From patchwork Tue Mar 19 21:58:39 2019 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Jun Li X-Patchwork-Id: 12356 Return-Path: X-Original-To: patchwork@ffaux-bg.ffmpeg.org Delivered-To: patchwork@ffaux-bg.ffmpeg.org Received: from ffbox0-bg.mplayerhq.hu (ffbox0-bg.ffmpeg.org [79.124.17.100]) by ffaux.localdomain (Postfix) with ESMTP id 7CBC444804C for ; Tue, 19 Mar 2019 23:58:58 +0200 (EET) Received: from [127.0.1.1] (localhost [127.0.0.1]) by ffbox0-bg.mplayerhq.hu (Postfix) with ESMTP id 7020A68A965; Tue, 19 Mar 2019 23:58:58 +0200 (EET) X-Original-To: ffmpeg-devel@ffmpeg.org Delivered-To: ffmpeg-devel@ffmpeg.org Received: from mail-pf1-f172.google.com (mail-pf1-f172.google.com [209.85.210.172]) by ffbox0-bg.mplayerhq.hu (Postfix) with ESMTPS id 1AF8068A948 for ; Tue, 19 Mar 2019 23:58:51 +0200 (EET) Received: by mail-pf1-f172.google.com with SMTP id r15so326874pfn.9 for ; Tue, 19 Mar 2019 14:58:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:subject:date:message-id:in-reply-to:references; bh=R8lRGOpmo/aqtwKB6N0lbo5aOAugqA3DB7ge+PvXLZQ=; b=JhRbNikPniddPsk3VWpXgfc/nAG/VIUSQbHp8AZ7Mc5oSup+Sk4sKwD1Td7gA55Yup 0ftXHgluiDWchyxkoMURTcd7ZhYsRqONWEes9SHV6u0JIx+jW/ApQlER2jC4TG6YyLuf rCpVEiQaL/wE4QJHtEwJ+02T0Hh0Mlk6KSoFSKu50PPTgchSdKcP1Hd+oniGv5vR6uIC dl1e52v1sz2bTa2sfYhB+mZ/bW9+u/X+80eD9wOc1i0qJR2dsc1kBrBbOPun5cn8rwWR CPDW0erkBfqeJkAgedf5bZrXCDSWwN+QQz+qpUjcunOSkH8uSdKf1zs0h6gPaYTsFTYS JGfA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:subject:date:message-id:in-reply-to :references; bh=R8lRGOpmo/aqtwKB6N0lbo5aOAugqA3DB7ge+PvXLZQ=; b=qklUhDWEYqHPYVumNtJ3du/CifQA0hWf19rK4vAl7StC6HrdAZwhLShDtvw7zyIVy7 XFTGEzWjzJH4tvdGSH35qkW+izTZ7LKRzba4oHegjQs+CsQuuIvB++K0jw2iOoGE1hxV QoIoP+aGt3v6Llx64pt2qdFCa0sOpHMO+xSuQmgpC6fyl/0SupUQsTikCH+9X7u8K4IW F6rxOgzbbsArj4myQ2EGVBnRoHWgIAzP646z/RzSQ3ng1C7IoYtl00dmXei89icISh5J a4t+GZ/fUiBPkdsjBNyBT9MQEsT1cRNz+dPv0PiKiajFbQ6MSLu3q3oiw2eYPgdfDbzV 09iQ== X-Gm-Message-State: APjAAAXhqJDTFJugfdJpl3b4/Ab0bEjuyy0NBXrvIqb454H5axOjFm5j mBhSpO26yHNjaTvbr5Etr4A7L0AK X-Google-Smtp-Source: APXvYqyTDRG1IjNGrj6sNQVNLb4dYLrmSTo1OLQ+KyxsOeZY2yCdiNFaShqvdHeihhDjh9uUHcVUUQ== X-Received: by 2002:a17:902:10d:: with SMTP id 13mr20327817plb.230.1553032729119; Tue, 19 Mar 2019 14:58:49 -0700 (PDT) Received: from jun-ubuntu.corp.microsoft.com ([2001:4898:80e8:a:e8de:6afa:bf6c:dfca]) by smtp.googlemail.com with ESMTPSA id k27sm26750398pgb.70.2019.03.19.14.58.48 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 19 Mar 2019 14:58:48 -0700 (PDT) From: Jun Li To: ffmpeg-devel@ffmpeg.org Date: Tue, 19 Mar 2019 14:58:39 -0700 Message-Id: <20190319215839.32193-4-junli1026@gmail.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20190319215839.32193-1-junli1026@gmail.com> References: <20190319215839.32193-1-junli1026@gmail.com> Subject: [FFmpeg-devel] [PATCH v1 3/3] avformat/rtsp: Disable send-100-continue for http tunnelling X-BeenThere: ffmpeg-devel@ffmpeg.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: FFmpeg development discussions and patches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Reply-To: FFmpeg development discussions and patches MIME-Version: 1.0 Errors-To: ffmpeg-devel-bounces@ffmpeg.org Sender: "ffmpeg-devel" Expect:100-continue is not widely supported by http server, even less for rtsp servers. Apple's http tunnelling spec does not have any 100-continue setting. So disable this header. --- libavformat/rtsp.c | 1 + 1 file changed, 1 insertion(+) diff --git a/libavformat/rtsp.c b/libavformat/rtsp.c index 975637cf54..68c9c3ab9b 100644 --- a/libavformat/rtsp.c +++ b/libavformat/rtsp.c @@ -1793,6 +1793,7 @@ redirect: sessioncookie); av_opt_set(rt->rtsp_hd_out->priv_data, "headers", headers, 0); av_opt_set(rt->rtsp_hd_out->priv_data, "chunked_post", "0", 0); + av_opt_set(rt->rtsp_hd_out->priv_data, "send_expect_100", "0", 0); /* Initialize the authentication state for the POST session. The HTTP * protocol implementation doesn't properly handle multi-pass