diff --git a/librtmp/rtmp.c b/librtmp/rtmp.c index 5311a8a..79fefae 100644 --- a/librtmp/rtmp.c +++ b/librtmp/rtmp.c @@ -2854,7 +2854,7 @@ HandleCtrl(RTMP *r, const RTMPPacket *packet) if (nType == 0x1A) { RTMP_Log(RTMP_LOGDEBUG, "%s, SWFVerification ping received: ", __FUNCTION__); - if (packet->m_nBodySize > 2 && packet->m_body[2] > 0x01) + if (packet->m_nBodySize > 2 && packet->m_body[2] > 0x02) { RTMP_Log(RTMP_LOGERROR, "%s: SWFVerification Type %d request not supported! Patches welcome...", diff --git a/librtmp/rtmp.c b/librtmp/rtmp.c index df2cb27..b72dc64 100644 --- a/librtmp/rtmp.c +++ b/librtmp/rtmp.c @@ -2857,14 +2857,14 @@ HandleCtrl(RTMP *r, const RTMPPacket *packet) if (packet->m_nBodySize > 2 && packet->m_body[2] > 0x01) { RTMP_Log(RTMP_LOGERROR, - "%s: SWFVerification Type %d request not supported! Patches welcome...", + "%s: SWFVerification Type %d request not supported, attempting to use SWFVerification Type 1! Patches welcome...", __FUNCTION__, packet->m_body[2]); } #ifdef CRYPTO /*RTMP_LogHex(packet.m_body, packet.m_nBodySize); */ /* respond with HMAC SHA256 of decompressed SWF, key is the 30byte player key, also the last 30 bytes of the server handshake are applied */ - else if (r->Link.SWFSize) + if (r->Link.SWFSize) { RTMP_SendCtrl(r, 0x1B, 0, 0); }