toxcore/toxav/rtp.c
iphydf cd8080f6d1
Rename some rtp header struct members to be clearer.
These are the names used in the next PR, in RTPHeaderV3, so here we
rename the old struct members already.
2018-01-25 09:42:01 +00:00

404 lines
12 KiB
C

/*
* Copyright © 2016-2017 The TokTok team.
* Copyright © 2013-2015 Tox project.
*
* This file is part of Tox, the free peer to peer instant messenger.
*
* Tox is free software: you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation, either version 3 of the License, or
* (at your option) any later version.
*
* Tox is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with Tox. If not, see <http://www.gnu.org/licenses/>.
*/
#ifdef HAVE_CONFIG_H
#include "config.h"
#endif /* HAVE_CONFIG_H */
#include "rtp.h"
#include "bwcontroller.h"
#include "../toxcore/Messenger.h"
#include "../toxcore/logger.h"
#include "../toxcore/util.h"
#include <assert.h>
#include <errno.h>
#include <stdlib.h>
int handle_rtp_packet(Messenger *m, uint32_t friendnumber, const uint8_t *data, uint16_t length, void *object);
RTPSession *rtp_new(int payload_type, Messenger *m, uint32_t friendnumber,
BWController *bwc, void *cs,
int (*mcb)(void *, struct RTPMessage *))
{
assert(mcb);
assert(cs);
assert(m);
RTPSession *retu = (RTPSession *)calloc(1, sizeof(RTPSession));
if (!retu) {
LOGGER_WARNING(m->log, "Alloc failed! Program might misbehave!");
return NULL;
}
retu->ssrc = random_u32();
retu->payload_type = payload_type;
retu->m = m;
retu->friend_number = friendnumber;
/* Also set payload type as prefix */
retu->bwc = bwc;
retu->cs = cs;
retu->mcb = mcb;
if (-1 == rtp_allow_receiving(retu)) {
LOGGER_WARNING(m->log, "Failed to start rtp receiving mode");
free(retu);
return NULL;
}
return retu;
}
void rtp_kill(RTPSession *session)
{
if (!session) {
return;
}
LOGGER_DEBUG(session->m->log, "Terminated RTP session: %p", session);
rtp_stop_receiving(session);
free(session);
}
int rtp_allow_receiving(RTPSession *session)
{
if (session == NULL) {
return -1;
}
if (m_callback_rtp_packet(session->m, session->friend_number, session->payload_type,
handle_rtp_packet, session) == -1) {
LOGGER_WARNING(session->m->log, "Failed to register rtp receive handler");
return -1;
}
LOGGER_DEBUG(session->m->log, "Started receiving on session: %p", session);
return 0;
}
int rtp_stop_receiving(RTPSession *session)
{
if (session == NULL) {
return -1;
}
m_callback_rtp_packet(session->m, session->friend_number, session->payload_type, NULL, NULL);
LOGGER_DEBUG(session->m->log, "Stopped receiving on session: %p", session);
return 0;
}
int rtp_send_data(RTPSession *session, const uint8_t *data, uint16_t length, Logger *log)
{
if (!session) {
LOGGER_ERROR(log, "No session!");
return -1;
}
VLA(uint8_t, rdata, length + sizeof(struct RTPHeader) + 1);
memset(rdata, 0, SIZEOF_VLA(rdata));
rdata[0] = session->payload_type;
struct RTPHeader *header = (struct RTPHeader *)(rdata + 1);
header->protocol_version = 2;
header->pe = 0;
header->xe = 0;
header->cc = 0;
header->ma = 0;
header->pt = session->payload_type % 128;
header->sequnum = net_htons(session->sequnum);
header->timestamp = net_htonl(current_time_monotonic());
header->ssrc = net_htonl(session->ssrc);
header->offset_lower = 0;
header->data_length_lower = net_htons(length);
if (MAX_CRYPTO_DATA_SIZE > length + sizeof(struct RTPHeader) + 1) {
/**
* The length is lesser than the maximum allowed length (including header)
* Send the packet in single piece.
*/
memcpy(rdata + 1 + sizeof(struct RTPHeader), data, length);
if (-1 == m_send_custom_lossy_packet(session->m, session->friend_number, rdata, SIZEOF_VLA(rdata))) {
LOGGER_WARNING(session->m->log, "RTP send failed (len: %d)! std error: %s", SIZEOF_VLA(rdata), strerror(errno));
}
} else {
/**
* The length is greater than the maximum allowed length (including header)
* Send the packet in multiple pieces.
*/
uint16_t sent = 0;
uint16_t piece = MAX_CRYPTO_DATA_SIZE - (sizeof(struct RTPHeader) + 1);
while ((length - sent) + sizeof(struct RTPHeader) + 1 > MAX_CRYPTO_DATA_SIZE) {
memcpy(rdata + 1 + sizeof(struct RTPHeader), data + sent, piece);
if (-1 == m_send_custom_lossy_packet(session->m, session->friend_number,
rdata, piece + sizeof(struct RTPHeader) + 1)) {
LOGGER_WARNING(session->m->log, "RTP send failed (len: %d)! std error: %s",
piece + sizeof(struct RTPHeader) + 1, strerror(errno));
}
sent += piece;
header->offset_lower = net_htons(sent);
}
/* Send remaining */
piece = length - sent;
if (piece) {
memcpy(rdata + 1 + sizeof(struct RTPHeader), data + sent, piece);
if (-1 == m_send_custom_lossy_packet(session->m, session->friend_number, rdata,
piece + sizeof(struct RTPHeader) + 1)) {
LOGGER_WARNING(session->m->log, "RTP send failed (len: %d)! std error: %s",
piece + sizeof(struct RTPHeader) + 1, strerror(errno));
}
}
}
session->sequnum ++;
return 0;
}
static bool chloss(const RTPSession *session, const struct RTPHeader *header)
{
if (net_ntohl(header->timestamp) < session->rtimestamp) {
uint16_t hosq, lost = 0;
hosq = net_ntohs(header->sequnum);
lost = (hosq > session->rsequnum) ?
(session->rsequnum + 65535) - hosq :
session->rsequnum - hosq;
fprintf(stderr, "Lost packet\n");
while (lost --) {
bwc_add_lost(session->bwc, 0);
}
return true;
}
return false;
}
static struct RTPMessage *new_message(size_t allocate_len, const uint8_t *data, uint16_t data_length)
{
assert(allocate_len >= data_length);
struct RTPMessage *msg = (struct RTPMessage *)calloc(sizeof(struct RTPMessage) + (allocate_len - sizeof(
struct RTPHeader)), 1);
msg->len = data_length - sizeof(struct RTPHeader);
memcpy(&msg->header, data, data_length);
msg->header.sequnum = net_ntohs(msg->header.sequnum);
msg->header.timestamp = net_ntohl(msg->header.timestamp);
msg->header.ssrc = net_ntohl(msg->header.ssrc);
msg->header.offset_lower = net_ntohs(msg->header.offset_lower);
msg->header.data_length_lower = net_ntohs(msg->header.data_length_lower);
return msg;
}
int handle_rtp_packet(Messenger *m, uint32_t friendnumber, const uint8_t *data, uint16_t length, void *object)
{
(void) m;
(void) friendnumber;
RTPSession *session = (RTPSession *)object;
data ++;
length--;
if (!session || length < sizeof(struct RTPHeader)) {
LOGGER_WARNING(m->log, "No session or invalid length of received buffer!");
return -1;
}
const struct RTPHeader *header = (const struct RTPHeader *) data;
if (header->pt != session->payload_type % 128) {
LOGGER_WARNING(m->log, "Invalid payload type with the session");
return -1;
}
if (net_ntohs(header->offset_lower) >= net_ntohs(header->data_length_lower)) {
/* Never allow this case to happen */
return -1;
}
bwc_feed_avg(session->bwc, length);
if (net_ntohs(header->data_length_lower) == length - sizeof(struct RTPHeader)) {
/* The message is sent in single part */
/* Only allow messages which have arrived in order;
* drop late messages
*/
if (chloss(session, header)) {
return 0;
}
/* Message is not late; pick up the latest parameters */
session->rsequnum = net_ntohs(header->sequnum);
session->rtimestamp = net_ntohl(header->timestamp);
bwc_add_recv(session->bwc, length);
/* Invoke processing of active multiparted message */
if (session->mp) {
if (session->mcb) {
session->mcb(session->cs, session->mp);
} else {
free(session->mp);
}
session->mp = NULL;
}
/* The message came in the allowed time;
* process it only if handler for the session is present.
*/
if (!session->mcb) {
return 0;
}
return session->mcb(session->cs, new_message(length, data, length));
}
/* The message is sent in multiple parts */
if (session->mp) {
/* There are 2 possible situations in this case:
* 1) being that we got the part of already processing message.
* 2) being that we got the part of a new/old message.
*
* We handle them differently as we only allow a single multiparted
* processing message
*/
if (session->mp->header.sequnum == net_ntohs(header->sequnum) &&
session->mp->header.timestamp == net_ntohl(header->timestamp)) {
/* First case */
/* Make sure we have enough allocated memory */
if (session->mp->header.data_length_lower - session->mp->len < length - sizeof(struct RTPHeader) ||
session->mp->header.data_length_lower <= net_ntohs(header->offset_lower)) {
/* There happened to be some corruption on the stream;
* continue wihtout this part
*/
return 0;
}
memcpy(session->mp->data + net_ntohs(header->offset_lower), data + sizeof(struct RTPHeader),
length - sizeof(struct RTPHeader));
session->mp->len += length - sizeof(struct RTPHeader);
bwc_add_recv(session->bwc, length);
if (session->mp->len == session->mp->header.data_length_lower) {
/* Received a full message; now push it for the further
* processing.
*/
if (session->mcb) {
session->mcb(session->cs, session->mp);
} else {
free(session->mp);
}
session->mp = NULL;
}
} else {
/* Second case */
if (session->mp->header.timestamp > net_ntohl(header->timestamp)) {
/* The received message part is from the old message;
* discard it.
*/
return 0;
}
/* Measure missing parts of the old message */
bwc_add_lost(session->bwc,
(session->mp->header.data_length_lower - session->mp->len) +
/* Must account sizes of rtp headers too */
((session->mp->header.data_length_lower - session->mp->len) /
MAX_CRYPTO_DATA_SIZE) * sizeof(struct RTPHeader));
/* Push the previous message for processing */
if (session->mcb) {
session->mcb(session->cs, session->mp);
} else {
free(session->mp);
}
session->mp = NULL;
goto NEW_MULTIPARTED;
}
} else {
/* In this case threat the message as if it was received in order
*/
/* This is also a point for new multiparted messages */
NEW_MULTIPARTED:
/* Only allow messages which have arrived in order;
* drop late messages
*/
if (chloss(session, header)) {
return 0;
}
/* Message is not late; pick up the latest parameters */
session->rsequnum = net_ntohs(header->sequnum);
session->rtimestamp = net_ntohl(header->timestamp);
bwc_add_recv(session->bwc, length);
/* Again, only store message if handler is present
*/
if (session->mcb) {
session->mp = new_message(net_ntohs(header->data_length_lower) + sizeof(struct RTPHeader), data, length);
memmove(session->mp->data + net_ntohs(header->offset_lower), session->mp->data, session->mp->len);
}
}
return 0;
}