blob: f3d2110c3eb57299f074e25fe43743963897ad6c [file] [log] [blame]
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
11#ifndef WEBRTC_P2P_BASE_PORT_H_
12#define WEBRTC_P2P_BASE_PORT_H_
13
14#include <map>
15#include <set>
16#include <string>
17#include <vector>
18
19#include "webrtc/p2p/base/candidate.h"
20#include "webrtc/p2p/base/packetsocketfactory.h"
21#include "webrtc/p2p/base/portinterface.h"
22#include "webrtc/p2p/base/stun.h"
23#include "webrtc/p2p/base/stunrequest.h"
24#include "webrtc/p2p/base/transport.h"
25#include "webrtc/base/asyncpacketsocket.h"
26#include "webrtc/base/network.h"
27#include "webrtc/base/proxyinfo.h"
28#include "webrtc/base/ratetracker.h"
29#include "webrtc/base/sigslot.h"
30#include "webrtc/base/socketaddress.h"
31#include "webrtc/base/thread.h"
32
33namespace cricket {
34
35class Connection;
36class ConnectionRequest;
37
38extern const char LOCAL_PORT_TYPE[];
39extern const char STUN_PORT_TYPE[];
40extern const char PRFLX_PORT_TYPE[];
41extern const char RELAY_PORT_TYPE[];
42
43extern const char UDP_PROTOCOL_NAME[];
44extern const char TCP_PROTOCOL_NAME[];
45extern const char SSLTCP_PROTOCOL_NAME[];
46
47// RFC 6544, TCP candidate encoding rules.
48extern const int DISCARD_PORT;
49extern const char TCPTYPE_ACTIVE_STR[];
50extern const char TCPTYPE_PASSIVE_STR[];
51extern const char TCPTYPE_SIMOPEN_STR[];
52
Honghai Zhang2b342bf2015-09-30 09:51:58 -070053// The minimum time we will wait before destroying a connection after creating
54// it.
Peter Boström0c4e06b2015-10-07 12:23:21 +020055const uint32_t MIN_CONNECTION_LIFETIME = 10 * 1000; // 10 seconds.
Peter Thatcher04ac81f2015-09-21 11:48:28 -070056
Honghai Zhang2cd7afe2015-11-12 11:14:33 -080057// A connection will be declared dead if it has not received anything for this
58// long.
59const uint32_t DEAD_CONNECTION_RECEIVE_TIMEOUT = 30 * 1000; // 30 seconds.
60
Peter Thatcher04ac81f2015-09-21 11:48:28 -070061// The timeout duration when a connection does not receive anything.
Peter Boström0c4e06b2015-10-07 12:23:21 +020062const uint32_t WEAK_CONNECTION_RECEIVE_TIMEOUT = 2500; // 2.5 seconds
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000063
64// The length of time we wait before timing out writability on a connection.
Peter Boström0c4e06b2015-10-07 12:23:21 +020065const uint32_t CONNECTION_WRITE_TIMEOUT = 15 * 1000; // 15 seconds
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000066
67// The length of time we wait before we become unwritable.
Peter Boström0c4e06b2015-10-07 12:23:21 +020068const uint32_t CONNECTION_WRITE_CONNECT_TIMEOUT = 5 * 1000; // 5 seconds
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000069
70// The number of pings that must fail to respond before we become unwritable.
Peter Boström0c4e06b2015-10-07 12:23:21 +020071const uint32_t CONNECTION_WRITE_CONNECT_FAILURES = 5;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000072
73// This is the length of time that we wait for a ping response to come back.
74const int CONNECTION_RESPONSE_TIMEOUT = 5 * 1000; // 5 seconds
75
76enum RelayType {
77 RELAY_GTURN, // Legacy google relay service.
78 RELAY_TURN // Standard (TURN) relay service.
79};
80
81enum IcePriorityValue {
82 // The reason we are choosing Relay preference 2 is because, we can run
83 // Relay from client to server on UDP/TCP/TLS. To distinguish the transport
84 // protocol, we prefer UDP over TCP over TLS.
85 // For UDP ICE_TYPE_PREFERENCE_RELAY will be 2.
86 // For TCP ICE_TYPE_PREFERENCE_RELAY will be 1.
87 // For TLS ICE_TYPE_PREFERENCE_RELAY will be 0.
88 // Check turnport.cc for setting these values.
89 ICE_TYPE_PREFERENCE_RELAY = 2,
90 ICE_TYPE_PREFERENCE_HOST_TCP = 90,
91 ICE_TYPE_PREFERENCE_SRFLX = 100,
92 ICE_TYPE_PREFERENCE_PRFLX = 110,
93 ICE_TYPE_PREFERENCE_HOST = 126
94};
95
96const char* ProtoToString(ProtocolType proto);
97bool StringToProto(const char* value, ProtocolType* proto);
98
99struct ProtocolAddress {
100 rtc::SocketAddress address;
101 ProtocolType proto;
102 bool secure;
103
104 ProtocolAddress(const rtc::SocketAddress& a, ProtocolType p)
105 : address(a), proto(p), secure(false) { }
106 ProtocolAddress(const rtc::SocketAddress& a, ProtocolType p, bool sec)
107 : address(a), proto(p), secure(sec) { }
108};
109
110typedef std::set<rtc::SocketAddress> ServerAddresses;
111
112// Represents a local communication mechanism that can be used to create
113// connections to similar mechanisms of the other client. Subclasses of this
114// one add support for specific mechanisms like local UDP ports.
115class Port : public PortInterface, public rtc::MessageHandler,
116 public sigslot::has_slots<> {
117 public:
pkasting@chromium.org332331f2014-11-06 20:19:22 +0000118 Port(rtc::Thread* thread,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000119 rtc::PacketSocketFactory* factory,
pkasting@chromium.org332331f2014-11-06 20:19:22 +0000120 rtc::Network* network,
121 const rtc::IPAddress& ip,
122 const std::string& username_fragment,
123 const std::string& password);
124 Port(rtc::Thread* thread,
125 const std::string& type,
126 rtc::PacketSocketFactory* factory,
127 rtc::Network* network,
128 const rtc::IPAddress& ip,
Peter Boström0c4e06b2015-10-07 12:23:21 +0200129 uint16_t min_port,
130 uint16_t max_port,
pkasting@chromium.org332331f2014-11-06 20:19:22 +0000131 const std::string& username_fragment,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000132 const std::string& password);
133 virtual ~Port();
134
135 virtual const std::string& Type() const { return type_; }
136 virtual rtc::Network* Network() const { return network_; }
137
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000138 // Methods to set/get ICE role and tiebreaker values.
139 IceRole GetIceRole() const { return ice_role_; }
140 void SetIceRole(IceRole role) { ice_role_ = role; }
141
Peter Boström0c4e06b2015-10-07 12:23:21 +0200142 void SetIceTiebreaker(uint64_t tiebreaker) { tiebreaker_ = tiebreaker; }
143 uint64_t IceTiebreaker() const { return tiebreaker_; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000144
145 virtual bool SharedSocket() const { return shared_socket_; }
146 void ResetSharedSocket() { shared_socket_ = false; }
147
148 // The thread on which this port performs its I/O.
149 rtc::Thread* thread() { return thread_; }
150
151 // The factory used to create the sockets of this port.
152 rtc::PacketSocketFactory* socket_factory() const { return factory_; }
153 void set_socket_factory(rtc::PacketSocketFactory* factory) {
154 factory_ = factory;
155 }
156
157 // For debugging purposes.
158 const std::string& content_name() const { return content_name_; }
159 void set_content_name(const std::string& content_name) {
160 content_name_ = content_name;
161 }
162
163 int component() const { return component_; }
164 void set_component(int component) { component_ = component; }
165
166 bool send_retransmit_count_attribute() const {
167 return send_retransmit_count_attribute_;
168 }
169 void set_send_retransmit_count_attribute(bool enable) {
170 send_retransmit_count_attribute_ = enable;
171 }
172
173 // Identifies the generation that this port was created in.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200174 uint32_t generation() { return generation_; }
175 void set_generation(uint32_t generation) { generation_ = generation; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000176
177 // ICE requires a single username/password per content/media line. So the
178 // |ice_username_fragment_| of the ports that belongs to the same content will
179 // be the same. However this causes a small complication with our relay
180 // server, which expects different username for RTP and RTCP.
181 //
182 // To resolve this problem, we implemented the username_fragment(),
183 // which returns a different username (calculated from
184 // |ice_username_fragment_|) for RTCP in the case of ICEPROTO_GOOGLE. And the
185 // username_fragment() simply returns |ice_username_fragment_| when running
186 // in ICEPROTO_RFC5245.
187 //
188 // As a result the ICEPROTO_GOOGLE will use different usernames for RTP and
189 // RTCP. And the ICEPROTO_RFC5245 will use same username for both RTP and
190 // RTCP.
191 const std::string username_fragment() const;
192 const std::string& password() const { return password_; }
193
194 // Fired when candidates are discovered by the port. When all candidates
195 // are discovered that belong to port SignalAddressReady is fired.
196 sigslot::signal2<Port*, const Candidate&> SignalCandidateReady;
197
198 // Provides all of the above information in one handy object.
199 virtual const std::vector<Candidate>& Candidates() const {
200 return candidates_;
201 }
202
203 // SignalPortComplete is sent when port completes the task of candidates
204 // allocation.
205 sigslot::signal1<Port*> SignalPortComplete;
206 // This signal sent when port fails to allocate candidates and this port
207 // can't be used in establishing the connections. When port is in shared mode
208 // and port fails to allocate one of the candidates, port shouldn't send
209 // this signal as other candidates might be usefull in establishing the
210 // connection.
211 sigslot::signal1<Port*> SignalPortError;
212
213 // Returns a map containing all of the connections of this port, keyed by the
214 // remote address.
215 typedef std::map<rtc::SocketAddress, Connection*> AddressMap;
216 const AddressMap& connections() { return connections_; }
217
218 // Returns the connection to the given address or NULL if none exists.
219 virtual Connection* GetConnection(
220 const rtc::SocketAddress& remote_addr);
221
222 // Called each time a connection is created.
223 sigslot::signal2<Port*, Connection*> SignalConnectionCreated;
224
225 // In a shared socket mode each port which shares the socket will decide
226 // to accept the packet based on the |remote_addr|. Currently only UDP
227 // port implemented this method.
228 // TODO(mallinath) - Make it pure virtual.
229 virtual bool HandleIncomingPacket(
230 rtc::AsyncPacketSocket* socket, const char* data, size_t size,
231 const rtc::SocketAddress& remote_addr,
232 const rtc::PacketTime& packet_time) {
233 ASSERT(false);
234 return false;
235 }
236
237 // Sends a response message (normal or error) to the given request. One of
238 // these methods should be called as a response to SignalUnknownAddress.
239 // NOTE: You MUST call CreateConnection BEFORE SendBindingResponse.
240 virtual void SendBindingResponse(StunMessage* request,
241 const rtc::SocketAddress& addr);
242 virtual void SendBindingErrorResponse(
243 StunMessage* request, const rtc::SocketAddress& addr,
244 int error_code, const std::string& reason);
245
246 void set_proxy(const std::string& user_agent,
247 const rtc::ProxyInfo& proxy) {
248 user_agent_ = user_agent;
249 proxy_ = proxy;
250 }
251 const std::string& user_agent() { return user_agent_; }
252 const rtc::ProxyInfo& proxy() { return proxy_; }
253
254 virtual void EnablePortPackets();
255
256 // Called if the port has no connections and is no longer useful.
257 void Destroy();
258
259 virtual void OnMessage(rtc::Message *pmsg);
260
261 // Debugging description of this port
262 virtual std::string ToString() const;
pthatcher@webrtc.org0ba15332015-01-10 00:47:02 +0000263 const rtc::IPAddress& ip() const { return ip_; }
Peter Boström0c4e06b2015-10-07 12:23:21 +0200264 uint16_t min_port() { return min_port_; }
265 uint16_t max_port() { return max_port_; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000266
267 // Timeout shortening function to speed up unit tests.
268 void set_timeout_delay(int delay) { timeout_delay_ = delay; }
269
270 // This method will return local and remote username fragements from the
271 // stun username attribute if present.
272 bool ParseStunUsername(const StunMessage* stun_msg,
273 std::string* local_username,
Peter Thatcher7cbd1882015-09-17 18:54:52 -0700274 std::string* remote_username) const;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000275 void CreateStunUsername(const std::string& remote_username,
276 std::string* stun_username_attr_str) const;
277
278 bool MaybeIceRoleConflict(const rtc::SocketAddress& addr,
279 IceMessage* stun_msg,
280 const std::string& remote_ufrag);
281
stefanc1aeaf02015-10-15 07:26:07 -0700282 // Called when a packet has been sent to the socket.
283 void OnSentPacket(const rtc::SentPacket& sent_packet);
284
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000285 // Called when the socket is currently able to send.
286 void OnReadyToSend();
287
288 // Called when the Connection discovers a local peer reflexive candidate.
289 // Returns the index of the new local candidate.
290 size_t AddPrflxCandidate(const Candidate& local);
291
Peter Boström0c4e06b2015-10-07 12:23:21 +0200292 void set_candidate_filter(uint32_t candidate_filter) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000293 candidate_filter_ = candidate_filter;
294 }
295
296 protected:
297 enum {
honghaizd0b31432015-09-30 12:42:17 -0700298 MSG_DEAD = 0,
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000299 MSG_FIRST_AVAILABLE
300 };
301
302 void set_type(const std::string& type) { type_ = type; }
303
304 void AddAddress(const rtc::SocketAddress& address,
305 const rtc::SocketAddress& base_address,
306 const rtc::SocketAddress& related_address,
Guo-wei Shieh3d564c12015-08-19 16:51:15 -0700307 const std::string& protocol,
308 const std::string& relay_protocol,
309 const std::string& tcptype,
310 const std::string& type,
Peter Boström0c4e06b2015-10-07 12:23:21 +0200311 uint32_t type_preference,
312 uint32_t relay_preference,
Guo-wei Shieh3d564c12015-08-19 16:51:15 -0700313 bool final);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000314
315 // Adds the given connection to the list. (Deleting removes them.)
316 void AddConnection(Connection* conn);
317
318 // Called when a packet is received from an unknown address that is not
319 // currently a connection. If this is an authenticated STUN binding request,
320 // then we will signal the client.
321 void OnReadPacket(const char* data, size_t size,
322 const rtc::SocketAddress& addr,
323 ProtocolType proto);
324
325 // If the given data comprises a complete and correct STUN message then the
326 // return value is true, otherwise false. If the message username corresponds
327 // with this port's username fragment, msg will contain the parsed STUN
328 // message. Otherwise, the function may send a STUN response internally.
329 // remote_username contains the remote fragment of the STUN username.
330 bool GetStunMessage(const char* data, size_t size,
331 const rtc::SocketAddress& addr,
332 IceMessage** out_msg, std::string* out_username);
333
334 // Checks if the address in addr is compatible with the port's ip.
335 bool IsCompatibleAddress(const rtc::SocketAddress& addr);
336
337 // Returns default DSCP value.
338 rtc::DiffServCodePoint DefaultDscpValue() const {
339 // No change from what MediaChannel set.
340 return rtc::DSCP_NO_CHANGE;
341 }
342
Peter Boström0c4e06b2015-10-07 12:23:21 +0200343 uint32_t candidate_filter() { return candidate_filter_; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000344
345 private:
346 void Construct();
347 // Called when one of our connections deletes itself.
348 void OnConnectionDestroyed(Connection* conn);
349
honghaizd0b31432015-09-30 12:42:17 -0700350 // Whether this port is dead, and hence, should be destroyed on the controlled
351 // side.
352 bool dead() const {
353 return ice_role_ == ICEROLE_CONTROLLED && connections_.empty();
354 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000355
356 rtc::Thread* thread_;
357 rtc::PacketSocketFactory* factory_;
358 std::string type_;
359 bool send_retransmit_count_attribute_;
360 rtc::Network* network_;
361 rtc::IPAddress ip_;
Peter Boström0c4e06b2015-10-07 12:23:21 +0200362 uint16_t min_port_;
363 uint16_t max_port_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000364 std::string content_name_;
365 int component_;
Peter Boström0c4e06b2015-10-07 12:23:21 +0200366 uint32_t generation_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000367 // In order to establish a connection to this Port (so that real data can be
368 // sent through), the other side must send us a STUN binding request that is
369 // authenticated with this username_fragment and password.
370 // PortAllocatorSession will provide these username_fragment and password.
371 //
372 // Note: we should always use username_fragment() instead of using
373 // |ice_username_fragment_| directly. For the details see the comment on
374 // username_fragment().
375 std::string ice_username_fragment_;
376 std::string password_;
377 std::vector<Candidate> candidates_;
378 AddressMap connections_;
379 int timeout_delay_;
380 bool enable_port_packets_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000381 IceRole ice_role_;
Peter Boström0c4e06b2015-10-07 12:23:21 +0200382 uint64_t tiebreaker_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000383 bool shared_socket_;
384 // Information to use when going through a proxy.
385 std::string user_agent_;
386 rtc::ProxyInfo proxy_;
387
388 // Candidate filter is pushed down to Port such that each Port could
389 // make its own decision on how to create candidates. For example,
390 // when IceTransportsType is set to relay, both RelayPort and
391 // TurnPort will hide raddr to avoid local address leakage.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200392 uint32_t candidate_filter_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000393
394 friend class Connection;
395};
396
397// Represents a communication link between a port on the local client and a
398// port on the remote client.
399class Connection : public rtc::MessageHandler,
400 public sigslot::has_slots<> {
401 public:
Peter Thatcher1cf6f812015-05-15 10:40:45 -0700402 struct SentPing {
Peter Boström0c4e06b2015-10-07 12:23:21 +0200403 SentPing(const std::string id, uint32_t sent_time)
404 : id(id), sent_time(sent_time) {}
Peter Thatcher1cf6f812015-05-15 10:40:45 -0700405
406 std::string id;
Peter Boström0c4e06b2015-10-07 12:23:21 +0200407 uint32_t sent_time;
Peter Thatcher1cf6f812015-05-15 10:40:45 -0700408 };
409
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000410 // States are from RFC 5245. http://tools.ietf.org/html/rfc5245#section-5.7.4
411 enum State {
412 STATE_WAITING = 0, // Check has not been performed, Waiting pair on CL.
413 STATE_INPROGRESS, // Check has been sent, transaction is in progress.
414 STATE_SUCCEEDED, // Check already done, produced a successful result.
415 STATE_FAILED // Check for this connection failed.
416 };
417
418 virtual ~Connection();
419
420 // The local port where this connection sends and receives packets.
421 Port* port() { return port_; }
422 const Port* port() const { return port_; }
423
424 // Returns the description of the local port
425 virtual const Candidate& local_candidate() const;
426
427 // Returns the description of the remote port to which we communicate.
428 const Candidate& remote_candidate() const { return remote_candidate_; }
429
430 // Returns the pair priority.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200431 uint64_t priority() const;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000432
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000433 enum WriteState {
434 STATE_WRITABLE = 0, // we have received ping responses recently
435 STATE_WRITE_UNRELIABLE = 1, // we have had a few ping failures
436 STATE_WRITE_INIT = 2, // we have yet to receive a ping response
437 STATE_WRITE_TIMEOUT = 3, // we have had a large number of ping failures
438 };
439
440 WriteState write_state() const { return write_state_; }
441 bool writable() const { return write_state_ == STATE_WRITABLE; }
Peter Thatcher04ac81f2015-09-21 11:48:28 -0700442 bool receiving() const { return receiving_; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000443
444 // Determines whether the connection has finished connecting. This can only
445 // be false for TCP connections.
446 bool connected() const { return connected_; }
Honghai Zhang2b342bf2015-09-30 09:51:58 -0700447 bool weak() const { return !(writable() && receiving() && connected()); }
448 bool active() const {
449 // TODO(honghaiz): Move from using |write_state_| to using |pruned_|.
450 return write_state_ != STATE_WRITE_TIMEOUT;
451 }
452 // A connection is dead if it can be safely deleted.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200453 bool dead(uint32_t now) const;
honghaiz89374372015-09-24 13:14:47 -0700454
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000455 // Estimate of the round-trip time over this connection.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200456 uint32_t rtt() const { return rtt_; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000457
458 size_t sent_total_bytes();
459 size_t sent_bytes_second();
guoweis@webrtc.org930e0042014-11-17 19:42:14 +0000460 // Used to track how many packets are discarded in the application socket due
461 // to errors.
462 size_t sent_discarded_packets();
463 size_t sent_total_packets();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000464 size_t recv_total_bytes();
465 size_t recv_bytes_second();
466 sigslot::signal1<Connection*> SignalStateChange;
467
468 // Sent when the connection has decided that it is no longer of value. It
469 // will delete itself immediately after this call.
470 sigslot::signal1<Connection*> SignalDestroyed;
471
472 // The connection can send and receive packets asynchronously. This matches
473 // the interface of AsyncPacketSocket, which may use UDP or TCP under the
474 // covers.
475 virtual int Send(const void* data, size_t size,
476 const rtc::PacketOptions& options) = 0;
477
478 // Error if Send() returns < 0
479 virtual int GetError() = 0;
480
Peter Thatcher04ac81f2015-09-21 11:48:28 -0700481 sigslot::signal4<Connection*, const char*, size_t, const rtc::PacketTime&>
482 SignalReadPacket;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000483
484 sigslot::signal1<Connection*> SignalReadyToSend;
485
486 // Called when a packet is received on this connection.
487 void OnReadPacket(const char* data, size_t size,
488 const rtc::PacketTime& packet_time);
489
490 // Called when the socket is currently able to send.
491 void OnReadyToSend();
492
493 // Called when a connection is determined to be no longer useful to us. We
494 // still keep it around in case the other side wants to use it. But we can
495 // safely stop pinging on it and we can allow it to time out if the other
496 // side stops using it as well.
497 bool pruned() const { return pruned_; }
498 void Prune();
499
500 bool use_candidate_attr() const { return use_candidate_attr_; }
501 void set_use_candidate_attr(bool enable);
502
honghaiz5a3acd82015-08-20 15:53:17 -0700503 bool nominated() const { return nominated_; }
504 void set_nominated(bool nominated) { nominated_ = nominated; }
505
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000506 void set_remote_ice_mode(IceMode mode) {
507 remote_ice_mode_ = mode;
508 }
509
Peter Boström0c4e06b2015-10-07 12:23:21 +0200510 void set_receiving_timeout(uint32_t receiving_timeout_ms) {
Peter Thatcher04ac81f2015-09-21 11:48:28 -0700511 receiving_timeout_ = receiving_timeout_ms;
512 }
513
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000514 // Makes the connection go away.
515 void Destroy();
516
deadbeef376e1232015-11-25 09:00:08 -0800517 // Makes the connection go away, in a failed state.
518 void FailAndDestroy();
519
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000520 // Checks that the state of this connection is up-to-date. The argument is
521 // the current time, which is compared against various timeouts.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200522 void UpdateState(uint32_t now);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000523
524 // Called when this connection should try checking writability again.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200525 uint32_t last_ping_sent() const { return last_ping_sent_; }
526 void Ping(uint32_t now);
Peter Thatcher1fe120a2015-06-10 11:33:17 -0700527 void ReceivedPingResponse();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000528
529 // Called whenever a valid ping is received on this connection. This is
530 // public because the connection intercepts the first ping for us.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200531 uint32_t last_ping_received() const { return last_ping_received_; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000532 void ReceivedPing();
honghaiz9b5ee9c2015-11-11 13:19:17 -0800533 // Handles the binding request; sends a response if this is a valid request.
534 void HandleBindingRequest(IceMessage* msg);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000535
536 // Debugging description of this connection
guoweis@webrtc.org8c9ff202014-12-04 07:56:02 +0000537 std::string ToDebugId() const;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000538 std::string ToString() const;
539 std::string ToSensitiveString() const;
Peter Thatcher1cf6f812015-05-15 10:40:45 -0700540 // Prints pings_since_last_response_ into a string.
541 void PrintPingsSinceLastResponse(std::string* pings, size_t max);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000542
543 bool reported() const { return reported_; }
544 void set_reported(bool reported) { reported_ = reported;}
545
honghaiz5a3acd82015-08-20 15:53:17 -0700546 // This signal will be fired if this connection is nominated by the
547 // controlling side.
548 sigslot::signal1<Connection*> SignalNominated;
Peter Thatcher54360512015-07-08 11:08:35 -0700549
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000550 // Invoked when Connection receives STUN error response with 487 code.
551 void HandleRoleConflictFromPeer();
552
553 State state() const { return state_; }
554
555 IceMode remote_ice_mode() const { return remote_ice_mode_; }
556
jiayl@webrtc.orgdacdd942015-01-23 17:33:34 +0000557 // Update the ICE password of the remote candidate if |ice_ufrag| matches
558 // the candidate's ufrag, and the candidate's passwrod has not been set.
559 void MaybeSetRemoteIceCredentials(const std::string& ice_ufrag,
560 const std::string& ice_pwd);
561
562 // If |remote_candidate_| is peer reflexive and is equivalent to
563 // |new_candidate| except the type, update |remote_candidate_| to
564 // |new_candidate|.
565 void MaybeUpdatePeerReflexiveCandidate(const Candidate& new_candidate);
566
Peter Thatcher54360512015-07-08 11:08:35 -0700567 // Returns the last received time of any data, stun request, or stun
568 // response in milliseconds
Honghai Zhang2cd7afe2015-11-12 11:14:33 -0800569 uint32_t last_received() const;
Peter Thatcher54360512015-07-08 11:08:35 -0700570
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000571 protected:
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700572 enum { MSG_DELETE = 0, MSG_FIRST_AVAILABLE };
573
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000574 // Constructs a new connection to the given remote port.
575 Connection(Port* port, size_t index, const Candidate& candidate);
576
577 // Called back when StunRequestManager has a stun packet to send
578 void OnSendStunPacket(const void* data, size_t size, StunRequest* req);
579
580 // Callbacks from ConnectionRequest
Guo-wei Shiehbe508a12015-04-06 12:48:47 -0700581 virtual void OnConnectionRequestResponse(ConnectionRequest* req,
582 StunMessage* response);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000583 void OnConnectionRequestErrorResponse(ConnectionRequest* req,
584 StunMessage* response);
585 void OnConnectionRequestTimeout(ConnectionRequest* req);
Peter Thatcher1cf6f812015-05-15 10:40:45 -0700586 void OnConnectionRequestSent(ConnectionRequest* req);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000587
588 // Changes the state and signals if necessary.
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000589 void set_write_state(WriteState value);
Peter Thatcher04ac81f2015-09-21 11:48:28 -0700590 void set_receiving(bool value);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000591 void set_state(State state);
592 void set_connected(bool value);
593
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000594 void OnMessage(rtc::Message *pmsg);
595
596 Port* port_;
597 size_t local_candidate_index_;
598 Candidate remote_candidate_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000599 WriteState write_state_;
Peter Thatcher04ac81f2015-09-21 11:48:28 -0700600 bool receiving_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000601 bool connected_;
602 bool pruned_;
603 // By default |use_candidate_attr_| flag will be true,
honghaiz5a3acd82015-08-20 15:53:17 -0700604 // as we will be using aggressive nomination.
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000605 // But when peer is ice-lite, this flag "must" be initialized to false and
606 // turn on when connection becomes "best connection".
607 bool use_candidate_attr_;
honghaiz5a3acd82015-08-20 15:53:17 -0700608 // Whether this connection has been nominated by the controlling side via
609 // the use_candidate attribute.
610 bool nominated_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000611 IceMode remote_ice_mode_;
612 StunRequestManager requests_;
Peter Boström0c4e06b2015-10-07 12:23:21 +0200613 uint32_t rtt_;
614 uint32_t last_ping_sent_; // last time we sent a ping to the other side
615 uint32_t last_ping_received_; // last time we received a ping from the other
616 // side
617 uint32_t last_data_received_;
618 uint32_t last_ping_response_received_;
Peter Thatcher1cf6f812015-05-15 10:40:45 -0700619 std::vector<SentPing> pings_since_last_response_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000620
621 rtc::RateTracker recv_rate_tracker_;
622 rtc::RateTracker send_rate_tracker_;
Peter Boström0c4e06b2015-10-07 12:23:21 +0200623 uint32_t sent_packets_discarded_;
624 uint32_t sent_packets_total_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000625
626 private:
627 void MaybeAddPrflxCandidate(ConnectionRequest* request,
628 StunMessage* response);
629
630 bool reported_;
631 State state_;
Peter Thatcher04ac81f2015-09-21 11:48:28 -0700632 // Time duration to switch from receiving to not receiving.
Peter Boström0c4e06b2015-10-07 12:23:21 +0200633 uint32_t receiving_timeout_;
634 uint32_t time_created_ms_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000635
636 friend class Port;
637 friend class ConnectionRequest;
638};
639
deadbeef376e1232015-11-25 09:00:08 -0800640// ProxyConnection defers all the interesting work to the port.
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000641class ProxyConnection : public Connection {
642 public:
deadbeef376e1232015-11-25 09:00:08 -0800643 ProxyConnection(Port* port, size_t index, const Candidate& remote_candidate);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000644
deadbeef376e1232015-11-25 09:00:08 -0800645 int Send(const void* data,
646 size_t size,
647 const rtc::PacketOptions& options) override;
648 int GetError() override { return error_; }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000649
650 private:
deadbeef376e1232015-11-25 09:00:08 -0800651 int error_ = 0;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000652};
653
654} // namespace cricket
655
656#endif // WEBRTC_P2P_BASE_PORT_H_