Allow all "token" chars from RFC 4566 when checking for legal mid names.

Previously only alphanumeric characters were allowed.

Bug: webrtc:9537
Change-Id: I3fd793ad88520b25ecd884efe3a698f2f0af4639
Reviewed-on: https://webrtc-review.googlesource.com/89388
Reviewed-by: Åsa Persson <asapersson@webrtc.org>
Reviewed-by: Steve Anton <steveanton@webrtc.org>
Reviewed-by: Fredrik Solenberg <solenberg@webrtc.org>
Reviewed-by: Harald Alvestrand <hta@webrtc.org>
Commit-Queue: Steve Anton <steveanton@webrtc.org>
Cr-Commit-Position: refs/heads/master@{#24167}
diff --git a/api/rtp_headers.h b/api/rtp_headers.h
index c0b22cc..c762534 100644
--- a/api/rtp_headers.h
+++ b/api/rtp_headers.h
@@ -39,7 +39,14 @@
   // maximum length that can be encoded with one-byte header extensions.
   static constexpr size_t kMaxSize = 16;
 
-  static bool IsLegalName(rtc::ArrayView<const char> name);
+  static bool IsLegalMidName(rtc::ArrayView<const char> name);
+  static bool IsLegalRsidName(rtc::ArrayView<const char> name);
+
+  // TODO(bugs.webrtc.org/9537): Deprecate and remove when third parties have
+  // migrated to "IsLegalRsidName".
+  static bool IsLegalName(rtc::ArrayView<const char> name) {
+    return IsLegalRsidName(name);
+  }
 
   StringRtpHeaderExtension() { value_[0] = 0; }
   explicit StringRtpHeaderExtension(rtc::ArrayView<const char> value) {
diff --git a/call/rtcp_demuxer.cc b/call/rtcp_demuxer.cc
index 40c9163..d441c05 100644
--- a/call/rtcp_demuxer.cc
+++ b/call/rtcp_demuxer.cc
@@ -35,7 +35,7 @@
 
 void RtcpDemuxer::AddSink(const std::string& rsid,
                           RtcpPacketSinkInterface* sink) {
-  RTC_DCHECK(StreamId::IsLegalName(rsid));
+  RTC_DCHECK(StreamId::IsLegalRsidName(rsid));
   RTC_DCHECK(sink);
   RTC_DCHECK(!ContainerHasKey(broadcast_sinks_, sink));
   RTC_DCHECK(!MultimapAssociationExists(rsid_sinks_, rsid, sink));
diff --git a/call/rtp_demuxer.cc b/call/rtp_demuxer.cc
index a8944b5..8f0e2e5 100644
--- a/call/rtp_demuxer.cc
+++ b/call/rtp_demuxer.cc
@@ -38,8 +38,8 @@
                          RtpPacketSinkInterface* sink) {
   RTC_DCHECK(!criteria.payload_types.empty() || !criteria.ssrcs.empty() ||
              !criteria.mid.empty() || !criteria.rsid.empty());
-  RTC_DCHECK(criteria.mid.empty() || Mid::IsLegalName(criteria.mid));
-  RTC_DCHECK(criteria.rsid.empty() || StreamId::IsLegalName(criteria.rsid));
+  RTC_DCHECK(criteria.mid.empty() || Mid::IsLegalMidName(criteria.mid));
+  RTC_DCHECK(criteria.rsid.empty() || StreamId::IsLegalRsidName(criteria.rsid));
   RTC_DCHECK(sink);
 
   // We return false instead of DCHECKing for logical conflicts with the new
diff --git a/call/rtp_demuxer_unittest.cc b/call/rtp_demuxer_unittest.cc
index 76a13ee..b5ede3c 100644
--- a/call/rtp_demuxer_unittest.cc
+++ b/call/rtp_demuxer_unittest.cc
@@ -1491,9 +1491,9 @@
   EXPECT_DEATH(AddSinkOnlyRsid("a_3", &sink), "");
 }
 
-TEST_F(RtpDemuxerTest, MidMustBeAlphaNumeric) {
+TEST_F(RtpDemuxerTest, MidMustBeToken) {
   MockRtpPacketSink sink;
-  EXPECT_DEATH(AddSinkOnlyMid("a_3", &sink), "");
+  EXPECT_DEATH(AddSinkOnlyMid("a(3)", &sink), "");
 }
 
 TEST_F(RtpDemuxerTest, RsidMustNotExceedMaximumLength) {
diff --git a/modules/rtp_rtcp/include/rtp_rtcp_defines.cc b/modules/rtp_rtcp/include/rtp_rtcp_defines.cc
index ad9bd45..f86b238 100644
--- a/modules/rtp_rtcp/include/rtp_rtcp_defines.cc
+++ b/modules/rtp_rtcp/include/rtp_rtcp_defines.cc
@@ -16,7 +16,19 @@
 
 constexpr size_t StreamId::kMaxSize;
 
-bool StreamId::IsLegalName(rtc::ArrayView<const char> name) {
+// Check if passed character is a "token-char" from RFC 4566.
+static bool IsTokenChar(char ch) {
+  return ch == 0x21 || (ch >= 0x23 && ch <= 0x27) || ch == 0x2a || ch == 0x2b ||
+         ch == 0x2d || ch == 0x2e || (ch >= 0x30 && ch <= 0x39) ||
+         (ch >= 0x41 && ch <= 0x5a) || (ch >= 0x5e && ch <= 0x7e);
+}
+
+bool StreamId::IsLegalMidName(rtc::ArrayView<const char> name) {
+  return (name.size() <= kMaxSize && name.size() > 0 &&
+          std::all_of(name.data(), name.data() + name.size(), IsTokenChar));
+}
+
+bool StreamId::IsLegalRsidName(rtc::ArrayView<const char> name) {
   return (name.size() <= kMaxSize && name.size() > 0 &&
           std::all_of(name.data(), name.data() + name.size(), isalnum));
 }
diff --git a/modules/rtp_rtcp/test/testAPI/test_api.cc b/modules/rtp_rtcp/test/testAPI/test_api.cc
index fd5067b..b11a18b 100644
--- a/modules/rtp_rtcp/test/testAPI/test_api.cc
+++ b/modules/rtp_rtcp/test/testAPI/test_api.cc
@@ -12,6 +12,7 @@
 
 #include <algorithm>
 #include <memory>
+#include <string>
 #include <vector>
 
 #include "rtc_base/checks.h"
@@ -160,4 +161,54 @@
   EXPECT_EQ(kRtxRetransmitted, module_->RtxSendStatus());
 }
 
+TEST_F(RtpRtcpAPITest, LegalMidName) {
+  static const std::string kLegalMidNames[] = {
+      // clang-format off
+      "audio",
+      "audio0",
+      "audio_0",
+      // clang-format on
+  };
+  for (const auto& name : kLegalMidNames) {
+    EXPECT_TRUE(StreamId::IsLegalMidName(name))
+        << "Mid should be legal: " << name;
+  }
+
+  static const std::string kNonLegalMidNames[] = {
+      // clang-format off
+      "",
+      "(audio0)",
+      // clang-format on
+  };
+  for (const auto& name : kNonLegalMidNames) {
+    EXPECT_FALSE(StreamId::IsLegalMidName(name))
+        << "Mid should not be legal: " << name;
+  }
+}
+
+TEST_F(RtpRtcpAPITest, LegalRsidName) {
+  static const std::string kLegalRsidNames[] = {
+      // clang-format off
+      "audio",
+      "audio0",
+      // clang-format on
+  };
+  for (const auto& name : kLegalRsidNames) {
+    EXPECT_TRUE(StreamId::IsLegalRsidName(name))
+        << "Rsid should be legal: " << name;
+  }
+
+  static const std::string kNonLegalRsidNames[] = {
+      // clang-format off
+      "",
+      "audio_0",
+      "(audio0)",
+      // clang-format on
+  };
+  for (const auto& name : kNonLegalRsidNames) {
+    EXPECT_FALSE(StreamId::IsLegalRsidName(name))
+        << "Rsid should not be legal: " << name;
+  }
+}
+
 }  // namespace webrtc