | |
399 int ret = get_media_packet( fd, packet_length1, stream_ctrl); | |
400 if( ret<0 ) { | |
401 printf("get_media_packet error : %s\n",strerror(errno)); | |
402 return -1; | |
403 } | |
404 } | |
405 | |
406 len = stream_ctrl->buffer_size-stream_ctrl->buffer_pos; | |
407 if(len>size) len=size; | |
6092 | 408 memcpy( buffer, (stream_ctrl->buffer)+(stream_ctrl->buffer_pos), len ); |
409 stream_ctrl->buffer_pos += len; | |
410 if( stream_ctrl->buffer_pos>=stream_ctrl->buffer_size ) { | |
411 free( stream_ctrl->buffer ); | |
412 stream_ctrl->buffer = NULL; | |
413 stream_ctrl->buffer_size = 0; | |
414 stream_ctrl->buffer_pos = 0; | |
415 } | |
7880 | 416 return len; |
6092 | 417 |
418 } | |
419 | |
420 int | |
421 asf_mmst_streaming_seek( int fd, off_t pos, streaming_ctrl_t *streaming_ctrl ) | |
422 { | |
423 return -1; | |
7953 | 424 // Shut up gcc warning |
425 fd++; | |
426 pos++; | |
427 streaming_ctrl=NULL; | |
6092 | 428 } |
429 | |
430 int asf_mmst_streaming_start(stream_t *stream) | |
431 { | |
432 char str[1024]; | |
10183 | 433 char data[BUF_SIZE]; |
6092 | 434 uint8_t asf_header[8192]; |
435 int asf_header_len; | |
436 int len, i, packet_length; | |
437 char *path; | |
438 URL_t *url1 = stream->streaming_ctrl->url; | |
7953 | 439 int s = stream->fd; |
6092 | 440 |
7250
27a1315d6af4
Checked if the connection succeeded before writing in the socket.
bertrand
parents:
6092
diff
changeset
|
441 if( s>0 ) { |
10281 | 442 closesocket( stream->fd ); |
7250
27a1315d6af4
Checked if the connection succeeded before writing in the socket.
bertrand
parents:
6092
diff
changeset
|
443 stream->fd = -1; |
27a1315d6af4
Checked if the connection succeeded before writing in the socket.
bertrand
parents:
6092
diff
changeset
|
444 } |
27a1315d6af4
Checked if the connection succeeded before writing in the socket.
bertrand
parents:
6092
diff
changeset
|
445 |
6092 | 446 /* parse url */ |
447 path = strchr(url1->file,'/') + 1; | |
448 | |
449 url1->port=1755; | |
10625
620cc649f519
ftp support. The change on connect2Server is needed bcs we need 2
albeu
parents:
10281
diff
changeset
|
450 s = connect2Server( url1->hostname, url1->port, 1); |
7250
27a1315d6af4
Checked if the connection succeeded before writing in the socket.
bertrand
parents:
6092
diff
changeset
|
451 if( s<0 ) { |
27a1315d6af4
Checked if the connection succeeded before writing in the socket.
bertrand
parents:
6092
diff
changeset
|
452 return s; |
27a1315d6af4
Checked if the connection succeeded before writing in the socket.
bertrand
parents:
6092
diff
changeset
|
453 } |
6092 | 454 printf ("connected\n"); |
7880 | 455 |
456 seq_num=0; | |
6092 | 457 |
458 /* | |
459 * Send the initial connect info including player version no. Client GUID (random) and the host address being connected to. | |
460 * This command is sent at the very start of protocol initiation. It sends local information to the serve | |
461 * cmd 1 0x01 | |
462 * */ | |
463 | |
10183 | 464 snprintf (str, 1023, "\034\003NSPlayer/7.0.0.1956; {33715801-BAB3-9D85-24E9-03B90328270A}; Host: %s", url1->hostname); |
6092 | 465 string_utf16 (data, str, strlen(str)+2); |
466 // send_command(s, commandno ....) | |
467 send_command (s, 1, 0, 0x0004000b, strlen(str) * 2+8, data); | |
468 | |
10206
35e306346e59
Using recv/send instead read/write for proper MinGW support (it's a 4.2BSD standard). Patch by FloDt <flodt8@yahoo.de>
alex
parents:
10183
diff
changeset
|
469 len = recv (s, data, BUF_SIZE, 0) ; |
6092 | 470 |
471 /*This sends details of the local machine IP address to a Funnel system at the server. | |
472 * Also, the TCP or UDP transport selection is sent. | |
473 * | |
474 * here 192.168.0.129 is local ip address TCP/UDP states the tronsport we r using | |
475 * and 1037 is the local TCP or UDP socket number | |
476 * cmd 2 0x02 | |
477 * */ | |
478 | |
479 string_utf16 (&data[8], "\002\000\\\\192.168.0.1\\TCP\\1037\0000", | |
480 28); | |
481 memset (data, 0, 8); | |
482 send_command (s, 2, 0, 0, 28*2+8, data); | |
483 | |
10206
35e306346e59
Using recv/send instead read/write for proper MinGW support (it's a 4.2BSD standard). Patch by FloDt <flodt8@yahoo.de>
alex
parents:
10183
diff
changeset
|
484 len = recv (s, data, BUF_SIZE, 0) ; |
6092 | 485 |
486 /* This command sends file path (at server) and file name request to the server. | |
487 * 0x5 */ | |
488 | |
489 string_utf16 (&data[8], path, strlen(path)); | |
490 memset (data, 0, 8); | |
491 send_command (s, 5, 0, 0, strlen(path)*2+12, data); | |
492 | |
493 get_answer (s); | |
494 | |
495 /* The ASF header chunk request. Includes ?session' variable for pre header value. | |
496 * After this command is sent, | |
497 * the server replies with 0x11 command and then the header chunk with header data follows. | |
498 * 0x15 */ | |
499 | |
500 memset (data, 0, 40); | |
501 data[32] = 2; | |
502 | |
503 send_command (s, 0x15, 1, 0, 40, data); | |
504 | |
505 num_stream_ids = 0; | |
506 /* get_headers(s, asf_header); */ | |
507 | |
508 asf_header_len = get_header (s, asf_header, stream->streaming_ctrl); | |
509 // printf("---------------------------------- asf_header %d\n",asf_header); | |
510 packet_length = interp_header (asf_header, asf_header_len); | |
511 | |
512 | |
513 /* | |
514 * This command is the media stream MBR selector. Switches are always 6 bytes in length. | |
515 * After all switch elements, data ends with bytes [00 00] 00 20 ac 40 [02]. | |
516 * Where: | |
517 * [00 00] shows 0x61 0x00 (on the first 33 sent) or 0xff 0xff for ASF files, and with no ending data for WMV files. | |
518 * It is not yet understood what all this means. | |
519 * And the last [02] byte is probably the header ?session' value. | |
520 * | |
521 * 0x33 */ | |
522 | |
523 memset (data, 0, 40); | |
524 | |
525 for (i=1; i<num_stream_ids; i++) { | |
526 data [ (i-1) * 6 + 2 ] = 0xFF; | |
527 data [ (i-1) * 6 + 3 ] = 0xFF; | |
528 data [ (i-1) * 6 + 4 ] = stream_ids[i]; | |
529 data [ (i-1) * 6 + 5 ] = 0x00; | |
530 } | |
531 | |
532 send_command (s, 0x33, num_stream_ids, 0xFFFF | stream_ids[0] << 16, (num_stream_ids-1)*6+2 , data); | |
533 | |
534 get_answer (s); | |
535 | |
536 /* Start sending file from packet xx. | |
537 * This command is also used for resume downloads or requesting a lost packet. | |
538 * Also used for seeking by sending a play point value which seeks to the media time point. | |
539 * Includes ?session' value in pre header and the maximum media stream time. | |
540 * 0x07 */ | |
541 | |
542 memset (data, 0, 40); | |
543 | |
544 for (i=8; i<16; i++) | |
545 data[i] = 0xFF; | |
546 | |
547 data[20] = 0x04; | |
548 | |
549 send_command (s, 0x07, 1, 0xFFFF | stream_ids[0] << 16, 24, data); | |
550 | |
7880 | 551 stream->fd = s; |
552 stream->streaming_ctrl->streaming_read = asf_mmst_streaming_read; | |
553 stream->streaming_ctrl->streaming_seek = asf_mmst_streaming_seek; | |
554 stream->streaming_ctrl->buffering = 1; | |
555 stream->streaming_ctrl->status = streaming_playing_e; | |
6092 | 556 |
7880 | 557 packet_length1 = packet_length; |
558 printf("mmst packet_length = %d\n",packet_length); | |
6092 | 559 |
560 return 0; | |
561 } |