5 # 1) giving an evil payload (with $)
6 # 2) Giving evil content (SDP starting with $)
7 # 3) packing rtp after headers, after content, and at the start
19 Server: RTSPD/libcurl-test
27 Server: RTSPD/libcurl-test
35 Server: RTSPD/libcurl-test
38 Content-Type: fake/evil
45 Server: RTSPD/libcurl-test
52 rtp: part 2 channel 1 size 10
53 rtp: part 2 channel 0 size 500
54 rtp: part 2 channel 0 size 196
55 rtp: part 2 channel 0 size 124
56 rtp: part 2 channel 0 size 824
57 rtp: part 3 channel 1 size 10
58 rtp: part 3 channel 0 size 50
59 rtp: part 4 channel 0 size 798
60 rtp: part 4 channel 0 size 42
61 rtp: part 4 channel 1 size 30
62 rtp: part 4 channel 0 size 2048
63 rtp: part 4 channel 0 size 85
64 rtp: part 4 channel 1 size 24
78 RTSP RTP Interleaving Test
81 rtsp://%HOSTIP:%RTSPPORT/571 log/protofile571.txt
87 RTP: message size 10, channel 1
88 RTP: message size 500, channel 0
89 RTP: message size 196, channel 0
90 RTP: message size 124, channel 0
91 RTP: message size 824, channel 0
92 RTP: message size 10, channel 1
93 RTP: message size 50, channel 0
94 RTP: message size 798, channel 0
95 RTP: message size 42, channel 0
96 RTP: message size 30, channel 1
97 RTP: message size 2048, channel 0
98 RTP: message size 85, channel 0
99 RTP: message size 24, channel 1
102 <file name="log/protofile571.txt">