/*
 *      Copyright (C) 2005-2008 Team XBMC
 *      http://www.xbmc.org
 *      Copyright (C) 2008-2009 Andrej Stepanchuk
 *      Copyright (C) 2009-2010 Howard Chu
 *
 *  This file is part of librtmp.
 *
 *  librtmp is free software; you can redistribute it and/or modify
 *  it under the terms of the GNU Lesser General Public License as
 *  published by the Free Software Foundation; either version 2.1,
 *  or (at your option) any later version.
 *
 *  librtmp is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 *  GNU General Public License for more details.
 *
 *  You should have received a copy of the GNU Lesser General Public License
 *  along with librtmp see the file COPYING.  If not, write to
 *  the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
 *  Boston, MA  02110-1301, USA.
 *  http://www.gnu.org/copyleft/lgpl.html
 */

#include <assert.h>
#include <limits.h>
#include <stdint.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>

#include "log.h"
#include "rtmp_sys.h"

#ifdef CRYPTO
#ifdef USE_POLARSSL
#include <polarssl/base64.h>
#include <polarssl/havege.h>
#include <polarssl/md5.h>
#define MD5_DIGEST_LENGTH 16

static const char *my_dhm_P = "E4004C1F94182000103D883A448B3F80"
                              "2CE4B44A83301270002C20D0321CFD00"
                              "11CCEF784C26A400F43DFB901BCA7538"
                              "F2C6B176001CF5A0FD16D2C48B1D0C1C"
                              "F6AC8E1DA6BCC3B4E1F96B0564965300"
                              "FFA1D0B601EB2800F489AA512C4B248C"
                              "01F76949A60BB7F00A40B1EAB64BDD48"
                              "E8A700D60B7F1200FA8E77B0A979DABF";

static const char *my_dhm_G = "4";

#elif defined(USE_GNUTLS)
#include <gnutls/gnutls.h>
#define MD5_DIGEST_LENGTH 16
#include <nettle/base64.h>
#include <nettle/md5.h>
#else /* USE_OPENSSL */
#include <openssl/bio.h>
#include <openssl/buffer.h>
#include <openssl/md5.h>
#include <openssl/rc4.h>
#include <openssl/ssl.h>
#endif
TLS_CTX RTMP_TLS_ctx;
#endif

#define RTMP_SIG_SIZE 1536
#define RTMP_LARGE_HEADER_SIZE 12

static const int packetSize[] = {12, 8, 4, 1};

int RTMP_ctrlC;

const char RTMPProtocolStrings[][7] = {
    "RTMP", "RTMPT", "RTMPE", "RTMPTE", "RTMPS", "RTMPTS", "", "", "RTMFP"};

const char RTMPProtocolStringsLower[][7] = {
    "rtmp", "rtmpt", "rtmpe", "rtmpte", "rtmps", "rtmpts", "", "", "rtmfp"};

static const char *RTMPT_cmds[] = {"open", "send", "idle", "close"};

typedef enum { RTMPT_OPEN = 0, RTMPT_SEND, RTMPT_IDLE, RTMPT_CLOSE } RTMPTCmd;

static int DumpMetaData(AMFObject *obj);
static int HandShake(RTMP *r, int FP9HandShake);
static int SocksNegotiate(RTMP *r);

static int SendConnectPacket(RTMP *r, RTMPPacket *cp);
static int SendCheckBW(RTMP *r);
static int SendCheckBWResult(RTMP *r, double txn);
static int SendDeleteStream(RTMP *r, double dStreamId);
static int SendFCSubscribe(RTMP *r, AVal *subscribepath);
static int SendPlay(RTMP *r);
static int SendBytesReceived(RTMP *r);
static int SendUsherToken(RTMP *r, AVal *usherToken);

#if 0 /* unused */
static int SendBGHasStream(RTMP *r, double dId, AVal *playpath);
#endif

static int HandleInvoke(RTMP *r, const char *body, unsigned int nBodySize);
static int HandleMetadata(RTMP *r, char *body, unsigned int len);
static void HandleChangeChunkSize(RTMP *r, const RTMPPacket *packet);
static void HandleAudio(RTMP *r, const RTMPPacket *packet);
static void HandleVideo(RTMP *r, const RTMPPacket *packet);
static void HandleCtrl(RTMP *r, const RTMPPacket *packet);
static void HandleServerBW(RTMP *r, const RTMPPacket *packet);
static void HandleClientBW(RTMP *r, const RTMPPacket *packet);

static int ReadN(RTMP *r, char *buffer, int n);
static int WriteN(RTMP *r, const char *buffer, int n);

static void DecodeTEA(AVal *key, AVal *text);

static int HTTP_Post(RTMP *r, RTMPTCmd cmd, const char *buf, int len);
static int HTTP_read(RTMP *r, int fill);

static void CloseInternal(RTMP *r, int reconnect);

#ifndef _WIN32
static int clk_tck;
#endif

#ifdef CRYPTO
#include "handshake.h"
#endif

uint32_t RTMP_GetTime() {
#ifdef _DEBUG
    return 0;
#elif defined(_WIN32)
    return timeGetTime();
#else
    struct tms t;
    if (!clk_tck)
        clk_tck = sysconf(_SC_CLK_TCK);
    return times(&t) * 1000 / clk_tck;
#endif
}

void RTMP_UserInterrupt() { RTMP_ctrlC = TRUE; }

void RTMPPacket_Reset(RTMPPacket *p) {
    p->m_headerType = 0;
    p->m_packetType = 0;
    p->m_nChannel = 0;
    p->m_nTimeStamp = 0;
    p->m_nInfoField2 = 0;
    p->m_hasAbsTimestamp = FALSE;
    p->m_nBodySize = 0;
    p->m_nBytesRead = 0;
}

int RTMPPacket_Alloc(RTMPPacket *p, uint32_t nSize) {
    char *ptr;
    if (nSize > SIZE_MAX - RTMP_MAX_HEADER_SIZE)
        return FALSE;
    ptr = calloc(1, nSize + RTMP_MAX_HEADER_SIZE);
    if (!ptr)
        return FALSE;
    p->m_body = ptr + RTMP_MAX_HEADER_SIZE;
    p->m_nBytesRead = 0;
    return TRUE;
}

void RTMPPacket_Free(RTMPPacket *p) {
    if (p->m_body) {
        free(p->m_body - RTMP_MAX_HEADER_SIZE);
        p->m_body = NULL;
    }
}

void RTMPPacket_Dump(RTMPPacket *p) {
    RTMP_Log(
        RTMP_LOGDEBUG,
        "RTMP PACKET: packet type: 0x%02x. channel: 0x%02x. info 1: %d info "
        "2: %d. Body size: %u. body: 0x%02x",
        p->m_packetType, p->m_nChannel, p->m_nTimeStamp, p->m_nInfoField2,
        p->m_nBodySize, p->m_body ? (unsigned char)p->m_body[0] : 0);
}

int RTMP_LibVersion() { return RTMP_LIB_VERSION; }

void RTMP_TLS_Init() {
#ifdef CRYPTO
#ifdef USE_POLARSSL
    /* Do this regardless of NO_SSL, we use havege for rtmpe too */
    RTMP_TLS_ctx = calloc(1, sizeof(struct tls_ctx));
    havege_init(&RTMP_TLS_ctx->hs);
#elif defined(USE_GNUTLS) && !defined(NO_SSL)
    /* Technically we need to initialize libgcrypt ourselves if
     * we're not going to call gnutls_global_init(). Ignoring this
     * for now.
     */
    gnutls_global_init();
    RTMP_TLS_ctx = malloc(sizeof(struct tls_ctx));
    gnutls_certificate_allocate_credentials(&RTMP_TLS_ctx->cred);
    gnutls_priority_init(&RTMP_TLS_ctx->prios, "NORMAL", NULL);
    gnutls_certificate_set_x509_trust_file(RTMP_TLS_ctx->cred, "ca.pem",
                                           GNUTLS_X509_FMT_PEM);
#elif !defined(NO_SSL) /* USE_OPENSSL */
    /* libcrypto doesn't need anything special */
    SSL_load_error_strings();
    SSL_library_init();
    OpenSSL_add_all_digests();
    RTMP_TLS_ctx = SSL_CTX_new(SSLv23_method());
    SSL_CTX_set_options(RTMP_TLS_ctx, SSL_OP_ALL);
    SSL_CTX_set_default_verify_paths(RTMP_TLS_ctx);
#endif
#endif
}

void *RTMP_TLS_AllocServerContext(const char *cert, const char *key) {
    void *ctx = NULL;
#ifdef CRYPTO
    if (!RTMP_TLS_ctx)
        RTMP_TLS_Init();
#ifdef USE_POLARSSL
    tls_server_ctx *tc = ctx = calloc(1, sizeof(struct tls_server_ctx));
    tc->dhm_P = my_dhm_P;
    tc->dhm_G = my_dhm_G;
    tc->hs = &RTMP_TLS_ctx->hs;
    if (x509parse_crtfile(&tc->cert, cert)) {
        free(tc);
        return NULL;
    }
    if (x509parse_keyfile(&tc->key, key, NULL)) {
        x509_free(&tc->cert);
        free(tc);
        return NULL;
    }
#elif defined(USE_GNUTLS) && !defined(NO_SSL)
    gnutls_certificate_allocate_credentials(
        (gnutls_certificate_credentials *)&ctx);
    if (gnutls_certificate_set_x509_key_file(ctx, cert, key,
                                             GNUTLS_X509_FMT_PEM) != 0) {
        gnutls_certificate_free_credentials(ctx);
        return NULL;
    }
#elif !defined(NO_SSL) /* USE_OPENSSL */
    ctx = SSL_CTX_new(SSLv23_server_method());
    if (!SSL_CTX_use_certificate_chain_file(ctx, cert)) {
        SSL_CTX_free(ctx);
        return NULL;
    }
    if (!SSL_CTX_use_PrivateKey_file(ctx, key, SSL_FILETYPE_PEM)) {
        SSL_CTX_free(ctx);
        return NULL;
    }
#endif
#endif
    return ctx;
}

void RTMP_TLS_FreeServerContext(void *ctx) {
#ifdef CRYPTO
#ifdef USE_POLARSSL
    x509_free(&((tls_server_ctx *)ctx)->cert);
    rsa_free(&((tls_server_ctx *)ctx)->key);
    free(ctx);
#elif defined(USE_GNUTLS) && !defined(NO_SSL)
    gnutls_certificate_free_credentials(ctx);
#elif !defined(NO_SSL) /* USE_OPENSSL */
    SSL_CTX_free(ctx);
#endif
#endif
}

RTMP *RTMP_Alloc() { return calloc(1, sizeof(RTMP)); }

void RTMP_Free(RTMP *r) { free(r); }

void RTMP_Init(RTMP *r) {
// 是否启用加密
#ifdef CRYPTO
    if (!RTMP_TLS_ctx)
        RTMP_TLS_Init();
#endif

    memset(r, 0, sizeof(RTMP));
    r->m_sb.sb_socket = -1; // 将套接字设置为无效值，表示未连接

    r->m_inChunkSize = RTMP_DEFAULT_CHUNKSIZE; // 默认的输入缓冲区大小
    r->m_outChunkSize = RTMP_DEFAULT_CHUNKSIZE; // 默认的输出缓冲区大小
    r->m_nBufferMS = 30000; // 缓冲时间设置为 30000 毫秒（30
                            // 秒），表示客户端可以在播放前缓存 30 秒的数据。

    r->m_nClientBW =
        2500000; // 客户端和服务器的默认带宽设置为 2500000（2.5 Mbps）。
    r->m_nClientBW2 = 2; // 客户端和服务器的默认带宽设置为 2。动态带宽设置为 2
                         // 表示带宽不受限制。
    r->m_nServerBW = 2500000;

    r->m_fAudioCodecs = 3191.0; // 表示支持的音频编解码器集合
    r->m_fVideoCodecs = 252.0;  // 表示支持的视频编解码器集合

    r->Link.timeout = 30; // 设置超时时间为 30 秒
    r->Link.swfAge = 30;  // 默认 SWF 文件的年龄为 30 秒
}

void RTMP_EnableWrite(RTMP *r) { r->Link.protocol |= RTMP_FEATURE_WRITE; }

double RTMP_GetDuration(RTMP *r) { return r->m_fDuration; }

int RTMP_IsConnected(RTMP *r) { return r->m_sb.sb_socket != -1; }

int RTMP_Socket(RTMP *r) { return r->m_sb.sb_socket; }

int RTMP_IsTimedout(RTMP *r) { return r->m_sb.sb_timedout; }

void RTMP_SetBufferMS(RTMP *r, int size) { r->m_nBufferMS = size; }

void RTMP_UpdateBufferMS(RTMP *r) {
    RTMP_SendCtrl(r, 3, r->m_stream_id, r->m_nBufferMS);
}

#undef OSS
#ifdef _WIN32
#define OSS "WIN"
#elif defined(__sun__)
#define OSS "SOL"
#elif defined(__APPLE__)
#define OSS "MAC"
#elif defined(__linux__)
#define OSS "LNX"
#else
#define OSS "GNU"
#endif
#define DEF_VERSTR OSS " 10,0,32,18"
static const char DEFAULT_FLASH_VER[] = DEF_VERSTR;
const AVal RTMP_DefaultFlashVer = {(char *)DEFAULT_FLASH_VER,
                                   sizeof(DEFAULT_FLASH_VER) - 1};

static void SocksSetup(RTMP *r, AVal *sockshost) {
    if (sockshost->av_len) {
        const char *socksport = strchr(sockshost->av_val, ':');
        char *hostname = strdup(sockshost->av_val);

        if (socksport)
            hostname[socksport - sockshost->av_val] = '\0';
        r->Link.sockshost.av_val = hostname;
        r->Link.sockshost.av_len = strlen(hostname);

        r->Link.socksport = socksport ? atoi(socksport + 1) : 1080;
        RTMP_Log(RTMP_LOGDEBUG, "Connecting via SOCKS proxy: %s:%d",
                 r->Link.sockshost.av_val, r->Link.socksport);
    }
    else {
        r->Link.sockshost.av_val = NULL;
        r->Link.sockshost.av_len = 0;
        r->Link.socksport = 0;
    }
}

void RTMP_SetupStream(RTMP *r, int protocol, AVal *host, unsigned int port,
                      AVal *sockshost, AVal *playpath, AVal *tcUrl,
                      AVal *swfUrl, AVal *pageUrl, AVal *app, AVal *auth,
                      AVal *swfSHA256Hash, uint32_t swfSize, AVal *flashVer,
                      AVal *subscribepath, AVal *usherToken, int dStart,
                      int dStop, int bLiveStream, long int timeout) {
    RTMP_Log(RTMP_LOGDEBUG, "Protocol : %s", RTMPProtocolStrings[protocol & 7]);
    RTMP_Log(RTMP_LOGDEBUG, "Hostname : %.*s", host->av_len, host->av_val);
    RTMP_Log(RTMP_LOGDEBUG, "Port     : %d", port);
    RTMP_Log(RTMP_LOGDEBUG, "Playpath : %s", playpath->av_val);

    if (tcUrl && tcUrl->av_val)
        RTMP_Log(RTMP_LOGDEBUG, "tcUrl    : %s", tcUrl->av_val);
    if (swfUrl && swfUrl->av_val)
        RTMP_Log(RTMP_LOGDEBUG, "swfUrl   : %s", swfUrl->av_val);
    if (pageUrl && pageUrl->av_val)
        RTMP_Log(RTMP_LOGDEBUG, "pageUrl  : %s", pageUrl->av_val);
    if (app && app->av_val)
        RTMP_Log(RTMP_LOGDEBUG, "app      : %.*s", app->av_len, app->av_val);
    if (auth && auth->av_val)
        RTMP_Log(RTMP_LOGDEBUG, "auth     : %s", auth->av_val);
    if (subscribepath && subscribepath->av_val)
        RTMP_Log(RTMP_LOGDEBUG, "subscribepath : %s", subscribepath->av_val);
    if (usherToken && usherToken->av_val)
        RTMP_Log(RTMP_LOGDEBUG, "NetStream.Authenticate.UsherToken : %s",
                 usherToken->av_val);
    if (flashVer && flashVer->av_val)
        RTMP_Log(RTMP_LOGDEBUG, "flashVer : %s", flashVer->av_val);
    if (dStart > 0)
        RTMP_Log(RTMP_LOGDEBUG, "StartTime     : %d msec", dStart);
    if (dStop > 0)
        RTMP_Log(RTMP_LOGDEBUG, "StopTime      : %d msec", dStop);

    RTMP_Log(RTMP_LOGDEBUG, "live     : %s", bLiveStream ? "yes" : "no");
    RTMP_Log(RTMP_LOGDEBUG, "timeout  : %ld sec", timeout);

#ifdef CRYPTO
    if (swfSHA256Hash != NULL && swfSize > 0) {
        memcpy(r->Link.SWFHash, swfSHA256Hash->av_val, sizeof(r->Link.SWFHash));
        r->Link.SWFSize = swfSize;
        RTMP_Log(RTMP_LOGDEBUG, "SWFSHA256:");
        RTMP_LogHex(RTMP_LOGDEBUG, r->Link.SWFHash, sizeof(r->Link.SWFHash));
        RTMP_Log(RTMP_LOGDEBUG, "SWFSize  : %u", r->Link.SWFSize);
    }
    else {
        r->Link.SWFSize = 0;
    }
#endif

    SocksSetup(r, sockshost);

    if (tcUrl && tcUrl->av_len)
        r->Link.tcUrl = *tcUrl;
    if (swfUrl && swfUrl->av_len)
        r->Link.swfUrl = *swfUrl;
    if (pageUrl && pageUrl->av_len)
        r->Link.pageUrl = *pageUrl;
    if (app && app->av_len)
        r->Link.app = *app;
    if (auth && auth->av_len) {
        r->Link.auth = *auth;
        r->Link.lFlags |= RTMP_LF_AUTH;
    }
    if (flashVer && flashVer->av_len)
        r->Link.flashVer = *flashVer;
    else
        r->Link.flashVer = RTMP_DefaultFlashVer;
    if (subscribepath && subscribepath->av_len)
        r->Link.subscribepath = *subscribepath;
    if (usherToken && usherToken->av_len)
        r->Link.usherToken = *usherToken;
    r->Link.seekTime = dStart;
    r->Link.stopTime = dStop;
    if (bLiveStream)
        r->Link.lFlags |= RTMP_LF_LIVE;
    r->Link.timeout = timeout;

    r->Link.protocol = protocol;
    r->Link.hostname = *host;
    r->Link.port = port;
    r->Link.playpath = *playpath;

    if (r->Link.port == 0) {
        if (protocol & RTMP_FEATURE_SSL)
            r->Link.port = 443;
        else if (protocol & RTMP_FEATURE_HTTP)
            r->Link.port = 80;
        else
            r->Link.port = 1935;
    }
}

enum { OPT_STR = 0, OPT_INT, OPT_BOOL, OPT_CONN };
static const char *optinfo[] = {"string", "integer", "boolean", "AMF"};

#define OFF(x) offsetof(struct RTMP, x)

static struct urlopt {
    AVal name;
    off_t off;
    int otype;
    int omisc;
    char *use;
} options[] = {
    {AVC("socks"), OFF(Link.sockshost), OPT_STR, 0,
     "Use the specified SOCKS proxy"},
    {AVC("app"), OFF(Link.app), OPT_STR, 0, "Name of target app on server"},
    {AVC("tcUrl"), OFF(Link.tcUrl), OPT_STR, 0, "URL to played stream"},
    {AVC("pageUrl"), OFF(Link.pageUrl), OPT_STR, 0,
     "URL of played media's web page"},
    {AVC("swfUrl"), OFF(Link.swfUrl), OPT_STR, 0, "URL to player SWF file"},
    {AVC("flashver"), OFF(Link.flashVer), OPT_STR, 0,
     "Flash version string (default " DEF_VERSTR ")"},
    {AVC("conn"), OFF(Link.extras), OPT_CONN, 0,
     "Append arbitrary AMF data to Connect message"},
    {AVC("playpath"), OFF(Link.playpath), OPT_STR, 0,
     "Path to target media on server"},
    {AVC("playlist"), OFF(Link.lFlags), OPT_BOOL, RTMP_LF_PLST,
     "Set playlist before play command"},
    {AVC("live"), OFF(Link.lFlags), OPT_BOOL, RTMP_LF_LIVE,
     "Stream is live, no seeking possible"},
    {AVC("subscribe"), OFF(Link.subscribepath), OPT_STR, 0,
     "Stream to subscribe to"},
    {AVC("jtv"), OFF(Link.usherToken), OPT_STR, 0,
     "Justin.tv authentication token"},
    {AVC("token"), OFF(Link.token), OPT_STR, 0, "Key for SecureToken response"},
    {AVC("swfVfy"), OFF(Link.lFlags), OPT_BOOL, RTMP_LF_SWFV,
     "Perform SWF Verification"},
    {AVC("swfAge"), OFF(Link.swfAge), OPT_INT, 0,
     "Number of days to use cached SWF hash"},
    {AVC("start"), OFF(Link.seekTime), OPT_INT, 0,
     "Stream start position in milliseconds"},
    {AVC("stop"), OFF(Link.stopTime), OPT_INT, 0,
     "Stream stop position in milliseconds"},
    {AVC("buffer"), OFF(m_nBufferMS), OPT_INT, 0,
     "Buffer time in milliseconds"},
    {AVC("timeout"), OFF(Link.timeout), OPT_INT, 0,
     "Session timeout in seconds"},
    {AVC("pubUser"), OFF(Link.pubUser), OPT_STR, 0, "Publisher username"},
    {AVC("pubPasswd"), OFF(Link.pubPasswd), OPT_STR, 0, "Publisher password"},
    {{NULL, 0}, 0, 0}};

static const AVal truth[] = {
    AVC("1"), AVC("on"), AVC("yes"), AVC("true"), {0, 0}};

static void RTMP_OptUsage() {
    int i;

    RTMP_Log(RTMP_LOGERROR, "Valid RTMP options are:\n");
    for (i = 0; options[i].name.av_len; i++) {
        RTMP_Log(RTMP_LOGERROR, "%10s %-7s  %s\n", options[i].name.av_val,
                 optinfo[options[i].otype], options[i].use);
    }
}

static int parseAMF(AMFObject *obj, AVal *av, int *depth) {
    AMFObjectProperty prop = {{0, 0}};
    int i;
    char *p, *arg = av->av_val;

    if (arg[1] == ':') {
        p = (char *)arg + 2;
        switch (arg[0]) {
        case 'B':
            prop.p_type = AMF_BOOLEAN;
            prop.p_vu.p_number = atoi(p);
            break;
        case 'S':
            prop.p_type = AMF_STRING;
            prop.p_vu.p_aval.av_val = p;
            prop.p_vu.p_aval.av_len = av->av_len - (p - arg);
            break;
        case 'N':
            prop.p_type = AMF_NUMBER;
            prop.p_vu.p_number = strtod(p, NULL);
            break;
        case 'Z':
            prop.p_type = AMF_NULL;
            break;
        case 'O':
            i = atoi(p);
            if (i) {
                prop.p_type = AMF_OBJECT;
            }
            else {
                (*depth)--;
                return 0;
            }
            break;
        default:
            return -1;
        }
    }
    else if (arg[2] == ':' && arg[0] == 'N') {
        p = strchr(arg + 3, ':');
        if (!p || !*depth)
            return -1;
        prop.p_name.av_val = (char *)arg + 3;
        prop.p_name.av_len = p - (arg + 3);

        p++;
        switch (arg[1]) {
        case 'B':
            prop.p_type = AMF_BOOLEAN;
            prop.p_vu.p_number = atoi(p);
            break;
        case 'S':
            prop.p_type = AMF_STRING;
            prop.p_vu.p_aval.av_val = p;
            prop.p_vu.p_aval.av_len = av->av_len - (p - arg);
            break;
        case 'N':
            prop.p_type = AMF_NUMBER;
            prop.p_vu.p_number = strtod(p, NULL);
            break;
        case 'O':
            prop.p_type = AMF_OBJECT;
            break;
        default:
            return -1;
        }
    }
    else
        return -1;

    if (*depth) {
        AMFObject *o2;
        for (i = 0; i < *depth; i++) {
            o2 = &obj->o_props[obj->o_num - 1].p_vu.p_object;
            obj = o2;
        }
    }
    AMF_AddProp(obj, &prop);
    if (prop.p_type == AMF_OBJECT)
        (*depth)++;
    return 0;
}

int RTMP_SetOpt(RTMP *r, const AVal *opt, AVal *arg) {
    int i;
    void *v;

    for (i = 0; options[i].name.av_len; i++) {
        if (opt->av_len != options[i].name.av_len)
            continue;
        if (strcasecmp(opt->av_val, options[i].name.av_val))
            continue;
        v = (char *)r + options[i].off;
        switch (options[i].otype) {
        case OPT_STR: {
            AVal *aptr = v;
            *aptr = *arg;
        } break;
        case OPT_INT: {
            long l = strtol(arg->av_val, NULL, 0);
            *(int *)v = l;
        } break;
        case OPT_BOOL: {
            int j, fl;
            fl = *(int *)v;
            for (j = 0; truth[j].av_len; j++) {
                if (arg->av_len != truth[j].av_len)
                    continue;
                if (strcasecmp(arg->av_val, truth[j].av_val))
                    continue;
                fl |= options[i].omisc;
                break;
            }
            *(int *)v = fl;
        } break;
        case OPT_CONN:
            if (parseAMF(&r->Link.extras, arg, &r->Link.edepth))
                return FALSE;
            break;
        }
        break;
    }
    if (!options[i].name.av_len) {
        RTMP_Log(RTMP_LOGERROR, "Unknown option %s", opt->av_val);
        RTMP_OptUsage();
        return FALSE;
    }

    return TRUE;
}

/*
RTMP_SetupURL 函数的作用是解析给定的 RTMP URL，并将相关信息存储到 RTMP
结构体中的 Link 字段中。它同时处理额外的参数（如在 URL
后以空格分隔的选项）并设置默认值。这是 RTMP 协议初始化和设置的关键步骤。

 功能
    URL 解析: 将输入的 RTMP URL 解析成 protocol、hostname、port、app、playpath
等关键字段。 参数处理: 支持在 URL 后通过空格传递额外的 key=value 格式参数。
     默认设置: 如果部分字段未指定，填充默认值（如端口）。
     扩展功能: 包括加密支持、代理设置等。
 核心逻辑
     调用 RTMP_ParseURL 完成基础 URL 解析。
     解析额外参数并逐一设置。
     生成连接 URL（tcUrl）。
    返回结果。
*/
int RTMP_SetupURL(RTMP *r, char *url) {
    AVal opt, arg;
    char *p1, *p2, *ptr = strchr(url, ' '); // 查找空格,返回指向空格的指针
    int ret, len;
    unsigned int port = 0;

    if (ptr)
        *ptr = '\0'; // 将空格替换为字符串结束符

    // 解析 URL
    len = strlen(url);
    ret = RTMP_ParseURL(url, &r->Link.protocol, &r->Link.hostname, &port,
                        &r->Link.playpath0, &r->Link.app);
    if (!ret)
        return ret;
    r->Link.port = port;
    r->Link.playpath = r->Link.playpath0;

    while (ptr) {
        *ptr++ = '\0';
        p1 = ptr;
        p2 = strchr(p1, '=');
        if (!p2)
            break;
        opt.av_val = p1;
        opt.av_len = p2 - p1;
        *p2++ = '\0';
        arg.av_val = p2;
        ptr = strchr(p2, ' ');
        if (ptr) {
            *ptr = '\0';
            arg.av_len = ptr - p2;
            /* skip repeated spaces */
            while (ptr[1] == ' ')
                *ptr++ = '\0';
        }
        else {
            arg.av_len = strlen(p2);
        }

        /* unescape */
        port = arg.av_len;
        for (p1 = p2; port > 0;) {
            if (*p1 == '\\') {
                unsigned int c;
                if (port < 3)
                    return FALSE;
                sscanf(p1 + 1, "%02x", &c);
                *p2++ = c;
                port -= 3;
                p1 += 3;
            }
            else {
                *p2++ = *p1++;
                port--;
            }
        }
        arg.av_len = p2 - arg.av_val;

        ret = RTMP_SetOpt(r, &opt, &arg);
        if (!ret)
            return ret;
    }

    if (!r->Link.tcUrl.av_len) {
        r->Link.tcUrl.av_val = url;
        if (r->Link.app.av_len) {
            if (r->Link.app.av_val < url + len) {
                /* if app is part of original url, just use it */
                r->Link.tcUrl.av_len =
                    r->Link.app.av_len + (r->Link.app.av_val - url);
            }
            else {
                len = r->Link.hostname.av_len + r->Link.app.av_len +
                      sizeof("rtmpte://:65535/");
                r->Link.tcUrl.av_val = malloc(len);
                r->Link.tcUrl.av_len = snprintf(
                    r->Link.tcUrl.av_val, len, "%s://%.*s:%d/%.*s",
                    RTMPProtocolStringsLower[r->Link.protocol],
                    r->Link.hostname.av_len, r->Link.hostname.av_val,
                    r->Link.port, r->Link.app.av_len, r->Link.app.av_val);
                r->Link.lFlags |= RTMP_LF_FTCU;
            }
        }
        else {
            r->Link.tcUrl.av_len = strlen(url);
        }
    }

#ifdef CRYPTO
    if ((r->Link.lFlags & RTMP_LF_SWFV) && r->Link.swfUrl.av_len)
        RTMP_HashSWF(r->Link.swfUrl.av_val, &r->Link.SWFSize,
                     (unsigned char *)r->Link.SWFHash, r->Link.swfAge);
#endif

    SocksSetup(r, &r->Link.sockshost);

    if (r->Link.port == 0) {
        if (r->Link.protocol & RTMP_FEATURE_SSL)
            r->Link.port = 443;
        else if (r->Link.protocol & RTMP_FEATURE_HTTP)
            r->Link.port = 80;
        else
            r->Link.port = 1935;
    }
    return TRUE;
}

static int add_addr_info(struct sockaddr_in *service, AVal *host, int port) {
    char *hostname;
    int ret = TRUE;
    if (host->av_val[host->av_len]) {
        hostname = malloc(host->av_len + 1);
        memcpy(hostname, host->av_val, host->av_len);
        hostname[host->av_len] = '\0';
    }
    else {
        hostname = host->av_val;
    }

    service->sin_addr.s_addr = inet_addr(hostname);
    if (service->sin_addr.s_addr == INADDR_NONE) {
        struct hostent *host = gethostbyname(hostname);
        if (host == NULL || host->h_addr == NULL) {
            RTMP_Log(RTMP_LOGERROR, "Problem accessing the DNS. (addr: %s)",
                     hostname);
            ret = FALSE;
            goto finish;
        }
        service->sin_addr = *(struct in_addr *)host->h_addr;
    }

    service->sin_port = htons(port);
finish:
    if (hostname != host->av_val)
        free(hostname);
    return ret;
}

/*
 RTMP_Connect0 函数的主要作用是建立一个 TCP
 网络连接，包括创建套接字、连接到目标地址、处理代理协商（SOCKS），以及设置套接字选项（如超时和延迟配置）。


 */
int RTMP_Connect0(RTMP *r, struct sockaddr *service) {
    int on = 1;
    r->m_sb.sb_timedout = FALSE;
    r->m_pausing = 0;
    r->m_fDuration = 0.0;

    /*
     调用 socket 创建一个 TCP 套接字。
     参数说明：
     AF_INET: IPv4 协议。
     SOCK_STREAM: 流式套接字（TCP）。
     IPPROTO_TCP: 明确指定 TCP 协议。
     如果返回值不为 -1，说明套接字创建成功。
     */
    r->m_sb.sb_socket = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);
    if (r->m_sb.sb_socket != -1) {
        // 如果返回值不为 -1，说明套接字创建成功。
        /*
         调用 connect 将套接字连接到目标服务地址。
         如果返回值小于 0，则表示连接失败：
         调用 GetSockError 获取具体的错误码。
         使用 strerror 转换为可读的错误信息。
         调用 RTMP_Close 释放相关资源，返回 FALSE。
         */
        if (connect(r->m_sb.sb_socket, service, sizeof(struct sockaddr)) < 0) {
            int err = GetSockError();
            RTMP_Log(RTMP_LOGERROR, "%s, failed to connect socket. %d (%s)",
                     __FUNCTION__, err, strerror(err));
            RTMP_Close(r);
            return FALSE;
        }

        if (r->Link.socksport) {
            RTMP_Log(RTMP_LOGDEBUG, "%s ... SOCKS negotiation", __FUNCTION__);
            if (!SocksNegotiate(r)) {
                RTMP_Log(RTMP_LOGERROR, "%s, SOCKS negotiation failed.",
                         __FUNCTION__);
                RTMP_Close(r);
                return FALSE;
            }
        }
    }
    else {
        RTMP_Log(RTMP_LOGERROR, "%s, failed to create socket. Error: %d",
                 __FUNCTION__, GetSockError());
        return FALSE;
    }

    /* set timeout

     设置接收超时时间
     使用 setsockopt 为套接字设置接收超时时间（SO_RCVTIMEO）。
     如果设置失败，记录错误日志，但不终止连接。
     */
    {
        SET_RCVTIMEO(tv, r->Link.timeout);
        if (setsockopt(r->m_sb.sb_socket, SOL_SOCKET, SO_RCVTIMEO, (char *)&tv,
                       sizeof(tv))) {
            RTMP_Log(RTMP_LOGERROR, "%s, Setting socket timeout to %ds failed!",
                     __FUNCTION__, r->Link.timeout);
        }
    }

    /*
     禁用 Nagle 算法
     使用 TCP_NODELAY 选项禁用 Nagle 算法，减少数据发送延迟：
     默认情况下，Nagle 算法会缓冲小数据包以减少网络流量。
     对于实时性要求高的场景（如流媒体），禁用该算法可以提高数据传输的实时性。
     */
    setsockopt(r->m_sb.sb_socket, IPPROTO_TCP, TCP_NODELAY, (char *)&on,
               sizeof(on));

    return TRUE;
}

int RTMP_TLS_Accept(RTMP *r, void *ctx) {
#if defined(CRYPTO) && !defined(NO_SSL)
    TLS_server(ctx, r->m_sb.sb_ssl);
    TLS_setfd(r->m_sb.sb_ssl, r->m_sb.sb_socket);
    if (TLS_accept(r->m_sb.sb_ssl) < 0) {
        RTMP_Log(RTMP_LOGERROR, "%s, TLS_Connect failed", __FUNCTION__);
        return FALSE;
    }
    return TRUE;
#else
    return FALSE;
#endif
}

/*
 RTMP_Connect1 函数的主要作用是完成与 RTMP 服务器的进一步连接过程，包括支持
 SSL/TLS 和 HTTP 协议的处理、握手操作以及发送 RTMP 连接包。

 功能分析
 RTMP_Connect1 是 RTMP 连接过程的核心部分，主要实现以下功能：

     协议支持

         支持 SSL/TLS（RTMP_FEATURE_SSL）。
         支持通过 HTTP（RTMPT）传输（RTMP_FEATURE_HTTP）。
     RTMP 握手

        执行 RTMP 握手，确保客户端和服务器在通信前建立一致的会话。
     发送连接包

        通过 RTMPPacket 向服务器发送客户端的连接信息。

 依赖函数说明
 TLS_client: 初始化 SSL/TLS 会话上下文。
 TLS_setfd: 绑定套接字到 SSL/TLS 会话。
 TLS_connect: 执行 SSL/TLS 握手。
 HTTP_Post: 发送 HTTP 请求。
 HTTP_read: 读取 HTTP 响应。
 HandShake: 执行 RTMP 握手。
 SendConnectPacket: 发送 RTMP 连接包。
 RTMP_Close: 清理连接资源。

 */
int RTMP_Connect1(RTMP *r, RTMPPacket *cp) {

    /*
     处理 SSL/TLS （可选）
     如果协议中包含 RTMP_FEATURE_SSL 标志，表示需要使用 SSL/TLS 加密连接。
     TLS_client: 初始化 TLS 会话上下文。
     TLS_setfd: 将套接字与 TLS 会话绑定。
     TLS_connect: 执行 SSL/TLS 握手。
     如果未定义 CRYPTO 或显式禁用了 NO_SSL，则记录错误日志并返回失败。
     失败时会调用 RTMP_Close 清理资源。
     */
    if (r->Link.protocol & RTMP_FEATURE_SSL) {
#if defined(CRYPTO) && !defined(NO_SSL)
        TLS_client(RTMP_TLS_ctx, r->m_sb.sb_ssl);
        TLS_setfd(r->m_sb.sb_ssl, r->m_sb.sb_socket);
        if (TLS_connect(r->m_sb.sb_ssl) < 0) {
            RTMP_Log(RTMP_LOGERROR, "%s, TLS_Connect failed", __FUNCTION__);
            RTMP_Close(r);
            return FALSE;
        }
#else
        RTMP_Log(RTMP_LOGERROR, "%s, no SSL/TLS support", __FUNCTION__);
        RTMP_Close(r);
        return FALSE;

#endif
    }

    /*
     处理 HTTP (可选)
     如果协议中包含 RTMP_FEATURE_HTTP 标志，表示需要通过 HTTP
     进行通信（RTMPT）。 r->m_msgCounter: 初始化消息计数器。 HTTP_Post:
     向服务器发送一个 RTMPT 打开请求。 HTTP_read: 读取服务器响应以确认握手。
     如果响应非 0，表示连接失败，记录日志并关闭连接。
     */
    if (r->Link.protocol & RTMP_FEATURE_HTTP) {
        r->m_msgCounter = 1;
        r->m_clientID.av_val = NULL;
        r->m_clientID.av_len = 0;
        HTTP_Post(r, RTMPT_OPEN, "", 1);
        if (HTTP_read(r, 1) != 0) {
            r->m_msgCounter = 0;
            RTMP_Log(RTMP_LOGDEBUG, "%s, Could not connect for handshake",
                     __FUNCTION__);
            RTMP_Close(r);
            return 0;
        }
        r->m_msgCounter = 0;
    }

    /*
     RTMP 握手
     调用 HandShake 函数执行 RTMP 的握手流程。
     握手的主要目的是与服务器同步状态并建立会话。
     如果握手失败，记录错误日志并关闭连接。
     */
    RTMP_Log(RTMP_LOGDEBUG, "%s, ... connected, handshaking", __FUNCTION__);
    if (!HandShake(r, TRUE)) {
        RTMP_Log(RTMP_LOGERROR, "%s, handshake failed.", __FUNCTION__);
        RTMP_Close(r);
        return FALSE;
    }
    RTMP_Log(RTMP_LOGDEBUG, "%s, handshaked", __FUNCTION__);

    /*
     发送连接包

     调用 SendConnectPacket 向服务器发送连接包（RTMPPacket）。
     连接包包含客户端的连接信息，例如应用名、流名、URL 等。
     如果发送失败，记录错误日志并关闭连接。
     */
    if (!SendConnectPacket(r, cp)) {
        RTMP_Log(RTMP_LOGERROR, "%s, RTMP connect failed.", __FUNCTION__);
        RTMP_Close(r);
        return FALSE;
    }
    return TRUE;
}

/*

 相关函数和模块
 1. add_addr_info
     功能：解析主机名或 IP 地址，填充 struct sockaddr_in 结构体。
     输入：
     struct sockaddr_in *service: 要填充的目标结构体。
     AVal *hostname: 主机名或 IP 地址。
     unsigned int port: 端口号。
     输出：成功返回 TRUE，失败返回 FALSE。
 2. RTMP_Connect0
    功能：执行底层的 socket 创建和 connect 操作。
 3. RTMP_Connect1
    功能：完成连接的上层协议操作，例如发送初始数据包或进行协议握手。

 关键点总结

 地址解析
     支持直接连接和通过 SOCKS 代理连接。
     使用 add_addr_info 将主机名/IP 和端口转换为网络地址结构体。
 连接建立流程
     底层网络连接由 RTMP_Connect0 实现。
     上层协议的初始化和握手由 RTMP_Connect1 完成。
 灵活性
     支持直接连接和代理连接（SOCKS）。
     通过 RTMPPacket *cp 可支持复杂的初始通信。

 */
int RTMP_Connect(RTMP *r, RTMPPacket *cp) {
    struct sockaddr_in service;
    if (!r->Link.hostname.av_len) // 检查主机名是否已设置。如果未设置，返回
                                  // FALSE 以终止连接。
        return FALSE;

    memset(&service, 0,
           sizeof(struct sockaddr_in)); // 清空 struct sockaddr_in 结构体。
    service.sin_family = AF_INET; // 设置地址族为 AF_INET，表示 IPv4 地址。

    if (r->Link.socksport) {
        /* Connect via SOCKS
         如果 r->Link.socksport（SOCKS 代理端口）存在，则尝试通过 SOCKS
         代理进行连接。 调用 add_addr_info 填充 service 的 IP 和端口信息。
         */
        if (!add_addr_info(&service, &r->Link.sockshost, r->Link.socksport))
            return FALSE;
    }
    else {
        /* Connect directly */
        if (!add_addr_info(&service, &r->Link.hostname, r->Link.port))
            return FALSE;
    }

    /*
     尝试建立基础连接
     调用 RTMP_Connect0，执行底层的网络连接操作（通常包括 socket 和 connect
     系统调用）。 如果连接失败，返回 FALSE。
     */
    if (!RTMP_Connect0(r, (struct sockaddr *)&service))
        return FALSE;

    /*
     设置发送计数器
     将 m_bSendCounter 标志设为 TRUE，表明连接已建立，允许发送数据包。
     */
    r->m_bSendCounter = TRUE;

    /*
     完成连接过程
     调用 RTMP_Connect1，可能包括握手过程或初始包发送（如 Flash 的 connect
     命令）。 返回 RTMP_Connect1 的结果。

     */
    return RTMP_Connect1(r, cp);
}

static int SocksNegotiate(RTMP *r) {
    unsigned long addr;
    struct sockaddr_in service;
    memset(&service, 0, sizeof(struct sockaddr_in));

    add_addr_info(&service, &r->Link.hostname, r->Link.port);
    addr = htonl(service.sin_addr.s_addr);

    {
        char packet[] = {4,
                         1, /* SOCKS 4, connect */
                         (r->Link.port >> 8) & 0xFF,
                         (r->Link.port) & 0xFF,
                         (char)(addr >> 24) & 0xFF,
                         (char)(addr >> 16) & 0xFF,
                         (char)(addr >> 8) & 0xFF,
                         (char)addr & 0xFF,
                         0}; /* NULL terminate */

        WriteN(r, packet, sizeof packet);

        if (ReadN(r, packet, 8) != 8)
            return FALSE;

        if (packet[0] == 0 && packet[1] == 90) {
            return TRUE;
        }
        else {
            RTMP_Log(RTMP_LOGERROR, "%s, SOCKS returned error code %d",
                     __FUNCTION__, packet[1]);
            return FALSE;
        }
    }
}

/*
 RTMP 的 RTMP_ConnectStream 函数的核心部分，用于建立 RTMP 流连接。
 
 */
int RTMP_ConnectStream(RTMP *r, int seekTime) {
    RTMPPacket packet = {0};

    /* seekTime was already set by SetupStream / SetupURL.
     * This is only needed by ReconnectStream.
          
     如果传入的 seekTime 参数大于 0，则设置 RTMP 连接的 seekTime 字段。
     seekTime 用于控制播放从指定时间点开始。
     如果流是重新连接的，这个步骤非常重要。
     */
    if (seekTime > 0)
        r->Link.seekTime = seekTime;

    //清零媒体通道标识符，以确保重新连接时没有残留状态。
    r->m_mediaChannel = 0;

    while (!r->m_bPlaying && RTMP_IsConnected(r) &&
           RTMP_ReadPacket(r, &packet)) {
        if (RTMPPacket_IsReady(&packet)) {
            if (!packet.m_nBodySize)
                continue;
            if ((packet.m_packetType == RTMP_PACKET_TYPE_AUDIO) ||
                (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO) ||
                (packet.m_packetType == RTMP_PACKET_TYPE_INFO)) {
                RTMP_Log(RTMP_LOGWARNING,
                         "Received FLV packet before play()! Ignoring.");
                RTMPPacket_Free(&packet);
                continue;
            }

            RTMP_ClientPacket(r, &packet);
            RTMPPacket_Free(&packet);
        }
    }

    return r->m_bPlaying;
}

int RTMP_ReconnectStream(RTMP *r, int seekTime) {
    RTMP_DeleteStream(r);

    RTMP_SendCreateStream(r);

    return RTMP_ConnectStream(r, seekTime);
}

int RTMP_ToggleStream(RTMP *r) {
    int res;

    if (!r->m_pausing) {
        if (RTMP_IsTimedout(r) && r->m_read.status == RTMP_READ_EOF)
            r->m_read.status = 0;

        res = RTMP_SendPause(r, TRUE, r->m_pauseStamp);
        if (!res)
            return res;

        r->m_pausing = 1;
        sleep(1);
    }
    res = RTMP_SendPause(r, FALSE, r->m_pauseStamp);
    r->m_pausing = 3;
    return res;
}

void RTMP_DeleteStream(RTMP *r) {
    if (r->m_stream_id < 0)
        return;

    r->m_bPlaying = FALSE;

    SendDeleteStream(r, r->m_stream_id);
    r->m_stream_id = -1;
}

int RTMP_GetNextMediaPacket(RTMP *r, RTMPPacket *packet) {
    int bHasMediaPacket = 0;

    while (!bHasMediaPacket && RTMP_IsConnected(r) &&
           RTMP_ReadPacket(r, packet)) {
        if (!RTMPPacket_IsReady(packet) || !packet->m_nBodySize) {
            continue;
        }

        bHasMediaPacket = RTMP_ClientPacket(r, packet);

        if (!bHasMediaPacket) {
            RTMPPacket_Free(packet);
        }
        else if (r->m_pausing == 3) {
            if (packet->m_nTimeStamp <= r->m_mediaStamp) {
                bHasMediaPacket = 0;
#ifdef _DEBUG
                RTMP_Log(RTMP_LOGDEBUG,
                         "Skipped type: %02X, size: %d, TS: %d ms, abs TS: %d, "
                         "pause: %d ms",
                         packet->m_packetType, packet->m_nBodySize,
                         packet->m_nTimeStamp, packet->m_hasAbsTimestamp,
                         r->m_mediaStamp);
#endif
                RTMPPacket_Free(packet);
                continue;
            }
            r->m_pausing = 0;
        }
    }

    if (bHasMediaPacket)
        r->m_bPlaying = TRUE;
    else if (r->m_sb.sb_timedout && !r->m_pausing)
        r->m_pauseStamp = r->m_mediaChannel < r->m_channelsAllocatedIn
                              ? r->m_channelTimestamp[r->m_mediaChannel]
                              : 0;

    return bHasMediaPacket;
}

int RTMP_ClientPacket(RTMP *r, RTMPPacket *packet) {
    int bHasMediaPacket = 0;
    switch (packet->m_packetType) {
    case RTMP_PACKET_TYPE_CHUNK_SIZE:
        /* chunk size */
        HandleChangeChunkSize(r, packet);
        break;

    case RTMP_PACKET_TYPE_BYTES_READ_REPORT:
        /* bytes read report */
        RTMP_Log(RTMP_LOGDEBUG, "%s, received: bytes read report",
                 __FUNCTION__);
        break;

    case RTMP_PACKET_TYPE_CONTROL:
        /* ctrl */
        HandleCtrl(r, packet);
        break;

    case RTMP_PACKET_TYPE_SERVER_BW:
        /* server bw */
        HandleServerBW(r, packet);
        break;

    case RTMP_PACKET_TYPE_CLIENT_BW:
        /* client bw */
        HandleClientBW(r, packet);
        break;

    case RTMP_PACKET_TYPE_AUDIO:
        /* audio data */
        /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: audio %lu bytes", __FUNCTION__,
         * packet.m_nBodySize); */
        HandleAudio(r, packet);
        bHasMediaPacket = 1;
        if (!r->m_mediaChannel)
            r->m_mediaChannel = packet->m_nChannel;
        if (!r->m_pausing)
            r->m_mediaStamp = packet->m_nTimeStamp;
        break;

    case RTMP_PACKET_TYPE_VIDEO:
        /* video data */
        /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: video %lu bytes", __FUNCTION__,
         * packet.m_nBodySize); */
        HandleVideo(r, packet);
        bHasMediaPacket = 1;
        if (!r->m_mediaChannel)
            r->m_mediaChannel = packet->m_nChannel;
        if (!r->m_pausing)
            r->m_mediaStamp = packet->m_nTimeStamp;
        break;

    case RTMP_PACKET_TYPE_FLEX_STREAM_SEND:
        /* flex stream send */
        RTMP_Log(RTMP_LOGDEBUG,
                 "%s, flex stream send, size %u bytes, not supported, ignoring",
                 __FUNCTION__, packet->m_nBodySize);
        break;

    case RTMP_PACKET_TYPE_FLEX_SHARED_OBJECT:
        /* flex shared object */
        RTMP_Log(
            RTMP_LOGDEBUG,
            "%s, flex shared object, size %u bytes, not supported, ignoring",
            __FUNCTION__, packet->m_nBodySize);
        break;

    case RTMP_PACKET_TYPE_FLEX_MESSAGE:
        /* flex message */
        {
            RTMP_Log(RTMP_LOGDEBUG,
                     "%s, flex message, size %u bytes, not fully supported",
                     __FUNCTION__, packet->m_nBodySize);
            /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */

            /* some DEBUG code */
#if 0
	   RTMP_LIB_AMFObject obj;
	   int nRes = obj.Decode(packet.m_body+1, packet.m_nBodySize-1);
	   if(nRes < 0) {
	   RTMP_Log(RTMP_LOGERROR, "%s, error decoding AMF3 packet", __FUNCTION__);
	   /*return; */
	   }

	   obj.Dump();
#endif

            if (HandleInvoke(r, packet->m_body + 1, packet->m_nBodySize - 1) ==
                1)
                bHasMediaPacket = 2;
            break;
        }
    case RTMP_PACKET_TYPE_INFO:
        /* metadata (notify) */
        RTMP_Log(RTMP_LOGDEBUG, "%s, received: notify %u bytes", __FUNCTION__,
                 packet->m_nBodySize);
        if (HandleMetadata(r, packet->m_body, packet->m_nBodySize))
            bHasMediaPacket = 1;
        break;

    case RTMP_PACKET_TYPE_SHARED_OBJECT:
        RTMP_Log(RTMP_LOGDEBUG, "%s, shared object, not supported, ignoring",
                 __FUNCTION__);
        break;

    case RTMP_PACKET_TYPE_INVOKE:
        /* invoke */
        RTMP_Log(RTMP_LOGDEBUG, "%s, received: invoke %u bytes", __FUNCTION__,
                 packet->m_nBodySize);
        /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */

        if (HandleInvoke(r, packet->m_body, packet->m_nBodySize) == 1)
            bHasMediaPacket = 2;
        break;

    case RTMP_PACKET_TYPE_FLASH_VIDEO: {
        /* go through FLV packets and handle metadata packets */
        unsigned int pos = 0;
        uint32_t nTimeStamp = packet->m_nTimeStamp;

        while (pos + 11 < packet->m_nBodySize) {
            uint32_t dataSize = AMF_DecodeInt24(
                packet->m_body + pos +
                1); /* size without header (11) and prevTagSize (4) */

            if (pos + 11 + dataSize + 4 > packet->m_nBodySize) {
                RTMP_Log(RTMP_LOGWARNING, "Stream corrupt?!");
                break;
            }
            if (packet->m_body[pos] == 0x12) {
                HandleMetadata(r, packet->m_body + pos + 11, dataSize);
            }
            else if (packet->m_body[pos] == 8 || packet->m_body[pos] == 9) {
                nTimeStamp = AMF_DecodeInt24(packet->m_body + pos + 4);
                nTimeStamp |= (packet->m_body[pos + 7] << 24);
            }
            pos += (11 + dataSize + 4);
        }
        if (!r->m_pausing)
            r->m_mediaStamp = nTimeStamp;

        /* FLV tag(s) */
        /*RTMP_Log(RTMP_LOGDEBUG, "%s, received: FLV tag(s) %lu bytes",
         * __FUNCTION__, packet.m_nBodySize); */
        bHasMediaPacket = 1;
        break;
    }
    default:
        RTMP_Log(RTMP_LOGDEBUG, "%s, unknown packet type received: 0x%02x",
                 __FUNCTION__, packet->m_packetType);
#ifdef _DEBUG
        RTMP_LogHex(RTMP_LOGDEBUG, packet->m_body, packet->m_nBodySize);
#endif
    }

    return bHasMediaPacket;
}

#ifdef _DEBUG
extern FILE *netstackdump;
extern FILE *netstackdump_read;
#endif

/*
 从 RTMP 连接中读取指定字节数的数据到 buffer 中.
 
 主要功能
 读取指定字节数的数据：尝试从网络缓冲区中读取 n 个字节。
 支持加密和 HTTP 协议：根据链接的协议和加密状态，处理数据读取、解密等逻辑。
 超时处理：如果套接字操作超时或远端关闭连接，会关闭当前的 RTMP 会话。
 字节计数器：用于统计接收的字节数，并在必要时发送 BytesReceived 消息。

 
 核心逻辑
     协议分支处理

         如果使用 HTTP 协议 (RTMP_FEATURE_HTTP)，需要先检查响应是否已经完全接收，然后填充缓冲区。
         非 HTTP 协议直接填充缓冲区。
     缓冲区数据读取

         从缓冲区中读取 nRead 字节数据，复制到用户提供的 buffer 中。
         更新缓冲区起始位置和剩余大小 (sb_start 和 sb_size)。
     加密解密

         如果启用了 RC4 加密，读取的数据会在 RC4_encrypt 函数中解密。
     字节计数和流量控制

         更新接收的字节计数 r->m_nBytesIn。
         如果接收的字节数超过了客户端带宽限制，需要发送 BytesReceived 消息。
     超时和错误处理

         如果读取超时或套接字关闭，调用 RTMP_Close 清理资源。
 */
static int ReadN(RTMP *r, char *buffer, int n) {
    int nOriginalSize = n;
    int avail;
    char *ptr;

    r->m_sb.sb_timedout = FALSE;

#ifdef _DEBUG
    memset(buffer, 0, n);
#endif

    ptr = buffer;
    while (n > 0) {
        int nBytes = 0, nRead;
        if (r->Link.protocol & RTMP_FEATURE_HTTP) {
            int refill = 0;
            while (!r->m_resplen) {
                int ret;
                if (r->m_sb.sb_size < 13 || refill) {
                    if (!r->m_unackd)
                        HTTP_Post(r, RTMPT_IDLE, "", 1);
                    if (RTMPSockBuf_Fill(&r->m_sb) < 1) {
                        if (!r->m_sb.sb_timedout)
                            RTMP_Close(r);
                        return 0;
                    }
                }
                if ((ret = HTTP_read(r, 0)) == -1) {
                    RTMP_Log(RTMP_LOGDEBUG, "%s, No valid HTTP response found",
                             __FUNCTION__);
                    RTMP_Close(r);
                    return 0;
                }
                else if (ret == -2) {
                    refill = 1;
                }
                else {
                    refill = 0;
                }
            }
            if (r->m_resplen && !r->m_sb.sb_size)
                RTMPSockBuf_Fill(&r->m_sb);
            avail = r->m_sb.sb_size;
            if (avail > r->m_resplen)
                avail = r->m_resplen;
        }
        else {
            /*
             这一段代码是从 RTMP 的网络缓冲区中读取数据的关键部分
             
             */
            
            /*
             从 RTMP 的 RTMPSockBuf 中获取当前缓冲区中可用的数据大小。
             sb_size 表示缓冲区中尚未被读取的字节数。
             */
            avail = r->m_sb.sb_size;
            if (avail == 0) {
                //检查缓冲区是否为空。如果当前没有数据可供读取，需要尝试填充缓冲区。
                if (RTMPSockBuf_Fill(&r->m_sb) < 1) {
                    /*
                     如果读取失败（返回值 < 1），可能是以下原因：
                     远端关闭连接：没有更多数据可读取。
                     超时：网络或服务器无响应。
                     错误发生：如网络故障等。
                     */
                    if (!r->m_sb.sb_timedout)
                        RTMP_Close(r);
                    return 0;
                }
                /*
                 再次获取缓冲区的可用字节数。
                 如果填充缓冲区成功，则 sb_size 会更新，提供新读取的数据量。
                 */
                avail = r->m_sb.sb_size;
            }
        }
        nRead = ((n < avail) ? n : avail);
        if (nRead > 0) {
            memcpy(ptr, r->m_sb.sb_start, nRead);//非 HTTP 协议直接填充缓冲区。
            r->m_sb.sb_start += nRead; // 更新缓冲区和状态信息
            r->m_sb.sb_size -= nRead;  // 更新缓冲区和状态信息
            nBytes = nRead;
            r->m_nBytesIn += nRead;
            if (r->m_bSendCounter &&
                r->m_nBytesIn > (r->m_nBytesInSent + r->m_nClientBW / 10))
                if (!SendBytesReceived(r))
                    return FALSE;
        }
        /*RTMP_Log(RTMP_LOGDEBUG, "%s: %d bytes\n", __FUNCTION__, nBytes); */
#ifdef _DEBUG
        fwrite(ptr, 1, nBytes, netstackdump_read);
#endif

        if (nBytes == 0) {
            RTMP_Log(RTMP_LOGDEBUG, "%s, RTMP socket closed by peer",
                     __FUNCTION__);
            /*goto again; */
            RTMP_Close(r);
            break;
        }

        if (r->Link.protocol & RTMP_FEATURE_HTTP)
            r->m_resplen -= nBytes;

#ifdef CRYPTO
        if (r->Link.rc4keyIn) {
            RC4_encrypt(r->Link.rc4keyIn, nBytes, ptr);
        }
#endif

        n -= nBytes;
        ptr += nBytes;
    }

    return nOriginalSize - n;
}

/*
 WriteN 函数负责向服务器发送指定数量的字节数据，并处理加密和网络通信错误情况。
 */
static int WriteN(RTMP *r, const char *buffer, int n) {
    RTMP_Log(RTMP_LOGINFO, "-----%s: %d\n", __FUNCTION__, n);

    const char *ptr = buffer;
#ifdef CRYPTO
    char *encrypted = 0;
    char buf[RTMP_BUFFER_CACHE_SIZE];

    if (r->Link.rc4keyOut) {
        if (n > sizeof(buf))
            encrypted = (char *)malloc(n);
        else
            encrypted = (char *)buf;
        ptr = encrypted;
        RC4_encrypt2(r->Link.rc4keyOut, n, buffer, ptr);
    }
#endif

    while (n > 0) {
        int nBytes;

        if (r->Link.protocol & RTMP_FEATURE_HTTP)
            nBytes = HTTP_Post(r, RTMPT_SEND, ptr, n);
        else
            nBytes = RTMPSockBuf_Send(&r->m_sb, ptr, n);
        RTMP_Log(RTMP_LOGDEBUG, "%s: %d\n", __FUNCTION__, nBytes); 

        if (nBytes < 0) {
            int sockerr = GetSockError();
            RTMP_Log(RTMP_LOGERROR, "%s, RTMP send error %d (%d bytes)",
                     __FUNCTION__, sockerr, n);

            if (sockerr == EINTR && !RTMP_ctrlC)
                continue;

            RTMP_Close(r);
            n = 1;
            break;
        }

        if (nBytes == 0)
            break;

        n -= nBytes;
        ptr += nBytes;
    }

#ifdef CRYPTO
    if (encrypted && encrypted != buf)
        free(encrypted);
#endif

    return n == 0;
}

#define SAVC(x) static const AVal av_##x = AVC(#x)

/*
static const AVal av_app = AVC("app");

调用 SAVC(app) 的效果等价于以下代码：

static const AVal av_app = { "app", 3 };

#x: 将宏参数 x 转换为字符串字面量。
av_##x: 将 x 与前缀 av_ 拼接成变量名，例如 SAVC(app) 会生成变量 av_app。


SAVC 宏用于定义静态常量字符串（AVal 类型）：

av_app 是一个全局的、静态的变量，用于表示 "app" 及其长度。
它的作用是避免重复硬编码字符串，并提供统一的方式管理 RTMP 协议中的关键字。
*/
SAVC(app);
SAVC(connect);
SAVC(flashVer);
SAVC(swfUrl);
SAVC(pageUrl);
SAVC(tcUrl);
SAVC(fpad);
SAVC(capabilities);
SAVC(audioCodecs);
SAVC(videoCodecs);
SAVC(videoFunction);
SAVC(objectEncoding);
SAVC(secureToken);
SAVC(secureTokenResponse);
SAVC(type);
SAVC(nonprivate);

static int SendConnectPacket(RTMP *r, RTMPPacket *cp) {
    RTMPPacket packet;
    char pbuf[4096], *pend = pbuf + sizeof(pbuf);
    char *enc;

    if (cp)
        return RTMP_SendPacket(r, cp, TRUE);

    packet.m_nChannel = 0x03; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_connect);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_OBJECT;

    enc = AMF_EncodeNamedString(enc, pend, &av_app, &r->Link.app);
    if (!enc)
        return FALSE;
    if (r->Link.protocol & RTMP_FEATURE_WRITE) {
        enc = AMF_EncodeNamedString(enc, pend, &av_type, &av_nonprivate);
        if (!enc)
            return FALSE;
    }
    if (r->Link.flashVer.av_len) {
        enc = AMF_EncodeNamedString(enc, pend, &av_flashVer, &r->Link.flashVer);
        if (!enc)
            return FALSE;
    }
    if (r->Link.swfUrl.av_len) {
        enc = AMF_EncodeNamedString(enc, pend, &av_swfUrl, &r->Link.swfUrl);
        if (!enc)
            return FALSE;
    }
    if (r->Link.tcUrl.av_len) {
        enc = AMF_EncodeNamedString(enc, pend, &av_tcUrl, &r->Link.tcUrl);
        if (!enc)
            return FALSE;
    }
    if (!(r->Link.protocol & RTMP_FEATURE_WRITE)) {
        enc = AMF_EncodeNamedBoolean(enc, pend, &av_fpad, FALSE);
        if (!enc)
            return FALSE;
        enc = AMF_EncodeNamedNumber(enc, pend, &av_capabilities, 15.0);
        if (!enc)
            return FALSE;
        enc = AMF_EncodeNamedNumber(enc, pend, &av_audioCodecs,
                                    r->m_fAudioCodecs);
        if (!enc)
            return FALSE;
        enc = AMF_EncodeNamedNumber(enc, pend, &av_videoCodecs,
                                    r->m_fVideoCodecs);
        if (!enc)
            return FALSE;
        enc = AMF_EncodeNamedNumber(enc, pend, &av_videoFunction, 1.0);
        if (!enc)
            return FALSE;
        if (r->Link.pageUrl.av_len) {
            enc =
                AMF_EncodeNamedString(enc, pend, &av_pageUrl, &r->Link.pageUrl);
            if (!enc)
                return FALSE;
        }
    }
    if (r->m_fEncoding != 0.0 ||
        r->m_bSendEncoding) { /* AMF0, AMF3 not fully supported yet */
        enc = AMF_EncodeNamedNumber(enc, pend, &av_objectEncoding,
                                    r->m_fEncoding);
        if (!enc)
            return FALSE;
    }
    if (enc + 3 >= pend)
        return FALSE;
    *enc++ = 0;
    *enc++ = 0; /* end of object - 0x00 0x00 0x09 */
    *enc++ = AMF_OBJECT_END;

    /* add auth string */
    if (r->Link.auth.av_len) {
        enc = AMF_EncodeBoolean(enc, pend, r->Link.lFlags & RTMP_LF_AUTH);
        if (!enc)
            return FALSE;
        enc = AMF_EncodeString(enc, pend, &r->Link.auth);
        if (!enc)
            return FALSE;
    }
    if (r->Link.extras.o_num) {
        int i;
        for (i = 0; i < r->Link.extras.o_num; i++) {
            enc = AMFProp_Encode(&r->Link.extras.o_props[i], enc, pend);
            if (!enc)
                return FALSE;
        }
    }
    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, TRUE);
}

#if 0 /* unused */
SAVC(bgHasStream);

static int
SendBGHasStream(RTMP *r, double dId, AVal *playpath)
{
  RTMPPacket packet;
  char pbuf[1024], *pend = pbuf + sizeof(pbuf);
  char *enc;

  packet.m_nChannel = 0x03;	/* control channel (invoke) */
  packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
  packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
  packet.m_nTimeStamp = 0;
  packet.m_nInfoField2 = 0;
  packet.m_hasAbsTimestamp = 0;
  packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

  enc = packet.m_body;
  enc = AMF_EncodeString(enc, pend, &av_bgHasStream);
  enc = AMF_EncodeNumber(enc, pend, dId);
  *enc++ = AMF_NULL;

  enc = AMF_EncodeString(enc, pend, playpath);
  if (enc == NULL)
    return FALSE;

  packet.m_nBodySize = enc - packet.m_body;

  return RTMP_SendPacket(r, &packet, TRUE);
}
#endif

SAVC(createStream);

int RTMP_SendCreateStream(RTMP *r) {
    RTMPPacket packet;
    char pbuf[256], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x03; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_createStream);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_NULL; /* NULL */

    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, TRUE);
}

SAVC(FCSubscribe);

static int SendFCSubscribe(RTMP *r, AVal *subscribepath) {
    RTMPPacket packet;
    char pbuf[512], *pend = pbuf + sizeof(pbuf);
    char *enc;
    packet.m_nChannel = 0x03; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    RTMP_Log(RTMP_LOGDEBUG, "FCSubscribe: %s", subscribepath->av_val);
    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_FCSubscribe);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_NULL;
    enc = AMF_EncodeString(enc, pend, subscribepath);

    if (!enc)
        return FALSE;

    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, TRUE);
}

/* Justin.tv specific authentication */
static const AVal av_NetStream_Authenticate_UsherToken =
    AVC("NetStream.Authenticate.UsherToken");

static int SendUsherToken(RTMP *r, AVal *usherToken) {
    RTMPPacket packet;
    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
    char *enc;
    packet.m_nChannel = 0x03; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    RTMP_Log(RTMP_LOGDEBUG, "UsherToken: %s", usherToken->av_val);
    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_NetStream_Authenticate_UsherToken);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_NULL;
    enc = AMF_EncodeString(enc, pend, usherToken);

    if (!enc)
        return FALSE;

    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, FALSE);
}
/******************************************/

SAVC(releaseStream);

static int SendReleaseStream(RTMP *r) {
    RTMPPacket packet;
    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x03; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_releaseStream);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_NULL;
    enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
    if (!enc)
        return FALSE;

    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, FALSE);
}

SAVC(FCPublish);

static int SendFCPublish(RTMP *r) {
    RTMPPacket packet;
    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x03; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_FCPublish);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_NULL;
    enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
    if (!enc)
        return FALSE;

    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, FALSE);
}

SAVC(FCUnpublish);

static int SendFCUnpublish(RTMP *r) {
    RTMPPacket packet;
    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x03; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_FCUnpublish);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_NULL;
    enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
    if (!enc)
        return FALSE;

    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, FALSE);
}

SAVC(publish);
SAVC(live);
SAVC(record);

static int SendPublish(RTMP *r) {
    RTMPPacket packet;
    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x04; /* source channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = r->m_stream_id;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_publish);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_NULL;
    enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
    if (!enc)
        return FALSE;

    /* FIXME: should we choose live based on Link.lFlags & RTMP_LF_LIVE? */
    enc = AMF_EncodeString(enc, pend, &av_live);
    if (!enc)
        return FALSE;

    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, TRUE);
}

SAVC(deleteStream);

static int SendDeleteStream(RTMP *r, double dStreamId) {
    RTMPPacket packet;
    char pbuf[256], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x03; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_deleteStream);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_NULL;
    enc = AMF_EncodeNumber(enc, pend, dStreamId);

    packet.m_nBodySize = enc - packet.m_body;

    /* no response expected */
    return RTMP_SendPacket(r, &packet, FALSE);
}

SAVC(pause);

int RTMP_SendPause(RTMP *r, int DoPause, int iTime) {
    RTMPPacket packet;
    char pbuf[256], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x08; /* video channel */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_pause);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_NULL;
    enc = AMF_EncodeBoolean(enc, pend, DoPause);
    enc = AMF_EncodeNumber(enc, pend, (double)iTime);

    packet.m_nBodySize = enc - packet.m_body;

    RTMP_Log(RTMP_LOGDEBUG, "%s, %d, pauseTime=%d", __FUNCTION__, DoPause,
             iTime);
    return RTMP_SendPacket(r, &packet, TRUE);
}

int RTMP_Pause(RTMP *r, int DoPause) {
    if (DoPause)
        r->m_pauseStamp = r->m_mediaChannel < r->m_channelsAllocatedIn
                              ? r->m_channelTimestamp[r->m_mediaChannel]
                              : 0;
    return RTMP_SendPause(r, DoPause, r->m_pauseStamp);
}

SAVC(seek);

int RTMP_SendSeek(RTMP *r, int iTime) {
    RTMPPacket packet;
    char pbuf[256], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x08; /* video channel */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_seek);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_NULL;
    enc = AMF_EncodeNumber(enc, pend, (double)iTime);

    packet.m_nBodySize = enc - packet.m_body;

    r->m_read.flags |= RTMP_READ_SEEKING;
    r->m_read.nResumeTS = 0;

    return RTMP_SendPacket(r, &packet, TRUE);
}

int RTMP_SendServerBW(RTMP *r) {
    RTMPPacket packet;
    char pbuf[256], *pend = pbuf + sizeof(pbuf);

    packet.m_nChannel = 0x02; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
    packet.m_packetType = RTMP_PACKET_TYPE_SERVER_BW;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    packet.m_nBodySize = 4;

    AMF_EncodeInt32(packet.m_body, pend, r->m_nServerBW);
    return RTMP_SendPacket(r, &packet, FALSE);
}

int RTMP_SendClientBW(RTMP *r) {
    RTMPPacket packet;
    char pbuf[256], *pend = pbuf + sizeof(pbuf);

    packet.m_nChannel = 0x02; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
    packet.m_packetType = RTMP_PACKET_TYPE_CLIENT_BW;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    packet.m_nBodySize = 5;

    AMF_EncodeInt32(packet.m_body, pend, r->m_nClientBW);
    packet.m_body[4] = r->m_nClientBW2;
    return RTMP_SendPacket(r, &packet, FALSE);
}

static int SendBytesReceived(RTMP *r) {
    RTMPPacket packet;
    char pbuf[256], *pend = pbuf + sizeof(pbuf);

    packet.m_nChannel = 0x02; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_BYTES_READ_REPORT;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    packet.m_nBodySize = 4;

    AMF_EncodeInt32(packet.m_body, pend,
                    r->m_nBytesIn); /* hard coded for now */
    r->m_nBytesInSent = r->m_nBytesIn;

    /*RTMP_Log(RTMP_LOGDEBUG, "Send bytes report. 0x%x (%d bytes)", (unsigned
     * int)m_nBytesIn, m_nBytesIn); */
    return RTMP_SendPacket(r, &packet, FALSE);
}

SAVC(_checkbw);

static int SendCheckBW(RTMP *r) {
    RTMPPacket packet;
    char pbuf[256], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x03; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0; /* RTMP_GetTime(); */
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av__checkbw);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_NULL;

    packet.m_nBodySize = enc - packet.m_body;

    /* triggers _onbwcheck and eventually results in _onbwdone */
    return RTMP_SendPacket(r, &packet, FALSE);
}

SAVC(_result);

static int SendCheckBWResult(RTMP *r, double txn) {
    RTMPPacket packet;
    char pbuf[256], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x03; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp =
        0x16 *
        r->m_nBWCheckCounter; /* temp inc value. till we figure it out. */
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av__result);
    enc = AMF_EncodeNumber(enc, pend, txn);
    *enc++ = AMF_NULL;
    enc = AMF_EncodeNumber(enc, pend, (double)r->m_nBWCheckCounter++);

    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, FALSE);
}

SAVC(ping);
SAVC(pong);

static int SendPong(RTMP *r, double txn) {
    RTMPPacket packet;
    char pbuf[256], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x03; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp =
        0x16 *
        r->m_nBWCheckCounter; /* temp inc value. till we figure it out. */
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_pong);
    enc = AMF_EncodeNumber(enc, pend, txn);
    *enc++ = AMF_NULL;

    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, FALSE);
}

SAVC(play);

static int SendPlay(RTMP *r) {
    RTMPPacket packet;
    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x08; /* we make 8 our stream channel */
    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = r->m_stream_id; /*0x01000000; */
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_play);
    enc = AMF_EncodeNumber(enc, pend, ++r->m_numInvokes);
    *enc++ = AMF_NULL;

    RTMP_Log(RTMP_LOGDEBUG, "%s, seekTime=%d, stopTime=%d, sending play: %s",
             __FUNCTION__, r->Link.seekTime, r->Link.stopTime,
             r->Link.playpath.av_val);
    enc = AMF_EncodeString(enc, pend, &r->Link.playpath);
    if (!enc)
        return FALSE;

    /* Optional parameters start and len.
     *
     * start: -2, -1, 0, positive number
     *  -2: looks for a live stream, then a recorded stream,
     *      if not found any open a live stream
     *  -1: plays a live stream
     * >=0: plays a recorded streams from 'start' milliseconds
     */
    if (r->Link.lFlags & RTMP_LF_LIVE)
        enc = AMF_EncodeNumber(enc, pend, -1000.0);
    else {
        if (r->Link.seekTime > 0.0)
            enc = AMF_EncodeNumber(enc, pend,
                                   r->Link.seekTime); /* resume from here */
        else
            enc = AMF_EncodeNumber(enc, pend, 0.0);
        /*-2000.0);*/ /* recorded as default, -2000.0 is not reliable since
                         that freezes the player if the stream is not found */
    }
    if (!enc)
        return FALSE;

    /* len: -1, 0, positive number
     *  -1: plays live or recorded stream to the end (default)
     *   0: plays a frame 'start' ms away from the beginning
     *  >0: plays a live or recoded stream for 'len' milliseconds
     */
    /*enc += EncodeNumber(enc, -1.0); */ /* len */
    if (r->Link.stopTime) {
        enc = AMF_EncodeNumber(enc, pend, r->Link.stopTime - r->Link.seekTime);
        if (!enc)
            return FALSE;
    }

    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, TRUE);
}

SAVC(set_playlist);
SAVC(0);

static int SendPlaylist(RTMP *r) {
    RTMPPacket packet;
    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x08; /* we make 8 our stream channel */
    packet.m_headerType = RTMP_PACKET_SIZE_LARGE;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = r->m_stream_id; /*0x01000000; */
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_set_playlist);
    enc = AMF_EncodeNumber(enc, pend, 0);
    *enc++ = AMF_NULL;
    *enc++ = AMF_ECMA_ARRAY;
    *enc++ = 0;
    *enc++ = 0;
    *enc++ = 0;
    *enc++ = AMF_OBJECT;
    enc = AMF_EncodeNamedString(enc, pend, &av_0, &r->Link.playpath);
    if (!enc)
        return FALSE;
    if (enc + 3 >= pend)
        return FALSE;
    *enc++ = 0;
    *enc++ = 0;
    *enc++ = AMF_OBJECT_END;

    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, TRUE);
}

static int SendSecureTokenResponse(RTMP *r, AVal *resp) {
    RTMPPacket packet;
    char pbuf[1024], *pend = pbuf + sizeof(pbuf);
    char *enc;

    packet.m_nChannel = 0x03; /* control channel (invoke) */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_INVOKE;
    packet.m_nTimeStamp = 0;
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    enc = packet.m_body;
    enc = AMF_EncodeString(enc, pend, &av_secureTokenResponse);
    enc = AMF_EncodeNumber(enc, pend, 0.0);
    *enc++ = AMF_NULL;
    enc = AMF_EncodeString(enc, pend, resp);
    if (!enc)
        return FALSE;

    packet.m_nBodySize = enc - packet.m_body;

    return RTMP_SendPacket(r, &packet, FALSE);
}

/*
from http://jira.red5.org/confluence/display/docs/Ping:

Ping is the most mysterious message in RTMP and till now we haven't fully
interpreted it yet. In summary, Ping message is used as a special command that
are exchanged between client and server. This page aims to document all known
Ping messages. Expect the list to grow.

The type of Ping packet is 0x4 and contains two mandatory parameters and two
optional parameters. The first parameter is the type of Ping and in short
integer. The second parameter is the target of the ping. As Ping is always sent
in Channel 2 (control channel) and the target object in RTMP header is always 0
which means the Connection object, it's necessary to put an extra parameter to
indicate the exact target object the Ping is sent to. The second parameter takes
this responsibility. The value has the same meaning as the target object field
in RTMP header. (The second value could also be used as other purposes, like RTT
Ping/Pong. It is used as the timestamp.) The third and fourth parameters are
optional and could be looked upon as the parameter of the Ping packet. Below is
an unexhausted list of Ping messages.

    * type 0: Clear the stream. No third and fourth parameters. The second
parameter could be 0. After the connection is established, a Ping 0,0 will be
sent from server to client. The message will also be sent to client on the start
of Play and in response of a Seek or Pause/Resume request. This Ping tells
client to re-calibrate the clock with the timestamp of the next packet server
sends.
    * type 1: Tell the stream to clear the playing buffer.
    * type 3: Buffer time of the client. The third parameter is the buffer time
in millisecond.
    * type 4: Reset a stream. Used together with type 0 in the case of VOD.
Often sent before type 0.
    * type 6: Ping the client from server. The second parameter is the current
time.
    * type 7: Pong reply from client. The second parameter is the time the
server sent with his ping request.
    * type 26: SWFVerification request
    * type 27: SWFVerification response
*/
int RTMP_SendCtrl(RTMP *r, short nType, unsigned int nObject,
                  unsigned int nTime) {
    RTMPPacket packet;
    char pbuf[256], *pend = pbuf + sizeof(pbuf);
    int nSize;
    char *buf;

    RTMP_Log(RTMP_LOGDEBUG, "sending ctrl. type: 0x%04x",
             (unsigned short)nType);

    packet.m_nChannel = 0x02; /* control channel (ping) */
    packet.m_headerType = RTMP_PACKET_SIZE_MEDIUM;
    packet.m_packetType = RTMP_PACKET_TYPE_CONTROL;
    packet.m_nTimeStamp = 0; /* RTMP_GetTime(); */
    packet.m_nInfoField2 = 0;
    packet.m_hasAbsTimestamp = 0;
    packet.m_body = pbuf + RTMP_MAX_HEADER_SIZE;

    switch (nType) {
    case 0x03:
        nSize = 10;
        break; /* buffer time */
    case 0x1A:
        nSize = 3;
        break; /* SWF verify request */
    case 0x1B:
        nSize = 44;
        break; /* SWF verify response */
    default:
        nSize = 6;
        break;
    }

    packet.m_nBodySize = nSize;

    buf = packet.m_body;
    buf = AMF_EncodeInt16(buf, pend, nType);

    if (nType == 0x1B) {
#ifdef CRYPTO
        memcpy(buf, r->Link.SWFVerificationResponse, 42);
        RTMP_Log(RTMP_LOGDEBUG, "Sending SWFVerification response: ");
        RTMP_LogHex(RTMP_LOGDEBUG, (uint8_t *)packet.m_body,
                    packet.m_nBodySize);
#endif
    }
    else if (nType == 0x1A) {
        *buf = nObject & 0xff;
    }
    else {
        if (nSize > 2)
            buf = AMF_EncodeInt32(buf, pend, nObject);

        if (nSize > 6)
            buf = AMF_EncodeInt32(buf, pend, nTime);
    }

    return RTMP_SendPacket(r, &packet, FALSE);
}

static void AV_erase(RTMP_METHOD *vals, int *num, int i, int freeit) {
    if (freeit)
        free(vals[i].name.av_val);
    (*num)--;
    for (; i < *num; i++) {
        vals[i] = vals[i + 1];
    }
    vals[i].name.av_val = NULL;
    vals[i].name.av_len = 0;
    vals[i].num = 0;
}

void RTMP_DropRequest(RTMP *r, int i, int freeit) {
    AV_erase(r->m_methodCalls, &r->m_numCalls, i, freeit);
}

static void AV_queue(RTMP_METHOD **vals, int *num, AVal *av, int txn) {
    char *tmp;
    if (!(*num & 0x0f))
        *vals = realloc(*vals, (*num + 16) * sizeof(RTMP_METHOD));
    tmp = malloc(av->av_len + 1);
    memcpy(tmp, av->av_val, av->av_len);
    tmp[av->av_len] = '\0';
    (*vals)[*num].num = txn;
    (*vals)[*num].name.av_len = av->av_len;
    (*vals)[(*num)++].name.av_val = tmp;
}

static void AV_clear(RTMP_METHOD *vals, int num) {
    int i;
    for (i = 0; i < num; i++)
        free(vals[i].name.av_val);
    free(vals);
}

#ifdef CRYPTO
static int b64enc(const unsigned char *input, int length, char *output,
                  int maxsize) {
#ifdef USE_POLARSSL
    size_t buf_size = maxsize;
    if (base64_encode((unsigned char *)output, &buf_size, input, length) == 0) {
        output[buf_size] = '\0';
        return 1;
    }
    else {
        RTMP_Log(RTMP_LOGDEBUG, "%s, error", __FUNCTION__);
        return 0;
    }
#elif defined(USE_GNUTLS)
    if (BASE64_ENCODE_RAW_LENGTH(length) <= maxsize)
        base64_encode_raw((uint8_t *)output, length, input);
    else {
        RTMP_Log(RTMP_LOGDEBUG, "%s, error", __FUNCTION__);
        return 0;
    }
#else /* USE_OPENSSL */
    BIO *bmem, *b64;
    BUF_MEM *bptr;

    b64 = BIO_new(BIO_f_base64());
    bmem = BIO_new(BIO_s_mem());
    b64 = BIO_push(b64, bmem);
    BIO_write(b64, input, length);
    if (BIO_flush(b64) == 1) {
        BIO_get_mem_ptr(b64, &bptr);
        memcpy(output, bptr->data, bptr->length - 1);
        output[bptr->length - 1] = '\0';
    }
    else {
        RTMP_Log(RTMP_LOGDEBUG, "%s, error", __FUNCTION__);
        return 0;
    }
    BIO_free_all(b64);
#endif
    return 1;
}

#ifdef USE_POLARSSL
#define MD5_CTX md5_context
#define MD5_Init(ctx) md5_starts(ctx)
#define MD5_Update(ctx, data, len) md5_update(ctx, (unsigned char *)data, len)
#define MD5_Final(dig, ctx) md5_finish(ctx, dig)
#elif defined(USE_GNUTLS)
typedef struct md5_ctx MD5_CTX;
#define MD5_Init(ctx) md5_init(ctx)
#define MD5_Update(ctx, data, len) md5_update(ctx, len, data)
#define MD5_Final(dig, ctx) md5_digest(ctx, MD5_DIGEST_LENGTH, dig)
#else
#endif

static const AVal av_authmod_adobe = AVC("authmod=adobe");
static const AVal av_authmod_llnw = AVC("authmod=llnw");

static void hexenc(unsigned char *inbuf, int len, char *dst) {
    char *ptr = dst;
    while (len--) {
        sprintf(ptr, "%02x", *inbuf++);
        ptr += 2;
    }
    *ptr = '\0';
}

static char *AValChr(AVal *av, char c) {
    int i;
    for (i = 0; i < av->av_len; i++)
        if (av->av_val[i] == c)
            return &av->av_val[i];
    return NULL;
}

static int PublisherAuth(RTMP *r, AVal *description) {
    char *token_in = NULL;
    char *ptr;
    unsigned char md5sum_val[MD5_DIGEST_LENGTH + 1];
    MD5_CTX md5ctx;
    int challenge2_data;
#define RESPONSE_LEN 32
#define CHALLENGE2_LEN 16
#define SALTED2_LEN (32 + 8 + 8 + 8)
#define B64DIGEST_LEN                                                          \
    24               /* 16 byte digest => 22 b64 chars + 2 chars padding       \
                      */
#define B64INT_LEN 8 /* 4 byte int => 6 b64 chars + 2 chars padding */
#define HEXHASH_LEN (2 * MD5_DIGEST_LENGTH)
    char response[RESPONSE_LEN];
    char challenge2[CHALLENGE2_LEN];
    char salted2[SALTED2_LEN];
    AVal pubToken;

    if (strstr(description->av_val, av_authmod_adobe.av_val) != NULL) {
        if (strstr(description->av_val, "code=403 need auth") != NULL) {
            if (strstr(r->Link.app.av_val, av_authmod_adobe.av_val) != NULL) {
                RTMP_Log(RTMP_LOGERROR,
                         "%s, wrong pubUser & pubPasswd for publisher auth",
                         __FUNCTION__);
                return 0;
            }
            else if (r->Link.pubUser.av_len && r->Link.pubPasswd.av_len) {
                pubToken.av_val = malloc(r->Link.pubUser.av_len +
                                         av_authmod_adobe.av_len + 8);
                pubToken.av_len =
                    sprintf(pubToken.av_val, "?%s&user=%s",
                            av_authmod_adobe.av_val, r->Link.pubUser.av_val);
                RTMP_Log(RTMP_LOGDEBUG, "%s, pubToken1: %s", __FUNCTION__,
                         pubToken.av_val);
            }
            else {
                RTMP_Log(
                    RTMP_LOGERROR,
                    "%s, need to set pubUser & pubPasswd for publisher auth",
                    __FUNCTION__);
                return 0;
            }
        }
        else if ((token_in = strstr(description->av_val, "?reason=needauth")) !=
                 NULL) {
            char *par, *val = NULL, *orig_ptr;
            AVal user, salt, opaque, challenge, *aptr = NULL;
            opaque.av_len = 0;
            challenge.av_len = 0;

            ptr = orig_ptr = strdup(token_in);
            while (ptr) {
                par = ptr;
                ptr = strchr(par, '&');
                if (ptr)
                    *ptr++ = '\0';

                val = strchr(par, '=');
                if (val)
                    *val++ = '\0';

                if (aptr) {
                    aptr->av_len = par - aptr->av_val - 1;
                    aptr = NULL;
                }
                if (strcmp(par, "user") == 0) {
                    user.av_val = val;
                    aptr = &user;
                }
                else if (strcmp(par, "salt") == 0) {
                    salt.av_val = val;
                    aptr = &salt;
                }
                else if (strcmp(par, "opaque") == 0) {
                    opaque.av_val = val;
                    aptr = &opaque;
                }
                else if (strcmp(par, "challenge") == 0) {
                    challenge.av_val = val;
                    aptr = &challenge;
                }

                RTMP_Log(RTMP_LOGDEBUG, "%s, par:\"%s\" = val:\"%s\"",
                         __FUNCTION__, par, val);
            }
            if (aptr)
                aptr->av_len = strlen(aptr->av_val);

            /* hash1 = base64enc(md5(user + _aodbeAuthSalt + password)) */
            MD5_Init(&md5ctx);
            MD5_Update(&md5ctx, user.av_val, user.av_len);
            MD5_Update(&md5ctx, salt.av_val, salt.av_len);
            MD5_Update(&md5ctx, r->Link.pubPasswd.av_val,
                       r->Link.pubPasswd.av_len);
            MD5_Final(md5sum_val, &md5ctx);
            RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s%s%s) =>", __FUNCTION__,
                     user.av_val, salt.av_val, r->Link.pubPasswd.av_val);
            RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);

            b64enc(md5sum_val, MD5_DIGEST_LENGTH, salted2, SALTED2_LEN);
            RTMP_Log(RTMP_LOGDEBUG, "%s, b64(md5_1) = %s", __FUNCTION__,
                     salted2);

            challenge2_data = rand();

            b64enc((unsigned char *)&challenge2_data, sizeof(int), challenge2,
                   CHALLENGE2_LEN);
            RTMP_Log(RTMP_LOGDEBUG, "%s, b64(%d) = %s", __FUNCTION__,
                     challenge2_data, challenge2);

            MD5_Init(&md5ctx);
            MD5_Update(&md5ctx, salted2, B64DIGEST_LEN);
            /* response = base64enc(md5(hash1 + opaque + challenge2)) */
            if (opaque.av_len)
                MD5_Update(&md5ctx, opaque.av_val, opaque.av_len);
            else if (challenge.av_len)
                MD5_Update(&md5ctx, challenge.av_val, challenge.av_len);
            MD5_Update(&md5ctx, challenge2, B64INT_LEN);
            MD5_Final(md5sum_val, &md5ctx);

            RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s%s%s) =>", __FUNCTION__, salted2,
                     opaque.av_len ? opaque.av_val : "", challenge2);
            RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);

            b64enc(md5sum_val, MD5_DIGEST_LENGTH, response, RESPONSE_LEN);
            RTMP_Log(RTMP_LOGDEBUG, "%s, b64(md5_2) = %s", __FUNCTION__,
                     response);

            /* have all hashes, create auth token for the end of app */
            pubToken.av_val =
                malloc(32 + B64INT_LEN + B64DIGEST_LEN + opaque.av_len);
            pubToken.av_len = sprintf(
                pubToken.av_val, "&challenge=%s&response=%s&opaque=%s",
                challenge2, response, opaque.av_len ? opaque.av_val : "");
            RTMP_Log(RTMP_LOGDEBUG, "%s, pubToken2: %s", __FUNCTION__,
                     pubToken.av_val);
            free(orig_ptr);
        }
        else if (strstr(description->av_val, "?reason=authfailed") != NULL) {
            RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: wrong password",
                     __FUNCTION__);
            return 0;
        }
        else if (strstr(description->av_val, "?reason=nosuchuser") != NULL) {
            RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: no such user",
                     __FUNCTION__);
            return 0;
        }
        else {
            RTMP_Log(RTMP_LOGERROR,
                     "%s, Authentication failed: unknown auth mode: %s",
                     __FUNCTION__, description->av_val);
            return 0;
        }

        ptr = malloc(r->Link.app.av_len + pubToken.av_len);
        strncpy(ptr, r->Link.app.av_val, r->Link.app.av_len);
        strncpy(ptr + r->Link.app.av_len, pubToken.av_val, pubToken.av_len);
        r->Link.app.av_len += pubToken.av_len;
        if (r->Link.lFlags & RTMP_LF_FAPU)
            free(r->Link.app.av_val);
        r->Link.app.av_val = ptr;

        ptr = malloc(r->Link.tcUrl.av_len + pubToken.av_len);
        strncpy(ptr, r->Link.tcUrl.av_val, r->Link.tcUrl.av_len);
        strncpy(ptr + r->Link.tcUrl.av_len, pubToken.av_val, pubToken.av_len);
        r->Link.tcUrl.av_len += pubToken.av_len;
        if (r->Link.lFlags & RTMP_LF_FTCU)
            free(r->Link.tcUrl.av_val);
        r->Link.tcUrl.av_val = ptr;

        free(pubToken.av_val);
        r->Link.lFlags |= RTMP_LF_FTCU | RTMP_LF_FAPU;

        RTMP_Log(RTMP_LOGDEBUG, "%s, new app: %.*s tcUrl: %.*s playpath: %s",
                 __FUNCTION__, r->Link.app.av_len, r->Link.app.av_val,
                 r->Link.tcUrl.av_len, r->Link.tcUrl.av_val,
                 r->Link.playpath.av_val);
    }
    else if (strstr(description->av_val, av_authmod_llnw.av_val) != NULL) {
        if (strstr(description->av_val, "code=403 need auth") != NULL) {
            /* This part seems to be the same for llnw and adobe */

            if (strstr(r->Link.app.av_val, av_authmod_llnw.av_val) != NULL) {
                RTMP_Log(RTMP_LOGERROR,
                         "%s, wrong pubUser & pubPasswd for publisher auth",
                         __FUNCTION__);
                return 0;
            }
            else if (r->Link.pubUser.av_len && r->Link.pubPasswd.av_len) {
                pubToken.av_val =
                    malloc(r->Link.pubUser.av_len + av_authmod_llnw.av_len + 8);
                pubToken.av_len =
                    sprintf(pubToken.av_val, "?%s&user=%s",
                            av_authmod_llnw.av_val, r->Link.pubUser.av_val);
                RTMP_Log(RTMP_LOGDEBUG, "%s, pubToken1: %s", __FUNCTION__,
                         pubToken.av_val);
            }
            else {
                RTMP_Log(
                    RTMP_LOGERROR,
                    "%s, need to set pubUser & pubPasswd for publisher auth",
                    __FUNCTION__);
                return 0;
            }
        }
        else if ((token_in = strstr(description->av_val, "?reason=needauth")) !=
                 NULL) {
            char *orig_ptr;
            char *par, *val = NULL;
            char hash1[HEXHASH_LEN + 1], hash2[HEXHASH_LEN + 1],
                hash3[HEXHASH_LEN + 1];
            AVal user, nonce, *aptr = NULL;
            AVal apptmp;

            /* llnw auth method
             * Seems to be closely based on HTTP Digest Auth:
             *    http://tools.ietf.org/html/rfc2617
             *    http://en.wikipedia.org/wiki/Digest_access_authentication
             */

            const char authmod[] = "llnw";
            const char realm[] = "live";
            const char method[] = "publish";
            const char qop[] = "auth";
            /* nc = 1..connection count (or rather, number of times cnonce has
             * been reused) */
            int nc = 1;
            /* nchex = hexenc(nc) (8 hex digits according to RFC 2617) */
            char nchex[9];
            /* cnonce = hexenc(4 random bytes) (initialized on first connection)
             */
            char cnonce[9];

            ptr = orig_ptr = strdup(token_in);
            /* Extract parameters (we need user and nonce) */
            while (ptr) {
                par = ptr;
                ptr = strchr(par, '&');
                if (ptr)
                    *ptr++ = '\0';

                val = strchr(par, '=');
                if (val)
                    *val++ = '\0';

                if (aptr) {
                    aptr->av_len = par - aptr->av_val - 1;
                    aptr = NULL;
                }
                if (strcmp(par, "user") == 0) {
                    user.av_val = val;
                    aptr = &user;
                }
                else if (strcmp(par, "nonce") == 0) {
                    nonce.av_val = val;
                    aptr = &nonce;
                }

                RTMP_Log(RTMP_LOGDEBUG, "%s, par:\"%s\" = val:\"%s\"",
                         __FUNCTION__, par, val);
            }
            if (aptr)
                aptr->av_len = strlen(aptr->av_val);

            /* FIXME: handle case where user==NULL or nonce==NULL */

            sprintf(nchex, "%08x", nc);
            sprintf(cnonce, "%08x", rand());

            /* hash1 = hexenc(md5(user + ":" + realm + ":" + password)) */
            MD5_Init(&md5ctx);
            MD5_Update(&md5ctx, user.av_val, user.av_len);
            MD5_Update(&md5ctx, ":", 1);
            MD5_Update(&md5ctx, realm, sizeof(realm) - 1);
            MD5_Update(&md5ctx, ":", 1);
            MD5_Update(&md5ctx, r->Link.pubPasswd.av_val,
                       r->Link.pubPasswd.av_len);
            MD5_Final(md5sum_val, &md5ctx);
            RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s:%s:%s) =>", __FUNCTION__,
                     user.av_val, realm, r->Link.pubPasswd.av_val);
            RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
            hexenc(md5sum_val, MD5_DIGEST_LENGTH, hash1);

            /* hash2 = hexenc(md5(method + ":/" + app + "/" + appInstance)) */
            /* Extract appname + appinstance without query parameters */
            apptmp = r->Link.app;
            ptr = AValChr(&apptmp, '?');
            if (ptr)
                apptmp.av_len = ptr - apptmp.av_val;

            MD5_Init(&md5ctx);
            MD5_Update(&md5ctx, method, sizeof(method) - 1);
            MD5_Update(&md5ctx, ":/", 2);
            MD5_Update(&md5ctx, apptmp.av_val, apptmp.av_len);
            if (!AValChr(&apptmp, '/'))
                MD5_Update(&md5ctx, "/_definst_", sizeof("/_definst_") - 1);
            MD5_Final(md5sum_val, &md5ctx);
            RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s:/%.*s) =>", __FUNCTION__,
                     method, apptmp.av_len, apptmp.av_val);
            RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
            hexenc(md5sum_val, MD5_DIGEST_LENGTH, hash2);

            /* hash3 = hexenc(md5(hash1 + ":" + nonce + ":" + nchex + ":" +
             * cnonce +
             * ":" + qop + ":" + hash2)) */
            MD5_Init(&md5ctx);
            MD5_Update(&md5ctx, hash1, HEXHASH_LEN);
            MD5_Update(&md5ctx, ":", 1);
            MD5_Update(&md5ctx, nonce.av_val, nonce.av_len);
            MD5_Update(&md5ctx, ":", 1);
            MD5_Update(&md5ctx, nchex, sizeof(nchex) - 1);
            MD5_Update(&md5ctx, ":", 1);
            MD5_Update(&md5ctx, cnonce, sizeof(cnonce) - 1);
            MD5_Update(&md5ctx, ":", 1);
            MD5_Update(&md5ctx, qop, sizeof(qop) - 1);
            MD5_Update(&md5ctx, ":", 1);
            MD5_Update(&md5ctx, hash2, HEXHASH_LEN);
            MD5_Final(md5sum_val, &md5ctx);
            RTMP_Log(RTMP_LOGDEBUG, "%s, md5(%s:%s:%s:%s:%s:%s) =>",
                     __FUNCTION__, hash1, nonce.av_val, nchex, cnonce, qop,
                     hash2);
            RTMP_LogHexString(RTMP_LOGDEBUG, md5sum_val, MD5_DIGEST_LENGTH);
            hexenc(md5sum_val, MD5_DIGEST_LENGTH, hash3);

            /* pubToken =
             * &authmod=<authmod>&user=<username>&nonce=<nonce>&cnonce=<cnonce>&nc=<nchex>&response=<hash3>
             */
            /* Append nonces and response to query string which already contains
             * user + authmod */
            pubToken.av_val =
                malloc(64 + sizeof(authmod) - 1 + user.av_len + nonce.av_len +
                       sizeof(cnonce) - 1 + sizeof(nchex) - 1 + HEXHASH_LEN);
            sprintf(pubToken.av_val, "&nonce=%s&cnonce=%s&nc=%s&response=%s",
                    nonce.av_val, cnonce, nchex, hash3);
            pubToken.av_len = strlen(pubToken.av_val);
            RTMP_Log(RTMP_LOGDEBUG, "%s, pubToken2: %s", __FUNCTION__,
                     pubToken.av_val);

            free(orig_ptr);
        }
        else if (strstr(description->av_val, "?reason=authfail") != NULL) {
            RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed", __FUNCTION__);
            return 0;
        }
        else if (strstr(description->av_val, "?reason=nosuchuser") != NULL) {
            RTMP_Log(RTMP_LOGERROR, "%s, Authentication failed: no such user",
                     __FUNCTION__);
            return 0;
        }
        else {
            RTMP_Log(RTMP_LOGERROR,
                     "%s, Authentication failed: unknown auth mode: %s",
                     __FUNCTION__, description->av_val);
            return 0;
        }

        ptr = malloc(r->Link.app.av_len + pubToken.av_len);
        strncpy(ptr, r->Link.app.av_val, r->Link.app.av_len);
        strncpy(ptr + r->Link.app.av_len, pubToken.av_val, pubToken.av_len);
        r->Link.app.av_len += pubToken.av_len;
        if (r->Link.lFlags & RTMP_LF_FAPU)
            free(r->Link.app.av_val);
        r->Link.app.av_val = ptr;

        ptr = malloc(r->Link.tcUrl.av_len + pubToken.av_len);
        strncpy(ptr, r->Link.tcUrl.av_val, r->Link.tcUrl.av_len);
        strncpy(ptr + r->Link.tcUrl.av_len, pubToken.av_val, pubToken.av_len);
        r->Link.tcUrl.av_len += pubToken.av_len;
        if (r->Link.lFlags & RTMP_LF_FTCU)
            free(r->Link.tcUrl.av_val);
        r->Link.tcUrl.av_val = ptr;

        free(pubToken.av_val);
        r->Link.lFlags |= RTMP_LF_FTCU | RTMP_LF_FAPU;

        RTMP_Log(RTMP_LOGDEBUG, "%s, new app: %.*s tcUrl: %.*s playpath: %s",
                 __FUNCTION__, r->Link.app.av_len, r->Link.app.av_val,
                 r->Link.tcUrl.av_len, r->Link.tcUrl.av_val,
                 r->Link.playpath.av_val);
    }
    else {
        return 0;
    }
    return 1;
}
#endif

SAVC(onBWDone);
SAVC(onFCSubscribe);
SAVC(onFCUnsubscribe);
SAVC(_onbwcheck);
SAVC(_onbwdone);
SAVC(_error);
SAVC(close);
SAVC(code);
SAVC(level);
SAVC(description);
SAVC(onStatus);
SAVC(playlist_ready);
static const AVal av_NetStream_Failed = AVC("NetStream.Failed");
static const AVal av_NetStream_Play_Failed = AVC("NetStream.Play.Failed");
static const AVal av_NetStream_Play_StreamNotFound =
    AVC("NetStream.Play.StreamNotFound");
static const AVal av_NetConnection_Connect_InvalidApp =
    AVC("NetConnection.Connect.InvalidApp");
static const AVal av_NetStream_Play_Start = AVC("NetStream.Play.Start");
static const AVal av_NetStream_Play_Complete = AVC("NetStream.Play.Complete");
static const AVal av_NetStream_Play_Stop = AVC("NetStream.Play.Stop");
static const AVal av_NetStream_Seek_Notify = AVC("NetStream.Seek.Notify");
static const AVal av_NetStream_Pause_Notify = AVC("NetStream.Pause.Notify");
static const AVal av_NetStream_Play_PublishNotify =
    AVC("NetStream.Play.PublishNotify");
static const AVal av_NetStream_Play_UnpublishNotify =
    AVC("NetStream.Play.UnpublishNotify");
static const AVal av_NetStream_Publish_Start = AVC("NetStream.Publish.Start");
static const AVal av_NetConnection_Connect_Rejected =
    AVC("NetConnection.Connect.Rejected");

/* Returns 0 for OK/Failed/error, 1 for 'Stop or Complete' */
static int HandleInvoke(RTMP *r, const char *body, unsigned int nBodySize) {
    AMFObject obj;
    AVal method;
    double txn;
    int ret = 0, nRes;
    if (body[0] !=
        0x02) /* make sure it is a string method name we start with */
    {
        RTMP_Log(RTMP_LOGWARNING,
                 "%s, Sanity failed. no string method in invoke packet",
                 __FUNCTION__);
        return 0;
    }

    nRes = AMF_Decode(&obj, body, nBodySize, FALSE);
    if (nRes < 0) {
        RTMP_Log(RTMP_LOGERROR, "%s, error decoding invoke packet",
                 __FUNCTION__);
        return 0;
    }

    AMF_Dump(&obj);
    AMFProp_GetString(AMF_GetProp(&obj, NULL, 0), &method);
    txn = AMFProp_GetNumber(AMF_GetProp(&obj, NULL, 1));
    RTMP_Log(RTMP_LOGDEBUG, "%s, server invoking <%s>", __FUNCTION__,
             method.av_val);

    if (AVMATCH(&method, &av__result)) {
        AVal methodInvoked = {0};
        int i;

        for (i = 0; i < r->m_numCalls; i++) {
            if (r->m_methodCalls[i].num == (int)txn) {
                methodInvoked = r->m_methodCalls[i].name;
                AV_erase(r->m_methodCalls, &r->m_numCalls, i, FALSE);
                break;
            }
        }
        if (!methodInvoked.av_val) {
            RTMP_Log(RTMP_LOGDEBUG,
                     "%s, received result id %f without matching request",
                     __FUNCTION__, txn);
            goto leave;
        }

        RTMP_Log(RTMP_LOGDEBUG, "%s, received result for method call <%s>",
                 __FUNCTION__, methodInvoked.av_val);

        if (AVMATCH(&methodInvoked, &av_connect)) {
            if (r->Link.token.av_len) {
                AMFObjectProperty p;
                if (RTMP_FindFirstMatchingProperty(&obj, &av_secureToken, &p)) {
                    DecodeTEA(&r->Link.token, &p.p_vu.p_aval);
                    SendSecureTokenResponse(r, &p.p_vu.p_aval);
                }
            }
            if (r->Link.protocol & RTMP_FEATURE_WRITE) {
                SendReleaseStream(r);
                SendFCPublish(r);
            }
            else {
                RTMP_SendServerBW(r);
                RTMP_SendCtrl(r, 3, 0, 300);
            }
            RTMP_SendCreateStream(r);

            if (!(r->Link.protocol & RTMP_FEATURE_WRITE)) {
                /* Authenticate on Justin.tv legacy servers before sending
                 * FCSubscribe
                 */
                if (r->Link.usherToken.av_len)
                    SendUsherToken(r, &r->Link.usherToken);
                /* Send the FCSubscribe if live stream or if subscribepath is
                 * set */
                if (r->Link.subscribepath.av_len)
                    SendFCSubscribe(r, &r->Link.subscribepath);
                else if (r->Link.lFlags & RTMP_LF_LIVE)
                    SendFCSubscribe(r, &r->Link.playpath);
            }
        }
        else if (AVMATCH(&methodInvoked, &av_createStream)) {
            r->m_stream_id = (int)AMFProp_GetNumber(AMF_GetProp(&obj, NULL, 3));

            if (r->Link.protocol & RTMP_FEATURE_WRITE) {
                SendPublish(r);
            }
            else {
                if (r->Link.lFlags & RTMP_LF_PLST)
                    SendPlaylist(r);
                SendPlay(r);
                RTMP_SendCtrl(r, 3, r->m_stream_id, r->m_nBufferMS);
            }
        }
        else if (AVMATCH(&methodInvoked, &av_play) ||
                 AVMATCH(&methodInvoked, &av_publish)) {
            r->m_bPlaying = TRUE;
        }
        free(methodInvoked.av_val);
    }
    else if (AVMATCH(&method, &av_onBWDone)) {
        if (!r->m_nBWCheckCounter)
            SendCheckBW(r);
    }
    else if (AVMATCH(&method, &av_onFCSubscribe)) {
        /* SendOnFCSubscribe(); */
    }
    else if (AVMATCH(&method, &av_onFCUnsubscribe)) {
        RTMP_Close(r);
        ret = 1;
    }
    else if (AVMATCH(&method, &av_ping)) {
        SendPong(r, txn);
    }
    else if (AVMATCH(&method, &av__onbwcheck)) {
        SendCheckBWResult(r, txn);
    }
    else if (AVMATCH(&method, &av__onbwdone)) {
        int i;
        for (i = 0; i < r->m_numCalls; i++)
            if (AVMATCH(&r->m_methodCalls[i].name, &av__checkbw)) {
                AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
                break;
            }
    }
    else if (AVMATCH(&method, &av__error)) {
#ifdef CRYPTO
        AVal methodInvoked = {0};
        int i;

        if (r->Link.protocol & RTMP_FEATURE_WRITE) {
            for (i = 0; i < r->m_numCalls; i++) {
                if (r->m_methodCalls[i].num == txn) {
                    methodInvoked = r->m_methodCalls[i].name;
                    AV_erase(r->m_methodCalls, &r->m_numCalls, i, FALSE);
                    break;
                }
            }
            if (!methodInvoked.av_val) {
                RTMP_Log(RTMP_LOGDEBUG,
                         "%s, received result id %f without matching request",
                         __FUNCTION__, txn);
                goto leave;
            }

            RTMP_Log(RTMP_LOGDEBUG, "%s, received error for method call <%s>",
                     __FUNCTION__, methodInvoked.av_val);

            if (AVMATCH(&methodInvoked, &av_connect)) {
                AMFObject obj2;
                AVal code, level, description;
                AMFProp_GetObject(AMF_GetProp(&obj, NULL, 3), &obj2);
                AMFProp_GetString(AMF_GetProp(&obj2, &av_code, -1), &code);
                AMFProp_GetString(AMF_GetProp(&obj2, &av_level, -1), &level);
                AMFProp_GetString(AMF_GetProp(&obj2, &av_description, -1),
                                  &description);
                RTMP_Log(RTMP_LOGDEBUG, "%s, error description: %s",
                         __FUNCTION__, description.av_val);
                /* if PublisherAuth returns 1, then reconnect */
                if (PublisherAuth(r, &description) == 1) {
                    CloseInternal(r, 1);
                    if (!RTMP_Connect(r, NULL) || !RTMP_ConnectStream(r, 0))
                        goto leave;
                }
            }
        }
        else {
            RTMP_Log(RTMP_LOGERROR, "rtmp server sent error");
        }
        free(methodInvoked.av_val);
#else
        RTMP_Log(RTMP_LOGERROR, "rtmp server sent error");
#endif
    }
    else if (AVMATCH(&method, &av_close)) {
        RTMP_Log(RTMP_LOGERROR, "rtmp server requested close");
        RTMP_Close(r);
    }
    else if (AVMATCH(&method, &av_onStatus)) {
        AMFObject obj2;
        AVal code, level;
        AMFProp_GetObject(AMF_GetProp(&obj, NULL, 3), &obj2);
        AMFProp_GetString(AMF_GetProp(&obj2, &av_code, -1), &code);
        AMFProp_GetString(AMF_GetProp(&obj2, &av_level, -1), &level);

        RTMP_Log(RTMP_LOGDEBUG, "%s, onStatus: %s", __FUNCTION__, code.av_val);
        if (AVMATCH(&code, &av_NetStream_Failed) ||
            AVMATCH(&code, &av_NetStream_Play_Failed) ||
            AVMATCH(&code, &av_NetStream_Play_StreamNotFound) ||
            AVMATCH(&code, &av_NetConnection_Connect_InvalidApp)) {
            r->m_stream_id = -1;
            RTMP_Close(r);
            RTMP_Log(RTMP_LOGERROR, "Closing connection: %s", code.av_val);
        }

        else if (AVMATCH(&code, &av_NetStream_Play_Start) ||
                 AVMATCH(&code, &av_NetStream_Play_PublishNotify)) {
            int i;
            r->m_bPlaying = TRUE;
            for (i = 0; i < r->m_numCalls; i++) {
                if (AVMATCH(&r->m_methodCalls[i].name, &av_play)) {
                    AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
                    break;
                }
            }
        }

        else if (AVMATCH(&code, &av_NetStream_Publish_Start)) {
            int i;
            r->m_bPlaying = TRUE;
            for (i = 0; i < r->m_numCalls; i++) {
                if (AVMATCH(&r->m_methodCalls[i].name, &av_publish)) {
                    AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
                    break;
                }
            }
        }

        /* Return 1 if this is a Play.Complete or Play.Stop */
        else if (AVMATCH(&code, &av_NetStream_Play_Complete) ||
                 AVMATCH(&code, &av_NetStream_Play_Stop) ||
                 AVMATCH(&code, &av_NetStream_Play_UnpublishNotify)) {
            RTMP_Close(r);
            ret = 1;
        }

        else if (AVMATCH(&code, &av_NetStream_Seek_Notify)) {
            r->m_read.flags &= ~RTMP_READ_SEEKING;
        }

        else if (AVMATCH(&code, &av_NetStream_Pause_Notify)) {
            if (r->m_pausing == 1 || r->m_pausing == 2) {
                RTMP_SendPause(r, FALSE, r->m_pauseStamp);
                r->m_pausing = 3;
            }
        }
    }
    else if (AVMATCH(&method, &av_playlist_ready)) {
        int i;
        for (i = 0; i < r->m_numCalls; i++) {
            if (AVMATCH(&r->m_methodCalls[i].name, &av_set_playlist)) {
                AV_erase(r->m_methodCalls, &r->m_numCalls, i, TRUE);
                break;
            }
        }
    }
    else {
    }
leave:
    AMF_Reset(&obj);
    return ret;
}

int RTMP_FindFirstMatchingProperty(AMFObject *obj, const AVal *name,
                                   AMFObjectProperty *p) {
    int n;
    /* this is a small object search to locate the "duration" property */
    for (n = 0; n < obj->o_num; n++) {
        AMFObjectProperty *prop = AMF_GetProp(obj, NULL, n);

        if (AVMATCH(&prop->p_name, name)) {
            memcpy(p, prop, sizeof(*prop));
            return TRUE;
        }

        if (prop->p_type == AMF_OBJECT || prop->p_type == AMF_ECMA_ARRAY) {
            if (RTMP_FindFirstMatchingProperty(&prop->p_vu.p_object, name, p))
                return TRUE;
        }
    }
    return FALSE;
}

/* Like above, but only check if name is a prefix of property */
int RTMP_FindPrefixProperty(AMFObject *obj, const AVal *name,
                            AMFObjectProperty *p) {
    int n;
    for (n = 0; n < obj->o_num; n++) {
        AMFObjectProperty *prop = AMF_GetProp(obj, NULL, n);

        if (prop->p_name.av_len > name->av_len &&
            !memcmp(prop->p_name.av_val, name->av_val, name->av_len)) {
            memcpy(p, prop, sizeof(*prop));
            return TRUE;
        }

        if (prop->p_type == AMF_OBJECT) {
            if (RTMP_FindPrefixProperty(&prop->p_vu.p_object, name, p))
                return TRUE;
        }
    }
    return FALSE;
}

static int DumpMetaData(AMFObject *obj) {
    AMFObjectProperty *prop;
    int n, len;
    for (n = 0; n < obj->o_num; n++) {
        char str[256] = "";
        prop = AMF_GetProp(obj, NULL, n);
        switch (prop->p_type) {
        case AMF_OBJECT:
        case AMF_ECMA_ARRAY:
        case AMF_STRICT_ARRAY:
            if (prop->p_name.av_len)
                RTMP_Log(RTMP_LOGINFO, "%.*s:", prop->p_name.av_len,
                         prop->p_name.av_val);
            DumpMetaData(&prop->p_vu.p_object);
            break;
        case AMF_NUMBER:
            snprintf(str, 255, "%.2f", prop->p_vu.p_number);
            break;
        case AMF_BOOLEAN:
            snprintf(str, 255, "%s",
                     prop->p_vu.p_number != 0. ? "TRUE" : "FALSE");
            break;
        case AMF_STRING:
            len = snprintf(str, 255, "%.*s", prop->p_vu.p_aval.av_len,
                           prop->p_vu.p_aval.av_val);
            if (len >= 1 && str[len - 1] == '\n')
                str[len - 1] = '\0';
            break;
        case AMF_DATE:
            snprintf(str, 255, "timestamp:%.2f", prop->p_vu.p_number);
            break;
        default:
            snprintf(str, 255, "INVALID TYPE 0x%02x",
                     (unsigned char)prop->p_type);
        }
        if (str[0] && prop->p_name.av_len) {
            RTMP_Log(RTMP_LOGINFO, "  %-22.*s%s", prop->p_name.av_len,
                     prop->p_name.av_val, str);
        }
    }
    return FALSE;
}

SAVC(onMetaData);
SAVC(duration);
SAVC(video);
SAVC(audio);

static int HandleMetadata(RTMP *r, char *body, unsigned int len) {
    /* allright we get some info here, so parse it and print it */
    /* also keep duration or filesize to make a nice progress bar */

    AMFObject obj;
    AVal metastring;
    int ret = FALSE;

    int nRes = AMF_Decode(&obj, body, len, FALSE);
    if (nRes < 0) {
        RTMP_Log(RTMP_LOGERROR, "%s, error decoding meta data packet",
                 __FUNCTION__);
        return FALSE;
    }

    AMF_Dump(&obj);
    AMFProp_GetString(AMF_GetProp(&obj, NULL, 0), &metastring);

    if (AVMATCH(&metastring, &av_onMetaData)) {
        AMFObjectProperty prop;
        /* Show metadata */
        RTMP_Log(RTMP_LOGINFO, "Metadata:");
        DumpMetaData(&obj);
        if (RTMP_FindFirstMatchingProperty(&obj, &av_duration, &prop)) {
            r->m_fDuration = prop.p_vu.p_number;
            /*RTMP_Log(RTMP_LOGDEBUG, "Set duration: %.2f", m_fDuration); */
        }
        /* Search for audio or video tags */
        if (RTMP_FindPrefixProperty(&obj, &av_video, &prop))
            r->m_read.dataType |= 1;
        if (RTMP_FindPrefixProperty(&obj, &av_audio, &prop))
            r->m_read.dataType |= 4;
        ret = TRUE;
    }
    AMF_Reset(&obj);
    return ret;
}

static void HandleChangeChunkSize(RTMP *r, const RTMPPacket *packet) {
    if (packet->m_nBodySize >= 4) {
        r->m_inChunkSize = AMF_DecodeInt32(packet->m_body);
        RTMP_Log(RTMP_LOGDEBUG, "%s, received: chunk size change to %d",
                 __FUNCTION__, r->m_inChunkSize);
    }
}

static void HandleAudio(RTMP *r, const RTMPPacket *packet) {}

static void HandleVideo(RTMP *r, const RTMPPacket *packet) {}

static void HandleCtrl(RTMP *r, const RTMPPacket *packet) {
    short nType = -1;
    unsigned int tmp;
    if (packet->m_body && packet->m_nBodySize >= 2)
        nType = AMF_DecodeInt16(packet->m_body);
    RTMP_Log(RTMP_LOGDEBUG, "%s, received ctrl. type: %d, len: %d",
             __FUNCTION__, nType, packet->m_nBodySize);
    /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */

    if (packet->m_nBodySize >= 6) {
        switch (nType) {
        case 0:
            tmp = AMF_DecodeInt32(packet->m_body + 2);
            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream Begin %d", __FUNCTION__, tmp);
            break;

        case 1:
            tmp = AMF_DecodeInt32(packet->m_body + 2);
            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream EOF %d", __FUNCTION__, tmp);
            if (r->m_pausing == 1)
                r->m_pausing = 2;
            break;

        case 2:
            tmp = AMF_DecodeInt32(packet->m_body + 2);
            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream Dry %d", __FUNCTION__, tmp);
            break;

        case 4:
            tmp = AMF_DecodeInt32(packet->m_body + 2);
            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream IsRecorded %d", __FUNCTION__,
                     tmp);
            break;

        case 6: /* server ping. reply with pong. */
            tmp = AMF_DecodeInt32(packet->m_body + 2);
            RTMP_Log(RTMP_LOGDEBUG, "%s, Ping %d", __FUNCTION__, tmp);
            RTMP_SendCtrl(r, 0x07, tmp, 0);
            break;

        /* FMS 3.5 servers send the following two controls to let the client
         * know when the server has sent a complete buffer. I.e., when the
         * server has sent an amount of data equal to m_nBufferMS in duration.
         * The server meters its output so that data arrives at the client
         * in realtime and no faster.
         *
         * The rtmpdump program tries to set m_nBufferMS as large as
         * possible, to force the server to send data as fast as possible.
         * In practice, the server appears to cap this at about 1 hour's
         * worth of data. After the server has sent a complete buffer, and
         * sends this BufferEmpty message, it will wait until the play
         * duration of that buffer has passed before sending a new buffer.
         * The BufferReady message will be sent when the new buffer starts.
         * (There is no BufferReady message for the very first buffer;
         * presumably the Stream Begin message is sufficient for that
         * purpose.)
         *
         * If the network speed is much faster than the data bitrate, then
         * there may be long delays between the end of one buffer and the
         * start of the next.
         *
         * Since usually the network allows data to be sent at
         * faster than realtime, and rtmpdump wants to download the data
         * as fast as possible, we use this RTMP_LF_BUFX hack: when we
         * get the BufferEmpty message, we send a Pause followed by an
         * Unpause. This causes the server to send the next buffer immediately
         * instead of waiting for the full duration to elapse. (That's
         * also the purpose of the ToggleStream function, which rtmpdump
         * calls if we get a read timeout.)
         *
         * Media player apps don't need this hack since they are just
         * going to play the data in realtime anyway. It also doesn't work
         * for live streams since they obviously can only be sent in
         * realtime. And it's all moot if the network speed is actually
         * slower than the media bitrate.
         */
        case 31:
            tmp = AMF_DecodeInt32(packet->m_body + 2);
            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream BufferEmpty %d", __FUNCTION__,
                     tmp);
            if (!(r->Link.lFlags & RTMP_LF_BUFX))
                break;
            if (!r->m_pausing) {
                r->m_pauseStamp = r->m_mediaChannel < r->m_channelsAllocatedIn
                                      ? r->m_channelTimestamp[r->m_mediaChannel]
                                      : 0;
                RTMP_SendPause(r, TRUE, r->m_pauseStamp);
                r->m_pausing = 1;
            }
            else if (r->m_pausing == 2) {
                RTMP_SendPause(r, FALSE, r->m_pauseStamp);
                r->m_pausing = 3;
            }
            break;

        case 32:
            tmp = AMF_DecodeInt32(packet->m_body + 2);
            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream BufferReady %d", __FUNCTION__,
                     tmp);
            break;

        default:
            tmp = AMF_DecodeInt32(packet->m_body + 2);
            RTMP_Log(RTMP_LOGDEBUG, "%s, Stream xx %d", __FUNCTION__, tmp);
            break;
        }
    }

    if (nType == 0x1A) {
        RTMP_Log(RTMP_LOGDEBUG,
                 "%s, SWFVerification ping received: ", __FUNCTION__);
        if (packet->m_nBodySize > 2 && packet->m_body[2] > 0x01) {
            RTMP_Log(
                RTMP_LOGERROR,
                "%s: SWFVerification Type %d request not supported! Patches "
                "welcome...",
                __FUNCTION__, packet->m_body[2]);
        }
#ifdef CRYPTO
        /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */

        /* respond with HMAC SHA256 of decompressed SWF, key is the 30byte
           player key, also the last 30 bytes of the server handshake are
           applied */
        else if (r->Link.SWFSize) {
            RTMP_SendCtrl(r, 0x1B, 0, 0);
        }
        else {
            RTMP_Log(RTMP_LOGERROR,
                     "%s: Ignoring SWFVerification request, use --swfVfy!",
                     __FUNCTION__);
        }
#else
        RTMP_Log(RTMP_LOGERROR,
                 "%s: Ignoring SWFVerification request, no CRYPTO support!",
                 __FUNCTION__);
#endif
    }
}

static void HandleServerBW(RTMP *r, const RTMPPacket *packet) {
    r->m_nServerBW = AMF_DecodeInt32(packet->m_body);
    RTMP_Log(RTMP_LOGDEBUG, "%s: server BW = %d", __FUNCTION__, r->m_nServerBW);
}

static void HandleClientBW(RTMP *r, const RTMPPacket *packet) {
    r->m_nClientBW = AMF_DecodeInt32(packet->m_body);
    if (packet->m_nBodySize > 4)
        r->m_nClientBW2 = packet->m_body[4];
    else
        r->m_nClientBW2 = -1;
    RTMP_Log(RTMP_LOGDEBUG, "%s: client BW = %d %d", __FUNCTION__,
             r->m_nClientBW, r->m_nClientBW2);
}

static int DecodeInt32LE(const char *data) {
    unsigned char *c = (unsigned char *)data;
    unsigned int val;

    val = (c[3] << 24) | (c[2] << 16) | (c[1] << 8) | c[0];
    return val;
}

static int EncodeInt32LE(char *output, int nVal) {
    output[0] = nVal;
    nVal >>= 8;
    output[1] = nVal;
    nVal >>= 8;
    output[2] = nVal;
    nVal >>= 8;
    output[3] = nVal;
    return 4;
}

int RTMP_ReadPacket(RTMP *r, RTMPPacket *packet) {
    uint8_t hbuf[RTMP_MAX_HEADER_SIZE] = {0};
    char *header = (char *)hbuf;
    int nSize, hSize, nToRead, nChunk;
    int didAlloc = FALSE;
    int extendedTimestamp;

    RTMP_Log(RTMP_LOGDEBUG2, "%s: fd=%d", __FUNCTION__, r->m_sb.sb_socket);

    if (ReadN(r, (char *)hbuf, 1) == 0) {
        RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet header",
                 __FUNCTION__);
        return FALSE;
    }

    packet->m_headerType = (hbuf[0] & 0xc0) >> 6;
    packet->m_nChannel = (hbuf[0] & 0x3f);
    header++;
    if (packet->m_nChannel == 0) {
        if (ReadN(r, (char *)&hbuf[1], 1) != 1) {
            RTMP_Log(RTMP_LOGERROR,
                     "%s, failed to read RTMP packet header 2nd byte",
                     __FUNCTION__);
            return FALSE;
        }
        packet->m_nChannel = hbuf[1];
        packet->m_nChannel += 64;
        header++;
    }
    else if (packet->m_nChannel == 1) {
        int tmp;
        if (ReadN(r, (char *)&hbuf[1], 2) != 2) {
            RTMP_Log(RTMP_LOGERROR,
                     "%s, failed to read RTMP packet header 3nd byte",
                     __FUNCTION__);
            return FALSE;
        }
        tmp = (hbuf[2] << 8) + hbuf[1];
        packet->m_nChannel = tmp + 64;
        RTMP_Log(RTMP_LOGDEBUG, "%s, m_nChannel: %0x", __FUNCTION__,
                 packet->m_nChannel);
        header += 2;
    }

    nSize = packetSize[packet->m_headerType];

    if (packet->m_nChannel >= r->m_channelsAllocatedIn) {
        int n = packet->m_nChannel + 10;
        int *timestamp = realloc(r->m_channelTimestamp, sizeof(int) * n);
        RTMPPacket **packets =
            realloc(r->m_vecChannelsIn, sizeof(RTMPPacket *) * n);
        if (!timestamp)
            free(r->m_channelTimestamp);
        if (!packets)
            free(r->m_vecChannelsIn);
        r->m_channelTimestamp = timestamp;
        r->m_vecChannelsIn = packets;
        if (!timestamp || !packets) {
            r->m_channelsAllocatedIn = 0;
            return FALSE;
        }
        memset(r->m_channelTimestamp + r->m_channelsAllocatedIn, 0,
               sizeof(int) * (n - r->m_channelsAllocatedIn));
        memset(r->m_vecChannelsIn + r->m_channelsAllocatedIn, 0,
               sizeof(RTMPPacket *) * (n - r->m_channelsAllocatedIn));
        r->m_channelsAllocatedIn = n;
    }

    if (nSize == RTMP_LARGE_HEADER_SIZE) /* if we get a full header the
                                            timestamp is absolute */
        packet->m_hasAbsTimestamp = TRUE;

    else if (nSize < RTMP_LARGE_HEADER_SIZE) { /* using values from the last
                                                  message of this channel */
        if (r->m_vecChannelsIn[packet->m_nChannel])
            memcpy(packet, r->m_vecChannelsIn[packet->m_nChannel],
                   sizeof(RTMPPacket));
    }

    nSize--;

    if (nSize > 0 && ReadN(r, header, nSize) != nSize) {
        RTMP_Log(RTMP_LOGERROR,
                 "%s, failed to read RTMP packet header. type: %x",
                 __FUNCTION__, (unsigned int)hbuf[0]);
        return FALSE;
    }

    hSize = nSize + (header - (char *)hbuf);

    if (nSize >= 3) {
        packet->m_nTimeStamp = AMF_DecodeInt24(header);

        /*RTMP_Log(RTMP_LOGDEBUG, "%s, reading RTMP packet chunk on channel %x,
         * headersz %i, timestamp %i, abs timestamp %i", __FUNCTION__,
         * packet.m_nChannel, nSize, packet.m_nTimeStamp,
         * packet.m_hasAbsTimestamp);
         */

        if (nSize >= 6) {
            packet->m_nBodySize = AMF_DecodeInt24(header + 3);
            packet->m_nBytesRead = 0;

            if (nSize > 6) {
                packet->m_packetType = header[6];

                if (nSize == 11)
                    packet->m_nInfoField2 = DecodeInt32LE(header + 7);
            }
        }
    }

    extendedTimestamp = packet->m_nTimeStamp == 0xffffff;
    if (extendedTimestamp) {
        if (ReadN(r, header + nSize, 4) != 4) {
            RTMP_Log(RTMP_LOGERROR, "%s, failed to read extended timestamp",
                     __FUNCTION__);
            return FALSE;
        }
        packet->m_nTimeStamp = AMF_DecodeInt32(header + nSize);
        hSize += 4;
    }

    RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)hbuf, hSize);

    if (packet->m_nBodySize > 0 && packet->m_body == NULL) {
        if (!RTMPPacket_Alloc(packet, packet->m_nBodySize)) {
            RTMP_Log(RTMP_LOGDEBUG, "%s, failed to allocate packet",
                     __FUNCTION__);
            return FALSE;
        }
        didAlloc = TRUE;
        packet->m_headerType = (hbuf[0] & 0xc0) >> 6;
    }

    nToRead = packet->m_nBodySize - packet->m_nBytesRead;
    nChunk = r->m_inChunkSize;
    if (nToRead < nChunk)
        nChunk = nToRead;

    /* Does the caller want the raw chunk? */
    if (packet->m_chunk) {
        packet->m_chunk->c_headerSize = hSize;
        memcpy(packet->m_chunk->c_header, hbuf, hSize);
        packet->m_chunk->c_chunk = packet->m_body + packet->m_nBytesRead;
        packet->m_chunk->c_chunkSize = nChunk;
    }

    if (ReadN(r, packet->m_body + packet->m_nBytesRead, nChunk) != nChunk) {
        RTMP_Log(RTMP_LOGERROR, "%s, failed to read RTMP packet body. len: %u",
                 __FUNCTION__, packet->m_nBodySize);
        return FALSE;
    }

    RTMP_LogHexString(RTMP_LOGDEBUG2,
                      (uint8_t *)packet->m_body + packet->m_nBytesRead, nChunk);

    packet->m_nBytesRead += nChunk;

    /* keep the packet as ref for other packets on this channel */
    if (!r->m_vecChannelsIn[packet->m_nChannel])
        r->m_vecChannelsIn[packet->m_nChannel] = malloc(sizeof(RTMPPacket));
    memcpy(r->m_vecChannelsIn[packet->m_nChannel], packet, sizeof(RTMPPacket));
    if (extendedTimestamp) {
        r->m_vecChannelsIn[packet->m_nChannel]->m_nTimeStamp = 0xffffff;
    }

    if (RTMPPacket_IsReady(packet)) {
        /* make packet's timestamp absolute */
        if (!packet->m_hasAbsTimestamp)
            packet->m_nTimeStamp +=
                r->m_channelTimestamp[packet->m_nChannel]; /* timestamps seem to
                                                              be always
                                                              relative!! */

        r->m_channelTimestamp[packet->m_nChannel] = packet->m_nTimeStamp;

        /* reset the data from the stored packet. we keep the header since we
         * may use it later if a new packet for this channel */
        /* arrives and requests to re-use some info (small packet header) */
        r->m_vecChannelsIn[packet->m_nChannel]->m_body = NULL;
        r->m_vecChannelsIn[packet->m_nChannel]->m_nBytesRead = 0;
        r->m_vecChannelsIn[packet->m_nChannel]->m_hasAbsTimestamp =
            FALSE; /* can only be false if we reuse header */
    }
    else {
        packet->m_body = NULL; /* so it won't be erased on free */
    }

    return TRUE;
}

/*
 握手流程
     客户端构造握手数据并发送。
     接收服务器响应，解析运行时间和版本号。
     第二阶段交换数据并验证签名。

 关键点
     支持明文和加密握手（0x03 和 0x06）。
     握手数据的随机性保证了安全性。
     签名验证不强制要求一致（仅记录警告）。

 依赖函数
     RTMP_GetTime: 获取当前运行时间。
     WriteN 和 ReadN: 用于发送和接收数据。
 */
#ifndef CRYPTO
static int HandShake(RTMP *r, int FP9HandShake) {
    int i;
    uint32_t uptime,
        suptime; // uptime 和 suptime 用于存储客户端和服务器的运行时间。
    int bMatch;
    char type;
    char clientbuf[RTMP_SIG_SIZE + 1],
        *clientsig =
            clientbuf +
            1; // clientbuf 和 serversig 用于存储客户端和服务器的握手数据包。
    char serversig[RTMP_SIG_SIZE];

    /*
     第一部分：构造客户端握手数据包

     1. 握手类型

     clientbuf[0] = 0x03 表示客户端选择明文握手（不加密）。
     */
    clientbuf[0] = 0x03; /* not encrypted */

    /*
     2. 运行时间

     调用 RTMP_GetTime 获取客户端运行时间（毫秒），并转换为网络字节序后存入
     clientsig 的前 4 个字节
     */
    uptime = htonl(RTMP_GetTime());
    memcpy(clientsig, &uptime, 4);

    /*
     3. 保留字段
     将接下来的 4 个字节置零（保留字段）。
     */
    memset(&clientsig[4], 0, 4);

    /*
     4. 随机填充
     在调试模式下，将剩余的握手数据填充为 0xff。
     非调试模式下，随机生成字节填充。
     */
#ifdef _DEBUG
    for (i = 8; i < RTMP_SIG_SIZE; i++)
        clientsig[i] = 0xff;
#else
    for (i = 8; i < RTMP_SIG_SIZE; i++)
        clientsig[i] = (char)(rand() % 256);
#endif

    /*
     5. 调用 WriteN 将完整的握手数据包（clientbuf）发送给服务器。
     */
    if (!WriteN(r, clientbuf, RTMP_SIG_SIZE + 1))
        return FALSE;

    /*
     第二部分：读取服务器响应
         握手类型响应
         服务器返回一个字节，表示握手类型（0x03 表示明文握手，0x06
     表示加密握手）。
         如果服务器响应的类型与客户端发送的类型不一致，记录警告日志。
     */
    if (ReadN(r, &type, 1) != 1) /* 0x03 or 0x06 */
        return FALSE;

    RTMP_Log(RTMP_LOGDEBUG, "%s: Type Answer   : %02X", __FUNCTION__, type);

    if (type != clientbuf[0])
        RTMP_Log(RTMP_LOGWARNING,
                 "%s: Type mismatch: client sent %d, server answered %d",
                 __FUNCTION__, clientbuf[0], type);

    /*
     2. 读取服务器握手数据
         调用 ReadN 接收服务器的握手数据（1536 字节）。
         前 4 个字节表示服务器运行时间，将其转换为主机字节序后存储在 suptime。
         接下来的 4 个字节表示 FMS（Flash Media Server）的版本号。
     */
    if (ReadN(r, serversig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
        return FALSE;

    /* decode server response */

    memcpy(&suptime, serversig, 4);
    suptime = ntohl(
        suptime); // 前 4 个字节表示服务器运行时间，将其转换为主机字节序后存储在
                  // suptime。

    RTMP_Log(RTMP_LOGDEBUG, "%s: Server Uptime : %d", __FUNCTION__, suptime);
    RTMP_Log(RTMP_LOGDEBUG, "%s: FMS Version   : %d.%d.%d.%d", __FUNCTION__,
             serversig[4], serversig[5], serversig[6], serversig[7]);

    /*
     第三部分：第二阶段握手
     2nd part of handshake

     交换握手数据
         将服务器返回的握手数据包再次发送回服务器。
         读取服务器返回的第二阶段握手数据。

     验证签名
         比较服务器返回的数据和客户端的握手数据是否匹配。
         如果不匹配，记录警告日志，但不影响握手成功。

     返回结果
        如果所有步骤完成，返回 TRUE 表示握手成功。
     */
    if (!WriteN(r, serversig, RTMP_SIG_SIZE))
        return FALSE;

    if (ReadN(r, serversig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
        return FALSE;

    bMatch = (memcmp(serversig, clientsig, RTMP_SIG_SIZE) == 0);
    if (!bMatch) {
        RTMP_Log(RTMP_LOGWARNING, "%s, client signature does not match!",
                 __FUNCTION__);
    }
    return TRUE;
}

static int SHandShake(RTMP *r) {
    int i;
    char serverbuf[RTMP_SIG_SIZE + 1], *serversig = serverbuf + 1;
    char clientsig[RTMP_SIG_SIZE];
    uint32_t uptime;
    int bMatch;

    if (ReadN(r, serverbuf, 1) != 1) /* 0x03 or 0x06 */
        return FALSE;

    RTMP_Log(RTMP_LOGDEBUG, "%s: Type Request  : %02X", __FUNCTION__,
             serverbuf[0]);

    if (serverbuf[0] != 3) {
        RTMP_Log(RTMP_LOGERROR, "%s: Type unknown: client sent %02X",
                 __FUNCTION__, serverbuf[0]);
        return FALSE;
    }

    uptime = htonl(RTMP_GetTime());
    memcpy(serversig, &uptime, 4);

    memset(&serversig[4], 0, 4);
#ifdef _DEBUG
    for (i = 8; i < RTMP_SIG_SIZE; i++)
        serversig[i] = 0xff;
#else
    for (i = 8; i < RTMP_SIG_SIZE; i++)
        serversig[i] = (char)(rand() % 256);
#endif

    if (!WriteN(r, serverbuf, RTMP_SIG_SIZE + 1))
        return FALSE;

    if (ReadN(r, clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
        return FALSE;

    /* decode client response */

    memcpy(&uptime, clientsig, 4);
    uptime = ntohl(uptime);

    RTMP_Log(RTMP_LOGDEBUG, "%s: Client Uptime : %d", __FUNCTION__, uptime);
    RTMP_Log(RTMP_LOGDEBUG, "%s: Player Version: %d.%d.%d.%d", __FUNCTION__,
             clientsig[4], clientsig[5], clientsig[6], clientsig[7]);

    /* 2nd part of handshake */
    if (!WriteN(r, clientsig, RTMP_SIG_SIZE))
        return FALSE;

    if (ReadN(r, clientsig, RTMP_SIG_SIZE) != RTMP_SIG_SIZE)
        return FALSE;

    bMatch = (memcmp(serversig, clientsig, RTMP_SIG_SIZE) == 0);
    if (!bMatch) {
        RTMP_Log(RTMP_LOGWARNING, "%s, client signature does not match!",
                 __FUNCTION__);
    }
    return TRUE;
}
#endif

int RTMP_SendChunk(RTMP *r, RTMPChunk *chunk) {
    int wrote;
    char hbuf[RTMP_MAX_HEADER_SIZE];

    RTMP_Log(RTMP_LOGDEBUG2, "%s: fd=%d, size=%d", __FUNCTION__,
             r->m_sb.sb_socket, chunk->c_chunkSize);
    RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)chunk->c_header,
                      chunk->c_headerSize);
    if (chunk->c_chunkSize) {
        char *ptr = chunk->c_chunk - chunk->c_headerSize;
        RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)chunk->c_chunk,
                          chunk->c_chunkSize);
        /* save header bytes we're about to overwrite */
        memcpy(hbuf, ptr, chunk->c_headerSize);
        memcpy(ptr, chunk->c_header, chunk->c_headerSize);
        wrote = WriteN(r, ptr, chunk->c_headerSize + chunk->c_chunkSize);
        memcpy(ptr, hbuf, chunk->c_headerSize);
    }
    else
        wrote = WriteN(r, chunk->c_header, chunk->c_headerSize);
    return wrote;
}

/*
 MARK: important
 RTMP_SendPacket 是 RTMP 协议中用于发送数据包的核心函数。它根据 RTMP 协议的要求构造数据包头、处理时间戳、压缩数据包，并通过套接字发送数据包。
 
 数据包管理

     处理通道分配和重用。
     支持不同类型的 RTMP 数据包头（LARGE, MEDIUM, SMALL, MINIMUM）。
 头部压缩

     根据前一个数据包的属性（如时间戳和类型），选择合适的头部大小以压缩数据量。
 时间戳处理

     对于超过 24 位的时间戳，添加扩展时间戳字段。
 分块传输

     根据 chunkSize 将数据包分块发送。
     支持 RTMP HTTP 特性下的一次性发送多个块。
 调用管理

     如果数据包类型是 RTMP_PACKET_TYPE_INVOKE，将远程调用的方法名称和事务 ID 加入队列，以等待响应。
 */

int RTMP_SendPacket(RTMP *r, RTMPPacket *packet, int queue) {
    const RTMPPacket *prevPacket;
    uint32_t last = 0;
    int nSize;
    int hSize, cSize;
    char *header, *hptr, *hend, hbuf[RTMP_MAX_HEADER_SIZE], c;
    uint32_t t;
    char *buffer, *tbuf = NULL, *toff = NULL;
    int nChunkSize;
    int tlen;
    
    //1. 通道分配 (音频通道0x4,视频通道0x08)
    if (packet->m_nChannel >= r->m_channelsAllocatedOut) {
        //如果目标通道号超出了已分配的范围，动态扩展通道数组。
        //使用 realloc 重新分配内存，并初始化新分配的部分。
        int n = packet->m_nChannel + 10;
        RTMPPacket **packets =
            realloc(r->m_vecChannelsOut, sizeof(RTMPPacket *) * n);
        if (!packets) {
            free(r->m_vecChannelsOut);
            r->m_vecChannelsOut = NULL;
            r->m_channelsAllocatedOut = 0;
            return FALSE;
        }
        r->m_vecChannelsOut = packets;
        memset(r->m_vecChannelsOut + r->m_channelsAllocatedOut, 0,
               sizeof(RTMPPacket *) * (n - r->m_channelsAllocatedOut));
        r->m_channelsAllocatedOut = n;
    }

    RTMP_Log(RTMP_LOGERROR,"AAA send header of type: 0x%02x. before",  (unsigned char)packet->m_headerType);

    //2. 头部压缩
    /*
     如果上一个包与当前包的属性相同，可以选择更小的头部类型来减少数据量。
     将上一个包的时间戳作为参考，计算当前包的相对时间戳。
     */
    prevPacket = r->m_vecChannelsOut[packet->m_nChannel];
    if (prevPacket && packet->m_headerType != RTMP_PACKET_SIZE_LARGE) {
        /* compress a bit by using the prev packet's attributes */
        if (prevPacket->m_nBodySize == packet->m_nBodySize &&
            prevPacket->m_packetType == packet->m_packetType &&
            packet->m_headerType == RTMP_PACKET_SIZE_MEDIUM)
            packet->m_headerType = RTMP_PACKET_SIZE_SMALL;

        if (prevPacket->m_nTimeStamp == packet->m_nTimeStamp &&
            packet->m_headerType == RTMP_PACKET_SIZE_SMALL)
            packet->m_headerType = RTMP_PACKET_SIZE_MINIMUM;
        last = prevPacket->m_nTimeStamp;
    }

    if (packet->m_headerType > 3) /* sanity */
    {
        RTMP_Log(RTMP_LOGERROR,
                 "sanity failed!! trying to send header of type: 0x%02x. after",
                 (unsigned char)packet->m_headerType);
        return FALSE;
    }

    RTMP_Log(RTMP_LOGERROR,"AAA send header of type: 0x%02x.",  (unsigned char)packet->m_headerType);

    nSize = packetSize[packet->m_headerType];
    hSize = nSize;
    cSize = 0;
    t = packet->m_nTimeStamp - last;

    if (packet->m_body) {
        header = packet->m_body - nSize;
        hend = packet->m_body;
    }
    else {
        header = hbuf + 6;
        hend = hbuf + sizeof(hbuf);
    }

    if (packet->m_nChannel > 319)
        cSize = 2;
    else if (packet->m_nChannel > 63)
        cSize = 1;
    if (cSize) {
        header -= cSize;
        hSize += cSize;
    }

    //3. 时间戳扩展
    //RTMP 标准时间戳为 24 位。当时间戳超过 24 位时，额外添加 4 字节扩展时间戳。
    //在头部中插入扩展时间戳，并更新头部大小。
    if (t >= 0xffffff) {
        header -= 4;
        hSize += 4;
        RTMP_Log(RTMP_LOGWARNING, "Larger timestamp than 24-bit: 0x%x", t);
    }

    //4. 构造头部
    /*
     构造 RTMP 数据包的头部：
     cSize 决定了通道号的编码方式：
         0：直接嵌入头部的第一个字节。
         1 或 2：额外添加字节存储通道号。
     m_headerType 定义了头部的大小及内容类型。
     */
    hptr = header;
    c = packet->m_headerType << 6;
    switch (cSize) {
    case 0:
        c |= packet->m_nChannel;
        break;
    case 1:
        break;
    case 2:
        c |= 1;
        break;
    }
    *hptr++ = c;
    if (cSize) {
        int tmp = packet->m_nChannel - 64;
        *hptr++ = tmp & 0xff;
        if (cSize == 2)
            *hptr++ = tmp >> 8;
    }

    if (nSize > 1) {
        hptr = AMF_EncodeInt24(hptr, hend, t > 0xffffff ? 0xffffff : t);
    }

    if (nSize > 4) {
        hptr = AMF_EncodeInt24(hptr, hend, packet->m_nBodySize);
        *hptr++ = packet->m_packetType;
    }

    if (nSize > 8)
        hptr += EncodeInt32LE(hptr, packet->m_nInfoField2);

    if (t >= 0xffffff)
        hptr = AMF_EncodeInt32(hptr, hend, t);

    nSize = packet->m_nBodySize;
    buffer = packet->m_body;
    nChunkSize = r->m_outChunkSize;

    RTMP_Log(RTMP_LOGDEBUG2, "%s: fd=%d, size=%d", __FUNCTION__,
             r->m_sb.sb_socket, nSize);
    /* send all chunks in one HTTP request */
    if (r->Link.protocol & RTMP_FEATURE_HTTP) {
        int chunks = (nSize + nChunkSize - 1) / nChunkSize;
        if (chunks > 1) {
            tlen = chunks * (cSize + 1) + nSize + hSize;
            tbuf = malloc(tlen);
            if (!tbuf)
                return FALSE;
            toff = tbuf;
        }
    }
    
    //5. 分块发送
    while (nSize + hSize) {
        int wrote;

        if (nSize < nChunkSize)
            nChunkSize = nSize;

        RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)header, hSize);
        RTMP_LogHexString(RTMP_LOGDEBUG2, (uint8_t *)buffer, nChunkSize);
        if (tbuf) {
            memcpy(toff, header, nChunkSize + hSize);
            toff += nChunkSize + hSize;
        }
        else {
            wrote = WriteN(r, header, nChunkSize + hSize);
            if (!wrote)
                return FALSE;
        }
        nSize -= nChunkSize;
        buffer += nChunkSize;
        hSize = 0;

        if (nSize > 0) {
            header = buffer - 1;
            hSize = 1;
            if (cSize) {
                header -= cSize;
                hSize += cSize;
            }
            if (t >= 0xffffff) {
                header -= 4;
                hSize += 4;
            }
            *header = (0xc0 | c);
            if (cSize) {
                int tmp = packet->m_nChannel - 64;
                header[1] = tmp & 0xff;
                if (cSize == 2)
                    header[2] = tmp >> 8;
            }
            if (t >= 0xffffff) {
                char *extendedTimestamp = header + 1 + cSize;
                AMF_EncodeInt32(extendedTimestamp, extendedTimestamp + 4, t);
            }
        }
    }
    if (tbuf) {
        int wrote = WriteN(r, tbuf, toff - tbuf);
        free(tbuf);
        tbuf = NULL;
        if (!wrote)
            return FALSE;
    }

    /*
     如果数据包类型为 INVOKE，解析 AMF 数据，提取方法名称和事务 ID。
     将方法和事务 ID 加入队列，以便后续匹配服务器返回的结果。
     */
    /* we invoked a remote method */
    if (packet->m_packetType == RTMP_PACKET_TYPE_INVOKE) {
        AVal method;
        char *ptr;
        ptr = packet->m_body + 1;
        AMF_DecodeString(ptr, &method);
        RTMP_Log(RTMP_LOGDEBUG, "Invoking %s", method.av_val);
        /* keep it in call queue till result arrives */
        if (queue) {
            int txn;
            ptr += 3 + method.av_len;
            txn = (int)AMF_DecodeNumber(ptr);
            AV_queue(&r->m_methodCalls, &r->m_numCalls, &method, txn);
        }
    }

    //7. 更新通道缓存
    if (!r->m_vecChannelsOut[packet->m_nChannel])
        r->m_vecChannelsOut[packet->m_nChannel] = malloc(sizeof(RTMPPacket));
    memcpy(r->m_vecChannelsOut[packet->m_nChannel], packet, sizeof(RTMPPacket));
    return TRUE;
}

int RTMP_Serve(RTMP *r) { return SHandShake(r); }

void RTMP_Close(RTMP *r) { CloseInternal(r, 0); }

static void CloseInternal(RTMP *r, int reconnect) {
    int i;

    if (RTMP_IsConnected(r)) {
        if (r->m_stream_id > 0) {
            i = r->m_stream_id;
            r->m_stream_id = 0;
            if ((r->Link.protocol & RTMP_FEATURE_WRITE))
                SendFCUnpublish(r);
            SendDeleteStream(r, i);
        }
        if (r->m_clientID.av_val) {
            HTTP_Post(r, RTMPT_CLOSE, "", 1);
            free(r->m_clientID.av_val);
            r->m_clientID.av_val = NULL;
            r->m_clientID.av_len = 0;
        }
        RTMPSockBuf_Close(&r->m_sb);
    }

    r->m_stream_id = -1;
    r->m_sb.sb_socket = -1;
    r->m_nBWCheckCounter = 0;
    r->m_nBytesIn = 0;
    r->m_nBytesInSent = 0;

    if (r->m_read.flags & RTMP_READ_HEADER) {
        free(r->m_read.buf);
        r->m_read.buf = NULL;
    }
    r->m_read.dataType = 0;
    r->m_read.flags = 0;
    r->m_read.status = 0;
    r->m_read.nResumeTS = 0;
    r->m_read.nIgnoredFrameCounter = 0;
    r->m_read.nIgnoredFlvFrameCounter = 0;

    r->m_write.m_nBytesRead = 0;
    RTMPPacket_Free(&r->m_write);

    for (i = 0; i < r->m_channelsAllocatedIn; i++) {
        if (r->m_vecChannelsIn[i]) {
            RTMPPacket_Free(r->m_vecChannelsIn[i]);
            free(r->m_vecChannelsIn[i]);
            r->m_vecChannelsIn[i] = NULL;
        }
    }
    free(r->m_vecChannelsIn);
    r->m_vecChannelsIn = NULL;
    free(r->m_channelTimestamp);
    r->m_channelTimestamp = NULL;
    r->m_channelsAllocatedIn = 0;
    for (i = 0; i < r->m_channelsAllocatedOut; i++) {
        if (r->m_vecChannelsOut[i]) {
            free(r->m_vecChannelsOut[i]);
            r->m_vecChannelsOut[i] = NULL;
        }
    }
    free(r->m_vecChannelsOut);
    r->m_vecChannelsOut = NULL;
    r->m_channelsAllocatedOut = 0;
    AV_clear(r->m_methodCalls, r->m_numCalls);
    r->m_methodCalls = NULL;
    r->m_numCalls = 0;
    r->m_numInvokes = 0;

    r->m_bPlaying = FALSE;
    r->m_sb.sb_size = 0;

    r->m_msgCounter = 0;
    r->m_resplen = 0;
    r->m_unackd = 0;

    if (r->Link.lFlags & RTMP_LF_FTCU && !reconnect) {
        free(r->Link.tcUrl.av_val);
        r->Link.tcUrl.av_val = NULL;
        r->Link.lFlags ^= RTMP_LF_FTCU;
    }
    if (r->Link.lFlags & RTMP_LF_FAPU && !reconnect) {
        free(r->Link.app.av_val);
        r->Link.app.av_val = NULL;
        r->Link.lFlags ^= RTMP_LF_FAPU;
    }

    if (!reconnect) {
        free(r->Link.playpath0.av_val);
        r->Link.playpath0.av_val = NULL;
    }
#ifdef CRYPTO
    if (r->Link.dh) {
        MDH_free(r->Link.dh);
        r->Link.dh = NULL;
    }
    if (r->Link.rc4keyIn) {
        RC4_free(r->Link.rc4keyIn);
        r->Link.rc4keyIn = NULL;
    }
    if (r->Link.rc4keyOut) {
        RC4_free(r->Link.rc4keyOut);
        r->Link.rc4keyOut = NULL;
    }
#endif
}

int RTMPSockBuf_Fill(RTMPSockBuf *sb) {
    int nBytes;

    /*
     当缓冲区中没有未读取的数据时，重置缓冲区的起始指针 sb_start。
     这样做的目的是让新读取的数据从缓冲区的开头开始填充。
     */
    if (!sb->sb_size)
        sb->sb_start = sb->sb_buf;

    while (1) {
        /*
         sizeof(sb->sb_buf)：缓冲区的总大小。
         -1：预留一个字节空间（可能用于终止符或其他用途）。
         sb->sb_size：当前缓冲区中已有的数据大小。
         (sb->sb_start - sb->sb_buf)：当前缓冲区已被读取的数据偏移量。
         计算出从 sb_start + sb_size 开始可写入的空间大小。
         */
        nBytes =
            sizeof(sb->sb_buf) - 1 - sb->sb_size - (sb->sb_start - sb->sb_buf);
#if defined(CRYPTO) && !defined(NO_SSL)
        if (sb->sb_ssl) {
            nBytes = TLS_read(sb->sb_ssl, sb->sb_start + sb->sb_size, nBytes);
        }
        else
#endif
        {
            nBytes = recv(sb->sb_socket, sb->sb_start + sb->sb_size, nBytes, 0);
        }
        if (nBytes != -1) {
            //如果读取成功（nBytes != -1），将读取到的数据长度累加到 sb_size
            sb->sb_size += nBytes;
        }
        else {
            int sockerr = GetSockError();
            RTMP_Log(RTMP_LOGDEBUG,
                     "%s, recv returned %d. GetSockError(): %d (%s)",
                     __FUNCTION__, nBytes, sockerr, strerror(sockerr));
            if (sockerr == EINTR && !RTMP_ctrlC)
                continue;

            if (sockerr == EWOULDBLOCK || sockerr == EAGAIN) {
                //如果读取操作因缓冲区暂时没有数据而阻塞（EWOULDBLOCK 或 EAGAIN），设置超时标志
                sb->sb_timedout = TRUE;
                nBytes = 0;
            }
        }
        break;
    }

    return nBytes;
}

/*
 函数负责将数据发送到服务器，其实现支持直接发送和通过加密传输的两种方式。
 */
int RTMPSockBuf_Send(RTMPSockBuf *sb, const char *buf, int len) {
    int rc;

#ifdef _DEBUG
    fwrite(buf, 1, len, netstackdump);
#endif

#if defined(CRYPTO) && !defined(NO_SSL)
    if (sb->sb_ssl) {
        rc = TLS_write(sb->sb_ssl, buf, len);
    }
    else
#endif
    {
        /*
         参数说明：
             sb->sb_socket: 套接字描述符。
             buf: 数据缓冲区。
             len: 数据长度。
             0: 发送标志，通常为 0 表示默认行为。
         */
        rc = send(sb->sb_socket, buf, len, 0);
    }
    return rc;
}

int RTMPSockBuf_Close(RTMPSockBuf *sb) {
#if defined(CRYPTO) && !defined(NO_SSL)
    if (sb->sb_ssl) {
        TLS_shutdown(sb->sb_ssl);
        TLS_close(sb->sb_ssl);
        sb->sb_ssl = NULL;
    }
#endif
    if (sb->sb_socket != -1)
        return closesocket(sb->sb_socket);
    return 0;
}

#define HEX2BIN(a) (((a) & 0x40) ? ((a) & 0xf) + 9 : ((a) & 0xf))

static void DecodeTEA(AVal *key, AVal *text) {
    uint32_t *v, k[4] = {0}, u;
    uint32_t z, y, sum = 0, e, DELTA = 0x9e3779b9;
    int32_t p, q;
    int i, n;
    unsigned char *ptr, *out;

    /* prep key: pack 1st 16 chars into 4 LittleEndian ints */
    ptr = (unsigned char *)key->av_val;
    u = 0;
    n = 0;
    v = k;
    p = key->av_len > 16 ? 16 : key->av_len;
    for (i = 0; i < p; i++) {
        u |= ptr[i] << (n * 8);
        if (n == 3) {
            *v++ = u;
            u = 0;
            n = 0;
        }
        else {
            n++;
        }
    }
    /* any trailing chars */
    if (u)
        *v = u;

    /* prep text: hex2bin, multiples of 4 */
    n = (text->av_len + 7) / 8;
    out = malloc(n * 8);
    ptr = (unsigned char *)text->av_val;
    v = (uint32_t *)out;
    for (i = 0; i < n; i++) {
        u = (HEX2BIN(ptr[0]) << 4) + HEX2BIN(ptr[1]);
        u |= ((HEX2BIN(ptr[2]) << 4) + HEX2BIN(ptr[3])) << 8;
        u |= ((HEX2BIN(ptr[4]) << 4) + HEX2BIN(ptr[5])) << 16;
        u |= ((HEX2BIN(ptr[6]) << 4) + HEX2BIN(ptr[7])) << 24;
        *v++ = u;
        ptr += 8;
    }
    v = (uint32_t *)out;

    /* http://www.movable-type.co.uk/scripts/tea-block.html */
#define MX                                                                     \
    (((z >> 5) ^ (y << 2)) + ((y >> 3) ^ (z << 4))) ^                          \
        ((sum ^ y) + (k[(p & 3) ^ e] ^ z));
    z = v[n - 1];
    y = v[0];
    q = 6 + 52 / n;
    sum = q * DELTA;
    while (sum != 0) {
        e = sum >> 2 & 3;
        for (p = n - 1; p > 0; p--)
            z = v[p - 1], y = v[p] -= MX;
        z = v[n - 1];
        y = v[0] -= MX;
        sum -= DELTA;
    }

    text->av_len /= 2;
    memcpy(text->av_val, out, text->av_len);
    free(out);
}

static int HTTP_Post(RTMP *r, RTMPTCmd cmd, const char *buf, int len) {
    char hbuf[512];
    int hlen = snprintf(hbuf, sizeof(hbuf),
                        "POST /%s%s/%d HTTP/1.1\r\n"
                        "Host: %.*s:%d\r\n"
                        "Accept: */*\r\n"
                        "User-Agent: Shockwave Flash\r\n"
                        "Connection: Keep-Alive\r\n"
                        "Cache-Control: no-cache\r\n"
                        "Content-type: application/x-fcs\r\n"
                        "Content-length: %d\r\n\r\n",
                        RTMPT_cmds[cmd],
                        r->m_clientID.av_val ? r->m_clientID.av_val : "",
                        r->m_msgCounter, r->Link.hostname.av_len,
                        r->Link.hostname.av_val, r->Link.port, len);
    RTMPSockBuf_Send(&r->m_sb, hbuf, hlen);
    hlen = RTMPSockBuf_Send(&r->m_sb, buf, len);
    r->m_msgCounter++;
    r->m_unackd++;
    return hlen;
}

static int HTTP_read(RTMP *r, int fill) {
    char *ptr;
    long hlen;

restart:
    if (fill)
        RTMPSockBuf_Fill(&r->m_sb);
    if (r->m_sb.sb_size < 13) {
        if (fill)
            goto restart;
        return -2;
    }
    if (strncmp(r->m_sb.sb_start, "HTTP/1.1 200 ", 13))
        return -1;
    r->m_sb.sb_start[r->m_sb.sb_size] = '\0';
    if (!strstr(r->m_sb.sb_start, "\r\n\r\n")) {
        if (fill)
            goto restart;
        return -2;
    }

    ptr = r->m_sb.sb_start + sizeof("HTTP/1.1 200");
    while ((ptr = strstr(ptr, "Content-"))) {
        if (!strncasecmp(ptr + 8, "length:", 7))
            break;
        ptr += 8;
    }
    if (!ptr)
        return -1;
    hlen = strtol(ptr + 16, NULL, 10);
    if (hlen < 1 || hlen > INT_MAX)
        return -1;
    ptr = strstr(ptr + 16, "\r\n\r\n");
    if (!ptr)
        return -1;
    ptr += 4;
    if (ptr + (r->m_clientID.av_val ? 1 : hlen) >
        r->m_sb.sb_start + r->m_sb.sb_size) {
        if (fill)
            goto restart;
        return -2;
    }
    r->m_sb.sb_size -= ptr - r->m_sb.sb_start;
    r->m_sb.sb_start = ptr;
    r->m_unackd--;

    if (!r->m_clientID.av_val) {
        r->m_clientID.av_len = hlen;
        r->m_clientID.av_val = malloc(hlen + 1);
        if (!r->m_clientID.av_val)
            return -1;
        r->m_clientID.av_val[0] = '/';
        memcpy(r->m_clientID.av_val + 1, ptr, hlen - 1);
        r->m_clientID.av_val[hlen] = 0;
        r->m_sb.sb_size = 0;
    }
    else {
        r->m_polling = *ptr++;
        r->m_resplen = hlen - 1;
        r->m_sb.sb_start++;
        r->m_sb.sb_size--;
    }
    return 0;
}

#define MAX_IGNORED_FRAMES 50

/* Read from the stream until we get a media packet.
 * Returns -3 if Play.Close/Stop, -2 if fatal error, -1 if no more media
 * packets, 0 if ignorable error, >0 if there is a media packet
 */
static int Read_1_Packet(RTMP *r, char *buf, unsigned int buflen) {
    uint32_t prevTagSize = 0;
    int rtnGetNextMediaPacket = 0, ret = RTMP_READ_EOF;
    RTMPPacket packet = {0};
    int recopy = FALSE;
    unsigned int size;
    char *ptr, *pend;
    uint32_t nTimeStamp = 0;
    unsigned int len;

    rtnGetNextMediaPacket = RTMP_GetNextMediaPacket(r, &packet);
    while (rtnGetNextMediaPacket) {
        char *packetBody = packet.m_body;
        unsigned int nPacketLen = packet.m_nBodySize;

        /* Return RTMP_READ_COMPLETE if this was completed nicely with
         * invoke message Play.Stop or Play.Complete
         */
        if (rtnGetNextMediaPacket == 2) {
            RTMP_Log(RTMP_LOGDEBUG,
                     "Got Play.Complete or Play.Stop from server. "
                     "Assuming stream is complete");
            ret = RTMP_READ_COMPLETE;
            break;
        }

        r->m_read.dataType |=
            (((packet.m_packetType == RTMP_PACKET_TYPE_AUDIO) << 2) |
             (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO));

        if (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO && nPacketLen <= 5) {
            RTMP_Log(RTMP_LOGDEBUG, "ignoring too small video packet: size: %d",
                     nPacketLen);
            ret = RTMP_READ_IGNORE;
            break;
        }
        if (packet.m_packetType == RTMP_PACKET_TYPE_AUDIO && nPacketLen <= 1) {
            RTMP_Log(RTMP_LOGDEBUG, "ignoring too small audio packet: size: %d",
                     nPacketLen);
            ret = RTMP_READ_IGNORE;
            break;
        }

        if (r->m_read.flags & RTMP_READ_SEEKING) {
            ret = RTMP_READ_IGNORE;
            break;
        }
#ifdef _DEBUG
        RTMP_Log(RTMP_LOGDEBUG, "type: %02X, size: %d, TS: %d ms, abs TS: %d",
                 packet.m_packetType, nPacketLen, packet.m_nTimeStamp,
                 packet.m_hasAbsTimestamp);
        if (packet.m_packetType == RTMP_PACKET_TYPE_VIDEO)
            RTMP_Log(RTMP_LOGDEBUG, "frametype: %02X", (*packetBody & 0xf0));
#endif

        if (r->m_read.flags & RTMP_READ_RESUME) {
            /* check the header if we get one */
            if (packet.m_nTimeStamp == 0) {
                if (r->m_read.nMetaHeaderSize > 0 &&
                    packet.m_packetType == RTMP_PACKET_TYPE_INFO) {
                    AMFObject metaObj;
                    int nRes =
                        AMF_Decode(&metaObj, packetBody, nPacketLen, FALSE);
                    if (nRes >= 0) {
                        AVal metastring;
                        AMFProp_GetString(AMF_GetProp(&metaObj, NULL, 0),
                                          &metastring);

                        if (AVMATCH(&metastring, &av_onMetaData)) {
                            /* compare */
                            if ((r->m_read.nMetaHeaderSize != nPacketLen) ||
                                (memcmp(r->m_read.metaHeader, packetBody,
                                        r->m_read.nMetaHeaderSize) != 0)) {
                                ret = RTMP_READ_ERROR;
                            }
                        }
                        AMF_Reset(&metaObj);
                        if (ret == RTMP_READ_ERROR)
                            break;
                    }
                }

                /* check first keyframe to make sure we got the right position
                 * in the stream! (the first non ignored frame)
                 */
                if (r->m_read.nInitialFrameSize > 0) {
                    /* video or audio data */
                    if (packet.m_packetType == r->m_read.initialFrameType &&
                        r->m_read.nInitialFrameSize == nPacketLen) {
                        /* we don't compare the sizes since the packet can
                         * contain several FLV packets, just make sure the
                         * first frame is our keyframe (which we are going
                         * to rewrite)
                         */
                        if (memcmp(r->m_read.initialFrame, packetBody,
                                   r->m_read.nInitialFrameSize) == 0) {
                            RTMP_Log(RTMP_LOGDEBUG,
                                     "Checked keyframe successfully!");
                            r->m_read.flags |= RTMP_READ_GOTKF;
                            /* ignore it! (what about audio data after it? it is
                             * handled by ignoring all 0ms frames, see below)
                             */
                            ret = RTMP_READ_IGNORE;
                            break;
                        }
                    }

                    /* hande FLV streams, even though the server resends the
                     * keyframe as an extra video packet it is also included
                     * in the first FLV stream chunk and we have to compare
                     * it and filter it out !!
                     */
                    if (packet.m_packetType == RTMP_PACKET_TYPE_FLASH_VIDEO) {
                        /* basically we have to find the keyframe with the
                         * correct TS being nResumeTS
                         */
                        unsigned int pos = 0;
                        uint32_t ts = 0;

                        while (pos + 11 < nPacketLen) {
                            /* size without header (11) and prevTagSize (4) */
                            uint32_t dataSize =
                                AMF_DecodeInt24(packetBody + pos + 1);
                            ts = AMF_DecodeInt24(packetBody + pos + 4);
                            ts |= (packetBody[pos + 7] << 24);

#ifdef _DEBUG
                            RTMP_Log(RTMP_LOGDEBUG,
                                     "keyframe search: FLV Packet: type %02X, "
                                     "dataSize: %d, "
                                     "timeStamp: %d ms",
                                     packetBody[pos], dataSize, ts);
#endif
                            /* ok, is it a keyframe?:
                             * well doesn't work for audio!
                             */
                            if (packetBody[pos /*6928, test 0 */] ==
                                r->m_read.initialFrameType
                                /* && (packetBody[11]&0xf0) == 0x10 */) {
                                if (ts == r->m_read.nResumeTS) {
                                    RTMP_Log(RTMP_LOGDEBUG,
                                             "Found keyframe with "
                                             "resume-keyframe timestamp!");
                                    if (r->m_read.nInitialFrameSize !=
                                            dataSize ||
                                        memcmp(r->m_read.initialFrame,
                                               packetBody + pos + 11,
                                               r->m_read.nInitialFrameSize) !=
                                            0) {
                                        RTMP_Log(RTMP_LOGERROR,
                                                 "FLV Stream: Keyframe doesn't "
                                                 "match!");
                                        ret = RTMP_READ_ERROR;
                                        break;
                                    }
                                    r->m_read.flags |= RTMP_READ_GOTFLVK;

                                    /* skip this packet?
                                     * check whether skippable:
                                     */
                                    if (pos + 11 + dataSize + 4 > nPacketLen) {
                                        RTMP_Log(RTMP_LOGWARNING,
                                                 "Non skipable packet since it "
                                                 "doesn't end with "
                                                 "chunk, stream corrupt!");
                                        ret = RTMP_READ_ERROR;
                                        break;
                                    }
                                    packetBody += (pos + 11 + dataSize + 4);
                                    nPacketLen -= (pos + 11 + dataSize + 4);

                                    goto stopKeyframeSearch;
                                }
                                else if (r->m_read.nResumeTS < ts) {
                                    /* the timestamp ts will only increase with
                                     * further packets, wait for seek
                                     */
                                    goto stopKeyframeSearch;
                                }
                            }
                            pos += (11 + dataSize + 4);
                        }
                        if (ts < r->m_read.nResumeTS) {
                            RTMP_Log(
                                RTMP_LOGERROR,
                                "First packet does not contain keyframe, all "
                                "timestamps are smaller than the keyframe "
                                "timestamp; probably the resume seek failed?");
                        }

                    stopKeyframeSearch:;
                        if (!(r->m_read.flags & RTMP_READ_GOTFLVK)) {
                            RTMP_Log(RTMP_LOGERROR, "Couldn't find the seeked "
                                                    "keyframe in this chunk!");
                            ret = RTMP_READ_IGNORE;
                            break;
                        }
                    }
                }
            }

            if (packet.m_nTimeStamp > 0 &&
                (r->m_read.flags & (RTMP_READ_GOTKF | RTMP_READ_GOTFLVK))) {
                /* another problem is that the server can actually change from
                 * 09/08 video/audio packets to an FLV stream or vice versa and
                 * our keyframe check will prevent us from going along with the
                 * new stream if we resumed.
                 *
                 * in this case set the 'found keyframe' variables to true.
                 * We assume that if we found one keyframe somewhere and were
                 * already beyond TS > 0 we have written data to the output
                 * which means we can accept all forthcoming data including the
                 * change between 08/09 <-> FLV packets
                 */
                r->m_read.flags |= (RTMP_READ_GOTKF | RTMP_READ_GOTFLVK);
            }

            /* skip till we find our keyframe
             * (seeking might put us somewhere before it)
             */
            if (!(r->m_read.flags & RTMP_READ_GOTKF) &&
                packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO) {
                RTMP_Log(RTMP_LOGWARNING, "Stream does not start with "
                                          "requested frame, ignoring data... ");
                r->m_read.nIgnoredFrameCounter++;
                if (r->m_read.nIgnoredFrameCounter > MAX_IGNORED_FRAMES)
                    ret = RTMP_READ_ERROR; /* fatal error, couldn't continue
                                              stream */
                else
                    ret = RTMP_READ_IGNORE;
                break;
            }
            /* ok, do the same for FLV streams */
            if (!(r->m_read.flags & RTMP_READ_GOTFLVK) &&
                packet.m_packetType == RTMP_PACKET_TYPE_FLASH_VIDEO) {
                RTMP_Log(RTMP_LOGWARNING,
                         "Stream does not start with requested FLV "
                         "frame, ignoring data... ");
                r->m_read.nIgnoredFlvFrameCounter++;
                if (r->m_read.nIgnoredFlvFrameCounter > MAX_IGNORED_FRAMES)
                    ret = RTMP_READ_ERROR;
                else
                    ret = RTMP_READ_IGNORE;
                break;
            }

            /* we have to ignore the 0ms frames since these are the first
             * keyframes; we've got these so don't mess around with multiple
             * copies sent by the server to us! (if the keyframe is found at a
             * later position there is only one copy and it will be ignored by
             * the preceding if clause)
             */
            if (!(r->m_read.flags & RTMP_READ_NO_IGNORE) &&
                packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO) {
                /* exclude type RTMP_PACKET_TYPE_FLASH_VIDEO since it can
                 * contain several FLV packets
                 */
                if (packet.m_nTimeStamp == 0) {
                    ret = RTMP_READ_IGNORE;
                    break;
                }
                else {
                    /* stop ignoring packets */
                    r->m_read.flags |= RTMP_READ_NO_IGNORE;
                }
            }
        }

        /* calculate packet size and allocate slop buffer if necessary */
        size = nPacketLen +
               ((packet.m_packetType == RTMP_PACKET_TYPE_AUDIO ||
                 packet.m_packetType == RTMP_PACKET_TYPE_VIDEO ||
                 packet.m_packetType == RTMP_PACKET_TYPE_INFO)
                    ? 11
                    : 0) +
               (packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO ? 4 : 0);

        if (size + 4 > buflen) {
            /* the extra 4 is for the case of an FLV stream without a last
             * prevTagSize (we need extra 4 bytes to append it) */
            r->m_read.buf = malloc(size + 4);
            if (r->m_read.buf == 0) {
                RTMP_Log(RTMP_LOGERROR, "Couldn't allocate memory!");
                ret = RTMP_READ_ERROR; /* fatal error */
                break;
            }
            recopy = TRUE;
            ptr = r->m_read.buf;
        }
        else {
            ptr = buf;
        }
        pend = ptr + size + 4;

        /* use to return timestamp of last processed packet */

        /* audio (0x08), video (0x09) or metadata (0x12) packets :
         * construct 11 byte header then add rtmp packet's data */
        if (packet.m_packetType == RTMP_PACKET_TYPE_AUDIO ||
            packet.m_packetType == RTMP_PACKET_TYPE_VIDEO ||
            packet.m_packetType == RTMP_PACKET_TYPE_INFO) {
            nTimeStamp = r->m_read.nResumeTS + packet.m_nTimeStamp;
            prevTagSize = 11 + nPacketLen;

            *ptr = packet.m_packetType;
            ptr++;
            ptr = AMF_EncodeInt24(ptr, pend, nPacketLen);

#if 0
	    if(packet.m_packetType == RTMP_PACKET_TYPE_VIDEO) {

	     /* H264 fix: */
	     if((packetBody[0] & 0x0f) == 7) { /* CodecId = H264 */
	     uint8_t packetType = *(packetBody+1);

	     uint32_t ts = AMF_DecodeInt24(packetBody+2); /* composition time */
	     int32_t cts = (ts+0xff800000)^0xff800000;
	     RTMP_Log(RTMP_LOGDEBUG, "cts  : %d\n", cts);

	     nTimeStamp -= cts;
	     /* get rid of the composition time */
	     CRTMP::EncodeInt24(packetBody+2, 0);
	     }
	     RTMP_Log(RTMP_LOGDEBUG, "VIDEO: nTimeStamp: 0x%08X (%d)\n", nTimeStamp, nTimeStamp);
	     }
#endif

            ptr = AMF_EncodeInt24(ptr, pend, nTimeStamp);
            *ptr = (char)((nTimeStamp & 0xFF000000) >> 24);
            ptr++;

            /* stream id */
            ptr = AMF_EncodeInt24(ptr, pend, 0);
        }

        memcpy(ptr, packetBody, nPacketLen);
        len = nPacketLen;

        /* correct tagSize and obtain timestamp if we have an FLV stream */
        if (packet.m_packetType == RTMP_PACKET_TYPE_FLASH_VIDEO) {
            unsigned int pos = 0;
            int delta;

            /* grab first timestamp and see if it needs fixing */
            nTimeStamp = AMF_DecodeInt24(packetBody + 4);
            nTimeStamp |= (packetBody[7] << 24);
            delta = packet.m_nTimeStamp - nTimeStamp + r->m_read.nResumeTS;

            while (pos + 11 < nPacketLen) {
                /* size without header (11) and without prevTagSize (4) */
                uint32_t dataSize = AMF_DecodeInt24(packetBody + pos + 1);
                nTimeStamp = AMF_DecodeInt24(packetBody + pos + 4);
                nTimeStamp |= (packetBody[pos + 7] << 24);

                if (delta) {
                    nTimeStamp += delta;
                    AMF_EncodeInt24(ptr + pos + 4, pend, nTimeStamp);
                    ptr[pos + 7] = nTimeStamp >> 24;
                }

                /* set data type */
                r->m_read.dataType |= (((*(packetBody + pos) == 0x08) << 2) |
                                       (*(packetBody + pos) == 0x09));

                if (pos + 11 + dataSize + 4 > nPacketLen) {
                    if (pos + 11 + dataSize > nPacketLen) {
                        RTMP_Log(
                            RTMP_LOGERROR,
                            "Wrong data size (%u), stream corrupted, aborting!",
                            dataSize);
                        ret = RTMP_READ_ERROR;
                        break;
                    }
                    RTMP_Log(RTMP_LOGWARNING, "No tagSize found, appending!");

                    /* we have to append a last tagSize! */
                    prevTagSize = dataSize + 11;
                    AMF_EncodeInt32(ptr + pos + 11 + dataSize, pend,
                                    prevTagSize);
                    size += 4;
                    len += 4;
                }
                else {

                    prevTagSize =
                        AMF_DecodeInt32(packetBody + pos + 11 + dataSize);

#ifdef _DEBUG
                    RTMP_Log(
                        RTMP_LOGDEBUG,
                        "FLV Packet: type %02X, dataSize: %lu, tagSize: %lu, "
                        "timeStamp: %lu ms",
                        (unsigned char)packetBody[pos], dataSize, prevTagSize,
                        nTimeStamp);
#endif

                    if (prevTagSize != (dataSize + 11)) {
#ifdef _DEBUG
                        RTMP_Log(RTMP_LOGWARNING,
                                 "Tag and data size are not consitent, writing "
                                 "tag size "
                                 "according to dataSize+11: %d",
                                 dataSize + 11);
#endif

                        prevTagSize = dataSize + 11;
                        AMF_EncodeInt32(ptr + pos + 11 + dataSize, pend,
                                        prevTagSize);
                    }
                }

                pos += prevTagSize + 4; /*(11+dataSize+4); */
            }
        }
        ptr += len;

        if (packet.m_packetType != RTMP_PACKET_TYPE_FLASH_VIDEO) {
            /* FLV tag packets contain their own prevTagSize */
            AMF_EncodeInt32(ptr, pend, prevTagSize);
        }

        /* In non-live this nTimeStamp can contain an absolute TS.
         * Update ext timestamp with this absolute offset in non-live mode
         * otherwise report the relative one
         */
        /* RTMP_Log(RTMP_LOGDEBUG, "type: %02X, size: %d, pktTS: %dms, TS: %dms,
         * bLiveStream: %d", packet.m_packetType, nPacketLen,
         * packet.m_nTimeStamp, nTimeStamp, r->Link.lFlags & RTMP_LF_LIVE); */
        r->m_read.timestamp =
            (r->Link.lFlags & RTMP_LF_LIVE) ? packet.m_nTimeStamp : nTimeStamp;

        ret = size;
        break;
    }

    if (rtnGetNextMediaPacket)
        RTMPPacket_Free(&packet);

    if (recopy) {
        len = ret > buflen ? buflen : ret;
        memcpy(buf, r->m_read.buf, len);
        r->m_read.bufpos = r->m_read.buf + len;
        r->m_read.buflen = ret - len;
    }
    return ret;
}

static const char flvHeader[] = {
    'F',  'L',  'V',  0x01, 0x00, /* 0x04 == audio, 0x01 == video */
    0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x00, 0x00};

#define HEADERBUF (128 * 1024)
int RTMP_Read(RTMP *r, char *buf, int size) {
    int nRead = 0, total = 0;

    /* can't continue */
fail:
    switch (r->m_read.status) {
    case RTMP_READ_EOF:
    case RTMP_READ_COMPLETE:
        return 0;
    case RTMP_READ_ERROR: /* corrupted stream, resume failed */
        SetSockError(EINVAL);
        return -1;
    default:
        break;
    }

    /* first time thru */
    if (!(r->m_read.flags & RTMP_READ_HEADER)) {
        if (!(r->m_read.flags & RTMP_READ_RESUME)) {
            char *mybuf = malloc(HEADERBUF), *end = mybuf + HEADERBUF;
            int cnt = 0;
            r->m_read.buf = mybuf;
            r->m_read.buflen = HEADERBUF;

            memcpy(mybuf, flvHeader, sizeof(flvHeader));
            r->m_read.buf += sizeof(flvHeader);
            r->m_read.buflen -= sizeof(flvHeader);
            cnt += sizeof(flvHeader);

            while (r->m_read.timestamp == 0) {
                nRead = Read_1_Packet(r, r->m_read.buf, r->m_read.buflen);
                if (nRead < 0) {
                    free(mybuf);
                    r->m_read.buf = NULL;
                    r->m_read.buflen = 0;
                    r->m_read.status = nRead;
                    goto fail;
                }

                /* buffer overflow, fix buffer and give up */
                if (r->m_read.buf < mybuf || r->m_read.buf > end) {
                    mybuf = realloc(mybuf, cnt + nRead);
                    memcpy(mybuf + cnt, r->m_read.buf, nRead);
                    free(r->m_read.buf);
                    r->m_read.buf = mybuf + cnt + nRead;
                    break;
                }
                cnt += nRead;
                r->m_read.buf += nRead;
                r->m_read.buflen -= nRead;
                if (r->m_read.dataType == 5)
                    break;
            }
            mybuf[4] = r->m_read.dataType;
            r->m_read.buflen = r->m_read.buf - mybuf;
            r->m_read.buf = mybuf;
            r->m_read.bufpos = mybuf;
        }
        r->m_read.flags |= RTMP_READ_HEADER;
    }

    if ((r->m_read.flags & RTMP_READ_SEEKING) && r->m_read.buf) {
        /* drop whatever's here */
        free(r->m_read.buf);
        r->m_read.buf = NULL;
        r->m_read.bufpos = NULL;
        r->m_read.buflen = 0;
    }

    /* If there's leftover data buffered, use it up */
    if (r->m_read.buf) {
        nRead = r->m_read.buflen;
        if (nRead > size)
            nRead = size;
        memcpy(buf, r->m_read.bufpos, nRead);
        r->m_read.buflen -= nRead;
        if (!r->m_read.buflen) {
            free(r->m_read.buf);
            r->m_read.buf = NULL;
            r->m_read.bufpos = NULL;
        }
        else {
            r->m_read.bufpos += nRead;
        }
        buf += nRead;
        total += nRead;
        size -= nRead;
    }

    while (size > 0 && (nRead = Read_1_Packet(r, buf, size)) >= 0) {
        if (!nRead)
            continue;
        buf += nRead;
        total += nRead;
        size -= nRead;
        break;
    }
    if (nRead < 0)
        r->m_read.status = nRead;

    if (size < 0)
        total += size;
    return total;
}

static const AVal av_setDataFrame = AVC("@setDataFrame");

int RTMP_Write(RTMP *r, const char *buf, int size) {
    RTMPPacket *pkt = &r->m_write;
    char *pend, *enc;
    int s2 = size, ret, num;

    pkt->m_nChannel = 0x04; /* source channel */
    pkt->m_nInfoField2 = r->m_stream_id;

    while (s2) {
        if (!pkt->m_nBytesRead) {
            if (size < 11) {
                /* FLV pkt too small */
                return 0;
            }

            if (buf[0] == 'F' && buf[1] == 'L' && buf[2] == 'V') {
                buf += 13;
                s2 -= 13;
            }

            pkt->m_packetType = *buf++;
            pkt->m_nBodySize = AMF_DecodeInt24(buf);
            buf += 3;
            pkt->m_nTimeStamp = AMF_DecodeInt24(buf);
            buf += 3;
            pkt->m_nTimeStamp |= *buf++ << 24;
            buf += 3;
            s2 -= 11;

            if (((pkt->m_packetType == RTMP_PACKET_TYPE_AUDIO ||
                  pkt->m_packetType == RTMP_PACKET_TYPE_VIDEO) &&
                 !pkt->m_nTimeStamp) ||
                pkt->m_packetType == RTMP_PACKET_TYPE_INFO) {
                pkt->m_headerType = RTMP_PACKET_SIZE_LARGE;
                if (pkt->m_packetType == RTMP_PACKET_TYPE_INFO)
                    pkt->m_nBodySize += 16;
            }
            else {
                pkt->m_headerType = RTMP_PACKET_SIZE_MEDIUM;
            }

            if (!RTMPPacket_Alloc(pkt, pkt->m_nBodySize)) {
                RTMP_Log(RTMP_LOGDEBUG, "%s, failed to allocate packet",
                         __FUNCTION__);
                return FALSE;
            }
            enc = pkt->m_body;
            pend = enc + pkt->m_nBodySize;
            if (pkt->m_packetType == RTMP_PACKET_TYPE_INFO) {
                enc = AMF_EncodeString(enc, pend, &av_setDataFrame);
                pkt->m_nBytesRead = enc - pkt->m_body;
            }
        }
        else {
            enc = pkt->m_body + pkt->m_nBytesRead;
        }
        num = pkt->m_nBodySize - pkt->m_nBytesRead;
        if (num > s2)
            num = s2;
        memcpy(enc, buf, num);
        pkt->m_nBytesRead += num;
        s2 -= num;
        buf += num;
        if (pkt->m_nBytesRead == pkt->m_nBodySize) {
            ret = RTMP_SendPacket(r, pkt, FALSE);
            RTMPPacket_Free(pkt);
            pkt->m_nBytesRead = 0;
            if (!ret)
                return -1;
            buf += 4;
            s2 -= 4;
            if (s2 < 0)
                break;
        }
    }
    return size + s2;
}
