Youness Alaoui [Tue, 8 Apr 2014 06:54:19 +0000 (02:54 -0400)]
Add support for tcp candidates in sdp generation
Youness Alaoui [Tue, 8 Apr 2014 06:53:50 +0000 (02:53 -0400)]
Add candidate type to debug
Youness Alaoui [Tue, 8 Apr 2014 06:05:37 +0000 (02:05 -0400)]
Add a sockptr to CandidateCheckPair, will be required for tcp-active
Youness Alaoui [Tue, 8 Apr 2014 05:28:55 +0000 (01:28 -0400)]
Do not attach to sockets with fileno == NULL (requires for tcp-active)
Youness Alaoui [Tue, 8 Apr 2014 03:14:42 +0000 (23:14 -0400)]
Only check selected pair for writability in gio outputstream
Jakub Adam [Thu, 2 Jun 2011 21:04:44 +0000 (23:04 +0200)]
Do not retransmit connection checks on reliable transport
Jakub Adam [Sun, 22 May 2011 12:30:06 +0000 (14:30 +0200)]
Use local candidate foundation as CANDIDATE-IDENTIFIER when creating
STUN_BINDING requests.
Candidate check pair foundation was used - a combination of local
and remote candidates' foundation, which does not correspond with
[MS-ICE2] 2.2.2.1 0x8054 CANDIDATE-IDENTIFIER
Jakub Adam [Sun, 26 Aug 2012 18:10:47 +0000 (20:10 +0200)]
Disable TURN refresh in MSOC compatibility mode
At least temporary, maybe it is not used at all. TURN refresh messages
were not seen in the packet capture.
Youness Alaoui [Sat, 5 Apr 2014 09:54:01 +0000 (05:54 -0400)]
If allow_partial, then allow a return 0 from the socket
Youness Alaoui [Sat, 5 Apr 2014 09:53:31 +0000 (05:53 -0400)]
Once a ice-tcp connection is established, it should work like any other, so just send to it
Youness Alaoui [Sat, 5 Apr 2014 07:41:48 +0000 (03:41 -0400)]
Generate valid TCP connection check pairs
Youness Alaoui [Sat, 5 Apr 2014 07:15:23 +0000 (03:15 -0400)]
Refactor discovery/agent to add support for non-udp candidates
Youness Alaoui [Sat, 5 Apr 2014 03:54:12 +0000 (23:54 -0400)]
Fix indentation for _set_remote_candidates_locked
Youness Alaoui [Sat, 5 Apr 2014 03:56:53 +0000 (23:56 -0400)]
Small refactoring of agent, loop on component id from 1
Youness Alaoui [Fri, 4 Apr 2014 11:18:44 +0000 (07:18 -0400)]
Add support for MS-TURN in tcp-turn
Youness Alaoui [Sat, 5 Apr 2014 03:56:16 +0000 (23:56 -0400)]
Add support for MS Office Communicator pseudossl compatibility
Youness Alaoui [Fri, 4 Apr 2014 06:12:02 +0000 (02:12 -0400)]
Factor out pseudotcp so it's not used if the transport is already reliable
Youness Alaoui [Sat, 5 Apr 2014 04:29:54 +0000 (00:29 -0400)]
Add a nice_socket_send_reliable API for internal use.
One issue with tcp-bsd is that it will queue messages when the tcp socket
is not writable, but it will also drop messages when the queue is full.
If we want to do proper reliable ice-tcp, we need to make sure that
messages don't get dropped, also, this would affect http/socks5/pseudossl
if their messages get dropped. For ice-tcp, when the socket is not writable
we want to return 0, not queue the message.
The change here is to allow connchecks and other important protocol messages
to be sent as 'reliable' on tcp transports by queuing them and in the various
socket layers and to never drop them, but all user messages will be dropped.
if the tcp socket is not writable.
Youness Alaoui [Sat, 5 Apr 2014 04:27:59 +0000 (00:27 -0400)]
turn: In case of error, don't just pass through the data, return an error
Youness Alaoui [Sat, 5 Apr 2014 04:21:02 +0000 (00:21 -0400)]
Return number of sent messages in socket_send_messages when an error happens part-way
Youness Alaoui [Sat, 5 Apr 2014 04:14:18 +0000 (00:14 -0400)]
Fix return value of send_messages in socks5
Youness Alaoui [Thu, 3 Apr 2014 01:53:12 +0000 (21:53 -0400)]
Allow tcp-bsd to act as reliable or non reliable transport and fix is_reliable on other sockets
Youness Alaoui [Tue, 1 Apr 2014 01:30:29 +0000 (21:30 -0400)]
Add a socket type for socket layer
Youness Alaoui [Tue, 1 Apr 2014 01:13:14 +0000 (21:13 -0400)]
Some refactoring to allow for ice-tcp (non pseudotcp reliable)
Youness Alaoui [Tue, 1 Apr 2014 00:24:58 +0000 (20:24 -0400)]
Fix documentation in preparation for ice-tcp support
Youness Alaoui [Wed, 22 Aug 2012 19:55:03 +0000 (15:55 -0400)]
Add ICE-TCP candidate transport types
Youness Alaoui [Tue, 25 Mar 2014 02:35:52 +0000 (22:35 -0400)]
Small documentation fix
Olivier Crête [Mon, 12 May 2014 23:40:08 +0000 (19:40 -0400)]
agent: Use 1280 instead of 65536 buffer size to send STUN Message
RFC 5389 says:
All STUN messages sent over UDP SHOULD be less than the path MTU, if
known. If the path MTU is unknown, messages SHOULD be the smaller of
576 bytes and the first-hop MTU for IPv4 [RFC1122] and 1280 bytes for
IPv6 [RFC2460].
So sending 65536 bytes is always wrong
Olivier Crête [Mon, 5 May 2014 19:02:48 +0000 (15:02 -0400)]
Version 0.1.7.1
Olivier Crête [Mon, 5 May 2014 18:58:12 +0000 (14:58 -0400)]
Version 0.1.7
Olivier Crête [Fri, 2 May 2014 21:53:40 +0000 (17:53 -0400)]
stunmessage: Revert another function to use sockaddr
The farstream unit tests were using it.
Olivier Crête [Tue, 29 Apr 2014 03:10:54 +0000 (23:10 -0400)]
threaded-example: Make sure the foundation string is NULL terminated
Olivier Crête [Tue, 29 Apr 2014 01:05:34 +0000 (21:05 -0400)]
Version 0.1.6.1
Olivier Crête [Tue, 29 Apr 2014 00:39:31 +0000 (20:39 -0400)]
Version 0.1.6
Youness Alaoui [Mon, 28 Apr 2014 21:21:04 +0000 (17:21 -0400)]
Fix udp-turn returning wrong message length in socket_recv_messages.
When using optimal path where recv message has only one buffer, the
buffer length was set to the size of the buffer, not its length, which was
causing the wrong message length to be returned causing the agent to
discard STUN messages because their size doesn't match received data
length.
Philip Withnall [Fri, 25 Apr 2014 07:21:55 +0000 (08:21 +0100)]
agent: Add a missing forward declaration
Philip Withnall [Thu, 24 Apr 2014 15:11:03 +0000 (16:11 +0100)]
agent: Simplify gathering-done stage of UPnP handling
This introduces no functional changes, but consolidates and documents
the code a bit more.
Philip Withnall [Thu, 24 Apr 2014 14:59:24 +0000 (15:59 +0100)]
agent: Tidy up upnp_mapping handling
Use a NULL check to determine if upnp_mapping is an empty list (rather
than counting every element). Use g_slist_free_full() where appropriate.
This introduces no functional changes.
Philip Withnall [Thu, 24 Apr 2014 14:58:01 +0000 (15:58 +0100)]
agent: Document units for NiceAgent::upnp-timeout property
It’s in milliseconds.
Olivier Crête [Fri, 25 Apr 2014 01:32:40 +0000 (21:32 -0400)]
stunagent: Only declare the long term key valid if the username/realm coudl be read
Olivier Crête [Fri, 25 Apr 2014 01:32:12 +0000 (21:32 -0400)]
example: Prevent possible non-NULL terminated string
Olivier Crête [Fri, 25 Apr 2014 01:27:29 +0000 (21:27 -0400)]
address: Correctly identify ipv6 link local
The test for fe80::/10 always returned FALSE.
Guillaume Desmottes [Tue, 15 Apr 2014 13:57:55 +0000 (15:57 +0200)]
add nice_agent_forget_relays()
Olivier Crête [Wed, 16 Apr 2014 02:52:30 +0000 (22:52 -0400)]
component: Clear turn local candidates when clearing turn servers
But keep the turn connection that's currently being used if it is
the selected candidate. Also clear the TURN candidate refresh.
Olivier Crête [Tue, 22 Apr 2014 21:05:57 +0000 (17:05 -0400)]
agent: Make the TurnServer structure refcounted
Instead of just blindling assuming that all of the pointers are valid
until the end.
Olivier Crête [Tue, 22 Apr 2014 21:10:28 +0000 (17:10 -0400)]
discovery: Use g_slist_free_full for candidate refresh list
Olivier Crête [Tue, 22 Apr 2014 21:03:03 +0000 (17:03 -0400)]
discovery: Use g_slist_free_full for discovery list
Olivier Crête [Tue, 22 Apr 2014 20:47:36 +0000 (16:47 -0400)]
discovery: Remove never used and leaked msn_turn_* fields in CandidateDiscovery
Olivier Crête [Tue, 22 Apr 2014 20:47:36 +0000 (16:47 -0400)]
discovery: Remove never used and leaked msn_turn_* fields in CandidateRefresh
Olivier Crête [Tue, 22 Apr 2014 20:25:26 +0000 (16:25 -0400)]
agent: Factor out creating the TurnServer structure
Olivier Crête [Tue, 22 Apr 2014 20:13:52 +0000 (16:13 -0400)]
discovery: Remove duplicated element between CandidateRefresh and NiceCandidate
Olivier Crête [Tue, 22 Apr 2014 20:02:32 +0000 (16:02 -0400)]
discovery: Store NiceCandidate in CandidateRefresh
Olivier Crête [Wed, 16 Apr 2014 02:44:52 +0000 (22:44 -0400)]
component: Make detach_source close the socket
Olivier Crête [Wed, 16 Apr 2014 02:21:07 +0000 (22:21 -0400)]
component: Make is possible to remove a socket
Change the SocketSource handling to make it possible
to remove a source, not only to add one.
Guillaume Desmottes [Tue, 15 Apr 2014 13:50:39 +0000 (15:50 +0200)]
factor out: component_clean_turn_servers()
Olivier Crête [Fri, 25 Apr 2014 00:55:17 +0000 (20:55 -0400)]
stream: No need to pass RNG to stream_restart()
It can now take it from the agent.
Olivier Crête [Fri, 25 Apr 2014 00:53:09 +0000 (20:53 -0400)]
conncheck: Only print debug message if actually freeing something
Olivier Crête [Thu, 24 Apr 2014 02:03:29 +0000 (22:03 -0400)]
conncheck: Don't fail a stream that has on-going discovery
Olivier Crête [Wed, 16 Apr 2014 00:19:18 +0000 (20:19 -0400)]
agent: Add nice_agent_restart_stream() to restart a single stream
Olivier Crête [Wed, 16 Apr 2014 00:14:16 +0000 (20:14 -0400)]
stream: Clear connchecks on restart inside stream
Olivier Crête [Fri, 25 Apr 2014 00:40:09 +0000 (20:40 -0400)]
conncheck: Use g_slist_free_full() for conncheck list
Skips one iterator over g_slist_foreach() + g_slist_free(). It is also easier
to read.
Olivier Crête [Fri, 25 Apr 2014 00:39:20 +0000 (20:39 -0400)]
conncheck: Make conn_check_free_item() static
It is never used outside of this file.
Olivier Crête [Fri, 25 Apr 2014 00:33:33 +0000 (20:33 -0400)]
conncheck: Only stop conncheck timer if no stream has pending conn checks
Olivier Crête [Fri, 25 Apr 2014 00:31:44 +0000 (20:31 -0400)]
conncheck: Remove useless return value on conn_check_prune_stream
Olivier Crête [Fri, 25 Apr 2014 00:27:38 +0000 (20:27 -0400)]
conncheck: Factor out stopping connectivity checks
Olivier Crête [Tue, 15 Apr 2014 23:54:45 +0000 (19:54 -0400)]
component: Remove return value from *_restart() functions, they can't fail
Olivier Crête [Thu, 24 Apr 2014 03:30:34 +0000 (23:30 -0400)]
component: socket has been renamed nicesock
Youness Alaoui [Sat, 19 Apr 2014 01:45:12 +0000 (21:45 -0400)]
Add more debug info when adding relays
Youness Alaoui [Wed, 16 Apr 2014 22:50:10 +0000 (18:50 -0400)]
Protect test-dribble against read->connected->ready state changes
Youness Alaoui [Sat, 19 Apr 2014 04:44:53 +0000 (00:44 -0400)]
Return the correct originating IP on TURN
If doing a recv on UDP-TURN, the 'from' address was kept set to
the turn server which causes connchecks to fail with "mismatched address"
error. This fixes it
Guillaume Desmottes [Wed, 23 Apr 2014 12:39:59 +0000 (14:39 +0200)]
add nice_component_state_to_string()
Nice to make debug logs more friendly to read.
Philip Withnall [Wed, 16 Apr 2014 11:44:32 +0000 (12:44 +0100)]
pseudotcp: Fix partial acknowledgement of segments
If an incoming ACK acknowledges part of a pending SSegment, correctly
increment the base offset of that SSegment before attempting to transmit
it. Otherwise, the wrong data will be transmitted and the offset passed
to packet() will be incorrect.
Philip Withnall [Wed, 16 Apr 2014 11:43:20 +0000 (12:43 +0100)]
pseudotcp: Fix an assertion on an invalid calculated RTT
If a packet has an invalid tsecr field, invalid (e.g. negative) RTTs may
be calculated from it. If so, discard the packet as invalid.
Philip Withnall [Wed, 16 Apr 2014 11:41:47 +0000 (12:41 +0100)]
tests: Add a test-pseudotcp-fuzzy test for fuzzing PseudoTcpSocket
As documented at the top of the file, this creates two PseudoTcpSockets
in a loopback configuration, and mutates the raw packets which are sent
between them, hoping to cause assertion failures and illegal memory
accesses in the pseudotcp code.
Best run under Valgrind or GDB.
Philip Withnall [Wed, 16 Apr 2014 18:09:06 +0000 (19:09 +0100)]
agent: Fix leaks if a component is removed during a recv() call
If the error handling block in the middle of the recv() loop is hit,
various things were previously leaked (context, cancellable_source) and
the return values were potentially incorrect.
Fix the break out of the error handling block to clean up correctly.
Olivier Crête [Wed, 16 Apr 2014 03:18:21 +0000 (23:18 -0400)]
stun: Restore argument type to stun_usage_bind_process(), it's used outside libnice
Philip Withnall [Fri, 14 Mar 2014 09:24:08 +0000 (09:24 +0000)]
agent: Factor out a tiny bit of common code
Philip Withnall [Fri, 14 Mar 2014 09:20:53 +0000 (09:20 +0000)]
agent: Limit printed length of uname and password in debug output
At this point in the code, neither the username nor password are
nul-terminated, so printing them in the debug output as nul-terminated
strings can easily result in rubbish being printed after them.
Fix this by specifying the string length in the printf() format string.
Finally my terminal will no longer ask me to install N’Ko fonts when
running the libnice tests.
Philip Withnall [Tue, 15 Apr 2014 17:06:44 +0000 (18:06 +0100)]
agent: Fix a leak in nice_output_stream_write() with a NULL cancellable
If @cancellable is NULL in a call to nice_output_stream_write(), the
WriteData struct is created with a reference count of 4, but only two
operations are scheduled which will result in its reference count being
decremented. The third operation is only scheduled if @cancellable is
non-NULL (and the final reference is dropped unconditionally at the end
of the function).
Fix this by properly implementing reference counting for WriteData,
rather than hard-coding the expected number of references in a fragile
and unmaintainable way.
Olivier Crête [Wed, 2 Apr 2014 15:25:27 +0000 (11:25 -0400)]
tcp-bsd: Don't clear error that hasn't been set
Olivier Crête [Wed, 9 Apr 2014 03:10:34 +0000 (23:10 -0400)]
agent: Don't return the socket to the app in any reliable case
Youness Alaoui [Tue, 8 Apr 2014 01:30:49 +0000 (21:30 -0400)]
No need to strdup foundation in new_selected_pair since we queue signal
Olivier Crête [Wed, 9 Apr 2014 02:43:30 +0000 (22:43 -0400)]
pseudotcp: Also cause Writable callback to be emitted if can_send() says no
The GOutputStream based systems can sometimes call this, decide the stream is
not writable and then poll for it. We have to make sure that poll is woken up.
Youness Alaoui [Fri, 4 Apr 2014 06:43:20 +0000 (02:43 -0400)]
Fix TCP TURN for Google compatibility. Message length was sent uninitialized
Youness Alaoui [Tue, 1 Apr 2014 00:36:58 +0000 (20:36 -0400)]
Small cleaning of tcp-bsd.c
Jakub Adam [Sat, 4 Jun 2011 21:25:33 +0000 (23:25 +0200)]
Fix possible segfault in stun_message_validate_buffer_length()
Philip Withnall [Thu, 3 Apr 2014 11:29:04 +0000 (12:29 +0100)]
build: Check for [s]size_t before redefining them on MinGW
MinGW defines size_t and ssize_t for us, so we should not
unconditionally redefine them in stun/win32_common.h. Add an
AC_CHECK_TYPES configure check to avoid this.
Philip Withnall [Thu, 3 Apr 2014 11:22:27 +0000 (12:22 +0100)]
agent: Define IN6_ARE_ADDR_EQUAL macro when building under MinGW
Older versions of MinGW don’t define IN6_ARE_ADDR_EQUAL, as normally
defined in netinet/in.h. Conditionally define it in address.c to fix the
build on MinGW.
MinGW has added support for the macro here:
https://github.com/mirror/mingw-w64/commit/
0f4899473c4ba2e34fa447b1931a04e38c1f105e
Based on a patch originally by Luciana Fujii Pontello
<luciana@fujii.eti.br>.
Olivier Crête [Wed, 2 Apr 2014 01:41:04 +0000 (21:41 -0400)]
pseudotcp: Validate option lengths
Olivier Crête [Tue, 1 Apr 2014 15:00:55 +0000 (11:00 -0400)]
Remove all traces of compile time marshallers
Olivier Crête [Mon, 31 Mar 2014 23:28:24 +0000 (19:28 -0400)]
agent: Use generic marshaller
Olivier Crête [Mon, 31 Mar 2014 23:17:28 +0000 (19:17 -0400)]
Initialize variables to reduce unexpected behavior in case something goes wrong
Olivier Crête [Mon, 31 Mar 2014 23:15:07 +0000 (19:15 -0400)]
Rename variables that shadow global definitions
Olivier Crête [Mon, 31 Mar 2014 22:32:40 +0000 (18:32 -0400)]
stun: Use struct sockaddr_storage * for any pointer that we write to
Some platforms have a larger alignment requirement for struct sockaddr_* than
for plain struct sockaddr, in that case, we need to make sure that the incoming pointer
has the right alignement before taking it in.
Olivier Crête [Mon, 31 Mar 2014 21:46:34 +0000 (17:46 -0400)]
stun tests: Fix a bunch of issues found by more aggressive GCC warnings
Olivier Crête [Mon, 31 Mar 2014 21:46:15 +0000 (17:46 -0400)]
Don't mix gsize vs size_t, seems like they're not always the same size
Olivier Crête [Mon, 31 Mar 2014 21:45:36 +0000 (17:45 -0400)]
candidate: Use explicit 64-bit constants to make 32-bit gcc happy
Olivier Crête [Mon, 31 Mar 2014 21:44:45 +0000 (17:44 -0400)]
pseudotcp: Don't mix "long" and guint, one is signed, the other is unsigned
So use guint64 everywhere, this is never supposed to be negative.
Olivier Crête [Sun, 30 Mar 2014 01:28:02 +0000 (21:28 -0400)]
tcp-turn: Don't access output message after freeing it
Olivier Crête [Sun, 30 Mar 2014 01:23:40 +0000 (21:23 -0400)]
turn: Don't overwrite source, destroy it first