blob: 15c00957efd32be85d8afb2e76ec3b20e2c90f80 [file] [log] [blame]
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +00001/*
2 * Copyright 2004 The WebRTC Project Authors. All rights reserved.
3 *
4 * Use of this source code is governed by a BSD-style license
5 * that can be found in the LICENSE file in the root of the source
6 * tree. An additional intellectual property rights grant can be found
7 * in the file PATENTS. All contributing project authors may
8 * be found in the AUTHORS file in the root of the source tree.
9 */
10
11#include "webrtc/p2p/base/stunport.h"
12
13#include "webrtc/p2p/base/common.h"
14#include "webrtc/p2p/base/portallocator.h"
15#include "webrtc/p2p/base/stun.h"
Guo-wei Shieh9af97f82015-11-10 14:47:39 -080016#include "webrtc/base/checks.h"
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000017#include "webrtc/base/common.h"
18#include "webrtc/base/helpers.h"
Guo-wei Shiehfe3bc9d2015-08-20 08:48:20 -070019#include "webrtc/base/ipaddress.h"
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000020#include "webrtc/base/logging.h"
21#include "webrtc/base/nethelpers.h"
22
23namespace cricket {
24
25// TODO: Move these to a common place (used in relayport too)
26const int KEEPALIVE_DELAY = 10 * 1000; // 10 seconds - sort timeouts
honghaize2af9ef2016-03-03 08:27:47 -080027const int RETRY_TIMEOUT = 50 * 1000; // 50 seconds
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000028
29// Handles a binding request sent to the STUN server.
30class StunBindingRequest : public StunRequest {
31 public:
honghaiz45b0efd2015-12-04 08:57:26 -080032 StunBindingRequest(UDPPort* port,
33 const rtc::SocketAddress& addr,
Honghai Zhang351d77b2016-05-20 15:08:29 -070034 int64_t start_time)
35 : port_(port), server_addr_(addr), start_time_(start_time) {}
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000036
37 virtual ~StunBindingRequest() {
38 }
39
40 const rtc::SocketAddress& server_addr() const { return server_addr_; }
41
Peter Thatcher1cf6f812015-05-15 10:40:45 -070042 virtual void Prepare(StunMessage* request) override {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000043 request->SetType(STUN_BINDING_REQUEST);
44 }
45
Peter Thatcher1cf6f812015-05-15 10:40:45 -070046 virtual void OnResponse(StunMessage* response) override {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000047 const StunAddressAttribute* addr_attr =
48 response->GetAddress(STUN_ATTR_MAPPED_ADDRESS);
49 if (!addr_attr) {
50 LOG(LS_ERROR) << "Binding response missing mapped address.";
51 } else if (addr_attr->family() != STUN_ADDRESS_IPV4 &&
52 addr_attr->family() != STUN_ADDRESS_IPV6) {
53 LOG(LS_ERROR) << "Binding address has bad family";
54 } else {
55 rtc::SocketAddress addr(addr_attr->ipaddr(), addr_attr->port());
56 port_->OnStunBindingRequestSucceeded(server_addr_, addr);
57 }
58
honghaize2af9ef2016-03-03 08:27:47 -080059 // The keep-alive requests will be stopped after its lifetime has passed.
nisse1bffc1d2016-05-02 08:18:55 -070060 if (WithinLifetime(rtc::TimeMillis())) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000061 port_->requests_.SendDelayed(
Honghai Zhang351d77b2016-05-20 15:08:29 -070062 new StunBindingRequest(port_, server_addr_, start_time_),
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000063 port_->stun_keepalive_delay());
64 }
65 }
66
Peter Thatcher1cf6f812015-05-15 10:40:45 -070067 virtual void OnErrorResponse(StunMessage* response) override {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000068 const StunErrorCodeAttribute* attr = response->GetErrorCode();
69 if (!attr) {
70 LOG(LS_ERROR) << "Bad allocate response error code";
71 } else {
72 LOG(LS_ERROR) << "Binding error response:"
honghaize2af9ef2016-03-03 08:27:47 -080073 << " class=" << attr->eclass()
74 << " number=" << attr->number() << " reason='"
75 << attr->reason() << "'";
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000076 }
77
78 port_->OnStunBindingOrResolveRequestFailed(server_addr_);
79
nisse1bffc1d2016-05-02 08:18:55 -070080 int64_t now = rtc::TimeMillis();
honghaize2af9ef2016-03-03 08:27:47 -080081 if (WithinLifetime(now) &&
Honghai Zhang82d78622016-05-06 11:29:15 -070082 rtc::TimeDiff(now, start_time_) < RETRY_TIMEOUT) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000083 port_->requests_.SendDelayed(
Honghai Zhang351d77b2016-05-20 15:08:29 -070084 new StunBindingRequest(port_, server_addr_, start_time_),
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000085 port_->stun_keepalive_delay());
86 }
87 }
Peter Thatcher1cf6f812015-05-15 10:40:45 -070088 virtual void OnTimeout() override {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000089 LOG(LS_ERROR) << "Binding request timed out from "
honghaize2af9ef2016-03-03 08:27:47 -080090 << port_->GetLocalAddress().ToSensitiveString() << " ("
91 << port_->Network()->name() << ")";
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000092
93 port_->OnStunBindingOrResolveRequestFailed(server_addr_);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +000094 }
95
96 private:
honghaize2af9ef2016-03-03 08:27:47 -080097 // Returns true if |now| is within the lifetime of the request (a negative
98 // lifetime means infinite).
honghaiz34b11eb2016-03-16 08:55:44 -070099 bool WithinLifetime(int64_t now) const {
Honghai Zhang351d77b2016-05-20 15:08:29 -0700100 int lifetime = port_->stun_keepalive_lifetime();
101 return lifetime < 0 || rtc::TimeDiff(now, start_time_) <= lifetime;
honghaize2af9ef2016-03-03 08:27:47 -0800102 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000103 UDPPort* port_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000104 const rtc::SocketAddress server_addr_;
honghaize2af9ef2016-03-03 08:27:47 -0800105
honghaiz34b11eb2016-03-16 08:55:44 -0700106 int64_t start_time_;
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000107};
108
109UDPPort::AddressResolver::AddressResolver(
110 rtc::PacketSocketFactory* factory)
111 : socket_factory_(factory) {}
112
113UDPPort::AddressResolver::~AddressResolver() {
114 for (ResolverMap::iterator it = resolvers_.begin();
115 it != resolvers_.end(); ++it) {
Guo-wei Shieh8a4f5472015-10-30 09:12:34 -0700116 // TODO(guoweis): Change to asynchronous DNS resolution to prevent the hang
117 // when passing true to the Destroy() which is a safer way to avoid the code
118 // unloaded before the thread exits. Please see webrtc bug 5139.
119 it->second->Destroy(false);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000120 }
121}
122
123void UDPPort::AddressResolver::Resolve(
124 const rtc::SocketAddress& address) {
125 if (resolvers_.find(address) != resolvers_.end())
126 return;
127
128 rtc::AsyncResolverInterface* resolver =
129 socket_factory_->CreateAsyncResolver();
130 resolvers_.insert(
131 std::pair<rtc::SocketAddress, rtc::AsyncResolverInterface*>(
132 address, resolver));
133
134 resolver->SignalDone.connect(this,
135 &UDPPort::AddressResolver::OnResolveResult);
136
137 resolver->Start(address);
138}
139
140bool UDPPort::AddressResolver::GetResolvedAddress(
141 const rtc::SocketAddress& input,
142 int family,
143 rtc::SocketAddress* output) const {
144 ResolverMap::const_iterator it = resolvers_.find(input);
145 if (it == resolvers_.end())
146 return false;
147
148 return it->second->GetResolvedAddress(family, output);
149}
150
151void UDPPort::AddressResolver::OnResolveResult(
152 rtc::AsyncResolverInterface* resolver) {
153 for (ResolverMap::iterator it = resolvers_.begin();
154 it != resolvers_.end(); ++it) {
155 if (it->second == resolver) {
156 SignalDone(it->first, resolver->GetError());
157 return;
158 }
159 }
160}
161
162UDPPort::UDPPort(rtc::Thread* thread,
163 rtc::PacketSocketFactory* factory,
164 rtc::Network* network,
165 rtc::AsyncPacketSocket* socket,
pkasting@chromium.org332331f2014-11-06 20:19:22 +0000166 const std::string& username,
pthatcher@webrtc.org0ba15332015-01-10 00:47:02 +0000167 const std::string& password,
Guo-wei Shiehfe3bc9d2015-08-20 08:48:20 -0700168 const std::string& origin,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800169 bool emit_local_for_anyaddress)
170 : Port(thread,
171 factory,
172 network,
173 socket->GetLocalAddress().ipaddr(),
174 username,
175 password),
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000176 requests_(thread),
177 socket_(socket),
178 error_(0),
179 ready_(false),
Guo-wei Shiehfe3bc9d2015-08-20 08:48:20 -0700180 stun_keepalive_delay_(KEEPALIVE_DELAY),
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800181 emit_local_for_anyaddress_(emit_local_for_anyaddress) {
pthatcher@webrtc.org0ba15332015-01-10 00:47:02 +0000182 requests_.set_origin(origin);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000183}
184
185UDPPort::UDPPort(rtc::Thread* thread,
186 rtc::PacketSocketFactory* factory,
187 rtc::Network* network,
pkasting@chromium.org332331f2014-11-06 20:19:22 +0000188 const rtc::IPAddress& ip,
Peter Boström0c4e06b2015-10-07 12:23:21 +0200189 uint16_t min_port,
190 uint16_t max_port,
pkasting@chromium.org332331f2014-11-06 20:19:22 +0000191 const std::string& username,
pthatcher@webrtc.org0ba15332015-01-10 00:47:02 +0000192 const std::string& password,
Guo-wei Shiehfe3bc9d2015-08-20 08:48:20 -0700193 const std::string& origin,
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800194 bool emit_local_for_anyaddress)
Peter Boström0c4e06b2015-10-07 12:23:21 +0200195 : Port(thread,
196 LOCAL_PORT_TYPE,
197 factory,
198 network,
199 ip,
200 min_port,
201 max_port,
202 username,
203 password),
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000204 requests_(thread),
205 socket_(NULL),
206 error_(0),
207 ready_(false),
Guo-wei Shiehfe3bc9d2015-08-20 08:48:20 -0700208 stun_keepalive_delay_(KEEPALIVE_DELAY),
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800209 emit_local_for_anyaddress_(emit_local_for_anyaddress) {
pthatcher@webrtc.org0ba15332015-01-10 00:47:02 +0000210 requests_.set_origin(origin);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000211}
212
213bool UDPPort::Init() {
Honghai Zhang351d77b2016-05-20 15:08:29 -0700214 stun_keepalive_lifetime_ = GetStunKeepaliveLifetime();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000215 if (!SharedSocket()) {
216 ASSERT(socket_ == NULL);
217 socket_ = socket_factory()->CreateUdpSocket(
218 rtc::SocketAddress(ip(), 0), min_port(), max_port());
219 if (!socket_) {
220 LOG_J(LS_WARNING, this) << "UDP socket creation failed";
221 return false;
222 }
223 socket_->SignalReadPacket.connect(this, &UDPPort::OnReadPacket);
224 }
stefanc1aeaf02015-10-15 07:26:07 -0700225 socket_->SignalSentPacket.connect(this, &UDPPort::OnSentPacket);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000226 socket_->SignalReadyToSend.connect(this, &UDPPort::OnReadyToSend);
227 socket_->SignalAddressReady.connect(this, &UDPPort::OnLocalAddressReady);
228 requests_.SignalSendPacket.connect(this, &UDPPort::OnSendPacket);
229 return true;
230}
231
232UDPPort::~UDPPort() {
233 if (!SharedSocket())
234 delete socket_;
235}
236
237void UDPPort::PrepareAddress() {
238 ASSERT(requests_.empty());
239 if (socket_->GetState() == rtc::AsyncPacketSocket::STATE_BOUND) {
240 OnLocalAddressReady(socket_, socket_->GetLocalAddress());
241 }
242}
243
244void UDPPort::MaybePrepareStunCandidate() {
245 // Sending binding request to the STUN server if address is available to
246 // prepare STUN candidate.
247 if (!server_addresses_.empty()) {
248 SendStunBindingRequests();
249 } else {
250 // Port is done allocating candidates.
251 MaybeSetPortCompleteOrError();
252 }
253}
254
255Connection* UDPPort::CreateConnection(const Candidate& address,
Honghai Zhangf9945b22015-12-15 12:20:13 -0800256 CandidateOrigin origin) {
257 if (!SupportsProtocol(address.protocol())) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000258 return NULL;
Honghai Zhangf9945b22015-12-15 12:20:13 -0800259 }
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000260
261 if (!IsCompatibleAddress(address.address())) {
262 return NULL;
263 }
264
265 if (SharedSocket() && Candidates()[0].type() != LOCAL_PORT_TYPE) {
266 ASSERT(false);
267 return NULL;
268 }
269
270 Connection* conn = new ProxyConnection(this, 0, address);
271 AddConnection(conn);
272 return conn;
273}
274
275int UDPPort::SendTo(const void* data, size_t size,
276 const rtc::SocketAddress& addr,
277 const rtc::PacketOptions& options,
278 bool payload) {
279 int sent = socket_->SendTo(data, size, addr, options);
280 if (sent < 0) {
281 error_ = socket_->GetError();
282 LOG_J(LS_ERROR, this) << "UDP send of " << size
283 << " bytes failed with error " << error_;
284 }
285 return sent;
286}
287
Honghai Zhang351d77b2016-05-20 15:08:29 -0700288void UDPPort::UpdateNetworkCost() {
289 Port::UpdateNetworkCost();
290 stun_keepalive_lifetime_ = GetStunKeepaliveLifetime();
291}
292
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000293int UDPPort::SetOption(rtc::Socket::Option opt, int value) {
294 return socket_->SetOption(opt, value);
295}
296
297int UDPPort::GetOption(rtc::Socket::Option opt, int* value) {
298 return socket_->GetOption(opt, value);
299}
300
301int UDPPort::GetError() {
302 return error_;
303}
304
305void UDPPort::OnLocalAddressReady(rtc::AsyncPacketSocket* socket,
306 const rtc::SocketAddress& address) {
Guo-wei Shiehfe3bc9d2015-08-20 08:48:20 -0700307 // When adapter enumeration is disabled and binding to the any address, the
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800308 // default local address will be issued as a candidate instead if
309 // |emit_local_for_anyaddress| is true. This is to allow connectivity for
310 // applications which absolutely requires a HOST candidate.
Guo-wei Shiehfe3bc9d2015-08-20 08:48:20 -0700311 rtc::SocketAddress addr = address;
Guo-wei Shiehe03cab92015-11-11 11:11:19 -0800312
313 // If MaybeSetDefaultLocalAddress fails, we keep the "any" IP so that at
314 // least the port is listening.
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800315 MaybeSetDefaultLocalAddress(&addr);
Guo-wei Shiehfe3bc9d2015-08-20 08:48:20 -0700316
317 AddAddress(addr, addr, rtc::SocketAddress(), UDP_PROTOCOL_NAME, "", "",
Guo-wei Shieh3d564c12015-08-19 16:51:15 -0700318 LOCAL_PORT_TYPE, ICE_TYPE_PREFERENCE_HOST, 0, false);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000319 MaybePrepareStunCandidate();
320}
321
tfarina20a34612015-11-02 16:20:22 -0800322void UDPPort::OnReadPacket(rtc::AsyncPacketSocket* socket,
323 const char* data,
324 size_t size,
325 const rtc::SocketAddress& remote_addr,
326 const rtc::PacketTime& packet_time) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000327 ASSERT(socket == socket_);
tfarina20a34612015-11-02 16:20:22 -0800328 ASSERT(!remote_addr.IsUnresolvedIP());
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000329
330 // Look for a response from the STUN server.
331 // Even if the response doesn't match one of our outstanding requests, we
332 // will eat it because it might be a response to a retransmitted packet, and
333 // we already cleared the request when we got the first response.
334 if (server_addresses_.find(remote_addr) != server_addresses_.end()) {
335 requests_.CheckResponse(data, size);
336 return;
337 }
338
339 if (Connection* conn = GetConnection(remote_addr)) {
340 conn->OnReadPacket(data, size, packet_time);
341 } else {
342 Port::OnReadPacket(data, size, remote_addr, PROTO_UDP);
343 }
344}
345
stefanc1aeaf02015-10-15 07:26:07 -0700346void UDPPort::OnSentPacket(rtc::AsyncPacketSocket* socket,
347 const rtc::SentPacket& sent_packet) {
Stefan Holmer55674ff2016-01-14 15:49:16 +0100348 PortInterface::SignalSentPacket(sent_packet);
stefanc1aeaf02015-10-15 07:26:07 -0700349}
350
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000351void UDPPort::OnReadyToSend(rtc::AsyncPacketSocket* socket) {
352 Port::OnReadyToSend();
353}
354
355void UDPPort::SendStunBindingRequests() {
356 // We will keep pinging the stun server to make sure our NAT pin-hole stays
honghaiz45b0efd2015-12-04 08:57:26 -0800357 // open until the deadline (specified in SendStunBindingRequest).
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000358 ASSERT(requests_.empty());
359
360 for (ServerAddresses::const_iterator it = server_addresses_.begin();
361 it != server_addresses_.end(); ++it) {
362 SendStunBindingRequest(*it);
363 }
364}
365
366void UDPPort::ResolveStunAddress(const rtc::SocketAddress& stun_addr) {
367 if (!resolver_) {
368 resolver_.reset(new AddressResolver(socket_factory()));
369 resolver_->SignalDone.connect(this, &UDPPort::OnResolveResult);
370 }
371
Honghai Zhang0f490a52015-12-07 12:06:20 -0800372 LOG_J(LS_INFO, this) << "Starting STUN host lookup for "
373 << stun_addr.ToSensitiveString();
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000374 resolver_->Resolve(stun_addr);
375}
376
377void UDPPort::OnResolveResult(const rtc::SocketAddress& input,
378 int error) {
379 ASSERT(resolver_.get() != NULL);
380
381 rtc::SocketAddress resolved;
382 if (error != 0 ||
383 !resolver_->GetResolvedAddress(input, ip().family(), &resolved)) {
384 LOG_J(LS_WARNING, this) << "StunPort: stun host lookup received error "
385 << error;
386 OnStunBindingOrResolveRequestFailed(input);
387 return;
388 }
389
390 server_addresses_.erase(input);
391
392 if (server_addresses_.find(resolved) == server_addresses_.end()) {
393 server_addresses_.insert(resolved);
394 SendStunBindingRequest(resolved);
395 }
396}
397
tfarina20a34612015-11-02 16:20:22 -0800398void UDPPort::SendStunBindingRequest(const rtc::SocketAddress& stun_addr) {
399 if (stun_addr.IsUnresolvedIP()) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000400 ResolveStunAddress(stun_addr);
401
402 } else if (socket_->GetState() == rtc::AsyncPacketSocket::STATE_BOUND) {
403 // Check if |server_addr_| is compatible with the port's ip.
404 if (IsCompatibleAddress(stun_addr)) {
Honghai Zhang351d77b2016-05-20 15:08:29 -0700405 requests_.Send(
406 new StunBindingRequest(this, stun_addr, rtc::TimeMillis()));
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000407 } else {
408 // Since we can't send stun messages to the server, we should mark this
409 // port ready.
410 LOG(LS_WARNING) << "STUN server address is incompatible.";
411 OnStunBindingOrResolveRequestFailed(stun_addr);
412 }
413 }
414}
415
Guo-wei Shiehe03cab92015-11-11 11:11:19 -0800416bool UDPPort::MaybeSetDefaultLocalAddress(rtc::SocketAddress* addr) const {
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800417 if (!addr->IsAnyIP() || !emit_local_for_anyaddress_ ||
418 !Network()->default_local_address_provider()) {
Guo-wei Shiehe03cab92015-11-11 11:11:19 -0800419 return true;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800420 }
421 rtc::IPAddress default_address;
422 bool result =
423 Network()->default_local_address_provider()->GetDefaultLocalAddress(
424 addr->family(), &default_address);
Guo-wei Shieh953eabc2015-11-24 12:00:33 -0800425 if (!result || default_address.IsNil()) {
Guo-wei Shiehe03cab92015-11-11 11:11:19 -0800426 return false;
427 }
428
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800429 addr->SetIP(default_address);
Guo-wei Shiehe03cab92015-11-11 11:11:19 -0800430 return true;
Guo-wei Shieh9af97f82015-11-10 14:47:39 -0800431}
432
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000433void UDPPort::OnStunBindingRequestSucceeded(
434 const rtc::SocketAddress& stun_server_addr,
435 const rtc::SocketAddress& stun_reflected_addr) {
436 if (bind_request_succeeded_servers_.find(stun_server_addr) !=
437 bind_request_succeeded_servers_.end()) {
438 return;
439 }
440 bind_request_succeeded_servers_.insert(stun_server_addr);
441
442 // If socket is shared and |stun_reflected_addr| is equal to local socket
443 // address, or if the same address has been added by another STUN server,
444 // then discarding the stun address.
445 // For STUN, related address is the local socket address.
446 if ((!SharedSocket() || stun_reflected_addr != socket_->GetLocalAddress()) &&
447 !HasCandidateWithAddress(stun_reflected_addr)) {
448
449 rtc::SocketAddress related_address = socket_->GetLocalAddress();
Guo-wei Shiehe03cab92015-11-11 11:11:19 -0800450 // If we can't stamp the related address correctly, empty it to avoid leak.
451 if (!MaybeSetDefaultLocalAddress(&related_address) ||
452 !(candidate_filter() & CF_HOST)) {
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000453 // If candidate filter doesn't have CF_HOST specified, empty raddr to
454 // avoid local address leakage.
455 related_address = rtc::EmptySocketAddressWithFamily(
456 related_address.family());
457 }
458
Guo-wei Shieh3d564c12015-08-19 16:51:15 -0700459 AddAddress(stun_reflected_addr, socket_->GetLocalAddress(), related_address,
460 UDP_PROTOCOL_NAME, "", "", STUN_PORT_TYPE,
461 ICE_TYPE_PREFERENCE_SRFLX, 0, false);
henrike@webrtc.org269fb4b2014-10-28 22:20:11 +0000462 }
463 MaybeSetPortCompleteOrError();
464}
465
466void UDPPort::OnStunBindingOrResolveRequestFailed(
467 const rtc::SocketAddress& stun_server_addr) {
468 if (bind_request_failed_servers_.find(stun_server_addr) !=
469 bind_request_failed_servers_.end()) {
470 return;
471 }
472 bind_request_failed_servers_.insert(stun_server_addr);
473 MaybeSetPortCompleteOrError();
474}
475
476void UDPPort::MaybeSetPortCompleteOrError() {
477 if (ready_)
478 return;
479
480 // Do not set port ready if we are still waiting for bind responses.
481 const size_t servers_done_bind_request = bind_request_failed_servers_.size() +
482 bind_request_succeeded_servers_.size();
483 if (server_addresses_.size() != servers_done_bind_request) {
484 return;
485 }
486
487 // Setting ready status.
488 ready_ = true;
489
490 // The port is "completed" if there is no stun server provided, or the bind
491 // request succeeded for any stun server, or the socket is shared.
492 if (server_addresses_.empty() ||
493 bind_request_succeeded_servers_.size() > 0 ||
494 SharedSocket()) {
495 SignalPortComplete(this);
496 } else {
497 SignalPortError(this);
498 }
499}
500
501// TODO: merge this with SendTo above.
502void UDPPort::OnSendPacket(const void* data, size_t size, StunRequest* req) {
503 StunBindingRequest* sreq = static_cast<StunBindingRequest*>(req);
504 rtc::PacketOptions options(DefaultDscpValue());
505 if (socket_->SendTo(data, size, sreq->server_addr(), options) < 0)
506 PLOG(LERROR, socket_->GetError()) << "sendto";
507}
508
509bool UDPPort::HasCandidateWithAddress(const rtc::SocketAddress& addr) const {
510 const std::vector<Candidate>& existing_candidates = Candidates();
511 std::vector<Candidate>::const_iterator it = existing_candidates.begin();
512 for (; it != existing_candidates.end(); ++it) {
513 if (it->address() == addr)
514 return true;
515 }
516 return false;
517}
518
519} // namespace cricket