henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2004 The WebRTC Project Authors. All rights reserved. |
| 3 | * |
| 4 | * Use of this source code is governed by a BSD-style license |
| 5 | * that can be found in the LICENSE file in the root of the source |
| 6 | * tree. An additional intellectual property rights grant can be found |
| 7 | * in the file PATENTS. All contributing project authors may |
| 8 | * be found in the AUTHORS file in the root of the source tree. |
| 9 | */ |
| 10 | |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 11 | #include "p2p/base/stun_request.h" |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 12 | |
andresp@webrtc.org | ff689be | 2015-02-12 11:54:26 +0000 | [diff] [blame] | 13 | #include <algorithm> |
kwiberg | 3ec4679 | 2016-04-27 07:22:53 -0700 | [diff] [blame] | 14 | #include <memory> |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 15 | #include <utility> |
Steve Anton | 6c38cc7 | 2017-11-29 10:25:58 -0800 | [diff] [blame] | 16 | #include <vector> |
kwiberg | 3ec4679 | 2016-04-27 07:22:53 -0700 | [diff] [blame] | 17 | |
Tommi | 2545257 | 2022-04-12 12:51:40 +0200 | [diff] [blame] | 18 | #include "absl/memory/memory.h" |
Danil Chapovalov | 7b19036 | 2022-07-07 14:13:02 +0200 | [diff] [blame] | 19 | #include "api/task_queue/pending_task_safety_flag.h" |
Mirko Bonadei | 92ea95e | 2017-09-15 06:47:31 +0200 | [diff] [blame] | 20 | #include "rtc_base/checks.h" |
| 21 | #include "rtc_base/helpers.h" |
| 22 | #include "rtc_base/logging.h" |
Steve Anton | f417238 | 2020-01-27 15:45:02 -0800 | [diff] [blame] | 23 | #include "rtc_base/string_encode.h" |
Steve Anton | 10542f2 | 2019-01-11 09:11:00 -0800 | [diff] [blame] | 24 | #include "rtc_base/time_utils.h" // For TimeMillis |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 25 | |
| 26 | namespace cricket { |
Danil Chapovalov | 7b19036 | 2022-07-07 14:13:02 +0200 | [diff] [blame] | 27 | using ::webrtc::SafeTask; |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 28 | |
pthatcher | 94a2f21 | 2017-02-08 14:42:22 -0800 | [diff] [blame] | 29 | // RFC 5389 says SHOULD be 500ms. |
| 30 | // For years, this was 100ms, but for networks that |
| 31 | // experience moments of high RTT (such as 2G networks), this doesn't |
| 32 | // work well. |
| 33 | const int STUN_INITIAL_RTO = 250; // milliseconds |
| 34 | |
| 35 | // The timeout doubles each retransmission, up to this many times |
| 36 | // RFC 5389 says SHOULD retransmit 7 times. |
| 37 | // This has been 8 for years (not sure why). |
Jonas Olsson | a4d8737 | 2019-07-05 19:08:33 +0200 | [diff] [blame] | 38 | const int STUN_MAX_RETRANSMISSIONS = 8; // Total sends: 9 |
pthatcher | 94a2f21 | 2017-02-08 14:42:22 -0800 | [diff] [blame] | 39 | |
| 40 | // We also cap the doubling, even though the standard doesn't say to. |
| 41 | // This has been 1.6 seconds for years, but for networks that |
| 42 | // experience moments of high RTT (such as 2G networks), this doesn't |
| 43 | // work well. |
| 44 | const int STUN_MAX_RTO = 8000; // milliseconds, or 5 doublings |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 45 | |
Tomas Gunnarsson | f22dfdd | 2022-04-13 09:07:30 +0000 | [diff] [blame] | 46 | StunRequestManager::StunRequestManager( |
Tommi | 7ef4f51 | 2022-06-14 14:51:29 +0200 | [diff] [blame] | 47 | webrtc::TaskQueueBase* thread, |
Tomas Gunnarsson | f22dfdd | 2022-04-13 09:07:30 +0000 | [diff] [blame] | 48 | std::function<void(const void*, size_t, StunRequest*)> send_packet) |
| 49 | : thread_(thread), send_packet_(std::move(send_packet)) {} |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 50 | |
Tommi | 2545257 | 2022-04-12 12:51:40 +0200 | [diff] [blame] | 51 | StunRequestManager::~StunRequestManager() = default; |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 52 | |
| 53 | void StunRequestManager::Send(StunRequest* request) { |
| 54 | SendDelayed(request, 0); |
| 55 | } |
| 56 | |
| 57 | void StunRequestManager::SendDelayed(StunRequest* request, int delay) { |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 58 | RTC_DCHECK_RUN_ON(thread_); |
| 59 | RTC_DCHECK_EQ(this, request->manager()); |
Tommi | 2545257 | 2022-04-12 12:51:40 +0200 | [diff] [blame] | 60 | auto [iter, was_inserted] = |
| 61 | requests_.emplace(request->id(), absl::WrapUnique(request)); |
| 62 | RTC_DCHECK(was_inserted); |
Tommi | 7ef4f51 | 2022-06-14 14:51:29 +0200 | [diff] [blame] | 63 | request->Send(webrtc::TimeDelta::Millis(delay)); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 64 | } |
| 65 | |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 66 | void StunRequestManager::FlushForTest(int msg_type) { |
| 67 | RTC_DCHECK_RUN_ON(thread_); |
Tommi | 2545257 | 2022-04-12 12:51:40 +0200 | [diff] [blame] | 68 | for (const auto& [unused, request] : requests_) { |
Tommi | f7b30e0 | 2022-07-06 12:26:48 +0200 | [diff] [blame] | 69 | if (msg_type == kAllRequestsForTest || msg_type == request->type()) { |
Tommi | 7ef4f51 | 2022-06-14 14:51:29 +0200 | [diff] [blame] | 70 | // Calling `Send` implies starting the send operation which may be posted |
| 71 | // on a timer and be repeated on a timer until timeout. To make sure that |
| 72 | // a call to `Send` doesn't conflict with a previously started `Send` |
| 73 | // operation, we reset the `task_safety_` flag here, which has the effect |
| 74 | // of canceling any outstanding tasks and prepare a new flag for |
| 75 | // operations related to this call to `Send`. |
| 76 | request->ResetTasksForTest(); |
Philipp Hancke | a204ad2 | 2022-07-08 18:43:25 +0200 | [diff] [blame] | 77 | request->Send(webrtc::TimeDelta::Zero()); |
honghaiz | 6b9ab92 | 2016-01-05 09:06:12 -0800 | [diff] [blame] | 78 | } |
Honghai Zhang | 8597543 | 2015-11-12 11:07:12 -0800 | [diff] [blame] | 79 | } |
| 80 | } |
| 81 | |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 82 | bool StunRequestManager::HasRequestForTest(int msg_type) { |
| 83 | RTC_DCHECK_RUN_ON(thread_); |
Tommi | f7b30e0 | 2022-07-06 12:26:48 +0200 | [diff] [blame] | 84 | RTC_DCHECK_NE(msg_type, kAllRequestsForTest); |
Tommi | 2545257 | 2022-04-12 12:51:40 +0200 | [diff] [blame] | 85 | for (const auto& [unused, request] : requests_) { |
Tommi | f7b30e0 | 2022-07-06 12:26:48 +0200 | [diff] [blame] | 86 | if (msg_type == request->type()) { |
honghaiz | e2af9ef | 2016-03-03 08:27:47 -0800 | [diff] [blame] | 87 | return true; |
| 88 | } |
| 89 | } |
| 90 | return false; |
| 91 | } |
| 92 | |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 93 | void StunRequestManager::Clear() { |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 94 | RTC_DCHECK_RUN_ON(thread_); |
Tommi | 2545257 | 2022-04-12 12:51:40 +0200 | [diff] [blame] | 95 | requests_.clear(); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 96 | } |
| 97 | |
| 98 | bool StunRequestManager::CheckResponse(StunMessage* msg) { |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 99 | RTC_DCHECK_RUN_ON(thread_); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 100 | RequestMap::iterator iter = requests_.find(msg->transaction_id()); |
Tommi | 7ef4f51 | 2022-06-14 14:51:29 +0200 | [diff] [blame] | 101 | if (iter == requests_.end()) |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 102 | return false; |
| 103 | |
Tommi | 2545257 | 2022-04-12 12:51:40 +0200 | [diff] [blame] | 104 | StunRequest* request = iter->second.get(); |
Harald Alvestrand | 07d83c8 | 2021-03-02 08:09:53 +0000 | [diff] [blame] | 105 | |
| 106 | // Now that we know the request, we can see if the response is |
| 107 | // integrity-protected or not. |
| 108 | // For some tests, the message integrity is not set in the request. |
| 109 | // Complain, and then don't check. |
Harald Alvestrand | 4762762 | 2022-10-13 09:57:05 +0000 | [diff] [blame^] | 110 | bool skip_integrity_checking = |
| 111 | (request->msg()->integrity() == StunMessage::IntegrityStatus::kNotSet); |
| 112 | if (skip_integrity_checking) { |
| 113 | // This indicates lazy test writing (not adding integrity attribute). |
| 114 | // Complain, but only in debug mode (while developing). |
| 115 | RTC_DLOG(LS_ERROR) |
| 116 | << "CheckResponse called on a passwordless request. Fix test!"; |
Harald Alvestrand | 07d83c8 | 2021-03-02 08:09:53 +0000 | [diff] [blame] | 117 | } else { |
Harald Alvestrand | 4762762 | 2022-10-13 09:57:05 +0000 | [diff] [blame^] | 118 | if (msg->integrity() == StunMessage::IntegrityStatus::kNotSet) { |
| 119 | // Checking status for the first time. Normal. |
| 120 | msg->ValidateMessageIntegrity(request->msg()->password()); |
| 121 | } else if (msg->integrity() == StunMessage::IntegrityStatus::kIntegrityOk && |
| 122 | msg->password() == request->msg()->password()) { |
| 123 | // Status is already checked, with the same password. This is the case |
| 124 | // we would want to see happen. |
| 125 | } else if (msg->integrity() == |
| 126 | StunMessage::IntegrityStatus::kIntegrityBad) { |
| 127 | // This indicates that the original check had the wrong password. |
| 128 | // Bad design, needs revisiting. |
| 129 | // TODO(crbug.com/1177125): Fix this. |
| 130 | msg->RevalidateMessageIntegrity(request->msg()->password()); |
| 131 | } else { |
| 132 | RTC_CHECK_NOTREACHED(); |
| 133 | } |
Harald Alvestrand | 07d83c8 | 2021-03-02 08:09:53 +0000 | [diff] [blame] | 134 | } |
| 135 | |
Tommi | 2545257 | 2022-04-12 12:51:40 +0200 | [diff] [blame] | 136 | bool success = true; |
| 137 | |
Taylor Brandstetter | fb4351b | 2020-03-23 16:00:31 -0700 | [diff] [blame] | 138 | if (!msg->GetNonComprehendedAttributes().empty()) { |
| 139 | // If a response contains unknown comprehension-required attributes, it's |
| 140 | // simply discarded and the transaction is considered failed. See RFC5389 |
| 141 | // sections 7.3.3 and 7.3.4. |
| 142 | RTC_LOG(LS_ERROR) << ": Discarding response due to unknown " |
| 143 | "comprehension-required attribute."; |
Tommi | 2545257 | 2022-04-12 12:51:40 +0200 | [diff] [blame] | 144 | success = false; |
Taylor Brandstetter | fb4351b | 2020-03-23 16:00:31 -0700 | [diff] [blame] | 145 | } else if (msg->type() == GetStunSuccessResponseType(request->type())) { |
Harald Alvestrand | 07d83c8 | 2021-03-02 08:09:53 +0000 | [diff] [blame] | 146 | if (!msg->IntegrityOk() && !skip_integrity_checking) { |
| 147 | return false; |
| 148 | } |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 149 | request->OnResponse(msg); |
| 150 | } else if (msg->type() == GetStunErrorResponseType(request->type())) { |
| 151 | request->OnErrorResponse(msg); |
| 152 | } else { |
Harald Alvestrand | 5f34130 | 2021-11-24 10:01:32 +0000 | [diff] [blame] | 153 | RTC_LOG(LS_ERROR) << "Received response with wrong type: " << msg->type() |
| 154 | << " (expecting " |
| 155 | << GetStunSuccessResponseType(request->type()) << ")"; |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 156 | return false; |
| 157 | } |
| 158 | |
Tommi | 2545257 | 2022-04-12 12:51:40 +0200 | [diff] [blame] | 159 | requests_.erase(iter); |
| 160 | return success; |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 161 | } |
| 162 | |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 163 | bool StunRequestManager::empty() const { |
| 164 | RTC_DCHECK_RUN_ON(thread_); |
| 165 | return requests_.empty(); |
| 166 | } |
| 167 | |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 168 | bool StunRequestManager::CheckResponse(const char* data, size_t size) { |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 169 | RTC_DCHECK_RUN_ON(thread_); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 170 | // Check the appropriate bytes of the stream to see if they match the |
| 171 | // transaction ID of a response we are expecting. |
| 172 | |
| 173 | if (size < 20) |
| 174 | return false; |
| 175 | |
| 176 | std::string id; |
| 177 | id.append(data + kStunTransactionIdOffset, kStunTransactionIdLength); |
| 178 | |
| 179 | RequestMap::iterator iter = requests_.find(id); |
Tommi | 7ef4f51 | 2022-06-14 14:51:29 +0200 | [diff] [blame] | 180 | if (iter == requests_.end()) |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 181 | return false; |
| 182 | |
| 183 | // Parse the STUN message and continue processing as usual. |
| 184 | |
jbauch | f1f8720 | 2016-03-30 06:43:37 -0700 | [diff] [blame] | 185 | rtc::ByteBufferReader buf(data, size); |
kwiberg | 3ec4679 | 2016-04-27 07:22:53 -0700 | [diff] [blame] | 186 | std::unique_ptr<StunMessage> response(iter->second->msg_->CreateNew()); |
Peter Thatcher | 1cf6f81 | 2015-05-15 10:40:45 -0700 | [diff] [blame] | 187 | if (!response->Read(&buf)) { |
Mirko Bonadei | 675513b | 2017-11-09 11:09:25 +0100 | [diff] [blame] | 188 | RTC_LOG(LS_WARNING) << "Failed to read STUN response " |
| 189 | << rtc::hex_encode(id); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 190 | return false; |
Peter Thatcher | 1cf6f81 | 2015-05-15 10:40:45 -0700 | [diff] [blame] | 191 | } |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 192 | |
| 193 | return CheckResponse(response.get()); |
| 194 | } |
| 195 | |
Tommi | 2545257 | 2022-04-12 12:51:40 +0200 | [diff] [blame] | 196 | void StunRequestManager::OnRequestTimedOut(StunRequest* request) { |
| 197 | RTC_DCHECK_RUN_ON(thread_); |
| 198 | requests_.erase(request->id()); |
| 199 | } |
| 200 | |
Tomas Gunnarsson | f22dfdd | 2022-04-13 09:07:30 +0000 | [diff] [blame] | 201 | void StunRequestManager::SendPacket(const void* data, |
| 202 | size_t size, |
| 203 | StunRequest* request) { |
| 204 | RTC_DCHECK_EQ(this, request->manager()); |
| 205 | send_packet_(data, size, request); |
| 206 | } |
| 207 | |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 208 | StunRequest::StunRequest(StunRequestManager& manager) |
| 209 | : manager_(manager), |
Tommi | 408143d | 2022-06-01 15:29:31 +0200 | [diff] [blame] | 210 | msg_(new StunMessage(STUN_INVALID_MESSAGE_TYPE)), |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 211 | tstamp_(0), |
| 212 | count_(0), |
Tommi | 7ef4f51 | 2022-06-14 14:51:29 +0200 | [diff] [blame] | 213 | timeout_(false) { |
| 214 | RTC_DCHECK_RUN_ON(network_thread()); |
| 215 | } |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 216 | |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 217 | StunRequest::StunRequest(StunRequestManager& manager, |
Tommi | 278b19d | 2022-04-12 14:03:40 +0200 | [diff] [blame] | 218 | std::unique_ptr<StunMessage> message) |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 219 | : manager_(manager), |
Tommi | 278b19d | 2022-04-12 14:03:40 +0200 | [diff] [blame] | 220 | msg_(std::move(message)), |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 221 | tstamp_(0), |
| 222 | count_(0), |
| 223 | timeout_(false) { |
Tommi | 7ef4f51 | 2022-06-14 14:51:29 +0200 | [diff] [blame] | 224 | RTC_DCHECK_RUN_ON(network_thread()); |
Tommi | 408143d | 2022-06-01 15:29:31 +0200 | [diff] [blame] | 225 | RTC_DCHECK(!msg_->transaction_id().empty()); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 226 | } |
| 227 | |
Tommi | 7ef4f51 | 2022-06-14 14:51:29 +0200 | [diff] [blame] | 228 | StunRequest::~StunRequest() {} |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 229 | |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 230 | int StunRequest::type() { |
nisse | ede5da4 | 2017-01-12 05:15:36 -0800 | [diff] [blame] | 231 | RTC_DCHECK(msg_ != NULL); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 232 | return msg_->type(); |
| 233 | } |
| 234 | |
| 235 | const StunMessage* StunRequest::msg() const { |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 236 | return msg_.get(); |
Jonas Oreland | bdcee28 | 2017-10-10 14:01:40 +0200 | [diff] [blame] | 237 | } |
| 238 | |
honghaiz | 34b11eb | 2016-03-16 08:55:44 -0700 | [diff] [blame] | 239 | int StunRequest::Elapsed() const { |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 240 | RTC_DCHECK_RUN_ON(network_thread()); |
nisse | 1bffc1d | 2016-05-02 08:18:55 -0700 | [diff] [blame] | 241 | return static_cast<int>(rtc::TimeMillis() - tstamp_); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 242 | } |
| 243 | |
Tommi | 7ef4f51 | 2022-06-14 14:51:29 +0200 | [diff] [blame] | 244 | void StunRequest::SendInternal() { |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 245 | RTC_DCHECK_RUN_ON(network_thread()); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 246 | if (timeout_) { |
| 247 | OnTimeout(); |
Tommi | 2545257 | 2022-04-12 12:51:40 +0200 | [diff] [blame] | 248 | manager_.OnRequestTimedOut(this); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 249 | return; |
| 250 | } |
| 251 | |
nisse | 1bffc1d | 2016-05-02 08:18:55 -0700 | [diff] [blame] | 252 | tstamp_ = rtc::TimeMillis(); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 253 | |
jbauch | f1f8720 | 2016-03-30 06:43:37 -0700 | [diff] [blame] | 254 | rtc::ByteBufferWriter buf; |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 255 | msg_->Write(&buf); |
Tomas Gunnarsson | f22dfdd | 2022-04-13 09:07:30 +0000 | [diff] [blame] | 256 | manager_.SendPacket(buf.Data(), buf.Length(), this); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 257 | |
Peter Thatcher | 1cf6f81 | 2015-05-15 10:40:45 -0700 | [diff] [blame] | 258 | OnSent(); |
Tommi | 7ef4f51 | 2022-06-14 14:51:29 +0200 | [diff] [blame] | 259 | SendDelayed(webrtc::TimeDelta::Millis(resend_delay())); |
| 260 | } |
| 261 | |
| 262 | void StunRequest::SendDelayed(webrtc::TimeDelta delay) { |
| 263 | network_thread()->PostDelayedTask( |
Danil Chapovalov | 7b19036 | 2022-07-07 14:13:02 +0200 | [diff] [blame] | 264 | SafeTask(task_safety_.flag(), [this]() { SendInternal(); }), delay); |
Tommi | 7ef4f51 | 2022-06-14 14:51:29 +0200 | [diff] [blame] | 265 | } |
| 266 | |
| 267 | void StunRequest::Send(webrtc::TimeDelta delay) { |
| 268 | RTC_DCHECK_RUN_ON(network_thread()); |
| 269 | RTC_DCHECK_GE(delay.ms(), 0); |
| 270 | |
| 271 | RTC_DCHECK(!task_safety_.flag()->alive()) << "Send already called?"; |
| 272 | task_safety_.flag()->SetAlive(); |
| 273 | |
| 274 | delay.IsZero() ? SendInternal() : SendDelayed(delay); |
| 275 | } |
| 276 | |
| 277 | void StunRequest::ResetTasksForTest() { |
| 278 | RTC_DCHECK_RUN_ON(network_thread()); |
| 279 | task_safety_.reset(webrtc::PendingTaskSafetyFlag::CreateDetachedInactive()); |
| 280 | count_ = 0; |
| 281 | RTC_DCHECK(!timeout_); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 282 | } |
| 283 | |
Peter Thatcher | 1cf6f81 | 2015-05-15 10:40:45 -0700 | [diff] [blame] | 284 | void StunRequest::OnSent() { |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 285 | RTC_DCHECK_RUN_ON(network_thread()); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 286 | count_ += 1; |
pthatcher | 94a2f21 | 2017-02-08 14:42:22 -0800 | [diff] [blame] | 287 | int retransmissions = (count_ - 1); |
Mirko Bonadei | f387946 | 2020-04-14 13:44:09 +0200 | [diff] [blame] | 288 | if (retransmissions >= STUN_MAX_RETRANSMISSIONS) { |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 289 | timeout_ = true; |
Taylor Brandstetter | 5ef034a | 2016-05-25 17:20:35 -0700 | [diff] [blame] | 290 | } |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 291 | RTC_DLOG(LS_VERBOSE) << "Sent STUN request " << count_ |
| 292 | << "; resend delay = " << resend_delay(); |
Peter Thatcher | 1cf6f81 | 2015-05-15 10:40:45 -0700 | [diff] [blame] | 293 | } |
| 294 | |
| 295 | int StunRequest::resend_delay() { |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 296 | RTC_DCHECK_RUN_ON(network_thread()); |
Peter Thatcher | 1cf6f81 | 2015-05-15 10:40:45 -0700 | [diff] [blame] | 297 | if (count_ == 0) { |
| 298 | return 0; |
| 299 | } |
pthatcher | 94a2f21 | 2017-02-08 14:42:22 -0800 | [diff] [blame] | 300 | int retransmissions = (count_ - 1); |
| 301 | int rto = STUN_INITIAL_RTO << retransmissions; |
| 302 | return std::min(rto, STUN_MAX_RTO); |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 303 | } |
| 304 | |
Tommi | 86aa03e | 2022-04-12 09:17:57 +0200 | [diff] [blame] | 305 | void StunRequest::set_timed_out() { |
| 306 | RTC_DCHECK_RUN_ON(network_thread()); |
| 307 | timeout_ = true; |
| 308 | } |
| 309 | |
henrike@webrtc.org | 269fb4b | 2014-10-28 22:20:11 +0000 | [diff] [blame] | 310 | } // namespace cricket |