| /* |
| * Copyright 2004 The WebRTC project authors. All Rights Reserved. |
| * |
| * Use of this source code is governed by a BSD-style license |
| * that can be found in the LICENSE file in the root of the source |
| * tree. An additional intellectual property rights grant can be found |
| * in the file PATENTS. All contributing project authors may |
| * be found in the AUTHORS file in the root of the source tree. |
| */ |
| |
| #include "pc/media_session.h" |
| |
| #include <stddef.h> |
| |
| #include <algorithm> |
| #include <memory> |
| #include <optional> |
| #include <string> |
| #include <utility> |
| #include <vector> |
| |
| #include "absl/algorithm/container.h" |
| #include "absl/strings/match.h" |
| #include "absl/strings/string_view.h" |
| #include "api/field_trials_view.h" |
| #include "api/media_types.h" |
| #include "api/rtc_error.h" |
| #include "api/rtp_parameters.h" |
| #include "api/rtp_transceiver_direction.h" |
| #include "call/payload_type.h" |
| #include "media/base/codec.h" |
| #include "media/base/codec_list.h" |
| #include "media/base/media_constants.h" |
| #include "media/base/media_engine.h" |
| #include "media/base/rid_description.h" |
| #include "media/base/stream_params.h" |
| #include "media/sctp/sctp_transport_internal.h" |
| #include "p2p/base/ice_credentials_iterator.h" |
| #include "p2p/base/p2p_constants.h" |
| #include "p2p/base/transport_description.h" |
| #include "p2p/base/transport_description_factory.h" |
| #include "p2p/base/transport_info.h" |
| #include "pc/codec_vendor.h" |
| #include "pc/media_options.h" |
| #include "pc/media_protocol_names.h" |
| #include "pc/rtp_media_utils.h" |
| #include "pc/session_description.h" |
| #include "pc/simulcast_description.h" |
| #include "pc/used_ids.h" |
| #include "rtc_base/checks.h" |
| #include "rtc_base/logging.h" |
| #include "rtc_base/strings/string_builder.h" |
| #include "rtc_base/unique_id_generator.h" |
| |
| #ifdef RTC_ENABLE_H265 |
| #endif |
| |
| namespace { |
| |
| using rtc::UniqueRandomIdGenerator; |
| using webrtc::RTCError; |
| using webrtc::RTCErrorType; |
| using webrtc::RtpTransceiverDirection; |
| |
| webrtc::RtpExtension RtpExtensionFromCapability( |
| const webrtc::RtpHeaderExtensionCapability& capability) { |
| return webrtc::RtpExtension(capability.uri, |
| capability.preferred_id.value_or(1), |
| capability.preferred_encrypt); |
| } |
| |
| cricket::RtpHeaderExtensions RtpHeaderExtensionsFromCapabilities( |
| const std::vector<webrtc::RtpHeaderExtensionCapability>& capabilities) { |
| cricket::RtpHeaderExtensions exts; |
| for (const auto& capability : capabilities) { |
| exts.push_back(RtpExtensionFromCapability(capability)); |
| } |
| return exts; |
| } |
| |
| std::vector<webrtc::RtpHeaderExtensionCapability> |
| UnstoppedRtpHeaderExtensionCapabilities( |
| std::vector<webrtc::RtpHeaderExtensionCapability> capabilities) { |
| capabilities.erase( |
| std::remove_if( |
| capabilities.begin(), capabilities.end(), |
| [](const webrtc::RtpHeaderExtensionCapability& capability) { |
| return capability.direction == RtpTransceiverDirection::kStopped; |
| }), |
| capabilities.end()); |
| return capabilities; |
| } |
| |
| bool IsCapabilityPresent(const webrtc::RtpHeaderExtensionCapability& capability, |
| const cricket::RtpHeaderExtensions& extensions) { |
| return std::find_if(extensions.begin(), extensions.end(), |
| [&capability](const webrtc::RtpExtension& extension) { |
| return capability.uri == extension.uri; |
| }) != extensions.end(); |
| } |
| |
| cricket::RtpHeaderExtensions UnstoppedOrPresentRtpHeaderExtensions( |
| const std::vector<webrtc::RtpHeaderExtensionCapability>& capabilities, |
| const cricket::RtpHeaderExtensions& all_encountered_extensions) { |
| cricket::RtpHeaderExtensions extensions; |
| for (const auto& capability : capabilities) { |
| if (capability.direction != RtpTransceiverDirection::kStopped || |
| IsCapabilityPresent(capability, all_encountered_extensions)) { |
| extensions.push_back(RtpExtensionFromCapability(capability)); |
| } |
| } |
| return extensions; |
| } |
| |
| } // namespace |
| |
| namespace cricket { |
| |
| namespace { |
| |
| bool ContainsRtxCodec(const std::vector<Codec>& codecs) { |
| return absl::c_find_if(codecs, [](const Codec& c) { |
| return c.GetResiliencyType() == Codec::ResiliencyType::kRtx; |
| }) != codecs.end(); |
| } |
| |
| bool ContainsFlexfecCodec(const std::vector<Codec>& codecs) { |
| return absl::c_find_if(codecs, [](const Codec& c) { |
| return c.GetResiliencyType() == Codec::ResiliencyType::kFlexfec; |
| }) != codecs.end(); |
| } |
| |
| bool IsComfortNoiseCodec(const Codec& codec) { |
| return absl::EqualsIgnoreCase(codec.name, kComfortNoiseCodecName); |
| } |
| |
| RtpTransceiverDirection NegotiateRtpTransceiverDirection( |
| RtpTransceiverDirection offer, |
| RtpTransceiverDirection wants) { |
| bool offer_send = webrtc::RtpTransceiverDirectionHasSend(offer); |
| bool offer_recv = webrtc::RtpTransceiverDirectionHasRecv(offer); |
| bool wants_send = webrtc::RtpTransceiverDirectionHasSend(wants); |
| bool wants_recv = webrtc::RtpTransceiverDirectionHasRecv(wants); |
| return webrtc::RtpTransceiverDirectionFromSendRecv(offer_recv && wants_send, |
| offer_send && wants_recv); |
| } |
| |
| bool IsMediaContentOfType(const ContentInfo* content, MediaType media_type) { |
| if (!content || !content->media_description()) { |
| return false; |
| } |
| return content->media_description()->type() == media_type; |
| } |
| |
| // Finds all StreamParams of all media types and attach them to stream_params. |
| StreamParamsVec GetCurrentStreamParams( |
| const std::vector<const ContentInfo*>& active_local_contents) { |
| StreamParamsVec stream_params; |
| for (const ContentInfo* content : active_local_contents) { |
| for (const StreamParams& params : content->media_description()->streams()) { |
| stream_params.push_back(params); |
| } |
| } |
| return stream_params; |
| } |
| |
| StreamParams CreateStreamParamsForNewSenderWithSsrcs( |
| const SenderOptions& sender, |
| const std::string& rtcp_cname, |
| bool include_rtx_streams, |
| bool include_flexfec_stream, |
| UniqueRandomIdGenerator* ssrc_generator, |
| const webrtc::FieldTrialsView& field_trials) { |
| StreamParams result; |
| result.id = sender.track_id; |
| |
| // TODO(brandtr): Update when we support multistream protection. |
| if (include_flexfec_stream && sender.num_sim_layers > 1) { |
| include_flexfec_stream = false; |
| RTC_LOG(LS_WARNING) |
| << "Our FlexFEC implementation only supports protecting " |
| "a single media streams. This session has multiple " |
| "media streams however, so no FlexFEC SSRC will be generated."; |
| } |
| if (include_flexfec_stream && !field_trials.IsEnabled("WebRTC-FlexFEC-03")) { |
| include_flexfec_stream = false; |
| RTC_LOG(LS_WARNING) |
| << "WebRTC-FlexFEC trial is not enabled, not sending FlexFEC"; |
| } |
| |
| result.GenerateSsrcs(sender.num_sim_layers, include_rtx_streams, |
| include_flexfec_stream, ssrc_generator); |
| |
| result.cname = rtcp_cname; |
| result.set_stream_ids(sender.stream_ids); |
| |
| return result; |
| } |
| |
| bool ValidateSimulcastLayers(const std::vector<RidDescription>& rids, |
| const SimulcastLayerList& simulcast_layers) { |
| return absl::c_all_of( |
| simulcast_layers.GetAllLayers(), [&rids](const SimulcastLayer& layer) { |
| return absl::c_any_of(rids, [&layer](const RidDescription& rid) { |
| return rid.rid == layer.rid; |
| }); |
| }); |
| } |
| |
| StreamParams CreateStreamParamsForNewSenderWithRids( |
| const SenderOptions& sender, |
| const std::string& rtcp_cname) { |
| RTC_DCHECK(!sender.rids.empty()); |
| RTC_DCHECK_EQ(sender.num_sim_layers, 0) |
| << "RIDs are the compliant way to indicate simulcast."; |
| RTC_DCHECK(ValidateSimulcastLayers(sender.rids, sender.simulcast_layers)); |
| StreamParams result; |
| result.id = sender.track_id; |
| result.cname = rtcp_cname; |
| result.set_stream_ids(sender.stream_ids); |
| |
| // More than one rid should be signaled. |
| if (sender.rids.size() > 1) { |
| result.set_rids(sender.rids); |
| } |
| |
| return result; |
| } |
| |
| // Adds SimulcastDescription if indicated by the media description options. |
| // MediaContentDescription should already be set up with the send rids. |
| void AddSimulcastToMediaDescription( |
| const MediaDescriptionOptions& media_description_options, |
| MediaContentDescription* description) { |
| RTC_DCHECK(description); |
| |
| // Check if we are using RIDs in this scenario. |
| if (absl::c_all_of(description->streams(), [](const StreamParams& params) { |
| return !params.has_rids(); |
| })) { |
| return; |
| } |
| |
| RTC_DCHECK_EQ(1, description->streams().size()) |
| << "RIDs are only supported in Unified Plan semantics."; |
| RTC_DCHECK_EQ(1, media_description_options.sender_options.size()); |
| RTC_DCHECK(description->type() == MediaType::MEDIA_TYPE_AUDIO || |
| description->type() == MediaType::MEDIA_TYPE_VIDEO); |
| |
| // One RID or less indicates that simulcast is not needed. |
| if (description->streams()[0].rids().size() <= 1) { |
| return; |
| } |
| |
| // Only negotiate the send layers. |
| SimulcastDescription simulcast; |
| simulcast.send_layers() = |
| media_description_options.sender_options[0].simulcast_layers; |
| description->set_simulcast_description(simulcast); |
| } |
| |
| // Adds a StreamParams for each SenderOptions in `sender_options` to |
| // content_description. |
| // `current_params` - All currently known StreamParams of any media type. |
| bool AddStreamParams(const std::vector<SenderOptions>& sender_options, |
| const std::string& rtcp_cname, |
| UniqueRandomIdGenerator* ssrc_generator, |
| StreamParamsVec* current_streams, |
| MediaContentDescription* content_description, |
| const webrtc::FieldTrialsView& field_trials) { |
| // SCTP streams are not negotiated using SDP/ContentDescriptions. |
| if (IsSctpProtocol(content_description->protocol())) { |
| return true; |
| } |
| |
| const bool include_rtx_streams = |
| ContainsRtxCodec(content_description->codecs()); |
| |
| const bool include_flexfec_stream = |
| ContainsFlexfecCodec(content_description->codecs()); |
| |
| for (const SenderOptions& sender : sender_options) { |
| StreamParams* param = GetStreamByIds(*current_streams, sender.track_id); |
| if (!param) { |
| // This is a new sender. |
| StreamParams stream_param = |
| sender.rids.empty() |
| ? |
| // Signal SSRCs and legacy simulcast (if requested). |
| CreateStreamParamsForNewSenderWithSsrcs( |
| sender, rtcp_cname, include_rtx_streams, |
| include_flexfec_stream, ssrc_generator, field_trials) |
| : |
| // Signal RIDs and spec-compliant simulcast (if requested). |
| CreateStreamParamsForNewSenderWithRids(sender, rtcp_cname); |
| |
| content_description->AddStream(stream_param); |
| |
| // Store the new StreamParams in current_streams. |
| // This is necessary so that we can use the CNAME for other media types. |
| current_streams->push_back(stream_param); |
| } else { |
| // Use existing generated SSRCs/groups, but update the sync_label if |
| // necessary. This may be needed if a MediaStreamTrack was moved from one |
| // MediaStream to another. |
| param->set_stream_ids(sender.stream_ids); |
| content_description->AddStream(*param); |
| } |
| } |
| return true; |
| } |
| |
| // Updates the transport infos of the `sdesc` according to the given |
| // `bundle_group`. The transport infos of the content names within the |
| // `bundle_group` should be updated to use the ufrag, pwd and DTLS role of the |
| // first content within the `bundle_group`. |
| bool UpdateTransportInfoForBundle(const ContentGroup& bundle_group, |
| SessionDescription* sdesc) { |
| // The bundle should not be empty. |
| if (!sdesc || !bundle_group.FirstContentName()) { |
| return false; |
| } |
| |
| // We should definitely have a transport for the first content. |
| const std::string& selected_content_name = *bundle_group.FirstContentName(); |
| const TransportInfo* selected_transport_info = |
| sdesc->GetTransportInfoByName(selected_content_name); |
| if (!selected_transport_info) { |
| return false; |
| } |
| |
| // Set the other contents to use the same ICE credentials. |
| const std::string& selected_ufrag = |
| selected_transport_info->description.ice_ufrag; |
| const std::string& selected_pwd = |
| selected_transport_info->description.ice_pwd; |
| ConnectionRole selected_connection_role = |
| selected_transport_info->description.connection_role; |
| for (TransportInfo& transport_info : sdesc->transport_infos()) { |
| if (bundle_group.HasContentName(transport_info.content_name) && |
| transport_info.content_name != selected_content_name) { |
| transport_info.description.ice_ufrag = selected_ufrag; |
| transport_info.description.ice_pwd = selected_pwd; |
| transport_info.description.connection_role = selected_connection_role; |
| } |
| } |
| return true; |
| } |
| |
| std::vector<const ContentInfo*> GetActiveContents( |
| const SessionDescription& description, |
| const MediaSessionOptions& session_options) { |
| std::vector<const ContentInfo*> active_contents; |
| for (size_t i = 0; i < description.contents().size(); ++i) { |
| RTC_DCHECK_LT(i, session_options.media_description_options.size()); |
| const ContentInfo& content = description.contents()[i]; |
| const MediaDescriptionOptions& media_options = |
| session_options.media_description_options[i]; |
| if (!content.rejected && !media_options.stopped && |
| content.mid() == media_options.mid) { |
| active_contents.push_back(&content); |
| } |
| } |
| return active_contents; |
| } |
| |
| // Create a media content to be offered for the given `sender_options`, |
| // according to the given options.rtcp_mux, session_options.is_muc, codecs, |
| // secure_transport, crypto, and current_streams. If we don't currently have |
| // crypto (in current_cryptos) and it is enabled (in secure_policy), crypto is |
| // created (according to crypto_suites). The created content is added to the |
| // offer. |
| RTCError CreateContentOffer( |
| const MediaDescriptionOptions& media_description_options, |
| const MediaSessionOptions& session_options, |
| const RtpHeaderExtensions& rtp_extensions, |
| UniqueRandomIdGenerator* ssrc_generator, |
| StreamParamsVec* current_streams, |
| MediaContentDescription* offer) { |
| offer->set_rtcp_mux(session_options.rtcp_mux_enabled); |
| offer->set_rtcp_reduced_size(true); |
| |
| // Build the vector of header extensions with directions for this |
| // media_description's options. |
| RtpHeaderExtensions extensions; |
| for (const auto& extension_with_id : rtp_extensions) { |
| for (const auto& extension : media_description_options.header_extensions) { |
| if (extension_with_id.uri == extension.uri && |
| extension_with_id.encrypt == extension.preferred_encrypt) { |
| // TODO(crbug.com/1051821): Configure the extension direction from |
| // the information in the media_description_options extension |
| // capability. |
| if (extension.direction != RtpTransceiverDirection::kStopped) { |
| extensions.push_back(extension_with_id); |
| } |
| } |
| } |
| } |
| offer->set_rtp_header_extensions(extensions); |
| |
| AddSimulcastToMediaDescription(media_description_options, offer); |
| |
| return RTCError::OK(); |
| } |
| |
| RTCError CreateMediaContentOffer( |
| const MediaDescriptionOptions& media_description_options, |
| const MediaSessionOptions& session_options, |
| const std::vector<Codec>& codecs, |
| const RtpHeaderExtensions& rtp_extensions, |
| UniqueRandomIdGenerator* ssrc_generator, |
| StreamParamsVec* current_streams, |
| MediaContentDescription* offer, |
| const webrtc::FieldTrialsView& field_trials) { |
| offer->AddCodecs(codecs); |
| if (!AddStreamParams(media_description_options.sender_options, |
| session_options.rtcp_cname, ssrc_generator, |
| current_streams, offer, field_trials)) { |
| LOG_AND_RETURN_ERROR(RTCErrorType::INTERNAL_ERROR, |
| "Failed to add stream parameters"); |
| } |
| |
| return CreateContentOffer(media_description_options, session_options, |
| rtp_extensions, ssrc_generator, current_streams, |
| offer); |
| } |
| |
| // Update the ID fields of the codec vector. |
| // If any codec has an ID with value "kIdNotSet", use the payload type suggester |
| // to assign and record a payload type for it. |
| // If there is a RED codec without its fmtp parameter, give it the ID of the |
| // first OPUS codec in the codec list. |
| webrtc::RTCError AssignCodecIdsAndLinkRed( |
| webrtc::PayloadTypeSuggester* pt_suggester, |
| const std::string& mid, |
| std::vector<Codec>& codecs) { |
| int opus_codec = Codec::kIdNotSet; |
| for (cricket::Codec& codec : codecs) { |
| if (codec.id == Codec::kIdNotSet) { |
| // Add payload types to codecs, if needed |
| // This should only happen if WebRTC-PayloadTypesInTransport field trial |
| // is enabled. |
| RTC_CHECK(pt_suggester); |
| auto result = pt_suggester->SuggestPayloadType(mid, codec); |
| if (!result.ok()) { |
| return result.error(); |
| } |
| codec.id = result.value(); |
| } |
| // record first Opus codec id |
| if (absl::EqualsIgnoreCase(codec.name, kOpusCodecName) && |
| opus_codec == Codec::kIdNotSet) { |
| opus_codec = codec.id; |
| } |
| } |
| if (opus_codec != Codec::kIdNotSet) { |
| for (cricket::Codec& codec : codecs) { |
| if (codec.type == Codec::Type::kAudio && |
| absl::EqualsIgnoreCase(codec.name, kRedCodecName)) { |
| if (codec.params.empty()) { |
| char buffer[100]; |
| rtc::SimpleStringBuilder param(buffer); |
| param << opus_codec << "/" << opus_codec; |
| RTC_LOG(LS_ERROR) << "DEBUG: Setting RED param to " << param.str(); |
| codec.SetParam(kCodecParamNotInNameValueFormat, param.str()); |
| } |
| } |
| } |
| } |
| return webrtc::RTCError::OK(); |
| } |
| |
| // Adds all extensions from `reference_extensions` to `offered_extensions` that |
| // don't already exist in `offered_extensions` and ensures the IDs don't |
| // collide. If an extension is added, it's also added to |
| // `all_encountered_extensions`. Also when doing the addition a new ID is set |
| // for that extension. `offered_extensions` is for either audio or video while |
| // `all_encountered_extensions` is used for both audio and video. There could be |
| // overlap between audio extensions and video extensions. |
| void MergeRtpHdrExts(const RtpHeaderExtensions& reference_extensions, |
| bool enable_encrypted_rtp_header_extensions, |
| RtpHeaderExtensions* offered_extensions, |
| RtpHeaderExtensions* all_encountered_extensions, |
| UsedRtpHeaderExtensionIds* used_ids) { |
| for (auto reference_extension : reference_extensions) { |
| if (!webrtc::RtpExtension::FindHeaderExtensionByUriAndEncryption( |
| *offered_extensions, reference_extension.uri, |
| reference_extension.encrypt)) { |
| if (reference_extension.encrypt && |
| !enable_encrypted_rtp_header_extensions) { |
| // Negotiating of encrypted headers is deactivated. |
| continue; |
| } |
| const webrtc::RtpExtension* existing = |
| webrtc::RtpExtension::FindHeaderExtensionByUriAndEncryption( |
| *all_encountered_extensions, reference_extension.uri, |
| reference_extension.encrypt); |
| if (existing) { |
| // E.g. in the case where the same RTP header extension is used for |
| // audio and video. |
| offered_extensions->push_back(*existing); |
| } else { |
| used_ids->FindAndSetIdUsed(&reference_extension); |
| all_encountered_extensions->push_back(reference_extension); |
| offered_extensions->push_back(reference_extension); |
| } |
| } |
| } |
| } |
| |
| // Mostly identical to RtpExtension::FindHeaderExtensionByUri but discards any |
| // encrypted extensions that this implementation cannot encrypt. |
| const webrtc::RtpExtension* FindHeaderExtensionByUriDiscardUnsupported( |
| const std::vector<webrtc::RtpExtension>& extensions, |
| absl::string_view uri, |
| webrtc::RtpExtension::Filter filter) { |
| // Note: While it's technically possible to decrypt extensions that we don't |
| // encrypt, the symmetric API of libsrtp does not allow us to supply |
| // different IDs for encryption/decryption of header extensions depending on |
| // whether the packet is inbound or outbound. Thereby, we are limited to |
| // what we can send in encrypted form. |
| if (!webrtc::RtpExtension::IsEncryptionSupported(uri)) { |
| // If there's no encryption support and we only want encrypted extensions, |
| // there's no point in continuing the search here. |
| if (filter == webrtc::RtpExtension::kRequireEncryptedExtension) { |
| return nullptr; |
| } |
| |
| // Instruct to only return non-encrypted extensions |
| filter = webrtc::RtpExtension::Filter::kDiscardEncryptedExtension; |
| } |
| |
| return webrtc::RtpExtension::FindHeaderExtensionByUri(extensions, uri, |
| filter); |
| } |
| |
| void NegotiateRtpHeaderExtensions(const RtpHeaderExtensions& local_extensions, |
| const RtpHeaderExtensions& offered_extensions, |
| webrtc::RtpExtension::Filter filter, |
| RtpHeaderExtensions* negotiated_extensions) { |
| bool frame_descriptor_in_local = false; |
| bool dependency_descriptor_in_local = false; |
| bool abs_capture_time_in_local = false; |
| |
| for (const webrtc::RtpExtension& ours : local_extensions) { |
| if (ours.uri == webrtc::RtpExtension::kGenericFrameDescriptorUri00) |
| frame_descriptor_in_local = true; |
| else if (ours.uri == webrtc::RtpExtension::kDependencyDescriptorUri) |
| dependency_descriptor_in_local = true; |
| else if (ours.uri == webrtc::RtpExtension::kAbsoluteCaptureTimeUri) |
| abs_capture_time_in_local = true; |
| |
| const webrtc::RtpExtension* theirs = |
| FindHeaderExtensionByUriDiscardUnsupported(offered_extensions, ours.uri, |
| filter); |
| if (theirs && theirs->encrypt == ours.encrypt) { |
| // We respond with their RTP header extension id. |
| negotiated_extensions->push_back(*theirs); |
| } |
| } |
| |
| // Frame descriptors support. If the extension is not present locally, but is |
| // in the offer, we add it to the list. |
| if (!dependency_descriptor_in_local) { |
| const webrtc::RtpExtension* theirs = |
| FindHeaderExtensionByUriDiscardUnsupported( |
| offered_extensions, webrtc::RtpExtension::kDependencyDescriptorUri, |
| filter); |
| if (theirs) { |
| negotiated_extensions->push_back(*theirs); |
| } |
| } |
| if (!frame_descriptor_in_local) { |
| const webrtc::RtpExtension* theirs = |
| FindHeaderExtensionByUriDiscardUnsupported( |
| offered_extensions, |
| webrtc::RtpExtension::kGenericFrameDescriptorUri00, filter); |
| if (theirs) { |
| negotiated_extensions->push_back(*theirs); |
| } |
| } |
| |
| // Absolute capture time support. If the extension is not present locally, but |
| // is in the offer, we add it to the list. |
| if (!abs_capture_time_in_local) { |
| const webrtc::RtpExtension* theirs = |
| FindHeaderExtensionByUriDiscardUnsupported( |
| offered_extensions, webrtc::RtpExtension::kAbsoluteCaptureTimeUri, |
| filter); |
| if (theirs) { |
| negotiated_extensions->push_back(*theirs); |
| } |
| } |
| } |
| |
| bool SetCodecsInAnswer(const MediaContentDescription* offer, |
| const std::vector<Codec>& local_codecs, |
| const MediaDescriptionOptions& media_description_options, |
| const MediaSessionOptions& session_options, |
| UniqueRandomIdGenerator* ssrc_generator, |
| StreamParamsVec* current_streams, |
| MediaContentDescription* answer, |
| const webrtc::FieldTrialsView& field_trials) { |
| RTC_DCHECK(offer->type() == MEDIA_TYPE_AUDIO || |
| offer->type() == MEDIA_TYPE_VIDEO); |
| answer->AddCodecs(local_codecs); |
| answer->set_protocol(offer->protocol()); |
| if (!AddStreamParams(media_description_options.sender_options, |
| session_options.rtcp_cname, ssrc_generator, |
| current_streams, answer, field_trials)) { |
| return false; // Something went seriously wrong. |
| } |
| return true; |
| } |
| |
| // Create a media content to be answered for the given `sender_options` |
| // according to the given session_options.rtcp_mux, session_options.streams, |
| // codecs, crypto, and current_streams. If we don't currently have crypto (in |
| // current_cryptos) and it is enabled (in secure_policy), crypto is created |
| // (according to crypto_suites). The codecs, rtcp_mux, and crypto are all |
| // negotiated with the offer. If the negotiation fails, this method returns |
| // false. The created content is added to the offer. |
| bool CreateMediaContentAnswer( |
| const MediaContentDescription* offer, |
| const MediaDescriptionOptions& media_description_options, |
| const MediaSessionOptions& session_options, |
| const RtpHeaderExtensions& local_rtp_extensions, |
| UniqueRandomIdGenerator* ssrc_generator, |
| bool enable_encrypted_rtp_header_extensions, |
| StreamParamsVec* current_streams, |
| bool bundle_enabled, |
| MediaContentDescription* answer) { |
| answer->set_extmap_allow_mixed_enum(offer->extmap_allow_mixed_enum()); |
| const webrtc::RtpExtension::Filter extensions_filter = |
| enable_encrypted_rtp_header_extensions |
| ? webrtc::RtpExtension::Filter::kPreferEncryptedExtension |
| : webrtc::RtpExtension::Filter::kDiscardEncryptedExtension; |
| |
| // Filter local extensions by capabilities and direction. |
| RtpHeaderExtensions local_rtp_extensions_to_reply_with; |
| for (const auto& extension_with_id : local_rtp_extensions) { |
| for (const auto& extension : media_description_options.header_extensions) { |
| if (extension_with_id.uri == extension.uri && |
| extension_with_id.encrypt == extension.preferred_encrypt) { |
| // TODO(crbug.com/1051821): Configure the extension direction from |
| // the information in the media_description_options extension |
| // capability. For now, do not include stopped extensions. |
| // See also crbug.com/webrtc/7477 about the general lack of direction. |
| if (extension.direction != RtpTransceiverDirection::kStopped) { |
| local_rtp_extensions_to_reply_with.push_back(extension_with_id); |
| } |
| } |
| } |
| } |
| RtpHeaderExtensions negotiated_rtp_extensions; |
| NegotiateRtpHeaderExtensions(local_rtp_extensions_to_reply_with, |
| offer->rtp_header_extensions(), |
| extensions_filter, &negotiated_rtp_extensions); |
| answer->set_rtp_header_extensions(negotiated_rtp_extensions); |
| |
| answer->set_rtcp_mux(session_options.rtcp_mux_enabled && offer->rtcp_mux()); |
| answer->set_rtcp_reduced_size(offer->rtcp_reduced_size()); |
| answer->set_remote_estimate(offer->remote_estimate()); |
| |
| AddSimulcastToMediaDescription(media_description_options, answer); |
| |
| answer->set_direction(NegotiateRtpTransceiverDirection( |
| offer->direction(), media_description_options.direction)); |
| |
| return true; |
| } |
| |
| bool IsMediaProtocolSupported(MediaType type, |
| const std::string& protocol, |
| bool secure_transport) { |
| // Since not all applications serialize and deserialize the media protocol, |
| // we will have to accept `protocol` to be empty. |
| if (protocol.empty()) { |
| return true; |
| } |
| |
| if (type == MEDIA_TYPE_DATA) { |
| // Check for SCTP |
| if (secure_transport) { |
| // Most likely scenarios first. |
| return IsDtlsSctp(protocol); |
| } else { |
| return IsPlainSctp(protocol); |
| } |
| } |
| |
| // Allow for non-DTLS RTP protocol even when using DTLS because that's what |
| // JSEP specifies. |
| if (secure_transport) { |
| // Most likely scenarios first. |
| return IsDtlsRtp(protocol) || IsPlainRtp(protocol); |
| } else { |
| return IsPlainRtp(protocol); |
| } |
| } |
| |
| void SetMediaProtocol(bool secure_transport, MediaContentDescription* desc) { |
| if (secure_transport) |
| desc->set_protocol(kMediaProtocolDtlsSavpf); |
| else |
| desc->set_protocol(kMediaProtocolAvpf); |
| } |
| |
| // Gets the TransportInfo of the given `content_name` from the |
| // `current_description`. If doesn't exist, returns a new one. |
| const TransportDescription* GetTransportDescription( |
| const std::string& content_name, |
| const SessionDescription* current_description) { |
| const TransportDescription* desc = NULL; |
| if (current_description) { |
| const TransportInfo* info = |
| current_description->GetTransportInfoByName(content_name); |
| if (info) { |
| desc = &info->description; |
| } |
| } |
| return desc; |
| } |
| |
| |
| } // namespace |
| |
| MediaSessionDescriptionFactory::MediaSessionDescriptionFactory( |
| cricket::MediaEngineInterface* media_engine, |
| bool rtx_enabled, |
| rtc::UniqueRandomIdGenerator* ssrc_generator, |
| const TransportDescriptionFactory* transport_desc_factory, |
| webrtc::PayloadTypeSuggester* pt_suggester) |
| : ssrc_generator_(ssrc_generator), |
| transport_desc_factory_(transport_desc_factory), |
| pt_suggester_(pt_suggester), |
| payload_types_in_transport_trial_enabled_( |
| transport_desc_factory_->trials().IsEnabled( |
| "WebRTC-PayloadTypesInTransport")) { |
| RTC_CHECK(transport_desc_factory_); |
| codec_vendor_ = std::make_unique<CodecVendor>(media_engine, rtx_enabled); |
| } |
| |
| RtpHeaderExtensions |
| MediaSessionDescriptionFactory::filtered_rtp_header_extensions( |
| RtpHeaderExtensions extensions) const { |
| if (!is_unified_plan_) { |
| // Remove extensions only supported with unified-plan. |
| extensions.erase( |
| std::remove_if( |
| extensions.begin(), extensions.end(), |
| [](const webrtc::RtpExtension& extension) { |
| return extension.uri == webrtc::RtpExtension::kMidUri || |
| extension.uri == webrtc::RtpExtension::kRidUri || |
| extension.uri == webrtc::RtpExtension::kRepairedRidUri; |
| }), |
| extensions.end()); |
| } |
| return extensions; |
| } |
| |
| webrtc::RTCErrorOr<std::unique_ptr<SessionDescription>> |
| MediaSessionDescriptionFactory::CreateOfferOrError( |
| const MediaSessionOptions& session_options, |
| const SessionDescription* current_description) const { |
| // Must have options for each existing section. |
| if (current_description) { |
| RTC_DCHECK_LE(current_description->contents().size(), |
| session_options.media_description_options.size()); |
| } |
| |
| IceCredentialsIterator ice_credentials( |
| session_options.pooled_ice_credentials); |
| |
| std::vector<const ContentInfo*> current_active_contents; |
| if (current_description) { |
| current_active_contents = |
| GetActiveContents(*current_description, session_options); |
| } |
| |
| StreamParamsVec current_streams = |
| GetCurrentStreamParams(current_active_contents); |
| |
| Codecs offer_audio_codecs; |
| Codecs offer_video_codecs; |
| if (codec_vendor_) { |
| codec_vendor_->GetCodecsForOffer(current_active_contents, |
| &offer_audio_codecs, &offer_video_codecs); |
| } |
| |
| AudioVideoRtpHeaderExtensions extensions_with_ids = |
| GetOfferedRtpHeaderExtensionsWithIds( |
| current_active_contents, session_options.offer_extmap_allow_mixed, |
| session_options.media_description_options); |
| |
| auto offer = std::make_unique<SessionDescription>(); |
| |
| // Iterate through the media description options, matching with existing media |
| // descriptions in `current_description`. |
| size_t msection_index = 0; |
| for (const MediaDescriptionOptions& media_description_options : |
| session_options.media_description_options) { |
| const ContentInfo* current_content = nullptr; |
| if (current_description && |
| msection_index < current_description->contents().size()) { |
| current_content = ¤t_description->contents()[msection_index]; |
| // Media type must match unless this media section is being recycled. |
| } |
| RTCError error; |
| switch (media_description_options.type) { |
| case MEDIA_TYPE_AUDIO: |
| case MEDIA_TYPE_VIDEO: |
| error = AddRtpContentForOffer( |
| media_description_options, session_options, current_content, |
| current_description, |
| media_description_options.type == MEDIA_TYPE_AUDIO |
| ? extensions_with_ids.audio |
| : extensions_with_ids.video, |
| media_description_options.type == MEDIA_TYPE_AUDIO |
| ? offer_audio_codecs |
| : offer_video_codecs, |
| ¤t_streams, offer.get(), &ice_credentials); |
| break; |
| case MEDIA_TYPE_DATA: |
| error = AddDataContentForOffer(media_description_options, |
| session_options, current_content, |
| current_description, ¤t_streams, |
| offer.get(), &ice_credentials); |
| break; |
| case MEDIA_TYPE_UNSUPPORTED: |
| error = AddUnsupportedContentForOffer( |
| media_description_options, session_options, current_content, |
| current_description, offer.get(), &ice_credentials); |
| break; |
| default: |
| RTC_DCHECK_NOTREACHED(); |
| } |
| if (!error.ok()) { |
| return error; |
| } |
| ++msection_index; |
| } |
| |
| // Bundle the contents together, if we've been asked to do so, and update any |
| // parameters that need to be tweaked for BUNDLE. |
| if (session_options.bundle_enabled) { |
| ContentGroup offer_bundle(GROUP_TYPE_BUNDLE); |
| for (const ContentInfo& content : offer->contents()) { |
| if (content.rejected) { |
| continue; |
| } |
| // TODO(deadbeef): There are conditions that make bundling two media |
| // descriptions together illegal. For example, they use the same payload |
| // type to represent different codecs, or same IDs for different header |
| // extensions. We need to detect this and not try to bundle those media |
| // descriptions together. |
| offer_bundle.AddContentName(content.mid()); |
| } |
| if (!offer_bundle.content_names().empty()) { |
| offer->AddGroup(offer_bundle); |
| if (!UpdateTransportInfoForBundle(offer_bundle, offer.get())) { |
| LOG_AND_RETURN_ERROR( |
| RTCErrorType::INTERNAL_ERROR, |
| "CreateOffer failed to UpdateTransportInfoForBundle"); |
| } |
| } |
| } |
| |
| // The following determines how to signal MSIDs to ensure compatibility with |
| // older endpoints (in particular, older Plan B endpoints). |
| if (is_unified_plan_) { |
| // Be conservative and signal using both a=msid and a=ssrc lines. Unified |
| // Plan answerers will look at a=msid and Plan B answerers will look at the |
| // a=ssrc MSID line. |
| offer->set_msid_signaling(cricket::kMsidSignalingSemantic | |
| cricket::kMsidSignalingMediaSection | |
| cricket::kMsidSignalingSsrcAttribute); |
| } else { |
| // Plan B always signals MSID using a=ssrc lines. |
| offer->set_msid_signaling(cricket::kMsidSignalingSemantic | |
| cricket::kMsidSignalingSsrcAttribute); |
| } |
| |
| offer->set_extmap_allow_mixed(session_options.offer_extmap_allow_mixed); |
| |
| return offer; |
| } |
| |
| webrtc::RTCErrorOr<std::unique_ptr<SessionDescription>> |
| MediaSessionDescriptionFactory::CreateAnswerOrError( |
| const SessionDescription* offer, |
| const MediaSessionOptions& session_options, |
| const SessionDescription* current_description) const { |
| if (!offer) { |
| LOG_AND_RETURN_ERROR(RTCErrorType::INTERNAL_ERROR, "Called without offer."); |
| } |
| |
| // Must have options for exactly as many sections as in the offer. |
| RTC_DCHECK_EQ(offer->contents().size(), |
| session_options.media_description_options.size()); |
| |
| IceCredentialsIterator ice_credentials( |
| session_options.pooled_ice_credentials); |
| |
| std::vector<const ContentInfo*> current_active_contents; |
| if (current_description) { |
| current_active_contents = |
| GetActiveContents(*current_description, session_options); |
| } |
| |
| StreamParamsVec current_streams = |
| GetCurrentStreamParams(current_active_contents); |
| |
| // Decide what congestion control feedback format we're using. |
| bool has_ack_ccfb = false; |
| if (transport_desc_factory_->trials().IsEnabled( |
| "WebRTC-RFC8888CongestionControlFeedback")) { |
| for (const auto& content : offer->contents()) { |
| if (content.media_description()->rtcp_fb_ack_ccfb()) { |
| has_ack_ccfb = true; |
| } else if (has_ack_ccfb) { |
| RTC_LOG(LS_ERROR) |
| << "Inconsistent rtcp_fb_ack_ccfb marking, ignoring all"; |
| has_ack_ccfb = false; |
| break; |
| } |
| } |
| } |
| |
| // Get list of all possible codecs that respects existing payload type |
| // mappings and uses a single payload type space. |
| // |
| // Note that these lists may be further filtered for each m= section; this |
| // step is done just to establish the payload type mappings shared by all |
| // sections. |
| Codecs answer_audio_codecs; |
| Codecs answer_video_codecs; |
| if (codec_vendor_) { |
| codec_vendor_->GetCodecsForAnswer(current_active_contents, *offer, |
| &answer_audio_codecs, |
| &answer_video_codecs); |
| } |
| |
| auto answer = std::make_unique<SessionDescription>(); |
| |
| // If the offer supports BUNDLE, and we want to use it too, create a BUNDLE |
| // group in the answer with the appropriate content names. |
| std::vector<const ContentGroup*> offer_bundles = |
| offer->GetGroupsByName(GROUP_TYPE_BUNDLE); |
| // There are as many answer BUNDLE groups as offer BUNDLE groups (even if |
| // rejected, we respond with an empty group). `offer_bundles`, |
| // `answer_bundles` and `bundle_transports` share the same size and indices. |
| std::vector<ContentGroup> answer_bundles; |
| std::vector<std::unique_ptr<TransportInfo>> bundle_transports; |
| answer_bundles.reserve(offer_bundles.size()); |
| bundle_transports.reserve(offer_bundles.size()); |
| for (size_t i = 0; i < offer_bundles.size(); ++i) { |
| answer_bundles.emplace_back(GROUP_TYPE_BUNDLE); |
| bundle_transports.emplace_back(nullptr); |
| } |
| |
| answer->set_extmap_allow_mixed(offer->extmap_allow_mixed()); |
| |
| // Iterate through the media description options, matching with existing |
| // media descriptions in `current_description`. |
| size_t msection_index = 0; |
| for (const MediaDescriptionOptions& media_description_options : |
| session_options.media_description_options) { |
| const ContentInfo* offer_content = &offer->contents()[msection_index]; |
| // Media types and MIDs must match between the remote offer and the |
| // MediaDescriptionOptions. |
| RTC_DCHECK( |
| IsMediaContentOfType(offer_content, media_description_options.type)); |
| RTC_DCHECK(media_description_options.mid == offer_content->mid()); |
| // Get the index of the BUNDLE group that this MID belongs to, if any. |
| std::optional<size_t> bundle_index; |
| for (size_t i = 0; i < offer_bundles.size(); ++i) { |
| if (offer_bundles[i]->HasContentName(media_description_options.mid)) { |
| bundle_index = i; |
| break; |
| } |
| } |
| TransportInfo* bundle_transport = |
| bundle_index.has_value() ? bundle_transports[bundle_index.value()].get() |
| : nullptr; |
| |
| const ContentInfo* current_content = nullptr; |
| if (current_description && |
| msection_index < current_description->contents().size()) { |
| current_content = ¤t_description->contents()[msection_index]; |
| } |
| // Don't offer the transport-cc header extension if "ack ccfb" is in use. |
| auto header_extensions_in = media_description_options.header_extensions; |
| if (has_ack_ccfb) { |
| for (auto& option : header_extensions_in) { |
| if (option.uri == webrtc::RtpExtension::kTransportSequenceNumberUri) { |
| option.direction = RtpTransceiverDirection::kStopped; |
| } |
| } |
| } |
| RtpHeaderExtensions header_extensions = RtpHeaderExtensionsFromCapabilities( |
| UnstoppedRtpHeaderExtensionCapabilities(header_extensions_in)); |
| RTCError error; |
| switch (media_description_options.type) { |
| case MEDIA_TYPE_AUDIO: |
| case MEDIA_TYPE_VIDEO: |
| error = AddRtpContentForAnswer( |
| media_description_options, session_options, offer_content, offer, |
| current_content, current_description, bundle_transport, |
| media_description_options.type == MEDIA_TYPE_AUDIO |
| ? answer_audio_codecs |
| : answer_video_codecs, |
| header_extensions, ¤t_streams, answer.get(), |
| &ice_credentials); |
| break; |
| case MEDIA_TYPE_DATA: |
| error = AddDataContentForAnswer( |
| media_description_options, session_options, offer_content, offer, |
| current_content, current_description, bundle_transport, |
| ¤t_streams, answer.get(), &ice_credentials); |
| break; |
| case MEDIA_TYPE_UNSUPPORTED: |
| error = AddUnsupportedContentForAnswer( |
| media_description_options, session_options, offer_content, offer, |
| current_content, current_description, bundle_transport, |
| answer.get(), &ice_credentials); |
| break; |
| default: |
| RTC_DCHECK_NOTREACHED(); |
| } |
| if (!error.ok()) { |
| return error; |
| } |
| ++msection_index; |
| // See if we can add the newly generated m= section to the BUNDLE group in |
| // the answer. |
| ContentInfo& added = answer->contents().back(); |
| if (!added.rejected && session_options.bundle_enabled && |
| bundle_index.has_value()) { |
| // The `bundle_index` is for `media_description_options.mid`. |
| RTC_DCHECK_EQ(media_description_options.mid, added.mid()); |
| answer_bundles[bundle_index.value()].AddContentName(added.mid()); |
| bundle_transports[bundle_index.value()].reset( |
| new TransportInfo(*answer->GetTransportInfoByName(added.mid()))); |
| } |
| } |
| |
| // If BUNDLE group(s) were offered, put the same number of BUNDLE groups in |
| // the answer even if they're empty. RFC5888 says: |
| // |
| // A SIP entity that receives an offer that contains an "a=group" line |
| // with semantics that are understood MUST return an answer that |
| // contains an "a=group" line with the same semantics. |
| if (!offer_bundles.empty()) { |
| for (const ContentGroup& answer_bundle : answer_bundles) { |
| answer->AddGroup(answer_bundle); |
| |
| if (answer_bundle.FirstContentName()) { |
| // Share the same ICE credentials and crypto params across all contents, |
| // as BUNDLE requires. |
| if (!UpdateTransportInfoForBundle(answer_bundle, answer.get())) { |
| LOG_AND_RETURN_ERROR( |
| RTCErrorType::INTERNAL_ERROR, |
| "CreateAnswer failed to UpdateTransportInfoForBundle."); |
| } |
| } |
| } |
| } |
| |
| // The following determines how to signal MSIDs to ensure compatibility with |
| // older endpoints (in particular, older Plan B endpoints). |
| if (is_unified_plan_) { |
| // Unified Plan needs to look at what the offer included to find the most |
| // compatible answer. |
| int msid_signaling = offer->msid_signaling(); |
| if (msid_signaling == |
| (cricket::kMsidSignalingSemantic | cricket::kMsidSignalingMediaSection | |
| cricket::kMsidSignalingSsrcAttribute)) { |
| // If both a=msid and a=ssrc MSID signaling methods were used, we're |
| // probably talking to a Unified Plan endpoint so respond with just |
| // a=msid. |
| answer->set_msid_signaling(cricket::kMsidSignalingSemantic | |
| cricket::kMsidSignalingMediaSection); |
| } else if (msid_signaling == (cricket::kMsidSignalingSemantic | |
| cricket::kMsidSignalingSsrcAttribute) || |
| msid_signaling == cricket::kMsidSignalingSsrcAttribute) { |
| // If only a=ssrc MSID signaling method was used, we're probably talking |
| // to a Plan B endpoint so respond with just a=ssrc MSID. |
| answer->set_msid_signaling(cricket::kMsidSignalingSemantic | |
| cricket::kMsidSignalingSsrcAttribute); |
| } else { |
| // We end up here in one of three cases: |
| // 1. An empty offer. We'll reply with an empty answer so it doesn't |
| // matter what we pick here. |
| // 2. A data channel only offer. We won't add any MSIDs to the answer so |
| // it also doesn't matter what we pick here. |
| // 3. Media that's either recvonly or inactive from the remote point of |
| // view. |
| // We don't have any information to say whether the endpoint is Plan B |
| // or Unified Plan. Since plan-b is obsolete, do not respond with it. |
| // We assume that endpoints not supporting MSID will silently ignore |
| // the a=msid lines they do not understand. |
| answer->set_msid_signaling(cricket::kMsidSignalingSemantic | |
| cricket::kMsidSignalingMediaSection); |
| } |
| } else { |
| // Plan B always signals MSID using a=ssrc lines. |
| answer->set_msid_signaling(cricket::kMsidSignalingSemantic | |
| cricket::kMsidSignalingSsrcAttribute); |
| } |
| |
| return answer; |
| } |
| |
| |
| MediaSessionDescriptionFactory::AudioVideoRtpHeaderExtensions |
| MediaSessionDescriptionFactory::GetOfferedRtpHeaderExtensionsWithIds( |
| const std::vector<const ContentInfo*>& current_active_contents, |
| bool extmap_allow_mixed, |
| const std::vector<MediaDescriptionOptions>& media_description_options) |
| const { |
| // All header extensions allocated from the same range to avoid potential |
| // issues when using BUNDLE. |
| |
| // Strictly speaking the SDP attribute extmap_allow_mixed signals that the |
| // receiver supports an RTP stream where one- and two-byte RTP header |
| // extensions are mixed. For backwards compatibility reasons it's used in |
| // WebRTC to signal that two-byte RTP header extensions are supported. |
| UsedRtpHeaderExtensionIds used_ids( |
| extmap_allow_mixed ? UsedRtpHeaderExtensionIds::IdDomain::kTwoByteAllowed |
| : UsedRtpHeaderExtensionIds::IdDomain::kOneByteOnly); |
| |
| RtpHeaderExtensions all_encountered_extensions; |
| |
| AudioVideoRtpHeaderExtensions offered_extensions; |
| // First - get all extensions from the current description if the media type |
| // is used. |
| // Add them to `used_ids` so the local ids are not reused if a new media |
| // type is added. |
| for (const ContentInfo* content : current_active_contents) { |
| if (IsMediaContentOfType(content, MEDIA_TYPE_AUDIO)) { |
| MergeRtpHdrExts(content->media_description()->rtp_header_extensions(), |
| enable_encrypted_rtp_header_extensions_, |
| &offered_extensions.audio, &all_encountered_extensions, |
| &used_ids); |
| } else if (IsMediaContentOfType(content, MEDIA_TYPE_VIDEO)) { |
| MergeRtpHdrExts(content->media_description()->rtp_header_extensions(), |
| enable_encrypted_rtp_header_extensions_, |
| &offered_extensions.video, &all_encountered_extensions, |
| &used_ids); |
| } |
| } |
| |
| // Add all encountered header extensions in the media description options that |
| // are not in the current description. |
| |
| for (const auto& entry : media_description_options) { |
| RtpHeaderExtensions filtered_extensions = |
| filtered_rtp_header_extensions(UnstoppedOrPresentRtpHeaderExtensions( |
| entry.header_extensions, all_encountered_extensions)); |
| if (entry.type == MEDIA_TYPE_AUDIO) |
| MergeRtpHdrExts( |
| filtered_extensions, enable_encrypted_rtp_header_extensions_, |
| &offered_extensions.audio, &all_encountered_extensions, &used_ids); |
| else if (entry.type == MEDIA_TYPE_VIDEO) |
| MergeRtpHdrExts( |
| filtered_extensions, enable_encrypted_rtp_header_extensions_, |
| &offered_extensions.video, &all_encountered_extensions, &used_ids); |
| } |
| return offered_extensions; |
| } |
| |
| RTCError MediaSessionDescriptionFactory::AddTransportOffer( |
| const std::string& content_name, |
| const TransportOptions& transport_options, |
| const SessionDescription* current_desc, |
| SessionDescription* offer_desc, |
| IceCredentialsIterator* ice_credentials) const { |
| const TransportDescription* current_tdesc = |
| GetTransportDescription(content_name, current_desc); |
| std::unique_ptr<TransportDescription> new_tdesc( |
| transport_desc_factory_->CreateOffer(transport_options, current_tdesc, |
| ice_credentials)); |
| if (!new_tdesc) { |
| RTC_LOG(LS_ERROR) << "Failed to AddTransportOffer, content name=" |
| << content_name; |
| } |
| offer_desc->AddTransportInfo(TransportInfo(content_name, *new_tdesc)); |
| return RTCError::OK(); |
| } |
| |
| std::unique_ptr<TransportDescription> |
| MediaSessionDescriptionFactory::CreateTransportAnswer( |
| const std::string& content_name, |
| const SessionDescription* offer_desc, |
| const TransportOptions& transport_options, |
| const SessionDescription* current_desc, |
| bool require_transport_attributes, |
| IceCredentialsIterator* ice_credentials) const { |
| const TransportDescription* offer_tdesc = |
| GetTransportDescription(content_name, offer_desc); |
| const TransportDescription* current_tdesc = |
| GetTransportDescription(content_name, current_desc); |
| return transport_desc_factory_->CreateAnswer(offer_tdesc, transport_options, |
| require_transport_attributes, |
| current_tdesc, ice_credentials); |
| } |
| |
| RTCError MediaSessionDescriptionFactory::AddTransportAnswer( |
| const std::string& content_name, |
| const TransportDescription& transport_desc, |
| SessionDescription* answer_desc) const { |
| answer_desc->AddTransportInfo(TransportInfo(content_name, transport_desc)); |
| return RTCError::OK(); |
| } |
| |
| // Add the RTP description to the SessionDescription. |
| // If media_description_options.codecs_to_include is set, those codecs are used. |
| // |
| // If it is not set, the codecs used are computed based on: |
| // `codecs` = set of all possible codecs that can be used, with correct |
| // payload type mappings |
| // |
| // `supported_codecs` = set of codecs that are supported for the direction |
| // of this m= section |
| // `current_content` = current description, may be null. |
| // current_content->codecs() = set of previously negotiated codecs for this m= |
| // section |
| // |
| // The payload types should come from codecs, but the order should come |
| // from current_content->codecs() and then supported_codecs, to ensure that |
| // re-offers don't change existing codec priority, and that new codecs are added |
| // with the right priority. |
| RTCError MediaSessionDescriptionFactory::AddRtpContentForOffer( |
| const MediaDescriptionOptions& media_description_options, |
| const MediaSessionOptions& session_options, |
| const ContentInfo* current_content, |
| const SessionDescription* current_description, |
| const RtpHeaderExtensions& header_extensions, |
| const std::vector<Codec>& codecs, |
| StreamParamsVec* current_streams, |
| SessionDescription* session_description, |
| IceCredentialsIterator* ice_credentials) const { |
| RTC_DCHECK(media_description_options.type == MEDIA_TYPE_AUDIO || |
| media_description_options.type == MEDIA_TYPE_VIDEO); |
| |
| std::vector<Codec> codecs_to_include; |
| if (media_description_options.codecs_to_include.empty()) { |
| webrtc::RTCErrorOr<std::vector<Codec>> error_or_filtered_codecs = |
| codec_vendor_->GetNegotiatedCodecsForOffer( |
| media_description_options, session_options, current_content, |
| CodecList(codecs)); |
| if (!error_or_filtered_codecs.ok()) { |
| return error_or_filtered_codecs.MoveError(); |
| } |
| codecs_to_include = error_or_filtered_codecs.MoveValue(); |
| } else { |
| // Ignore both the codecs argument and the Get*CodecsForOffer results. |
| codecs_to_include = media_description_options.codecs_to_include; |
| } |
| AssignCodecIdsAndLinkRed(pt_suggester_, media_description_options.mid, |
| codecs_to_include); |
| std::unique_ptr<MediaContentDescription> content_description; |
| if (media_description_options.type == MEDIA_TYPE_AUDIO) { |
| content_description = std::make_unique<AudioContentDescription>(); |
| } else { |
| content_description = std::make_unique<VideoContentDescription>(); |
| } |
| // RFC 8888 support. |
| content_description->set_rtcp_fb_ack_ccfb( |
| transport_desc_factory_->trials().IsEnabled( |
| "WebRTC-RFC8888CongestionControlFeedback")); |
| auto error = CreateMediaContentOffer( |
| media_description_options, session_options, codecs_to_include, |
| header_extensions, ssrc_generator(), current_streams, |
| content_description.get(), transport_desc_factory_->trials()); |
| if (!error.ok()) { |
| return error; |
| } |
| |
| // Insecure transport should only occur in testing. |
| bool secure_transport = !(transport_desc_factory_->insecure()); |
| SetMediaProtocol(secure_transport, content_description.get()); |
| |
| content_description->set_direction(media_description_options.direction); |
| bool has_codecs = !content_description->codecs().empty(); |
| |
| session_description->AddContent( |
| media_description_options.mid, MediaProtocolType::kRtp, |
| media_description_options.stopped || !has_codecs, |
| std::move(content_description)); |
| return AddTransportOffer(media_description_options.mid, |
| media_description_options.transport_options, |
| current_description, session_description, |
| ice_credentials); |
| } |
| |
| RTCError MediaSessionDescriptionFactory::AddDataContentForOffer( |
| const MediaDescriptionOptions& media_description_options, |
| const MediaSessionOptions& session_options, |
| const ContentInfo* current_content, |
| const SessionDescription* current_description, |
| StreamParamsVec* current_streams, |
| SessionDescription* desc, |
| IceCredentialsIterator* ice_credentials) const { |
| auto data = std::make_unique<SctpDataContentDescription>(); |
| |
| bool secure_transport = true; |
| |
| std::vector<std::string> crypto_suites; |
| // Unlike SetMediaProtocol below, we need to set the protocol |
| // before we call CreateMediaContentOffer. Otherwise, |
| // CreateMediaContentOffer won't know this is SCTP and will |
| // generate SSRCs rather than SIDs. |
| data->set_protocol(secure_transport ? kMediaProtocolUdpDtlsSctp |
| : kMediaProtocolSctp); |
| data->set_use_sctpmap(session_options.use_obsolete_sctp_sdp); |
| data->set_max_message_size(kSctpSendBufferSize); |
| |
| auto error = CreateContentOffer(media_description_options, session_options, |
| RtpHeaderExtensions(), ssrc_generator(), |
| current_streams, data.get()); |
| if (!error.ok()) { |
| return error; |
| } |
| |
| desc->AddContent(media_description_options.mid, MediaProtocolType::kSctp, |
| media_description_options.stopped, std::move(data)); |
| return AddTransportOffer(media_description_options.mid, |
| media_description_options.transport_options, |
| current_description, desc, ice_credentials); |
| } |
| |
| RTCError MediaSessionDescriptionFactory::AddUnsupportedContentForOffer( |
| const MediaDescriptionOptions& media_description_options, |
| const MediaSessionOptions& session_options, |
| const ContentInfo* current_content, |
| const SessionDescription* current_description, |
| SessionDescription* desc, |
| IceCredentialsIterator* ice_credentials) const { |
| RTC_CHECK(IsMediaContentOfType(current_content, MEDIA_TYPE_UNSUPPORTED)); |
| |
| const UnsupportedContentDescription* current_unsupported_description = |
| current_content->media_description()->as_unsupported(); |
| auto unsupported = std::make_unique<UnsupportedContentDescription>( |
| current_unsupported_description->media_type()); |
| unsupported->set_protocol(current_content->media_description()->protocol()); |
| desc->AddContent(media_description_options.mid, MediaProtocolType::kOther, |
| /*rejected=*/true, std::move(unsupported)); |
| |
| return AddTransportOffer(media_description_options.mid, |
| media_description_options.transport_options, |
| current_description, desc, ice_credentials); |
| } |
| |
| // `codecs` = set of all possible codecs that can be used, with correct |
| // payload type mappings |
| // |
| // `supported_codecs` = set of codecs that are supported for the direction |
| // of this m= section |
| // |
| // mcd->codecs() = set of previously negotiated codecs for this m= section |
| // |
| // The payload types should come from codecs, but the order should come |
| // from mcd->codecs() and then supported_codecs, to ensure that re-offers don't |
| // change existing codec priority, and that new codecs are added with the right |
| // priority. |
| RTCError MediaSessionDescriptionFactory::AddRtpContentForAnswer( |
| const MediaDescriptionOptions& media_description_options, |
| const MediaSessionOptions& session_options, |
| const ContentInfo* offer_content, |
| const SessionDescription* offer_description, |
| const ContentInfo* current_content, |
| const SessionDescription* current_description, |
| const TransportInfo* bundle_transport, |
| const std::vector<Codec>& codecs, |
| const RtpHeaderExtensions& header_extensions, |
| StreamParamsVec* current_streams, |
| SessionDescription* answer, |
| IceCredentialsIterator* ice_credentials) const { |
| RTC_DCHECK(media_description_options.type == MEDIA_TYPE_AUDIO || |
| media_description_options.type == MEDIA_TYPE_VIDEO); |
| RTC_CHECK( |
| IsMediaContentOfType(offer_content, media_description_options.type)); |
| const RtpMediaContentDescription* offer_content_description; |
| if (media_description_options.type == MEDIA_TYPE_AUDIO) { |
| offer_content_description = offer_content->media_description()->as_audio(); |
| } else { |
| offer_content_description = offer_content->media_description()->as_video(); |
| } |
| // If this section is part of a bundle, bundle_transport is non-null. |
| // Then require_transport_attributes is false - we can handle sections |
| // without the DTLS parameters. For rejected m-lines it does not matter. |
| // Otherwise, transport attributes MUST be present. |
| std::unique_ptr<TransportDescription> transport = CreateTransportAnswer( |
| media_description_options.mid, offer_description, |
| media_description_options.transport_options, current_description, |
| !offer_content->rejected && bundle_transport == nullptr, ice_credentials); |
| if (!transport) { |
| LOG_AND_RETURN_ERROR( |
| RTCErrorType::INTERNAL_ERROR, |
| "Failed to create transport answer, transport is missing"); |
| } |
| |
| // Pick codecs based on the requested communications direction in the offer |
| // and the selected direction in the answer. |
| // Note these will be filtered one final time in CreateMediaContentAnswer. |
| auto wants_rtd = media_description_options.direction; |
| auto offer_rtd = offer_content_description->direction(); |
| auto answer_rtd = NegotiateRtpTransceiverDirection(offer_rtd, wants_rtd); |
| |
| std::vector<Codec> codecs_to_include; |
| bool negotiate; |
| if (media_description_options.codecs_to_include.empty()) { |
| webrtc::RTCErrorOr<std::vector<Codec>> error_or_filtered_codecs = |
| codec_vendor_->GetNegotiatedCodecsForAnswer( |
| media_description_options, session_options, offer_rtd, answer_rtd, |
| current_content, CodecList(codecs)); |
| if (!error_or_filtered_codecs.ok()) { |
| return error_or_filtered_codecs.MoveError(); |
| } |
| codecs_to_include = error_or_filtered_codecs.MoveValue(); |
| negotiate = true; |
| } else { |
| codecs_to_include = media_description_options.codecs_to_include; |
| negotiate = false; // Don't filter against remote codecs |
| } |
| // Determine if we have media codecs in common. |
| bool has_usable_media_codecs = |
| std::find_if(codecs_to_include.begin(), codecs_to_include.end(), |
| [](const Codec& c) { |
| return c.IsMediaCodec() && !IsComfortNoiseCodec(c); |
| }) != codecs_to_include.end(); |
| |
| bool bundle_enabled = offer_description->HasGroup(GROUP_TYPE_BUNDLE) && |
| session_options.bundle_enabled; |
| std::unique_ptr<MediaContentDescription> answer_content; |
| if (media_description_options.type == MEDIA_TYPE_AUDIO) { |
| answer_content = std::make_unique<AudioContentDescription>(); |
| } else { |
| answer_content = std::make_unique<VideoContentDescription>(); |
| } |
| if (negotiate) { |
| std::vector<Codec> negotiated_codecs; |
| CodecVendor::NegotiateCodecs( |
| CodecList(codecs_to_include), |
| CodecList(offer_content_description->codecs()), &negotiated_codecs, |
| media_description_options.codec_preferences.empty()); |
| codecs_to_include = negotiated_codecs; |
| } |
| AssignCodecIdsAndLinkRed(pt_suggester_, media_description_options.mid, |
| codecs_to_include); |
| // RFC 8888 support. Only answer with "ack ccfb" if offer has it and |
| // experiment is enabled. |
| if (offer_content_description->rtcp_fb_ack_ccfb()) { |
| answer_content->set_rtcp_fb_ack_ccfb( |
| transport_desc_factory_->trials().IsEnabled( |
| "WebRTC-RFC8888CongestionControlFeedback")); |
| for (auto& codec : codecs_to_include) { |
| codec.feedback_params.Remove(FeedbackParam(kRtcpFbParamTransportCc)); |
| } |
| } |
| if (!SetCodecsInAnswer(offer_content_description, codecs_to_include, |
| media_description_options, session_options, |
| ssrc_generator(), current_streams, |
| answer_content.get(), |
| transport_desc_factory_->trials())) { |
| LOG_AND_RETURN_ERROR(RTCErrorType::INTERNAL_ERROR, |
| "Failed to set codecs in answer"); |
| } |
| if (!CreateMediaContentAnswer( |
| offer_content_description, media_description_options, session_options, |
| filtered_rtp_header_extensions(header_extensions), ssrc_generator(), |
| enable_encrypted_rtp_header_extensions_, current_streams, |
| bundle_enabled, answer_content.get())) { |
| LOG_AND_RETURN_ERROR(RTCErrorType::INTERNAL_ERROR, |
| "Failed to create answer"); |
| } |
| |
| bool secure = bundle_transport ? bundle_transport->description.secure() |
| : transport->secure(); |
| bool rejected = media_description_options.stopped || |
| offer_content->rejected || !has_usable_media_codecs || |
| !IsMediaProtocolSupported(MEDIA_TYPE_AUDIO, |
| answer_content->protocol(), secure); |
| if (rejected) { |
| RTC_LOG(LS_INFO) << "m= section '" << media_description_options.mid |
| << "' being rejected in answer."; |
| } |
| |
| auto error = |
| AddTransportAnswer(media_description_options.mid, *transport, answer); |
| if (!error.ok()) { |
| return error; |
| } |
| |
| answer->AddContent(media_description_options.mid, offer_content->type, |
| rejected, std::move(answer_content)); |
| return RTCError::OK(); |
| } |
| |
| RTCError MediaSessionDescriptionFactory::AddDataContentForAnswer( |
| const MediaDescriptionOptions& media_description_options, |
| const MediaSessionOptions& session_options, |
| const ContentInfo* offer_content, |
| const SessionDescription* offer_description, |
| const ContentInfo* current_content, |
| const SessionDescription* current_description, |
| const TransportInfo* bundle_transport, |
| StreamParamsVec* current_streams, |
| SessionDescription* answer, |
| IceCredentialsIterator* ice_credentials) const { |
| std::unique_ptr<TransportDescription> data_transport = CreateTransportAnswer( |
| media_description_options.mid, offer_description, |
| media_description_options.transport_options, current_description, |
| !offer_content->rejected && bundle_transport == nullptr, ice_credentials); |
| if (!data_transport) { |
| LOG_AND_RETURN_ERROR( |
| RTCErrorType::INTERNAL_ERROR, |
| "Failed to create transport answer, data transport is missing"); |
| } |
| |
| bool bundle_enabled = offer_description->HasGroup(GROUP_TYPE_BUNDLE) && |
| session_options.bundle_enabled; |
| RTC_CHECK(IsMediaContentOfType(offer_content, MEDIA_TYPE_DATA)); |
| std::unique_ptr<MediaContentDescription> data_answer; |
| if (offer_content->media_description()->as_sctp()) { |
| // SCTP data content |
| data_answer = std::make_unique<SctpDataContentDescription>(); |
| const SctpDataContentDescription* offer_data_description = |
| offer_content->media_description()->as_sctp(); |
| // Respond with the offerer's proto, whatever it is. |
| data_answer->as_sctp()->set_protocol(offer_data_description->protocol()); |
| // Respond with our max message size or the remote max messsage size, |
| // whichever is smaller. |
| // 0 is treated specially - it means "I can accept any size". Since |
| // we do not implement infinite size messages, reply with |
| // kSctpSendBufferSize. |
| if (offer_data_description->max_message_size() <= 0) { |
| data_answer->as_sctp()->set_max_message_size(kSctpSendBufferSize); |
| } else { |
| data_answer->as_sctp()->set_max_message_size(std::min( |
| offer_data_description->max_message_size(), kSctpSendBufferSize)); |
| } |
| if (!CreateMediaContentAnswer( |
| offer_data_description, media_description_options, session_options, |
| RtpHeaderExtensions(), ssrc_generator(), |
| enable_encrypted_rtp_header_extensions_, current_streams, |
| bundle_enabled, data_answer.get())) { |
| LOG_AND_RETURN_ERROR(RTCErrorType::INTERNAL_ERROR, |
| "Failed to create answer"); |
| } |
| // Respond with sctpmap if the offer uses sctpmap. |
| bool offer_uses_sctpmap = offer_data_description->use_sctpmap(); |
| data_answer->as_sctp()->set_use_sctpmap(offer_uses_sctpmap); |
| } else { |
| RTC_DCHECK_NOTREACHED() << "Non-SCTP data content found"; |
| } |
| |
| bool secure = bundle_transport ? bundle_transport->description.secure() |
| : data_transport->secure(); |
| |
| bool rejected = media_description_options.stopped || |
| offer_content->rejected || |
| !IsMediaProtocolSupported(MEDIA_TYPE_DATA, |
| data_answer->protocol(), secure); |
| auto error = AddTransportAnswer(media_description_options.mid, |
| *data_transport, answer); |
| if (!error.ok()) { |
| return error; |
| } |
| answer->AddContent(media_description_options.mid, offer_content->type, |
| rejected, std::move(data_answer)); |
| return RTCError::OK(); |
| } |
| |
| RTCError MediaSessionDescriptionFactory::AddUnsupportedContentForAnswer( |
| const MediaDescriptionOptions& media_description_options, |
| const MediaSessionOptions& session_options, |
| const ContentInfo* offer_content, |
| const SessionDescription* offer_description, |
| const ContentInfo* current_content, |
| const SessionDescription* current_description, |
| const TransportInfo* bundle_transport, |
| SessionDescription* answer, |
| IceCredentialsIterator* ice_credentials) const { |
| std::unique_ptr<TransportDescription> unsupported_transport = |
| CreateTransportAnswer( |
| media_description_options.mid, offer_description, |
| media_description_options.transport_options, current_description, |
| !offer_content->rejected && bundle_transport == nullptr, |
| ice_credentials); |
| if (!unsupported_transport) { |
| LOG_AND_RETURN_ERROR( |
| RTCErrorType::INTERNAL_ERROR, |
| "Failed to create transport answer, unsupported transport is missing"); |
| } |
| RTC_CHECK(IsMediaContentOfType(offer_content, MEDIA_TYPE_UNSUPPORTED)); |
| |
| const UnsupportedContentDescription* offer_unsupported_description = |
| offer_content->media_description()->as_unsupported(); |
| std::unique_ptr<MediaContentDescription> unsupported_answer = |
| std::make_unique<UnsupportedContentDescription>( |
| offer_unsupported_description->media_type()); |
| unsupported_answer->set_protocol(offer_unsupported_description->protocol()); |
| |
| auto error = AddTransportAnswer(media_description_options.mid, |
| *unsupported_transport, answer); |
| if (!error.ok()) { |
| return error; |
| } |
| |
| answer->AddContent(media_description_options.mid, offer_content->type, |
| /*rejected=*/true, std::move(unsupported_answer)); |
| return RTCError::OK(); |
| } |
| |
| bool IsMediaContent(const ContentInfo* content) { |
| return (content && (content->type == MediaProtocolType::kRtp || |
| content->type == MediaProtocolType::kSctp)); |
| } |
| |
| bool IsAudioContent(const ContentInfo* content) { |
| return IsMediaContentOfType(content, MEDIA_TYPE_AUDIO); |
| } |
| |
| bool IsVideoContent(const ContentInfo* content) { |
| return IsMediaContentOfType(content, MEDIA_TYPE_VIDEO); |
| } |
| |
| bool IsDataContent(const ContentInfo* content) { |
| return IsMediaContentOfType(content, MEDIA_TYPE_DATA); |
| } |
| |
| bool IsUnsupportedContent(const ContentInfo* content) { |
| return IsMediaContentOfType(content, MEDIA_TYPE_UNSUPPORTED); |
| } |
| |
| const ContentInfo* GetFirstMediaContent(const ContentInfos& contents, |
| MediaType media_type) { |
| for (const ContentInfo& content : contents) { |
| if (IsMediaContentOfType(&content, media_type)) { |
| return &content; |
| } |
| } |
| return nullptr; |
| } |
| |
| const ContentInfo* GetFirstAudioContent(const ContentInfos& contents) { |
| return GetFirstMediaContent(contents, MEDIA_TYPE_AUDIO); |
| } |
| |
| const ContentInfo* GetFirstVideoContent(const ContentInfos& contents) { |
| return GetFirstMediaContent(contents, MEDIA_TYPE_VIDEO); |
| } |
| |
| const ContentInfo* GetFirstDataContent(const ContentInfos& contents) { |
| return GetFirstMediaContent(contents, MEDIA_TYPE_DATA); |
| } |
| |
| const ContentInfo* GetFirstMediaContent(const SessionDescription* sdesc, |
| MediaType media_type) { |
| if (sdesc == nullptr) { |
| return nullptr; |
| } |
| |
| return GetFirstMediaContent(sdesc->contents(), media_type); |
| } |
| |
| const ContentInfo* GetFirstAudioContent(const SessionDescription* sdesc) { |
| return GetFirstMediaContent(sdesc, MEDIA_TYPE_AUDIO); |
| } |
| |
| const ContentInfo* GetFirstVideoContent(const SessionDescription* sdesc) { |
| return GetFirstMediaContent(sdesc, MEDIA_TYPE_VIDEO); |
| } |
| |
| const ContentInfo* GetFirstDataContent(const SessionDescription* sdesc) { |
| return GetFirstMediaContent(sdesc, MEDIA_TYPE_DATA); |
| } |
| |
| const MediaContentDescription* GetFirstMediaContentDescription( |
| const SessionDescription* sdesc, |
| MediaType media_type) { |
| const ContentInfo* content = GetFirstMediaContent(sdesc, media_type); |
| return (content ? content->media_description() : nullptr); |
| } |
| |
| const AudioContentDescription* GetFirstAudioContentDescription( |
| const SessionDescription* sdesc) { |
| auto desc = GetFirstMediaContentDescription(sdesc, MEDIA_TYPE_AUDIO); |
| return desc ? desc->as_audio() : nullptr; |
| } |
| |
| const VideoContentDescription* GetFirstVideoContentDescription( |
| const SessionDescription* sdesc) { |
| auto desc = GetFirstMediaContentDescription(sdesc, MEDIA_TYPE_VIDEO); |
| return desc ? desc->as_video() : nullptr; |
| } |
| |
| const SctpDataContentDescription* GetFirstSctpDataContentDescription( |
| const SessionDescription* sdesc) { |
| auto desc = GetFirstMediaContentDescription(sdesc, MEDIA_TYPE_DATA); |
| return desc ? desc->as_sctp() : nullptr; |
| } |
| |
| // |
| // Non-const versions of the above functions. |
| // |
| |
| ContentInfo* GetFirstMediaContent(ContentInfos* contents, |
| MediaType media_type) { |
| for (ContentInfo& content : *contents) { |
| if (IsMediaContentOfType(&content, media_type)) { |
| return &content; |
| } |
| } |
| return nullptr; |
| } |
| |
| ContentInfo* GetFirstAudioContent(ContentInfos* contents) { |
| return GetFirstMediaContent(contents, MEDIA_TYPE_AUDIO); |
| } |
| |
| ContentInfo* GetFirstVideoContent(ContentInfos* contents) { |
| return GetFirstMediaContent(contents, MEDIA_TYPE_VIDEO); |
| } |
| |
| ContentInfo* GetFirstDataContent(ContentInfos* contents) { |
| return GetFirstMediaContent(contents, MEDIA_TYPE_DATA); |
| } |
| |
| ContentInfo* GetFirstMediaContent(SessionDescription* sdesc, |
| MediaType media_type) { |
| if (sdesc == nullptr) { |
| return nullptr; |
| } |
| |
| return GetFirstMediaContent(&sdesc->contents(), media_type); |
| } |
| |
| ContentInfo* GetFirstAudioContent(SessionDescription* sdesc) { |
| return GetFirstMediaContent(sdesc, MEDIA_TYPE_AUDIO); |
| } |
| |
| ContentInfo* GetFirstVideoContent(SessionDescription* sdesc) { |
| return GetFirstMediaContent(sdesc, MEDIA_TYPE_VIDEO); |
| } |
| |
| ContentInfo* GetFirstDataContent(SessionDescription* sdesc) { |
| return GetFirstMediaContent(sdesc, MEDIA_TYPE_DATA); |
| } |
| |
| MediaContentDescription* GetFirstMediaContentDescription( |
| SessionDescription* sdesc, |
| MediaType media_type) { |
| ContentInfo* content = GetFirstMediaContent(sdesc, media_type); |
| return (content ? content->media_description() : nullptr); |
| } |
| |
| AudioContentDescription* GetFirstAudioContentDescription( |
| SessionDescription* sdesc) { |
| auto desc = GetFirstMediaContentDescription(sdesc, MEDIA_TYPE_AUDIO); |
| return desc ? desc->as_audio() : nullptr; |
| } |
| |
| VideoContentDescription* GetFirstVideoContentDescription( |
| SessionDescription* sdesc) { |
| auto desc = GetFirstMediaContentDescription(sdesc, MEDIA_TYPE_VIDEO); |
| return desc ? desc->as_video() : nullptr; |
| } |
| |
| SctpDataContentDescription* GetFirstSctpDataContentDescription( |
| SessionDescription* sdesc) { |
| auto desc = GetFirstMediaContentDescription(sdesc, MEDIA_TYPE_DATA); |
| return desc ? desc->as_sctp() : nullptr; |
| } |
| |
| } // namespace cricket |