6 * Copyright (C) 2013-2015 SIPE Project <http://sipe.sourceforge.net/>
7 * Copyright (C) 2010 Jakub Adam <jakub.adam@ktknet.cz>
9 * This program is free software; you can redistribute it and/or modify
10 * it under the terms of the GNU General Public License as published by
11 * the Free Software Foundation; either version 2 of the License, or
12 * (at your option) any later version.
14 * This program is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
17 * GNU General Public License for more details.
19 * You should have received a copy of the GNU General Public License
20 * along with this program; if not, write to the Free Software
21 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
30 #include "sipe-backend.h"
31 #include "sipe-core.h"
33 #include "sipe-utils.h"
36 append_attribute(struct sdpmedia
*media
, gchar
*attr
)
38 gchar
**parts
= g_strsplit(attr
+ 2, ":", 2);
45 media
->attributes
= sipe_utils_nameval_add(media
->attributes
,
47 parts
[1] ? parts
[1] : "");
53 parse_attributes(struct sdpmsg
*smsg
, gchar
*msg
) {
54 gchar
**lines
= g_strsplit(msg
, "\r\n", 0);
57 while (*ptr
!= NULL
) {
58 if (g_str_has_prefix(*ptr
, "o=")) {
59 gchar
**parts
= g_strsplit(*ptr
+ 2, " ", 6);
60 smsg
->ip
= g_strdup(parts
[5]);
62 } else if (g_str_has_prefix(*ptr
, "m=")) {
63 gchar
**parts
= g_strsplit(*ptr
+ 2, " ", 3);
64 struct sdpmedia
*media
= g_new0(struct sdpmedia
, 1);
66 smsg
->media
= g_slist_append(smsg
->media
, media
);
68 media
->name
= g_strdup(parts
[0]);
69 media
->port
= atoi(parts
[1]);
70 media
->encryption_active
=
71 g_strstr_len(parts
[2], -1, "/SAVP") != NULL
;
75 while (*(++ptr
) && !g_str_has_prefix(*ptr
, "m=")) {
77 if (g_str_has_prefix(*ptr
, "a=")) {
78 if (!append_attribute(media
, *ptr
)) {
95 static struct sdpcandidate
* sdpcandidate_copy(struct sdpcandidate
*candidate
);
97 static SipeComponentType
98 parse_component(const gchar
*str
)
101 case 1: return SIPE_COMPONENT_RTP
;
102 case 2: return SIPE_COMPONENT_RTCP
;
103 default: return SIPE_COMPONENT_NONE
;
108 base64_pad(const gchar
* str
)
110 size_t str_len
= strlen(str
);
111 int mod
= str_len
% 4;
114 gchar
*result
= NULL
;
116 gchar
*ptr
= result
= g_malloc(str_len
+ pad
+ 1);
118 memcpy(ptr
, str
, str_len
);
120 memset(ptr
, '=', pad
);
126 return g_strdup(str
);
130 parse_append_candidate_draft_6(gchar
**tokens
, GSList
*candidates
)
132 struct sdpcandidate
*candidate
= g_new0(struct sdpcandidate
, 1);
134 candidate
->username
= base64_pad(tokens
[0]);
135 candidate
->component
= parse_component(tokens
[1]);
136 candidate
->password
= base64_pad(tokens
[2]);
138 if (sipe_strequal(tokens
[3], "UDP"))
139 candidate
->protocol
= SIPE_NETWORK_PROTOCOL_UDP
;
140 else if (sipe_strequal(tokens
[3], "TCP"))
141 candidate
->protocol
= SIPE_NETWORK_PROTOCOL_TCP_ACTIVE
;
143 sdpcandidate_free(candidate
);
147 candidate
->priority
= atoi(tokens
[4] + 2);
148 candidate
->ip
= g_strdup(tokens
[5]);
149 candidate
->port
= atoi(tokens
[6]);
151 candidates
= g_slist_append(candidates
, candidate
);
153 // draft 6 candidates are both active and passive
154 if (candidate
->protocol
== SIPE_NETWORK_PROTOCOL_TCP_ACTIVE
) {
155 candidate
= sdpcandidate_copy(candidate
);
156 candidate
->protocol
= SIPE_NETWORK_PROTOCOL_TCP_PASSIVE
;
157 candidates
= g_slist_append(candidates
, candidate
);
164 parse_append_candidate_rfc_5245(gchar
**tokens
, GSList
*candidates
)
166 struct sdpcandidate
*candidate
= g_new0(struct sdpcandidate
, 1);
168 candidate
->foundation
= g_strdup(tokens
[0]);
169 candidate
->component
= parse_component(tokens
[1]);
171 if (sipe_strcase_equal(tokens
[2], "UDP"))
172 candidate
->protocol
= SIPE_NETWORK_PROTOCOL_UDP
;
173 else if (sipe_strcase_equal(tokens
[2], "TCP-ACT"))
174 candidate
->protocol
= SIPE_NETWORK_PROTOCOL_TCP_ACTIVE
;
175 else if (sipe_strcase_equal(tokens
[2], "TCP-PASS"))
176 candidate
->protocol
= SIPE_NETWORK_PROTOCOL_TCP_PASSIVE
;
178 sdpcandidate_free(candidate
);
182 candidate
->priority
= atoi(tokens
[3]);
183 candidate
->ip
= g_strdup(tokens
[4]);
184 candidate
->port
= atoi(tokens
[5]);
186 if (sipe_strcase_equal(tokens
[7], "host"))
187 candidate
->type
= SIPE_CANDIDATE_TYPE_HOST
;
188 else if (sipe_strcase_equal(tokens
[7], "relay"))
189 candidate
->type
= SIPE_CANDIDATE_TYPE_RELAY
;
190 else if (sipe_strcase_equal(tokens
[7], "srflx"))
191 candidate
->type
= SIPE_CANDIDATE_TYPE_SRFLX
;
192 else if (sipe_strcase_equal(tokens
[7], "prflx"))
193 candidate
->type
= SIPE_CANDIDATE_TYPE_PRFLX
;
195 sdpcandidate_free(candidate
);
199 candidates
= g_slist_append(candidates
, candidate
);
201 // TCP-ACT candidates are both active and passive
202 if (candidate
->protocol
== SIPE_NETWORK_PROTOCOL_TCP_ACTIVE
) {
203 candidate
= sdpcandidate_copy(candidate
);
204 candidate
->protocol
= SIPE_NETWORK_PROTOCOL_TCP_PASSIVE
;
205 candidates
= g_slist_append(candidates
, candidate
);
211 parse_candidates(GSList
*attrs
, SipeIceVersion
*ice_version
)
213 GSList
*candidates
= NULL
;
217 while ((attr
= sipe_utils_nameval_find_instance(attrs
, "candidate", i
++))) {
218 gchar
**tokens
= g_strsplit_set(attr
, " ", 0);
220 if (sipe_strequal(tokens
[6], "typ")) {
221 candidates
= parse_append_candidate_rfc_5245(tokens
, candidates
);
223 *ice_version
= SIPE_ICE_RFC_5245
;
225 candidates
= parse_append_candidate_draft_6(tokens
, candidates
);
227 *ice_version
= SIPE_ICE_DRAFT_6
;
234 *ice_version
= SIPE_ICE_NO_ICE
;
236 if (*ice_version
== SIPE_ICE_RFC_5245
) {
237 const gchar
*username
= sipe_utils_nameval_find(attrs
, "ice-ufrag");
238 const gchar
*password
= sipe_utils_nameval_find(attrs
, "ice-pwd");
240 if (username
&& password
) {
242 for (i
= candidates
; i
; i
= i
->next
) {
243 struct sdpcandidate
*c
= i
->data
;
244 c
->username
= g_strdup(username
);
245 c
->password
= g_strdup(password
);
254 create_legacy_candidates(gchar
*ip
, guint16 port
)
256 struct sdpcandidate
*candidate
;
257 GSList
*candidates
= NULL
;
259 candidate
= g_new0(struct sdpcandidate
, 1);
260 candidate
->foundation
= g_strdup("1");
261 candidate
->component
= SIPE_COMPONENT_RTP
;
262 candidate
->type
= SIPE_CANDIDATE_TYPE_HOST
;
263 candidate
->protocol
= SIPE_NETWORK_PROTOCOL_UDP
;
264 candidate
->ip
= g_strdup(ip
);
265 candidate
->port
= port
;
267 candidates
= g_slist_append(candidates
, candidate
);
269 candidate
= g_new0(struct sdpcandidate
, 1);
270 candidate
->foundation
= g_strdup("1");
271 candidate
->component
= SIPE_COMPONENT_RTCP
;
272 candidate
->type
= SIPE_CANDIDATE_TYPE_HOST
;
273 candidate
->protocol
= SIPE_NETWORK_PROTOCOL_UDP
;
274 candidate
->ip
= g_strdup(ip
);
275 candidate
->port
= port
+ 1;
277 candidates
= g_slist_append(candidates
, candidate
);
283 parse_codecs(GSList
*attrs
, SipeMediaType type
)
287 GSList
*codecs
= NULL
;
289 while ((attr
= sipe_utils_nameval_find_instance(attrs
, "rtpmap", i
++))) {
290 struct sdpcodec
*codec
= g_new0(struct sdpcodec
, 1);
291 gchar
**tokens
= g_strsplit_set(attr
, " /", 3);
296 codec
->id
= atoi(tokens
[0]);
297 codec
->name
= g_strdup(tokens
[1]);
298 codec
->clock_rate
= atoi(tokens
[2]);
301 // TODO: more secure and effective implementation
302 while((params
= sipe_utils_nameval_find_instance(attrs
, "fmtp", j
++))) {
303 gchar
**tokens
= g_strsplit_set(params
, " ", 0);
304 gchar
**next
= tokens
+ 1;
306 if (atoi(tokens
[0]) == codec
->id
) {
311 if (sscanf(*next
, "%[a-zA-Z0-9]=%s", name
, value
) == 2)
312 codec
->parameters
= sipe_utils_nameval_add(codec
->parameters
, name
, value
);
321 codecs
= g_slist_append(codecs
, codec
);
329 parse_encryption_key(GSList
*attrs
, guchar
**key
, int *key_id
)
334 while ((attr
= sipe_utils_nameval_find_instance(attrs
, "crypto", i
++))) {
335 gchar
**tokens
= g_strsplit_set(attr
, " :|", 6);
337 if (tokens
[0] && tokens
[1] && tokens
[2] && tokens
[3] && tokens
[4] &&
338 sipe_strcase_equal(tokens
[1], "AES_CM_128_HMAC_SHA1_80") &&
339 sipe_strequal(tokens
[2], "inline") &&
342 *key
= g_base64_decode(tokens
[3], &key_len
);
343 if (key_len
!= SIPE_SRTP_KEY_LEN
) {
347 *key_id
= atoi(tokens
[0]);
359 sdpmsg_parse_msg(gchar
*msg
)
361 struct sdpmsg
*smsg
= g_new0(struct sdpmsg
, 1);
364 if (!parse_attributes(smsg
, msg
)) {
369 for (i
= smsg
->media
; i
; i
= i
->next
) {
370 struct sdpmedia
*media
= i
->data
;
373 media
->candidates
= parse_candidates(media
->attributes
,
376 if (!media
->candidates
&& media
->port
!= 0) {
377 // No a=candidate in SDP message, this seems to be MSOC 2005
378 media
->candidates
= create_legacy_candidates(smsg
->ip
, media
->port
);
381 if (sipe_strequal(media
->name
, "audio"))
382 type
= SIPE_MEDIA_AUDIO
;
383 else if (sipe_strequal(media
->name
, "video"))
384 type
= SIPE_MEDIA_VIDEO
;
385 else if (sipe_strequal(media
->name
, "data"))
386 type
= SIPE_MEDIA_APPLICATION
;
388 // Unknown media type
393 media
->codecs
= parse_codecs(media
->attributes
, type
);
394 parse_encryption_key(media
->attributes
, &media
->encryption_key
,
395 &media
->encryption_key_id
);
402 codecs_to_string(GSList
*codecs
)
404 GString
*result
= g_string_new(NULL
);
406 for (; codecs
; codecs
= codecs
->next
) {
407 struct sdpcodec
*c
= codecs
->data
;
408 GSList
*params
= c
->parameters
;
410 g_string_append_printf(result
,
411 "a=rtpmap:%d %s/%d\r\n",
417 GString
*param_str
= g_string_new(NULL
);
418 int written_params
= 0;
420 g_string_append_printf(param_str
, "a=fmtp:%d", c
->id
);
422 for (; params
; params
= params
->next
) {
423 struct sipnameval
* par
= params
->data
;
424 if (sipe_strequal(par
->name
, "farsight-send-profile")) {
425 // Lync AVMCU doesn't like this property.
429 g_string_append_printf(param_str
, " %s=%s",
430 par
->name
, par
->value
);
434 g_string_append(param_str
, "\r\n");
436 if (written_params
> 0) {
437 g_string_append(result
, param_str
->str
);
440 g_string_free(param_str
, TRUE
);
444 return g_string_free(result
, FALSE
);
448 codec_ids_to_string(GSList
*codecs
)
450 GString
*result
= g_string_new(NULL
);
452 for (; codecs
; codecs
= codecs
->next
) {
453 struct sdpcodec
*c
= codecs
->data
;
454 g_string_append_printf(result
, " %d", c
->id
);
457 return g_string_free(result
, FALSE
);
461 base64_unpad(const gchar
*str
)
463 gchar
*result
= g_strdup(str
);
466 for (ptr
= result
+ strlen(result
); ptr
!= result
; --ptr
) {
467 if (*(ptr
- 1) != '=') {
477 candidates_to_string(GSList
*candidates
, SipeIceVersion ice_version
)
479 GString
*result
= g_string_new("");
481 GSList
*processed_tcp_candidates
= NULL
;
483 for (i
= candidates
; i
; i
= i
->next
) {
484 struct sdpcandidate
*c
= i
->data
;
485 const gchar
*protocol
;
487 gchar
*related
= NULL
;
489 if (ice_version
== SIPE_ICE_RFC_5245
) {
491 switch (c
->protocol
) {
492 case SIPE_NETWORK_PROTOCOL_TCP_ACTIVE
:
493 protocol
= "TCP-ACT";
495 case SIPE_NETWORK_PROTOCOL_TCP_PASSIVE
:
496 protocol
= "TCP-PASS";
498 case SIPE_NETWORK_PROTOCOL_UDP
:
502 /* error unknown/unsupported type */
503 protocol
= "UNKNOWN";
508 case SIPE_CANDIDATE_TYPE_HOST
:
511 case SIPE_CANDIDATE_TYPE_RELAY
:
514 case SIPE_CANDIDATE_TYPE_SRFLX
:
517 case SIPE_CANDIDATE_TYPE_PRFLX
:
521 /* error unknown/unsupported type */
527 case SIPE_CANDIDATE_TYPE_RELAY
:
528 case SIPE_CANDIDATE_TYPE_SRFLX
:
529 case SIPE_CANDIDATE_TYPE_PRFLX
:
530 related
= g_strdup_printf("raddr %s rport %d",
538 g_string_append_printf(result
,
539 "a=candidate:%s %u %s %u %s %d typ %s %s\r\n",
547 related
? related
: "");
550 } else if (ice_version
== SIPE_ICE_DRAFT_6
) {
554 switch (c
->protocol
) {
555 case SIPE_NETWORK_PROTOCOL_TCP_ACTIVE
:
556 case SIPE_NETWORK_PROTOCOL_TCP_PASSIVE
: {
557 GSList
*prev_cand
= processed_tcp_candidates
;
558 for (; prev_cand
; prev_cand
= prev_cand
->next
) {
559 struct sdpcandidate
*c2
= (struct sdpcandidate
*)prev_cand
->data
;
561 if (sipe_strequal(c
->ip
, c2
->ip
) &&
562 c
->component
== c2
->component
) {
571 processed_tcp_candidates
=
572 g_slist_append(processed_tcp_candidates
, c
);
576 case SIPE_NETWORK_PROTOCOL_UDP
:
580 /* unknown/unsupported type, ignore */
589 username
= base64_unpad(c
->username
);
590 password
= base64_unpad(c
->password
);
592 g_string_append_printf(result
,
593 "a=candidate:%s %u %s %s 0.%u %s %d\r\n",
607 g_slist_free(processed_tcp_candidates
);
609 return g_string_free(result
, FALSE
);
613 remote_candidates_to_string(GSList
*candidates
, SipeIceVersion ice_version
)
615 GString
*result
= g_string_new("");
618 if (ice_version
== SIPE_ICE_RFC_5245
) {
620 g_string_append(result
, "a=remote-candidates:");
622 for (i
= candidates
; i
; i
= i
->next
) {
623 struct sdpcandidate
*c
= i
->data
;
624 g_string_append_printf(result
, "%u %s %u ",
625 c
->component
, c
->ip
, c
->port
);
628 g_string_append(result
, "\r\n");
629 } else if (ice_version
== SIPE_ICE_DRAFT_6
) {
630 struct sdpcandidate
*c
= candidates
->data
;
631 g_string_append_printf(result
, "a=remote-candidate:%s\r\n",
636 return g_string_free(result
, FALSE
);
640 attributes_to_string(GSList
*attributes
)
642 GString
*result
= g_string_new("");
644 for (; attributes
; attributes
= attributes
->next
) {
645 struct sipnameval
*a
= attributes
->data
;
646 g_string_append_printf(result
, "a=%s", a
->name
);
647 if (!sipe_strequal(a
->value
, ""))
648 g_string_append_printf(result
, ":%s", a
->value
);
649 g_string_append(result
, "\r\n");
652 return g_string_free(result
, FALSE
);
656 media_to_string(const struct sdpmsg
*msg
, const struct sdpmedia
*media
)
660 gchar
*transport_profile
= NULL
;
662 gchar
*media_conninfo
= NULL
;
664 gchar
*codecs_str
= NULL
;
665 gchar
*codec_ids_str
= codec_ids_to_string(media
->codecs
);
667 gchar
*candidates_str
= NULL
;
668 gchar
*remote_candidates_str
= NULL
;
670 gchar
*attributes_str
= NULL
;
671 gchar
*credentials
= NULL
;
673 gchar
*crypto
= NULL
;
675 gboolean uses_tcp_transport
= TRUE
;
677 if (media
->port
!= 0) {
678 if (!sipe_strequal(msg
->ip
, media
->ip
)) {
679 media_conninfo
= g_strdup_printf("c=IN IP4 %s\r\n", media
->ip
);
682 codecs_str
= codecs_to_string(media
->codecs
);
683 candidates_str
= candidates_to_string(media
->candidates
, msg
->ice_version
);
684 remote_candidates_str
= remote_candidates_to_string(media
->remote_candidates
,
687 if (media
->remote_candidates
) {
688 struct sdpcandidate
*c
= media
->remote_candidates
->data
;
690 c
->protocol
== SIPE_NETWORK_PROTOCOL_TCP_ACTIVE
||
691 c
->protocol
== SIPE_NETWORK_PROTOCOL_TCP_PASSIVE
||
692 c
->protocol
== SIPE_NETWORK_PROTOCOL_TCP_SO
;
694 GSList
*candidates
= media
->candidates
;
695 for (; candidates
; candidates
= candidates
->next
) {
696 struct sdpcandidate
*c
= candidates
->data
;
697 if (c
->protocol
== SIPE_NETWORK_PROTOCOL_UDP
) {
698 uses_tcp_transport
= FALSE
;
704 attributes_str
= attributes_to_string(media
->attributes
);
706 if (msg
->ice_version
== SIPE_ICE_RFC_5245
&& media
->candidates
) {
707 struct sdpcandidate
*c
= media
->candidates
->data
;
709 credentials
= g_strdup_printf("a=ice-ufrag:%s\r\n"
715 if (media
->encryption_key
) {
716 gchar
*key_encoded
= g_base64_encode(media
->encryption_key
, SIPE_SRTP_KEY_LEN
);
717 crypto
= g_strdup_printf("a=crypto:%d AES_CM_128_HMAC_SHA1_80 inline:%s|2^31\r\n",
718 media
->encryption_key_id
, key_encoded
);
723 transport_profile
= g_strdup_printf("%sRTP/%sAVP",
724 uses_tcp_transport
? "TCP/" : "",
725 media
->encryption_active
? "S" : "");
727 media_str
= g_strdup_printf("m=%s %d %s%s\r\n"
735 media
->name
, media
->port
, transport_profile
, codec_ids_str
,
736 media_conninfo
? media_conninfo
: "",
737 candidates_str
? candidates_str
: "",
738 crypto
? crypto
: "",
739 remote_candidates_str
? remote_candidates_str
: "",
740 codecs_str
? codecs_str
: "",
741 attributes_str
? attributes_str
: "",
742 credentials
? credentials
: "");
744 g_free(transport_profile
);
745 g_free(media_conninfo
);
747 g_free(codec_ids_str
);
748 g_free(candidates_str
);
749 g_free(remote_candidates_str
);
750 g_free(attributes_str
);
758 sdpmsg_to_string(const struct sdpmsg
*msg
)
760 GString
*body
= g_string_new(NULL
);
763 g_string_append_printf(
766 "o=- 0 0 IN IP4 %s\r\n"
774 for (i
= msg
->media
; i
; i
= i
->next
) {
775 gchar
*media_str
= media_to_string(msg
, i
->data
);
776 g_string_append(body
, media_str
);
780 return g_string_free(body
, FALSE
);
783 static struct sdpcandidate
*
784 sdpcandidate_copy(struct sdpcandidate
*candidate
)
787 struct sdpcandidate
*copy
= g_new0(struct sdpcandidate
, 1);
789 copy
->foundation
= g_strdup(candidate
->foundation
);
790 copy
->component
= candidate
->component
;
791 copy
->type
= candidate
->type
;
792 copy
->protocol
= candidate
->protocol
;
793 copy
->priority
= candidate
->priority
;
794 copy
->ip
= g_strdup(candidate
->ip
);
795 copy
->port
= candidate
->port
;
796 copy
->base_ip
= g_strdup(candidate
->base_ip
);
797 copy
->base_port
= candidate
->base_port
;
798 copy
->username
= g_strdup(candidate
->username
);
799 copy
->password
= g_strdup(candidate
->password
);
807 sdpcandidate_free(struct sdpcandidate
*candidate
)
810 g_free(candidate
->foundation
);
811 g_free(candidate
->ip
);
812 g_free(candidate
->base_ip
);
813 g_free(candidate
->username
);
814 g_free(candidate
->password
);
820 sdpcodec_free(struct sdpcodec
*codec
)
824 sipe_utils_nameval_free(codec
->parameters
);
830 sdpmedia_free(struct sdpmedia
*media
)
836 sipe_utils_nameval_free(media
->attributes
);
838 sipe_utils_slist_free_full(media
->candidates
,
839 (GDestroyNotify
) sdpcandidate_free
);
840 sipe_utils_slist_free_full(media
->codecs
,
841 (GDestroyNotify
) sdpcodec_free
);
842 sipe_utils_slist_free_full(media
->remote_candidates
,
843 (GDestroyNotify
) sdpcandidate_free
);
845 g_free(media
->encryption_key
);
852 sdpmsg_free(struct sdpmsg
*msg
)
856 sipe_utils_slist_free_full(msg
->media
,
857 (GDestroyNotify
) sdpmedia_free
);