1 /*****************************************************************************
2 * sap.c : SAP interface module
3 *****************************************************************************
4 * Copyright (C) 2004-2005 the VideoLAN team
5 * Copyright © 2007 Rémi Denis-Courmont
8 * Authors: Clément Stenac <zorglub@videolan.org>
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
24 *****************************************************************************/
26 /*****************************************************************************
28 *****************************************************************************/
33 #include <vlc_common.h>
34 #include <vlc_plugin.h>
37 #include <vlc_demux.h>
38 #include <vlc_services_discovery.h>
40 #include <vlc_network.h>
41 #include <vlc_charset.h>
49 #ifdef HAVE_SYS_TIME_H
50 # include <sys/time.h>
64 /************************************************************************
65 * Macros and definitions
66 ************************************************************************/
68 #define MAX_LINE_LENGTH 256
70 /* SAP is always on that port */
72 /* Global-scope SAP address */
73 #define SAP_V4_GLOBAL_ADDRESS "224.2.127.254"
74 /* Organization-local SAP address */
75 #define SAP_V4_ORG_ADDRESS "239.195.255.255"
76 /* Local (smallest non-link-local scope) SAP address */
77 #define SAP_V4_LOCAL_ADDRESS "239.255.255.255"
78 /* Link-local SAP address */
79 #define SAP_V4_LINK_ADDRESS "224.0.0.255"
82 /*****************************************************************************
84 *****************************************************************************/
85 #define SAP_ADDR_TEXT N_( "SAP multicast address" )
86 #define SAP_ADDR_LONGTEXT N_( "The SAP module normally chooses itself the " \
87 "right addresses to listen to. However, you " \
88 "can specify a specific address." )
89 #define SAP_IPV4_TEXT N_( "IPv4 SAP" )
90 #define SAP_IPV4_LONGTEXT N_( \
91 "Listen to IPv4 announcements on the standard addresses." )
92 #define SAP_IPV6_TEXT N_( "IPv6 SAP" )
93 #define SAP_IPV6_LONGTEXT N_( \
94 "Listen to IPv6 announcements on the standard addresses." )
95 #define SAP_SCOPE_TEXT N_( "IPv6 SAP scope" )
96 #define SAP_SCOPE_LONGTEXT N_( \
97 "Scope for IPv6 announcements (default is 8)." )
98 #define SAP_TIMEOUT_TEXT N_( "SAP timeout (seconds)" )
99 #define SAP_TIMEOUT_LONGTEXT N_( \
100 "Delay after which SAP items get deleted if no new announcement " \
102 #define SAP_PARSE_TEXT N_( "Try to parse the announce" )
103 #define SAP_PARSE_LONGTEXT N_( \
104 "This enables actual parsing of the announces by the SAP module. " \
105 "Otherwise, all announcements are parsed by the \"live555\" " \
106 "(RTP/RTSP) module." )
107 #define SAP_STRICT_TEXT N_( "SAP Strict mode" )
108 #define SAP_STRICT_LONGTEXT N_( \
109 "When this is set, the SAP parser will discard some non-compliant " \
111 #define SAP_CACHE_TEXT N_("Use SAP cache")
112 #define SAP_CACHE_LONGTEXT N_( \
113 "This enables a SAP caching mechanism. " \
114 "This will result in lower SAP startup time, but you could end up " \
115 "with items corresponding to legacy streams." )
118 static int Open ( vlc_object_t * );
119 static void Close( vlc_object_t * );
120 static int OpenDemux ( vlc_object_t * );
121 static void CloseDemux ( vlc_object_t * );
124 set_shortname( N_("SAP"))
125 set_description( N_("SAP Announcements") )
126 set_category( CAT_PLAYLIST )
127 set_subcategory( SUBCAT_PLAYLIST_SD )
129 add_string( "sap-addr", NULL, NULL,
130 SAP_ADDR_TEXT, SAP_ADDR_LONGTEXT, true )
131 add_bool( "sap-ipv4", true, NULL,
132 SAP_IPV4_TEXT,SAP_IPV4_LONGTEXT, true )
133 add_bool( "sap-ipv6", true, NULL,
134 SAP_IPV6_TEXT, SAP_IPV6_LONGTEXT, true )
135 add_integer( "sap-timeout", 1800, NULL,
136 SAP_TIMEOUT_TEXT, SAP_TIMEOUT_LONGTEXT, true )
137 add_bool( "sap-parse", true, NULL,
138 SAP_PARSE_TEXT,SAP_PARSE_LONGTEXT, true )
139 add_bool( "sap-strict", false, NULL,
140 SAP_STRICT_TEXT,SAP_STRICT_LONGTEXT, true )
142 add_bool( "sap-cache", false, NULL,
143 SAP_CACHE_TEXT,SAP_CACHE_LONGTEXT, true )
145 add_obsolete_bool( "sap-timeshift" ) /* Redumdant since 1.0.0 */
147 set_capability( "services_discovery", 0 )
148 set_callbacks( Open, Close )
151 set_description( N_("SDP Descriptions parser") )
152 add_shortcut( "sdp" )
153 set_capability( "demux", 51 )
154 set_callbacks( OpenDemux, CloseDemux )
158 /*****************************************************************************
160 *****************************************************************************/
162 typedef struct sdp_t sdp_t;
163 typedef struct attribute_t attribute_t;
164 typedef struct sap_announce_t sap_announce_t;
169 struct sdp_t *parent;
171 struct sockaddr_storage addr;
175 attribute_t **pp_attributes;
179 /* The structure that contains sdp information */
187 uint64_t session_version;
188 unsigned orig_ip_version;
189 char orig_host[1024];
192 char *psz_sessionname;
200 /* a= global attributes */
202 attribute_t **pp_attributes;
204 /* medias (well, we only support one atm) */
206 struct sdp_media_t *mediav;
215 struct sap_announce_t
219 uint8_t i_period_trust;
222 uint32_t i_source[4];
224 /* SAP annnounces must only contain one SDP */
227 input_item_t * p_item;
230 struct services_discovery_sys_t
234 /* Socket descriptors */
238 /* Table of announces */
240 struct sap_announce_t **pp_announces;
254 /*****************************************************************************
256 *****************************************************************************/
260 static int Demux( demux_t *p_demux );
261 static int Control( demux_t *, int, va_list );
262 static void *Run ( void *p_sd );
264 /* Main parsing functions */
265 static int ParseConnection( vlc_object_t *p_obj, sdp_t *p_sdp );
266 static int ParseSAP( services_discovery_t *p_sd, const uint8_t *p_buffer, size_t i_read );
267 static sdp_t *ParseSDP (vlc_object_t *p_sd, const char *psz_sdp);
268 static sap_announce_t *CreateAnnounce( services_discovery_t *, uint16_t, sdp_t * );
269 static int RemoveAnnounce( services_discovery_t *p_sd, sap_announce_t *p_announce );
271 /* Helper functions */
272 static inline attribute_t *MakeAttribute (const char *str);
273 static const char *GetAttribute (attribute_t **tab, unsigned n, const char *name);
274 static inline void FreeAttribute (attribute_t *a);
275 static const char *FindAttribute (const sdp_t *sdp, unsigned media,
278 static bool IsSameSession( sdp_t *p_sdp1, sdp_t *p_sdp2 );
279 static int InitSocket( services_discovery_t *p_sd, const char *psz_address, int i_port );
280 static int Decompress( const unsigned char *psz_src, unsigned char **_dst, int i_len );
281 static void FreeSDP( sdp_t *p_sdp );
283 static inline int min_int( int a, int b )
285 return a > b ? b : a;
288 static bool IsWellKnownPayload (int type)
291 { /* Should be in sync with modules/demux/rtp.c */
292 case 0: /* PCMU/8000 */
294 case 8: /* PCMA/8000 */
295 case 10: /* L16/44100/2 */
296 case 11: /* L16/44100 */
298 case 14: /* MPA/90000 */
299 case 32: /* MPV/90000 */
300 case 33: /* MP2/90000 */
306 /*****************************************************************************
307 * Open: initialize and create stuff
308 *****************************************************************************/
309 static int Open( vlc_object_t *p_this )
311 services_discovery_t *p_sd = ( services_discovery_t* )p_this;
312 services_discovery_sys_t *p_sys = (services_discovery_sys_t *)
313 malloc( sizeof( services_discovery_sys_t ) );
317 p_sys->i_timeout = var_CreateGetInteger( p_sd, "sap-timeout" );
324 p_sys->b_strict = var_CreateGetInteger( p_sd, "sap-strict");
325 p_sys->b_parse = var_CreateGetInteger( p_sd, "sap-parse" );
328 if( var_CreateGetInteger( p_sd, "sap-cache" ) )
334 p_sys->i_announces = 0;
335 p_sys->pp_announces = NULL;
336 /* TODO: create sockets here, and fix racy sockets table */
337 if (vlc_clone (&p_sys->thread, Run, p_sd, VLC_THREAD_PRIORITY_LOW))
346 /*****************************************************************************
347 * OpenDemux: initialize and create stuff
348 *****************************************************************************/
349 static int OpenDemux( vlc_object_t *p_this )
351 demux_t *p_demux = (demux_t *)p_this;
352 const uint8_t *p_peek;
353 char *psz_sdp = NULL;
355 int errval = VLC_EGENERIC;
358 if( !var_CreateGetInteger( p_demux, "sap-parse" ) )
360 /* We want livedotcom module to parse this SDP file */
364 assert( p_demux->s ); /* this is NOT an access_demux */
367 if( stream_Peek( p_demux->s, &p_peek, 7 ) < 7 )
370 if( memcmp( p_peek, "v=0\r\no=", 7 ) && memcmp( p_peek, "v=0\no=", 6 ) )
373 /* Gather the complete sdp file */
374 for( i_len = 0, psz_sdp = NULL; i_len < 65536; )
376 const int i_read_max = 1024;
377 char *psz_sdp_new = realloc( psz_sdp, i_len + i_read_max );
379 if( psz_sdp_new == NULL )
384 psz_sdp = psz_sdp_new;
386 i_read = stream_Read( p_demux->s, &psz_sdp[i_len], i_read_max );
387 if( (int)i_read < 0 )
389 msg_Err( p_demux, "cannot read SDP" );
394 psz_sdp[i_len] = '\0';
396 if( (int)i_read < i_read_max )
400 p_sdp = ParseSDP( VLC_OBJECT(p_demux), psz_sdp );
404 msg_Warn( p_demux, "invalid SDP");
408 if( ParseConnection( VLC_OBJECT( p_demux ), p_sdp ) )
410 p_sdp->psz_uri = NULL;
412 if (!IsWellKnownPayload (p_sdp->i_media_type))
414 if( p_sdp->psz_uri == NULL ) goto error;
416 p_demux->p_sys = (demux_sys_t *)malloc( sizeof(demux_sys_t) );
417 assert( p_demux->p_sys );
418 p_demux->p_sys->p_sdp = p_sdp;
419 p_demux->pf_control = Control;
420 p_demux->pf_demux = Demux;
427 if( p_sdp ) FreeSDP( p_sdp ); p_sdp = NULL;
428 stream_Seek( p_demux->s, 0 );
432 /*****************************************************************************
434 *****************************************************************************/
435 static void Close( vlc_object_t *p_this )
437 services_discovery_t *p_sd = ( services_discovery_t* )p_this;
438 services_discovery_sys_t *p_sys = p_sd->p_sys;
441 vlc_cancel (p_sys->thread);
442 vlc_join (p_sys->thread, NULL);
444 for( i = p_sys->i_fd-1 ; i >= 0 ; i-- )
446 net_Close( p_sys->pi_fd[i] );
448 FREENULL( p_sys->pi_fd );
451 if( config_GetInt( p_sd, "sap-cache" ) )
457 for( i = p_sys->i_announces - 1; i>= 0; i-- )
459 RemoveAnnounce( p_sd, p_sys->pp_announces[i] );
461 FREENULL( p_sys->pp_announces );
466 /*****************************************************************************
467 * CloseDemux: Close the demuxer
468 *****************************************************************************/
469 static void CloseDemux( vlc_object_t *p_this )
471 demux_t *p_demux = (demux_t *)p_this;
473 if( p_demux->p_sys->p_sdp )
474 FreeSDP( p_demux->p_sys->p_sdp );
475 free( p_demux->p_sys );
478 /*****************************************************************************
479 * Run: main SAP thread
480 *****************************************************************************
481 * Listens to SAP packets, and sends them to packet_handle
482 *****************************************************************************/
483 #define MAX_SAP_BUFFER 5000
485 static void *Run( void *data )
487 services_discovery_t *p_sd = data;
491 int canc = vlc_savecancel ();
493 /* Braindead Winsock DNS resolver will get stuck over 2 seconds per failed
494 * DNS queries, even if the DNS server returns an error with milliseconds.
495 * You don't want to know why the bug (as of XP SP2) wasn't fixed since
496 * Winsock 1.1 from Windows 95, if not Windows 3.1.
497 * Anyway, to avoid a 30 seconds delay for failed IPv6 socket creation,
498 * we have to open sockets in Run() rather than Open(). */
499 if( var_CreateGetInteger( p_sd, "sap-ipv4" ) )
501 InitSocket( p_sd, SAP_V4_GLOBAL_ADDRESS, SAP_PORT );
502 InitSocket( p_sd, SAP_V4_ORG_ADDRESS, SAP_PORT );
503 InitSocket( p_sd, SAP_V4_LOCAL_ADDRESS, SAP_PORT );
504 InitSocket( p_sd, SAP_V4_LINK_ADDRESS, SAP_PORT );
506 if( var_CreateGetInteger( p_sd, "sap-ipv6" ) )
508 char psz_address[NI_MAXNUMERICHOST] = "ff02::2:7ffe%";
511 struct if_nameindex *l = if_nameindex ();
514 char *ptr = strchr (psz_address, '%') + 1;
515 for (unsigned i = 0; l[i].if_index; i++)
517 strcpy (ptr, l[i].if_name);
518 InitSocket (p_sd, psz_address, SAP_PORT);
520 if_freenameindex (l);
523 /* this is the Winsock2 equivalant of SIOCGIFCONF on BSD stacks,
524 which if_nameindex uses internally anyway */
526 // first create a dummy socket to pin down the protocol family
527 SOCKET s = socket(PF_INET6, SOCK_DGRAM, IPPROTO_UDP);
528 if( s != INVALID_SOCKET )
530 INTERFACE_INFO ifaces[10]; // Assume there will be no more than 10 IP interfaces
531 size_t len = sizeof(ifaces);
533 if( SOCKET_ERROR != WSAIoctl(s, SIO_GET_INTERFACE_LIST, NULL, 0, &ifaces, len, &len, NULL, NULL) )
535 unsigned ifcount = len/sizeof(INTERFACE_INFO);
536 char *ptr = strchr (psz_address, '%') + 1;
537 for(unsigned i = 1; i<=ifcount; ++i )
539 // append link-local zone identifier
540 sprintf(ptr, "%d", i);
546 *strchr (psz_address, '%') = '\0';
548 static const char ipv6_scopes[] = "1456789ABCDE";
549 for (const char *c_scope = ipv6_scopes; *c_scope; c_scope++)
551 psz_address[3] = *c_scope;
552 InitSocket( p_sd, psz_address, SAP_PORT );
556 psz_addr = var_CreateGetString( p_sd, "sap-addr" );
557 if( psz_addr && *psz_addr )
558 InitSocket( p_sd, psz_addr, SAP_PORT );
561 if( p_sd->p_sys->i_fd == 0 )
563 msg_Err( p_sd, "unable to listen on any address" );
567 /* read SAP packets */
570 vlc_restorecancel (canc);
571 unsigned n = p_sd->p_sys->i_fd;
572 struct pollfd ufd[n];
574 for (unsigned i = 0; i < n; i++)
576 ufd[i].fd = p_sd->p_sys->pi_fd[i];
577 ufd[i].events = POLLIN;
581 int val = poll (ufd, n, timeout);
582 canc = vlc_savecancel ();
585 for (unsigned i = 0; i < n; i++)
589 uint8_t p_buffer[MAX_SAP_BUFFER+1];
592 i_read = net_Read (p_sd, ufd[i].fd, NULL, p_buffer,
593 MAX_SAP_BUFFER, false);
595 msg_Warn (p_sd, "receive error: %m");
598 /* Parse the packet */
599 p_buffer[i_read] = '\0';
600 ParseSAP (p_sd, p_buffer, i_read);
606 mtime_t now = mdate();
608 /* A 1 hour timeout correspong to the RFC Implicit timeout.
609 * This timeout is tuned in the following loop. */
610 timeout = 1000 * 60 * 60;
612 /* Check for items that need deletion */
613 for( i = 0; i < p_sd->p_sys->i_announces; i++ )
615 mtime_t i_timeout = ( mtime_t ) 1000000 * p_sd->p_sys->i_timeout;
616 sap_announce_t * p_announce = p_sd->p_sys->pp_announces[i];
617 mtime_t i_last_period = now - p_announce->i_last;
619 /* Remove the annoucement, if the last announcement was 1 hour ago
620 * or if the last packet emitted was 3 times the average time
621 * between two packets */
622 if( ( p_announce->i_period_trust > 5 && i_last_period > 3 * p_announce->i_period ) ||
623 i_last_period > i_timeout )
625 RemoveAnnounce( p_sd, p_announce );
629 /* Compute next timeout */
630 if( p_announce->i_period_trust > 5 )
631 timeout = min_int((3 * p_announce->i_period - i_last_period) / 1000, timeout);
632 timeout = min_int((i_timeout - i_last_period)/1000, timeout);
636 if( !p_sd->p_sys->i_announces )
637 timeout = -1; /* We can safely poll indefinitly. */
638 else if( timeout < 200 )
639 timeout = 200; /* Don't wakeup too fast. */
644 /**********************************************************************
645 * Demux: reads and demuxes data packets
646 * Return -1 if error, 0 if EOF, 1 else
647 **********************************************************************/
648 static int Demux( demux_t *p_demux )
650 sdp_t *p_sdp = p_demux->p_sys->p_sdp;
651 input_thread_t *p_input;
652 input_item_t *p_parent_input;
654 p_input = demux_GetParentInput( p_demux );
658 msg_Err( p_demux, "parent input could not be found" );
662 /* This item hasn't been held by input_GetItem
663 * don't release it */
664 p_parent_input = input_GetItem( p_input );
666 input_item_SetURI( p_parent_input, p_sdp->psz_uri );
667 input_item_SetName( p_parent_input, p_sdp->psz_sessionname );
668 if( p_sdp->rtcp_port )
671 if( asprintf( &rtcp, ":rtcp-port=%u", p_sdp->rtcp_port ) != -1 )
673 input_item_AddOption( p_parent_input, rtcp, VLC_INPUT_OPTION_TRUSTED );
678 vlc_mutex_lock( &p_parent_input->lock );
680 p_parent_input->i_type = ITEM_TYPE_NET;
682 vlc_mutex_unlock( &p_parent_input->lock );
683 vlc_object_release( p_input );
687 static int Control( demux_t *p_demux, int i_query, va_list args )
689 VLC_UNUSED(p_demux); VLC_UNUSED(i_query); VLC_UNUSED(args);
693 /**************************************************************
695 **************************************************************/
697 /* i_read is at least > 6 */
698 static int ParseSAP( services_discovery_t *p_sd, const uint8_t *buf,
703 const uint8_t *end = buf + len;
706 assert (buf[len] == '\0');
711 uint8_t flags = buf[0];
713 /* First, check the sap announce is correct */
714 if ((flags >> 5) != 1)
717 bool b_ipv6 = (flags & 0x10) != 0;
718 bool b_need_delete = (flags & 0x04) != 0;
722 msg_Dbg( p_sd, "encrypted packet, unsupported" );
726 bool b_compressed = (flags & 0x01) != 0;
728 uint16_t i_hash = U16_AT (buf + 2);
730 if( p_sd->p_sys->b_strict && i_hash == 0 )
732 msg_Dbg( p_sd, "strict mode, discarding announce with null id hash");
736 // Skips source address and auth data
737 buf += 4 + (b_ipv6 ? 16 : 4) + buf[1];
741 uint8_t *decomp = NULL;
744 int newsize = Decompress (buf, &decomp, end - buf);
747 msg_Dbg( p_sd, "decompression of SAP packet failed" );
751 decomp = realloc (decomp, newsize + 1);
752 decomp[newsize] = '\0';
753 psz_sdp = (const char *)decomp;
758 psz_sdp = (const char *)buf;
762 /* len is a strlen here here. both buf and decomp are len+1 where the 1 should be a \0 */
763 assert( psz_sdp[len] == '\0');
765 /* Skip payload type */
766 /* SAPv1 has implicit "application/sdp" payload type: first line is v=0 */
767 if (strncmp (psz_sdp, "v=0", 3))
769 size_t clen = strlen (psz_sdp) + 1;
771 if (strcmp (psz_sdp, "application/sdp"))
773 msg_Dbg (p_sd, "unsupported content type: %s", psz_sdp);
777 // skips content type
786 p_sdp = ParseSDP( VLC_OBJECT(p_sd), psz_sdp );
791 p_sdp->psz_sdp = psz_sdp;
793 /* Decide whether we should add a playlist item for this SDP */
794 /* Parse connection information (c= & m= ) */
795 if( ParseConnection( VLC_OBJECT(p_sd), p_sdp ) )
796 p_sdp->psz_uri = NULL;
798 /* Multi-media or no-parse -> pass to LIVE.COM */
799 if( !IsWellKnownPayload( p_sdp->i_media_type ) || !p_sd->p_sys->b_parse )
801 free( p_sdp->psz_uri );
802 if (asprintf( &p_sdp->psz_uri, "sdp://%s", p_sdp->psz_sdp ) == -1)
803 p_sdp->psz_uri = NULL;
806 if( p_sdp->psz_uri == NULL )
812 for( i = 0 ; i< p_sd->p_sys->i_announces ; i++ )
814 sap_announce_t * p_announce = p_sd->p_sys->pp_announces[i];
816 /* FIXME: we create a new announce each time the sdp changes */
817 if( IsSameSession( p_announce->p_sdp, p_sdp ) )
819 /* We don't support delete announcement as they can easily
820 * Be used to highjack an announcement by a third party.
821 * Intead we cleverly implement Implicit Announcement removal.
823 * if( b_need_delete )
824 * RemoveAnnounce( p_sd, p_sd->p_sys->pp_announces[i]);
830 /* No need to go after six, as we start to trust the
831 * average period at six */
832 if( p_announce->i_period_trust <= 5 )
833 p_announce->i_period_trust++;
835 /* Compute the average period */
836 mtime_t now = mdate();
837 p_announce->i_period = (p_announce->i_period + (now - p_announce->i_last)) / 2;
838 p_announce->i_last = now;
840 FreeSDP( p_sdp ); p_sdp = NULL;
845 CreateAnnounce( p_sd, i_hash, p_sdp );
851 sap_announce_t *CreateAnnounce( services_discovery_t *p_sd, uint16_t i_hash,
854 input_item_t *p_input;
855 const char *psz_value;
856 sap_announce_t *p_sap = (sap_announce_t *)malloc(
857 sizeof(sap_announce_t ) );
858 services_discovery_sys_t *p_sys;
864 p_sap->i_last = mdate();
866 p_sap->i_period_trust = 0;
867 p_sap->i_hash = i_hash;
868 p_sap->p_sdp = p_sdp;
870 /* Released in RemoveAnnounce */
871 p_input = input_item_NewWithType( VLC_OBJECT(p_sd),
872 p_sap->p_sdp->psz_uri,
873 p_sdp->psz_sessionname,
874 0, NULL, 0, -1, ITEM_TYPE_NET );
875 p_sap->p_item = p_input;
882 if( p_sdp->rtcp_port )
885 if( asprintf( &rtcp, ":rtcp-port=%u", p_sdp->rtcp_port ) != -1 )
887 input_item_AddOption( p_input, rtcp, VLC_INPUT_OPTION_TRUSTED );
892 psz_value = GetAttribute( p_sap->p_sdp->pp_attributes, p_sap->p_sdp->i_attributes, "tool" );
893 if( psz_value != NULL )
895 input_item_AddInfo( p_input, _("Session"), _("Tool"), "%s", psz_value );
897 if( strcmp( p_sdp->username, "-" ) )
899 input_item_AddInfo( p_input, _("Session"), _("User"), "%s",
904 if (p_sap->p_sdp->mediac >= 1)
905 psz_value = FindAttribute (p_sap->p_sdp, 0, "x-plgroup");
907 psz_value = GetAttribute( p_sap->p_sdp->pp_attributes, p_sap->p_sdp->i_attributes, "x-plgroup" );
909 services_discovery_AddItem( p_sd, p_input, psz_value /* category name */ );
911 TAB_APPEND( p_sys->i_announces, p_sys->pp_announces, p_sap );
917 static const char *FindAttribute (const sdp_t *sdp, unsigned media,
920 /* Look for media attribute, and fallback to session */
921 const char *attr = GetAttribute (sdp->mediav[media].pp_attributes,
922 sdp->mediav[media].i_attributes, name);
924 attr = GetAttribute (sdp->pp_attributes, sdp->i_attributes, name);
929 /* Fill p_sdp->psz_uri */
930 static int ParseConnection( vlc_object_t *p_obj, sdp_t *p_sdp )
932 if (p_sdp->mediac == 0)
934 msg_Dbg (p_obj, "Ignoring SDP with no media");
938 for (unsigned i = 1; i < p_sdp->mediac; i++)
940 if ((p_sdp->mediav[i].n_addr != p_sdp->mediav->n_addr)
941 || (p_sdp->mediav[i].addrlen != p_sdp->mediav->addrlen)
942 || memcmp (&p_sdp->mediav[i].addr, &p_sdp->mediav->addr,
943 p_sdp->mediav->addrlen))
945 msg_Dbg (p_obj, "Multiple media ports not supported -> live555");
950 if (p_sdp->mediav->n_addr != 1)
952 msg_Dbg (p_obj, "Layered encoding not supported -> live555");
961 if (vlc_getnameinfo ((struct sockaddr *)&(p_sdp->mediav->addr),
962 p_sdp->mediav->addrlen, psz_uri + 1,
963 sizeof (psz_uri) - 2, &port, NI_NUMERICHOST))
966 if (strchr (psz_uri + 1, ':'))
969 strcat (psz_uri, "]");
975 char *sdp_proto = strdup (p_sdp->mediav[0].fmt);
976 if (sdp_proto == NULL)
979 char *subtype = strchr (sdp_proto, ' ');
982 msg_Dbg (p_obj, "missing SDP media subtype: %s", sdp_proto);
989 /* FIXME: check for multiple payload types in RTP/AVP case.
990 * FIXME: check for "mpeg" subtype in raw udp case. */
991 if (!strcasecmp (sdp_proto, "udp"))
992 p_sdp->i_media_type = 33;
994 p_sdp->i_media_type = atoi (subtype);
997 /* RTP protocol, nul, VLC shortcut, nul, flags byte as follow:
998 * 0x1: Connection-Oriented media. */
999 static const char proto_match[] =
1001 "RTP/AVP\0" "rtp\0\0"
1002 "UDPLite/RTP/AVP\0" "udplite\0\0"
1003 "DCCP/RTP/AVP\0" "dccp\0\1"
1004 "TCP/RTP/AVP\0" "rtptcp\0\1"
1007 const char *vlc_proto = NULL;
1009 for (const char *proto = proto_match; *proto;)
1011 if (strcasecmp (proto, sdp_proto) == 0)
1013 vlc_proto = proto + strlen (proto) + 1;
1014 flags = vlc_proto[strlen (vlc_proto) + 1];
1017 proto += strlen (proto) + 1;
1018 proto += strlen (proto) + 2;
1022 if (vlc_proto == NULL)
1024 msg_Dbg (p_obj, "unknown SDP media protocol: %s",
1025 p_sdp->mediav[0].fmt);
1026 return VLC_EGENERIC;
1029 if (!strcmp (vlc_proto, "udp") || FindAttribute (p_sdp, 0, "rtcp-mux"))
1030 p_sdp->rtcp_port = 0;
1033 const char *rtcp = FindAttribute (p_sdp, 0, "rtcp");
1035 p_sdp->rtcp_port = atoi (rtcp);
1037 if (port & 1) /* odd port -> RTCP; next even port -> RTP */
1038 p_sdp->rtcp_port = port++;
1039 else /* even port -> RTP; next odd port -> RTCP */
1040 p_sdp->rtcp_port = port + 1;
1045 /* Connection-oriented media */
1046 const char *setup = FindAttribute (p_sdp, 0, "setup");
1048 setup = "active"; /* default value */
1050 if (strcmp (setup, "actpass") && strcmp (setup, "passive"))
1052 msg_Dbg (p_obj, "unsupported COMEDIA mode: %s", setup);
1053 return VLC_EGENERIC;
1056 if (asprintf (&p_sdp->psz_uri, "%s://%s:%d", vlc_proto,
1062 /* Non-connected (normally multicast) media */
1063 char psz_source[258] = "";
1064 const char *sfilter = FindAttribute (p_sdp, 0, "source-filter");
1065 if (sfilter != NULL)
1067 char psz_source_ip[256];
1070 if (sscanf (sfilter, " incl IN IP%u %*s %255s ", &ipv,
1071 psz_source_ip) == 2)
1073 /* According to RFC4570, FQDNs can be used for source-filters,
1074 * but -seriously- this is impractical */
1080 struct in6_addr addr;
1081 if ((inet_pton (AF_INET6, psz_source_ip, &addr) > 0)
1082 && (inet_ntop (AF_INET6, &addr, psz_source + 1,
1083 sizeof (psz_source) - 2) != NULL))
1085 psz_source[0] = '[';
1086 psz_source[strlen (psz_source)] = ']';
1093 struct in_addr addr;
1094 if ((inet_pton (AF_INET, psz_source_ip, &addr) > 0)
1095 && (inet_ntop (AF_INET, &addr, psz_source,
1096 sizeof (psz_source)) == NULL))
1104 if (asprintf (&p_sdp->psz_uri, "%s://%s@%s:%i", vlc_proto, psz_source,
1113 static int ParseSDPConnection (const char *str, struct sockaddr_storage *addr,
1114 socklen_t *addrlen, unsigned *number)
1117 unsigned fam, n1, n2;
1119 int res = sscanf (str, "IN IP%u %59[^/]/%u/%u", &fam, host, &n1, &n2);
1127 addr->ss_family = AF_INET6;
1131 *addrlen = sizeof (struct sockaddr_in6);
1133 if (inet_pton (AF_INET6, host,
1134 &((struct sockaddr_in6 *)addr)->sin6_addr) <= 0)
1137 *number = (res >= 3) ? n1 : 1;
1142 addr->ss_family = AF_INET;
1146 *addrlen = sizeof (struct sockaddr_in);
1148 if (inet_pton (AF_INET, host,
1149 &((struct sockaddr_in *)addr)->sin_addr) <= 0)
1152 *number = (res >= 4) ? n2 : 1;
1162 /***********************************************************************
1163 * ParseSDP : SDP parsing
1164 * *********************************************************************
1165 * Validate SDP and parse all fields
1166 ***********************************************************************/
1167 static sdp_t *ParseSDP (vlc_object_t *p_obj, const char *psz_sdp)
1169 if( psz_sdp == NULL )
1172 sdp_t *p_sdp = calloc (1, sizeof (*p_sdp));
1177 struct sockaddr_storage glob_addr;
1178 memset (&glob_addr, 0, sizeof (glob_addr));
1179 socklen_t glob_len = 0;
1180 unsigned glob_count = 1;
1183 /* TODO: use iconv and charset attribute instead of EnsureUTF8 */
1186 /* Extract one line */
1187 char *eol = strchr (psz_sdp, '\n');
1188 size_t linelen = eol ? (size_t)(eol - psz_sdp) : strlen (psz_sdp);
1189 char line[linelen + 1];
1190 memcpy (line, psz_sdp, linelen);
1191 line[linelen] = '\0';
1193 psz_sdp += linelen + 1;
1195 /* Remove carriage return if present */
1196 eol = strchr (line, '\r');
1199 linelen = eol - line;
1200 line[linelen] = '\0';
1204 char cat = line[0], *data = line + 2;
1205 if (!cat || (strchr ("vosiuepcbtrzkam", cat) == NULL))
1207 /* MUST ignore SDP with unknown line type */
1208 msg_Dbg (p_obj, "unknown SDP line type: 0x%02x", (int)cat);
1213 msg_Dbg (p_obj, "invalid SDP line: %s", line);
1217 assert (linelen >= 2);
1219 /* SDP parsing state machine
1220 * We INTERNALLY use uppercase for session, lowercase for media
1224 /* Session description */
1229 msg_Dbg (p_obj, "missing SDP version");
1232 if (strcmp (data, "0"))
1234 msg_Dbg (p_obj, "unknown SDP version: %s", data);
1244 msg_Dbg (p_obj, "missing SDP originator");
1248 if ((sscanf (data, "%63s %"PRIu64" %"PRIu64" IN IP%u %1023s",
1249 p_sdp->username, &p_sdp->session_id,
1250 &p_sdp->session_version, &p_sdp->orig_ip_version,
1251 p_sdp->orig_host) != 5)
1252 || ((p_sdp->orig_ip_version != 4)
1253 && (p_sdp->orig_ip_version != 6)))
1255 msg_Dbg (p_obj, "SDP origin not supported: %s", data);
1256 /* Or maybe out-of-range, but this looks suspicious */
1259 EnsureUTF8 (p_sdp->orig_host);
1266 if ((cat != 's') || !*data)
1268 /* MUST be present AND non-empty */
1269 msg_Dbg (p_obj, "missing SDP session name");
1272 assert (p_sdp->psz_sessionname == NULL); // no memleak here
1273 p_sdp->psz_sessionname = strdup (data);
1274 if (p_sdp->psz_sessionname == NULL)
1276 EnsureUTF8 (p_sdp->psz_sessionname);
1300 if (ParseSDPConnection (data, &glob_addr, &glob_len,
1303 msg_Dbg (p_obj, "SDP connection infos not supported: "
1310 assert (expect == 'B');
1317 msg_Dbg (p_obj, "missing SDP time description");
1323 if ((cat == 't') || (cat == 'r'))
1338 attribute_t *p_attr = MakeAttribute (data);
1339 TAB_APPEND( p_sdp->i_attributes, p_sdp->pp_attributes, p_attr );
1343 /* Media description */
1350 msg_Dbg (p_obj, "missing SDP media description");
1353 struct sdp_media_t *m;
1354 m = realloc (p_sdp->mediav, (p_sdp->mediac + 1) * sizeof (*m));
1362 memset (m, 0, sizeof (*m));
1363 memcpy (&m->addr, &glob_addr, m->addrlen = glob_len);
1364 m->n_addr = glob_count;
1366 /* TODO: remember media type (if we need multiple medias) */
1367 data = strchr (data, ' ');
1370 msg_Dbg (p_obj, "missing SDP media port");
1373 port = atoi (++data);
1374 if (port <= 0 || port >= 65536)
1376 msg_Dbg (p_obj, "invalid transport port %d", port);
1379 net_SetPort ((struct sockaddr *)&m->addr, htons (port));
1381 data = strchr (data, ' ');
1384 msg_Dbg (p_obj, "missing SDP media format");
1387 m->fmt = strdup (++data);
1401 struct sdp_media_t *m = p_sdp->mediav + p_sdp->mediac - 1;
1402 if (ParseSDPConnection (data, &m->addr, &m->addrlen,
1405 msg_Dbg (p_obj, "SDP connection infos not supported: "
1409 net_SetPort ((struct sockaddr *)&m->addr, htons (port));
1421 assert (expect == 'a');
1424 attribute_t *p_attr = MakeAttribute (data);
1428 TAB_APPEND (p_sdp->mediav[p_sdp->mediac - 1].i_attributes,
1429 p_sdp->mediav[p_sdp->mediac - 1].pp_attributes, p_attr);
1438 msg_Dbg (p_obj, "unexpected SDP line: 0x%02x", (int)cat);
1444 msg_Err (p_obj, "*** BUG in SDP parser! ***");
1456 static int InitSocket( services_discovery_t *p_sd, const char *psz_address,
1459 int i_fd = net_ListenUDP1 ((vlc_object_t *)p_sd, psz_address, i_port);
1461 return VLC_EGENERIC;
1463 shutdown( i_fd, SHUT_WR );
1464 INSERT_ELEM (p_sd->p_sys->pi_fd, p_sd->p_sys->i_fd,
1465 p_sd->p_sys->i_fd, i_fd);
1469 static int Decompress( const unsigned char *psz_src, unsigned char **_dst, int i_len )
1472 int i_result, i_dstsize, n = 0;
1473 unsigned char *psz_dst = NULL;
1476 memset (&d_stream, 0, sizeof (d_stream));
1478 i_result = inflateInit(&d_stream);
1479 if( i_result != Z_OK )
1482 d_stream.next_in = (Bytef *)psz_src;
1483 d_stream.avail_in = i_len;
1488 psz_dst = (unsigned char *)realloc( psz_dst, n * 1000 );
1489 d_stream.next_out = (Bytef *)&psz_dst[(n - 1) * 1000];
1490 d_stream.avail_out = 1000;
1492 i_result = inflate(&d_stream, Z_NO_FLUSH);
1493 if( ( i_result != Z_OK ) && ( i_result != Z_STREAM_END ) )
1495 inflateEnd( &d_stream );
1500 while( ( d_stream.avail_out == 0 ) && ( d_stream.avail_in != 0 ) &&
1501 ( i_result != Z_STREAM_END ) );
1503 i_dstsize = d_stream.total_out;
1504 inflateEnd( &d_stream );
1506 *_dst = (unsigned char *)realloc( psz_dst, i_dstsize );
1518 static void FreeSDP( sdp_t *p_sdp )
1520 free( p_sdp->psz_sessionname );
1521 free( p_sdp->psz_uri );
1523 for (unsigned j = 0; j < p_sdp->mediac; j++)
1525 free (p_sdp->mediav[j].fmt);
1526 for (int i = 0; i < p_sdp->mediav[j].i_attributes; i++)
1527 FreeAttribute (p_sdp->mediav[j].pp_attributes[i]);
1528 free (p_sdp->mediav[j].pp_attributes);
1530 free (p_sdp->mediav);
1532 for (int i = 0; i < p_sdp->i_attributes; i++)
1533 FreeAttribute (p_sdp->pp_attributes[i]);
1535 free (p_sdp->pp_attributes);
1539 static int RemoveAnnounce( services_discovery_t *p_sd,
1540 sap_announce_t *p_announce )
1544 if( p_announce->p_sdp )
1546 FreeSDP( p_announce->p_sdp );
1547 p_announce->p_sdp = NULL;
1550 if( p_announce->p_item )
1552 services_discovery_RemoveItem( p_sd, p_announce->p_item );
1553 vlc_gc_decref( p_announce->p_item );
1554 p_announce->p_item = NULL;
1557 for( i = 0; i< p_sd->p_sys->i_announces; i++)
1559 if( p_sd->p_sys->pp_announces[i] == p_announce )
1561 REMOVE_ELEM( p_sd->p_sys->pp_announces, p_sd->p_sys->i_announces,
1572 static bool IsSameSession( sdp_t *p_sdp1, sdp_t *p_sdp2 )
1574 /* A session is identified by
1577 * - network type (which is always IN),
1578 * - address type (currently, this means IP version),
1581 if (strcmp (p_sdp1->username, p_sdp2->username)
1582 || (p_sdp1->session_id != p_sdp2->session_id)
1583 || (p_sdp1->orig_ip_version != p_sdp2->orig_ip_version)
1584 || strcmp (p_sdp1->orig_host, p_sdp2->orig_host))
1591 static inline attribute_t *MakeAttribute (const char *str)
1593 attribute_t *a = malloc (sizeof (*a) + strlen (str) + 1);
1597 strcpy (a->name, str);
1598 EnsureUTF8 (a->name);
1599 char *value = strchr (a->name, ':');
1611 static const char *GetAttribute (attribute_t **tab, unsigned n,
1614 for (unsigned i = 0; i < n; i++)
1615 if (strcasecmp (tab[i]->name, name) == 0)
1616 return tab[i]->value;
1621 static inline void FreeAttribute (attribute_t *a)