blob: e88262fbdc5a1921e7e407b70b85f07d2bd98835 [file] [log] [blame]
wu@webrtc.org91053e72013-08-10 07:18:04 +00001/*
kjellanderb24317b2016-02-10 07:54:43 -08002 * Copyright 2013 The WebRTC project authors. All Rights Reserved.
wu@webrtc.org91053e72013-08-10 07:18:04 +00003 *
kjellanderb24317b2016-02-10 07:54:43 -08004 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
wu@webrtc.org91053e72013-08-10 07:18:04 +00009 */
10
Henrik Kjellander15583c12016-02-10 10:53:12 +010011#include "webrtc/api/webrtcsessiondescriptionfactory.h"
wu@webrtc.org91053e72013-08-10 07:18:04 +000012
kwiberg0eb15ed2015-12-17 03:04:15 -080013#include <utility>
14
Henrik Kjellander15583c12016-02-10 10:53:12 +010015#include "webrtc/api/dtlsidentitystore.h"
16#include "webrtc/api/jsep.h"
17#include "webrtc/api/jsepsessiondescription.h"
18#include "webrtc/api/mediaconstraintsinterface.h"
19#include "webrtc/api/webrtcsession.h"
Henrik Boström5e56c592015-08-11 10:33:13 +020020#include "webrtc/base/sslidentity.h"
wu@webrtc.org91053e72013-08-10 07:18:04 +000021
wu@webrtc.org364f2042013-11-20 21:49:41 +000022using cricket::MediaSessionOptions;
23
wu@webrtc.org91053e72013-08-10 07:18:04 +000024namespace webrtc {
wu@webrtc.org91053e72013-08-10 07:18:04 +000025namespace {
wu@webrtc.org91053e72013-08-10 07:18:04 +000026static const char kFailedDueToIdentityFailed[] =
27 " failed because DTLS identity request failed";
tommi0f620f42015-07-09 03:25:02 -070028static const char kFailedDueToSessionShutdown[] =
29 " failed because the session was shut down";
wu@webrtc.org91053e72013-08-10 07:18:04 +000030
Peter Boström0c4e06b2015-10-07 12:23:21 +020031static const uint64_t kInitSessionVersion = 2;
wu@webrtc.org91053e72013-08-10 07:18:04 +000032
wu@webrtc.org364f2042013-11-20 21:49:41 +000033static bool CompareStream(const MediaSessionOptions::Stream& stream1,
34 const MediaSessionOptions::Stream& stream2) {
35 return stream1.id < stream2.id;
wu@webrtc.org91053e72013-08-10 07:18:04 +000036}
37
wu@webrtc.org364f2042013-11-20 21:49:41 +000038static bool SameId(const MediaSessionOptions::Stream& stream1,
39 const MediaSessionOptions::Stream& stream2) {
40 return stream1.id == stream2.id;
wu@webrtc.org91053e72013-08-10 07:18:04 +000041}
42
43// Checks if each Stream within the |streams| has unique id.
wu@webrtc.org364f2042013-11-20 21:49:41 +000044static bool ValidStreams(const MediaSessionOptions::Streams& streams) {
45 MediaSessionOptions::Streams sorted_streams = streams;
wu@webrtc.org91053e72013-08-10 07:18:04 +000046 std::sort(sorted_streams.begin(), sorted_streams.end(), CompareStream);
wu@webrtc.org364f2042013-11-20 21:49:41 +000047 MediaSessionOptions::Streams::iterator it =
wu@webrtc.org91053e72013-08-10 07:18:04 +000048 std::adjacent_find(sorted_streams.begin(), sorted_streams.end(),
49 SameId);
wu@webrtc.org364f2042013-11-20 21:49:41 +000050 return it == sorted_streams.end();
wu@webrtc.org91053e72013-08-10 07:18:04 +000051}
52
53enum {
54 MSG_CREATE_SESSIONDESCRIPTION_SUCCESS,
Henrik Boström87713d02015-08-25 09:53:21 +020055 MSG_CREATE_SESSIONDESCRIPTION_FAILED,
56 MSG_USE_CONSTRUCTOR_CERTIFICATE
wu@webrtc.org91053e72013-08-10 07:18:04 +000057};
58
buildbot@webrtc.orgd4e598d2014-07-29 17:36:52 +000059struct CreateSessionDescriptionMsg : public rtc::MessageData {
wu@webrtc.org91053e72013-08-10 07:18:04 +000060 explicit CreateSessionDescriptionMsg(
61 webrtc::CreateSessionDescriptionObserver* observer)
62 : observer(observer) {
63 }
64
buildbot@webrtc.orgd4e598d2014-07-29 17:36:52 +000065 rtc::scoped_refptr<webrtc::CreateSessionDescriptionObserver> observer;
wu@webrtc.org91053e72013-08-10 07:18:04 +000066 std::string error;
kwibergd1fe2812016-04-27 06:47:29 -070067 std::unique_ptr<webrtc::SessionDescriptionInterface> description;
wu@webrtc.org91053e72013-08-10 07:18:04 +000068};
wu@webrtc.org91053e72013-08-10 07:18:04 +000069} // namespace
70
jiayl@webrtc.org61e00b02015-03-04 22:17:38 +000071void WebRtcIdentityRequestObserver::OnFailure(int error) {
72 SignalRequestFailed(error);
73}
74
75void WebRtcIdentityRequestObserver::OnSuccess(
76 const std::string& der_cert, const std::string& der_private_key) {
77 std::string pem_cert = rtc::SSLIdentity::DerToPem(
78 rtc::kPemTypeCertificate,
79 reinterpret_cast<const unsigned char*>(der_cert.data()),
80 der_cert.length());
81 std::string pem_key = rtc::SSLIdentity::DerToPem(
82 rtc::kPemTypeRsaPrivateKey,
83 reinterpret_cast<const unsigned char*>(der_private_key.data()),
84 der_private_key.length());
jbauch555604a2016-04-26 03:13:22 -070085 std::unique_ptr<rtc::SSLIdentity> identity(
Henrik Boströmd8281982015-08-27 10:12:24 +020086 rtc::SSLIdentity::FromPEMStrings(pem_key, pem_cert));
kwiberg0eb15ed2015-12-17 03:04:15 -080087 SignalCertificateReady(rtc::RTCCertificate::Create(std::move(identity)));
jiayl@webrtc.org61e00b02015-03-04 22:17:38 +000088}
89
Henrik Boström5e56c592015-08-11 10:33:13 +020090void WebRtcIdentityRequestObserver::OnSuccess(
jbauch555604a2016-04-26 03:13:22 -070091 std::unique_ptr<rtc::SSLIdentity> identity) {
kwiberg0eb15ed2015-12-17 03:04:15 -080092 SignalCertificateReady(rtc::RTCCertificate::Create(std::move(identity)));
jiayl@webrtc.org61e00b02015-03-04 22:17:38 +000093}
94
wu@webrtc.org91053e72013-08-10 07:18:04 +000095// static
96void WebRtcSessionDescriptionFactory::CopyCandidatesFromSessionDescription(
97 const SessionDescriptionInterface* source_desc,
deadbeef0ed85b22016-02-23 17:24:52 -080098 const std::string& content_name,
wu@webrtc.org91053e72013-08-10 07:18:04 +000099 SessionDescriptionInterface* dest_desc) {
deadbeef0ed85b22016-02-23 17:24:52 -0800100 if (!source_desc) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000101 return;
deadbeef0ed85b22016-02-23 17:24:52 -0800102 }
103 const cricket::ContentInfos& contents =
104 source_desc->description()->contents();
105 const cricket::ContentInfo* cinfo =
106 source_desc->description()->GetContentByName(content_name);
107 if (!cinfo) {
108 return;
109 }
110 size_t mediasection_index = static_cast<int>(cinfo - &contents[0]);
111 const IceCandidateCollection* source_candidates =
112 source_desc->candidates(mediasection_index);
113 const IceCandidateCollection* dest_candidates =
114 dest_desc->candidates(mediasection_index);
Taylor Brandstetter4eb1ddd2016-03-01 16:21:07 -0800115 if (!source_candidates || !dest_candidates) {
116 return;
117 }
deadbeef0ed85b22016-02-23 17:24:52 -0800118 for (size_t n = 0; n < source_candidates->count(); ++n) {
119 const IceCandidateInterface* new_candidate = source_candidates->at(n);
120 if (!dest_candidates->HasCandidate(new_candidate)) {
121 dest_desc->AddCandidate(source_candidates->at(n));
wu@webrtc.org91053e72013-08-10 07:18:04 +0000122 }
123 }
124}
125
Henrik Boström87713d02015-08-25 09:53:21 +0200126// Private constructor called by other constructors.
wu@webrtc.org91053e72013-08-10 07:18:04 +0000127WebRtcSessionDescriptionFactory::WebRtcSessionDescriptionFactory(
buildbot@webrtc.orgd4e598d2014-07-29 17:36:52 +0000128 rtc::Thread* signaling_thread,
wu@webrtc.org91053e72013-08-10 07:18:04 +0000129 cricket::ChannelManager* channel_manager,
kwibergd1fe2812016-04-27 06:47:29 -0700130 std::unique_ptr<DtlsIdentityStoreInterface> dtls_identity_store,
Henrik Boström87713d02015-08-25 09:53:21 +0200131 const rtc::scoped_refptr<WebRtcIdentityRequestObserver>&
132 identity_request_observer,
wu@webrtc.org91053e72013-08-10 07:18:04 +0000133 WebRtcSession* session,
134 const std::string& session_id,
sergeyu@chromium.orga59696b2013-09-13 23:48:58 +0000135 bool dtls_enabled)
wu@webrtc.org91053e72013-08-10 07:18:04 +0000136 : signaling_thread_(signaling_thread),
wu@webrtc.org91053e72013-08-10 07:18:04 +0000137 session_desc_factory_(channel_manager, &transport_desc_factory_),
138 // RFC 4566 suggested a Network Time Protocol (NTP) format timestamp
139 // as the session id and session version. To simplify, it should be fine
140 // to just use a random number as session id and start version from
141 // |kInitSessionVersion|.
142 session_version_(kInitSessionVersion),
kwiberg0eb15ed2015-12-17 03:04:15 -0800143 dtls_identity_store_(std::move(dtls_identity_store)),
Henrik Boström87713d02015-08-25 09:53:21 +0200144 identity_request_observer_(identity_request_observer),
wu@webrtc.org91053e72013-08-10 07:18:04 +0000145 session_(session),
146 session_id_(session_id),
Henrik Boström87713d02015-08-25 09:53:21 +0200147 certificate_request_state_(CERTIFICATE_NOT_NEEDED) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000148 session_desc_factory_.set_add_legacy_streams(false);
henrike@webrtc.orgb90991d2014-03-04 19:54:57 +0000149 // SRTP-SDES is disabled if DTLS is on.
150 SetSdesPolicy(dtls_enabled ? cricket::SEC_DISABLED : cricket::SEC_REQUIRED);
Henrik Boström87713d02015-08-25 09:53:21 +0200151}
wu@webrtc.org91053e72013-08-10 07:18:04 +0000152
Henrik Boström87713d02015-08-25 09:53:21 +0200153WebRtcSessionDescriptionFactory::WebRtcSessionDescriptionFactory(
154 rtc::Thread* signaling_thread,
155 cricket::ChannelManager* channel_manager,
Henrik Boström87713d02015-08-25 09:53:21 +0200156 WebRtcSession* session,
deadbeefab9b2d12015-10-14 11:33:11 -0700157 const std::string& session_id)
deadbeefcbecd352015-09-23 11:50:27 -0700158 : WebRtcSessionDescriptionFactory(signaling_thread,
159 channel_manager,
deadbeefcbecd352015-09-23 11:50:27 -0700160 nullptr,
161 nullptr,
162 session,
163 session_id,
deadbeefcbecd352015-09-23 11:50:27 -0700164 false) {
Henrik Boström87713d02015-08-25 09:53:21 +0200165 LOG(LS_VERBOSE) << "DTLS-SRTP disabled.";
166}
wu@webrtc.org91053e72013-08-10 07:18:04 +0000167
Henrik Boström87713d02015-08-25 09:53:21 +0200168WebRtcSessionDescriptionFactory::WebRtcSessionDescriptionFactory(
169 rtc::Thread* signaling_thread,
170 cricket::ChannelManager* channel_manager,
kwibergd1fe2812016-04-27 06:47:29 -0700171 std::unique_ptr<DtlsIdentityStoreInterface> dtls_identity_store,
Henrik Boström87713d02015-08-25 09:53:21 +0200172 WebRtcSession* session,
deadbeefab9b2d12015-10-14 11:33:11 -0700173 const std::string& session_id)
Henrik Boström87713d02015-08-25 09:53:21 +0200174 : WebRtcSessionDescriptionFactory(
deadbeefab9b2d12015-10-14 11:33:11 -0700175 signaling_thread,
176 channel_manager,
kwiberg0eb15ed2015-12-17 03:04:15 -0800177 std::move(dtls_identity_store),
deadbeefab9b2d12015-10-14 11:33:11 -0700178 new rtc::RefCountedObject<WebRtcIdentityRequestObserver>(),
179 session,
180 session_id,
181 true) {
henrikg91d6ede2015-09-17 00:24:34 -0700182 RTC_DCHECK(dtls_identity_store_);
wu@webrtc.org91053e72013-08-10 07:18:04 +0000183
Henrik Boström87713d02015-08-25 09:53:21 +0200184 certificate_request_state_ = CERTIFICATE_WAITING;
wu@webrtc.org364f2042013-11-20 21:49:41 +0000185
Henrik Boström87713d02015-08-25 09:53:21 +0200186 identity_request_observer_->SignalRequestFailed.connect(
187 this, &WebRtcSessionDescriptionFactory::OnIdentityRequestFailed);
Henrik Boströmd8281982015-08-27 10:12:24 +0200188 identity_request_observer_->SignalCertificateReady.connect(
189 this, &WebRtcSessionDescriptionFactory::SetCertificate);
Henrik Boström87713d02015-08-25 09:53:21 +0200190
hbos25359e02016-03-02 07:55:53 -0800191 rtc::KeyParams key_params = rtc::KeyParams();
Henrik Boström87713d02015-08-25 09:53:21 +0200192 LOG(LS_VERBOSE) << "DTLS-SRTP enabled; sending DTLS identity request (key "
hbos25359e02016-03-02 07:55:53 -0800193 << "type: " << key_params.type() << ").";
Henrik Boström87713d02015-08-25 09:53:21 +0200194
195 // Request identity. This happens asynchronously, so the caller will have a
196 // chance to connect to SignalIdentityReady.
hbos25359e02016-03-02 07:55:53 -0800197 dtls_identity_store_->RequestIdentity(key_params,
198 rtc::Optional<uint64_t>(),
199 identity_request_observer_);
Henrik Boström87713d02015-08-25 09:53:21 +0200200}
201
202WebRtcSessionDescriptionFactory::WebRtcSessionDescriptionFactory(
203 rtc::Thread* signaling_thread,
204 cricket::ChannelManager* channel_manager,
Henrik Boström87713d02015-08-25 09:53:21 +0200205 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate,
206 WebRtcSession* session,
deadbeefab9b2d12015-10-14 11:33:11 -0700207 const std::string& session_id)
208 : WebRtcSessionDescriptionFactory(signaling_thread,
209 channel_manager,
210 nullptr,
211 nullptr,
212 session,
213 session_id,
214 true) {
henrikg91d6ede2015-09-17 00:24:34 -0700215 RTC_DCHECK(certificate);
Henrik Boström87713d02015-08-25 09:53:21 +0200216
217 certificate_request_state_ = CERTIFICATE_WAITING;
218
219 LOG(LS_VERBOSE) << "DTLS-SRTP enabled; has certificate parameter.";
220 // We already have a certificate but we wait to do SetIdentity; if we do
221 // it in the constructor then the caller has not had a chance to connect to
222 // SignalIdentityReady.
deadbeefcbecd352015-09-23 11:50:27 -0700223 signaling_thread_->Post(
224 this, MSG_USE_CONSTRUCTOR_CERTIFICATE,
225 new rtc::ScopedRefMessageData<rtc::RTCCertificate>(certificate));
wu@webrtc.org91053e72013-08-10 07:18:04 +0000226}
227
228WebRtcSessionDescriptionFactory::~WebRtcSessionDescriptionFactory() {
tommi0f620f42015-07-09 03:25:02 -0700229 ASSERT(signaling_thread_->IsCurrent());
230
231 // Fail any requests that were asked for before identity generation completed.
232 FailPendingRequests(kFailedDueToSessionShutdown);
233
234 // Process all pending notifications in the message queue. If we don't do
235 // this, requests will linger and not know they succeeded or failed.
236 rtc::MessageList list;
237 signaling_thread_->Clear(this, rtc::MQID_ANY, &list);
Henrik Boström87713d02015-08-25 09:53:21 +0200238 for (auto& msg : list) {
239 if (msg.message_id != MSG_USE_CONSTRUCTOR_CERTIFICATE) {
240 OnMessage(&msg);
241 } else {
242 // Skip MSG_USE_CONSTRUCTOR_CERTIFICATE because we don't want to trigger
243 // SetIdentity-related callbacks in the destructor. This can be a problem
244 // when WebRtcSession listens to the callback but it was the WebRtcSession
245 // destructor that caused WebRtcSessionDescriptionFactory's destruction.
246 // The callback is then ignored, leaking memory allocated by OnMessage for
247 // MSG_USE_CONSTRUCTOR_CERTIFICATE.
248 delete msg.pdata;
249 }
250 }
wu@webrtc.org91053e72013-08-10 07:18:04 +0000251}
252
253void WebRtcSessionDescriptionFactory::CreateOffer(
254 CreateSessionDescriptionObserver* observer,
deadbeefab9b2d12015-10-14 11:33:11 -0700255 const PeerConnectionInterface::RTCOfferAnswerOptions& options,
256 const cricket::MediaSessionOptions& session_options) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000257 std::string error = "CreateOffer";
Henrik Boström87713d02015-08-25 09:53:21 +0200258 if (certificate_request_state_ == CERTIFICATE_FAILED) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000259 error += kFailedDueToIdentityFailed;
260 LOG(LS_ERROR) << error;
261 PostCreateSessionDescriptionFailed(observer, error);
262 return;
263 }
264
jiayl@webrtc.orgb18bf5e2014-08-04 18:34:16 +0000265 if (!ValidStreams(session_options.streams)) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000266 error += " called with invalid media streams.";
267 LOG(LS_ERROR) << error;
268 PostCreateSessionDescriptionFailed(observer, error);
269 return;
270 }
271
wu@webrtc.org91053e72013-08-10 07:18:04 +0000272 CreateSessionDescriptionRequest request(
jiayl@webrtc.orgb18bf5e2014-08-04 18:34:16 +0000273 CreateSessionDescriptionRequest::kOffer, observer, session_options);
Henrik Boström87713d02015-08-25 09:53:21 +0200274 if (certificate_request_state_ == CERTIFICATE_WAITING) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000275 create_session_description_requests_.push(request);
276 } else {
Henrik Boström87713d02015-08-25 09:53:21 +0200277 ASSERT(certificate_request_state_ == CERTIFICATE_SUCCEEDED ||
278 certificate_request_state_ == CERTIFICATE_NOT_NEEDED);
wu@webrtc.org91053e72013-08-10 07:18:04 +0000279 InternalCreateOffer(request);
280 }
281}
282
283void WebRtcSessionDescriptionFactory::CreateAnswer(
284 CreateSessionDescriptionObserver* observer,
deadbeefab9b2d12015-10-14 11:33:11 -0700285 const cricket::MediaSessionOptions& session_options) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000286 std::string error = "CreateAnswer";
Henrik Boström87713d02015-08-25 09:53:21 +0200287 if (certificate_request_state_ == CERTIFICATE_FAILED) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000288 error += kFailedDueToIdentityFailed;
289 LOG(LS_ERROR) << error;
290 PostCreateSessionDescriptionFailed(observer, error);
291 return;
292 }
293 if (!session_->remote_description()) {
294 error += " can't be called before SetRemoteDescription.";
295 LOG(LS_ERROR) << error;
296 PostCreateSessionDescriptionFailed(observer, error);
297 return;
298 }
299 if (session_->remote_description()->type() !=
300 JsepSessionDescription::kOffer) {
301 error += " failed because remote_description is not an offer.";
302 LOG(LS_ERROR) << error;
303 PostCreateSessionDescriptionFailed(observer, error);
304 return;
305 }
306
deadbeefab9b2d12015-10-14 11:33:11 -0700307 if (!ValidStreams(session_options.streams)) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000308 error += " called with invalid media streams.";
309 LOG(LS_ERROR) << error;
310 PostCreateSessionDescriptionFailed(observer, error);
311 return;
312 }
wu@webrtc.org91053e72013-08-10 07:18:04 +0000313
314 CreateSessionDescriptionRequest request(
deadbeefab9b2d12015-10-14 11:33:11 -0700315 CreateSessionDescriptionRequest::kAnswer, observer, session_options);
Henrik Boström87713d02015-08-25 09:53:21 +0200316 if (certificate_request_state_ == CERTIFICATE_WAITING) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000317 create_session_description_requests_.push(request);
318 } else {
Henrik Boström87713d02015-08-25 09:53:21 +0200319 ASSERT(certificate_request_state_ == CERTIFICATE_SUCCEEDED ||
320 certificate_request_state_ == CERTIFICATE_NOT_NEEDED);
wu@webrtc.org91053e72013-08-10 07:18:04 +0000321 InternalCreateAnswer(request);
322 }
323}
324
henrike@webrtc.orgb90991d2014-03-04 19:54:57 +0000325void WebRtcSessionDescriptionFactory::SetSdesPolicy(
326 cricket::SecurePolicy secure_policy) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000327 session_desc_factory_.set_secure(secure_policy);
328}
329
henrike@webrtc.orgb90991d2014-03-04 19:54:57 +0000330cricket::SecurePolicy WebRtcSessionDescriptionFactory::SdesPolicy() const {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000331 return session_desc_factory_.secure();
332}
333
buildbot@webrtc.orgd4e598d2014-07-29 17:36:52 +0000334void WebRtcSessionDescriptionFactory::OnMessage(rtc::Message* msg) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000335 switch (msg->message_id) {
336 case MSG_CREATE_SESSIONDESCRIPTION_SUCCESS: {
337 CreateSessionDescriptionMsg* param =
338 static_cast<CreateSessionDescriptionMsg*>(msg->pdata);
339 param->observer->OnSuccess(param->description.release());
340 delete param;
341 break;
342 }
343 case MSG_CREATE_SESSIONDESCRIPTION_FAILED: {
344 CreateSessionDescriptionMsg* param =
345 static_cast<CreateSessionDescriptionMsg*>(msg->pdata);
346 param->observer->OnFailure(param->error);
347 delete param;
348 break;
349 }
Henrik Boström87713d02015-08-25 09:53:21 +0200350 case MSG_USE_CONSTRUCTOR_CERTIFICATE: {
351 rtc::ScopedRefMessageData<rtc::RTCCertificate>* param =
352 static_cast<rtc::ScopedRefMessageData<rtc::RTCCertificate>*>(
353 msg->pdata);
354 LOG(LS_INFO) << "Using certificate supplied to the constructor.";
Henrik Boströmd8281982015-08-27 10:12:24 +0200355 SetCertificate(param->data());
Henrik Boström87713d02015-08-25 09:53:21 +0200356 delete param;
357 break;
358 }
wu@webrtc.org91053e72013-08-10 07:18:04 +0000359 default:
360 ASSERT(false);
361 break;
362 }
363}
364
365void WebRtcSessionDescriptionFactory::InternalCreateOffer(
366 CreateSessionDescriptionRequest request) {
deadbeefd59daf82015-10-14 15:02:44 -0700367 cricket::SessionDescription* desc(session_desc_factory_.CreateOffer(
368 request.options, session_->local_description()
369 ? session_->local_description()->description()
370 : nullptr));
wu@webrtc.org91053e72013-08-10 07:18:04 +0000371 // RFC 3264
372 // When issuing an offer that modifies the session,
373 // the "o=" line of the new SDP MUST be identical to that in the
374 // previous SDP, except that the version in the origin field MUST
375 // increment by one from the previous SDP.
376
377 // Just increase the version number by one each time when a new offer
378 // is created regardless if it's identical to the previous one or not.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200379 // The |session_version_| is a uint64_t, the wrap around should not happen.
wu@webrtc.org91053e72013-08-10 07:18:04 +0000380 ASSERT(session_version_ + 1 > session_version_);
381 JsepSessionDescription* offer(new JsepSessionDescription(
382 JsepSessionDescription::kOffer));
383 if (!offer->Initialize(desc, session_id_,
buildbot@webrtc.orgd4e598d2014-07-29 17:36:52 +0000384 rtc::ToString(session_version_++))) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000385 delete offer;
henrike@webrtc.orgb90991d2014-03-04 19:54:57 +0000386 PostCreateSessionDescriptionFailed(request.observer,
387 "Failed to initialize the offer.");
wu@webrtc.org91053e72013-08-10 07:18:04 +0000388 return;
389 }
deadbeef0ed85b22016-02-23 17:24:52 -0800390 if (session_->local_description()) {
391 for (const cricket::ContentInfo& content :
392 session_->local_description()->description()->contents()) {
393 // Include all local ICE candidates in the SessionDescription unless
394 // the remote peer has requested an ICE restart.
395 if (!request.options.transport_options[content.name].ice_restart) {
396 CopyCandidatesFromSessionDescription(session_->local_description(),
397 content.name, offer);
398 }
399 }
wu@webrtc.org91053e72013-08-10 07:18:04 +0000400 }
401 PostCreateSessionDescriptionSucceeded(request.observer, offer);
402}
403
404void WebRtcSessionDescriptionFactory::InternalCreateAnswer(
405 CreateSessionDescriptionRequest request) {
deadbeef0ed85b22016-02-23 17:24:52 -0800406 if (session_->remote_description()) {
407 for (const cricket::ContentInfo& content :
408 session_->remote_description()->description()->contents()) {
409 // According to http://tools.ietf.org/html/rfc5245#section-9.2.1.1
410 // an answer should also contain new ICE ufrag and password if an offer
411 // has been received with new ufrag and password.
412 request.options.transport_options[content.name].ice_restart =
413 session_->IceRestartPending(content.name);
414 // We should pass the current SSL role to the transport description
415 // factory, if there is already an existing ongoing session.
416 rtc::SSLRole ssl_role;
417 if (session_->GetSslRole(session_->GetChannel(content.name), &ssl_role)) {
418 request.options.transport_options[content.name].prefer_passive_role =
419 (rtc::SSL_SERVER == ssl_role);
420 }
421 }
sergeyu@chromium.org0be6aa02013-08-23 23:21:25 +0000422 }
wu@webrtc.org91053e72013-08-10 07:18:04 +0000423
424 cricket::SessionDescription* desc(session_desc_factory_.CreateAnswer(
deadbeefd59daf82015-10-14 15:02:44 -0700425 session_->remote_description()
426 ? session_->remote_description()->description()
427 : nullptr,
428 request.options, session_->local_description()
429 ? session_->local_description()->description()
430 : nullptr));
wu@webrtc.org91053e72013-08-10 07:18:04 +0000431 // RFC 3264
432 // If the answer is different from the offer in any way (different IP
433 // addresses, ports, etc.), the origin line MUST be different in the answer.
434 // In that case, the version number in the "o=" line of the answer is
435 // unrelated to the version number in the o line of the offer.
436 // Get a new version number by increasing the |session_version_answer_|.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200437 // The |session_version_| is a uint64_t, the wrap around should not happen.
wu@webrtc.org91053e72013-08-10 07:18:04 +0000438 ASSERT(session_version_ + 1 > session_version_);
439 JsepSessionDescription* answer(new JsepSessionDescription(
440 JsepSessionDescription::kAnswer));
441 if (!answer->Initialize(desc, session_id_,
buildbot@webrtc.orgd4e598d2014-07-29 17:36:52 +0000442 rtc::ToString(session_version_++))) {
wu@webrtc.org91053e72013-08-10 07:18:04 +0000443 delete answer;
444 PostCreateSessionDescriptionFailed(request.observer,
henrike@webrtc.orgb90991d2014-03-04 19:54:57 +0000445 "Failed to initialize the answer.");
wu@webrtc.org91053e72013-08-10 07:18:04 +0000446 return;
447 }
deadbeef0ed85b22016-02-23 17:24:52 -0800448 if (session_->local_description()) {
449 for (const cricket::ContentInfo& content :
450 session_->local_description()->description()->contents()) {
451 // Include all local ICE candidates in the SessionDescription unless
452 // the remote peer has requested an ICE restart.
453 if (!request.options.transport_options[content.name].ice_restart) {
454 CopyCandidatesFromSessionDescription(session_->local_description(),
455 content.name, answer);
456 }
457 }
wu@webrtc.org91053e72013-08-10 07:18:04 +0000458 }
wu@webrtc.org91053e72013-08-10 07:18:04 +0000459 PostCreateSessionDescriptionSucceeded(request.observer, answer);
460}
461
tommi0f620f42015-07-09 03:25:02 -0700462void WebRtcSessionDescriptionFactory::FailPendingRequests(
463 const std::string& reason) {
464 ASSERT(signaling_thread_->IsCurrent());
465 while (!create_session_description_requests_.empty()) {
466 const CreateSessionDescriptionRequest& request =
467 create_session_description_requests_.front();
468 PostCreateSessionDescriptionFailed(request.observer,
469 ((request.type == CreateSessionDescriptionRequest::kOffer) ?
470 "CreateOffer" : "CreateAnswer") + reason);
471 create_session_description_requests_.pop();
472 }
473}
474
wu@webrtc.org91053e72013-08-10 07:18:04 +0000475void WebRtcSessionDescriptionFactory::PostCreateSessionDescriptionFailed(
476 CreateSessionDescriptionObserver* observer, const std::string& error) {
477 CreateSessionDescriptionMsg* msg = new CreateSessionDescriptionMsg(observer);
478 msg->error = error;
479 signaling_thread_->Post(this, MSG_CREATE_SESSIONDESCRIPTION_FAILED, msg);
henrike@webrtc.orgb90991d2014-03-04 19:54:57 +0000480 LOG(LS_ERROR) << "Create SDP failed: " << error;
wu@webrtc.org91053e72013-08-10 07:18:04 +0000481}
482
483void WebRtcSessionDescriptionFactory::PostCreateSessionDescriptionSucceeded(
484 CreateSessionDescriptionObserver* observer,
485 SessionDescriptionInterface* description) {
486 CreateSessionDescriptionMsg* msg = new CreateSessionDescriptionMsg(observer);
487 msg->description.reset(description);
488 signaling_thread_->Post(this, MSG_CREATE_SESSIONDESCRIPTION_SUCCESS, msg);
489}
490
491void WebRtcSessionDescriptionFactory::OnIdentityRequestFailed(int error) {
492 ASSERT(signaling_thread_->IsCurrent());
493
494 LOG(LS_ERROR) << "Async identity request failed: error = " << error;
Henrik Boström87713d02015-08-25 09:53:21 +0200495 certificate_request_state_ = CERTIFICATE_FAILED;
wu@webrtc.org91053e72013-08-10 07:18:04 +0000496
tommi0f620f42015-07-09 03:25:02 -0700497 FailPendingRequests(kFailedDueToIdentityFailed);
wu@webrtc.org91053e72013-08-10 07:18:04 +0000498}
499
Henrik Boströmd8281982015-08-27 10:12:24 +0200500void WebRtcSessionDescriptionFactory::SetCertificate(
501 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) {
henrikg91d6ede2015-09-17 00:24:34 -0700502 RTC_DCHECK(certificate);
Henrik Boströmd8281982015-08-27 10:12:24 +0200503 LOG(LS_VERBOSE) << "Setting new certificate";
jiayl@webrtc.org61e00b02015-03-04 22:17:38 +0000504
Henrik Boström87713d02015-08-25 09:53:21 +0200505 certificate_request_state_ = CERTIFICATE_SUCCEEDED;
Henrik Boströmd8281982015-08-27 10:12:24 +0200506 SignalCertificateReady(certificate);
wu@webrtc.org91053e72013-08-10 07:18:04 +0000507
Henrik Boström3a14bf32015-08-31 09:27:58 +0200508 transport_desc_factory_.set_certificate(certificate);
wu@webrtc.org91053e72013-08-10 07:18:04 +0000509 transport_desc_factory_.set_secure(cricket::SEC_ENABLED);
510
511 while (!create_session_description_requests_.empty()) {
512 if (create_session_description_requests_.front().type ==
513 CreateSessionDescriptionRequest::kOffer) {
514 InternalCreateOffer(create_session_description_requests_.front());
515 } else {
516 InternalCreateAnswer(create_session_description_requests_.front());
517 }
518 create_session_description_requests_.pop();
519 }
520}
wu@webrtc.org91053e72013-08-10 07:18:04 +0000521} // namespace webrtc