Audio/video stream recording forums (http://stream-recorder.com/forum/index.php)
-   rtmpdump (http://stream-recorder.com/forum/forumdisplay.php?f=54)
-   -  

Customized rtmpdump binaries with patch file

(http://stream-recorder.com/forum/showthread.php?t=16103)

kaphotics 06-09-2014 09:43 AM

Re: Customized rtmpdump binaries with patch file


 
Does anyone know how to get this stream to work?

Code:

RTMPDump v2.4
(c) 2010 Andrej Stepanchuk, Howard Chu, The Flvstreamer Team; license: GPL
DEBUG: Parsing...
DEBUG: Parsed protocol: 2
DEBUG: Parsed host    : c18fs.fplive.net
DEBUG: Parsed app    : c18
DEBUG: Protocol : RTMPE
DEBUG: Hostname : c18fs.fplive.net
DEBUG: Port    : 1935
DEBUG: Playpath : mp4:s/ve1354295/video.mp4
DEBUG: tcUrl    : rtmpe://c18fs.fplive.net:1935/c18?nvb=20140609152849&nva=20140609192949&token=0209d16d853edd74c1df9
DEBUG: swfUrl  : http://static.ak.crunchyroll.com/fla...sPlayerApp.swf
DEBUG: pageUrl  : http://www.crunchyroll.com/nananas-b...-653293?p720=1
DEBUG: app      : c18?nvb=20140609152849&nva=20140609192949&token=0209d16d853edd74c1df9
DEBUG: flashVer : MAC 13,0,0,214
DEBUG: live    : no
DEBUG: timeout  : 30 sec
DEBUG: SWFSHA256:
DEBUG: 4d ca f8 e2 1d ed 91 10 44 6f 63 e7 5a 0d 7c 19
DEBUG: e6 78 75 49 9d e6 da 8a 84 71 77 90 7e 50 ba 07
DEBUG: SWFSize  : 583899
DEBUG: Setting buffer time to: 36000000ms
Connecting ...
DEBUG: RTMP_Connect1, ... connected, handshaking
DEBUG: HandShake: Client type: 06
DEBUG: HandShake: DH pubkey position: 568
DEBUG: HandShake: Client digest offset: 1062
DEBUG: HandShake: Initial client digest:
DEBUG: 24 c9 71 fa bf 07 ed 57 26 3c 97 24 26 c6 37 23
DEBUG: 78 15 ff ec e0 a8 62 ff d7 d9 f8 17 29 da a5 63
DEBUG: HandShake: Type Answer  : 09
WARNING: HandShake: Type mismatch: client sent 6, server answered 9
DEBUG: HandShake: Server Uptime : 122921763
DEBUG: HandShake: FMS Version  : 4.5.3.1
DEBUG: HandShake: Server DH public key offset: 45
DEBUG: HandShake: Secret key:
DEBUG: be 25 70 7b 32 9b 80 e8 45 62 8f 29 84 cf f8 be
DEBUG: 49 2b 6e 52 80 b3 51 9d f3 fc 84 d7 c5 6f ec 5f
DEBUG: d7 12 5e 61 8d 36 94 ab 09 7a 8e e9 78 0e 05 7e
DEBUG: 93 3b 7d cc 89 fc 4b 5d 12 3e d4 f2 39 24 95 32
DEBUG: 8c 53 eb 0f e3 40 b1 f9 ae 2b 50 71 d6 d8 b7 c0
DEBUG: e3 3a 84 d7 c7 ef bb bc d6 e9 80 99 3c b2 2e 47
DEBUG: 02 58 7c e0 b3 10 87 a7 ed 1b 55 13 74 ef 5d 45
DEBUG: 43 ef a1 89 67 4d 15 b8 b5 86 74 d1 f6 d3 4d b1
DEBUG: RC4 Out Key:
DEBUG: 20 3f c0 ab 09 aa 5e 73 ec 8c c9 77 d4 85 de dc
DEBUG: RC4 In Key:
DEBUG: 2d 87 f6 93 74 98 a4 d0 6a 60 a1 04 b5 71 ce 27
DEBUG: HandShake: Calculated digest key from secure key and server digest:
DEBUG: 95 cb 38 f0 18 41 be 86 2d f5 1b 6f d4 2f 60 70
DEBUG: 10 a5 84 4b f0 92 80 62 ed 68 b7 39 10 85 86 e9
DEBUG: HandShake: Client signature calculated:
DEBUG: 52 17 ee b1 b4 84 7a 4a 2f 9a d9 9e 65 ca 14 25
DEBUG: 0a 70 fd ff 5c 1e 00 d9 2c a0 70 21 66 b5 37 01
DEBUG: HandShake: Server sent signature:
DEBUG: 63 1e ef 73 64 33 07 9b cd 10 53 8e 20 15 9a f0
DEBUG: 3e 9e 39 10 79 d3 45 43 d5 23 b2 c6 3a 95 5e 55
DEBUG: HandShake: Digest key:
DEBUG: 97 64 5b a2 c6 f7 a2 47 dd 22 9b 4d 19 0b 24 f5
DEBUG: dc 03 cb fe 1b d1 b2 8c 4c c0 23 5a 4e 21 99 d1
DEBUG: HandShake: Signature calculated:
DEBUG: 63 1e ef 73 64 33 07 9b cd 10 53 8e 20 15 9a f0
DEBUG: 3e 9e 39 10 79 d3 45 43 d5 23 b2 c6 3a 95 5e 55
DEBUG: HandShake: Genuine Adobe Flash Media Server
DEBUG: HandShake: Handshaking finished....
DEBUG: RTMP_Connect1, handshaked
DEBUG2: RTMP_SendPacket: fd=4, size=587
DEBUG2:  0000:  03 00 00 00 00 02 4b 14  00 00 00 00              ......K.....     
DEBUG2:  0000:  02 00 07 63 6f 6e 6e 65  63 74 00 3f f0 00 00 00  ...connect.?.... 
DEBUG2:  0010:  00 00 00 03 00 03 61 70  70 02 00 45 63 31 38 3f  ......app..Ec18? 
DEBUG2:  0020:  6e 76 62 3d 32 30 31 34  30 36 30 39 31 35 32 38  nvb=201406091528 
DEBUG2:  0030:  34 39 26 6e 76 61 3d 32  30 31 34 30 36 30 39 31  49&nva=201406091 
DEBUG2:  0040:  39 32 39 34 39 26 74 6f  6b 65 6e 3d 30 32 30 39  92949&token=0209 
DEBUG2:  0050:  64 31 36 64 38 35 33 65  64 64 37 34 63 31 64 66  d16d853edd74c1df 
DEBUG2:  0060:  39 00 08 66 6c 61 73 68  56 65 72 02 00 0e 4d 41  9..flashVer...MA 
DEBUG2:  0070:  43 20 31 33 2c 30 2c 30  2c 32 31 34 00 06 73 77  C 13,0,0,214..sw 
DEBUG2:  0000:  c3                                                .               
DEBUG2:  0000:  66 55 72 6c 02 00 6e 68  74 74 70 3a 2f 2f 73 74  fUrl..nhttp://st 
DEBUG2:  0010:  61 74 69 63 2e 61 6b 2e  63 72 75 6e 63 68 79 72  atic.ak.crunchyr 
DEBUG2:  0020:  6f 6c 6c 2e 63 6f 6d 2f  66 6c 61 73 68 2f 32 30  oll.com/flash/20 
DEBUG2:  0030:  31 34 30 35 30 39 32 32  32 33 30 35 2e 33 66 61  140509222305.3fa 
DEBUG2:  0040:  34 36 36 37 36 32 66 61  37 35 64 34 37 31 38 65  466762fa75d4718e 
DEBUG2:  0050:  61 30 65 63 66 33 38 64  64 35 37 33 36 2f 43 68  a0ecf38dd5736/Ch 
DEBUG2:  0060:  72 6f 6d 65 6c 65 73 73  50 6c 61 79 65 72 41 70  romelessPlayerAp 
DEBUG2:  0070:  70 2e 73 77 66 00 05 74  63 55 72 6c 02 00 63 72  p.swf..tcUrl..cr 
DEBUG2:  0000:  c3                                                .               
DEBUG2:  0000:  74 6d 70 65 3a 2f 2f 63  31 38 66 73 2e 66 70 6c  tmpe://c18fs.fpl 
DEBUG2:  0010:  69 76 65 2e 6e 65 74 3a  31 39 33 35 2f 63 31 38  ive.net:1935/c18 
DEBUG2:  0020:  3f 6e 76 62 3d 32 30 31  34 30 36 30 39 31 35 32  ?nvb=20140609152 
DEBUG2:  0030:  38 34 39 26 6e 76 61 3d  32 30 31 34 30 36 30 39  849&nva=20140609 
DEBUG2:  0040:  31 39 32 39 34 39 26 74  6f 6b 65 6e 3d 30 32 30  192949&token=020 
DEBUG2:  0050:  39 64 31 36 64 38 35 33  65 64 64 37 34 63 31 64  9d16d853edd74c1d 
DEBUG2:  0060:  66 39 00 04 66 70 61 64  01 00 00 0c 63 61 70 61  f9..fpad....capa 
DEBUG2:  0070:  62 69 6c 69 74 69 65 73  00 40 6d e0 00 00 00 00  bilities.@m..... 
DEBUG2:  0000:  c3                                                .               
DEBUG2:  0000:  00 00 0b 61 75 64 69 6f  43 6f 64 65 63 73 00 40  ...audioCodecs.@ 
DEBUG2:  0010:  ab ee 00 00 00 00 00 00  0b 76 69 64 65 6f 43 6f  .........videoCo 
DEBUG2:  0020:  64 65 63 73 00 40 6f 80  00 00 00 00 00 00 0d 76  decs.@o........v 
DEBUG2:  0030:  69 64 65 6f 46 75 6e 63  74 69 6f 6e 00 3f f0 00  ideoFunction.?.. 
DEBUG2:  0040:  00 00 00 00 00 00 07 70  61 67 65 55 72 6c 02 00  .......pageUrl.. 
DEBUG2:  0050:  5e 68 74 74 70 3a 2f 2f  77 77 77 2e 63 72 75 6e  ^http://www.crun 
DEBUG2:  0060:  63 68 79 72 6f 6c 6c 2e  63 6f 6d 2f 6e 61 6e 61  chyroll.com/nana 
DEBUG2:  0070:  6e 61 73 2d 62 75 72 69  65 64 2d 74 72 65 61 73  nas-buried-treas 
DEBUG2:  0000:  c3                                                .               
DEBUG2:  0000:  75 72 65 2f 65 70 69 73  6f 64 65 2d 31 2d 64 69  ure/episode-1-di 
DEBUG2:  0010:  73 6f 77 6e 65 64 2d 61  6e 64 2d 65 78 69 6c 65  sowned-and-exile 
DEBUG2:  0020:  64 2d 36 35 33 32 39 33  3f 70 37 32 30 3d 31 00  d-653293?p720=1. 
DEBUG2:  0030:  0e 6f 62 6a 65 63 74 45  6e 63 6f 64 69 6e 67 00  .objectEncoding. 
DEBUG2:  0040:  40 08 00 00 00 00 00 00  00 00 09                  @..........     
DEBUG: Invoking connect
INFO: Connected...
DEBUG2: RTMP_ReadPacket: fd=4
DEBUG2:  0000:  02 00 00 00 00 00 04 01  00 00 00 00              ............     
DEBUG2:  0000:  00 00 00 80                                        ....             
DEBUG: HandleChangeChunkSize, received: chunk size change to 128
DEBUG2: RTMP_ReadPacket: fd=4
DEBUG2:  0000:  03 00 00 00 00 00 a5 14  00 00 00 00              ............     
DEBUG2:  0000:  02 00 06 5f 65 72 72 6f  72 00 3f f0 00 00 00 00  ..._error.?..... 
DEBUG2:  0010:  00 00 05 03 00 05 6c 65  76 65 6c 02 00 05 65 72  ......level...er 
DEBUG2:  0020:  72 6f 72 00 04 63 6f 64  65 02 00 1e 4e 65 74 43  ror..code...NetC 
DEBUG2:  0030:  6f 6e 6e 65 63 74 69 6f  6e 2e 43 6f 6e 6e 65 63  onnection.Connec 
DEBUG2:  0040:  74 2e 52 65 6a 65 63 74  65 64 00 0b 64 65 73 63  t.Rejected..desc 
DEBUG2:  0050:  72 69 70 74 69 6f 6e 02  00 12 43 6f 6e 6e 65 63  ription...Connec 
DEBUG2:  0060:  74 69 6f 6e 20 66 61 69  6c 65 64 2e 00 0b 64 65  tion failed...de 
DEBUG2:  0070:  73 63 72 69 70 74 69 6f  6e 02 00 26 5b 20 53 65  scription..&[ Se 
DEBUG2: RTMP_ReadPacket: fd=4
DEBUG2:  0000:  c3                                                .               
DEBUG2:  0000:  72 76 65 72 2e 52 65 6a  65 63 74 20 5d 20 3a 20  rver.Reject ] : 
DEBUG2:  0010:  43 6f 6e 6e 65 63 74 69  6f 6e 20 66 61 69 6c 65  Connection faile 
DEBUG2:  0020:  64 2e 00 00 09                                    d....           
DEBUG: RTMP_ClientPacket, received: invoke 165 bytes
DEBUG: (object begin)
DEBUG: Property: <Name:            no-name, STRING:        _error>
DEBUG: Property: <Name:            no-name, NUMBER:        1.00>
DEBUG: Property: NULL
DEBUG: Property: <Name:            no-name, OBJECT>
DEBUG: (object begin)
DEBUG: Property: <Name:              level, STRING:        error>
DEBUG: Property: <Name:              code, STRING:        NetConnection.Connect.Rejected>
DEBUG: Property: <Name:        description, STRING:        Connection failed.>
DEBUG: Property: <Name:        description, STRING:        [ Server.Reject ] : Connection failed.>
DEBUG: (object end)
DEBUG: (object end)
DEBUG: HandleInvoke, server invoking <_error>
ERROR: rtmp server sent error
DEBUG2: RTMP_ReadPacket: fd=4
DEBUG2:  0000:  03 00 00 00 00 00 12 14  00 00 00 00              ............     
DEBUG2:  0000:  02 00 05 63 6c 6f 73 65  00 00 00 00 00 00 00 00  ...close........ 
DEBUG2:  0010:  00 05                                              ..               
DEBUG: RTMP_ClientPacket, received: invoke 18 bytes
DEBUG: (object begin)
DEBUG: Property: <Name:            no-name, STRING:        close>
DEBUG: Property: <Name:            no-name, NUMBER:        0.00>
DEBUG: Property: NULL
DEBUG: (object end)
DEBUG: HandleInvoke, server invoking <close>
ERROR: rtmp server requested close
DEBUG: Closing connection.


lorus 06-15-2014 08:27 AM

Re: Customized rtmpdump binaries with patch file


 
Hi KSV,

I'm in trouble with unicode encoded token strings that contain special characters. In the swf they are created by base64 decoding a string like:

Code:

public static var ackey:string = abkey.tostring();
public static var abkey:ByteArray = Base64Decoder.decode("#RGd%has4102gH2bvXa0#w@1");

ackey is then later used as securetoken:

Code:

_loc2_ = TEA.decrypt(param1.info.secureToken,PlayerState.ackey);
this._connection.call("secureTokenResponse",null,_loc2_);

so ackey is something like:
Code:

DgajÎ5Óhٻ×kL5
as it contains multiple special chars, this is definitly something we can't pass through cmd to rtmpdump or as *.strm to xbmc. Do you have an idea, how I could handle such a secure token?


cheerz,

lorus

mckv 06-15-2014 10:02 AM

Re: Customized rtmpdump binaries with patch file


 
it should work on any decent shell like on bash
using UTF8 locale (not sure if it is what flash actually uses)
Code:

echo -n '#RGd%has4102gH2bvXa0#w@1' | hexdump                                                                                                               
0000000 5223 6447 6825 7361 3134 3230 4867 6232
0000010 5876 3061 7723 3140                   
0000018

echo -n 522364476825736131343230486762325876306177233140 | base64 -d | hexdump
0000000 6de7 ebb7 3b8e cdeb efb9 b57e 5ddf dff8
0000010 f46d cee3 ebbb f66d cee7 dffa b54e bdef
0000020 dfb7 345e                             
0000024

then the token should look something like

Code:

-T "$(echo -n '\x6d\xe7\xeb\xb7\x3b\x8e\xcd\xeb\xef\xb9\xb5\x7e\x5d\xdf\xdf\xf8\xf4\x6d\xce\xe3\xeb\xbb\xf6\x6d\xce\xe7\xdf\xfa\xb5\x4e\xbd\xef\xdf\xb7\x34\x5e')"
it is also a question how the #RGd%has4102gH2bvXa0#w@1 is stored it might be ascii or utf8 or utf16 or whatever so you might need to try different ways.

KSV 06-16-2014 10:11 AM

Re: Customized rtmpdump binaries with patch file


 
i actually answered a similar question in other thread few days ago. try to find it in one of my previous posts.

muenster2011 07-13-2014 06:56 PM

Re: Customized rtmpdump binaries with patch file


 
Hello KSV,

the mainline rtmpdump still doesn't support all sites, that's why we still need your amazing patch. Thanks for your work!

Do you have any plans to commit it to the rtmp-git-Repo? Because your patch and the mainline rtmpdump repo are far diverged yet. You have to checkout a commit from Dezember 2012 before you can apply the patch.

I just looked into it and the problem is, that the maintainer simplified some data structures in rtmp.c.

Did you try to contact the auther yet?


Greetings
muenster

RedPenguin 07-17-2014 12:08 AM

Re: Customized rtmpdump binaries with patch file


 
Quote:

Originally Posted by gorilla.maguila (Post 66643)
Another clone:

Code:

else if (strstr(pageUrl, "streamify.tv"))
{
    SendCommand(r, "keGoVidishStambolSoseBardovci", TRUE);
    RTMP_SendCreateStream(r);
}


Exact same command but for the server "zenex.tv". (Must be a clone).

else if (strstr(pageUrl, "zenex.tv"))
{
SendCommand(r, "keGoVidishStambolSoseBardovci", TRUE);
RTMP_SendCreateStream(r);
}

EDIT: For some reason right now the server works without this command but I clearly seen it being sent via Wireshark when I played a channel from it.

forlan38 07-20-2014 04:42 AM

Re: Customized rtmpdump binaries with patch file


 
Could you pls help?

http://stream-recorder.com/forum/rtm...am-t18558.html

aweasd 08-13-2014 09:49 PM

Re: Customized rtmpdump binaries with patch file


 
I'm getting 1 failed hunk when patching against 2.4 pulled from git.

Code:

[aesede@archasd ~]$ git clone git://git.ffmpeg.org/rtmpdump
Cloning into 'rtmpdump'...
remote: Counting objects: 2553, done.
remote: Compressing objects: 100% (914/914), done.
remote: Total 2553 (delta 1926), reused 2149 (delta 1638)
Receiving objects: 100% (2553/2553), 800.45 KiB | 190.00 KiB/s, done.
Resolving deltas: 100% (1926/1926), done.
Checking connectivity... done.
[aesede@archasd ~]$ cd rtmpdump
[aesede@archasd rtmpdump]$ patch -p0 -i Patch.diff
patching file Makefile
patching file librtmp/Makefile
patching file librtmp/amf.c
patching file librtmp/handshake.h
patching file librtmp/hashswf.c
patching file librtmp/log.c
patching file librtmp/parseurl.c
patching file librtmp/rtmp.c
Hunk #4 succeeded at 344 (offset 2 lines).
Hunk #5 succeeded at 368 (offset 2 lines).
Hunk #6 succeeded at 456 (offset 2 lines).
Hunk #7 succeeded at 479 (offset 2 lines).
Hunk #8 succeeded at 529 (offset 2 lines).
Hunk #9 succeeded at 588 (offset 2 lines).
Hunk #10 succeeded at 791 (offset 2 lines).
Hunk #11 succeeded at 868 (offset 2 lines).
Hunk #12 succeeded at 980 (offset 2 lines).
Hunk #13 succeeded at 1432 (offset 2 lines).
Hunk #14 succeeded at 1548 (offset 2 lines).
Hunk #15 succeeded at 1561 (offset 2 lines).
Hunk #16 succeeded at 1587 (offset 2 lines).
Hunk #17 succeeded at 1603 (offset 2 lines).
Hunk #18 succeeded at 1648 (offset 2 lines).
Hunk #19 succeeded at 1685 (offset 2 lines).
Hunk #20 succeeded at 1736 (offset 2 lines).
Hunk #21 succeeded at 1900 (offset 2 lines).
Hunk #22 succeeded at 2206 (offset 2 lines).
Hunk #23 succeeded at 2224 (offset 2 lines).
Hunk #24 succeeded at 2331 (offset 2 lines).
Hunk #25 succeeded at 2448 (offset 2 lines).
Hunk #26 succeeded at 2480 (offset 2 lines).
Hunk #27 succeeded at 2981 (offset -12 lines).
Hunk #28 succeeded at 2994 (offset -12 lines).
Hunk #29 succeeded at 3021 (offset -12 lines).
Hunk #30 succeeded at 3087 (offset -12 lines).
Hunk #31 succeeded at 3325 (offset -12 lines).
Hunk #32 succeeded at 3352 (offset -12 lines).
Hunk #33 FAILED at 3383.
Hunk #34 succeeded at 3394 (offset -23 lines).
Hunk #35 succeeded at 3463 (offset -23 lines).
Hunk #36 succeeded at 3516 (offset -23 lines).
Hunk #37 succeeded at 3620 (offset -23 lines).
Hunk #38 succeeded at 3647 (offset -23 lines).
Hunk #39 succeeded at 3682 (offset -23 lines).
Hunk #40 succeeded at 3698 (offset -23 lines).
Hunk #41 succeeded at 3780 (offset -23 lines).
Hunk #42 succeeded at 3889 (offset -23 lines).
Hunk #43 succeeded at 4202 (offset -23 lines).
Hunk #44 succeeded at 4664 (offset -23 lines).
Hunk #45 succeeded at 4684 (offset -23 lines).
Hunk #46 succeeded at 4825 (offset -23 lines).
Hunk #47 succeeded at 4847 (offset -23 lines).
Hunk #48 succeeded at 4865 (offset -23 lines).
Hunk #49 succeeded at 4909 (offset -23 lines).
Hunk #50 succeeded at 4987 (offset -23 lines).
Hunk #51 succeeded at 5396 (offset -23 lines).
Hunk #52 succeeded at 5599 (offset -23 lines).
1 out of 52 hunks FAILED -- saving rejects to file librtmp/rtmp.c.rej
patching file librtmp/rtmp.h
Hunk #2 succeeded at 177 with fuzz 2 (offset 1 line).
Hunk #3 succeeded at 228 (offset -4 lines).
Hunk #4 succeeded at 315 (offset -4 lines).
Hunk #5 succeeded at 381 (offset -4 lines).
patching file librtmp/rtmp_sys.h
patching file rtmpdump.c
patching file rtmpgw.c
patching file rtmpsrv.c
patching file rtmpsuck.c
patching file thread.c
[aesede@archasd rtmpdump]$

What version of rtmpdump was KSV's build patched against?
I downloaded the patch from: https://github.com/K-S-V/Scripts/releases

muenster2011 08-19-2014 05:52 PM

Re: Customized rtmpdump binaries with patch file


 
The last one from 2012 works at least (commit 0d44da9f5f5a4aa7cd64566c64d89d2fb392e3ef). I tried to reintegrate the patch into the mainline git, but failed.

But here's a skript I made, which parses the needed information automatically from the source code:

Code:

#!/bin/bash

if [ "$1" == "" ]; then
        echo "Usage: Paste Link to model as first argument."
        exit 1
fi
if [ "${1:(-1)}" == "/" ]; then
        model=${1%?}
else
        model=$1
fi
model=${model//*\//}

raw=`wget -qO - http://chaturbate.com/$model/|grep -B1 'password: '`
username=${raw#*\'}
username=${username%%\'*}
password=${raw#*password*\'}
password=${password%%\'*}
#echo $username
#echo $password

#password=${password//\$/\\$}
#date +%Y-%m-%d_%H-%M-%S

rtmpdump -v -r "rtmp://edge13-b.stream.highwebmedia.com/live-edge" -p "http://chaturbate.com/$model" -C S:$username -C S:$model -C S:2.634 -C S:$password -y "playpath" -o $model\_`date +%Y-%m-%d_%H-%M-%S`.flv

Have fun
muenster

denobis 08-20-2014 05:58 PM

Re: Customized rtmpdump binaries with patch file


 
I've added the site 3dbuzz.com to the c-sources. If you want to make a pacth to update the rtmpdump here the notes:

1- the site uses tea-decryption to make a secure response but not in the usual way. The token is received under name "r2"

2- before derypting it you must calculate it through a trivial conversions to make it a hex number.

So the code were something like

1- getting r2 property and calculating it, something like (text=r2 property)

Code:

dbufft(char *text)
                {                                                                                       
                  int local8,local3,r2size;                 
                  char *chars = "ABCDEFGHIJKLMNOPQRSTUVWXYZABCDEFGHIJKLMabcdefghijklmnopqrstuvwxyzabcdefghijklm";                 
                  char *local6 = text;
                  r2size = strlen(local6);                 
                  char local2[r2size];       
                 
                  local3 = 0;
               
                  while (local3 < r2size)
                    {                   
                    local8 = local6[local3];
                                                                                                                     
                    char *b = strchr (chars, local8);
                    int pos = pos ? b - chars : -1;
                                                                                                 
                    if (pos>-1)
                      {local8=chars[pos + 13];}
                     
                    char local52[2];
                    memcpy( local52, &local8, 1 );
                    local2[local3]=local52[0];
                                                   
                    local3++;
                    }
                   
                memcpy(text, local2, r2size);
                }

2- apply it the DecodeTea algorithm and send the response

Code:

     
else        if (strstr(host, "3dbuzz.com") || strstr(pageUrl, "3dbuzz.com"))
                {
                  AVal av_rr = AVC("rr");
                  AVal av_re = AVC(decrypted);
                  SAVC(av_rr);
                 
                  enc = pbuf;               
                  enc = AMF_EncodeString(enc, pend, &av_rr);
                  enc = AMF_EncodeNumber(enc, pend, 0);
                  *enc++ = AMF_NULL;
                  enc = AMF_EncodeString(enc, pend, &av_re);
                  av_Command.av_val = pbuf;
                  av_Command.av_len = enc - pbuf;
                    SendInvoke(r, &av_Command, FALSE);     
                  RTMP_SendCreateStream(r);
                  }

i don't know how to make patches, so you're invited.


All times are GMT -6. The time now is 03:00 AM.