blob: f6414d314e2644df0ecefa37f02faae30c1c1b17 [file] [log] [blame]
wu@webrtc.org91053e72013-08-10 07:18:041/*
2 * libjingle
jlmiller@webrtc.org5f93d0a2015-01-20 21:36:133 * Copyright 2013 Google Inc.
wu@webrtc.org91053e72013-08-10 07:18:044 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions are met:
7 *
8 * 1. Redistributions of source code must retain the above copyright notice,
9 * this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright notice,
11 * this list of conditions and the following disclaimer in the documentation
12 * and/or other materials provided with the distribution.
13 * 3. The name of the author may not be used to endorse or promote products
14 * derived from this software without specific prior written permission.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
17 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
18 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO
19 * EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
20 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO,
21 * PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
22 * OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
23 * WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR
24 * OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
25 * ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
26 */
27
28#include "talk/app/webrtc/webrtcsessiondescriptionfactory.h"
29
jiayl@webrtc.org61e00b02015-03-04 22:17:3830#include "talk/app/webrtc/dtlsidentitystore.h"
wu@webrtc.org91053e72013-08-10 07:18:0431#include "talk/app/webrtc/jsep.h"
32#include "talk/app/webrtc/jsepsessiondescription.h"
33#include "talk/app/webrtc/mediaconstraintsinterface.h"
34#include "talk/app/webrtc/mediastreamsignaling.h"
35#include "talk/app/webrtc/webrtcsession.h"
Henrik Boström5e56c592015-08-11 08:33:1336#include "webrtc/base/sslidentity.h"
wu@webrtc.org91053e72013-08-10 07:18:0437
wu@webrtc.org364f2042013-11-20 21:49:4138using cricket::MediaSessionOptions;
39
wu@webrtc.org91053e72013-08-10 07:18:0440namespace webrtc {
wu@webrtc.org91053e72013-08-10 07:18:0441namespace {
wu@webrtc.org91053e72013-08-10 07:18:0442static const char kFailedDueToIdentityFailed[] =
43 " failed because DTLS identity request failed";
tommi0f620f42015-07-09 10:25:0244static const char kFailedDueToSessionShutdown[] =
45 " failed because the session was shut down";
wu@webrtc.org91053e72013-08-10 07:18:0446
wu@webrtc.org91053e72013-08-10 07:18:0447static const uint64 kInitSessionVersion = 2;
48
wu@webrtc.org364f2042013-11-20 21:49:4149static bool CompareStream(const MediaSessionOptions::Stream& stream1,
50 const MediaSessionOptions::Stream& stream2) {
51 return stream1.id < stream2.id;
wu@webrtc.org91053e72013-08-10 07:18:0452}
53
wu@webrtc.org364f2042013-11-20 21:49:4154static bool SameId(const MediaSessionOptions::Stream& stream1,
55 const MediaSessionOptions::Stream& stream2) {
56 return stream1.id == stream2.id;
wu@webrtc.org91053e72013-08-10 07:18:0457}
58
59// Checks if each Stream within the |streams| has unique id.
wu@webrtc.org364f2042013-11-20 21:49:4160static bool ValidStreams(const MediaSessionOptions::Streams& streams) {
61 MediaSessionOptions::Streams sorted_streams = streams;
wu@webrtc.org91053e72013-08-10 07:18:0462 std::sort(sorted_streams.begin(), sorted_streams.end(), CompareStream);
wu@webrtc.org364f2042013-11-20 21:49:4163 MediaSessionOptions::Streams::iterator it =
wu@webrtc.org91053e72013-08-10 07:18:0464 std::adjacent_find(sorted_streams.begin(), sorted_streams.end(),
65 SameId);
wu@webrtc.org364f2042013-11-20 21:49:4166 return it == sorted_streams.end();
wu@webrtc.org91053e72013-08-10 07:18:0467}
68
69enum {
70 MSG_CREATE_SESSIONDESCRIPTION_SUCCESS,
Henrik Boström87713d02015-08-25 07:53:2171 MSG_CREATE_SESSIONDESCRIPTION_FAILED,
72 MSG_USE_CONSTRUCTOR_CERTIFICATE
wu@webrtc.org91053e72013-08-10 07:18:0473};
74
buildbot@webrtc.orgd4e598d2014-07-29 17:36:5275struct CreateSessionDescriptionMsg : public rtc::MessageData {
wu@webrtc.org91053e72013-08-10 07:18:0476 explicit CreateSessionDescriptionMsg(
77 webrtc::CreateSessionDescriptionObserver* observer)
78 : observer(observer) {
79 }
80
buildbot@webrtc.orgd4e598d2014-07-29 17:36:5281 rtc::scoped_refptr<webrtc::CreateSessionDescriptionObserver> observer;
wu@webrtc.org91053e72013-08-10 07:18:0482 std::string error;
buildbot@webrtc.orgd4e598d2014-07-29 17:36:5283 rtc::scoped_ptr<webrtc::SessionDescriptionInterface> description;
wu@webrtc.org91053e72013-08-10 07:18:0484};
wu@webrtc.org91053e72013-08-10 07:18:0485} // namespace
86
jiayl@webrtc.org61e00b02015-03-04 22:17:3887void WebRtcIdentityRequestObserver::OnFailure(int error) {
88 SignalRequestFailed(error);
89}
90
91void WebRtcIdentityRequestObserver::OnSuccess(
92 const std::string& der_cert, const std::string& der_private_key) {
93 std::string pem_cert = rtc::SSLIdentity::DerToPem(
94 rtc::kPemTypeCertificate,
95 reinterpret_cast<const unsigned char*>(der_cert.data()),
96 der_cert.length());
97 std::string pem_key = rtc::SSLIdentity::DerToPem(
98 rtc::kPemTypeRsaPrivateKey,
99 reinterpret_cast<const unsigned char*>(der_private_key.data()),
100 der_private_key.length());
Henrik Boströmd8281982015-08-27 08:12:24101 rtc::scoped_ptr<rtc::SSLIdentity> identity(
102 rtc::SSLIdentity::FromPEMStrings(pem_key, pem_cert));
103 SignalCertificateReady(rtc::RTCCertificate::Create(identity.Pass()));
jiayl@webrtc.org61e00b02015-03-04 22:17:38104}
105
Henrik Boström5e56c592015-08-11 08:33:13106void WebRtcIdentityRequestObserver::OnSuccess(
jiayl@webrtc.org61e00b02015-03-04 22:17:38107 rtc::scoped_ptr<rtc::SSLIdentity> identity) {
Henrik Boströmd8281982015-08-27 08:12:24108 SignalCertificateReady(rtc::RTCCertificate::Create(identity.Pass()));
jiayl@webrtc.org61e00b02015-03-04 22:17:38109}
110
wu@webrtc.org91053e72013-08-10 07:18:04111// static
112void WebRtcSessionDescriptionFactory::CopyCandidatesFromSessionDescription(
113 const SessionDescriptionInterface* source_desc,
114 SessionDescriptionInterface* dest_desc) {
115 if (!source_desc)
116 return;
117 for (size_t m = 0; m < source_desc->number_of_mediasections() &&
118 m < dest_desc->number_of_mediasections(); ++m) {
119 const IceCandidateCollection* source_candidates =
120 source_desc->candidates(m);
121 const IceCandidateCollection* dest_candidates = dest_desc->candidates(m);
122 for (size_t n = 0; n < source_candidates->count(); ++n) {
123 const IceCandidateInterface* new_candidate = source_candidates->at(n);
124 if (!dest_candidates->HasCandidate(new_candidate))
125 dest_desc->AddCandidate(source_candidates->at(n));
126 }
127 }
128}
129
Henrik Boström87713d02015-08-25 07:53:21130// Private constructor called by other constructors.
wu@webrtc.org91053e72013-08-10 07:18:04131WebRtcSessionDescriptionFactory::WebRtcSessionDescriptionFactory(
buildbot@webrtc.orgd4e598d2014-07-29 17:36:52132 rtc::Thread* signaling_thread,
wu@webrtc.org91053e72013-08-10 07:18:04133 cricket::ChannelManager* channel_manager,
134 MediaStreamSignaling* mediastream_signaling,
Henrik Boström5e56c592015-08-11 08:33:13135 rtc::scoped_ptr<DtlsIdentityStoreInterface> dtls_identity_store,
Henrik Boström87713d02015-08-25 07:53:21136 const rtc::scoped_refptr<WebRtcIdentityRequestObserver>&
137 identity_request_observer,
wu@webrtc.org91053e72013-08-10 07:18:04138 WebRtcSession* session,
139 const std::string& session_id,
140 cricket::DataChannelType dct,
sergeyu@chromium.orga59696b2013-09-13 23:48:58141 bool dtls_enabled)
wu@webrtc.org91053e72013-08-10 07:18:04142 : signaling_thread_(signaling_thread),
143 mediastream_signaling_(mediastream_signaling),
144 session_desc_factory_(channel_manager, &transport_desc_factory_),
145 // RFC 4566 suggested a Network Time Protocol (NTP) format timestamp
146 // as the session id and session version. To simplify, it should be fine
147 // to just use a random number as session id and start version from
148 // |kInitSessionVersion|.
149 session_version_(kInitSessionVersion),
Henrik Boström5e56c592015-08-11 08:33:13150 dtls_identity_store_(dtls_identity_store.Pass()),
Henrik Boström87713d02015-08-25 07:53:21151 identity_request_observer_(identity_request_observer),
wu@webrtc.org91053e72013-08-10 07:18:04152 session_(session),
153 session_id_(session_id),
154 data_channel_type_(dct),
Henrik Boström87713d02015-08-25 07:53:21155 certificate_request_state_(CERTIFICATE_NOT_NEEDED) {
wu@webrtc.org91053e72013-08-10 07:18:04156 session_desc_factory_.set_add_legacy_streams(false);
henrike@webrtc.orgb90991d2014-03-04 19:54:57157 // SRTP-SDES is disabled if DTLS is on.
158 SetSdesPolicy(dtls_enabled ? cricket::SEC_DISABLED : cricket::SEC_REQUIRED);
Henrik Boström87713d02015-08-25 07:53:21159}
wu@webrtc.org91053e72013-08-10 07:18:04160
Henrik Boström87713d02015-08-25 07:53:21161WebRtcSessionDescriptionFactory::WebRtcSessionDescriptionFactory(
162 rtc::Thread* signaling_thread,
163 cricket::ChannelManager* channel_manager,
164 MediaStreamSignaling* mediastream_signaling,
165 WebRtcSession* session,
166 const std::string& session_id,
167 cricket::DataChannelType dct)
deadbeef47ee2f32015-09-22 22:08:23168 : WebRtcSessionDescriptionFactory(signaling_thread,
169 channel_manager,
170 mediastream_signaling,
171 nullptr,
172 nullptr,
173 session,
174 session_id,
175 dct,
176 false) {
Henrik Boström87713d02015-08-25 07:53:21177 LOG(LS_VERBOSE) << "DTLS-SRTP disabled.";
178}
wu@webrtc.org91053e72013-08-10 07:18:04179
Henrik Boström87713d02015-08-25 07:53:21180WebRtcSessionDescriptionFactory::WebRtcSessionDescriptionFactory(
181 rtc::Thread* signaling_thread,
182 cricket::ChannelManager* channel_manager,
183 MediaStreamSignaling* mediastream_signaling,
184 rtc::scoped_ptr<DtlsIdentityStoreInterface> dtls_identity_store,
185 WebRtcSession* session,
186 const std::string& session_id,
187 cricket::DataChannelType dct)
188 : WebRtcSessionDescriptionFactory(
189 signaling_thread,
190 channel_manager,
191 mediastream_signaling,
192 dtls_identity_store.Pass(),
193 new rtc::RefCountedObject<WebRtcIdentityRequestObserver>(),
194 session,
195 session_id,
196 dct,
197 true) {
henrikg91d6ede2015-09-17 07:24:34198 RTC_DCHECK(dtls_identity_store_);
wu@webrtc.org91053e72013-08-10 07:18:04199
Henrik Boström87713d02015-08-25 07:53:21200 certificate_request_state_ = CERTIFICATE_WAITING;
wu@webrtc.org364f2042013-11-20 21:49:41201
Henrik Boström87713d02015-08-25 07:53:21202 identity_request_observer_->SignalRequestFailed.connect(
203 this, &WebRtcSessionDescriptionFactory::OnIdentityRequestFailed);
Henrik Boströmd8281982015-08-27 08:12:24204 identity_request_observer_->SignalCertificateReady.connect(
205 this, &WebRtcSessionDescriptionFactory::SetCertificate);
Henrik Boström87713d02015-08-25 07:53:21206
207 rtc::KeyType key_type = rtc::KT_DEFAULT;
208 LOG(LS_VERBOSE) << "DTLS-SRTP enabled; sending DTLS identity request (key "
209 << "type: " << key_type << ").";
210
211 // Request identity. This happens asynchronously, so the caller will have a
212 // chance to connect to SignalIdentityReady.
213 dtls_identity_store_->RequestIdentity(key_type, identity_request_observer_);
214}
215
216WebRtcSessionDescriptionFactory::WebRtcSessionDescriptionFactory(
217 rtc::Thread* signaling_thread,
218 cricket::ChannelManager* channel_manager,
219 MediaStreamSignaling* mediastream_signaling,
220 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate,
221 WebRtcSession* session,
222 const std::string& session_id,
223 cricket::DataChannelType dct)
224 : WebRtcSessionDescriptionFactory(
225 signaling_thread, channel_manager, mediastream_signaling, nullptr,
226 nullptr, session, session_id, dct, true) {
henrikg91d6ede2015-09-17 07:24:34227 RTC_DCHECK(certificate);
Henrik Boström87713d02015-08-25 07:53:21228
229 certificate_request_state_ = CERTIFICATE_WAITING;
230
231 LOG(LS_VERBOSE) << "DTLS-SRTP enabled; has certificate parameter.";
232 // We already have a certificate but we wait to do SetIdentity; if we do
233 // it in the constructor then the caller has not had a chance to connect to
234 // SignalIdentityReady.
deadbeef47ee2f32015-09-22 22:08:23235 signaling_thread_->Post(
236 this, MSG_USE_CONSTRUCTOR_CERTIFICATE,
237 new rtc::ScopedRefMessageData<rtc::RTCCertificate>(certificate));
wu@webrtc.org91053e72013-08-10 07:18:04238}
239
240WebRtcSessionDescriptionFactory::~WebRtcSessionDescriptionFactory() {
tommi0f620f42015-07-09 10:25:02241 ASSERT(signaling_thread_->IsCurrent());
242
243 // Fail any requests that were asked for before identity generation completed.
244 FailPendingRequests(kFailedDueToSessionShutdown);
245
246 // Process all pending notifications in the message queue. If we don't do
247 // this, requests will linger and not know they succeeded or failed.
248 rtc::MessageList list;
249 signaling_thread_->Clear(this, rtc::MQID_ANY, &list);
Henrik Boström87713d02015-08-25 07:53:21250 for (auto& msg : list) {
251 if (msg.message_id != MSG_USE_CONSTRUCTOR_CERTIFICATE) {
252 OnMessage(&msg);
253 } else {
254 // Skip MSG_USE_CONSTRUCTOR_CERTIFICATE because we don't want to trigger
255 // SetIdentity-related callbacks in the destructor. This can be a problem
256 // when WebRtcSession listens to the callback but it was the WebRtcSession
257 // destructor that caused WebRtcSessionDescriptionFactory's destruction.
258 // The callback is then ignored, leaking memory allocated by OnMessage for
259 // MSG_USE_CONSTRUCTOR_CERTIFICATE.
260 delete msg.pdata;
261 }
262 }
wu@webrtc.org91053e72013-08-10 07:18:04263}
264
265void WebRtcSessionDescriptionFactory::CreateOffer(
266 CreateSessionDescriptionObserver* observer,
jiayl@webrtc.orgb18bf5e2014-08-04 18:34:16267 const PeerConnectionInterface::RTCOfferAnswerOptions& options) {
268 cricket::MediaSessionOptions session_options;
269
wu@webrtc.org91053e72013-08-10 07:18:04270 std::string error = "CreateOffer";
Henrik Boström87713d02015-08-25 07:53:21271 if (certificate_request_state_ == CERTIFICATE_FAILED) {
wu@webrtc.org91053e72013-08-10 07:18:04272 error += kFailedDueToIdentityFailed;
273 LOG(LS_ERROR) << error;
274 PostCreateSessionDescriptionFailed(observer, error);
275 return;
276 }
277
jiayl@webrtc.orgb18bf5e2014-08-04 18:34:16278 if (!mediastream_signaling_->GetOptionsForOffer(options,
279 &session_options)) {
280 error += " called with invalid options.";
wu@webrtc.org91053e72013-08-10 07:18:04281 LOG(LS_ERROR) << error;
282 PostCreateSessionDescriptionFailed(observer, error);
283 return;
284 }
285
jiayl@webrtc.orgb18bf5e2014-08-04 18:34:16286 if (!ValidStreams(session_options.streams)) {
wu@webrtc.org91053e72013-08-10 07:18:04287 error += " called with invalid media streams.";
288 LOG(LS_ERROR) << error;
289 PostCreateSessionDescriptionFailed(observer, error);
290 return;
291 }
292
sergeyu@chromium.orga59696b2013-09-13 23:48:58293 if (data_channel_type_ == cricket::DCT_SCTP &&
294 mediastream_signaling_->HasDataChannels()) {
jiayl@webrtc.orgb18bf5e2014-08-04 18:34:16295 session_options.data_channel_type = cricket::DCT_SCTP;
wu@webrtc.org91053e72013-08-10 07:18:04296 }
297
298 CreateSessionDescriptionRequest request(
jiayl@webrtc.orgb18bf5e2014-08-04 18:34:16299 CreateSessionDescriptionRequest::kOffer, observer, session_options);
Henrik Boström87713d02015-08-25 07:53:21300 if (certificate_request_state_ == CERTIFICATE_WAITING) {
wu@webrtc.org91053e72013-08-10 07:18:04301 create_session_description_requests_.push(request);
302 } else {
Henrik Boström87713d02015-08-25 07:53:21303 ASSERT(certificate_request_state_ == CERTIFICATE_SUCCEEDED ||
304 certificate_request_state_ == CERTIFICATE_NOT_NEEDED);
wu@webrtc.org91053e72013-08-10 07:18:04305 InternalCreateOffer(request);
306 }
307}
308
309void WebRtcSessionDescriptionFactory::CreateAnswer(
310 CreateSessionDescriptionObserver* observer,
311 const MediaConstraintsInterface* constraints) {
312 std::string error = "CreateAnswer";
Henrik Boström87713d02015-08-25 07:53:21313 if (certificate_request_state_ == CERTIFICATE_FAILED) {
wu@webrtc.org91053e72013-08-10 07:18:04314 error += kFailedDueToIdentityFailed;
315 LOG(LS_ERROR) << error;
316 PostCreateSessionDescriptionFailed(observer, error);
317 return;
318 }
319 if (!session_->remote_description()) {
320 error += " can't be called before SetRemoteDescription.";
321 LOG(LS_ERROR) << error;
322 PostCreateSessionDescriptionFailed(observer, error);
323 return;
324 }
325 if (session_->remote_description()->type() !=
326 JsepSessionDescription::kOffer) {
327 error += " failed because remote_description is not an offer.";
328 LOG(LS_ERROR) << error;
329 PostCreateSessionDescriptionFailed(observer, error);
330 return;
331 }
332
333 cricket::MediaSessionOptions options;
334 if (!mediastream_signaling_->GetOptionsForAnswer(constraints, &options)) {
335 error += " called with invalid constraints.";
336 LOG(LS_ERROR) << error;
337 PostCreateSessionDescriptionFailed(observer, error);
338 return;
339 }
340 if (!ValidStreams(options.streams)) {
341 error += " called with invalid media streams.";
342 LOG(LS_ERROR) << error;
343 PostCreateSessionDescriptionFailed(observer, error);
344 return;
345 }
mallinath@webrtc.org1112c302013-09-23 20:34:45346 // RTP data channel is handled in MediaSessionOptions::AddStream. SCTP streams
347 // are not signaled in the SDP so does not go through that path and must be
348 // handled here.
349 if (data_channel_type_ == cricket::DCT_SCTP) {
wu@webrtc.org91053e72013-08-10 07:18:04350 options.data_channel_type = cricket::DCT_SCTP;
351 }
352
353 CreateSessionDescriptionRequest request(
354 CreateSessionDescriptionRequest::kAnswer, observer, options);
Henrik Boström87713d02015-08-25 07:53:21355 if (certificate_request_state_ == CERTIFICATE_WAITING) {
wu@webrtc.org91053e72013-08-10 07:18:04356 create_session_description_requests_.push(request);
357 } else {
Henrik Boström87713d02015-08-25 07:53:21358 ASSERT(certificate_request_state_ == CERTIFICATE_SUCCEEDED ||
359 certificate_request_state_ == CERTIFICATE_NOT_NEEDED);
wu@webrtc.org91053e72013-08-10 07:18:04360 InternalCreateAnswer(request);
361 }
362}
363
henrike@webrtc.orgb90991d2014-03-04 19:54:57364void WebRtcSessionDescriptionFactory::SetSdesPolicy(
365 cricket::SecurePolicy secure_policy) {
wu@webrtc.org91053e72013-08-10 07:18:04366 session_desc_factory_.set_secure(secure_policy);
367}
368
henrike@webrtc.orgb90991d2014-03-04 19:54:57369cricket::SecurePolicy WebRtcSessionDescriptionFactory::SdesPolicy() const {
wu@webrtc.org91053e72013-08-10 07:18:04370 return session_desc_factory_.secure();
371}
372
buildbot@webrtc.orgd4e598d2014-07-29 17:36:52373void WebRtcSessionDescriptionFactory::OnMessage(rtc::Message* msg) {
wu@webrtc.org91053e72013-08-10 07:18:04374 switch (msg->message_id) {
375 case MSG_CREATE_SESSIONDESCRIPTION_SUCCESS: {
376 CreateSessionDescriptionMsg* param =
377 static_cast<CreateSessionDescriptionMsg*>(msg->pdata);
378 param->observer->OnSuccess(param->description.release());
379 delete param;
380 break;
381 }
382 case MSG_CREATE_SESSIONDESCRIPTION_FAILED: {
383 CreateSessionDescriptionMsg* param =
384 static_cast<CreateSessionDescriptionMsg*>(msg->pdata);
385 param->observer->OnFailure(param->error);
386 delete param;
387 break;
388 }
Henrik Boström87713d02015-08-25 07:53:21389 case MSG_USE_CONSTRUCTOR_CERTIFICATE: {
390 rtc::ScopedRefMessageData<rtc::RTCCertificate>* param =
391 static_cast<rtc::ScopedRefMessageData<rtc::RTCCertificate>*>(
392 msg->pdata);
393 LOG(LS_INFO) << "Using certificate supplied to the constructor.";
Henrik Boströmd8281982015-08-27 08:12:24394 SetCertificate(param->data());
Henrik Boström87713d02015-08-25 07:53:21395 delete param;
396 break;
397 }
wu@webrtc.org91053e72013-08-10 07:18:04398 default:
399 ASSERT(false);
400 break;
401 }
402}
403
404void WebRtcSessionDescriptionFactory::InternalCreateOffer(
405 CreateSessionDescriptionRequest request) {
406 cricket::SessionDescription* desc(
407 session_desc_factory_.CreateOffer(
408 request.options,
409 static_cast<cricket::BaseSession*>(session_)->local_description()));
410 // RFC 3264
411 // When issuing an offer that modifies the session,
412 // the "o=" line of the new SDP MUST be identical to that in the
413 // previous SDP, except that the version in the origin field MUST
414 // increment by one from the previous SDP.
415
416 // Just increase the version number by one each time when a new offer
417 // is created regardless if it's identical to the previous one or not.
418 // The |session_version_| is a uint64, the wrap around should not happen.
419 ASSERT(session_version_ + 1 > session_version_);
420 JsepSessionDescription* offer(new JsepSessionDescription(
421 JsepSessionDescription::kOffer));
422 if (!offer->Initialize(desc, session_id_,
buildbot@webrtc.orgd4e598d2014-07-29 17:36:52423 rtc::ToString(session_version_++))) {
wu@webrtc.org91053e72013-08-10 07:18:04424 delete offer;
henrike@webrtc.orgb90991d2014-03-04 19:54:57425 PostCreateSessionDescriptionFailed(request.observer,
426 "Failed to initialize the offer.");
wu@webrtc.org91053e72013-08-10 07:18:04427 return;
428 }
429 if (session_->local_description() &&
430 !request.options.transport_options.ice_restart) {
431 // Include all local ice candidates in the SessionDescription unless
432 // the an ice restart has been requested.
433 CopyCandidatesFromSessionDescription(session_->local_description(), offer);
434 }
435 PostCreateSessionDescriptionSucceeded(request.observer, offer);
436}
437
438void WebRtcSessionDescriptionFactory::InternalCreateAnswer(
439 CreateSessionDescriptionRequest request) {
440 // According to http://tools.ietf.org/html/rfc5245#section-9.2.1.1
441 // an answer should also contain new ice ufrag and password if an offer has
442 // been received with new ufrag and password.
443 request.options.transport_options.ice_restart = session_->IceRestartPending();
sergeyu@chromium.org0be6aa02013-08-23 23:21:25444 // We should pass current ssl role to the transport description factory, if
445 // there is already an existing ongoing session.
buildbot@webrtc.orgd4e598d2014-07-29 17:36:52446 rtc::SSLRole ssl_role;
sergeyu@chromium.org0be6aa02013-08-23 23:21:25447 if (session_->GetSslRole(&ssl_role)) {
448 request.options.transport_options.prefer_passive_role =
buildbot@webrtc.orgd4e598d2014-07-29 17:36:52449 (rtc::SSL_SERVER == ssl_role);
sergeyu@chromium.org0be6aa02013-08-23 23:21:25450 }
wu@webrtc.org91053e72013-08-10 07:18:04451
452 cricket::SessionDescription* desc(session_desc_factory_.CreateAnswer(
453 static_cast<cricket::BaseSession*>(session_)->remote_description(),
454 request.options,
455 static_cast<cricket::BaseSession*>(session_)->local_description()));
456 // RFC 3264
457 // If the answer is different from the offer in any way (different IP
458 // addresses, ports, etc.), the origin line MUST be different in the answer.
459 // In that case, the version number in the "o=" line of the answer is
460 // unrelated to the version number in the o line of the offer.
461 // Get a new version number by increasing the |session_version_answer_|.
462 // The |session_version_| is a uint64, the wrap around should not happen.
463 ASSERT(session_version_ + 1 > session_version_);
464 JsepSessionDescription* answer(new JsepSessionDescription(
465 JsepSessionDescription::kAnswer));
466 if (!answer->Initialize(desc, session_id_,
buildbot@webrtc.orgd4e598d2014-07-29 17:36:52467 rtc::ToString(session_version_++))) {
wu@webrtc.org91053e72013-08-10 07:18:04468 delete answer;
469 PostCreateSessionDescriptionFailed(request.observer,
henrike@webrtc.orgb90991d2014-03-04 19:54:57470 "Failed to initialize the answer.");
wu@webrtc.org91053e72013-08-10 07:18:04471 return;
472 }
473 if (session_->local_description() &&
474 !request.options.transport_options.ice_restart) {
475 // Include all local ice candidates in the SessionDescription unless
476 // the remote peer has requested an ice restart.
477 CopyCandidatesFromSessionDescription(session_->local_description(), answer);
478 }
479 session_->ResetIceRestartLatch();
480 PostCreateSessionDescriptionSucceeded(request.observer, answer);
481}
482
tommi0f620f42015-07-09 10:25:02483void WebRtcSessionDescriptionFactory::FailPendingRequests(
484 const std::string& reason) {
485 ASSERT(signaling_thread_->IsCurrent());
486 while (!create_session_description_requests_.empty()) {
487 const CreateSessionDescriptionRequest& request =
488 create_session_description_requests_.front();
489 PostCreateSessionDescriptionFailed(request.observer,
490 ((request.type == CreateSessionDescriptionRequest::kOffer) ?
491 "CreateOffer" : "CreateAnswer") + reason);
492 create_session_description_requests_.pop();
493 }
494}
495
wu@webrtc.org91053e72013-08-10 07:18:04496void WebRtcSessionDescriptionFactory::PostCreateSessionDescriptionFailed(
497 CreateSessionDescriptionObserver* observer, const std::string& error) {
498 CreateSessionDescriptionMsg* msg = new CreateSessionDescriptionMsg(observer);
499 msg->error = error;
500 signaling_thread_->Post(this, MSG_CREATE_SESSIONDESCRIPTION_FAILED, msg);
henrike@webrtc.orgb90991d2014-03-04 19:54:57501 LOG(LS_ERROR) << "Create SDP failed: " << error;
wu@webrtc.org91053e72013-08-10 07:18:04502}
503
504void WebRtcSessionDescriptionFactory::PostCreateSessionDescriptionSucceeded(
505 CreateSessionDescriptionObserver* observer,
506 SessionDescriptionInterface* description) {
507 CreateSessionDescriptionMsg* msg = new CreateSessionDescriptionMsg(observer);
508 msg->description.reset(description);
509 signaling_thread_->Post(this, MSG_CREATE_SESSIONDESCRIPTION_SUCCESS, msg);
510}
511
512void WebRtcSessionDescriptionFactory::OnIdentityRequestFailed(int error) {
513 ASSERT(signaling_thread_->IsCurrent());
514
515 LOG(LS_ERROR) << "Async identity request failed: error = " << error;
Henrik Boström87713d02015-08-25 07:53:21516 certificate_request_state_ = CERTIFICATE_FAILED;
wu@webrtc.org91053e72013-08-10 07:18:04517
tommi0f620f42015-07-09 10:25:02518 FailPendingRequests(kFailedDueToIdentityFailed);
wu@webrtc.org91053e72013-08-10 07:18:04519}
520
Henrik Boströmd8281982015-08-27 08:12:24521void WebRtcSessionDescriptionFactory::SetCertificate(
522 const rtc::scoped_refptr<rtc::RTCCertificate>& certificate) {
henrikg91d6ede2015-09-17 07:24:34523 RTC_DCHECK(certificate);
Henrik Boströmd8281982015-08-27 08:12:24524 LOG(LS_VERBOSE) << "Setting new certificate";
jiayl@webrtc.org61e00b02015-03-04 22:17:38525
Henrik Boström87713d02015-08-25 07:53:21526 certificate_request_state_ = CERTIFICATE_SUCCEEDED;
Henrik Boströmd8281982015-08-27 08:12:24527 SignalCertificateReady(certificate);
wu@webrtc.org91053e72013-08-10 07:18:04528
Henrik Boström3a14bf32015-08-31 07:27:58529 transport_desc_factory_.set_certificate(certificate);
wu@webrtc.org91053e72013-08-10 07:18:04530 transport_desc_factory_.set_secure(cricket::SEC_ENABLED);
531
532 while (!create_session_description_requests_.empty()) {
533 if (create_session_description_requests_.front().type ==
534 CreateSessionDescriptionRequest::kOffer) {
535 InternalCreateOffer(create_session_description_requests_.front());
536 } else {
537 InternalCreateAnswer(create_session_description_requests_.front());
538 }
539 create_session_description_requests_.pop();
540 }
541}
wu@webrtc.org91053e72013-08-10 07:18:04542} // namespace webrtc