| /* |
| * Copyright 2017 The WebRTC Project Authors. All rights reserved. |
| * |
| * Use of this source code is governed by a BSD-style license |
| * that can be found in the LICENSE file in the root of the source |
| * tree. An additional intellectual property rights grant can be found |
| * in the file PATENTS. All contributing project authors may |
| * be found in the AUTHORS file in the root of the source tree. |
| */ |
| |
| #include "api/candidate.h" |
| |
| #include <algorithm> // IWYU pragma: keep |
| #include <cstddef> |
| #include <cstdint> |
| #include <optional> |
| #include <string> |
| #include <vector> |
| |
| #include "absl/strings/str_cat.h" |
| #include "absl/strings/string_view.h" |
| #include "api/rtc_error.h" |
| #include "p2p/base/p2p_constants.h" |
| #include "rtc_base/checks.h" |
| #include "rtc_base/crc32.h" |
| #include "rtc_base/crypto_random.h" |
| #include "rtc_base/ip_address.h" |
| #include "rtc_base/net_helper.h" |
| #include "rtc_base/network_constants.h" |
| #include "rtc_base/socket_address.h" |
| #include "rtc_base/string_encode.h" |
| #include "rtc_base/strings/string_builder.h" |
| |
| using webrtc::IceCandidateType; |
| |
| namespace webrtc { |
| namespace { |
| constexpr char kLineTypeAttributes = 'a'; |
| constexpr char kAttributeCandidate[] = "candidate"; |
| constexpr char kAttributeCandidateTyp[] = "typ"; |
| constexpr char kAttributeCandidateRaddr[] = "raddr"; |
| constexpr char kAttributeCandidateRport[] = "rport"; |
| constexpr char kAttributeCandidateUfrag[] = "ufrag"; |
| constexpr char kAttributeCandidateGeneration[] = "generation"; |
| constexpr char kAttributeCandidateNetworkId[] = "network-id"; |
| constexpr char kAttributeCandidateNetworkCost[] = "network-cost"; |
| constexpr char kAttributeCandidatePwd[] = "pwd"; |
| |
| constexpr absl::string_view kSdpDelimiterColon = ":"; |
| constexpr char kSdpDelimiterColonChar = kSdpDelimiterColon[0]; |
| constexpr char kSdpDelimiterSpaceChar = ' '; |
| constexpr char kSdpDelimiterEqualChar = '='; |
| constexpr char kNewLineChar = '\n'; |
| constexpr char kReturnChar = '\r'; |
| |
| constexpr char kCandidateHost[] = "host"; |
| constexpr char kCandidateSrflx[] = "srflx"; |
| constexpr char kCandidatePrflx[] = "prflx"; |
| constexpr char kCandidateRelay[] = "relay"; |
| // Backwards compatibility. |
| constexpr char kTcpCandidateType[] = "tcptype"; |
| |
| absl::string_view TrimReturnChar(absl::string_view line) { |
| if (!line.empty() && line.back() == kReturnChar) { |
| line.remove_suffix(1); |
| } |
| return line; |
| } |
| |
| bool IsValidPort(int port) { |
| return port >= 0 && port <= 65535; |
| } |
| |
| // Returns the `candidate-attribute` as described in: |
| // https://www.rfc-editor.org/rfc/rfc5245#section-15.1 |
| std::string BuildCandidate(const Candidate& candidate, bool include_ufrag) { |
| StringBuilder os; |
| os << kAttributeCandidate; |
| |
| absl::string_view type = candidate.type_name(); |
| os << kSdpDelimiterColon << candidate.foundation() << " " |
| << candidate.component() << " " << candidate.protocol() << " " |
| << candidate.priority() << " " |
| << (candidate.address().ipaddr().IsNil() |
| ? candidate.address().hostname() |
| : candidate.address().ipaddr().ToString()) |
| << " " << candidate.address().PortAsString() << " " |
| << kAttributeCandidateTyp << " " << type << " "; |
| |
| // Related address |
| if (!candidate.related_address().IsNil()) { |
| os << kAttributeCandidateRaddr << " " |
| << candidate.related_address().ipaddr().ToString() << " " |
| << kAttributeCandidateRport << " " |
| << candidate.related_address().PortAsString() << " "; |
| } |
| |
| // Note that we allow the tcptype to be missing, for backwards |
| // compatibility; the implementation treats this as a passive candidate. |
| // TODO(bugs.webrtc.org/11466): Treat a missing tcptype as an error? |
| if (candidate.protocol() == TCP_PROTOCOL_NAME && |
| !candidate.tcptype().empty()) { |
| os << kTcpCandidateType << " " << candidate.tcptype() << " "; |
| } |
| |
| // Extensions |
| os << kAttributeCandidateGeneration << " " << candidate.generation(); |
| if (include_ufrag && !candidate.username().empty()) { |
| os << " " << kAttributeCandidateUfrag << " " << candidate.username(); |
| } |
| if (candidate.network_id() > 0) { |
| os << " " << kAttributeCandidateNetworkId << " " << candidate.network_id(); |
| } |
| if (candidate.network_cost() > 0) { |
| os << " " << kAttributeCandidateNetworkCost << " " |
| << candidate.network_cost(); |
| } |
| |
| return os.str(); |
| } |
| |
| // From WebRTC draft section 4.8.1.1 candidate-attribute should be |
| // candidate:<candidate> when trickled. |
| RTCErrorOr<Candidate> ParseCandidate(absl::string_view message) { |
| // Makes sure `message` contains only one line. |
| absl::string_view first_line; |
| size_t line_end = message.find(kNewLineChar); |
| if (line_end == absl::string_view::npos) { |
| first_line = message; |
| } else if (line_end + 1 == message.size()) { |
| first_line = message.substr(0, line_end); |
| } else { |
| return RTCError(RTCErrorType::INVALID_PARAMETER, "Expect one line only"); |
| } |
| |
| // For backwards compatibility, don't fail if the supplied string is in the |
| // form of "a=candidate...". If we encounter that, ignore the first 2 |
| // characters and continue. |
| if (first_line.length() > 2 && first_line[0] == kLineTypeAttributes && |
| first_line[1] == kSdpDelimiterEqualChar) { |
| first_line = first_line.substr(2); |
| } |
| |
| // Trim return char, if any. |
| first_line = TrimReturnChar(first_line); |
| |
| std::string attribute_candidate; |
| std::string candidate_value; |
| |
| // `first_line` must be in the form of "candidate:<value>". |
| if (!tokenize_first(first_line, kSdpDelimiterColonChar, &attribute_candidate, |
| &candidate_value) || |
| attribute_candidate != kAttributeCandidate) { |
| return RTCError(RTCErrorType::INVALID_PARAMETER, |
| absl::StrCat("Expected ", kAttributeCandidate, " got ", |
| attribute_candidate)); |
| } |
| |
| std::vector<absl::string_view> fields = |
| split(candidate_value, kSdpDelimiterSpaceChar); |
| |
| // RFC 5245 |
| // a=candidate:<foundation> <component-id> <transport> <priority> |
| // <connection-address> <port> typ <candidate-types> |
| // [raddr <connection-address>] [rport <port>] |
| // *(SP extension-att-name SP extension-att-value) |
| const size_t expected_min_fields = 8; |
| if (fields.size() < expected_min_fields || |
| (fields[6] != kAttributeCandidateTyp)) { |
| return RTCError( |
| RTCErrorType::INVALID_PARAMETER, |
| absl::StrCat("Expect at least ", expected_min_fields, " fields.")); |
| } |
| const absl::string_view foundation = fields[0]; |
| |
| int component_id = 0; |
| if (!FromString(fields[1], &component_id)) { |
| return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid component id"); |
| } |
| const absl::string_view transport = fields[2]; |
| uint32_t priority = 0; |
| if (!FromString(fields[3], &priority)) { |
| return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid priority"); |
| } |
| int port = 0; |
| if (!FromString(fields[5], &port) || !IsValidPort(port)) { |
| return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid port"); |
| } |
| const absl::string_view connection_address = fields[4]; |
| SocketAddress address(connection_address, port); |
| |
| std::optional<ProtocolType> protocol = StringToProto(transport); |
| if (!protocol) { |
| return RTCError(RTCErrorType::INVALID_PARAMETER, |
| "Unsupported transport type"); |
| } |
| bool tcp_protocol = false; |
| switch (*protocol) { |
| // Supported protocols. |
| case PROTO_UDP: |
| break; |
| case PROTO_TCP: |
| case PROTO_SSLTCP: |
| tcp_protocol = true; |
| break; |
| default: |
| return RTCError(RTCErrorType::INVALID_PARAMETER, "Unsupported protocol"); |
| } |
| |
| IceCandidateType candidate_type; |
| const absl::string_view type = fields[7]; |
| if (type == kCandidateHost) { |
| candidate_type = IceCandidateType::kHost; |
| } else if (type == kCandidateSrflx) { |
| candidate_type = IceCandidateType::kSrflx; |
| } else if (type == kCandidateRelay) { |
| candidate_type = IceCandidateType::kRelay; |
| } else if (type == kCandidatePrflx) { |
| candidate_type = IceCandidateType::kPrflx; |
| } else { |
| return RTCError(RTCErrorType::INVALID_PARAMETER, |
| "Unsupported candidate type"); |
| } |
| |
| size_t current_position = expected_min_fields; |
| SocketAddress related_address; |
| // The 2 optional fields for related address |
| // [raddr <connection-address>] [rport <port>] |
| if (fields.size() >= (current_position + 2) && |
| fields[current_position] == kAttributeCandidateRaddr) { |
| related_address.SetIP(fields[++current_position]); |
| ++current_position; |
| } |
| if (fields.size() >= (current_position + 2) && |
| fields[current_position] == kAttributeCandidateRport) { |
| int related_port = 0; |
| if (!FromString(fields[++current_position], &related_port) || |
| !IsValidPort(related_port)) { |
| return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid port"); |
| } |
| related_address.SetPort(related_port); |
| ++current_position; |
| } |
| |
| // If this is a TCP candidate, it has additional extension as defined in |
| // RFC 6544. |
| absl::string_view tcptype; |
| if (fields.size() >= (current_position + 2) && |
| fields[current_position] == kTcpCandidateType) { |
| tcptype = fields[++current_position]; |
| ++current_position; |
| |
| if (tcptype != TCPTYPE_ACTIVE_STR && tcptype != TCPTYPE_PASSIVE_STR && |
| tcptype != TCPTYPE_SIMOPEN_STR) { |
| return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid TCP candidate type"); |
| } |
| |
| if (!tcp_protocol) { |
| return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid non-TCP candidate"); |
| } |
| } else if (tcp_protocol) { |
| // We allow the tcptype to be missing, for backwards compatibility, |
| // treating it as a passive candidate. |
| // TODO(bugs.webrtc.org/11466): Treat a missing tcptype as an error? |
| tcptype = TCPTYPE_PASSIVE_STR; |
| } |
| |
| // Extension |
| // Though non-standard, we support the ICE ufrag and pwd being signaled on |
| // the candidate to avoid issues with confusing which generation a candidate |
| // belongs to when trickling multiple generations at the same time. |
| absl::string_view username; |
| absl::string_view password; |
| uint32_t generation = 0; |
| uint16_t network_id = 0; |
| uint16_t network_cost = 0; |
| for (size_t i = current_position; i + 1 < fields.size(); ++i) { |
| // RFC 5245 |
| // *(SP extension-att-name SP extension-att-value) |
| if (fields[i] == kAttributeCandidateGeneration) { |
| if (!FromString(fields[++i], &generation)) { |
| return RTCError( |
| RTCErrorType::SYNTAX_ERROR, |
| absl::StrCat("Invalid ", kAttributeCandidateGeneration)); |
| } |
| } else if (fields[i] == kAttributeCandidateUfrag) { |
| username = fields[++i]; |
| } else if (fields[i] == kAttributeCandidatePwd) { |
| password = fields[++i]; |
| } else if (fields[i] == kAttributeCandidateNetworkId) { |
| if (!FromString(fields[++i], &network_id)) { |
| return RTCError(RTCErrorType::SYNTAX_ERROR, |
| absl::StrCat("Invalid ", kAttributeCandidateNetworkId)); |
| } |
| } else if (fields[i] == kAttributeCandidateNetworkCost) { |
| if (!FromString(fields[++i], &network_cost)) { |
| return RTCError( |
| RTCErrorType::SYNTAX_ERROR, |
| absl::StrCat("Invalid ", kAttributeCandidateNetworkCost)); |
| } |
| network_cost = std::min(network_cost, kNetworkCostMax); |
| } else { |
| // Skip the unknown extension. |
| ++i; |
| } |
| } |
| |
| Candidate candidate(component_id, ProtoToString(*protocol), address, priority, |
| username, password, candidate_type, generation, |
| foundation, network_id, network_cost); |
| candidate.set_related_address(related_address); |
| candidate.set_tcptype(tcptype); |
| return candidate; |
| } |
| |
| } // namespace |
| |
| absl::string_view IceCandidateTypeToString(IceCandidateType type) { |
| switch (type) { |
| case IceCandidateType::kHost: |
| return kCandidateHost; |
| case IceCandidateType::kSrflx: |
| return kCandidateSrflx; |
| case IceCandidateType::kPrflx: |
| return kCandidatePrflx; |
| case IceCandidateType::kRelay: |
| return kCandidateRelay; |
| } |
| } |
| |
| std::optional<IceCandidateType> StringToIceCandidateType( |
| absl::string_view type) { |
| if (type == kCandidateHost) { |
| return IceCandidateType::kHost; |
| } else if (type == kCandidateSrflx) { |
| return IceCandidateType::kSrflx; |
| } else if (type == kCandidatePrflx) { |
| return IceCandidateType::kPrflx; |
| } else if (type == kCandidateRelay) { |
| return IceCandidateType::kRelay; |
| } |
| return std::nullopt; |
| } |
| |
| // static |
| RTCErrorOr<Candidate> Candidate::ParseCandidateString( |
| absl::string_view message) { |
| return ParseCandidate(message); |
| } |
| |
| Candidate::Candidate() |
| : id_(CreateRandomString(8)), |
| component_(ICE_CANDIDATE_COMPONENT_DEFAULT), |
| priority_(0), |
| network_type_(ADAPTER_TYPE_UNKNOWN), |
| underlying_type_for_vpn_(ADAPTER_TYPE_UNKNOWN), |
| generation_(0), |
| network_id_(0), |
| network_cost_(0) {} |
| |
| Candidate::Candidate(int component, |
| absl::string_view protocol, |
| const SocketAddress& address, |
| uint32_t priority, |
| absl::string_view username, |
| absl::string_view password, |
| IceCandidateType type, |
| uint32_t generation, |
| absl::string_view foundation, |
| uint16_t network_id /*= 0*/, |
| uint16_t network_cost /*= 0*/) |
| : id_(CreateRandomString(8)), |
| component_(component), |
| protocol_(protocol), |
| address_(address), |
| priority_(priority), |
| username_(username), |
| password_(password), |
| type_(type), |
| network_type_(ADAPTER_TYPE_UNKNOWN), |
| underlying_type_for_vpn_(ADAPTER_TYPE_UNKNOWN), |
| generation_(generation), |
| foundation_(foundation), |
| network_id_(network_id), |
| network_cost_(network_cost) {} |
| |
| Candidate::Candidate(const Candidate&) = default; |
| |
| Candidate::~Candidate() = default; |
| |
| void Candidate::generate_id() { |
| id_ = CreateRandomString(8); |
| } |
| |
| bool Candidate::is_local() const { |
| return type_ == IceCandidateType::kHost; |
| } |
| bool Candidate::is_stun() const { |
| return type_ == IceCandidateType::kSrflx; |
| } |
| bool Candidate::is_prflx() const { |
| return type_ == IceCandidateType::kPrflx; |
| } |
| bool Candidate::is_relay() const { |
| return type_ == IceCandidateType::kRelay; |
| } |
| |
| absl::string_view Candidate::type_name() const { |
| return IceCandidateTypeToString(type_); |
| } |
| |
| bool Candidate::IsEquivalent(const Candidate& c) const { |
| // We ignore the network name, since that is just debug information, and |
| // the priority and the network cost, since they should be the same if the |
| // rest are. |
| return (component_ == c.component_) && (protocol_ == c.protocol_) && |
| (address_ == c.address_) && (username_ == c.username_) && |
| (password_ == c.password_) && (type_ == c.type_) && |
| (generation_ == c.generation_) && (foundation_ == c.foundation_) && |
| (related_address_ == c.related_address_) && |
| (network_id_ == c.network_id_); |
| } |
| |
| bool Candidate::MatchesForRemoval(const Candidate& c) const { |
| return component_ == c.component_ && protocol_ == c.protocol_ && |
| address_ == c.address_; |
| } |
| |
| std::string Candidate::ToStringInternal(bool sensitive) const { |
| StringBuilder ost; |
| std::string address = |
| sensitive ? address_.ToSensitiveString() : address_.ToString(); |
| std::string related_address = sensitive ? related_address_.ToSensitiveString() |
| : related_address_.ToString(); |
| ost << "Cand[:" << foundation_ << ":" << component_ << ":" << protocol_ << ":" |
| << priority_ << ":" << address << ":" << type_name() << ":" |
| << related_address << ":" << username_ << ":" << password_ << ":" |
| << network_id_ << ":" << network_cost_ << ":" << generation_ << "]"; |
| return ost.Release(); |
| } |
| |
| std::string Candidate::ToCandidateAttribute(bool include_ufrag) const { |
| return BuildCandidate(*this, include_ufrag); |
| } |
| |
| uint32_t Candidate::GetPriority(uint32_t type_preference, |
| int network_adapter_preference, |
| int relay_preference, |
| bool adjust_local_preference) const { |
| // RFC 5245 - 4.1.2.1. |
| // priority = (2^24)*(type preference) + |
| // (2^8)*(local preference) + |
| // (2^0)*(256 - component ID) |
| |
| // `local_preference` length is 2 bytes, 0-65535 inclusive. |
| // In our implemenation we will partion local_preference into |
| // 0 1 |
| // 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 |
| // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| // | NIC Pref | Addr Pref | |
| // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |
| // NIC Type - Type of the network adapter e.g. 3G/Wifi/Wired. |
| // Addr Pref - Address preference value as per RFC 3484. |
| // local preference = (NIC Type << 8 | Addr_Pref) + relay preference. |
| // The relay preference is based on the number of TURN servers, the |
| // first TURN server gets the highest preference. |
| int addr_pref = IPAddressPrecedence(address_.ipaddr()); |
| int local_preference = |
| ((network_adapter_preference << 8) | addr_pref) + relay_preference; |
| |
| // Ensure that the added relay preference will not result in a relay candidate |
| // whose STUN priority attribute has a higher priority than a server-reflexive |
| // candidate. |
| // The STUN priority attribute is calculated as |
| // (peer-reflexive type preference) << 24 | (priority & 0x00FFFFFF) |
| // as described in |
| // https://www.rfc-editor.org/rfc/rfc5245#section-7.1.2.1 |
| // To satisfy that condition, add kMaxTurnServers to the local preference. |
| // This can not overflow the field width since the highest "NIC pref" |
| // assigned is kHighestNetworkPreference = 127 |
| RTC_DCHECK_LT(local_preference + kMaxTurnServers, 0x10000); |
| if (adjust_local_preference && relay_protocol_.empty()) { |
| local_preference += kMaxTurnServers; |
| } |
| |
| return (type_preference << 24) | (local_preference << 8) | (256 - component_); |
| } |
| |
| bool Candidate::operator==(const Candidate& o) const { |
| return id_ == o.id_ && component_ == o.component_ && |
| protocol_ == o.protocol_ && relay_protocol_ == o.relay_protocol_ && |
| address_ == o.address_ && priority_ == o.priority_ && |
| username_ == o.username_ && password_ == o.password_ && |
| type_ == o.type_ && network_name_ == o.network_name_ && |
| network_type_ == o.network_type_ && generation_ == o.generation_ && |
| foundation_ == o.foundation_ && |
| related_address_ == o.related_address_ && tcptype_ == o.tcptype_ && |
| network_id_ == o.network_id_; |
| } |
| |
| bool Candidate::operator!=(const Candidate& o) const { |
| return !(*this == o); |
| } |
| |
| Candidate Candidate::ToSanitizedCopy(bool use_hostname_address, |
| bool filter_related_address) const { |
| return ToSanitizedCopy(use_hostname_address, filter_related_address, false); |
| } |
| |
| Candidate Candidate::ToSanitizedCopy(bool use_hostname_address, |
| bool filter_related_address, |
| bool filter_ufrag) const { |
| Candidate copy(*this); |
| if (use_hostname_address) { |
| IPAddress ip; |
| if (address().hostname().empty()) { |
| // IP needs to be redacted, but no hostname available. |
| SocketAddress redacted_addr("redacted-ip.invalid", address().port()); |
| copy.set_address(redacted_addr); |
| } else if (IPFromString(address().hostname(), &ip)) { |
| // The hostname is an IP literal, and needs to be redacted too. |
| SocketAddress redacted_addr("redacted-literal.invalid", address().port()); |
| copy.set_address(redacted_addr); |
| } else { |
| SocketAddress hostname_only_addr(address().hostname(), address().port()); |
| copy.set_address(hostname_only_addr); |
| } |
| } |
| if (filter_related_address) { |
| copy.set_related_address( |
| EmptySocketAddressWithFamily(copy.address().family())); |
| } |
| if (filter_ufrag) { |
| copy.set_username(""); |
| } |
| |
| return copy; |
| } |
| |
| void Candidate::ComputeFoundation(const SocketAddress& base_address, |
| uint64_t tie_breaker) { |
| // https://www.rfc-editor.org/rfc/rfc5245#section-4.1.1.3 |
| // The foundation is an identifier, scoped within a session. Two candidates |
| // MUST have the same foundation ID when all of the following are true: |
| // |
| // o they are of the same type. |
| // o their bases have the same IP address (the ports can be different). |
| // o for reflexive and relayed candidates, the STUN or TURN servers used to |
| // obtain them have the same IP address. |
| // o they were obtained using the same transport protocol (TCP, UDP, etc.). |
| // |
| // Similarly, two candidates MUST have different foundations if their |
| // types are different, their bases have different IP addresses, the STUN or |
| // TURN servers used to obtain them have different IP addresses, or their |
| // transport protocols are different. |
| |
| StringBuilder sb; |
| sb << type_name() << base_address.ipaddr().ToString() << protocol_ |
| << relay_protocol_; |
| |
| // https://www.rfc-editor.org/rfc/rfc5245#section-5.2 |
| // [...] it is possible for both agents to mistakenly believe they are |
| // controlled or controlling. To resolve this, each agent MUST select a random |
| // number, called the tie-breaker, uniformly distributed between 0 and (2**64) |
| // - 1 (that is, a 64-bit positive integer). This number is used in |
| // connectivity checks to detect and repair this case [...] |
| sb << absl::StrCat(tie_breaker); |
| foundation_ = absl::StrCat(ComputeCrc32(sb.Release())); |
| } |
| |
| void Candidate::ComputePrflxFoundation() { |
| RTC_DCHECK(is_prflx()); |
| RTC_DCHECK(!id_.empty()); |
| foundation_ = absl::StrCat(ComputeCrc32(id_)); |
| } |
| |
| void Candidate::Assign(std::string& s, absl::string_view view) { |
| // Assigning via a temporary object, like s = std::string(view), results in |
| // binary size bloat. To avoid that, extract pointer and size from the |
| // string view, and use std::string::assign method. |
| s.assign(view.data(), view.size()); |
| } |
| |
| } // namespace webrtc |