• python3实现的rtsp客户端脚本


    一、说明

    此客户端使用python3编写

    此客户端实现RTSP的OPTIONS, DESCRIBE, SETUP , PLAY, GET_PARAMETER,TEARDOWN方法,未实现ANNOUNCE,PAUSE,SET_PARAMETER,REDIRECT,RECORD

    RTSP就是针对一个URL,或是依次或是有选择地执行以上11种请求;要做渗透测试,没很多可测的,也就测试URL中的参数和各请求方法的请求头参数有没有溢出

    此客户端自动依次执行请求:OPTIONS--DESCRIBE(2次)--SETUP(2次)--PLAY--GET_PARAMETER(5次)--TEARDOWN

    RTSP有Basic和Digest两种验证方法,此客户端实现默认使用Digest方法,如果想换用Basic方法请将config_dict['auth_method']的值由‘Digest’修改为‘Basic’

    总体执行效果如下图所示

    二、客户端源代码

    V1.0版本(20180525):

    import base64
    import socket
    import hashlib
    import time
    
    global config_dict
    config_dict = {
        'server_username': 'admin',
        'server_password': '1234567',
        'server_ip': '10.10.6.94',
        'server_port': 554,
        'server_path': '/chIP=1&streamType=main/',
        'cseq': 2,
        'user_agent': 'LibVLC/3.0.2 (LIVE555 Streaming Media v2016.11.28)',
        'buffer_len': 1024,
        'auth_method': 'Digest',
        'header_modify_allow': False,
        'options_header_modify': False,
        'describe_header_modify': False,
        'describe_auth_header_modify': False,
        'setup_header_modify': False,
        'setup_session_header_modify': False,
        'play_header_modify': False,
        'get_parameter_header_modify': False,
        'teardown_header_modify': False
    }
    
    
    def gen_response_value(url,public_method,realm,nonce):
        frist_pre_md5_value = hashlib.md5((config_dict['server_username'] + ':' + realm + ':' + config_dict['server_password']).encode()).hexdigest()
        first_post_md5_value = hashlib.md5((public_method+':' + url).encode()).hexdigest()
        response_value = hashlib.md5((frist_pre_md5_value + ':' + nonce + ':' + first_post_md5_value).encode()).hexdigest()
        return response_value
    
    
    def gen_options_header():
        global config_dict
        str_options_header = 'OPTIONS rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
            'server_path'] + ' RTSP/1.0
    '
        str_options_header += 'CSeq: ' + str(config_dict['cseq']) + '
    '
        str_options_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
        str_options_header += '
    '
        return str_options_header
    
    
    def gen_describe_header():
        global config_dict
        str_describe_header = 'DESCRIBE rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
            'server_path'] + ' RTSP/1.0
    '
        str_describe_header += 'CSeq: ' + str(config_dict['cseq'] + 1) + '
    '
        str_describe_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
        str_describe_header += 'Accept: application/sdp
    '
        str_describe_header += '
    '
        return str_describe_header
    
    
    def gen_describe_auth_header(url,realm,nonce):
        global config_dict
        public_method = 'DESCRIBE'
        str_describe_auth_header = 'DESCRIBE rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path'] + ' RTSP/1.0
    '
        str_describe_auth_header += 'CSeq: ' + str(config_dict['cseq'] + 2) + '
    '
        if config_dict['auth_method'] == 'Basic':
            auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
            str_describe_auth_header += 'Authorization: Basic '+auth_64 + ' 
    '
        else:
            response_value = gen_response_value(url, public_method, realm, nonce)
            str_describe_auth_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"
    '
        str_describe_auth_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
        str_describe_auth_header += 'Accept: application/sdp
    '
        str_describe_auth_header += '
    '
        return str_describe_auth_header
    
    
    def gen_setup_header(url, realm, nonce):
        global config_dict
        public_method = 'SETUP'
        str_setup_header  = 'SETUP rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path'] + 'trackID=0 RTSP/1.0
    '
        str_setup_header += 'CSeq: ' + str(config_dict['cseq'] + 3) + '
    '
        if config_dict['auth_method'] == 'Basic':
            auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
            str_setup_header += 'Authorization: Basic '+auth_64 + ' 
    '
        else:
            response_value = gen_response_value(url, public_method, realm, nonce)
            str_setup_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"
    '
        str_setup_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
        str_setup_header += 'Transport: RTP/AVP;unicast;client_port=50166-50167
    '
        str_setup_header += '
    '
        return str_setup_header
    
    
    def gen_setup_session_header(url, realm, nonce,session):
        global config_dict
        public_method = 'SETUP'
        str_setup_session_header = 'SETUP rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
            'server_path'] + '/trackID=1 RTSP/1.0
    '
        str_setup_session_header += 'CSeq: ' + str(config_dict['cseq'] + 4) + '
    '
        if config_dict['auth_method'] == 'Basic':
            auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
            str_setup_session_header += 'Authorization: Basic '+auth_64 + ' 
    '
        else:
            response_value = gen_response_value(url, public_method, realm, nonce)
            str_setup_session_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"
    '
        str_setup_session_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
        str_setup_session_header += 'Transport: RTP/AVP;unicast;client_port=50168-50169
    '
        str_setup_session_header += 'Session: '+session+'
    '
        str_setup_session_header += '
    '
        return str_setup_session_header
    
    
    def gen_play_header(url, realm, nonce,session):
        global config_dict
        public_method = 'PLAY'
        str_play_header = 'PLAY rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
            'server_path'] + ' RTSP/1.0
    '
        str_play_header += 'CSeq: ' + str(config_dict['cseq'] + 5) + '
    '
        if config_dict['auth_method'] == 'Basic':
            auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
            str_play_header += 'Authorization: Basic '+auth_64 + ' 
    '
        else:
            response_value = gen_response_value(url, public_method, realm, nonce)
            str_play_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"
    '
        str_play_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
        str_play_header += 'Session: '+session+'
    '
        str_play_header += 'Range: npt=0.000-
    '
        str_play_header += '
    '
        return str_play_header
    
    
    def gen_get_parameter_header(url, realm, nonce, session,count):
        global config_dict
        public_method = 'GET_PARAMETER'
        str_get_parameter_header = 'GET_PARAMETER rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
            'server_path'] + ' RTSP/1.0
    '
        str_get_parameter_header += 'CSeq: ' + str(config_dict['cseq'] + 6+int(count)) + '
    '
        if config_dict['auth_method'] == 'Basic':
            auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
            str_get_parameter_header += 'Authorization: Basic '+auth_64 + ' 
    '
        else:
            response_value = gen_response_value(url, public_method, realm, nonce)
            str_get_parameter_header += 'Authorization: Digest username="' + config_dict[
            'server_username'] + '", realm="' + realm + '", nonce="' + nonce + '", uri="' + url + '", response="' + response_value + '"
    '
        str_get_parameter_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
        str_get_parameter_header += 'Session: ' + session + '
    '
        str_get_parameter_header += '
    '
        return str_get_parameter_header
    
    
    def gen_teardown_header(url, realm, nonce, session):
        global config_dict
        public_method = 'TEARDOWN'
        str_teardown_header = 'TEARDOWN rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path'] + ' RTSP/1.0
    '
        str_teardown_header += 'CSeq: ' + str(config_dict['cseq'] + 11) + '
    '
        if config_dict['auth_method'] == 'Basic':
            auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
            str_teardown_header += 'Authorization: Basic '+auth_64 + ' 
    '
        else:
            response_value = gen_response_value(url, public_method, realm, nonce)
            str_teardown_header += 'Authorization: Digest username="' + config_dict[
            'server_username'] + '", realm="' + realm + '", nonce="' + nonce + '", uri="' + url + '", response="' + response_value + '"
    '
        str_teardown_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
        str_teardown_header += 'Session: ' + session + '
    '
        str_teardown_header += '
    '
        return str_teardown_header
    
    
    def add_header_according_to_protocol(str_header):
        str_header = str_header[0:len(str_header)-2]
        str_header += 'Accept: application/rtsl, application/sdp;level=2'
        str_header += 'Accept-Encoding: 
    '
        str_header += 'Accept-Language: 
    '
        str_header += 'Authorization: 
    '
        str_header += 'Band 1*DIGIT 
    '
        str_header += 'Blocksize: 
    '
        str_header += 'Cache-Control: no-cache 
    '
        str_header += 'Conference: 199702170042.SAA08642@obiwan.arl.wustl.edu%20Starr 
    '
        str_header += 'Connection: 
    '
        str_header += 'Content-Base: 
    '
        str_header += 'Content-Encoding: 
    '
        str_header += 'Content-Language: 
    '
        str_header += 'Content-Length: 20 
    '
        str_header += 'Content-Location: 
    '
        str_header += 'Content-Type: 
    '
        str_header += 'Date: 
    '
        str_header += 'Expires: Thu, 01 Dec 1994 16:00:00 GMT 
    '
        str_header += 'From: 
    '
        str_header += 'If-Modified-Since: Sat, 29 Oct 1994 19:43:31 GMT 
    '
        str_header += 'Last-Modified: 
    '
        str_header += 'Proxy-Require: 
    '
        str_header += 'Referer: 
    '
        str_header += 'Require: funky-feature 
    '
        str_header += 'Scale: -3.5 
    '
        str_header += 'Speed: 2.5 
    '
        str_header += 'Transport: RTP/AVP;unicast;client_port=3456-3457;mode="PLAY" 
    '
        str_header += 'User-Agent: 
    '
        str_header += 'Via: 
    '
        str_header += 'Range: npt=2
    '
        str_header += '
    '
        return str_header
    
    
    def exec_full_request():
        socket_send = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
        socket_send.settimeout(5)
        socket_send.connect((config_dict['server_ip'], config_dict['server_port']))
        
        url = 'rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path']
        
        print('now start to check options operation')
        str_options_header = gen_options_header()
        if config_dict['header_modify_allow'] & config_dict['options_header_modify']:
            str_options_header = add_header_according_to_protocol(str_options_header)
        socket_send.send(str_options_header.encode())
        msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
        if '200 OK' in msg_recv:
            print('OPTIONS request is OK')
        else:
            print('OPTIONS request is BAD')
        str_describe_header = gen_describe_header()
        if config_dict['header_modify_allow'] & config_dict['describe_header_modify']:
            str_describe_header = add_header_according_to_protocol(str_describe_header)
        socket_send.send(str_describe_header.encode())
        msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
        if msg_recv.find('401 Unauthorized') == -1 & False:
            msg_recv_dict = msg_recv.split('
    ')
            print('first DESCRIBE request occur error: ')
            print(msg_recv_dict[0])
        else:
            print('first DESCRIBE is ok,now we will execute second DESCRIBE for auth')
            realm_pos = msg_recv.find('realm')
            realm_value_begin_pos = msg_recv.find('"', realm_pos)+1
            realm_value_end_pos = msg_recv.find('"', realm_pos + 8)
            realm_value = msg_recv[realm_value_begin_pos:realm_value_end_pos]
            nonce_pos = msg_recv.find('nonce')
            nonce_value_begin_pos = msg_recv.find('"', nonce_pos)+1
            nonce_value_end_pos = msg_recv.find('"', nonce_pos + 8)
            nonce_value = msg_recv[nonce_value_begin_pos:nonce_value_end_pos]
            str_describe_auth_header = gen_describe_auth_header(url, realm_value, nonce_value)
            if config_dict['header_modify_allow'] & config_dict['describe_auth_header_modify']:
                str_describe_auth_header = add_header_according_to_protocol(str_describe_auth_header)
            socket_send.send(str_describe_auth_header.encode())
            msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
            if msg_recv.find('200 OK') == -1:
                msg_recv_dict = msg_recv.split('
    ')
                print('second DESCRIBE request occur error: ')
                print(msg_recv_dict[0])
            else:
                print('second DESCRIBE is ok,now we will execute first SETUP for session')
                str_setup_header = gen_setup_header(url, realm_value, nonce_value)
                if config_dict['header_modify_allow'] & config_dict['setup_header_modify']:
                    str_setup_header = add_header_according_to_protocol(str_setup_header)
                socket_send.send(str_setup_header.encode())
                msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
                if msg_recv.find('200 OK') == -1:
                    msg_recv_dict = msg_recv.split('
    ')
                    print('first SETUP request occur error: ')
                    print(msg_recv_dict[0])
                else:
                    print('first SETUP is ok,now we will execute second SETUP')
                    session_pos = msg_recv.find('Session')
                    session_value_begin_pos = msg_recv.find(' ',session_pos+8)+1
                    session_value_end_pos = msg_recv.find(';',session_pos+8)
                    session_value = msg_recv[session_value_begin_pos:session_value_end_pos]
                    str_setup_session_header = gen_setup_session_header(url, realm_value, nonce_value,session_value)
                    if config_dict['header_modify_allow'] & config_dict['setup_session_header_modify']:
                        str_setup_session_header = add_header_according_to_protocol(str_setup_session_header)
                    socket_send.send(str_setup_session_header.encode())
                    msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
                    if msg_recv.find('200 OK') == -1:
                        msg_recv_dict = msg_recv.split('
    ')
                        print('first SETUP request occur error: ')
                        print(msg_recv_dict[0])
                    else:
                        print('second SETUP is ok, now we wil execute PLAY')
                        str_play_header = gen_play_header(url, realm_value, nonce_value, session_value)
                        if config_dict['header_modify_allow'] & config_dict['play_header_modify']:
                            str_play_header = add_header_according_to_protocol(str_play_header)
                        socket_send.send(str_play_header.encode())
                        msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
                        if msg_recv.find('200 OK') == -1:
                            msg_recv_dict = msg_recv.split('
    ')
                            print('PLAY request occur error: ')
                            print(msg_recv_dict[0])
                        else:
                            print('PLAY is ok, we will execute GET_PARAMETER every 10 seconds and 5 times total')
                            for i in range(2):
                                str_get_parameter_header = gen_get_parameter_header(url, realm_value, nonce_value, session_value,str(i))
                                if config_dict['header_modify_allow'] & config_dict['get_parameter_header_modify']:
                                    str_get_parameter_header = add_header_according_to_protocol(str_get_parameter_header)
                                socket_send.send(str_get_parameter_header.encode())
                                msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
                                msg_recv_dict = msg_recv.split('
    ')
                                print(str(i)+'*10:'+msg_recv_dict[0])
                                time.sleep(10)
                            print('now we will execute TEARDOWN to disconnect with server')
                            str_teardown_header = gen_teardown_header(url, realm_value, nonce_value, session_value)
                            if config_dict['header_modify_allow'] & config_dict['teardown_header_modify']:
                                str_teardown_header = add_header_according_to_protocol(str_teardown_header)
                            socket_send.send(str_teardown_header.encode())
                            msg_recv = socket_send.recv(config_dict['buffer_len']).decode()
                            print(msg_recv)
                            print('program execute finished, thank you')
        socket_send.close()
    
    
    exec_full_request()
    View Code

     V1.1版本(20180614):

    import socket
    import hashlib
    import base64
    import time
    
    config_dict = {
        'server_username': 'admin',                 #RTSP用户名
        'server_password': '123456',                #RTSP用户名对应密码
        'server_ip': '10.10.6.92',                  #RTSP服务器IP地址
        'server_port': 554,                         #RTSP服务器使用端口
        'server_path': '/chIP=1&streamType=main/',  #URL中端口之后的部份,测试发现不同服务器对这部份接受的值是不一样的,也就是说自己使用时很可能得自己修改这部份的值
        'cseq': 2,                                  #RTSP使用的请求起始序列码,不需要改动
        'user_agent': 'LibVLC/3.0.2 (LIVE555 Streaming Media v2016.11.28)', #自定义请求头部
        'buffer_len': 1024,                         #用于接收服务器返回数据的缓冲区的大小
        'auth_method': 'Digest',                    #RTSP使用的认证方法,Basic/Digest
        'header_normal_modify_allow': False,        #是否允许拼接其他协议规定的请求头的总开关,请些请求头的值为正常值(大多是RFC给出的示例)
        'header_overload_modify_allow': False,      #是否允许拼接其他协议规定的请求头的总开关,请些请求头的值为超长字符串
        'options_header_modify': True,              #OPTIONS请求中,是否允许拼接其他协议规定的请求头的开关
        'describe_header_modify': True,             #第一次DESCRIBE请求中,是否允许拼接其他协议规定的请求头的开关
        'describe_auth_header_modify': True,        #第二次DESCRIBE请求中,是否允许拼接其他协议规定的请求头的开关
        'setup_header_modify': True,                #第一次SETUP请求中,是否允许拼接其他协议规定的请求头的开关
        'setup_session_header_modify': True,        #第二次SETUP请求中,是否允许拼接其他协议规定的请求头的开关
        'play_header_modify': True,                 #PLAY请求中,是否允许拼接其他协议规定的请求头的开关
        'get_parameter_header_modify': True,        #GET PARAMETER请求中,是否允许拼接其他协议规定的请求头的开关
        'teardown_header_modify': True              #TEARDOWN请求中,是否允许拼接其他协议规定的请求头的开关
    }
    
    class RtspClient():
        def __init__(self):
            # self.socket_send = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
            # self.socket_send.settimeout(5)
            # self.socket_send.connect((config_dict['server_ip'], config_dict['server_port']))
            pass
    
        #用于Digest认证方式时生成response的值
        def gen_response_value(self,url,public_method,realm,nonce):
            frist_pre_md5_value = hashlib.md5((config_dict['server_username'] + ':' + realm + ':' + config_dict['server_password']).encode()).hexdigest()
            first_post_md5_value = hashlib.md5((public_method+':' + url).encode()).hexdigest()
            response_value = hashlib.md5((frist_pre_md5_value + ':' + nonce + ':' + first_post_md5_value).encode()).hexdigest()
            return response_value
        
        #生成options请求头部
        def gen_options_header(self):
            global config_dict
            str_options_header = 'OPTIONS rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
                'server_path'] + ' RTSP/1.0
    '
            str_options_header += 'CSeq: ' + str(config_dict['cseq']) + '
    '
            str_options_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
            str_options_header += '
    '
            return str_options_header
        
        #生成第一次describe请求头部
        def gen_describe_header(self):
            global config_dict
            str_describe_header = 'DESCRIBE rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
                'server_path'] + ' RTSP/1.0
    '
            str_describe_header += 'CSeq: ' + str(config_dict['cseq'] + 1) + '
    '
            str_describe_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
            str_describe_header += 'Accept: application/sdp
    '
            str_describe_header += '
    '
            return str_describe_header
        
        #生成第二次describe请求头部
        def gen_describe_auth_header(self,url,realm,nonce):
            global config_dict
            public_method = 'DESCRIBE'
            str_describe_auth_header = 'DESCRIBE rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path'] + ' RTSP/1.0
    '
            str_describe_auth_header += 'CSeq: ' + str(config_dict['cseq'] + 2) + '
    '
            if config_dict['auth_method'] == 'Basic':
                auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
                str_describe_auth_header += 'Authorization: Basic '+auth_64 + ' 
    '
            else:
                response_value = self.gen_response_value(url, public_method, realm, nonce)
                str_describe_auth_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"
    '
            str_describe_auth_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
            str_describe_auth_header += 'Accept: application/sdp
    '
            str_describe_auth_header += '
    '
            return str_describe_auth_header
        
        #生成第一次setup请求头部
        def gen_setup_header(self,url, realm, nonce):
            global config_dict
            public_method = 'SETUP'
            str_setup_header  = 'SETUP rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path'] + 'trackID=0 RTSP/1.0
    '
            str_setup_header += 'CSeq: ' + str(config_dict['cseq'] + 3) + '
    '
            if config_dict['auth_method'] == 'Basic':
                auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
                str_setup_header += 'Authorization: Basic '+auth_64 + ' 
    '
            else:
                response_value = self.gen_response_value(url, public_method, realm, nonce)
                str_setup_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"
    '
            str_setup_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
            str_setup_header += 'Transport: RTP/AVP;unicast;client_port=50166-50167
    '
            str_setup_header += '
    '
            return str_setup_header
        
        #生成第二次setup请求头部
        def gen_setup_session_header(self,url, realm, nonce,session):
            global config_dict
            public_method = 'SETUP'
            str_setup_session_header = 'SETUP rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
                'server_path'] + 'trackID=1 RTSP/1.0
    '
            str_setup_session_header += 'CSeq: ' + str(config_dict['cseq'] + 4) + '
    '
            if config_dict['auth_method'] == 'Basic':
                auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
                str_setup_session_header += 'Authorization: Basic '+auth_64 + ' 
    '
            else:
                response_value = self.gen_response_value(url, public_method, realm, nonce)
                str_setup_session_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"
    '
            str_setup_session_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
            str_setup_session_header += 'Transport: RTP/AVP;unicast;client_port=50168-50169
    '
            str_setup_session_header += 'Session: '+session+'
    '
            str_setup_session_header += '
    '
            return str_setup_session_header
        
        #生成play请求头部
        def gen_play_header(self,url, realm, nonce,session):
            global config_dict
            public_method = 'PLAY'
            str_play_header = 'PLAY rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
                'server_path'] + ' RTSP/1.0
    '
            str_play_header += 'CSeq: ' + str(config_dict['cseq'] + 5) + '
    '
            if config_dict['auth_method'] == 'Basic':
                auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
                str_play_header += 'Authorization: Basic '+auth_64 + ' 
    '
            else:
                response_value = self.gen_response_value(url, public_method, realm, nonce)
                str_play_header += 'Authorization: Digest username="'+config_dict['server_username']+'", realm="'+realm+'", nonce="'+nonce+'", uri="'+url+'", response="'+response_value+'"
    '
            str_play_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
            str_play_header += 'Session: '+session+'
    '
            str_play_header += 'Range: npt=0.000-
    '
            str_play_header += '
    '
            return str_play_header
        
        #生成GET_PARAMETER请求头部
        def gen_get_parameter_header(self,url, realm, nonce, session,count):
            global config_dict
            public_method = 'GET_PARAMETER'
            str_get_parameter_header = 'GET_PARAMETER rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict[
                'server_path'] + ' RTSP/1.0
    '
            str_get_parameter_header += 'CSeq: ' + str(config_dict['cseq'] + 6+int(count)) + '
    '
            if config_dict['auth_method'] == 'Basic':
                auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
                str_get_parameter_header += 'Authorization: Basic '+auth_64 + ' 
    '
            else:
                response_value = self.gen_response_value(url, public_method, realm, nonce)
                str_get_parameter_header += 'Authorization: Digest username="' + config_dict[
                'server_username'] + '", realm="' + realm + '", nonce="' + nonce + '", uri="' + url + '", response="' + response_value + '"
    '
            str_get_parameter_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
            str_get_parameter_header += 'Session: ' + session + '
    '
            str_get_parameter_header += '
    '
            return str_get_parameter_header
        
        #生成teardown请求头部
        def gen_teardown_header(self,url, realm, nonce, session):
            global config_dict
            public_method = 'TEARDOWN'
            str_teardown_header = 'TEARDOWN rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path'] + ' RTSP/1.0
    '
            str_teardown_header += 'CSeq: ' + str(config_dict['cseq'] + 11) + '
    '
            if config_dict['auth_method'] == 'Basic':
                auth_64 = base64.b64encode((config_dict['server_username'] + ":" + config_dict['server_password']).encode("utf-8")).decode()
                str_teardown_header += 'Authorization: Basic '+auth_64 + ' 
    '
            else:
                response_value = self.gen_response_value(url, public_method, realm, nonce)
                str_teardown_header += 'Authorization: Digest username="' + config_dict[
                'server_username'] + '", realm="' + realm + '", nonce="' + nonce + '", uri="' + url + '", response="' + response_value + '"
    '
            str_teardown_header += 'User-Agent: ' + config_dict['user_agent'] + '
    '
            str_teardown_header += 'Session: ' + session + '
    '
            str_teardown_header += '
    '
            return str_teardown_header
        
        #拼接rtsp协议的其他请求头,以测试程序对这些请求头部的处理是否有问题;这个方法与add_overload_header_according_to_protocol是互斥的
        def add_normal_header_according_to_protocol(self,str_header):
            str_header = str_header[0:len(str_header)-2]
            str_header += 'Accept: application/rtsl, application/sdp;level=-2'
            str_header += 'Accept-Encoding: gzip;q=1.0, identity; q=0.5, *;q=0
    '
            str_header += 'Accept-Language: da, en-gb;q=0.8, en;q=0.7
    '
            str_header += 'Band 4000 
    '
            str_header += 'Blocksize: 4000 
    '
            str_header += 'Cache-Control: no-cache;max-stale 
    '
            str_header += 'Conference: 199702170042.SAA08642@obiwan.arl.wustl.edu%20Starr 
    '
            str_header += 'Connection: close
    '
            str_header += 'Content-Base: gzip
    '
            str_header += 'Content-Encoding: gzip
    '
            str_header += 'Content-Language: mi,en
    '
            str_header += 'Content-Length: 2034953454546565 
    '
            str_header += 'Content-Location: /etc/passwd
    '
            str_header += 'Content-Type: text/html; charset=ISO-8859-4gg
    '
            str_header += 'Date: Tue, 15 Nov 1995x 08:12:31 GMT
    '
            str_header += 'Expires: Thu, 01 Dec 1994 16:00:00 GMT 
    '
            str_header += 'From: webmaster@w3.org
    '
            str_header += 'If-Modified-Since: Sat, 29 Oct 1994 19:43:31 GMT 
    '
            str_header += 'Last-Modified: Tue, 15 Nov 1994 12:45:26 GMT
    '
            str_header += 'Proxy-Require: funky-feature
    '
            str_header += 'Referer: http://www.w3.org/hypertext/DataSources/Overview.html
    '
            str_header += 'Require: funky-feature 
    '
            str_header += 'Scale: -3.5 
    '
            str_header += 'Speed: 2.5 
    '
            str_header += 'Transport: RTP/AVP;unicast;client_port=3456-3457;mode="PLAY" 
    '
            str_header += 'Via: 1.0 fred, 1.1 nowhere.com (Apache/1.1)
    '
            str_header += 'Range: npt=2
    '
            str_header += '
    '
            return str_header
    
        #拼接rtsp协议的其他请求头,并将这些请求头的字赋为超长字符串,以测试程序对这些请求头部的处理是否有缓冲区溢出问题;这个方法与add_normal_header_according_to_protocol是互斥的
        def add_overload_header_according_to_protocol(self,str_header):
            str_header = str_header[0:len(str_header) - 2]
            str_header += 'Accept: application/rtsl012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789, application/sdp;level=-2012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789'
            str_header += 'Accept-Encoding: gzip01234567890123456789012345678901234567890123456789;q=1.0012345678901234567890123456789012345678901234567890123456789, identity; q=0.5012345678901234567890123456789, *;q=0012345678901234567890123456789
    '
            str_header += 'Accept-Language: da, en-gb;q=0.80123456789012345678901234567890123456789, en;q=0.7012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789
    '
            str_header += 'Band 400001234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 
    '
            str_header += 'Blocksize: 4000012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 
    '
            str_header += 'Cache-Control: no-cache;max-stale 
    '
            str_header += 'Conference: 199702170042.SAA08642@obiwan.arl.wustl.edu%20Starr01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 
    '
            str_header += 'Connection: 01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789close
    '
            str_header += 'Content-Base: 0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789gzip
    '
            str_header += 'Content-Encoding: 01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789gzip
    '
            str_header += 'Content-Language: 01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789mi,en
    '
            str_header += 'Content-Length: 203495345454656501234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 
    '
            str_header += 'Content-Location: /etc/passwd01234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789
    '
            str_header += 'Content-Type: text/html012345678901234567890123456789012345678901234567890123456789; charset=012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789ISO-8859-4gg
    '
            str_header += 'Date: Tue, 15 Nov 1995x 08:12:310123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 GMT
    '
            str_header += 'Expires: Thu, 01 Dec 1994 16012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789:00:00 GMT 
    '
            str_header += 'From: webmaster@w30123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789.org
    '
            str_header += 'If-Modified-Since: Sat, 29 Oct 1994 19:43:31012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 GMT 
    '
            str_header += 'Last-Modified: Tue, 15 Nov 1994 120123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789:45:26 GMT
    '
            str_header += 'Proxy-Require: funky-feature
    '
            str_header += 'Referer: http://www.w3.org/hypertext/DataSources/Overview.html
    '
            str_header += 'Require: funky-feature0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789 
    '
            str_header += 'Scale: -0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567893.5 
    '
            str_header += 'Speed: 20123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789.5 
    '
            str_header += 'Transport: RTP/AVP;unicast;client_port=3456-345012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567897;mode="01234567890123456789PLAY" 
    '
            str_header += 'Via: 1.0 fred, 0123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567891.1 nowhere.com (Apache/0123456789012345678901234567891.1)
    '
            str_header += 'Range: npt=20123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789012345678901234567890123456789
    '
            str_header += '
    '
            return str_header
        
        #执行一次完整的rtsp播放请求,OPTIONS/DESCRIBE/SETUP/PLAY/GET PARAMETER/TEARDOWN,如果某个请求不正确则中止
        #此方法推荐用于则试服务端是否正确实现RTSP服务
        def exec_full_request(self):
            self.socket_send = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
            self.socket_send.settimeout(5)
            self.socket_send.connect((config_dict['server_ip'], config_dict['server_port']))
            
            url = 'rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path']
            
            print('now start to check options operation')
            str_options_header = self.gen_options_header()
            if config_dict['header_normal_modify_allow'] & config_dict['options_header_modify']:
                str_options_header = self.add_normal_header_according_to_protocol(str_options_header)
            elif config_dict['header_overload_modify_allow'] & config_dict['options_header_modify']:
                str_options_header = self.add_overload__header_according_to_protocol(str_options_header)
            self.socket_send.send(str_options_header.encode())
            msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
            if '200 OK' in msg_recv:
                print('OPTIONS request is OK')
            else:
                print('OPTIONS request is BAD')
            str_describe_header = self.gen_describe_header()
            if config_dict['header_normal_modify_allow'] & config_dict['describe_header_modify']:
                str_describe_header = self.add_normal_header_according_to_protocol(str_describe_header)
            elif config_dict['header_overload_modify_allow'] & config_dict['describe_header_modify']:
                str_describe_header = self.add_overload__header_according_to_protocol(str_describe_header)
            self.socket_send.send(str_describe_header.encode())
            msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
            if msg_recv.find('401 Unauthorized') == -1 & False:
                msg_recv_dict = msg_recv.split('
    ')
                print('first DESCRIBE request occur error: ')
                print(msg_recv_dict[0])
            else:
                print('first DESCRIBE is ok,now we will execute second DESCRIBE for auth')
                realm_pos = msg_recv.find('realm')
                realm_value_begin_pos = msg_recv.find('"', realm_pos)+1
                realm_value_end_pos = msg_recv.find('"', realm_pos + 8)
                realm_value = msg_recv[realm_value_begin_pos:realm_value_end_pos]
                nonce_pos = msg_recv.find('nonce')
                nonce_value_begin_pos = msg_recv.find('"', nonce_pos)+1
                nonce_value_end_pos = msg_recv.find('"', nonce_pos + 8)
                nonce_value = msg_recv[nonce_value_begin_pos:nonce_value_end_pos]
                str_describe_auth_header = self.gen_describe_auth_header(url, realm_value, nonce_value)
                if config_dict['header_normal_modify_allow'] & config_dict['describe_auth_header_modify']:
                    str_describe_auth_header = self.add_normal_header_according_to_protocol(str_describe_auth_header)
                elif config_dict['header_overload_modify_allow'] & config_dict['describe_auth_header_modify']:
                    str_describe_auth_header = self.add_overload__header_according_to_protocol(str_describe_auth_header)
                self.socket_send.send(str_describe_auth_header.encode())
                msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
                if msg_recv.find('200 OK') == -1:
                    msg_recv_dict = msg_recv.split('
    ')
                    print('second DESCRIBE request occur error: ')
                    print(msg_recv_dict[0])
                else:
                    print('second DESCRIBE is ok,now we will execute first SETUP for session')
                    str_setup_header = self.gen_setup_header(url, realm_value, nonce_value)
                    if config_dict['header_normal_modify_allow'] & config_dict['setup_header_modify']:
                        str_setup_header = self.add_normal_header_according_to_protocol(str_setup_header)
                    elif config_dict['header_overload_modify_allow'] & config_dict['setup_header_modify']:
                        str_setup_header = self.add_overload__header_according_to_protocol(str_setup_header)
                    self.socket_send.send(str_setup_header.encode())
                    msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
                    if msg_recv.find('200 OK') == -1:
                        msg_recv_dict = msg_recv.split('
    ')
                        print('first SETUP request occur error: ')
                        print(msg_recv_dict[0])
                    else:
                        print('first SETUP is ok,now we will execute second SETUP')
                        session_pos = msg_recv.find('Session')
                        session_value_begin_pos = msg_recv.find(' ',session_pos+8)+1
                        session_value_end_pos = msg_recv.find(';',session_pos+8)
                        session_value = msg_recv[session_value_begin_pos:session_value_end_pos]
                        str_setup_session_header = self.gen_setup_session_header(url, realm_value, nonce_value,session_value)
                        if config_dict['header_normal_modify_allow'] & config_dict['setup_session_header_modify']:
                            str_setup_session_header = self.add_normal_header_according_to_protocol(str_setup_session_header)
                        elif config_dict['header_overload_modify_allow'] & config_dict['setup_session_header_modify']:
                            str_setup_session_header = self.add_overload_header_according_to_protocol(str_setup_session_header)
                        self.socket_send.send(str_setup_session_header.encode())
                        msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
                        if msg_recv.find('200 OK') == -1:
                            msg_recv_dict = msg_recv.split('
    ')
                            print('second SETUP request occur error: ')
                            print(msg_recv_dict[0])
                        else:
                            print('second SETUP is ok, now we wil execute PLAY')
                            str_play_header = self.gen_play_header(url, realm_value, nonce_value, session_value)
                            if config_dict['header_normal_modify_allow'] & config_dict['play_header_modify']:
                                str_play_header = self.add_normal_header_according_to_protocol(str_play_header)
                            elif config_dict['header_overload_modify_allow'] & config_dict['play_header_modify']:
                                str_play_header = self.add_overload_header_according_to_protocol(str_play_header)
                            self.socket_send.send(str_play_header.encode())
                            msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
                            if msg_recv.find('200 OK') == -1:
                                msg_recv_dict = msg_recv.split('
    ')
                                print('PLAY request occur error: ')
                                print(msg_recv_dict[0])
                            else:
                                print('PLAY is ok, we will execute GET_PARAMETER every 10 seconds and 5 times total')
                                for i in range(2):
                                    str_get_parameter_header = self.gen_get_parameter_header(url, realm_value, nonce_value, session_value,str(i))
                                    if config_dict['header_normal_modify_allow'] & config_dict['get_parameter_header_modify']:
                                        str_get_parameter_header = self.add_normal_header_according_to_protocol(str_get_parameter_header)
                                    elif config_dict['header_overload_modify_allow'] & config_dict['get_parameter_header_modify']:
                                        str_get_parameter_header = self.add_overload_header_according_to_protocol(str_get_parameter_header)
                                    self.socket_send.send(str_get_parameter_header.encode())
                                    msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
                                    msg_recv_dict = msg_recv.split('
    ')
                                    print(str(i)+'*10:'+msg_recv_dict[0])
                                    time.sleep(10)
                                print('
    now we will execute TEARDOWN to disconnect with server')
                                str_teardown_header = self.gen_teardown_header(url, realm_value, nonce_value, session_value)
                                if config_dict['header_normal_modify_allow'] & config_dict['teardown_header_modify']:
                                    str_teardown_header = self.add_normal_header_according_to_protocol(str_teardown_header)
                                elif config_dict['header_overload_modify_allow'] & config_dict['teardown_header_modify']:
                                    str_teardown_header = self.add_overload_header_according_to_protocol(str_teardown_header)
                                self.socket_send.send(str_teardown_header.encode())
                                msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
                                print(msg_recv)
                                print('program execute finished, thank you')
            self.socket_send.close()
    
        
        #强制依次执行OPTIONS/DESCRIBE/SETUP/PLAY/GET PARAMETER/TEARDOWN,某个请求报错也进行下一个请求
        #此方法推荐用于测试服务端是否有溢出漏洞
        def exec_force_request(self):
            self.socket_send = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
            self.socket_send.settimeout(5)
            self.socket_send.connect((config_dict['server_ip'], config_dict['server_port']))
        
            url = 'rtsp://' + config_dict['server_ip'] + ':' + str(config_dict['server_port']) + config_dict['server_path']
        
            print('now start to check options operation')
            str_options_header = self.gen_options_header()
            if config_dict['header_normal_modify_allow'] & config_dict['options_header_modify']:
                str_options_header = self.add_normal_header_according_to_protocol(str_options_header)
            elif config_dict['header_overload_modify_allow'] & config_dict['options_header_modify']:
                str_options_header = self.add_overload_header_according_to_protocol(str_options_header)
            self.socket_send.send(str_options_header.encode())
            msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
            msg_recv_dict = msg_recv.split('
    ')
            print('the OPTIONS response is :')
            print(msg_recv_dict[0])
            print('
    now we will execute first DESCRIBE request')
            str_describe_header = self.gen_describe_header()
            if config_dict['header_normal_modify_allow'] & config_dict['describe_header_modify']:
                str_describe_header = self.add_normal_header_according_to_protocol(str_describe_header)
            elif config_dict['header_overload_modify_allow'] & config_dict['describe_header_modify']:
                str_describe_header = self.add_overload_header_according_to_protocol(str_describe_header)
            self.socket_send.send(str_describe_header.encode())
            msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
            msg_recv_dict = msg_recv.split('
    ')
            print('the first DESCRIBE response is :')
            print(msg_recv_dict[0])
            print('
    now we will execute second DESCRIBE for auth')
            realm_value = 'RTSP SERVER'
            nonce_value = 'e29027990294f81b941b04a7ac78c196'
            str_describe_auth_header = self.gen_describe_auth_header(url, realm_value, nonce_value)
            if config_dict['header_normal_modify_allow'] & config_dict['describe_auth_header_modify']:
                str_describe_auth_header = self.add_normal_header_according_to_protocol(str_describe_auth_header)
            elif config_dict['header_overload_modify_allow'] & config_dict['describe_auth_header_modify']:
                str_describe_auth_header = self.add_overload_header_according_to_protocol(str_describe_auth_header)
            self.socket_send.send(str_describe_auth_header.encode())
            msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
            msg_recv_dict = msg_recv.split('
    ')
            print('the second DESCRIBE response is :')
            print(msg_recv_dict[0])
            print('
    now we will execute first SETUP for session')
            str_setup_header = self.gen_setup_header(url, realm_value, nonce_value)
            if config_dict['header_normal_modify_allow'] & config_dict['setup_header_modify']:
                str_setup_header = self.add_normal_header_according_to_protocol(str_setup_header)
            elif config_dict['header_overload_modify_allow'] & config_dict['setup_header_modify']:
                str_setup_header = self.add_overload_header_according_to_protocol(str_setup_header)
            self.socket_send.send(str_setup_header.encode())
            msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
            msg_recv_dict = msg_recv.split('
    ')
            print('the first SETUP response is :')
            print(msg_recv_dict[0])
            print('
    now we will execute second SETUP')
            session_value = '464314414585882'
            str_setup_session_header = self.gen_setup_session_header(url, realm_value, nonce_value, session_value)
            if config_dict['header_normal_modify_allow'] & config_dict['setup_session_header_modify']:
                str_setup_session_header = self.add_normal_header_according_to_protocol(str_setup_session_header)
            elif config_dict['header_overload_modify_allow'] & config_dict['setup_session_header_modify']:
                str_setup_session_header = self.add_overload_header_according_to_protocol(str_setup_session_header)
            self.socket_send.send(str_setup_session_header.encode())
            msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
            msg_recv_dict = msg_recv.split('
    ')
            print('the second SETUP response is :')
            print(print(msg_recv_dict[0]))
            print('
    now we wil execute PLAY')
            str_play_header = self.gen_play_header(url, realm_value, nonce_value, session_value)
            if config_dict['header_normal_modify_allow'] & config_dict['play_header_modify']:
                str_play_header = self.add_normal_header_according_to_protocol(str_play_header)
            elif config_dict['header_overload_modify_allow'] & config_dict['play_header_modify']:
                str_play_header = self.add_overload_header_according_to_protocol(str_play_header)
            self.socket_send.send(str_play_header.encode())
            msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
            msg_recv_dict = msg_recv.split('
    ')
            print('the PLAY response is :')
            print(msg_recv_dict[0])
            print('
    now we will execute GET_PARAMETER')
            str_get_parameter_header = self.gen_get_parameter_header(url, realm_value, nonce_value, session_value, '1')
            if config_dict['header_normal_modify_allow'] & config_dict['get_parameter_header_modify']:
                str_get_parameter_header = self.add_normal_header_according_to_protocol(str_get_parameter_header)
            elif config_dict['header_overload_modify_allow'] & config_dict['get_parameter_header_modify']:
                str_get_parameter_header = self.add_overload_header_according_to_protocol(str_get_parameter_header)
            self.socket_send.send(str_get_parameter_header.encode())
            msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
            msg_recv_dict = msg_recv.split('
    ')
            print('the GET_PARAMETER response is :')
            print(msg_recv_dict[0])
            print('
    now we will execute TEARDOWN to disconnect with server')
            str_teardown_header = self.gen_teardown_header(url, realm_value, nonce_value, session_value)
            if config_dict['header_normal_modify_allow'] & config_dict['teardown_header_modify']:
                str_teardown_header = self.add_normal_header_according_to_protocol(str_teardown_header)
            elif config_dict['header_overload_modify_allow'] & config_dict['teardown_header_modify']:
                str_teardown_header = self.add_overload_header_according_to_protocol(str_teardown_header)
            self.socket_send.send(str_teardown_header.encode())
            msg_recv = self.socket_send.recv(config_dict['buffer_len']).decode()
            msg_recv_dict = msg_recv.split('
    ')
            print('the GET_PARAMETER response is :')
            print(msg_recv_dict[0])
            print('program execute finished, thank you')
            self.socket_send.close()
    
        def __del__(self):
            # self.socket_send.close()
            pass
    
    
    if __name__ == '__main__':
        rtsp_client = RtspClient()
        rtsp_client.exec_full_request()
        #rtsp_client.exec_force_request()
    View Code

    参考:

    https://www.cnblogs.com/MikeZhang/archive/2012/10/29/rtspTcpClient_DSS_20121029.html

    https://blog.csdn.net/joeblackzqq/article/details/22383005

    https://docs.python.org/3/library/index.html

     https://tools.ietf.org/html/rfc2326#page-40

  • 相关阅读:
    提取轮廓后的画图处理
    提取视频中的前景物体
    写入视频帧
    处理视频序列
    视频读写
    三维重建-相机标定
    图像拼接相关
    计算两幅图像之间的单应矩阵
    ransac算法(随机抽样一致性)
    图像间投影关系
  • 原文地址:https://www.cnblogs.com/lsdb/p/9090198.html
Copyright © 2020-2023  润新知