| 1 | /********** |
| 2 | This library is free software; you can redistribute it and/or modify it under |
| 3 | the terms of the GNU Lesser General Public License as published by the |
| 4 | Free Software Foundation; either version 3 of the License, or (at your |
| 5 | option) any later version. (See <http://www.gnu.org/copyleft/lesser.html>.) |
| 6 | |
| 7 | This library is distributed in the hope that it will be useful, but WITHOUT |
| 8 | ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS |
| 9 | FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for |
| 10 | more details. |
| 11 | |
| 12 | You should have received a copy of the GNU Lesser General Public License |
| 13 | along with this library; if not, write to the Free Software Foundation, Inc., |
| 14 | 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA |
| 15 | **********/ |
| 16 | // "liveMedia" |
| 17 | // Copyright (c) 1996-2020 Live Networks, Inc. All rights reserved. |
| 18 | // A generic SIP client |
| 19 | // Implementation |
| 20 | |
| 21 | #include "SIPClient.hh" |
| 22 | #include "GroupsockHelper.hh" |
| 23 | |
| 24 | #if defined(__WIN32__) || defined(_WIN32) || defined(_QNX4) |
| 25 | #define _strncasecmp _strnicmp |
| 26 | #else |
| 27 | #define _strncasecmp strncasecmp |
| 28 | #endif |
| 29 | |
| 30 | ////////// SIPClient ////////// |
| 31 | |
| 32 | SIPClient* SIPClient |
| 33 | ::createNew(UsageEnvironment& env, |
| 34 | unsigned char desiredAudioRTPPayloadFormat, |
| 35 | char const* mimeSubtype, |
| 36 | int verbosityLevel, char const* applicationName) { |
| 37 | return new SIPClient(env, desiredAudioRTPPayloadFormat, mimeSubtype, |
| 38 | verbosityLevel, applicationName); |
| 39 | } |
| 40 | |
| 41 | void SIPClient::setUserAgentString(char const* userAgentName) { |
| 42 | if (userAgentName == NULL) return; |
| 43 | |
| 44 | // Change the existing user agent header string: |
| 45 | char const* const formatStr = "User-Agent: %s\r\n" ; |
| 46 | unsigned const = strlen(formatStr) + strlen(userAgentName); |
| 47 | delete[] fUserAgentHeaderStr; |
| 48 | fUserAgentHeaderStr = new char[headerSize]; |
| 49 | sprintf(fUserAgentHeaderStr, formatStr, userAgentName); |
| 50 | fUserAgentHeaderStrLen = strlen(fUserAgentHeaderStr); |
| 51 | } |
| 52 | |
| 53 | SIPClient::SIPClient(UsageEnvironment& env, |
| 54 | unsigned char desiredAudioRTPPayloadFormat, |
| 55 | char const* mimeSubtype, |
| 56 | int verbosityLevel, char const* applicationName) |
| 57 | : Medium(env), |
| 58 | fT1(500000 /* 500 ms */), |
| 59 | fDesiredAudioRTPPayloadFormat(desiredAudioRTPPayloadFormat), |
| 60 | fVerbosityLevel(verbosityLevel), fCSeq(0), |
| 61 | fUserAgentHeaderStr(NULL), fUserAgentHeaderStrLen(0), |
| 62 | fURL(NULL), fURLSize(0), |
| 63 | fToTagStr(NULL), fToTagStrSize(0), |
| 64 | fUserName(NULL), fUserNameSize(0), |
| 65 | fInviteSDPDescription(NULL), fInviteSDPDescriptionReturned(NULL), |
| 66 | fInviteCmd(NULL), fInviteCmdSize(0) { |
| 67 | if (mimeSubtype == NULL) mimeSubtype = "" ; |
| 68 | fMIMESubtype = strDup(mimeSubtype); |
| 69 | fMIMESubtypeSize = strlen(fMIMESubtype); |
| 70 | |
| 71 | if (applicationName == NULL) applicationName = "" ; |
| 72 | fApplicationName = strDup(applicationName); |
| 73 | fApplicationNameSize = strlen(fApplicationName); |
| 74 | |
| 75 | struct in_addr ourAddress; |
| 76 | ourAddress.s_addr = ourIPAddress(env); // hack |
| 77 | fOurAddressStr = strDup(AddressString(ourAddress).val()); |
| 78 | fOurAddressStrSize = strlen(fOurAddressStr); |
| 79 | |
| 80 | fOurSocket = new Groupsock(env, ourAddress, 0, 255); |
| 81 | if (fOurSocket == NULL) { |
| 82 | env << "ERROR: Failed to create socket for addr " |
| 83 | << fOurAddressStr << ": " |
| 84 | << env.getResultMsg() << "\n" ; |
| 85 | } |
| 86 | |
| 87 | // Now, find out our source port number. Hack: Do this by first trying to |
| 88 | // send a 0-length packet, so that the "getSourcePort()" call will work. |
| 89 | fOurSocket->output(envir(), (unsigned char*)"" , 0); |
| 90 | Port srcPort(0); |
| 91 | getSourcePort(env, fOurSocket->socketNum(), srcPort); |
| 92 | if (srcPort.num() != 0) { |
| 93 | fOurPortNum = ntohs(srcPort.num()); |
| 94 | } else { |
| 95 | // No luck. Try again using a default port number: |
| 96 | fOurPortNum = 5060; |
| 97 | delete fOurSocket; |
| 98 | fOurSocket = new Groupsock(env, ourAddress, fOurPortNum, 255); |
| 99 | if (fOurSocket == NULL) { |
| 100 | env << "ERROR: Failed to create socket for addr " |
| 101 | << fOurAddressStr << ", port " |
| 102 | << fOurPortNum << ": " |
| 103 | << env.getResultMsg() << "\n" ; |
| 104 | } |
| 105 | } |
| 106 | |
| 107 | // Set the "User-Agent:" header to use in each request: |
| 108 | char const* const libName = "LIVE555 Streaming Media v" ; |
| 109 | char const* const libVersionStr = LIVEMEDIA_LIBRARY_VERSION_STRING; |
| 110 | char const* libPrefix; char const* libSuffix; |
| 111 | if (applicationName == NULL || applicationName[0] == '\0') { |
| 112 | applicationName = libPrefix = libSuffix = "" ; |
| 113 | } else { |
| 114 | libPrefix = " (" ; |
| 115 | libSuffix = ")" ; |
| 116 | } |
| 117 | unsigned userAgentNameSize |
| 118 | = fApplicationNameSize + strlen(libPrefix) + strlen(libName) + strlen(libVersionStr) + strlen(libSuffix) + 1; |
| 119 | char* userAgentName = new char[userAgentNameSize]; |
| 120 | sprintf(userAgentName, "%s%s%s%s%s" , |
| 121 | applicationName, libPrefix, libName, libVersionStr, libSuffix); |
| 122 | setUserAgentString(userAgentName); |
| 123 | delete[] userAgentName; |
| 124 | |
| 125 | reset(); |
| 126 | } |
| 127 | |
| 128 | SIPClient::~SIPClient() { |
| 129 | reset(); |
| 130 | |
| 131 | delete[] fUserAgentHeaderStr; |
| 132 | delete fOurSocket; |
| 133 | delete[] (char*)fOurAddressStr; |
| 134 | delete[] (char*)fApplicationName; |
| 135 | delete[] (char*)fMIMESubtype; |
| 136 | } |
| 137 | |
| 138 | void SIPClient::reset() { |
| 139 | fWorkingAuthenticator = NULL; |
| 140 | delete[] fInviteCmd; fInviteCmd = NULL; fInviteCmdSize = 0; |
| 141 | delete[] fInviteSDPDescription; fInviteSDPDescription = NULL; |
| 142 | |
| 143 | delete[] (char*)fUserName; fUserName = strDup(fApplicationName); |
| 144 | fUserNameSize = strlen(fUserName); |
| 145 | |
| 146 | fValidAuthenticator.reset(); |
| 147 | |
| 148 | delete[] (char*)fToTagStr; fToTagStr = NULL; fToTagStrSize = 0; |
| 149 | fServerPortNum = 0; |
| 150 | fServerAddress.s_addr = 0; |
| 151 | delete[] (char*)fURL; fURL = NULL; fURLSize = 0; |
| 152 | } |
| 153 | |
| 154 | void SIPClient::setProxyServer(unsigned proxyServerAddress, |
| 155 | portNumBits proxyServerPortNum) { |
| 156 | fServerAddress.s_addr = proxyServerAddress; |
| 157 | fServerPortNum = proxyServerPortNum; |
| 158 | if (fOurSocket != NULL) { |
| 159 | fOurSocket->changeDestinationParameters(fServerAddress, |
| 160 | fServerPortNum, 255); |
| 161 | } |
| 162 | } |
| 163 | |
| 164 | static char* getLine(char* startOfLine) { |
| 165 | // returns the start of the next line, or NULL if none |
| 166 | for (char* ptr = startOfLine; *ptr != '\0'; ++ptr) { |
| 167 | if (*ptr == '\r' || *ptr == '\n') { |
| 168 | // We found the end of the line |
| 169 | *ptr++ = '\0'; |
| 170 | if (*ptr == '\n') ++ptr; |
| 171 | return ptr; |
| 172 | } |
| 173 | } |
| 174 | |
| 175 | return NULL; |
| 176 | } |
| 177 | |
| 178 | char* SIPClient::invite(char const* url, Authenticator* authenticator) { |
| 179 | // First, check whether "url" contains a username:password to be used: |
| 180 | char* username; char* password; |
| 181 | if (authenticator == NULL |
| 182 | && parseSIPURLUsernamePassword(url, username, password)) { |
| 183 | char* result = inviteWithPassword(url, username, password); |
| 184 | delete[] username; delete[] password; // they were dynamically allocated |
| 185 | return result; |
| 186 | } |
| 187 | |
| 188 | if (!processURL(url)) return NULL; |
| 189 | |
| 190 | delete[] (char*)fURL; fURL = strDup(url); |
| 191 | fURLSize = strlen(fURL); |
| 192 | |
| 193 | fCallId = our_random32(); |
| 194 | fFromTag = our_random32(); |
| 195 | |
| 196 | return invite1(authenticator); |
| 197 | } |
| 198 | |
| 199 | char* SIPClient::invite1(Authenticator* authenticator) { |
| 200 | do { |
| 201 | // Send the INVITE command: |
| 202 | |
| 203 | // First, construct an authenticator string: |
| 204 | fValidAuthenticator.reset(); |
| 205 | fWorkingAuthenticator = authenticator; |
| 206 | char* authenticatorStr |
| 207 | = createAuthenticatorString(fWorkingAuthenticator, "INVITE" , fURL); |
| 208 | |
| 209 | // Then, construct the SDP description to be sent in the INVITE: |
| 210 | char* rtpmapLine; |
| 211 | unsigned rtpmapLineSize; |
| 212 | if (fMIMESubtypeSize > 0) { |
| 213 | char const* const rtpmapFmt = |
| 214 | "a=rtpmap:%u %s/8000\r\n" ; |
| 215 | unsigned rtpmapFmtSize = strlen(rtpmapFmt) |
| 216 | + 3 /* max char len */ + fMIMESubtypeSize; |
| 217 | rtpmapLine = new char[rtpmapFmtSize]; |
| 218 | sprintf(rtpmapLine, rtpmapFmt, |
| 219 | fDesiredAudioRTPPayloadFormat, fMIMESubtype); |
| 220 | rtpmapLineSize = strlen(rtpmapLine); |
| 221 | } else { |
| 222 | // Static payload type => no "a=rtpmap:" line |
| 223 | rtpmapLine = strDup("" ); |
| 224 | rtpmapLineSize = 0; |
| 225 | } |
| 226 | char const* const inviteSDPFmt = |
| 227 | "v=0\r\n" |
| 228 | "o=- %u %u IN IP4 %s\r\n" |
| 229 | "s=%s session\r\n" |
| 230 | "c=IN IP4 %s\r\n" |
| 231 | "t=0 0\r\n" |
| 232 | "m=audio %u RTP/AVP %u\r\n" |
| 233 | "%s" ; |
| 234 | unsigned inviteSDPFmtSize = strlen(inviteSDPFmt) |
| 235 | + 20 /* max int len */ + 20 + fOurAddressStrSize |
| 236 | + fApplicationNameSize |
| 237 | + fOurAddressStrSize |
| 238 | + 5 /* max short len */ + 3 /* max char len */ |
| 239 | + rtpmapLineSize; |
| 240 | delete[] fInviteSDPDescription; |
| 241 | fInviteSDPDescription = new char[inviteSDPFmtSize]; |
| 242 | sprintf(fInviteSDPDescription, inviteSDPFmt, |
| 243 | fCallId, fCSeq, fOurAddressStr, |
| 244 | fApplicationName, |
| 245 | fOurAddressStr, |
| 246 | fClientStartPortNum, fDesiredAudioRTPPayloadFormat, |
| 247 | rtpmapLine); |
| 248 | unsigned inviteSDPSize = strlen(fInviteSDPDescription); |
| 249 | delete[] rtpmapLine; |
| 250 | |
| 251 | char const* const cmdFmt = |
| 252 | "INVITE %s SIP/2.0\r\n" |
| 253 | "From: %s <sip:%s@%s>;tag=%u\r\n" |
| 254 | "Via: SIP/2.0/UDP %s:%u\r\n" |
| 255 | "Max-Forwards: 70\r\n" |
| 256 | "To: %s\r\n" |
| 257 | "Contact: sip:%s@%s:%u\r\n" |
| 258 | "Call-ID: %u@%s\r\n" |
| 259 | "CSeq: %d INVITE\r\n" |
| 260 | "Content-Type: application/sdp\r\n" |
| 261 | "%s" /* Proxy-Authorization: line (if any) */ |
| 262 | "%s" /* User-Agent: line */ |
| 263 | "Content-Length: %d\r\n\r\n" |
| 264 | "%s" ; |
| 265 | unsigned inviteCmdSize = strlen(cmdFmt) |
| 266 | + fURLSize |
| 267 | + 2*fUserNameSize + fOurAddressStrSize + 20 /* max int len */ |
| 268 | + fOurAddressStrSize + 5 /* max port len */ |
| 269 | + fURLSize |
| 270 | + fUserNameSize + fOurAddressStrSize + 5 |
| 271 | + 20 + fOurAddressStrSize |
| 272 | + 20 |
| 273 | + strlen(authenticatorStr) |
| 274 | + fUserAgentHeaderStrLen |
| 275 | + 20 |
| 276 | + inviteSDPSize; |
| 277 | delete[] fInviteCmd; fInviteCmd = new char[inviteCmdSize]; |
| 278 | sprintf(fInviteCmd, cmdFmt, |
| 279 | fURL, |
| 280 | fUserName, fUserName, fOurAddressStr, fFromTag, |
| 281 | fOurAddressStr, fOurPortNum, |
| 282 | fURL, |
| 283 | fUserName, fOurAddressStr, fOurPortNum, |
| 284 | fCallId, fOurAddressStr, |
| 285 | ++fCSeq, |
| 286 | authenticatorStr, |
| 287 | fUserAgentHeaderStr, |
| 288 | inviteSDPSize, |
| 289 | fInviteSDPDescription); |
| 290 | fInviteCmdSize = strlen(fInviteCmd); |
| 291 | delete[] authenticatorStr; |
| 292 | |
| 293 | // Before sending the "INVITE", arrange to handle any response packets, |
| 294 | // and set up timers: |
| 295 | fInviteClientState = Calling; |
| 296 | fEventLoopStopFlag = 0; |
| 297 | TaskScheduler& sched = envir().taskScheduler(); // abbrev. |
| 298 | sched.turnOnBackgroundReadHandling(fOurSocket->socketNum(), |
| 299 | &inviteResponseHandler, this); |
| 300 | fTimerALen = 1*fT1; // initially |
| 301 | fTimerACount = 0; // initially |
| 302 | fTimerA = sched.scheduleDelayedTask(fTimerALen, timerAHandler, this); |
| 303 | fTimerB = sched.scheduleDelayedTask(64*fT1, timerBHandler, this); |
| 304 | fTimerD = NULL; // for now |
| 305 | |
| 306 | if (!sendINVITE()) break; |
| 307 | |
| 308 | // Enter the event loop, to handle response packets, and timeouts: |
| 309 | envir().taskScheduler().doEventLoop(&fEventLoopStopFlag); |
| 310 | |
| 311 | // We're finished with this "INVITE". |
| 312 | // Turn off response handling and timers: |
| 313 | sched.turnOffBackgroundReadHandling(fOurSocket->socketNum()); |
| 314 | sched.unscheduleDelayedTask(fTimerA); |
| 315 | sched.unscheduleDelayedTask(fTimerB); |
| 316 | sched.unscheduleDelayedTask(fTimerD); |
| 317 | |
| 318 | // NOTE: We return the SDP description that we used in the "INVITE", |
| 319 | // not the one that we got from the server. |
| 320 | // ##### Later: match the codecs in the response (offer, answer) ##### |
| 321 | if (fInviteSDPDescription != NULL) { |
| 322 | return strDup(fInviteSDPDescription); |
| 323 | } |
| 324 | } while (0); |
| 325 | |
| 326 | return NULL; |
| 327 | } |
| 328 | |
| 329 | void SIPClient::inviteResponseHandler(void* clientData, int /*mask*/) { |
| 330 | SIPClient* client = (SIPClient*)clientData; |
| 331 | unsigned responseCode = client->getResponseCode(); |
| 332 | client->doInviteStateMachine(responseCode); |
| 333 | } |
| 334 | |
| 335 | // Special 'response codes' that represent timers expiring: |
| 336 | unsigned const timerAFires = 0xAAAAAAAA; |
| 337 | unsigned const timerBFires = 0xBBBBBBBB; |
| 338 | unsigned const timerDFires = 0xDDDDDDDD; |
| 339 | |
| 340 | void SIPClient::timerAHandler(void* clientData) { |
| 341 | SIPClient* client = (SIPClient*)clientData; |
| 342 | if (client->fVerbosityLevel >= 1) { |
| 343 | client->envir() << "RETRANSMISSION " << ++client->fTimerACount |
| 344 | << ", after " << client->fTimerALen/1000000.0 |
| 345 | << " additional seconds\n" ; |
| 346 | } |
| 347 | client->doInviteStateMachine(timerAFires); |
| 348 | } |
| 349 | |
| 350 | void SIPClient::timerBHandler(void* clientData) { |
| 351 | SIPClient* client = (SIPClient*)clientData; |
| 352 | if (client->fVerbosityLevel >= 1) { |
| 353 | client->envir() << "RETRANSMISSION TIMEOUT, after " |
| 354 | << 64*client->fT1/1000000.0 << " seconds\n" ; |
| 355 | fflush(stderr); |
| 356 | } |
| 357 | client->doInviteStateMachine(timerBFires); |
| 358 | } |
| 359 | |
| 360 | void SIPClient::timerDHandler(void* clientData) { |
| 361 | SIPClient* client = (SIPClient*)clientData; |
| 362 | if (client->fVerbosityLevel >= 1) { |
| 363 | client->envir() << "TIMER D EXPIRED\n" ; |
| 364 | } |
| 365 | client->doInviteStateMachine(timerDFires); |
| 366 | } |
| 367 | |
| 368 | void SIPClient::doInviteStateMachine(unsigned responseCode) { |
| 369 | // Implement the state transition diagram (RFC 3261, Figure 5) |
| 370 | TaskScheduler& sched = envir().taskScheduler(); // abbrev. |
| 371 | switch (fInviteClientState) { |
| 372 | case Calling: { |
| 373 | if (responseCode == timerAFires) { |
| 374 | // Restart timer A (with double the timeout interval): |
| 375 | fTimerALen *= 2; |
| 376 | fTimerA |
| 377 | = sched.scheduleDelayedTask(fTimerALen, timerAHandler, this); |
| 378 | |
| 379 | fInviteClientState = Calling; |
| 380 | if (!sendINVITE()) doInviteStateTerminated(0); |
| 381 | } else { |
| 382 | // Turn off timers A & B before moving to a new state: |
| 383 | sched.unscheduleDelayedTask(fTimerA); |
| 384 | sched.unscheduleDelayedTask(fTimerB); |
| 385 | |
| 386 | if (responseCode == timerBFires) { |
| 387 | envir().setResultMsg("No response from server" ); |
| 388 | doInviteStateTerminated(0); |
| 389 | } else if (responseCode >= 100 && responseCode <= 199) { |
| 390 | fInviteClientState = Proceeding; |
| 391 | } else if (responseCode >= 200 && responseCode <= 299) { |
| 392 | doInviteStateTerminated(responseCode); |
| 393 | } else if (responseCode >= 400 && responseCode <= 499) { |
| 394 | doInviteStateTerminated(responseCode); |
| 395 | // this isn't what the spec says, but it seems right... |
| 396 | } else if (responseCode >= 300 && responseCode <= 699) { |
| 397 | fInviteClientState = Completed; |
| 398 | fTimerD |
| 399 | = sched.scheduleDelayedTask(32000000, timerDHandler, this); |
| 400 | if (!sendACK()) doInviteStateTerminated(0); |
| 401 | } |
| 402 | } |
| 403 | break; |
| 404 | } |
| 405 | |
| 406 | case Proceeding: { |
| 407 | if (responseCode >= 100 && responseCode <= 199) { |
| 408 | fInviteClientState = Proceeding; |
| 409 | } else if (responseCode >= 200 && responseCode <= 299) { |
| 410 | doInviteStateTerminated(responseCode); |
| 411 | } else if (responseCode >= 400 && responseCode <= 499) { |
| 412 | doInviteStateTerminated(responseCode); |
| 413 | // this isn't what the spec says, but it seems right... |
| 414 | } else if (responseCode >= 300 && responseCode <= 699) { |
| 415 | fInviteClientState = Completed; |
| 416 | fTimerD = sched.scheduleDelayedTask(32000000, timerDHandler, this); |
| 417 | if (!sendACK()) doInviteStateTerminated(0); |
| 418 | } |
| 419 | break; |
| 420 | } |
| 421 | |
| 422 | case Completed: { |
| 423 | if (responseCode == timerDFires) { |
| 424 | envir().setResultMsg("Transaction terminated" ); |
| 425 | doInviteStateTerminated(0); |
| 426 | } else if (responseCode >= 300 && responseCode <= 699) { |
| 427 | fInviteClientState = Completed; |
| 428 | if (!sendACK()) doInviteStateTerminated(0); |
| 429 | } |
| 430 | break; |
| 431 | } |
| 432 | |
| 433 | case Terminated: { |
| 434 | doInviteStateTerminated(responseCode); |
| 435 | break; |
| 436 | } |
| 437 | } |
| 438 | } |
| 439 | |
| 440 | void SIPClient::doInviteStateTerminated(unsigned responseCode) { |
| 441 | fInviteClientState = Terminated; // FWIW... |
| 442 | if (responseCode < 200 || responseCode > 299) { |
| 443 | // We failed, so return NULL; |
| 444 | delete[] fInviteSDPDescription; fInviteSDPDescription = NULL; |
| 445 | delete[] fInviteSDPDescriptionReturned; fInviteSDPDescriptionReturned = NULL; |
| 446 | } |
| 447 | |
| 448 | // Unblock the event loop: |
| 449 | fEventLoopStopFlag = ~0; |
| 450 | } |
| 451 | |
| 452 | Boolean SIPClient::sendINVITE() { |
| 453 | if (!sendRequest(fInviteCmd, fInviteCmdSize)) { |
| 454 | envir().setResultErrMsg("INVITE send() failed: " ); |
| 455 | return False; |
| 456 | } |
| 457 | return True; |
| 458 | } |
| 459 | |
| 460 | unsigned SIPClient::getResponseCode() { |
| 461 | unsigned responseCode = 0; |
| 462 | do { |
| 463 | // Get the response from the server: |
| 464 | unsigned const readBufSize = 10000; |
| 465 | char readBuffer[readBufSize+1]; char* readBuf = readBuffer; |
| 466 | |
| 467 | char* firstLine = NULL; |
| 468 | char* nextLineStart = NULL; |
| 469 | unsigned bytesRead = getResponse(readBuf, readBufSize); |
| 470 | if (bytesRead == 0) break; |
| 471 | if (fVerbosityLevel >= 1) { |
| 472 | envir() << "Received INVITE response: " << readBuf << "\n" ; |
| 473 | } |
| 474 | |
| 475 | // Inspect the first line to get the response code: |
| 476 | firstLine = readBuf; |
| 477 | nextLineStart = getLine(firstLine); |
| 478 | if (!parseResponseCode(firstLine, responseCode)) break; |
| 479 | |
| 480 | if (responseCode != 200) { |
| 481 | if (responseCode >= 400 && responseCode <= 499 |
| 482 | && fWorkingAuthenticator != NULL) { |
| 483 | // We have an authentication failure, so fill in |
| 484 | // "*fWorkingAuthenticator" using the contents of a following |
| 485 | // "Proxy-Authenticate:" or "WWW-Authenticate:" line. (Once we compute a 'response' for |
| 486 | // "fWorkingAuthenticator", it can be used in a subsequent request |
| 487 | // - that will hopefully succeed.) |
| 488 | char* lineStart; |
| 489 | while (1) { |
| 490 | lineStart = nextLineStart; |
| 491 | if (lineStart == NULL) break; |
| 492 | |
| 493 | nextLineStart = getLine(lineStart); |
| 494 | if (lineStart[0] == '\0') break; // this is a blank line |
| 495 | |
| 496 | char* realm = strDupSize(lineStart); |
| 497 | char* nonce = strDupSize(lineStart); |
| 498 | // ##### Check for the format of "Proxy-Authenticate:" lines from |
| 499 | // ##### known server types. |
| 500 | // ##### This is a crock! We should make the parsing more general |
| 501 | Boolean = False; |
| 502 | if ( |
| 503 | // Asterisk ##### |
| 504 | sscanf(lineStart, "Proxy-Authenticate: Digest realm=\"%[^\"]\", nonce=\"%[^\"]\"" , |
| 505 | realm, nonce) == 2 || |
| 506 | sscanf(lineStart, "WWW-Authenticate: Digest realm=\"%[^\"]\", nonce=\"%[^\"]\"" , |
| 507 | realm, nonce) == 2 || |
| 508 | // Cisco ATA ##### |
| 509 | sscanf(lineStart, "Proxy-Authenticate: Digest algorithm=MD5,domain=\"%*[^\"]\",nonce=\"%[^\"]\", realm=\"%[^\"]\"" , |
| 510 | nonce, realm) == 2) { |
| 511 | fWorkingAuthenticator->setRealmAndNonce(realm, nonce); |
| 512 | foundAuthenticateHeader = True; |
| 513 | } |
| 514 | delete[] realm; delete[] nonce; |
| 515 | if (foundAuthenticateHeader) break; |
| 516 | } |
| 517 | } |
| 518 | envir().setResultMsg("cannot handle INVITE response: " , firstLine); |
| 519 | break; |
| 520 | } |
| 521 | |
| 522 | // Skip every subsequent header line, until we see a blank line. |
| 523 | // While doing so, check for "To:" and "Content-Length:" lines. |
| 524 | // The remaining data is assumed to be the SDP descriptor that we want. |
| 525 | // We should really do some more checking on the headers here - e.g., to |
| 526 | // check for "Content-type: application/sdp", "CSeq", etc. ##### |
| 527 | int contentLength = -1; |
| 528 | char* lineStart; |
| 529 | while (1) { |
| 530 | lineStart = nextLineStart; |
| 531 | if (lineStart == NULL) break; |
| 532 | |
| 533 | nextLineStart = getLine(lineStart); |
| 534 | if (lineStart[0] == '\0') break; // this is a blank line |
| 535 | |
| 536 | char* toTagStr = strDupSize(lineStart); |
| 537 | if (sscanf(lineStart, "To:%*[^;]; tag=%s" , toTagStr) == 1) { |
| 538 | delete[] (char*)fToTagStr; fToTagStr = strDup(toTagStr); |
| 539 | fToTagStrSize = strlen(fToTagStr); |
| 540 | } |
| 541 | delete[] toTagStr; |
| 542 | |
| 543 | if (sscanf(lineStart, "Content-Length: %d" , &contentLength) == 1 |
| 544 | || sscanf(lineStart, "Content-length: %d" , &contentLength) == 1) { |
| 545 | if (contentLength < 0) { |
| 546 | envir().setResultMsg("Bad \"Content-Length:\" header: \"" , |
| 547 | lineStart, "\"" ); |
| 548 | break; |
| 549 | } |
| 550 | } |
| 551 | } |
| 552 | |
| 553 | // We're now at the end of the response header lines |
| 554 | if (lineStart == NULL) { |
| 555 | envir().setResultMsg("no content following header lines: " , readBuf); |
| 556 | break; |
| 557 | } |
| 558 | |
| 559 | // Use the remaining data as the SDP descr, but first, check |
| 560 | // the "Content-Length:" header (if any) that we saw. We may need to |
| 561 | // read more data, or we may have extraneous data in the buffer. |
| 562 | char* bodyStart = nextLineStart; |
| 563 | if (bodyStart != NULL && contentLength >= 0) { |
| 564 | // We saw a "Content-Length:" header |
| 565 | unsigned numBodyBytes = &readBuf[bytesRead] - bodyStart; |
| 566 | if (contentLength > (int)numBodyBytes) { |
| 567 | // We need to read more data. First, make sure we have enough |
| 568 | // space for it: |
| 569 | unsigned = contentLength - numBodyBytes; |
| 570 | #ifdef USING_TCP |
| 571 | // THIS CODE WORKS ONLY FOR TCP: ##### |
| 572 | unsigned remainingBufferSize |
| 573 | = readBufSize - (bytesRead + (readBuf - readBuffer)); |
| 574 | if (numExtraBytesNeeded > remainingBufferSize) { |
| 575 | char tmpBuf[200]; |
| 576 | sprintf(tmpBuf, "Read buffer size (%d) is too small for \"Content-Length:\" %d (need a buffer size of >= %d bytes\n" , |
| 577 | readBufSize, contentLength, |
| 578 | readBufSize + numExtraBytesNeeded - remainingBufferSize); |
| 579 | envir().setResultMsg(tmpBuf); |
| 580 | break; |
| 581 | } |
| 582 | |
| 583 | // Keep reading more data until we have enough: |
| 584 | if (fVerbosityLevel >= 1) { |
| 585 | envir() << "Need to read " << numExtraBytesNeeded |
| 586 | << " extra bytes\n" ; |
| 587 | } |
| 588 | while (numExtraBytesNeeded > 0) { |
| 589 | char* ptr = &readBuf[bytesRead]; |
| 590 | unsigned bytesRead2; |
| 591 | struct sockaddr_in fromAddr; |
| 592 | Boolean readSuccess |
| 593 | = fOurSocket->handleRead((unsigned char*)ptr, |
| 594 | numExtraBytesNeeded, |
| 595 | bytesRead2, fromAddr); |
| 596 | if (!readSuccess) break; |
| 597 | ptr[bytesRead2] = '\0'; |
| 598 | if (fVerbosityLevel >= 1) { |
| 599 | envir() << "Read " << bytesRead2 |
| 600 | << " extra bytes: " << ptr << "\n" ; |
| 601 | } |
| 602 | |
| 603 | bytesRead += bytesRead2; |
| 604 | numExtraBytesNeeded -= bytesRead2; |
| 605 | } |
| 606 | #endif |
| 607 | if (numExtraBytesNeeded > 0) break; // one of the reads failed |
| 608 | } |
| 609 | |
| 610 | bodyStart[contentLength] = '\0'; // trims any extra data |
| 611 | delete[] fInviteSDPDescriptionReturned; fInviteSDPDescriptionReturned = strDup(bodyStart); |
| 612 | } |
| 613 | } while (0); |
| 614 | |
| 615 | return responseCode; |
| 616 | } |
| 617 | |
| 618 | char* SIPClient::inviteWithPassword(char const* url, char const* username, |
| 619 | char const* password) { |
| 620 | delete[] (char*)fUserName; fUserName = strDup(username); |
| 621 | fUserNameSize = strlen(fUserName); |
| 622 | |
| 623 | Authenticator authenticator(username, password); |
| 624 | char* inviteResult = invite(url, &authenticator); |
| 625 | if (inviteResult != NULL) { |
| 626 | // We are already authorized |
| 627 | return inviteResult; |
| 628 | } |
| 629 | |
| 630 | // The "realm" and "nonce" fields should have been filled in: |
| 631 | if (authenticator.realm() == NULL || authenticator.nonce() == NULL) { |
| 632 | // We haven't been given enough information to try again, so fail: |
| 633 | return NULL; |
| 634 | } |
| 635 | |
| 636 | // Try again (but with the same CallId): |
| 637 | inviteResult = invite1(&authenticator); |
| 638 | if (inviteResult != NULL) { |
| 639 | // The authenticator worked, so use it in future requests: |
| 640 | fValidAuthenticator = authenticator; |
| 641 | } |
| 642 | |
| 643 | return inviteResult; |
| 644 | } |
| 645 | |
| 646 | Boolean SIPClient::sendACK() { |
| 647 | char* cmd = NULL; |
| 648 | do { |
| 649 | char const* const cmdFmt = |
| 650 | "ACK %s SIP/2.0\r\n" |
| 651 | "From: %s <sip:%s@%s>;tag=%u\r\n" |
| 652 | "Via: SIP/2.0/UDP %s:%u\r\n" |
| 653 | "Max-Forwards: 70\r\n" |
| 654 | "To: %s;tag=%s\r\n" |
| 655 | "Call-ID: %u@%s\r\n" |
| 656 | "CSeq: %d ACK\r\n" |
| 657 | "Content-Length: 0\r\n\r\n" ; |
| 658 | unsigned cmdSize = strlen(cmdFmt) |
| 659 | + fURLSize |
| 660 | + 2*fUserNameSize + fOurAddressStrSize + 20 /* max int len */ |
| 661 | + fOurAddressStrSize + 5 /* max port len */ |
| 662 | + fURLSize + fToTagStrSize |
| 663 | + 20 + fOurAddressStrSize |
| 664 | + 20; |
| 665 | cmd = new char[cmdSize]; |
| 666 | sprintf(cmd, cmdFmt, |
| 667 | fURL, |
| 668 | fUserName, fUserName, fOurAddressStr, fFromTag, |
| 669 | fOurAddressStr, fOurPortNum, |
| 670 | fURL, fToTagStr, |
| 671 | fCallId, fOurAddressStr, |
| 672 | fCSeq /* note: it's the same as before; not incremented */); |
| 673 | |
| 674 | if (!sendRequest(cmd, strlen(cmd))) { |
| 675 | envir().setResultErrMsg("ACK send() failed: " ); |
| 676 | break; |
| 677 | } |
| 678 | |
| 679 | delete[] cmd; |
| 680 | return True; |
| 681 | } while (0); |
| 682 | |
| 683 | delete[] cmd; |
| 684 | return False; |
| 685 | } |
| 686 | |
| 687 | Boolean SIPClient::sendBYE() { |
| 688 | // NOTE: This should really be retransmitted, for reliability ##### |
| 689 | char* cmd = NULL; |
| 690 | do { |
| 691 | char const* const cmdFmt = |
| 692 | "BYE %s SIP/2.0\r\n" |
| 693 | "From: %s <sip:%s@%s>;tag=%u\r\n" |
| 694 | "Via: SIP/2.0/UDP %s:%u\r\n" |
| 695 | "Max-Forwards: 70\r\n" |
| 696 | "To: %s;tag=%s\r\n" |
| 697 | "Call-ID: %u@%s\r\n" |
| 698 | "CSeq: %d BYE\r\n" |
| 699 | "Content-Length: 0\r\n\r\n" ; |
| 700 | unsigned cmdSize = strlen(cmdFmt) |
| 701 | + fURLSize |
| 702 | + 2*fUserNameSize + fOurAddressStrSize + 20 /* max int len */ |
| 703 | + fOurAddressStrSize + 5 /* max port len */ |
| 704 | + fURLSize + fToTagStrSize |
| 705 | + 20 + fOurAddressStrSize |
| 706 | + 20; |
| 707 | cmd = new char[cmdSize]; |
| 708 | sprintf(cmd, cmdFmt, |
| 709 | fURL, |
| 710 | fUserName, fUserName, fOurAddressStr, fFromTag, |
| 711 | fOurAddressStr, fOurPortNum, |
| 712 | fURL, fToTagStr, |
| 713 | fCallId, fOurAddressStr, |
| 714 | ++fCSeq); |
| 715 | |
| 716 | if (!sendRequest(cmd, strlen(cmd))) { |
| 717 | envir().setResultErrMsg("BYE send() failed: " ); |
| 718 | break; |
| 719 | } |
| 720 | |
| 721 | delete[] cmd; |
| 722 | return True; |
| 723 | } while (0); |
| 724 | |
| 725 | delete[] cmd; |
| 726 | return False; |
| 727 | } |
| 728 | |
| 729 | Boolean SIPClient::processURL(char const* url) { |
| 730 | do { |
| 731 | // If we don't already have a server address/port, then |
| 732 | // get these by parsing the URL: |
| 733 | if (fServerAddress.s_addr == 0) { |
| 734 | NetAddress destAddress; |
| 735 | if (!parseSIPURL(envir(), url, destAddress, fServerPortNum)) break; |
| 736 | fServerAddress.s_addr = *(unsigned*)(destAddress.data()); |
| 737 | |
| 738 | if (fOurSocket != NULL) { |
| 739 | fOurSocket->changeDestinationParameters(fServerAddress, |
| 740 | fServerPortNum, 255); |
| 741 | } |
| 742 | } |
| 743 | |
| 744 | return True; |
| 745 | } while (0); |
| 746 | |
| 747 | return False; |
| 748 | } |
| 749 | |
| 750 | Boolean SIPClient::parseSIPURL(UsageEnvironment& env, char const* url, |
| 751 | NetAddress& address, |
| 752 | portNumBits& portNum) { |
| 753 | do { |
| 754 | // Parse the URL as "sip:<username>@<address>:<port>/<etc>" |
| 755 | // (with ":<port>" and "/<etc>" optional) |
| 756 | // Also, skip over any "<username>[:<password>]@" preceding <address> |
| 757 | char const* prefix = "sip:" ; |
| 758 | unsigned const prefixLength = 4; |
| 759 | if (_strncasecmp(url, prefix, prefixLength) != 0) { |
| 760 | env.setResultMsg("URL is not of the form \"" , prefix, "\"" ); |
| 761 | break; |
| 762 | } |
| 763 | |
| 764 | unsigned const parseBufferSize = 100; |
| 765 | char parseBuffer[parseBufferSize]; |
| 766 | unsigned addressStartIndex = prefixLength; |
| 767 | while (url[addressStartIndex] != '\0' |
| 768 | && url[addressStartIndex++] != '@') {} |
| 769 | char const* from = &url[addressStartIndex]; |
| 770 | |
| 771 | // Skip over any "<username>[:<password>]@" |
| 772 | char const* from1 = from; |
| 773 | while (*from1 != '\0' && *from1 != '/') { |
| 774 | if (*from1 == '@') { |
| 775 | from = ++from1; |
| 776 | break; |
| 777 | } |
| 778 | ++from1; |
| 779 | } |
| 780 | |
| 781 | char* to = &parseBuffer[0]; |
| 782 | unsigned i; |
| 783 | for (i = 0; i < parseBufferSize; ++i) { |
| 784 | if (*from == '\0' || *from == ':' || *from == '/') { |
| 785 | // We've completed parsing the address |
| 786 | *to = '\0'; |
| 787 | break; |
| 788 | } |
| 789 | *to++ = *from++; |
| 790 | } |
| 791 | if (i == parseBufferSize) { |
| 792 | env.setResultMsg("URL is too long" ); |
| 793 | break; |
| 794 | } |
| 795 | |
| 796 | NetAddressList addresses(parseBuffer); |
| 797 | if (addresses.numAddresses() == 0) { |
| 798 | env.setResultMsg("Failed to find network address for \"" , |
| 799 | parseBuffer, "\"" ); |
| 800 | break; |
| 801 | } |
| 802 | address = *(addresses.firstAddress()); |
| 803 | |
| 804 | portNum = 5060; // default value |
| 805 | char nextChar = *from; |
| 806 | if (nextChar == ':') { |
| 807 | int portNumInt; |
| 808 | if (sscanf(++from, "%d" , &portNumInt) != 1) { |
| 809 | env.setResultMsg("No port number follows ':'" ); |
| 810 | break; |
| 811 | } |
| 812 | if (portNumInt < 1 || portNumInt > 65535) { |
| 813 | env.setResultMsg("Bad port number" ); |
| 814 | break; |
| 815 | } |
| 816 | portNum = (portNumBits)portNumInt; |
| 817 | } |
| 818 | |
| 819 | return True; |
| 820 | } while (0); |
| 821 | |
| 822 | return False; |
| 823 | } |
| 824 | |
| 825 | Boolean SIPClient::parseSIPURLUsernamePassword(char const* url, |
| 826 | char*& username, |
| 827 | char*& password) { |
| 828 | username = password = NULL; // by default |
| 829 | do { |
| 830 | // Parse the URL as "sip:<username>[:<password>]@<whatever>" |
| 831 | char const* prefix = "sip:" ; |
| 832 | unsigned const prefixLength = 4; |
| 833 | if (_strncasecmp(url, prefix, prefixLength) != 0) break; |
| 834 | |
| 835 | // Look for the ':' and '@': |
| 836 | unsigned usernameIndex = prefixLength; |
| 837 | unsigned colonIndex = 0, atIndex = 0; |
| 838 | for (unsigned i = usernameIndex; url[i] != '\0' && url[i] != '/'; ++i) { |
| 839 | if (url[i] == ':' && colonIndex == 0) { |
| 840 | colonIndex = i; |
| 841 | } else if (url[i] == '@') { |
| 842 | atIndex = i; |
| 843 | break; // we're done |
| 844 | } |
| 845 | } |
| 846 | if (atIndex == 0) break; // no '@' found |
| 847 | |
| 848 | char* urlCopy = strDup(url); |
| 849 | urlCopy[atIndex] = '\0'; |
| 850 | if (colonIndex > 0) { |
| 851 | urlCopy[colonIndex] = '\0'; |
| 852 | password = strDup(&urlCopy[colonIndex+1]); |
| 853 | } else { |
| 854 | password = strDup("" ); |
| 855 | } |
| 856 | username = strDup(&urlCopy[usernameIndex]); |
| 857 | delete[] urlCopy; |
| 858 | |
| 859 | return True; |
| 860 | } while (0); |
| 861 | |
| 862 | return False; |
| 863 | } |
| 864 | |
| 865 | char* |
| 866 | SIPClient::createAuthenticatorString(Authenticator const* authenticator, |
| 867 | char const* cmd, char const* url) { |
| 868 | if (authenticator != NULL && authenticator->realm() != NULL |
| 869 | && authenticator->nonce() != NULL && authenticator->username() != NULL |
| 870 | && authenticator->password() != NULL) { |
| 871 | // We've been provided a filled-in authenticator, so use it: |
| 872 | char const* const authFmt |
| 873 | = "Authorization: Digest username=\"%s\", realm=\"%s\", nonce=\"%s\", response=\"%s\", uri=\"%s\"\r\n" ; |
| 874 | char const* response = authenticator->computeDigestResponse(cmd, url); |
| 875 | unsigned authBufSize = strlen(authFmt) |
| 876 | + strlen(authenticator->username()) + strlen(authenticator->realm()) |
| 877 | + strlen(authenticator->nonce()) + strlen(url) + strlen(response); |
| 878 | char* authenticatorStr = new char[authBufSize]; |
| 879 | sprintf(authenticatorStr, authFmt, |
| 880 | authenticator->username(), authenticator->realm(), |
| 881 | authenticator->nonce(), response, url); |
| 882 | authenticator->reclaimDigestResponse(response); |
| 883 | |
| 884 | return authenticatorStr; |
| 885 | } |
| 886 | |
| 887 | return strDup("" ); |
| 888 | } |
| 889 | |
| 890 | Boolean SIPClient::sendRequest(char const* requestString, |
| 891 | unsigned requestLength) { |
| 892 | if (fVerbosityLevel >= 1) { |
| 893 | envir() << "Sending request: " << requestString << "\n" ; |
| 894 | } |
| 895 | // NOTE: We should really check that "requestLength" is not ##### |
| 896 | // too large for UDP (see RFC 3261, section 18.1.1) ##### |
| 897 | return fOurSocket->output(envir(), (unsigned char*)requestString, requestLength); |
| 898 | } |
| 899 | |
| 900 | unsigned SIPClient::getResponse(char*& responseBuffer, |
| 901 | unsigned responseBufferSize) { |
| 902 | if (responseBufferSize == 0) return 0; // just in case... |
| 903 | responseBuffer[0] = '\0'; // ditto |
| 904 | |
| 905 | // Keep reading data from the socket until we see "\r\n\r\n" (except |
| 906 | // at the start), or until we fill up our buffer. |
| 907 | // Don't read any more than this. |
| 908 | char* p = responseBuffer; |
| 909 | Boolean haveSeenNonCRLF = False; |
| 910 | int bytesRead = 0; |
| 911 | while (bytesRead < (int)responseBufferSize) { |
| 912 | unsigned bytesReadNow; |
| 913 | struct sockaddr_in fromAddr; |
| 914 | unsigned char* toPosn = (unsigned char*)(responseBuffer+bytesRead); |
| 915 | Boolean readSuccess |
| 916 | = fOurSocket->handleRead(toPosn, responseBufferSize-bytesRead, |
| 917 | bytesReadNow, fromAddr); |
| 918 | if (!readSuccess || bytesReadNow == 0) { |
| 919 | envir().setResultMsg("SIP response was truncated" ); |
| 920 | break; |
| 921 | } |
| 922 | bytesRead += bytesReadNow; |
| 923 | |
| 924 | // Check whether we have "\r\n\r\n": |
| 925 | char* lastToCheck = responseBuffer+bytesRead-4; |
| 926 | if (lastToCheck < responseBuffer) continue; |
| 927 | for (; p <= lastToCheck; ++p) { |
| 928 | if (haveSeenNonCRLF) { |
| 929 | if (*p == '\r' && *(p+1) == '\n' && |
| 930 | *(p+2) == '\r' && *(p+3) == '\n') { |
| 931 | responseBuffer[bytesRead] = '\0'; |
| 932 | |
| 933 | // Before returning, trim any \r or \n from the start: |
| 934 | while (*responseBuffer == '\r' || *responseBuffer == '\n') { |
| 935 | ++responseBuffer; |
| 936 | --bytesRead; |
| 937 | } |
| 938 | return bytesRead; |
| 939 | } |
| 940 | } else { |
| 941 | if (*p != '\r' && *p != '\n') { |
| 942 | haveSeenNonCRLF = True; |
| 943 | } |
| 944 | } |
| 945 | } |
| 946 | } |
| 947 | |
| 948 | return 0; |
| 949 | } |
| 950 | |
| 951 | Boolean SIPClient::parseResponseCode(char const* line, |
| 952 | unsigned& responseCode) { |
| 953 | if (sscanf(line, "%*s%u" , &responseCode) != 1) { |
| 954 | envir().setResultMsg("no response code in line: \"" , line, "\"" ); |
| 955 | return False; |
| 956 | } |
| 957 | |
| 958 | return True; |
| 959 | } |
| 960 | |