/* * Copyright 2017 The WebRTC Project Authors. All rights reserved. * * Use of this source code is governed by a BSD-style license * that can be found in the LICENSE file in the root of the source * tree. An additional intellectual property rights grant can be found * in the file PATENTS. All contributing project authors may * be found in the AUTHORS file in the root of the source tree. */ #include "api/candidate.h" #include // IWYU pragma: keep #include #include #include #include #include #include "absl/strings/str_cat.h" #include "absl/strings/string_view.h" #include "api/rtc_error.h" #include "p2p/base/p2p_constants.h" #include "rtc_base/checks.h" #include "rtc_base/crc32.h" #include "rtc_base/crypto_random.h" #include "rtc_base/ip_address.h" #include "rtc_base/net_helper.h" #include "rtc_base/network_constants.h" #include "rtc_base/socket_address.h" #include "rtc_base/string_encode.h" #include "rtc_base/strings/string_builder.h" using webrtc::IceCandidateType; namespace webrtc { namespace { constexpr char kLineTypeAttributes = 'a'; constexpr char kAttributeCandidate[] = "candidate"; constexpr char kAttributeCandidateTyp[] = "typ"; constexpr char kAttributeCandidateRaddr[] = "raddr"; constexpr char kAttributeCandidateRport[] = "rport"; constexpr char kAttributeCandidateUfrag[] = "ufrag"; constexpr char kAttributeCandidateGeneration[] = "generation"; constexpr char kAttributeCandidateNetworkId[] = "network-id"; constexpr char kAttributeCandidateNetworkCost[] = "network-cost"; constexpr char kAttributeCandidatePwd[] = "pwd"; constexpr absl::string_view kSdpDelimiterColon = ":"; constexpr char kSdpDelimiterColonChar = kSdpDelimiterColon[0]; constexpr char kSdpDelimiterSpaceChar = ' '; constexpr char kSdpDelimiterEqualChar = '='; constexpr char kNewLineChar = '\n'; constexpr char kReturnChar = '\r'; constexpr char kCandidateHost[] = "host"; constexpr char kCandidateSrflx[] = "srflx"; constexpr char kCandidatePrflx[] = "prflx"; constexpr char kCandidateRelay[] = "relay"; // Backwards compatibility. constexpr char kTcpCandidateType[] = "tcptype"; absl::string_view TrimReturnChar(absl::string_view line) { if (!line.empty() && line.back() == kReturnChar) { line.remove_suffix(1); } return line; } bool IsValidPort(int port) { return port >= 0 && port <= 65535; } // Returns the `candidate-attribute` as described in: // https://www.rfc-editor.org/rfc/rfc5245#section-15.1 std::string BuildCandidate(const Candidate& candidate, bool include_ufrag) { StringBuilder os; os << kAttributeCandidate; absl::string_view type = candidate.type_name(); os << kSdpDelimiterColon << candidate.foundation() << " " << candidate.component() << " " << candidate.protocol() << " " << candidate.priority() << " " << (candidate.address().ipaddr().IsNil() ? candidate.address().hostname() : candidate.address().ipaddr().ToString()) << " " << candidate.address().PortAsString() << " " << kAttributeCandidateTyp << " " << type << " "; // Related address if (!candidate.related_address().IsNil()) { os << kAttributeCandidateRaddr << " " << candidate.related_address().ipaddr().ToString() << " " << kAttributeCandidateRport << " " << candidate.related_address().PortAsString() << " "; } // Note that we allow the tcptype to be missing, for backwards // compatibility; the implementation treats this as a passive candidate. // TODO(bugs.webrtc.org/11466): Treat a missing tcptype as an error? if (candidate.protocol() == TCP_PROTOCOL_NAME && !candidate.tcptype().empty()) { os << kTcpCandidateType << " " << candidate.tcptype() << " "; } // Extensions os << kAttributeCandidateGeneration << " " << candidate.generation(); if (include_ufrag && !candidate.username().empty()) { os << " " << kAttributeCandidateUfrag << " " << candidate.username(); } if (candidate.network_id() > 0) { os << " " << kAttributeCandidateNetworkId << " " << candidate.network_id(); } if (candidate.network_cost() > 0) { os << " " << kAttributeCandidateNetworkCost << " " << candidate.network_cost(); } return os.str(); } // From WebRTC draft section 4.8.1.1 candidate-attribute should be // candidate: when trickled. RTCErrorOr ParseCandidate(absl::string_view message) { // Makes sure `message` contains only one line. absl::string_view first_line; size_t line_end = message.find(kNewLineChar); if (line_end == absl::string_view::npos) { first_line = message; } else if (line_end + 1 == message.size()) { first_line = message.substr(0, line_end); } else { return RTCError::InvalidParameter() << "Expect one line only"; } // For backwards compatibility, don't fail if the supplied string is in the // form of "a=candidate...". If we encounter that, ignore the first 2 // characters and continue. if (first_line.length() > 2 && first_line[0] == kLineTypeAttributes && first_line[1] == kSdpDelimiterEqualChar) { first_line = first_line.substr(2); } // Trim return char, if any. first_line = TrimReturnChar(first_line); std::string attribute_candidate; std::string candidate_value; // `first_line` must be in the form of "candidate:". if (!tokenize_first(first_line, kSdpDelimiterColonChar, &attribute_candidate, &candidate_value) || attribute_candidate != kAttributeCandidate) { return RTCError::InvalidParameter() << "Expected " << kAttributeCandidate << " got " << attribute_candidate; } std::vector fields = split(candidate_value, kSdpDelimiterSpaceChar); // RFC 5245 // a=candidate: // typ // [raddr ] [rport ] // *(SP extension-att-name SP extension-att-value) const size_t expected_min_fields = 8; if (fields.size() < expected_min_fields || (fields[6] != kAttributeCandidateTyp)) { return RTCError::InvalidParameter() << "Expect at least " << expected_min_fields << " fields."; } const absl::string_view foundation = fields[0]; int component_id = 0; if (!FromString(fields[1], &component_id)) { return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid component id"); } const absl::string_view transport = fields[2]; uint32_t priority = 0; if (!FromString(fields[3], &priority)) { return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid priority"); } int port = 0; if (!FromString(fields[5], &port) || !IsValidPort(port)) { return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid port"); } const absl::string_view connection_address = fields[4]; SocketAddress address(connection_address, port); std::optional protocol = StringToProto(transport); if (!protocol) { return RTCError::InvalidParameter() << "Unsupported transport type"; } bool tcp_protocol = false; switch (*protocol) { // Supported protocols. case PROTO_UDP: break; case PROTO_TCP: case PROTO_SSLTCP: tcp_protocol = true; break; default: return RTCError::InvalidParameter() << "Unsupported protocol"; } IceCandidateType candidate_type; const absl::string_view type = fields[7]; if (type == kCandidateHost) { candidate_type = IceCandidateType::kHost; } else if (type == kCandidateSrflx) { candidate_type = IceCandidateType::kSrflx; } else if (type == kCandidateRelay) { candidate_type = IceCandidateType::kRelay; } else if (type == kCandidatePrflx) { candidate_type = IceCandidateType::kPrflx; } else { return RTCError::InvalidParameter() << "Unsupported candidate type"; } size_t current_position = expected_min_fields; SocketAddress related_address; // The 2 optional fields for related address // [raddr ] [rport ] if (fields.size() >= (current_position + 2) && fields[current_position] == kAttributeCandidateRaddr) { related_address.SetIP(fields[++current_position]); ++current_position; } if (fields.size() >= (current_position + 2) && fields[current_position] == kAttributeCandidateRport) { int related_port = 0; if (!FromString(fields[++current_position], &related_port) || !IsValidPort(related_port)) { return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid port"); } related_address.SetPort(related_port); ++current_position; } // If this is a TCP candidate, it has additional extension as defined in // RFC 6544. absl::string_view tcptype; if (fields.size() >= (current_position + 2) && fields[current_position] == kTcpCandidateType) { tcptype = fields[++current_position]; ++current_position; if (tcptype != TCPTYPE_ACTIVE_STR && tcptype != TCPTYPE_PASSIVE_STR && tcptype != TCPTYPE_SIMOPEN_STR) { return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid TCP candidate type"); } if (!tcp_protocol) { return RTCError(RTCErrorType::SYNTAX_ERROR, "Invalid non-TCP candidate"); } } else if (tcp_protocol) { // We allow the tcptype to be missing, for backwards compatibility, // treating it as a passive candidate. // TODO(bugs.webrtc.org/11466): Treat a missing tcptype as an error? tcptype = TCPTYPE_PASSIVE_STR; } // Extension // Though non-standard, we support the ICE ufrag and pwd being signaled on // the candidate to avoid issues with confusing which generation a candidate // belongs to when trickling multiple generations at the same time. absl::string_view username; absl::string_view password; uint32_t generation = 0; uint16_t network_id = 0; uint16_t network_cost = 0; for (size_t i = current_position; i + 1 < fields.size(); ++i) { // RFC 5245 // *(SP extension-att-name SP extension-att-value) if (fields[i] == kAttributeCandidateGeneration) { if (!FromString(fields[++i], &generation)) { return RTCError( RTCErrorType::SYNTAX_ERROR, absl::StrCat("Invalid ", kAttributeCandidateGeneration)); } } else if (fields[i] == kAttributeCandidateUfrag) { username = fields[++i]; } else if (fields[i] == kAttributeCandidatePwd) { password = fields[++i]; } else if (fields[i] == kAttributeCandidateNetworkId) { if (!FromString(fields[++i], &network_id)) { return RTCError(RTCErrorType::SYNTAX_ERROR, absl::StrCat("Invalid ", kAttributeCandidateNetworkId)); } } else if (fields[i] == kAttributeCandidateNetworkCost) { if (!FromString(fields[++i], &network_cost)) { return RTCError( RTCErrorType::SYNTAX_ERROR, absl::StrCat("Invalid ", kAttributeCandidateNetworkCost)); } network_cost = std::min(network_cost, kNetworkCostMax); } else { // Skip the unknown extension. ++i; } } Candidate candidate(component_id, ProtoToString(*protocol), address, priority, username, password, candidate_type, generation, foundation, network_id, network_cost); candidate.set_related_address(related_address); candidate.set_tcptype(tcptype); return candidate; } } // namespace absl::string_view IceCandidateTypeToString(IceCandidateType type) { switch (type) { case IceCandidateType::kHost: return kCandidateHost; case IceCandidateType::kSrflx: return kCandidateSrflx; case IceCandidateType::kPrflx: return kCandidatePrflx; case IceCandidateType::kRelay: return kCandidateRelay; } } std::optional StringToIceCandidateType( absl::string_view type) { if (type == kCandidateHost) { return IceCandidateType::kHost; } else if (type == kCandidateSrflx) { return IceCandidateType::kSrflx; } else if (type == kCandidatePrflx) { return IceCandidateType::kPrflx; } else if (type == kCandidateRelay) { return IceCandidateType::kRelay; } return std::nullopt; } // static RTCErrorOr Candidate::ParseCandidateString( absl::string_view message) { return ParseCandidate(message); } Candidate::Candidate() : id_(CreateRandomString(8)), component_(ICE_CANDIDATE_COMPONENT_DEFAULT), priority_(0), network_type_(ADAPTER_TYPE_UNKNOWN), underlying_type_for_vpn_(ADAPTER_TYPE_UNKNOWN), generation_(0), network_id_(0), network_cost_(0) {} Candidate::Candidate(int component, absl::string_view protocol, const SocketAddress& address, uint32_t priority, absl::string_view username, absl::string_view password, IceCandidateType type, uint32_t generation, absl::string_view foundation, uint16_t network_id /*= 0*/, uint16_t network_cost /*= 0*/) : id_(CreateRandomString(8)), component_(component), protocol_(protocol), address_(address), priority_(priority), username_(username), password_(password), type_(type), network_type_(ADAPTER_TYPE_UNKNOWN), underlying_type_for_vpn_(ADAPTER_TYPE_UNKNOWN), generation_(generation), foundation_(foundation), network_id_(network_id), network_cost_(network_cost) {} Candidate::Candidate(const Candidate&) = default; Candidate::~Candidate() = default; void Candidate::generate_id() { id_ = CreateRandomString(8); } bool Candidate::is_local() const { return type_ == IceCandidateType::kHost; } bool Candidate::is_stun() const { return type_ == IceCandidateType::kSrflx; } bool Candidate::is_prflx() const { return type_ == IceCandidateType::kPrflx; } bool Candidate::is_relay() const { return type_ == IceCandidateType::kRelay; } absl::string_view Candidate::type_name() const { return IceCandidateTypeToString(type_); } bool Candidate::IsEquivalent(const Candidate& c) const { // We ignore the network name, since that is just debug information, and // the priority and the network cost, since they should be the same if the // rest are. return (component_ == c.component_) && (protocol_ == c.protocol_) && (address_ == c.address_) && (username_ == c.username_) && (password_ == c.password_) && (type_ == c.type_) && (generation_ == c.generation_) && (foundation_ == c.foundation_) && (related_address_ == c.related_address_) && (network_id_ == c.network_id_); } bool Candidate::MatchesForRemoval(const Candidate& c) const { return component_ == c.component_ && protocol_ == c.protocol_ && address_ == c.address_; } std::string Candidate::ToStringInternal(bool sensitive) const { StringBuilder ost; std::string address = sensitive ? address_.ToSensitiveString() : address_.ToString(); std::string related_address = sensitive ? related_address_.ToSensitiveString() : related_address_.ToString(); ost << "Cand[:" << foundation_ << ":" << component_ << ":" << protocol_ << ":" << priority_ << ":" << address << ":" << type_name() << ":" << related_address << ":" << username_ << ":" << password_ << ":" << network_id_ << ":" << network_cost_ << ":" << generation_ << "]"; return ost.Release(); } std::string Candidate::ToCandidateAttribute(bool include_ufrag) const { return BuildCandidate(*this, include_ufrag); } uint32_t Candidate::GetPriority(uint32_t type_preference, int network_adapter_preference, int relay_preference, bool adjust_local_preference) const { // RFC 5245 - 4.1.2.1. // priority = (2^24)*(type preference) + // (2^8)*(local preference) + // (2^0)*(256 - component ID) // `local_preference` length is 2 bytes, 0-65535 inclusive. // In our implemenation we will partion local_preference into // 0 1 // 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ // | NIC Pref | Addr Pref | // +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ // NIC Type - Type of the network adapter e.g. 3G/Wifi/Wired. // Addr Pref - Address preference value as per RFC 3484. // local preference = (NIC Type << 8 | Addr_Pref) + relay preference. // The relay preference is based on the number of TURN servers, the // first TURN server gets the highest preference. int addr_pref = IPAddressPrecedence(address_.ipaddr()); int local_preference = ((network_adapter_preference << 8) | addr_pref) + relay_preference; // Ensure that the added relay preference will not result in a relay candidate // whose STUN priority attribute has a higher priority than a server-reflexive // candidate. // The STUN priority attribute is calculated as // (peer-reflexive type preference) << 24 | (priority & 0x00FFFFFF) // as described in // https://www.rfc-editor.org/rfc/rfc5245#section-7.1.2.1 // To satisfy that condition, add kMaxTurnServers to the local preference. // This can not overflow the field width since the highest "NIC pref" // assigned is kHighestNetworkPreference = 127 RTC_DCHECK_LT(local_preference + kMaxTurnServers, 0x10000); if (adjust_local_preference && relay_protocol_.empty()) { local_preference += kMaxTurnServers; } return (type_preference << 24) | (local_preference << 8) | (256 - component_); } bool Candidate::operator==(const Candidate& o) const { return id_ == o.id_ && component_ == o.component_ && protocol_ == o.protocol_ && relay_protocol_ == o.relay_protocol_ && address_ == o.address_ && priority_ == o.priority_ && username_ == o.username_ && password_ == o.password_ && type_ == o.type_ && network_name_ == o.network_name_ && network_type_ == o.network_type_ && generation_ == o.generation_ && foundation_ == o.foundation_ && related_address_ == o.related_address_ && tcptype_ == o.tcptype_ && network_id_ == o.network_id_; } bool Candidate::operator!=(const Candidate& o) const { return !(*this == o); } Candidate Candidate::ToSanitizedCopy(bool use_hostname_address, bool filter_related_address) const { return ToSanitizedCopy(use_hostname_address, filter_related_address, false); } Candidate Candidate::ToSanitizedCopy(bool use_hostname_address, bool filter_related_address, bool filter_ufrag) const { Candidate copy(*this); if (use_hostname_address) { IPAddress ip; if (address().hostname().empty()) { // IP needs to be redacted, but no hostname available. SocketAddress redacted_addr("redacted-ip.invalid", address().port()); copy.set_address(redacted_addr); } else if (IPFromString(address().hostname(), &ip)) { // The hostname is an IP literal, and needs to be redacted too. SocketAddress redacted_addr("redacted-literal.invalid", address().port()); copy.set_address(redacted_addr); } else { SocketAddress hostname_only_addr(address().hostname(), address().port()); copy.set_address(hostname_only_addr); } } if (filter_related_address) { copy.set_related_address( EmptySocketAddressWithFamily(copy.address().family())); } if (filter_ufrag) { copy.set_username(""); } return copy; } void Candidate::ComputeFoundation(const SocketAddress& base_address, uint64_t tie_breaker) { // https://www.rfc-editor.org/rfc/rfc5245#section-4.1.1.3 // The foundation is an identifier, scoped within a session. Two candidates // MUST have the same foundation ID when all of the following are true: // // o they are of the same type. // o their bases have the same IP address (the ports can be different). // o for reflexive and relayed candidates, the STUN or TURN servers used to // obtain them have the same IP address. // o they were obtained using the same transport protocol (TCP, UDP, etc.). // // Similarly, two candidates MUST have different foundations if their // types are different, their bases have different IP addresses, the STUN or // TURN servers used to obtain them have different IP addresses, or their // transport protocols are different. StringBuilder sb; sb << type_name() << base_address.ipaddr().ToString() << protocol_ << relay_protocol_; // https://www.rfc-editor.org/rfc/rfc5245#section-5.2 // [...] it is possible for both agents to mistakenly believe they are // controlled or controlling. To resolve this, each agent MUST select a random // number, called the tie-breaker, uniformly distributed between 0 and (2**64) // - 1 (that is, a 64-bit positive integer). This number is used in // connectivity checks to detect and repair this case [...] sb << absl::StrCat(tie_breaker); foundation_ = absl::StrCat(ComputeCrc32(sb.Release())); } void Candidate::ComputePrflxFoundation() { RTC_DCHECK(is_prflx()); RTC_DCHECK(!id_.empty()); foundation_ = absl::StrCat(ComputeCrc32(id_)); } void Candidate::Assign(std::string& s, absl::string_view view) { // Assigning via a temporary object, like s = std::string(view), results in // binary size bloat. To avoid that, extract pointer and size from the // string view, and use std::string::assign method. s.assign(view.data(), view.size()); } } // namespace webrtc