1 /*****************************************************************************
2 * sap.c : SAP interface module
3 *****************************************************************************
4 * Copyright (C) 2004-2005 the VideoLAN team
5 * Copyright © 2007 Rémi Denis-Courmont
8 * Authors: Clément Stenac <zorglub@videolan.org>
11 * This program is free software; you can redistribute it and/or modify
12 * it under the terms of the GNU General Public License as published by
13 * the Free Software Foundation; either version 2 of the License, or
14 * (at your option) any later version.
16 * This program is distributed in the hope that it will be useful,
17 * but WITHOUT ANY WARRANTY; without even the implied warranty of
18 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
19 * GNU General Public License for more details.
21 * You should have received a copy of the GNU General Public License
22 * along with this program; if not, write to the Free Software
23 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston MA 02110-1301, USA.
24 *****************************************************************************/
26 /*****************************************************************************
28 *****************************************************************************/
33 #include <vlc_common.h>
34 #include <vlc_plugin.h>
37 #include <vlc_demux.h>
38 #include <vlc_services_discovery.h>
40 #include <vlc_network.h>
41 #include <vlc_charset.h>
58 /************************************************************************
59 * Macros and definitions
60 ************************************************************************/
62 #define MAX_LINE_LENGTH 256
64 /* SAP is always on that port */
66 /* Global-scope SAP address */
67 #define SAP_V4_GLOBAL_ADDRESS "224.2.127.254"
68 /* Organization-local SAP address */
69 #define SAP_V4_ORG_ADDRESS "239.195.255.255"
70 /* Local (smallest non-link-local scope) SAP address */
71 #define SAP_V4_LOCAL_ADDRESS "239.255.255.255"
72 /* Link-local SAP address */
73 #define SAP_V4_LINK_ADDRESS "224.0.0.255"
76 /*****************************************************************************
78 *****************************************************************************/
79 #define SAP_ADDR_TEXT N_( "SAP multicast address" )
80 #define SAP_ADDR_LONGTEXT N_( "The SAP module normally chooses itself the " \
81 "right addresses to listen to. However, you " \
82 "can specify a specific address." )
83 #define SAP_TIMEOUT_TEXT N_( "SAP timeout (seconds)" )
84 #define SAP_TIMEOUT_LONGTEXT N_( \
85 "Delay after which SAP items get deleted if no new announcement " \
87 #define SAP_PARSE_TEXT N_( "Try to parse the announce" )
88 #define SAP_PARSE_LONGTEXT N_( \
89 "This enables actual parsing of the announces by the SAP module. " \
90 "Otherwise, all announcements are parsed by the \"live555\" " \
91 "(RTP/RTSP) module." )
92 #define SAP_STRICT_TEXT N_( "SAP Strict mode" )
93 #define SAP_STRICT_LONGTEXT N_( \
94 "When this is set, the SAP parser will discard some non-compliant " \
98 static int Open ( vlc_object_t * );
99 static void Close( vlc_object_t * );
100 static int OpenDemux ( vlc_object_t * );
101 static void CloseDemux ( vlc_object_t * );
103 VLC_SD_PROBE_HELPER("sap", "Network streams (SAP)", SD_CAT_LAN)
106 set_shortname( N_("SAP"))
107 set_description( N_("Network streams (SAP)") )
108 set_category( CAT_PLAYLIST )
109 set_subcategory( SUBCAT_PLAYLIST_SD )
111 add_string( "sap-addr", NULL,
112 SAP_ADDR_TEXT, SAP_ADDR_LONGTEXT, true )
113 add_obsolete_bool( "sap-ipv4" ) /* since 1.2.0 */
114 add_obsolete_bool( "sap-ipv6" ) /* since 1.2.0 */
115 add_integer( "sap-timeout", 1800,
116 SAP_TIMEOUT_TEXT, SAP_TIMEOUT_LONGTEXT, true )
117 add_bool( "sap-parse", true,
118 SAP_PARSE_TEXT,SAP_PARSE_LONGTEXT, true )
119 add_bool( "sap-strict", false,
120 SAP_STRICT_TEXT,SAP_STRICT_LONGTEXT, true )
121 add_obsolete_bool( "sap-timeshift" ) /* Redumdant since 1.0.0 */
123 set_capability( "services_discovery", 0 )
124 set_callbacks( Open, Close )
126 VLC_SD_PROBE_SUBMODULE
129 set_description( N_("SDP Descriptions parser") )
130 add_shortcut( "sdp" )
131 set_capability( "demux", 51 )
132 set_callbacks( OpenDemux, CloseDemux )
136 /*****************************************************************************
138 *****************************************************************************/
140 typedef struct sdp_t sdp_t;
141 typedef struct attribute_t attribute_t;
142 typedef struct sap_announce_t sap_announce_t;
147 struct sdp_t *parent;
149 struct sockaddr_storage addr;
153 attribute_t **pp_attributes;
157 /* The structure that contains sdp information */
165 uint64_t session_version;
166 unsigned orig_ip_version;
167 char orig_host[1024];
170 char *psz_sessionname;
178 /* a= global attributes */
180 attribute_t **pp_attributes;
182 /* medias (well, we only support one atm) */
184 struct sdp_media_t *mediav;
193 struct sap_announce_t
197 uint8_t i_period_trust;
200 uint32_t i_source[4];
202 /* SAP annnounces must only contain one SDP */
205 input_item_t * p_item;
208 struct services_discovery_sys_t
212 /* Socket descriptors */
216 /* Table of announces */
218 struct sap_announce_t **pp_announces;
232 /*****************************************************************************
234 *****************************************************************************/
238 static int Demux( demux_t *p_demux );
239 static int Control( demux_t *, int, va_list );
240 static void *Run ( void *p_sd );
242 /* Main parsing functions */
243 static int ParseConnection( vlc_object_t *p_obj, sdp_t *p_sdp );
244 static int ParseSAP( services_discovery_t *p_sd, const uint8_t *p_buffer, size_t i_read );
245 static sdp_t *ParseSDP (vlc_object_t *p_sd, const char *psz_sdp);
246 static sap_announce_t *CreateAnnounce( services_discovery_t *, uint16_t, sdp_t * );
247 static int RemoveAnnounce( services_discovery_t *p_sd, sap_announce_t *p_announce );
249 /* Helper functions */
250 static inline attribute_t *MakeAttribute (const char *str);
251 static const char *GetAttribute (attribute_t **tab, unsigned n, const char *name);
252 static inline void FreeAttribute (attribute_t *a);
253 static const char *FindAttribute (const sdp_t *sdp, unsigned media,
256 static bool IsSameSession( sdp_t *p_sdp1, sdp_t *p_sdp2 );
257 static int InitSocket( services_discovery_t *p_sd, const char *psz_address, int i_port );
258 static int Decompress( const unsigned char *psz_src, unsigned char **_dst, int i_len );
259 static void FreeSDP( sdp_t *p_sdp );
261 static inline int min_int( int a, int b )
263 return a > b ? b : a;
266 static bool IsWellKnownPayload (int type)
269 { /* Should be in sync with modules/demux/rtp.c */
270 case 0: /* PCMU/8000 */
272 case 8: /* PCMA/8000 */
273 case 10: /* L16/44100/2 */
274 case 11: /* L16/44100 */
276 case 14: /* MPA/90000 */
277 case 32: /* MPV/90000 */
278 case 33: /* MP2/90000 */
284 /*****************************************************************************
285 * Open: initialize and create stuff
286 *****************************************************************************/
287 static int Open( vlc_object_t *p_this )
289 services_discovery_t *p_sd = ( services_discovery_t* )p_this;
290 services_discovery_sys_t *p_sys = (services_discovery_sys_t *)
291 malloc( sizeof( services_discovery_sys_t ) );
295 p_sys->i_timeout = var_CreateGetInteger( p_sd, "sap-timeout" );
302 p_sys->b_strict = var_CreateGetBool( p_sd, "sap-strict");
303 p_sys->b_parse = var_CreateGetBool( p_sd, "sap-parse" );
305 p_sys->i_announces = 0;
306 p_sys->pp_announces = NULL;
307 /* TODO: create sockets here, and fix racy sockets table */
308 if (vlc_clone (&p_sys->thread, Run, p_sd, VLC_THREAD_PRIORITY_LOW))
317 /*****************************************************************************
318 * OpenDemux: initialize and create stuff
319 *****************************************************************************/
320 static int OpenDemux( vlc_object_t *p_this )
322 demux_t *p_demux = (demux_t *)p_this;
323 const uint8_t *p_peek;
324 char *psz_sdp = NULL;
326 int errval = VLC_EGENERIC;
329 if( !var_CreateGetBool( p_demux, "sap-parse" ) )
331 /* We want livedotcom module to parse this SDP file */
335 assert( p_demux->s ); /* this is NOT an access_demux */
338 if( stream_Peek( p_demux->s, &p_peek, 7 ) < 7 )
341 if( memcmp( p_peek, "v=0\r\no=", 7 ) && memcmp( p_peek, "v=0\no=", 6 ) )
344 /* Gather the complete sdp file */
345 for( i_len = 0, psz_sdp = NULL; i_len < 65536; )
347 const int i_read_max = 1024;
348 char *psz_sdp_new = realloc( psz_sdp, i_len + i_read_max );
350 if( psz_sdp_new == NULL )
355 psz_sdp = psz_sdp_new;
357 i_read = stream_Read( p_demux->s, &psz_sdp[i_len], i_read_max );
358 if( (int)i_read < 0 )
360 msg_Err( p_demux, "cannot read SDP" );
365 psz_sdp[i_len] = '\0';
367 if( (int)i_read < i_read_max )
371 p_sdp = ParseSDP( VLC_OBJECT(p_demux), psz_sdp );
375 msg_Warn( p_demux, "invalid SDP");
379 if( ParseConnection( VLC_OBJECT( p_demux ), p_sdp ) )
381 p_sdp->psz_uri = NULL;
383 if (!IsWellKnownPayload (p_sdp->i_media_type))
385 if( p_sdp->psz_uri == NULL ) goto error;
387 p_demux->p_sys = (demux_sys_t *)malloc( sizeof(demux_sys_t) );
388 if( unlikely( !p_demux->p_sys ) )
390 p_demux->p_sys->p_sdp = p_sdp;
391 p_demux->pf_control = Control;
392 p_demux->pf_demux = Demux;
399 if( p_sdp ) FreeSDP( p_sdp ); p_sdp = NULL;
400 stream_Seek( p_demux->s, 0 );
404 /*****************************************************************************
406 *****************************************************************************/
407 static void Close( vlc_object_t *p_this )
409 services_discovery_t *p_sd = ( services_discovery_t* )p_this;
410 services_discovery_sys_t *p_sys = p_sd->p_sys;
413 vlc_cancel (p_sys->thread);
414 vlc_join (p_sys->thread, NULL);
416 for( i = p_sys->i_fd-1 ; i >= 0 ; i-- )
418 net_Close( p_sys->pi_fd[i] );
420 FREENULL( p_sys->pi_fd );
422 for( i = p_sys->i_announces - 1; i>= 0; i-- )
424 RemoveAnnounce( p_sd, p_sys->pp_announces[i] );
426 FREENULL( p_sys->pp_announces );
431 /*****************************************************************************
432 * CloseDemux: Close the demuxer
433 *****************************************************************************/
434 static void CloseDemux( vlc_object_t *p_this )
436 demux_t *p_demux = (demux_t *)p_this;
438 if( p_demux->p_sys->p_sdp )
439 FreeSDP( p_demux->p_sys->p_sdp );
440 free( p_demux->p_sys );
443 /*****************************************************************************
444 * Run: main SAP thread
445 *****************************************************************************
446 * Listens to SAP packets, and sends them to packet_handle
447 *****************************************************************************/
448 #define MAX_SAP_BUFFER 5000
450 static void *Run( void *data )
452 services_discovery_t *p_sd = data;
456 int canc = vlc_savecancel ();
458 /* Braindead Winsock DNS resolver will get stuck over 2 seconds per failed
459 * DNS queries, even if the DNS server returns an error with milliseconds.
460 * You don't want to know why the bug (as of XP SP2) wasn't fixed since
461 * Winsock 1.1 from Windows 95, if not Windows 3.1.
462 * Anyway, to avoid a 30 seconds delay for failed IPv6 socket creation,
463 * we have to open sockets in Run() rather than Open(). */
464 InitSocket( p_sd, SAP_V4_GLOBAL_ADDRESS, SAP_PORT );
465 InitSocket( p_sd, SAP_V4_ORG_ADDRESS, SAP_PORT );
466 InitSocket( p_sd, SAP_V4_LOCAL_ADDRESS, SAP_PORT );
467 InitSocket( p_sd, SAP_V4_LINK_ADDRESS, SAP_PORT );
469 char psz_address[NI_MAXNUMERICHOST] = "ff02::2:7ffe%";
471 struct if_nameindex *l = if_nameindex ();
474 char *ptr = strchr (psz_address, '%') + 1;
475 for (unsigned i = 0; l[i].if_index; i++)
477 strcpy (ptr, l[i].if_name);
478 InitSocket (p_sd, psz_address, SAP_PORT);
480 if_freenameindex (l);
483 /* this is the Winsock2 equivalant of SIOCGIFCONF on BSD stacks,
484 which if_nameindex uses internally anyway */
486 // first create a dummy socket to pin down the protocol family
487 SOCKET s = socket(PF_INET6, SOCK_DGRAM, IPPROTO_UDP);
488 if( s != INVALID_SOCKET )
490 INTERFACE_INFO ifaces[10]; // Assume there will be no more than 10 IP interfaces
491 DWORD len = sizeof(ifaces);
493 if( SOCKET_ERROR != WSAIoctl(s, SIO_GET_INTERFACE_LIST, NULL, 0, &ifaces, len, &len, NULL, NULL) )
495 unsigned ifcount = len/sizeof(INTERFACE_INFO);
496 char *ptr = strchr (psz_address, '%') + 1;
497 for(unsigned i = 1; i<=ifcount; ++i )
499 // append link-local zone identifier
500 sprintf(ptr, "%d", i);
506 *strchr (psz_address, '%') = '\0';
508 static const char ipv6_scopes[] = "1456789ABCDE";
509 for (const char *c_scope = ipv6_scopes; *c_scope; c_scope++)
511 psz_address[3] = *c_scope;
512 InitSocket( p_sd, psz_address, SAP_PORT );
515 psz_addr = var_CreateGetString( p_sd, "sap-addr" );
516 if( psz_addr && *psz_addr )
517 InitSocket( p_sd, psz_addr, SAP_PORT );
520 if( p_sd->p_sys->i_fd == 0 )
522 msg_Err( p_sd, "unable to listen on any address" );
526 /* read SAP packets */
529 vlc_restorecancel (canc);
530 unsigned n = p_sd->p_sys->i_fd;
531 struct pollfd ufd[n];
533 for (unsigned i = 0; i < n; i++)
535 ufd[i].fd = p_sd->p_sys->pi_fd[i];
536 ufd[i].events = POLLIN;
540 int val = poll (ufd, n, timeout);
541 canc = vlc_savecancel ();
544 for (unsigned i = 0; i < n; i++)
548 uint8_t p_buffer[MAX_SAP_BUFFER+1];
551 i_read = net_Read (p_sd, ufd[i].fd, NULL, p_buffer,
552 MAX_SAP_BUFFER, false);
554 msg_Warn (p_sd, "receive error: %m");
557 /* Parse the packet */
558 p_buffer[i_read] = '\0';
559 ParseSAP (p_sd, p_buffer, i_read);
565 mtime_t now = mdate();
567 /* A 1 hour timeout correspong to the RFC Implicit timeout.
568 * This timeout is tuned in the following loop. */
569 timeout = 1000 * 60 * 60;
571 /* Check for items that need deletion */
572 for( i = 0; i < p_sd->p_sys->i_announces; i++ )
574 mtime_t i_timeout = ( mtime_t ) 1000000 * p_sd->p_sys->i_timeout;
575 sap_announce_t * p_announce = p_sd->p_sys->pp_announces[i];
576 mtime_t i_last_period = now - p_announce->i_last;
578 /* Remove the annoucement, if the last announcement was 1 hour ago
579 * or if the last packet emitted was 3 times the average time
580 * between two packets */
581 if( ( p_announce->i_period_trust > 5 && i_last_period > 3 * p_announce->i_period ) ||
582 i_last_period > i_timeout )
584 RemoveAnnounce( p_sd, p_announce );
588 /* Compute next timeout */
589 if( p_announce->i_period_trust > 5 )
590 timeout = min_int((3 * p_announce->i_period - i_last_period) / 1000, timeout);
591 timeout = min_int((i_timeout - i_last_period)/1000, timeout);
595 if( !p_sd->p_sys->i_announces )
596 timeout = -1; /* We can safely poll indefinitely. */
597 else if( timeout < 200 )
598 timeout = 200; /* Don't wakeup too fast. */
603 /**********************************************************************
604 * Demux: reads and demuxes data packets
605 * Return -1 if error, 0 if EOF, 1 else
606 **********************************************************************/
607 static int Demux( demux_t *p_demux )
609 sdp_t *p_sdp = p_demux->p_sys->p_sdp;
610 input_thread_t *p_input;
611 input_item_t *p_parent_input;
613 p_input = demux_GetParentInput( p_demux );
617 msg_Err( p_demux, "parent input could not be found" );
621 /* This item hasn't been held by input_GetItem
622 * don't release it */
623 p_parent_input = input_GetItem( p_input );
625 input_item_SetURI( p_parent_input, p_sdp->psz_uri );
626 input_item_SetName( p_parent_input, p_sdp->psz_sessionname );
627 if( p_sdp->rtcp_port )
630 if( asprintf( &rtcp, ":rtcp-port=%u", p_sdp->rtcp_port ) != -1 )
632 input_item_AddOption( p_parent_input, rtcp, VLC_INPUT_OPTION_TRUSTED );
637 vlc_mutex_lock( &p_parent_input->lock );
639 p_parent_input->i_type = ITEM_TYPE_NET;
641 vlc_mutex_unlock( &p_parent_input->lock );
642 vlc_object_release( p_input );
646 static int Control( demux_t *p_demux, int i_query, va_list args )
648 VLC_UNUSED(p_demux); VLC_UNUSED(i_query); VLC_UNUSED(args);
652 /**************************************************************
654 **************************************************************/
656 /* i_read is at least > 6 */
657 static int ParseSAP( services_discovery_t *p_sd, const uint8_t *buf,
662 const uint8_t *end = buf + len;
665 assert (buf[len] == '\0');
670 uint8_t flags = buf[0];
672 /* First, check the sap announce is correct */
673 if ((flags >> 5) != 1)
676 bool b_ipv6 = (flags & 0x10) != 0;
677 bool b_need_delete = (flags & 0x04) != 0;
681 msg_Dbg( p_sd, "encrypted packet, unsupported" );
685 bool b_compressed = (flags & 0x01) != 0;
687 uint16_t i_hash = U16_AT (buf + 2);
689 if( p_sd->p_sys->b_strict && i_hash == 0 )
691 msg_Dbg( p_sd, "strict mode, discarding announce with null id hash");
695 // Skips source address and auth data
696 buf += 4 + (b_ipv6 ? 16 : 4) + buf[1];
700 uint8_t *decomp = NULL;
703 int newsize = Decompress (buf, &decomp, end - buf);
706 msg_Dbg( p_sd, "decompression of SAP packet failed" );
710 decomp = realloc (decomp, newsize + 1);
711 decomp[newsize] = '\0';
712 psz_sdp = (const char *)decomp;
717 psz_sdp = (const char *)buf;
721 /* len is a strlen here here. both buf and decomp are len+1 where the 1 should be a \0 */
722 assert( psz_sdp[len] == '\0');
724 /* Skip payload type */
725 /* SAPv1 has implicit "application/sdp" payload type: first line is v=0 */
726 if (strncmp (psz_sdp, "v=0", 3))
728 size_t clen = strlen (psz_sdp) + 1;
730 if (strcmp (psz_sdp, "application/sdp"))
732 msg_Dbg (p_sd, "unsupported content type: %s", psz_sdp);
736 // skips content type
745 p_sdp = ParseSDP( VLC_OBJECT(p_sd), psz_sdp );
750 p_sdp->psz_sdp = psz_sdp;
752 /* Decide whether we should add a playlist item for this SDP */
753 /* Parse connection information (c= & m= ) */
754 if( ParseConnection( VLC_OBJECT(p_sd), p_sdp ) )
755 p_sdp->psz_uri = NULL;
757 /* Multi-media or no-parse -> pass to LIVE.COM */
758 if( !IsWellKnownPayload( p_sdp->i_media_type ) || !p_sd->p_sys->b_parse )
760 free( p_sdp->psz_uri );
761 if (asprintf( &p_sdp->psz_uri, "sdp://%s", p_sdp->psz_sdp ) == -1)
762 p_sdp->psz_uri = NULL;
765 if( p_sdp->psz_uri == NULL )
771 for( i = 0 ; i< p_sd->p_sys->i_announces ; i++ )
773 sap_announce_t * p_announce = p_sd->p_sys->pp_announces[i];
775 /* FIXME: we create a new announce each time the sdp changes */
776 if( IsSameSession( p_announce->p_sdp, p_sdp ) )
778 /* We don't support delete announcement as they can easily
779 * Be used to highjack an announcement by a third party.
780 * Intead we cleverly implement Implicit Announcement removal.
782 * if( b_need_delete )
783 * RemoveAnnounce( p_sd, p_sd->p_sys->pp_announces[i]);
789 /* No need to go after six, as we start to trust the
790 * average period at six */
791 if( p_announce->i_period_trust <= 5 )
792 p_announce->i_period_trust++;
794 /* Compute the average period */
795 mtime_t now = mdate();
796 p_announce->i_period = (p_announce->i_period + (now - p_announce->i_last)) / 2;
797 p_announce->i_last = now;
799 FreeSDP( p_sdp ); p_sdp = NULL;
804 CreateAnnounce( p_sd, i_hash, p_sdp );
810 sap_announce_t *CreateAnnounce( services_discovery_t *p_sd, uint16_t i_hash,
813 input_item_t *p_input;
814 const char *psz_value;
815 sap_announce_t *p_sap = (sap_announce_t *)malloc(
816 sizeof(sap_announce_t ) );
817 services_discovery_sys_t *p_sys;
823 p_sap->i_last = mdate();
825 p_sap->i_period_trust = 0;
826 p_sap->i_hash = i_hash;
827 p_sap->p_sdp = p_sdp;
829 /* Released in RemoveAnnounce */
830 p_input = input_item_NewWithType( p_sap->p_sdp->psz_uri,
831 p_sdp->psz_sessionname,
832 0, NULL, 0, -1, ITEM_TYPE_NET );
833 p_sap->p_item = p_input;
840 if( p_sdp->rtcp_port )
843 if( asprintf( &rtcp, ":rtcp-port=%u", p_sdp->rtcp_port ) != -1 )
845 input_item_AddOption( p_input, rtcp, VLC_INPUT_OPTION_TRUSTED );
850 psz_value = GetAttribute( p_sap->p_sdp->pp_attributes, p_sap->p_sdp->i_attributes, "tool" );
851 if( psz_value != NULL )
853 input_item_AddInfo( p_input, _("Session"), _("Tool"), "%s", psz_value );
855 if( strcmp( p_sdp->username, "-" ) )
857 input_item_AddInfo( p_input, _("Session"), _("User"), "%s",
862 if (p_sap->p_sdp->mediac >= 1)
863 psz_value = FindAttribute (p_sap->p_sdp, 0, "x-plgroup");
865 psz_value = GetAttribute( p_sap->p_sdp->pp_attributes, p_sap->p_sdp->i_attributes, "x-plgroup" );
867 services_discovery_AddItem( p_sd, p_input, psz_value /* category name */ );
869 TAB_APPEND( p_sys->i_announces, p_sys->pp_announces, p_sap );
875 static const char *FindAttribute (const sdp_t *sdp, unsigned media,
878 /* Look for media attribute, and fallback to session */
879 const char *attr = GetAttribute (sdp->mediav[media].pp_attributes,
880 sdp->mediav[media].i_attributes, name);
882 attr = GetAttribute (sdp->pp_attributes, sdp->i_attributes, name);
887 /* Fill p_sdp->psz_uri */
888 static int ParseConnection( vlc_object_t *p_obj, sdp_t *p_sdp )
890 if (p_sdp->mediac == 0)
892 msg_Dbg (p_obj, "Ignoring SDP with no media");
896 for (unsigned i = 1; i < p_sdp->mediac; i++)
898 if ((p_sdp->mediav[i].n_addr != p_sdp->mediav->n_addr)
899 || (p_sdp->mediav[i].addrlen != p_sdp->mediav->addrlen)
900 || memcmp (&p_sdp->mediav[i].addr, &p_sdp->mediav->addr,
901 p_sdp->mediav->addrlen))
903 msg_Dbg (p_obj, "Multiple media ports not supported -> live555");
908 if (p_sdp->mediav->n_addr != 1)
910 msg_Dbg (p_obj, "Layered encoding not supported -> live555");
919 if (vlc_getnameinfo ((struct sockaddr *)&(p_sdp->mediav->addr),
920 p_sdp->mediav->addrlen, psz_uri + 1,
921 sizeof (psz_uri) - 2, &port, NI_NUMERICHOST))
924 if (strchr (psz_uri + 1, ':'))
927 strcat (psz_uri, "]");
933 char *sdp_proto = strdup (p_sdp->mediav[0].fmt);
934 if (sdp_proto == NULL)
937 char *subtype = strchr (sdp_proto, ' ');
940 msg_Dbg (p_obj, "missing SDP media subtype: %s", sdp_proto);
947 /* FIXME: check for multiple payload types in RTP/AVP case.
948 * FIXME: check for "mpeg" subtype in raw udp case. */
949 if (!strcasecmp (sdp_proto, "udp"))
950 p_sdp->i_media_type = 33;
952 p_sdp->i_media_type = atoi (subtype);
955 /* RTP protocol, nul, VLC shortcut, nul, flags byte as follow:
956 * 0x1: Connection-Oriented media. */
957 static const char proto_match[] =
959 "RTP/AVP\0" "rtp\0\0"
960 "UDPLite/RTP/AVP\0" "udplite\0\0"
961 "DCCP/RTP/AVP\0" "dccp\0\1"
962 "TCP/RTP/AVP\0" "rtptcp\0\1"
965 const char *vlc_proto = NULL;
967 for (const char *proto = proto_match; *proto;)
969 if (strcasecmp (proto, sdp_proto) == 0)
971 vlc_proto = proto + strlen (proto) + 1;
972 flags = vlc_proto[strlen (vlc_proto) + 1];
975 proto += strlen (proto) + 1;
976 proto += strlen (proto) + 2;
980 if (vlc_proto == NULL)
982 msg_Dbg (p_obj, "unknown SDP media protocol: %s",
983 p_sdp->mediav[0].fmt);
987 if (!strcmp (vlc_proto, "udp") || FindAttribute (p_sdp, 0, "rtcp-mux"))
988 p_sdp->rtcp_port = 0;
991 const char *rtcp = FindAttribute (p_sdp, 0, "rtcp");
993 p_sdp->rtcp_port = atoi (rtcp);
995 if (port & 1) /* odd port -> RTCP; next even port -> RTP */
996 p_sdp->rtcp_port = port++;
997 else /* even port -> RTP; next odd port -> RTCP */
998 p_sdp->rtcp_port = port + 1;
1003 /* Connection-oriented media */
1004 const char *setup = FindAttribute (p_sdp, 0, "setup");
1006 setup = "active"; /* default value */
1008 if (strcmp (setup, "actpass") && strcmp (setup, "passive"))
1010 msg_Dbg (p_obj, "unsupported COMEDIA mode: %s", setup);
1011 return VLC_EGENERIC;
1014 if (asprintf (&p_sdp->psz_uri, "%s://%s:%d", vlc_proto,
1020 /* Non-connected (normally multicast) media */
1021 char psz_source[258] = "";
1022 const char *sfilter = FindAttribute (p_sdp, 0, "source-filter");
1023 if (sfilter != NULL)
1025 char psz_source_ip[256];
1028 if (sscanf (sfilter, " incl IN IP%u %*s %255s ", &ipv,
1029 psz_source_ip) == 2)
1031 /* According to RFC4570, FQDNs can be used for source-filters,
1032 * but -seriously- this is impractical */
1038 struct in6_addr addr;
1039 if ((inet_pton (AF_INET6, psz_source_ip, &addr) > 0)
1040 && (inet_ntop (AF_INET6, &addr, psz_source + 1,
1041 sizeof (psz_source) - 2) != NULL))
1043 psz_source[0] = '[';
1044 psz_source[strlen (psz_source)] = ']';
1051 struct in_addr addr;
1052 if ((inet_pton (AF_INET, psz_source_ip, &addr) > 0)
1053 && (inet_ntop (AF_INET, &addr, psz_source,
1054 sizeof (psz_source)) == NULL))
1062 if (asprintf (&p_sdp->psz_uri, "%s://%s@%s:%i", vlc_proto, psz_source,
1071 static int ParseSDPConnection (const char *str, struct sockaddr_storage *addr,
1072 socklen_t *addrlen, unsigned *number)
1075 unsigned fam, n1, n2;
1077 int res = sscanf (str, "IN IP%u %59[^/]/%u/%u", &fam, host, &n1, &n2);
1085 addr->ss_family = AF_INET6;
1089 *addrlen = sizeof (struct sockaddr_in6);
1091 if (inet_pton (AF_INET6, host,
1092 &((struct sockaddr_in6 *)addr)->sin6_addr) <= 0)
1095 *number = (res >= 3) ? n1 : 1;
1100 addr->ss_family = AF_INET;
1104 *addrlen = sizeof (struct sockaddr_in);
1106 if (inet_pton (AF_INET, host,
1107 &((struct sockaddr_in *)addr)->sin_addr) <= 0)
1110 *number = (res >= 4) ? n2 : 1;
1120 /***********************************************************************
1121 * ParseSDP : SDP parsing
1122 * *********************************************************************
1123 * Validate SDP and parse all fields
1124 ***********************************************************************/
1125 static sdp_t *ParseSDP (vlc_object_t *p_obj, const char *psz_sdp)
1127 if( psz_sdp == NULL )
1130 sdp_t *p_sdp = calloc (1, sizeof (*p_sdp));
1135 struct sockaddr_storage glob_addr;
1136 memset (&glob_addr, 0, sizeof (glob_addr));
1137 socklen_t glob_len = 0;
1138 unsigned glob_count = 1;
1141 /* TODO: use iconv and charset attribute instead of EnsureUTF8 */
1144 /* Extract one line */
1145 char *eol = strchr (psz_sdp, '\n');
1146 size_t linelen = eol ? (size_t)(eol - psz_sdp) : strlen (psz_sdp);
1147 char line[linelen + 1];
1148 memcpy (line, psz_sdp, linelen);
1149 line[linelen] = '\0';
1151 psz_sdp += linelen + 1;
1153 /* Remove carriage return if present */
1154 eol = strchr (line, '\r');
1157 linelen = eol - line;
1158 line[linelen] = '\0';
1162 char cat = line[0], *data = line + 2;
1163 if (!cat || (strchr ("vosiuepcbtrzkam", cat) == NULL))
1165 /* MUST ignore SDP with unknown line type */
1166 msg_Dbg (p_obj, "unknown SDP line type: 0x%02x", (int)cat);
1171 msg_Dbg (p_obj, "invalid SDP line: %s", line);
1175 assert (linelen >= 2);
1177 /* SDP parsing state machine
1178 * We INTERNALLY use uppercase for session, lowercase for media
1182 /* Session description */
1187 msg_Dbg (p_obj, "missing SDP version");
1190 if (strcmp (data, "0"))
1192 msg_Dbg (p_obj, "unknown SDP version: %s", data);
1202 msg_Dbg (p_obj, "missing SDP originator");
1206 if ((sscanf (data, "%63s %"SCNu64" %"SCNu64" IN IP%u %1023s",
1207 p_sdp->username, &p_sdp->session_id,
1208 &p_sdp->session_version, &p_sdp->orig_ip_version,
1209 p_sdp->orig_host) != 5)
1210 || ((p_sdp->orig_ip_version != 4)
1211 && (p_sdp->orig_ip_version != 6)))
1213 msg_Dbg (p_obj, "SDP origin not supported: %s", data);
1214 /* Or maybe out-of-range, but this looks suspicious */
1217 EnsureUTF8 (p_sdp->orig_host);
1224 if ((cat != 's') || !*data)
1226 /* MUST be present AND non-empty */
1227 msg_Dbg (p_obj, "missing SDP session name");
1230 assert (p_sdp->psz_sessionname == NULL); // no memleak here
1231 p_sdp->psz_sessionname = strdup (data);
1232 if (p_sdp->psz_sessionname == NULL)
1234 EnsureUTF8 (p_sdp->psz_sessionname);
1258 if (ParseSDPConnection (data, &glob_addr, &glob_len,
1261 msg_Dbg (p_obj, "SDP connection infos not supported: "
1268 assert (expect == 'B');
1275 msg_Dbg (p_obj, "missing SDP time description");
1281 if ((cat == 't') || (cat == 'r'))
1296 attribute_t *p_attr = MakeAttribute (data);
1297 TAB_APPEND( p_sdp->i_attributes, p_sdp->pp_attributes, p_attr );
1301 /* Media description */
1308 msg_Dbg (p_obj, "missing SDP media description");
1311 struct sdp_media_t *m;
1312 m = realloc (p_sdp->mediav, (p_sdp->mediac + 1) * sizeof (*m));
1320 memset (m, 0, sizeof (*m));
1321 memcpy (&m->addr, &glob_addr, m->addrlen = glob_len);
1322 m->n_addr = glob_count;
1324 /* TODO: remember media type (if we need multiple medias) */
1325 data = strchr (data, ' ');
1328 msg_Dbg (p_obj, "missing SDP media port");
1331 port = atoi (++data);
1332 if (port <= 0 || port >= 65536)
1334 msg_Dbg (p_obj, "invalid transport port %d", port);
1337 net_SetPort ((struct sockaddr *)&m->addr, htons (port));
1339 data = strchr (data, ' ');
1342 msg_Dbg (p_obj, "missing SDP media format");
1345 m->fmt = strdup (++data);
1359 struct sdp_media_t *m = p_sdp->mediav + p_sdp->mediac - 1;
1360 if (ParseSDPConnection (data, &m->addr, &m->addrlen,
1363 msg_Dbg (p_obj, "SDP connection infos not supported: "
1367 net_SetPort ((struct sockaddr *)&m->addr, htons (port));
1379 assert (expect == 'a');
1382 attribute_t *p_attr = MakeAttribute (data);
1386 TAB_APPEND (p_sdp->mediav[p_sdp->mediac - 1].i_attributes,
1387 p_sdp->mediav[p_sdp->mediac - 1].pp_attributes, p_attr);
1396 msg_Dbg (p_obj, "unexpected SDP line: 0x%02x", (int)cat);
1402 msg_Err (p_obj, "*** BUG in SDP parser! ***");
1414 static int InitSocket( services_discovery_t *p_sd, const char *psz_address,
1417 int i_fd = net_ListenUDP1 ((vlc_object_t *)p_sd, psz_address, i_port);
1419 return VLC_EGENERIC;
1421 shutdown( i_fd, SHUT_WR );
1422 INSERT_ELEM (p_sd->p_sys->pi_fd, p_sd->p_sys->i_fd,
1423 p_sd->p_sys->i_fd, i_fd);
1427 static int Decompress( const unsigned char *psz_src, unsigned char **_dst, int i_len )
1430 int i_result, i_dstsize, n = 0;
1431 unsigned char *psz_dst = NULL;
1434 memset (&d_stream, 0, sizeof (d_stream));
1436 i_result = inflateInit(&d_stream);
1437 if( i_result != Z_OK )
1440 d_stream.next_in = (Bytef *)psz_src;
1441 d_stream.avail_in = i_len;
1446 psz_dst = (unsigned char *)realloc( psz_dst, n * 1000 );
1447 d_stream.next_out = (Bytef *)&psz_dst[(n - 1) * 1000];
1448 d_stream.avail_out = 1000;
1450 i_result = inflate(&d_stream, Z_NO_FLUSH);
1451 if( ( i_result != Z_OK ) && ( i_result != Z_STREAM_END ) )
1453 inflateEnd( &d_stream );
1458 while( ( d_stream.avail_out == 0 ) && ( d_stream.avail_in != 0 ) &&
1459 ( i_result != Z_STREAM_END ) );
1461 i_dstsize = d_stream.total_out;
1462 inflateEnd( &d_stream );
1464 *_dst = (unsigned char *)realloc( psz_dst, i_dstsize );
1476 static void FreeSDP( sdp_t *p_sdp )
1478 free( p_sdp->psz_sessionname );
1479 free( p_sdp->psz_uri );
1481 for (unsigned j = 0; j < p_sdp->mediac; j++)
1483 free (p_sdp->mediav[j].fmt);
1484 for (int i = 0; i < p_sdp->mediav[j].i_attributes; i++)
1485 FreeAttribute (p_sdp->mediav[j].pp_attributes[i]);
1486 free (p_sdp->mediav[j].pp_attributes);
1488 free (p_sdp->mediav);
1490 for (int i = 0; i < p_sdp->i_attributes; i++)
1491 FreeAttribute (p_sdp->pp_attributes[i]);
1493 free (p_sdp->pp_attributes);
1497 static int RemoveAnnounce( services_discovery_t *p_sd,
1498 sap_announce_t *p_announce )
1502 if( p_announce->p_sdp )
1504 FreeSDP( p_announce->p_sdp );
1505 p_announce->p_sdp = NULL;
1508 if( p_announce->p_item )
1510 services_discovery_RemoveItem( p_sd, p_announce->p_item );
1511 vlc_gc_decref( p_announce->p_item );
1512 p_announce->p_item = NULL;
1515 for( i = 0; i< p_sd->p_sys->i_announces; i++)
1517 if( p_sd->p_sys->pp_announces[i] == p_announce )
1519 REMOVE_ELEM( p_sd->p_sys->pp_announces, p_sd->p_sys->i_announces,
1530 static bool IsSameSession( sdp_t *p_sdp1, sdp_t *p_sdp2 )
1532 /* A session is identified by
1535 * - network type (which is always IN),
1536 * - address type (currently, this means IP version),
1539 if (strcmp (p_sdp1->username, p_sdp2->username)
1540 || (p_sdp1->session_id != p_sdp2->session_id)
1541 || (p_sdp1->orig_ip_version != p_sdp2->orig_ip_version)
1542 || strcmp (p_sdp1->orig_host, p_sdp2->orig_host))
1549 static inline attribute_t *MakeAttribute (const char *str)
1551 attribute_t *a = malloc (sizeof (*a) + strlen (str) + 1);
1555 strcpy (a->name, str);
1556 EnsureUTF8 (a->name);
1557 char *value = strchr (a->name, ':');
1569 static const char *GetAttribute (attribute_t **tab, unsigned n,
1572 for (unsigned i = 0; i < n; i++)
1573 if (strcasecmp (tab[i]->name, name) == 0)
1574 return tab[i]->value;
1579 static inline void FreeAttribute (attribute_t *a)