diff options
author | Samuel Pitoiset <samuel.pitoiset@gmail.com> | 2012-07-24 13:46:28 +0200 |
---|---|---|
committer | Martin Storsjö <martin@martin.st> | 2012-07-24 15:54:10 +0300 |
commit | f7bfb126cde36e15048273a0e346fe2ebdc27f57 (patch) | |
tree | b294921b37f32d9e3fed4b7a3e0880eb3566d555 | |
parent | 65d94f63ca38b46a9d3719cb7d986d2daef90416 (diff) | |
download | ffmpeg-f7bfb126cde36e15048273a0e346fe2ebdc27f57.tar.gz |
rtmp: Move the CONFIG_ condition into the if conditions
This makes sure these calls are removed by dead code elimination
even if optimization is disabled. This fixes building without
crypto libraries without optimization.
Signed-off-by: Martin Storsjö <martin@martin.st>
-rw-r--r-- | libavformat/rtmpproto.c | 15 |
1 files changed, 7 insertions, 8 deletions
diff --git a/libavformat/rtmpproto.c b/libavformat/rtmpproto.c index f7ba7d5ef8..1d25ae9a60 100644 --- a/libavformat/rtmpproto.c +++ b/libavformat/rtmpproto.c @@ -719,7 +719,6 @@ static int rtmp_handshake(URLContext *s, RTMPContext *rt) int i; int server_pos, client_pos; uint8_t digest[32], signature[32]; - int encrypted = rt->encrypted && CONFIG_FFRTMPCRYPT_PROTOCOL; int ret, type = 0; av_log(s, AV_LOG_DEBUG, "Handshaking...\n"); @@ -729,7 +728,7 @@ static int rtmp_handshake(URLContext *s, RTMPContext *rt) for (i = 9; i <= RTMP_HANDSHAKE_PACKET_SIZE; i++) tosend[i] = av_lfg_get(&rnd) >> 24; - if (encrypted) { + if (rt->encrypted && CONFIG_FFRTMPCRYPT_PROTOCOL) { /* When the client wants to use RTMPE, we have to change the command * byte to 0x06 which means to use encrypted data and we have to set * the flash version to at least 9.0.115.0. */ @@ -745,7 +744,7 @@ static int rtmp_handshake(URLContext *s, RTMPContext *rt) return ret; } - client_pos = rtmp_handshake_imprint_with_digest(tosend + 1, encrypted); + client_pos = rtmp_handshake_imprint_with_digest(tosend + 1, rt->encrypted); if (client_pos < 0) return client_pos; @@ -799,7 +798,7 @@ static int rtmp_handshake(URLContext *s, RTMPContext *rt) if (ret < 0) return ret; - if (encrypted) { + if (rt->encrypted && CONFIG_FFRTMPCRYPT_PROTOCOL) { /* Compute the shared secret key sent by the server and initialize * the RC4 encryption. */ if ((ret = ff_rtmpe_compute_secret_key(rt->stream, serverdata + 1, @@ -829,7 +828,7 @@ static int rtmp_handshake(URLContext *s, RTMPContext *rt) if (ret < 0) return ret; - if (encrypted) { + if (rt->encrypted && CONFIG_FFRTMPCRYPT_PROTOCOL) { /* Encrypt the signature to be send to the server. */ ff_rtmpe_encrypt_sig(rt->stream, tosend + RTMP_HANDSHAKE_PACKET_SIZE - 32, digest, @@ -841,13 +840,13 @@ static int rtmp_handshake(URLContext *s, RTMPContext *rt) RTMP_HANDSHAKE_PACKET_SIZE)) < 0) return ret; - if (encrypted) { + if (rt->encrypted && CONFIG_FFRTMPCRYPT_PROTOCOL) { /* Set RC4 keys for encryption and update the keystreams. */ if ((ret = ff_rtmpe_update_keystream(rt->stream)) < 0) return ret; } } else { - if (encrypted) { + if (rt->encrypted && CONFIG_FFRTMPCRYPT_PROTOCOL) { /* Compute the shared secret key sent by the server and initialize * the RC4 encryption. */ if ((ret = ff_rtmpe_compute_secret_key(rt->stream, serverdata + 1, @@ -865,7 +864,7 @@ static int rtmp_handshake(URLContext *s, RTMPContext *rt) RTMP_HANDSHAKE_PACKET_SIZE)) < 0) return ret; - if (encrypted) { + if (rt->encrypted && CONFIG_FFRTMPCRYPT_PROTOCOL) { /* Set RC4 keys for encryption and update the keystreams. */ if ((ret = ff_rtmpe_update_keystream(rt->stream)) < 0) return ret; |