blob: 7be1d9ea93955e879aaa44d8ca83acbb4395df9b [file] [log] [blame]
/*
* Copyright 2017 The WebRTC Project Authors. All rights reserved.
*
* Use of this source code is governed by a BSD-style license
* that can be found in the LICENSE file in the root of the source
* tree. An additional intellectual property rights grant can be found
* in the file PATENTS. All contributing project authors may
* be found in the AUTHORS file in the root of the source tree.
*/
#include "api/candidate.h"
#include <algorithm> // IWYU pragma: keep
#include <cstddef>
#include <cstdint>
#include <optional>
#include <string>
#include <vector>
#include "absl/strings/str_cat.h"
#include "absl/strings/string_view.h"
#include "api/rtc_error.h"
#include "p2p/base/p2p_constants.h"
#include "rtc_base/checks.h"
#include "rtc_base/crc32.h"
#include "rtc_base/crypto_random.h"
#include "rtc_base/ip_address.h"
#include "rtc_base/net_helper.h"
#include "rtc_base/network_constants.h"
#include "rtc_base/socket_address.h"
#include "rtc_base/string_encode.h"
#include "rtc_base/strings/string_builder.h"
using webrtc::IceCandidateType;
namespace webrtc {
namespace {
constexpr char kLineTypeAttributes = 'a';
constexpr char kAttributeCandidate[] = "candidate";
constexpr char kAttributeCandidateTyp[] = "typ";
constexpr char kAttributeCandidateRaddr[] = "raddr";
constexpr char kAttributeCandidateRport[] = "rport";
constexpr char kAttributeCandidateUfrag[] = "ufrag";
constexpr char kAttributeCandidateGeneration[] = "generation";
constexpr char kAttributeCandidateNetworkId[] = "network-id";
constexpr char kAttributeCandidateNetworkCost[] = "network-cost";
constexpr char kAttributeCandidatePwd[] = "pwd";
constexpr absl::string_view kSdpDelimiterColon = ":";
constexpr char kSdpDelimiterColonChar = kSdpDelimiterColon[0];
constexpr char kSdpDelimiterSpaceChar = ' ';
constexpr char kSdpDelimiterEqualChar = '=';
constexpr char kNewLineChar = '\n';
constexpr char kReturnChar = '\r';
constexpr char kCandidateHost[] = "host";
constexpr char kCandidateSrflx[] = "srflx";
constexpr char kCandidatePrflx[] = "prflx";
constexpr char kCandidateRelay[] = "relay";
// Backwards compatibility.
constexpr char kTcpCandidateType[] = "tcptype";
absl::string_view TrimReturnChar(absl::string_view line) {
if (!line.empty() && line.back() == kReturnChar) {
line.remove_suffix(1);
}
return line;
}
bool IsValidPort(int port) {
return port >= 0 && port <= 65535;
}
// Returns the `candidate-attribute` as described in:
// https://www.rfc-editor.org/rfc/rfc5245#section-15.1
std::string BuildCandidate(const Candidate& candidate, bool include_ufrag) {
StringBuilder os;
os << kAttributeCandidate;
absl::string_view type = candidate.type_name();
os << kSdpDelimiterColon << candidate.foundation() << " "
<< candidate.component() << " " << candidate.protocol() << " "
<< candidate.priority() << " "
<< (candidate.address().ipaddr().IsNil()
? candidate.address().hostname()
: candidate.address().ipaddr().ToString())
<< " " << candidate.address().PortAsString() << " "
<< kAttributeCandidateTyp << " " << type << " ";
// Related address
if (!candidate.related_address().IsNil()) {
os << kAttributeCandidateRaddr << " "
<< candidate.related_address().ipaddr().ToString() << " "
<< kAttributeCandidateRport << " "
<< candidate.related_address().PortAsString() << " ";
}
// Note that we allow the tcptype to be missing, for backwards
// compatibility; the implementation treats this as a passive candidate.
// TODO(bugs.webrtc.org/11466): Treat a missing tcptype as an error?
if (candidate.protocol() == TCP_PROTOCOL_NAME &&
!candidate.tcptype().empty()) {
os << kTcpCandidateType << " " << candidate.tcptype() << " ";
}
// Extensions
os << kAttributeCandidateGeneration << " " << candidate.generation();
if (include_ufrag && !candidate.username().empty()) {
os << " " << kAttributeCandidateUfrag << " " << candidate.username();
}
if (candidate.network_id() > 0) {
os << " " << kAttributeCandidateNetworkId << " " << candidate.network_id();
}
if (candidate.network_cost() > 0) {
os << " " << kAttributeCandidateNetworkCost << " "
<< candidate.network_cost();
}
return os.str();
}
// From WebRTC draft section 4.8.1.1 candidate-attribute should be
// candidate:<candidate> when trickled.
RTCErrorOr<Candidate> ParseCandidate(absl::string_view message) {
// Makes sure `message` contains only one line.
absl::string_view first_line;
size_t line_end = message.find(kNewLineChar);
if (line_end == absl::string_view::npos) {
first_line = message;
} else if (line_end + 1 == message.size()) {
first_line = message.substr(0, line_end);
} else {
return RTCError(RTCErrorType::INVALID_PARAMETER, "Expect one line only");
}
// For backwards compatibility, don't fail if the supplied string is in the
// form of "a=candidate...". If we encounter that, ignore the first 2
// characters and continue.
if (first_line.length() > 2 && first_line[0] == kLineTypeAttributes &&
first_line[1] == kSdpDelimiterEqualChar) {
first_line = first_line.substr(2);
}
// Trim return char, if any.
first_line = TrimReturnChar(first_line);
std::string attribute_candidate;
std::string candidate_value;
// `first_line` must be in the form of "candidate:<value>".
if (!tokenize_first(first_line, kSdpDelimiterColonChar, &attribute_candidate,
&candidate_value) ||
attribute_candidate != kAttributeCandidate) {
return RTCError(RTCErrorType::INVALID_PARAMETER,
absl::StrCat("Expected ", kAttributeCandidate, " got ",
attribute_candidate));
}
std::vector<absl::string_view> fields =
split(candidate_value, kSdpDelimiterSpaceChar);
// RFC 5245
// a=candidate:<foundation> <component-id> <transport> <priority>
// <connection-address> <port> typ <candidate-types>
// [raddr <connection-address>] [rport <port>]
// *(SP extension-att-name SP extension-att-value)
const size_t expected_min_fields = 8;
if (fields.size() < expected_min_fields ||
(fields[6] != kAttributeCandidateTyp)) {
return RTCError(
RTCErrorType::INVALID_PARAMETER,
absl::StrCat("Expect at least ", expected_min_fields, " fields."));
}
const absl::string_view foundation = fields[0];
int component_id = 0;
if (!FromString(fields[1], &component_id)) {
return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid component id");
}
const absl::string_view transport = fields[2];
uint32_t priority = 0;
if (!FromString(fields[3], &priority)) {
return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid priority");
}
int port = 0;
if (!FromString(fields[5], &port) || !IsValidPort(port)) {
return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid port");
}
const absl::string_view connection_address = fields[4];
SocketAddress address(connection_address, port);
std::optional<ProtocolType> protocol = StringToProto(transport);
if (!protocol) {
return RTCError(RTCErrorType::INVALID_PARAMETER,
"Unsupported transport type");
}
bool tcp_protocol = false;
switch (*protocol) {
// Supported protocols.
case PROTO_UDP:
break;
case PROTO_TCP:
case PROTO_SSLTCP:
tcp_protocol = true;
break;
default:
return RTCError(RTCErrorType::INVALID_PARAMETER, "Unsupported protocol");
}
IceCandidateType candidate_type;
const absl::string_view type = fields[7];
if (type == kCandidateHost) {
candidate_type = IceCandidateType::kHost;
} else if (type == kCandidateSrflx) {
candidate_type = IceCandidateType::kSrflx;
} else if (type == kCandidateRelay) {
candidate_type = IceCandidateType::kRelay;
} else if (type == kCandidatePrflx) {
candidate_type = IceCandidateType::kPrflx;
} else {
return RTCError(RTCErrorType::INVALID_PARAMETER,
"Unsupported candidate type");
}
size_t current_position = expected_min_fields;
SocketAddress related_address;
// The 2 optional fields for related address
// [raddr <connection-address>] [rport <port>]
if (fields.size() >= (current_position + 2) &&
fields[current_position] == kAttributeCandidateRaddr) {
related_address.SetIP(fields[++current_position]);
++current_position;
}
if (fields.size() >= (current_position + 2) &&
fields[current_position] == kAttributeCandidateRport) {
int related_port = 0;
if (!FromString(fields[++current_position], &related_port) ||
!IsValidPort(related_port)) {
return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid port");
}
related_address.SetPort(related_port);
++current_position;
}
// If this is a TCP candidate, it has additional extension as defined in
// RFC 6544.
absl::string_view tcptype;
if (fields.size() >= (current_position + 2) &&
fields[current_position] == kTcpCandidateType) {
tcptype = fields[++current_position];
++current_position;
if (tcptype != TCPTYPE_ACTIVE_STR && tcptype != TCPTYPE_PASSIVE_STR &&
tcptype != TCPTYPE_SIMOPEN_STR) {
return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid TCP candidate type");
}
if (!tcp_protocol) {
return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid non-TCP candidate");
}
} else if (tcp_protocol) {
// We allow the tcptype to be missing, for backwards compatibility,
// treating it as a passive candidate.
// TODO(bugs.webrtc.org/11466): Treat a missing tcptype as an error?
tcptype = TCPTYPE_PASSIVE_STR;
}
// Extension
// Though non-standard, we support the ICE ufrag and pwd being signaled on
// the candidate to avoid issues with confusing which generation a candidate
// belongs to when trickling multiple generations at the same time.
absl::string_view username;
absl::string_view password;
uint32_t generation = 0;
uint16_t network_id = 0;
uint16_t network_cost = 0;
for (size_t i = current_position; i + 1 < fields.size(); ++i) {
// RFC 5245
// *(SP extension-att-name SP extension-att-value)
if (fields[i] == kAttributeCandidateGeneration) {
if (!FromString(fields[++i], &generation)) {
return RTCError(
RTCErrorType::SYNTAX_ERROR,
absl::StrCat("Invalid ", kAttributeCandidateGeneration));
}
} else if (fields[i] == kAttributeCandidateUfrag) {
username = fields[++i];
} else if (fields[i] == kAttributeCandidatePwd) {
password = fields[++i];
} else if (fields[i] == kAttributeCandidateNetworkId) {
if (!FromString(fields[++i], &network_id)) {
return RTCError(RTCErrorType::SYNTAX_ERROR,
absl::StrCat("Invalid ", kAttributeCandidateNetworkId));
}
} else if (fields[i] == kAttributeCandidateNetworkCost) {
if (!FromString(fields[++i], &network_cost)) {
return RTCError(
RTCErrorType::SYNTAX_ERROR,
absl::StrCat("Invalid ", kAttributeCandidateNetworkCost));
}
network_cost = std::min(network_cost, kNetworkCostMax);
} else {
// Skip the unknown extension.
++i;
}
}
Candidate candidate(component_id, ProtoToString(*protocol), address, priority,
username, password, candidate_type, generation,
foundation, network_id, network_cost);
candidate.set_related_address(related_address);
candidate.set_tcptype(tcptype);
return candidate;
}
} // namespace
absl::string_view IceCandidateTypeToString(IceCandidateType type) {
switch (type) {
case IceCandidateType::kHost:
return kCandidateHost;
case IceCandidateType::kSrflx:
return kCandidateSrflx;
case IceCandidateType::kPrflx:
return kCandidatePrflx;
case IceCandidateType::kRelay:
return kCandidateRelay;
}
}
std::optional<IceCandidateType> StringToIceCandidateType(
absl::string_view type) {
if (type == kCandidateHost) {
return IceCandidateType::kHost;
} else if (type == kCandidateSrflx) {
return IceCandidateType::kSrflx;
} else if (type == kCandidatePrflx) {
return IceCandidateType::kPrflx;
} else if (type == kCandidateRelay) {
return IceCandidateType::kRelay;
}
return std::nullopt;
}
// static
RTCErrorOr<Candidate> Candidate::ParseCandidateString(
absl::string_view message) {
return ParseCandidate(message);
}
Candidate::Candidate()
: id_(CreateRandomString(8)),
component_(ICE_CANDIDATE_COMPONENT_DEFAULT),
priority_(0),
network_type_(ADAPTER_TYPE_UNKNOWN),
underlying_type_for_vpn_(ADAPTER_TYPE_UNKNOWN),
generation_(0),
network_id_(0),
network_cost_(0) {}
Candidate::Candidate(int component,
absl::string_view protocol,
const SocketAddress& address,
uint32_t priority,
absl::string_view username,
absl::string_view password,
IceCandidateType type,
uint32_t generation,
absl::string_view foundation,
uint16_t network_id /*= 0*/,
uint16_t network_cost /*= 0*/)
: id_(CreateRandomString(8)),
component_(component),
protocol_(protocol),
address_(address),
priority_(priority),
username_(username),
password_(password),
type_(type),
network_type_(ADAPTER_TYPE_UNKNOWN),
underlying_type_for_vpn_(ADAPTER_TYPE_UNKNOWN),
generation_(generation),
foundation_(foundation),
network_id_(network_id),
network_cost_(network_cost) {}
Candidate::Candidate(const Candidate&) = default;
Candidate::~Candidate() = default;
void Candidate::generate_id() {
id_ = CreateRandomString(8);
}
bool Candidate::is_local() const {
return type_ == IceCandidateType::kHost;
}
bool Candidate::is_stun() const {
return type_ == IceCandidateType::kSrflx;
}
bool Candidate::is_prflx() const {
return type_ == IceCandidateType::kPrflx;
}
bool Candidate::is_relay() const {
return type_ == IceCandidateType::kRelay;
}
absl::string_view Candidate::type_name() const {
return IceCandidateTypeToString(type_);
}
bool Candidate::IsEquivalent(const Candidate& c) const {
// We ignore the network name, since that is just debug information, and
// the priority and the network cost, since they should be the same if the
// rest are.
return (component_ == c.component_) && (protocol_ == c.protocol_) &&
(address_ == c.address_) && (username_ == c.username_) &&
(password_ == c.password_) && (type_ == c.type_) &&
(generation_ == c.generation_) && (foundation_ == c.foundation_) &&
(related_address_ == c.related_address_) &&
(network_id_ == c.network_id_);
}
bool Candidate::MatchesForRemoval(const Candidate& c) const {
return component_ == c.component_ && protocol_ == c.protocol_ &&
address_ == c.address_;
}
std::string Candidate::ToStringInternal(bool sensitive) const {
StringBuilder ost;
std::string address =
sensitive ? address_.ToSensitiveString() : address_.ToString();
std::string related_address = sensitive ? related_address_.ToSensitiveString()
: related_address_.ToString();
ost << "Cand[:" << foundation_ << ":" << component_ << ":" << protocol_ << ":"
<< priority_ << ":" << address << ":" << type_name() << ":"
<< related_address << ":" << username_ << ":" << password_ << ":"
<< network_id_ << ":" << network_cost_ << ":" << generation_ << "]";
return ost.Release();
}
std::string Candidate::ToCandidateAttribute(bool include_ufrag) const {
return BuildCandidate(*this, include_ufrag);
}
uint32_t Candidate::GetPriority(uint32_t type_preference,
int network_adapter_preference,
int relay_preference,
bool adjust_local_preference) const {
// RFC 5245 - 4.1.2.1.
// priority = (2^24)*(type preference) +
// (2^8)*(local preference) +
// (2^0)*(256 - component ID)
// `local_preference` length is 2 bytes, 0-65535 inclusive.
// In our implemenation we will partion local_preference into
// 0 1
// 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5
// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
// | NIC Pref | Addr Pref |
// +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
// NIC Type - Type of the network adapter e.g. 3G/Wifi/Wired.
// Addr Pref - Address preference value as per RFC 3484.
// local preference = (NIC Type << 8 | Addr_Pref) + relay preference.
// The relay preference is based on the number of TURN servers, the
// first TURN server gets the highest preference.
int addr_pref = IPAddressPrecedence(address_.ipaddr());
int local_preference =
((network_adapter_preference << 8) | addr_pref) + relay_preference;
// Ensure that the added relay preference will not result in a relay candidate
// whose STUN priority attribute has a higher priority than a server-reflexive
// candidate.
// The STUN priority attribute is calculated as
// (peer-reflexive type preference) << 24 | (priority & 0x00FFFFFF)
// as described in
// https://www.rfc-editor.org/rfc/rfc5245#section-7.1.2.1
// To satisfy that condition, add kMaxTurnServers to the local preference.
// This can not overflow the field width since the highest "NIC pref"
// assigned is kHighestNetworkPreference = 127
RTC_DCHECK_LT(local_preference + kMaxTurnServers, 0x10000);
if (adjust_local_preference && relay_protocol_.empty()) {
local_preference += kMaxTurnServers;
}
return (type_preference << 24) | (local_preference << 8) | (256 - component_);
}
bool Candidate::operator==(const Candidate& o) const {
return id_ == o.id_ && component_ == o.component_ &&
protocol_ == o.protocol_ && relay_protocol_ == o.relay_protocol_ &&
address_ == o.address_ && priority_ == o.priority_ &&
username_ == o.username_ && password_ == o.password_ &&
type_ == o.type_ && network_name_ == o.network_name_ &&
network_type_ == o.network_type_ && generation_ == o.generation_ &&
foundation_ == o.foundation_ &&
related_address_ == o.related_address_ && tcptype_ == o.tcptype_ &&
network_id_ == o.network_id_;
}
bool Candidate::operator!=(const Candidate& o) const {
return !(*this == o);
}
Candidate Candidate::ToSanitizedCopy(bool use_hostname_address,
bool filter_related_address) const {
return ToSanitizedCopy(use_hostname_address, filter_related_address, false);
}
Candidate Candidate::ToSanitizedCopy(bool use_hostname_address,
bool filter_related_address,
bool filter_ufrag) const {
Candidate copy(*this);
if (use_hostname_address) {
IPAddress ip;
if (address().hostname().empty()) {
// IP needs to be redacted, but no hostname available.
SocketAddress redacted_addr("redacted-ip.invalid", address().port());
copy.set_address(redacted_addr);
} else if (IPFromString(address().hostname(), &ip)) {
// The hostname is an IP literal, and needs to be redacted too.
SocketAddress redacted_addr("redacted-literal.invalid", address().port());
copy.set_address(redacted_addr);
} else {
SocketAddress hostname_only_addr(address().hostname(), address().port());
copy.set_address(hostname_only_addr);
}
}
if (filter_related_address) {
copy.set_related_address(
EmptySocketAddressWithFamily(copy.address().family()));
}
if (filter_ufrag) {
copy.set_username("");
}
return copy;
}
void Candidate::ComputeFoundation(const SocketAddress& base_address,
uint64_t tie_breaker) {
// https://www.rfc-editor.org/rfc/rfc5245#section-4.1.1.3
// The foundation is an identifier, scoped within a session. Two candidates
// MUST have the same foundation ID when all of the following are true:
//
// o they are of the same type.
// o their bases have the same IP address (the ports can be different).
// o for reflexive and relayed candidates, the STUN or TURN servers used to
// obtain them have the same IP address.
// o they were obtained using the same transport protocol (TCP, UDP, etc.).
//
// Similarly, two candidates MUST have different foundations if their
// types are different, their bases have different IP addresses, the STUN or
// TURN servers used to obtain them have different IP addresses, or their
// transport protocols are different.
StringBuilder sb;
sb << type_name() << base_address.ipaddr().ToString() << protocol_
<< relay_protocol_;
// https://www.rfc-editor.org/rfc/rfc5245#section-5.2
// [...] it is possible for both agents to mistakenly believe they are
// controlled or controlling. To resolve this, each agent MUST select a random
// number, called the tie-breaker, uniformly distributed between 0 and (2**64)
// - 1 (that is, a 64-bit positive integer). This number is used in
// connectivity checks to detect and repair this case [...]
sb << absl::StrCat(tie_breaker);
foundation_ = absl::StrCat(ComputeCrc32(sb.Release()));
}
void Candidate::ComputePrflxFoundation() {
RTC_DCHECK(is_prflx());
RTC_DCHECK(!id_.empty());
foundation_ = absl::StrCat(ComputeCrc32(id_));
}
void Candidate::Assign(std::string& s, absl::string_view view) {
// Assigning via a temporary object, like s = std::string(view), results in
// binary size bloat. To avoid that, extract pointer and size from the
// string view, and use std::string::assign method.
s.assign(view.data(), view.size());
}
} // namespace webrtc