OLD | NEW |
| (Empty) |
1 /* | |
2 * Copyright (c) 2012 The WebRTC project authors. All Rights Reserved. | |
3 * | |
4 * Use of this source code is governed by a BSD-style license | |
5 * that can be found in the LICENSE file in the root of the source | |
6 * tree. An additional intellectual property rights grant can be found | |
7 * in the file PATENTS. All contributing project authors may | |
8 * be found in the AUTHORS file in the root of the source tree. | |
9 */ | |
10 | |
11 #include "webrtc/test/channel_transport/udp_transport_impl.h" | |
12 | |
13 #include <stdio.h> | |
14 #include <stdlib.h> | |
15 #include <string.h> | |
16 #include <time.h> | |
17 | |
18 #if defined(_WIN32) | |
19 #include <winsock2.h> | |
20 #include <ws2tcpip.h> | |
21 #elif defined(WEBRTC_LINUX) || defined(WEBRTC_MAC) | |
22 #include <arpa/inet.h> | |
23 #include <ctype.h> | |
24 #include <fcntl.h> | |
25 #include <net/if.h> | |
26 #include <netdb.h> | |
27 #include <netinet/in.h> | |
28 #include <stdlib.h> | |
29 #include <sys/ioctl.h> | |
30 #include <sys/socket.h> | |
31 #include <sys/time.h> | |
32 #include <unistd.h> | |
33 #ifndef WEBRTC_IOS | |
34 #include <net/if_arp.h> | |
35 #endif | |
36 #endif // defined(WEBRTC_LINUX) || defined(WEBRTC_MAC) | |
37 | |
38 #if defined(WEBRTC_MAC) | |
39 #include <ifaddrs.h> | |
40 #include <machine/types.h> | |
41 #endif | |
42 #if defined(WEBRTC_LINUX) | |
43 #include <linux/netlink.h> | |
44 #include <linux/rtnetlink.h> | |
45 #endif | |
46 | |
47 #include "webrtc/common_types.h" | |
48 #include "webrtc/system_wrappers/include/critical_section_wrapper.h" | |
49 #include "webrtc/system_wrappers/include/rw_lock_wrapper.h" | |
50 #include "webrtc/system_wrappers/include/trace.h" | |
51 #include "webrtc/test/channel_transport/udp_socket_manager_wrapper.h" | |
52 #include "webrtc/typedefs.h" | |
53 | |
54 #if defined(WEBRTC_LINUX) || defined(WEBRTC_MAC) | |
55 #define GetLastError() errno | |
56 | |
57 #define IFRSIZE ((int)(size * sizeof (struct ifreq))) | |
58 | |
59 #define NLMSG_OK_NO_WARNING(nlh,len) \ | |
60 ((len) >= (int)sizeof(struct nlmsghdr) && \ | |
61 (int)(nlh)->nlmsg_len >= (int)sizeof(struct nlmsghdr) && \ | |
62 (int)(nlh)->nlmsg_len <= (len)) | |
63 | |
64 #endif // defined(WEBRTC_LINUX) || defined(WEBRTC_MAC) | |
65 | |
66 namespace webrtc { | |
67 namespace test { | |
68 | |
69 class SocketFactory : public UdpTransportImpl::SocketFactoryInterface { | |
70 public: | |
71 UdpSocketWrapper* CreateSocket(const int32_t id, | |
72 UdpSocketManager* mgr, | |
73 CallbackObj obj, | |
74 IncomingSocketCallback cb, | |
75 bool ipV6Enable, | |
76 bool disableGQOS) override { | |
77 return UdpSocketWrapper::CreateSocket(id, mgr, obj, cb, ipV6Enable, | |
78 disableGQOS); | |
79 } | |
80 }; | |
81 | |
82 // Creates an UdpTransport using the definition of SocketFactory above, | |
83 // and passes (creating if needed) a pointer to the static singleton | |
84 // UdpSocketManager. | |
85 UdpTransport* UdpTransport::Create(const int32_t id, | |
86 uint8_t& numSocketThreads) | |
87 { | |
88 return new UdpTransportImpl(id, | |
89 new SocketFactory(), | |
90 UdpSocketManager::Create(id, numSocketThreads)); | |
91 } | |
92 | |
93 // Deletes the UdpTransport and decrements the refcount of the | |
94 // static singleton UdpSocketManager, possibly destroying it. | |
95 // Should only be used on UdpTransports that are created using Create. | |
96 void UdpTransport::Destroy(UdpTransport* module) | |
97 { | |
98 if(module) | |
99 { | |
100 delete module; | |
101 UdpSocketManager::Return(); | |
102 } | |
103 } | |
104 | |
105 UdpTransportImpl::UdpTransportImpl(const int32_t id, | |
106 SocketFactoryInterface* maker, | |
107 UdpSocketManager* socket_manager) | |
108 : _id(id), | |
109 _socket_creator(maker), | |
110 _crit(CriticalSectionWrapper::CreateCriticalSection()), | |
111 _critFilter(CriticalSectionWrapper::CreateCriticalSection()), | |
112 _critPacketCallback(CriticalSectionWrapper::CreateCriticalSection()), | |
113 _mgr(socket_manager), | |
114 _lastError(kNoSocketError), | |
115 _destPort(0), | |
116 _destPortRTCP(0), | |
117 _localPort(0), | |
118 _localPortRTCP(0), | |
119 _srcPort(0), | |
120 _srcPortRTCP(0), | |
121 _fromPort(0), | |
122 _fromPortRTCP(0), | |
123 _fromIP(), | |
124 _destIP(), | |
125 _localIP(), | |
126 _localMulticastIP(), | |
127 _ptrRtpSocket(NULL), | |
128 _ptrRtcpSocket(NULL), | |
129 _ptrSendRtpSocket(NULL), | |
130 _ptrSendRtcpSocket(NULL), | |
131 _remoteRTPAddr(), | |
132 _remoteRTCPAddr(), | |
133 _localRTPAddr(), | |
134 _localRTCPAddr(), | |
135 _tos(0), | |
136 _receiving(false), | |
137 _useSetSockOpt(false), | |
138 _qos(false), | |
139 _pcp(0), | |
140 _ipV6Enabled(false), | |
141 _serviceType(0), | |
142 _overrideDSCP(0), | |
143 _maxBitrate(0), | |
144 _cachLock(RWLockWrapper::CreateRWLock()), | |
145 _previousAddress(), | |
146 _previousIP(), | |
147 _previousIPSize(0), | |
148 _previousSourcePort(0), | |
149 _filterIPAddress(), | |
150 _rtpFilterPort(0), | |
151 _rtcpFilterPort(0), | |
152 _packetCallback(0) | |
153 { | |
154 memset(&_remoteRTPAddr, 0, sizeof(_remoteRTPAddr)); | |
155 memset(&_remoteRTCPAddr, 0, sizeof(_remoteRTCPAddr)); | |
156 memset(&_localRTPAddr, 0, sizeof(_localRTPAddr)); | |
157 memset(&_localRTCPAddr, 0, sizeof(_localRTCPAddr)); | |
158 | |
159 memset(_fromIP, 0, sizeof(_fromIP)); | |
160 memset(_destIP, 0, sizeof(_destIP)); | |
161 memset(_localIP, 0, sizeof(_localIP)); | |
162 memset(_localMulticastIP, 0, sizeof(_localMulticastIP)); | |
163 | |
164 memset(&_filterIPAddress, 0, sizeof(_filterIPAddress)); | |
165 | |
166 WEBRTC_TRACE(kTraceMemory, kTraceTransport, id, "%s created", __FUNCTION__); | |
167 } | |
168 | |
169 UdpTransportImpl::~UdpTransportImpl() | |
170 { | |
171 CloseSendSockets(); | |
172 CloseReceiveSockets(); | |
173 delete _crit; | |
174 delete _critFilter; | |
175 delete _critPacketCallback; | |
176 delete _cachLock; | |
177 delete _socket_creator; | |
178 | |
179 WEBRTC_TRACE(kTraceMemory, kTraceTransport, _id, "%s deleted", | |
180 __FUNCTION__); | |
181 } | |
182 | |
183 UdpTransport::ErrorCode UdpTransportImpl::LastError() const | |
184 { | |
185 return _lastError; | |
186 } | |
187 | |
188 bool SameAddress(const SocketAddress& address1, const SocketAddress& address2) | |
189 { | |
190 return (memcmp(&address1,&address2,sizeof(address1)) == 0); | |
191 } | |
192 | |
193 void UdpTransportImpl::GetCachedAddress(char* ip, | |
194 uint32_t& ipSize, | |
195 uint16_t& sourcePort) | |
196 { | |
197 const uint32_t originalIPSize = ipSize; | |
198 // If the incoming string is too small, fill it as much as there is room | |
199 // for. Make sure that there is room for the '\0' character. | |
200 ipSize = (ipSize - 1 < _previousIPSize) ? ipSize - 1 : _previousIPSize; | |
201 memcpy(ip,_previousIP,sizeof(int8_t)*(ipSize + 1)); | |
202 ip[originalIPSize - 1] = '\0'; | |
203 sourcePort = _previousSourcePort; | |
204 } | |
205 | |
206 int32_t UdpTransportImpl::IPAddressCached(const SocketAddress& address, | |
207 char* ip, | |
208 uint32_t& ipSize, | |
209 uint16_t& sourcePort) | |
210 { | |
211 { | |
212 ReadLockScoped rl(*_cachLock); | |
213 // Check if the old address can be re-used (is the same). | |
214 if(SameAddress(address,_previousAddress)) | |
215 { | |
216 GetCachedAddress(ip,ipSize,sourcePort); | |
217 return 0; | |
218 } | |
219 } | |
220 // Get the new address and store it. | |
221 WriteLockScoped wl(*_cachLock); | |
222 ipSize = kIpAddressVersion6Length; | |
223 if(IPAddress(address,_previousIP,ipSize,_previousSourcePort) != 0) | |
224 { | |
225 return -1; | |
226 } | |
227 _previousIPSize = ipSize; | |
228 memcpy(&_previousAddress, &address, sizeof(address)); | |
229 // Address has been cached at this point. | |
230 GetCachedAddress(ip,ipSize,sourcePort); | |
231 return 0; | |
232 } | |
233 | |
234 int32_t UdpTransportImpl::InitializeReceiveSockets( | |
235 UdpTransportData* const packetCallback, | |
236 const uint16_t portnr, | |
237 const char* ip, | |
238 const char* multicastIpAddr, | |
239 const uint16_t rtcpPort) | |
240 { | |
241 { | |
242 CriticalSectionScoped cs(_critPacketCallback); | |
243 _packetCallback = packetCallback; | |
244 | |
245 if(packetCallback == NULL) | |
246 { | |
247 WEBRTC_TRACE(kTraceStateInfo, kTraceTransport, _id, | |
248 "Closing down receive sockets"); | |
249 return 0; | |
250 } | |
251 } | |
252 | |
253 CriticalSectionScoped cs(_crit); | |
254 CloseReceiveSockets(); | |
255 | |
256 if(portnr == 0) | |
257 { | |
258 // TODO (hellner): why not just fail here? | |
259 if(_destPort == 0) | |
260 { | |
261 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
262 "InitializeReceiveSockets port 0 not allowed"); | |
263 _lastError = kPortInvalid; | |
264 return -1; | |
265 } | |
266 _localPort = _destPort; | |
267 } else { | |
268 _localPort = portnr; | |
269 } | |
270 if(rtcpPort) | |
271 { | |
272 _localPortRTCP = rtcpPort; | |
273 }else { | |
274 _localPortRTCP = _localPort + 1; | |
275 WEBRTC_TRACE( | |
276 kTraceStateInfo, | |
277 kTraceTransport, | |
278 _id, | |
279 "InitializeReceiveSockets RTCP port not configured using RTP\ | |
280 port+1=%d", | |
281 _localPortRTCP); | |
282 } | |
283 | |
284 if(ip) | |
285 { | |
286 if(IsIpAddressValid(ip,IpV6Enabled())) | |
287 { | |
288 strncpy(_localIP, ip,kIpAddressVersion6Length); | |
289 } else | |
290 { | |
291 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
292 "InitializeReceiveSockets invalid IP address"); | |
293 _lastError = kIpAddressInvalid; | |
294 return -1; | |
295 } | |
296 }else | |
297 { | |
298 // Don't bind to a specific IP address. | |
299 if(! IpV6Enabled()) | |
300 { | |
301 strncpy(_localIP, "0.0.0.0",16); | |
302 } else | |
303 { | |
304 strncpy(_localIP, "0000:0000:0000:0000:0000:0000:0000:0000", | |
305 kIpAddressVersion6Length); | |
306 } | |
307 } | |
308 if(multicastIpAddr && !IpV6Enabled()) | |
309 { | |
310 if(IsIpAddressValid(multicastIpAddr,IpV6Enabled())) | |
311 { | |
312 strncpy(_localMulticastIP, multicastIpAddr, | |
313 kIpAddressVersion6Length); | |
314 } else | |
315 { | |
316 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
317 "InitializeReceiveSockets invalid IP address"); | |
318 _lastError = kIpAddressInvalid; | |
319 return -1; | |
320 } | |
321 } | |
322 if(_mgr == NULL) | |
323 { | |
324 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
325 "InitializeReceiveSockets no socket manager"); | |
326 return -1; | |
327 } | |
328 | |
329 _useSetSockOpt=false; | |
330 _tos=0; | |
331 _pcp=0; | |
332 | |
333 _ptrRtpSocket = _socket_creator->CreateSocket(_id, _mgr, this, | |
334 IncomingRTPCallback, | |
335 IpV6Enabled(), false); | |
336 | |
337 _ptrRtcpSocket = _socket_creator->CreateSocket(_id, _mgr, this, | |
338 IncomingRTCPCallback, | |
339 IpV6Enabled(), false); | |
340 | |
341 ErrorCode retVal = BindLocalRTPSocket(); | |
342 if(retVal != kNoSocketError) | |
343 { | |
344 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
345 "InitializeReceiveSockets faild to bind RTP socket"); | |
346 _lastError = retVal; | |
347 CloseReceiveSockets(); | |
348 return -1; | |
349 } | |
350 retVal = BindLocalRTCPSocket(); | |
351 if(retVal != kNoSocketError) | |
352 { | |
353 _lastError = retVal; | |
354 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
355 "InitializeReceiveSockets faild to bind RTCP socket"); | |
356 CloseReceiveSockets(); | |
357 return -1; | |
358 } | |
359 return 0; | |
360 } | |
361 | |
362 int32_t UdpTransportImpl::ReceiveSocketInformation( | |
363 char ipAddr[kIpAddressVersion6Length], | |
364 uint16_t& rtpPort, | |
365 uint16_t& rtcpPort, | |
366 char multicastIpAddr[kIpAddressVersion6Length]) const | |
367 { | |
368 CriticalSectionScoped cs(_crit); | |
369 rtpPort = _localPort; | |
370 rtcpPort = _localPortRTCP; | |
371 if (ipAddr) | |
372 { | |
373 strncpy(ipAddr, _localIP, IpV6Enabled() ? | |
374 UdpTransport::kIpAddressVersion6Length : | |
375 UdpTransport::kIpAddressVersion4Length); | |
376 } | |
377 if (multicastIpAddr) | |
378 { | |
379 strncpy(multicastIpAddr, _localMulticastIP, IpV6Enabled() ? | |
380 UdpTransport::kIpAddressVersion6Length : | |
381 UdpTransport::kIpAddressVersion4Length); | |
382 } | |
383 return 0; | |
384 } | |
385 | |
386 int32_t UdpTransportImpl::SendSocketInformation( | |
387 char ipAddr[kIpAddressVersion6Length], | |
388 uint16_t& rtpPort, | |
389 uint16_t& rtcpPort) const | |
390 { | |
391 CriticalSectionScoped cs(_crit); | |
392 rtpPort = _destPort; | |
393 rtcpPort = _destPortRTCP; | |
394 strncpy(ipAddr, _destIP, IpV6Enabled() ? | |
395 UdpTransport::kIpAddressVersion6Length : | |
396 UdpTransport::kIpAddressVersion4Length); | |
397 return 0; | |
398 } | |
399 | |
400 int32_t UdpTransportImpl::RemoteSocketInformation( | |
401 char ipAddr[kIpAddressVersion6Length], | |
402 uint16_t& rtpPort, | |
403 uint16_t& rtcpPort) const | |
404 { | |
405 CriticalSectionScoped cs(_crit); | |
406 rtpPort = _fromPort; | |
407 rtcpPort = _fromPortRTCP; | |
408 if(ipAddr) | |
409 { | |
410 strncpy(ipAddr, _fromIP, IpV6Enabled() ? | |
411 kIpAddressVersion6Length : | |
412 kIpAddressVersion4Length); | |
413 } | |
414 return 0; | |
415 } | |
416 | |
417 int32_t UdpTransportImpl::FilterPorts( | |
418 uint16_t& rtpFilterPort, | |
419 uint16_t& rtcpFilterPort) const | |
420 { | |
421 CriticalSectionScoped cs(_critFilter); | |
422 rtpFilterPort = _rtpFilterPort; | |
423 rtcpFilterPort = _rtcpFilterPort; | |
424 return 0; | |
425 } | |
426 | |
427 int32_t UdpTransportImpl::SetQoS(bool QoS, int32_t serviceType, | |
428 uint32_t maxBitrate, | |
429 int32_t overrideDSCP, bool audio) | |
430 { | |
431 if(QoS) | |
432 { | |
433 return EnableQoS(serviceType, audio, maxBitrate, overrideDSCP); | |
434 }else | |
435 { | |
436 return DisableQoS(); | |
437 } | |
438 } | |
439 | |
440 int32_t UdpTransportImpl::EnableQoS(int32_t serviceType, | |
441 bool audio, uint32_t maxBitrate, | |
442 int32_t overrideDSCP) | |
443 { | |
444 if (_ipV6Enabled) | |
445 { | |
446 WEBRTC_TRACE( | |
447 kTraceError, | |
448 kTraceTransport, | |
449 _id, | |
450 "QOS is enabled but will be ignored since IPv6 is enabled"); | |
451 _lastError = kQosError; | |
452 return -1; | |
453 } | |
454 if (_tos) | |
455 { | |
456 WEBRTC_TRACE( | |
457 kTraceError, | |
458 kTraceTransport, | |
459 _id, | |
460 "TOS already enabled, can't use TOS and QoS at the same time"); | |
461 _lastError = kQosError; | |
462 return -1; | |
463 } | |
464 if (_pcp) | |
465 { | |
466 WEBRTC_TRACE( | |
467 kTraceError, | |
468 kTraceTransport, | |
469 _id, | |
470 "PCP already enabled, can't use PCP and QoS at the same time"); | |
471 _lastError = kQosError; | |
472 return -1; | |
473 } | |
474 if(_destPort == 0) | |
475 { | |
476 WEBRTC_TRACE( | |
477 kTraceError, | |
478 kTraceTransport, | |
479 _id, | |
480 "QOS is enabled but not started since we have not yet configured\ | |
481 the send destination"); | |
482 return -1; | |
483 } | |
484 if(_qos) | |
485 { | |
486 if(_overrideDSCP == 0 && overrideDSCP != 0) | |
487 { | |
488 WEBRTC_TRACE( | |
489 kTraceError, | |
490 kTraceTransport, | |
491 _id, | |
492 "QOS is already enabled and overrideDSCP differs, not allowed"); | |
493 return -1; | |
494 } | |
495 } | |
496 CriticalSectionScoped cs(_crit); | |
497 | |
498 UdpSocketWrapper* rtpSock = _ptrSendRtpSocket ? | |
499 _ptrSendRtpSocket : | |
500 _ptrRtpSocket; | |
501 if (!rtpSock || !rtpSock->ValidHandle()) | |
502 { | |
503 WEBRTC_TRACE( | |
504 kTraceError, | |
505 kTraceTransport, | |
506 _id, | |
507 "QOS is enabled but not started since we have not yet created the\ | |
508 RTP socket"); | |
509 return -1; | |
510 } | |
511 UdpSocketWrapper* rtcpSock = _ptrSendRtcpSocket ? | |
512 _ptrSendRtcpSocket : | |
513 _ptrRtcpSocket; | |
514 if (!rtcpSock || !rtcpSock->ValidHandle()) | |
515 { | |
516 WEBRTC_TRACE( | |
517 kTraceError, | |
518 kTraceTransport, | |
519 _id, | |
520 "QOS is enabled but not started since we have not yet created the\ | |
521 RTCP socket"); | |
522 return -1; | |
523 } | |
524 | |
525 // Minimum packet size in bytes for which the requested quality of service | |
526 // will be provided. The smallest RTP header is 12 byte. | |
527 const int32_t min_policed_size = 12; | |
528 // Max SDU, maximum packet size permitted or used in the traffic flow, in | |
529 // bytes. | |
530 const int32_t max_sdu_size = 1500; | |
531 | |
532 // Enable QoS for RTP sockets. | |
533 if(maxBitrate) | |
534 { | |
535 // Note: 1 kbit is 125 bytes. | |
536 // Token Rate is typically set to the average bit rate from peak to | |
537 // peak. | |
538 // Bucket size is normally set to the largest average frame size. | |
539 if(audio) | |
540 { | |
541 WEBRTC_TRACE(kTraceStateInfo, | |
542 kTraceTransport, | |
543 _id, | |
544 "Enable QOS for audio with max bitrate:%d", | |
545 maxBitrate); | |
546 | |
547 const int32_t token_rate = maxBitrate*125; | |
548 // The largest audio packets are 60ms frames. This is a fraction | |
549 // more than 16 packets/second. These 16 frames are sent, at max, | |
550 // at a bitrate of maxBitrate*125 -> 1 frame is maxBitrate*125/16 ~ | |
551 // maxBitrate * 8. | |
552 const int32_t bucket_size = maxBitrate * 8; | |
553 const int32_t peek_bandwith = maxBitrate * 125; | |
554 if (!rtpSock->SetQos(serviceType, token_rate, bucket_size, | |
555 peek_bandwith, min_policed_size, | |
556 max_sdu_size, _remoteRTPAddr, overrideDSCP)) | |
557 { | |
558 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
559 "QOS failed on the RTP socket"); | |
560 _lastError = kQosError; | |
561 return -1; | |
562 } | |
563 }else | |
564 { | |
565 WEBRTC_TRACE(kTraceStateInfo, kTraceTransport, _id, | |
566 "Enable QOS for video with max bitrate:%d", | |
567 maxBitrate); | |
568 | |
569 // Allow for a token rate that is twice that of the maximum bitrate | |
570 // (in bytes). | |
571 const int32_t token_rate = maxBitrate*250; | |
572 // largest average frame size (key frame size). Assuming that a | |
573 // keyframe is 25% of the bitrate during the second its sent | |
574 // Assume that a key frame is 25% of the bitrate the second that it | |
575 // is sent. The largest frame size is then maxBitrate* 125 * 0.25 ~ | |
576 // 31. | |
577 const int32_t bucket_size = maxBitrate*31; | |
578 const int32_t peek_bandwith = maxBitrate*125; | |
579 if (!rtpSock->SetQos(serviceType, token_rate, bucket_size, | |
580 peek_bandwith, min_policed_size, max_sdu_size, | |
581 _remoteRTPAddr, overrideDSCP)) | |
582 { | |
583 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
584 "QOS failed on the RTP socket"); | |
585 _lastError = kQosError; | |
586 return -1; | |
587 } | |
588 } | |
589 } else if(audio) | |
590 { | |
591 // No max bitrate set. Audio. | |
592 WEBRTC_TRACE(kTraceStateInfo, kTraceTransport, _id, | |
593 "Enable QOS for audio with default max bitrate"); | |
594 | |
595 // Let max bitrate be 240kbit/s. | |
596 const int32_t token_rate = 30000; | |
597 const int32_t bucket_size = 2000; | |
598 const int32_t peek_bandwith = 30000; | |
599 if (!rtpSock->SetQos(serviceType, token_rate, bucket_size, | |
600 peek_bandwith, min_policed_size, max_sdu_size, | |
601 _remoteRTPAddr, overrideDSCP)) | |
602 { | |
603 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
604 "QOS failed on the RTP socket"); | |
605 _lastError = kQosError; | |
606 return -1; | |
607 } | |
608 }else | |
609 { | |
610 // No max bitrate set. Video. | |
611 WEBRTC_TRACE(kTraceStateInfo, kTraceTransport, _id, | |
612 "Enable QOS for video with default max bitrate"); | |
613 | |
614 // Let max bitrate be 10mbit/s. | |
615 const int32_t token_rate = 128000*10; | |
616 const int32_t bucket_size = 32000; | |
617 const int32_t peek_bandwith = 256000; | |
618 if (!rtpSock->SetQos(serviceType, token_rate, bucket_size, | |
619 peek_bandwith, min_policed_size, max_sdu_size, | |
620 _remoteRTPAddr, overrideDSCP)) | |
621 { | |
622 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
623 "QOS failed on the RTP socket"); | |
624 _lastError = kQosError; | |
625 return -1; | |
626 } | |
627 } | |
628 | |
629 // Enable QoS for RTCP sockets. | |
630 // TODO (hellner): shouldn't RTCP be based on 5% of the maximum bandwidth? | |
631 if(audio) | |
632 { | |
633 const int32_t token_rate = 200; | |
634 const int32_t bucket_size = 200; | |
635 const int32_t peek_bandwith = 400; | |
636 if (!rtcpSock->SetQos(serviceType, token_rate, bucket_size, | |
637 peek_bandwith, min_policed_size, max_sdu_size, | |
638 _remoteRTCPAddr, overrideDSCP)) | |
639 { | |
640 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, | |
641 "QOS failed on the RTCP socket"); | |
642 _lastError = kQosError; | |
643 } | |
644 }else | |
645 { | |
646 const int32_t token_rate = 5000; | |
647 const int32_t bucket_size = 100; | |
648 const int32_t peek_bandwith = 10000; | |
649 if (!rtcpSock->SetQos(serviceType, token_rate, bucket_size, | |
650 peek_bandwith, min_policed_size, max_sdu_size, | |
651 _remoteRTCPAddr, _overrideDSCP)) | |
652 { | |
653 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, | |
654 "QOS failed on the RTCP socket"); | |
655 _lastError = kQosError; | |
656 } | |
657 } | |
658 _qos = true; | |
659 _serviceType = serviceType; | |
660 _maxBitrate = maxBitrate; | |
661 _overrideDSCP = overrideDSCP; | |
662 return 0; | |
663 } | |
664 | |
665 int32_t UdpTransportImpl::DisableQoS() | |
666 { | |
667 if(_qos == false) | |
668 { | |
669 return 0; | |
670 } | |
671 CriticalSectionScoped cs(_crit); | |
672 | |
673 UdpSocketWrapper* rtpSock = (_ptrSendRtpSocket ? | |
674 _ptrSendRtpSocket : _ptrRtpSocket); | |
675 if (!rtpSock || !rtpSock->ValidHandle()) | |
676 { | |
677 WEBRTC_TRACE( | |
678 kTraceError, | |
679 kTraceTransport, | |
680 _id, | |
681 "QOS is enabled but not started since we have not yet created the\ | |
682 RTP socket"); | |
683 return -1; | |
684 } | |
685 UdpSocketWrapper* rtcpSock = (_ptrSendRtcpSocket ? | |
686 _ptrSendRtcpSocket : _ptrRtcpSocket); | |
687 if (!rtcpSock || !rtcpSock->ValidHandle()) | |
688 { | |
689 WEBRTC_TRACE( | |
690 kTraceError, | |
691 kTraceTransport, | |
692 _id, | |
693 "QOS is enabled but not started since we have not yet created the\ | |
694 RTCP socket"); | |
695 return -1; | |
696 } | |
697 | |
698 const int32_t service_type = 0; // = SERVICETYPE_NOTRAFFIC | |
699 const int32_t not_specified = -1; | |
700 if (!rtpSock->SetQos(service_type, not_specified, not_specified, | |
701 not_specified, not_specified, not_specified, | |
702 _remoteRTPAddr, _overrideDSCP)) | |
703 { | |
704 _lastError = kQosError; | |
705 return -1; | |
706 } | |
707 if (!rtcpSock->SetQos(service_type, not_specified, not_specified, | |
708 not_specified, not_specified, not_specified, | |
709 _remoteRTCPAddr,_overrideDSCP)) | |
710 { | |
711 _lastError = kQosError; | |
712 } | |
713 _qos = false; | |
714 return 0; | |
715 } | |
716 | |
717 int32_t UdpTransportImpl::QoS(bool& QoS, int32_t& serviceType, | |
718 int32_t& overrideDSCP) const | |
719 { | |
720 CriticalSectionScoped cs(_crit); | |
721 QoS = _qos; | |
722 serviceType = _serviceType; | |
723 overrideDSCP = _overrideDSCP; | |
724 return 0; | |
725 } | |
726 | |
727 int32_t UdpTransportImpl::SetToS(int32_t DSCP, bool useSetSockOpt) | |
728 { | |
729 if (_qos) | |
730 { | |
731 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, "QoS already enabled"); | |
732 _lastError = kQosError; | |
733 return -1; | |
734 } | |
735 if (DSCP < 0 || DSCP > 63) | |
736 { | |
737 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, "Invalid DSCP"); | |
738 _lastError = kTosInvalid; | |
739 return -1; | |
740 } | |
741 if(_tos) | |
742 { | |
743 if(useSetSockOpt != _useSetSockOpt) | |
744 { | |
745 WEBRTC_TRACE( | |
746 kTraceError, | |
747 kTraceTransport, | |
748 _id, | |
749 "Can't switch SetSockOpt method without disabling TOS first"); | |
750 _lastError = kTosInvalid; | |
751 return -1; | |
752 } | |
753 } | |
754 CriticalSectionScoped cs(_crit); | |
755 UdpSocketWrapper* rtpSock = NULL; | |
756 UdpSocketWrapper* rtcpSock = NULL; | |
757 if(_ptrSendRtpSocket) | |
758 { | |
759 rtpSock = _ptrSendRtpSocket; | |
760 }else | |
761 { | |
762 rtpSock = _ptrRtpSocket; | |
763 } | |
764 if (rtpSock == NULL) | |
765 { | |
766 _lastError = kSocketInvalid; | |
767 return -1; | |
768 } | |
769 if(!rtpSock->ValidHandle()) | |
770 { | |
771 _lastError = kSocketInvalid; | |
772 return -1; | |
773 } | |
774 if(_ptrSendRtcpSocket) | |
775 { | |
776 rtcpSock = _ptrSendRtcpSocket; | |
777 }else | |
778 { | |
779 rtcpSock = _ptrRtcpSocket; | |
780 } | |
781 if (rtcpSock == NULL) | |
782 { | |
783 _lastError = kSocketInvalid; | |
784 return -1; | |
785 } | |
786 if(!rtcpSock->ValidHandle()) | |
787 { | |
788 _lastError = kSocketInvalid; | |
789 return -1; | |
790 } | |
791 | |
792 if (useSetSockOpt) | |
793 { | |
794 #ifdef _WIN32 | |
795 OSVERSIONINFO OsVersion; | |
796 OsVersion.dwOSVersionInfoSize = sizeof(OSVERSIONINFO); | |
797 GetVersionEx(&OsVersion); | |
798 // Disable QoS before setting ToS on Windows XP. This is done by closing | |
799 // and re-opening the sockets. | |
800 // TODO (hellner): why not just fail here and force the user to | |
801 // re-initialize sockets? Doing this may trick the user | |
802 // into thinking that the sockets are in a state which | |
803 // they aren't. | |
804 if (OsVersion.dwMajorVersion == 5 && | |
805 OsVersion.dwMinorVersion == 1) | |
806 { | |
807 if(!_useSetSockOpt) | |
808 { | |
809 if(_ptrSendRtpSocket) | |
810 { | |
811 CloseSendSockets(); | |
812 _ptrSendRtpSocket = | |
813 _socket_creator->CreateSocket(_id, _mgr, NULL, | |
814 NULL, IpV6Enabled(), | |
815 true); | |
816 _ptrSendRtcpSocket = | |
817 _socket_creator->CreateSocket(_id, _mgr, NULL, | |
818 NULL, IpV6Enabled(), | |
819 true); | |
820 rtpSock=_ptrSendRtpSocket; | |
821 rtcpSock=_ptrSendRtcpSocket; | |
822 ErrorCode retVal = BindRTPSendSocket(); | |
823 if(retVal != kNoSocketError) | |
824 { | |
825 _lastError = retVal; | |
826 return -1; | |
827 } | |
828 retVal = BindRTCPSendSocket(); | |
829 if(retVal != kNoSocketError) | |
830 { | |
831 _lastError = retVal; | |
832 return -1; | |
833 } | |
834 } | |
835 else | |
836 { | |
837 bool receiving=_receiving; | |
838 uint32_t noOfReceiveBuffers = 0; | |
839 if(receiving) | |
840 { | |
841 noOfReceiveBuffers=_ptrRtpSocket->ReceiveBuffers(); | |
842 if(StopReceiving()!=0) | |
843 { | |
844 return -1; | |
845 } | |
846 } | |
847 CloseReceiveSockets(); | |
848 _ptrRtpSocket = _socket_creator->CreateSocket( | |
849 _id, _mgr, this, IncomingRTPCallback, IpV6Enabled(), | |
850 true); | |
851 _ptrRtcpSocket = _socket_creator->CreateSocket( | |
852 _id, _mgr, this, IncomingRTCPCallback, IpV6Enabled(), | |
853 true); | |
854 rtpSock=_ptrRtpSocket; | |
855 rtcpSock=_ptrRtcpSocket; | |
856 ErrorCode retVal = BindLocalRTPSocket(); | |
857 if(retVal != kNoSocketError) | |
858 { | |
859 _lastError = retVal; | |
860 return -1; | |
861 } | |
862 retVal = BindLocalRTCPSocket(); | |
863 if(retVal != kNoSocketError) | |
864 { | |
865 _lastError = retVal; | |
866 return -1; | |
867 } | |
868 if(receiving) | |
869 { | |
870 if(StartReceiving(noOfReceiveBuffers) != | |
871 kNoSocketError) | |
872 { | |
873 return -1; | |
874 } | |
875 } | |
876 } | |
877 } | |
878 } | |
879 #endif // #ifdef _WIN32 | |
880 WEBRTC_TRACE(kTraceDebug, kTraceTransport, _id, | |
881 "Setting TOS using SetSockopt"); | |
882 int32_t TOSShifted = DSCP << 2; | |
883 if (!rtpSock->SetSockopt(IPPROTO_IP, IP_TOS, | |
884 (int8_t*) &TOSShifted, 4)) | |
885 { | |
886 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
887 "Could not SetSockopt tos value on RTP socket"); | |
888 _lastError = kTosInvalid; | |
889 return -1; | |
890 } | |
891 if (!rtcpSock->SetSockopt(IPPROTO_IP, IP_TOS, | |
892 (int8_t*) &TOSShifted, 4)) | |
893 { | |
894 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
895 "Could not sSetSockopt tos value on RTCP socket"); | |
896 _lastError = kTosInvalid; | |
897 return -1; | |
898 } | |
899 } else | |
900 { | |
901 WEBRTC_TRACE(kTraceDebug, kTraceTransport, _id, | |
902 "Setting TOS NOT using SetSockopt"); | |
903 if (rtpSock->SetTOS(DSCP) != 0) | |
904 { | |
905 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
906 "Could not set tos value on RTP socket"); | |
907 _lastError = kTosError; | |
908 return -1; | |
909 } | |
910 if (rtcpSock->SetTOS(DSCP) != 0) | |
911 { | |
912 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
913 "Could not set tos value on RTCP socket"); | |
914 _lastError = kTosError; | |
915 return -1; | |
916 } | |
917 } | |
918 _useSetSockOpt = useSetSockOpt; | |
919 _tos = DSCP; | |
920 return 0; | |
921 } | |
922 | |
923 int32_t UdpTransportImpl::ToS(int32_t& DSCP, | |
924 bool& useSetSockOpt) const | |
925 { | |
926 CriticalSectionScoped cs(_crit); | |
927 DSCP = _tos; | |
928 useSetSockOpt = _useSetSockOpt; | |
929 return 0; | |
930 } | |
931 | |
932 int32_t UdpTransportImpl::SetPCP(int32_t PCP) | |
933 { | |
934 | |
935 if (_qos) | |
936 { | |
937 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, "QoS already enabled"); | |
938 _lastError = kQosError; | |
939 return -1; | |
940 } | |
941 if ((PCP < 0) || (PCP > 7)) | |
942 { | |
943 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, "Invalid PCP"); | |
944 _lastError = kPcpError; | |
945 return -1; | |
946 } | |
947 | |
948 CriticalSectionScoped cs(_crit); | |
949 UdpSocketWrapper* rtpSock = NULL; | |
950 UdpSocketWrapper* rtcpSock = NULL; | |
951 if(_ptrSendRtpSocket) | |
952 { | |
953 rtpSock = _ptrSendRtpSocket; | |
954 }else | |
955 { | |
956 rtpSock = _ptrRtpSocket; | |
957 } | |
958 if (rtpSock == NULL) | |
959 { | |
960 _lastError = kSocketInvalid; | |
961 return -1; | |
962 } | |
963 if(!rtpSock->ValidHandle()) | |
964 { | |
965 _lastError = kSocketInvalid; | |
966 return -1; | |
967 } | |
968 if(_ptrSendRtcpSocket) | |
969 { | |
970 rtcpSock = _ptrSendRtcpSocket; | |
971 }else | |
972 { | |
973 rtcpSock = _ptrRtcpSocket; | |
974 } | |
975 if (rtcpSock == NULL) | |
976 { | |
977 _lastError = kSocketInvalid; | |
978 return -1; | |
979 } | |
980 if(!rtcpSock->ValidHandle()) | |
981 { | |
982 _lastError = kSocketInvalid; | |
983 return -1; | |
984 } | |
985 | |
986 #if defined(_WIN32) | |
987 if (rtpSock->SetPCP(PCP) != 0) | |
988 { | |
989 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
990 "Could not set PCP value on RTP socket"); | |
991 _lastError = kPcpError; | |
992 return -1; | |
993 } | |
994 if (rtcpSock->SetPCP(PCP) != 0) | |
995 { | |
996 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
997 "Could not set PCP value on RTCP socket"); | |
998 _lastError = kPcpError; | |
999 return -1; | |
1000 } | |
1001 | |
1002 #elif defined(WEBRTC_LINUX) | |
1003 if (!rtpSock->SetSockopt(SOL_SOCKET, SO_PRIORITY, (int8_t*) &PCP, | |
1004 sizeof(PCP))) | |
1005 { | |
1006 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1007 "Could not SetSockopt PCP value on RTP socket"); | |
1008 _lastError = kPcpError; | |
1009 return -1; | |
1010 } | |
1011 if (!rtcpSock->SetSockopt(SOL_SOCKET, SO_PRIORITY, (int8_t*) &PCP, | |
1012 sizeof(PCP))) | |
1013 { | |
1014 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1015 "Could not SetSockopt PCP value on RTCP socket"); | |
1016 _lastError = kPcpError; | |
1017 return -1; | |
1018 } | |
1019 #else | |
1020 // Not supported on other platforms (WEBRTC_MAC) | |
1021 _lastError = kPcpError; | |
1022 return -1; | |
1023 #endif | |
1024 _pcp = PCP; | |
1025 return 0; | |
1026 } | |
1027 | |
1028 int32_t UdpTransportImpl::PCP(int32_t& PCP) const | |
1029 { | |
1030 CriticalSectionScoped cs(_crit); | |
1031 PCP = _pcp; | |
1032 return 0; | |
1033 } | |
1034 | |
1035 bool UdpTransportImpl::SetSockOptUsed() | |
1036 { | |
1037 return _useSetSockOpt; | |
1038 } | |
1039 | |
1040 int32_t UdpTransportImpl::EnableIpV6() { | |
1041 | |
1042 CriticalSectionScoped cs(_crit); | |
1043 const bool initialized = (_ptrSendRtpSocket || _ptrRtpSocket); | |
1044 | |
1045 if (_ipV6Enabled) { | |
1046 return 0; | |
1047 } | |
1048 if (initialized) { | |
1049 _lastError = kIpVersion6Error; | |
1050 return -1; | |
1051 } | |
1052 _ipV6Enabled = true; | |
1053 return 0; | |
1054 } | |
1055 | |
1056 int32_t UdpTransportImpl::FilterIP( | |
1057 char filterIPAddress[kIpAddressVersion6Length]) const | |
1058 { | |
1059 | |
1060 if(filterIPAddress == NULL) | |
1061 { | |
1062 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1063 "FilterIP: Invalid argument"); | |
1064 return -1; | |
1065 } | |
1066 if(_filterIPAddress._sockaddr_storage.sin_family == 0) | |
1067 { | |
1068 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, "No Filter configured"); | |
1069 return -1; | |
1070 } | |
1071 CriticalSectionScoped cs(_critFilter); | |
1072 uint32_t ipSize = kIpAddressVersion6Length; | |
1073 uint16_t sourcePort; | |
1074 return IPAddress(_filterIPAddress, filterIPAddress, ipSize, sourcePort); | |
1075 } | |
1076 | |
1077 int32_t UdpTransportImpl::SetFilterIP( | |
1078 const char filterIPAddress[kIpAddressVersion6Length]) | |
1079 { | |
1080 if(filterIPAddress == NULL) | |
1081 { | |
1082 memset(&_filterIPAddress, 0, sizeof(_filterIPAddress)); | |
1083 WEBRTC_TRACE(kTraceDebug, kTraceTransport, _id, "Filter IP reset"); | |
1084 return 0; | |
1085 } | |
1086 CriticalSectionScoped cs(_critFilter); | |
1087 if (_ipV6Enabled) | |
1088 { | |
1089 _filterIPAddress._sockaddr_storage.sin_family = AF_INET6; | |
1090 | |
1091 if (InetPresentationToNumeric( | |
1092 AF_INET6, | |
1093 filterIPAddress, | |
1094 &_filterIPAddress._sockaddr_in6.sin6_addr) < 0) | |
1095 { | |
1096 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, "Failed to set\ | |
1097 filter IP for IPv6"); | |
1098 _lastError = FILTER_ERROR; | |
1099 return -1; | |
1100 } | |
1101 } | |
1102 else | |
1103 { | |
1104 _filterIPAddress._sockaddr_storage.sin_family = AF_INET; | |
1105 | |
1106 if(InetPresentationToNumeric( | |
1107 AF_INET, | |
1108 filterIPAddress, | |
1109 &_filterIPAddress._sockaddr_in.sin_addr) < 0) | |
1110 { | |
1111 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1112 "Failed to set filter IP for IPv4"); | |
1113 _lastError = FILTER_ERROR; | |
1114 return -1; | |
1115 } | |
1116 } | |
1117 WEBRTC_TRACE(kTraceDebug, kTraceTransport, _id, "Filter IP set"); | |
1118 return 0; | |
1119 } | |
1120 | |
1121 int32_t UdpTransportImpl::SetFilterPorts(uint16_t rtpFilterPort, | |
1122 uint16_t rtcpFilterPort) | |
1123 { | |
1124 CriticalSectionScoped cs(_critFilter); | |
1125 _rtpFilterPort = rtpFilterPort; | |
1126 _rtcpFilterPort = rtcpFilterPort; | |
1127 return 0; | |
1128 } | |
1129 | |
1130 bool UdpTransportImpl::SendSocketsInitialized() const | |
1131 { | |
1132 CriticalSectionScoped cs(_crit); | |
1133 if(_ptrSendRtpSocket) | |
1134 { | |
1135 return true; | |
1136 } | |
1137 if(_destPort !=0) | |
1138 { | |
1139 return true; | |
1140 } | |
1141 return false; | |
1142 } | |
1143 | |
1144 bool UdpTransportImpl::ReceiveSocketsInitialized() const | |
1145 { | |
1146 if(_ptrRtpSocket) | |
1147 { | |
1148 return true; | |
1149 } | |
1150 return false; | |
1151 } | |
1152 | |
1153 bool UdpTransportImpl::SourcePortsInitialized() const | |
1154 { | |
1155 if(_ptrSendRtpSocket) | |
1156 { | |
1157 return true; | |
1158 } | |
1159 return false; | |
1160 } | |
1161 | |
1162 bool UdpTransportImpl::IpV6Enabled() const | |
1163 { | |
1164 WEBRTC_TRACE(kTraceStream, kTraceTransport, _id, "%s", __FUNCTION__); | |
1165 return _ipV6Enabled; | |
1166 } | |
1167 | |
1168 void UdpTransportImpl::BuildRemoteRTPAddr() | |
1169 { | |
1170 if(_ipV6Enabled) | |
1171 { | |
1172 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1173 _remoteRTPAddr.sin_length = 0; | |
1174 _remoteRTPAddr.sin_family = PF_INET6; | |
1175 #else | |
1176 _remoteRTPAddr._sockaddr_storage.sin_family = PF_INET6; | |
1177 #endif | |
1178 | |
1179 _remoteRTPAddr._sockaddr_in6.sin6_flowinfo=0; | |
1180 _remoteRTPAddr._sockaddr_in6.sin6_scope_id=0; | |
1181 _remoteRTPAddr._sockaddr_in6.sin6_port = Htons(_destPort); | |
1182 InetPresentationToNumeric(AF_INET6,_destIP, | |
1183 &_remoteRTPAddr._sockaddr_in6.sin6_addr); | |
1184 } else | |
1185 { | |
1186 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1187 _remoteRTPAddr.sin_length = 0; | |
1188 _remoteRTPAddr.sin_family = PF_INET; | |
1189 #else | |
1190 _remoteRTPAddr._sockaddr_storage.sin_family = PF_INET; | |
1191 #endif | |
1192 _remoteRTPAddr._sockaddr_in.sin_port = Htons(_destPort); | |
1193 _remoteRTPAddr._sockaddr_in.sin_addr = InetAddrIPV4(_destIP); | |
1194 } | |
1195 } | |
1196 | |
1197 void UdpTransportImpl::BuildRemoteRTCPAddr() | |
1198 { | |
1199 if(_ipV6Enabled) | |
1200 { | |
1201 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1202 _remoteRTCPAddr.sin_length = 0; | |
1203 _remoteRTCPAddr.sin_family = PF_INET6; | |
1204 #else | |
1205 _remoteRTCPAddr._sockaddr_storage.sin_family = PF_INET6; | |
1206 #endif | |
1207 | |
1208 _remoteRTCPAddr._sockaddr_in6.sin6_flowinfo=0; | |
1209 _remoteRTCPAddr._sockaddr_in6.sin6_scope_id=0; | |
1210 _remoteRTCPAddr._sockaddr_in6.sin6_port = Htons(_destPortRTCP); | |
1211 InetPresentationToNumeric(AF_INET6,_destIP, | |
1212 &_remoteRTCPAddr._sockaddr_in6.sin6_addr); | |
1213 | |
1214 } else | |
1215 { | |
1216 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1217 _remoteRTCPAddr.sin_length = 0; | |
1218 _remoteRTCPAddr.sin_family = PF_INET; | |
1219 #else | |
1220 _remoteRTCPAddr._sockaddr_storage.sin_family = PF_INET; | |
1221 #endif | |
1222 _remoteRTCPAddr._sockaddr_in.sin_port = Htons(_destPortRTCP); | |
1223 _remoteRTCPAddr._sockaddr_in.sin_addr= InetAddrIPV4(_destIP); | |
1224 } | |
1225 } | |
1226 | |
1227 UdpTransportImpl::ErrorCode UdpTransportImpl::BindRTPSendSocket() | |
1228 { | |
1229 if(!_ptrSendRtpSocket) | |
1230 { | |
1231 return kSocketInvalid; | |
1232 } | |
1233 if(!_ptrSendRtpSocket->ValidHandle()) | |
1234 { | |
1235 return kIpAddressInvalid; | |
1236 } | |
1237 if(_ipV6Enabled) | |
1238 { | |
1239 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1240 _localRTPAddr.sin_length = 0; | |
1241 _localRTPAddr.sin_family = PF_INET6; | |
1242 #else | |
1243 _localRTPAddr._sockaddr_storage.sin_family = PF_INET6; | |
1244 #endif | |
1245 _localRTPAddr._sockaddr_in6.sin6_flowinfo=0; | |
1246 _localRTPAddr._sockaddr_in6.sin6_scope_id=0; | |
1247 _localRTPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[0] = | |
1248 0; // = INADDR_ANY | |
1249 _localRTPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[1] = | |
1250 0; | |
1251 _localRTPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[2] = | |
1252 0; | |
1253 _localRTPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[3] = | |
1254 0; | |
1255 _localRTPAddr._sockaddr_in6.sin6_port = Htons(_srcPort); | |
1256 if(_ptrSendRtpSocket->Bind(_localRTPAddr) == false) | |
1257 { | |
1258 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, | |
1259 "Failed to bind to port:%d ", _srcPort); | |
1260 return kFailedToBindPort; | |
1261 } | |
1262 | |
1263 } else { | |
1264 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1265 _localRTPAddr.sin_length = 0; | |
1266 _localRTPAddr.sin_family = PF_INET; | |
1267 #else | |
1268 _localRTPAddr._sockaddr_storage.sin_family = PF_INET; | |
1269 #endif | |
1270 _localRTPAddr._sockaddr_in.sin_addr = 0; | |
1271 _localRTPAddr._sockaddr_in.sin_port = Htons(_srcPort); | |
1272 if(_ptrSendRtpSocket->Bind(_localRTPAddr) == false) | |
1273 { | |
1274 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, | |
1275 "Failed to bind to port:%d ", _srcPort); | |
1276 return kFailedToBindPort; | |
1277 } | |
1278 } | |
1279 return kNoSocketError; | |
1280 } | |
1281 | |
1282 UdpTransportImpl::ErrorCode UdpTransportImpl::BindRTCPSendSocket() | |
1283 { | |
1284 if(!_ptrSendRtcpSocket) | |
1285 { | |
1286 return kSocketInvalid; | |
1287 } | |
1288 | |
1289 if(_ipV6Enabled) | |
1290 { | |
1291 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1292 _localRTCPAddr.sin_length = 0; | |
1293 _localRTCPAddr.sin_family = PF_INET6; | |
1294 #else | |
1295 _localRTCPAddr._sockaddr_storage.sin_family = PF_INET6; | |
1296 #endif | |
1297 _localRTCPAddr._sockaddr_in6.sin6_flowinfo=0; | |
1298 _localRTCPAddr._sockaddr_in6.sin6_scope_id=0; | |
1299 _localRTCPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[0] = | |
1300 0; // = INADDR_ANY | |
1301 _localRTCPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[1] = | |
1302 0; | |
1303 _localRTCPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[2] = | |
1304 0; | |
1305 _localRTCPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[3] = | |
1306 0; | |
1307 _localRTCPAddr._sockaddr_in6.sin6_port = Htons(_srcPortRTCP); | |
1308 if(_ptrSendRtcpSocket->Bind(_localRTCPAddr) == false) | |
1309 { | |
1310 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, | |
1311 "Failed to bind to port:%d ", _srcPortRTCP); | |
1312 return kFailedToBindPort; | |
1313 } | |
1314 } else { | |
1315 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1316 _localRTCPAddr.sin_length = 0; | |
1317 _localRTCPAddr.sin_family = PF_INET; | |
1318 #else | |
1319 _localRTCPAddr._sockaddr_storage.sin_family = PF_INET; | |
1320 #endif | |
1321 _localRTCPAddr._sockaddr_in.sin_addr= 0; | |
1322 _localRTCPAddr._sockaddr_in.sin_port = Htons(_srcPortRTCP); | |
1323 if(_ptrSendRtcpSocket->Bind(_localRTCPAddr) == false) | |
1324 { | |
1325 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, | |
1326 "Failed to bind to port:%d ", _srcPortRTCP); | |
1327 return kFailedToBindPort; | |
1328 } | |
1329 } | |
1330 return kNoSocketError; | |
1331 } | |
1332 | |
1333 UdpTransportImpl::ErrorCode UdpTransportImpl::BindLocalRTPSocket() | |
1334 { | |
1335 if(!_ptrRtpSocket) | |
1336 { | |
1337 return kSocketInvalid; | |
1338 } | |
1339 if(!IpV6Enabled()) | |
1340 { | |
1341 SocketAddress recAddr; | |
1342 memset(&recAddr, 0, sizeof(SocketAddress)); | |
1343 recAddr._sockaddr_storage.sin_family = AF_INET; | |
1344 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1345 recAddr.sin_length = 0; | |
1346 recAddr.sin_family = PF_INET; | |
1347 #else | |
1348 recAddr._sockaddr_storage.sin_family = PF_INET; | |
1349 #endif | |
1350 recAddr._sockaddr_in.sin_addr = InetAddrIPV4(_localIP); | |
1351 recAddr._sockaddr_in.sin_port = Htons(_localPort); | |
1352 | |
1353 if (!_ptrRtpSocket->Bind(recAddr)) | |
1354 { | |
1355 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, | |
1356 "Failed to bind to port:%d ", _localPort); | |
1357 return kFailedToBindPort; | |
1358 } | |
1359 } | |
1360 else | |
1361 { | |
1362 SocketAddress stLclName; | |
1363 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1364 stLclName.sin_lenght = 0; | |
1365 stLclName.sin_family = PF_INET6; | |
1366 #else | |
1367 stLclName._sockaddr_storage.sin_family = PF_INET6; | |
1368 #endif | |
1369 InetPresentationToNumeric(AF_INET6,_localIP, | |
1370 &stLclName._sockaddr_in6.sin6_addr); | |
1371 stLclName._sockaddr_in6.sin6_port = Htons(_localPort); | |
1372 stLclName._sockaddr_in6.sin6_flowinfo = 0; | |
1373 stLclName._sockaddr_in6.sin6_scope_id = 0; | |
1374 | |
1375 if (!_ptrRtpSocket->Bind(stLclName)) | |
1376 { | |
1377 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, | |
1378 "Failed to bind to port:%d ", _localPort); | |
1379 return kFailedToBindPort; | |
1380 } | |
1381 } | |
1382 | |
1383 if(_localMulticastIP[0] != 0) | |
1384 { | |
1385 // Join the multicast group from which to receive datagrams. | |
1386 struct ip_mreq mreq; | |
1387 mreq.imr_multiaddr.s_addr = InetAddrIPV4(_localMulticastIP); | |
1388 mreq.imr_interface.s_addr = INADDR_ANY; | |
1389 | |
1390 if (!_ptrRtpSocket->SetSockopt(IPPROTO_IP,IP_ADD_MEMBERSHIP, | |
1391 (int8_t*)&mreq,sizeof (mreq))) | |
1392 { | |
1393 WEBRTC_TRACE( | |
1394 kTraceError, | |
1395 kTraceTransport, | |
1396 _id, | |
1397 "setsockopt() for multicast failed, not closing socket"); | |
1398 }else | |
1399 { | |
1400 WEBRTC_TRACE(kTraceInfo, kTraceTransport, _id, | |
1401 "multicast group successfully joined"); | |
1402 } | |
1403 } | |
1404 return kNoSocketError; | |
1405 } | |
1406 | |
1407 UdpTransportImpl::ErrorCode UdpTransportImpl::BindLocalRTCPSocket() | |
1408 { | |
1409 if(!_ptrRtcpSocket) | |
1410 { | |
1411 return kSocketInvalid; | |
1412 } | |
1413 if(! IpV6Enabled()) | |
1414 { | |
1415 SocketAddress recAddr; | |
1416 memset(&recAddr, 0, sizeof(SocketAddress)); | |
1417 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1418 recAddr.sin_length = 0; | |
1419 recAddr.sin_family = AF_INET; | |
1420 #else | |
1421 recAddr._sockaddr_storage.sin_family = AF_INET; | |
1422 #endif | |
1423 recAddr._sockaddr_in.sin_addr = InetAddrIPV4(_localIP); | |
1424 recAddr._sockaddr_in.sin_port = Htons(_localPortRTCP); | |
1425 | |
1426 if (!_ptrRtcpSocket->Bind(recAddr)) | |
1427 { | |
1428 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, | |
1429 "Failed to bind to port:%d ", _localPortRTCP); | |
1430 return kFailedToBindPort; | |
1431 } | |
1432 } | |
1433 else | |
1434 { | |
1435 SocketAddress stLclName; | |
1436 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1437 stLclName.sin_length = 0; | |
1438 stLclName.sin_family = PF_INET6; | |
1439 #else | |
1440 stLclName._sockaddr_storage.sin_family = PF_INET6; | |
1441 #endif | |
1442 stLclName._sockaddr_in6.sin6_flowinfo = 0; | |
1443 stLclName._sockaddr_in6.sin6_scope_id = 0; | |
1444 stLclName._sockaddr_in6.sin6_port = Htons(_localPortRTCP); | |
1445 | |
1446 InetPresentationToNumeric(AF_INET6,_localIP, | |
1447 &stLclName._sockaddr_in6.sin6_addr); | |
1448 if (!_ptrRtcpSocket->Bind(stLclName)) | |
1449 { | |
1450 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, | |
1451 "Failed to bind to port:%d ", _localPortRTCP); | |
1452 return kFailedToBindPort; | |
1453 } | |
1454 } | |
1455 if(_localMulticastIP[0] != 0) | |
1456 { | |
1457 // Join the multicast group from which to receive datagrams. | |
1458 struct ip_mreq mreq; | |
1459 mreq.imr_multiaddr.s_addr = InetAddrIPV4(_localMulticastIP); | |
1460 mreq.imr_interface.s_addr = INADDR_ANY; | |
1461 | |
1462 if (!_ptrRtcpSocket->SetSockopt(IPPROTO_IP,IP_ADD_MEMBERSHIP, | |
1463 (int8_t*)&mreq,sizeof (mreq))) | |
1464 { | |
1465 WEBRTC_TRACE( | |
1466 kTraceError, | |
1467 kTraceTransport, | |
1468 _id, | |
1469 "setsockopt() for multicast failed, not closing socket"); | |
1470 }else | |
1471 { | |
1472 WEBRTC_TRACE(kTraceInfo, kTraceTransport, _id, | |
1473 "multicast group successfully joined"); | |
1474 } | |
1475 } | |
1476 return kNoSocketError; | |
1477 } | |
1478 | |
1479 int32_t UdpTransportImpl::InitializeSourcePorts(uint16_t rtpPort, | |
1480 uint16_t rtcpPort) | |
1481 { | |
1482 | |
1483 if(rtpPort == 0) | |
1484 { | |
1485 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1486 "InitializeSourcePorts port 0 not allowed"); | |
1487 _lastError = kPortInvalid; | |
1488 return -1; | |
1489 } | |
1490 | |
1491 CriticalSectionScoped cs(_crit); | |
1492 | |
1493 CloseSendSockets(); | |
1494 | |
1495 if(_mgr == NULL) | |
1496 { | |
1497 return -1; | |
1498 } | |
1499 | |
1500 _srcPort = rtpPort; | |
1501 if(rtcpPort == 0) | |
1502 { | |
1503 _srcPortRTCP = rtpPort+1; | |
1504 } else | |
1505 { | |
1506 _srcPortRTCP = rtcpPort; | |
1507 } | |
1508 _useSetSockOpt =false; | |
1509 _tos=0; | |
1510 _pcp=0; | |
1511 | |
1512 _ptrSendRtpSocket = _socket_creator->CreateSocket(_id, _mgr, NULL, NULL, | |
1513 IpV6Enabled(), false); | |
1514 _ptrSendRtcpSocket = _socket_creator->CreateSocket(_id, _mgr, NULL, NULL, | |
1515 IpV6Enabled(), false); | |
1516 | |
1517 ErrorCode retVal = BindRTPSendSocket(); | |
1518 if(retVal != kNoSocketError) | |
1519 { | |
1520 _lastError = retVal; | |
1521 return -1; | |
1522 } | |
1523 retVal = BindRTCPSendSocket(); | |
1524 if(retVal != kNoSocketError) | |
1525 { | |
1526 _lastError = retVal; | |
1527 return -1; | |
1528 } | |
1529 return 0; | |
1530 } | |
1531 | |
1532 int32_t UdpTransportImpl::SourcePorts(uint16_t& rtpPort, | |
1533 uint16_t& rtcpPort) const | |
1534 { | |
1535 CriticalSectionScoped cs(_crit); | |
1536 | |
1537 rtpPort = (_srcPort != 0) ? _srcPort : _localPort; | |
1538 rtcpPort = (_srcPortRTCP != 0) ? _srcPortRTCP : _localPortRTCP; | |
1539 return 0; | |
1540 } | |
1541 | |
1542 | |
1543 #ifdef _WIN32 | |
1544 int32_t UdpTransportImpl::StartReceiving(uint32_t numberOfSocketBuffers) | |
1545 #else | |
1546 int32_t UdpTransportImpl::StartReceiving(uint32_t /*numberOfSocketBuffers*/) | |
1547 #endif | |
1548 { | |
1549 CriticalSectionScoped cs(_crit); | |
1550 if(_receiving) | |
1551 { | |
1552 return 0; | |
1553 } | |
1554 if(_ptrRtpSocket) | |
1555 { | |
1556 #ifdef _WIN32 | |
1557 if(!_ptrRtpSocket->StartReceiving(numberOfSocketBuffers)) | |
1558 #else | |
1559 if(!_ptrRtpSocket->StartReceiving()) | |
1560 #endif | |
1561 { | |
1562 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1563 "Failed to start receive on RTP socket"); | |
1564 _lastError = kStartReceiveError; | |
1565 return -1; | |
1566 } | |
1567 } | |
1568 if(_ptrRtcpSocket) | |
1569 { | |
1570 if(!_ptrRtcpSocket->StartReceiving()) | |
1571 { | |
1572 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1573 "Failed to start receive on RTCP socket"); | |
1574 _lastError = kStartReceiveError; | |
1575 return -1; | |
1576 } | |
1577 } | |
1578 if( _ptrRtpSocket == NULL && | |
1579 _ptrRtcpSocket == NULL) | |
1580 { | |
1581 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1582 "Failed to StartReceiving, no socket initialized"); | |
1583 _lastError = kStartReceiveError; | |
1584 return -1; | |
1585 } | |
1586 _receiving = true; | |
1587 return 0; | |
1588 } | |
1589 | |
1590 bool UdpTransportImpl::Receiving() const | |
1591 { | |
1592 return _receiving; | |
1593 } | |
1594 | |
1595 int32_t UdpTransportImpl::StopReceiving() | |
1596 { | |
1597 | |
1598 CriticalSectionScoped cs(_crit); | |
1599 | |
1600 _receiving = false; | |
1601 | |
1602 if (_ptrRtpSocket) | |
1603 { | |
1604 if (!_ptrRtpSocket->StopReceiving()) | |
1605 { | |
1606 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1607 "Failed to stop receiving on RTP socket"); | |
1608 _lastError = kStopReceiveError; | |
1609 return -1; | |
1610 } | |
1611 } | |
1612 if (_ptrRtcpSocket) | |
1613 { | |
1614 if (!_ptrRtcpSocket->StopReceiving()) | |
1615 { | |
1616 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1617 "Failed to stop receiving on RTCP socket"); | |
1618 _lastError = kStopReceiveError; | |
1619 return -1; | |
1620 } | |
1621 } | |
1622 return 0; | |
1623 } | |
1624 | |
1625 int32_t UdpTransportImpl::InitializeSendSockets( | |
1626 const char* ipaddr, | |
1627 const uint16_t rtpPort, | |
1628 const uint16_t rtcpPort) | |
1629 { | |
1630 { | |
1631 CriticalSectionScoped cs(_crit); | |
1632 _destPort = rtpPort; | |
1633 if(rtcpPort == 0) | |
1634 { | |
1635 _destPortRTCP = _destPort+1; | |
1636 } else | |
1637 { | |
1638 _destPortRTCP = rtcpPort; | |
1639 } | |
1640 | |
1641 if(ipaddr == NULL) | |
1642 { | |
1643 if (!IsIpAddressValid(_destIP, IpV6Enabled())) | |
1644 { | |
1645 _destPort = 0; | |
1646 _destPortRTCP = 0; | |
1647 _lastError = kIpAddressInvalid; | |
1648 return -1; | |
1649 } | |
1650 } else | |
1651 { | |
1652 if (IsIpAddressValid(ipaddr, IpV6Enabled())) | |
1653 { | |
1654 strncpy( | |
1655 _destIP, | |
1656 ipaddr, | |
1657 IpV6Enabled() ? kIpAddressVersion6Length : | |
1658 kIpAddressVersion4Length); | |
1659 } else { | |
1660 _destPort = 0; | |
1661 _destPortRTCP = 0; | |
1662 _lastError = kIpAddressInvalid; | |
1663 return -1; | |
1664 } | |
1665 } | |
1666 BuildRemoteRTPAddr(); | |
1667 BuildRemoteRTCPAddr(); | |
1668 } | |
1669 | |
1670 if (_ipV6Enabled) | |
1671 { | |
1672 if (_qos) | |
1673 { | |
1674 WEBRTC_TRACE( | |
1675 kTraceWarning, | |
1676 kTraceTransport, | |
1677 _id, | |
1678 "QOS is enabled but will be ignored since IPv6 is enabled"); | |
1679 } | |
1680 }else | |
1681 { | |
1682 // TODO (grunell): Multicast support is experimantal. | |
1683 | |
1684 // Put the first digit of the remote address in val. | |
1685 int32_t val = ntohl(_remoteRTPAddr._sockaddr_in.sin_addr)>> 24; | |
1686 | |
1687 if((val > 223) && (val < 240)) | |
1688 { | |
1689 // Multicast address. | |
1690 CriticalSectionScoped cs(_crit); | |
1691 | |
1692 UdpSocketWrapper* rtpSock = (_ptrSendRtpSocket ? | |
1693 _ptrSendRtpSocket : _ptrRtpSocket); | |
1694 if (!rtpSock || !rtpSock->ValidHandle()) | |
1695 { | |
1696 _lastError = kSocketInvalid; | |
1697 return -1; | |
1698 } | |
1699 UdpSocketWrapper* rtcpSock = (_ptrSendRtcpSocket ? | |
1700 _ptrSendRtcpSocket : _ptrRtcpSocket); | |
1701 if (!rtcpSock || !rtcpSock->ValidHandle()) | |
1702 { | |
1703 _lastError = kSocketInvalid; | |
1704 return -1; | |
1705 } | |
1706 | |
1707 // Set Time To Live to same region | |
1708 int32_t iOptVal = 64; | |
1709 if (!rtpSock->SetSockopt(IPPROTO_IP, IP_MULTICAST_TTL, | |
1710 (int8_t*)&iOptVal, | |
1711 sizeof (int32_t))) | |
1712 { | |
1713 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1714 "setsockopt for multicast error on RTP socket"); | |
1715 _ptrRtpSocket->CloseBlocking(); | |
1716 _ptrRtpSocket = NULL; | |
1717 _lastError = kMulticastAddressInvalid; | |
1718 return -1; | |
1719 } | |
1720 if (!rtcpSock->SetSockopt(IPPROTO_IP, IP_MULTICAST_TTL, | |
1721 (int8_t*)&iOptVal, | |
1722 sizeof (int32_t))) | |
1723 { | |
1724 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1725 "setsockopt for multicast error on RTCP socket"); | |
1726 _ptrRtpSocket->CloseBlocking(); | |
1727 _ptrRtpSocket = NULL; | |
1728 _lastError = kMulticastAddressInvalid; | |
1729 return -1; | |
1730 } | |
1731 } | |
1732 } | |
1733 return 0; | |
1734 } | |
1735 | |
1736 void UdpTransportImpl::BuildSockaddrIn(uint16_t portnr, | |
1737 const char* ip, | |
1738 SocketAddress& remoteAddr) const | |
1739 { | |
1740 if(_ipV6Enabled) | |
1741 { | |
1742 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1743 remoteAddr.sin_length = 0; | |
1744 remoteAddr.sin_family = PF_INET6; | |
1745 #else | |
1746 remoteAddr._sockaddr_storage.sin_family = PF_INET6; | |
1747 #endif | |
1748 remoteAddr._sockaddr_in6.sin6_port = Htons(portnr); | |
1749 InetPresentationToNumeric(AF_INET6, ip, | |
1750 &remoteAddr._sockaddr_in6.sin6_addr); | |
1751 remoteAddr._sockaddr_in6.sin6_flowinfo=0; | |
1752 remoteAddr._sockaddr_in6.sin6_scope_id=0; | |
1753 } else | |
1754 { | |
1755 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN | |
1756 remoteAddr.sin_length = 0; | |
1757 remoteAddr.sin_family = PF_INET; | |
1758 #else | |
1759 remoteAddr._sockaddr_storage.sin_family = PF_INET; | |
1760 #endif | |
1761 remoteAddr._sockaddr_in.sin_port = Htons(portnr); | |
1762 remoteAddr._sockaddr_in.sin_addr= InetAddrIPV4( | |
1763 const_cast<char*>(ip)); | |
1764 } | |
1765 } | |
1766 | |
1767 int32_t UdpTransportImpl::SendRaw(const int8_t *data, | |
1768 size_t length, | |
1769 int32_t isRTCP, | |
1770 uint16_t portnr, | |
1771 const char* ip) | |
1772 { | |
1773 CriticalSectionScoped cs(_crit); | |
1774 if(isRTCP) | |
1775 { | |
1776 UdpSocketWrapper* rtcpSock = NULL; | |
1777 if(_ptrSendRtcpSocket) | |
1778 { | |
1779 rtcpSock = _ptrSendRtcpSocket; | |
1780 } else if(_ptrRtcpSocket) | |
1781 { | |
1782 rtcpSock = _ptrRtcpSocket; | |
1783 } else | |
1784 { | |
1785 return -1; | |
1786 } | |
1787 if(portnr == 0 && ip == NULL) | |
1788 { | |
1789 return rtcpSock->SendTo(data,length,_remoteRTCPAddr); | |
1790 | |
1791 } else if(portnr != 0 && ip != NULL) | |
1792 { | |
1793 SocketAddress remoteAddr; | |
1794 BuildSockaddrIn(portnr, ip, remoteAddr); | |
1795 return rtcpSock->SendTo(data,length,remoteAddr); | |
1796 } else if(ip != NULL) | |
1797 { | |
1798 SocketAddress remoteAddr; | |
1799 BuildSockaddrIn(_destPortRTCP, ip, remoteAddr); | |
1800 return rtcpSock->SendTo(data,length,remoteAddr); | |
1801 } else | |
1802 { | |
1803 SocketAddress remoteAddr; | |
1804 BuildSockaddrIn(portnr, _destIP, remoteAddr); | |
1805 return rtcpSock->SendTo(data,length,remoteAddr); | |
1806 } | |
1807 } else { | |
1808 UdpSocketWrapper* rtpSock = NULL; | |
1809 if(_ptrSendRtpSocket) | |
1810 { | |
1811 rtpSock = _ptrSendRtpSocket; | |
1812 | |
1813 } else if(_ptrRtpSocket) | |
1814 { | |
1815 rtpSock = _ptrRtpSocket; | |
1816 } else | |
1817 { | |
1818 return -1; | |
1819 } | |
1820 if(portnr == 0 && ip == NULL) | |
1821 { | |
1822 return rtpSock->SendTo(data,length,_remoteRTPAddr); | |
1823 | |
1824 } else if(portnr != 0 && ip != NULL) | |
1825 { | |
1826 SocketAddress remoteAddr; | |
1827 BuildSockaddrIn(portnr, ip, remoteAddr); | |
1828 return rtpSock->SendTo(data,length,remoteAddr); | |
1829 } else if(ip != NULL) | |
1830 { | |
1831 SocketAddress remoteAddr; | |
1832 BuildSockaddrIn(_destPort, ip, remoteAddr); | |
1833 return rtpSock->SendTo(data,length,remoteAddr); | |
1834 } else | |
1835 { | |
1836 SocketAddress remoteAddr; | |
1837 BuildSockaddrIn(portnr, _destIP, remoteAddr); | |
1838 return rtpSock->SendTo(data,length,remoteAddr); | |
1839 } | |
1840 } | |
1841 } | |
1842 | |
1843 int32_t UdpTransportImpl::SendRTPPacketTo(const int8_t* data, | |
1844 size_t length, | |
1845 const SocketAddress& to) | |
1846 { | |
1847 CriticalSectionScoped cs(_crit); | |
1848 if(_ptrSendRtpSocket) | |
1849 { | |
1850 return _ptrSendRtpSocket->SendTo(data,length,to); | |
1851 | |
1852 } else if(_ptrRtpSocket) | |
1853 { | |
1854 return _ptrRtpSocket->SendTo(data,length,to); | |
1855 } | |
1856 return -1; | |
1857 } | |
1858 | |
1859 int32_t UdpTransportImpl::SendRTCPPacketTo(const int8_t* data, | |
1860 size_t length, | |
1861 const SocketAddress& to) | |
1862 { | |
1863 | |
1864 CriticalSectionScoped cs(_crit); | |
1865 | |
1866 if(_ptrSendRtcpSocket) | |
1867 { | |
1868 return _ptrSendRtcpSocket->SendTo(data,length,to); | |
1869 | |
1870 } else if(_ptrRtcpSocket) | |
1871 { | |
1872 return _ptrRtcpSocket->SendTo(data,length,to); | |
1873 } | |
1874 return -1; | |
1875 } | |
1876 | |
1877 int32_t UdpTransportImpl::SendRTPPacketTo(const int8_t* data, | |
1878 size_t length, | |
1879 const uint16_t rtpPort) | |
1880 { | |
1881 CriticalSectionScoped cs(_crit); | |
1882 // Use the current SocketAdress but update it with rtpPort. | |
1883 SocketAddress to; | |
1884 memcpy(&to, &_remoteRTPAddr, sizeof(SocketAddress)); | |
1885 | |
1886 if(_ipV6Enabled) | |
1887 { | |
1888 to._sockaddr_in6.sin6_port = Htons(rtpPort); | |
1889 } else | |
1890 { | |
1891 to._sockaddr_in.sin_port = Htons(rtpPort); | |
1892 } | |
1893 | |
1894 if(_ptrSendRtpSocket) | |
1895 { | |
1896 return _ptrSendRtpSocket->SendTo(data,length,to); | |
1897 | |
1898 } else if(_ptrRtpSocket) | |
1899 { | |
1900 return _ptrRtpSocket->SendTo(data,length,to); | |
1901 } | |
1902 return -1; | |
1903 } | |
1904 | |
1905 int32_t UdpTransportImpl::SendRTCPPacketTo(const int8_t* data, | |
1906 size_t length, | |
1907 const uint16_t rtcpPort) | |
1908 { | |
1909 CriticalSectionScoped cs(_crit); | |
1910 | |
1911 // Use the current SocketAdress but update it with rtcpPort. | |
1912 SocketAddress to; | |
1913 memcpy(&to, &_remoteRTCPAddr, sizeof(SocketAddress)); | |
1914 | |
1915 if(_ipV6Enabled) | |
1916 { | |
1917 to._sockaddr_in6.sin6_port = Htons(rtcpPort); | |
1918 } else | |
1919 { | |
1920 to._sockaddr_in.sin_port = Htons(rtcpPort); | |
1921 } | |
1922 | |
1923 if(_ptrSendRtcpSocket) | |
1924 { | |
1925 return _ptrSendRtcpSocket->SendTo(data,length,to); | |
1926 | |
1927 } else if(_ptrRtcpSocket) | |
1928 { | |
1929 return _ptrRtcpSocket->SendTo(data,length,to); | |
1930 } | |
1931 return -1; | |
1932 } | |
1933 | |
1934 bool UdpTransportImpl::SendRtp(const uint8_t* data, | |
1935 size_t length, | |
1936 const PacketOptions& packet_options) { | |
1937 WEBRTC_TRACE(kTraceStream, kTraceTransport, _id, "%s", __FUNCTION__); | |
1938 | |
1939 CriticalSectionScoped cs(_crit); | |
1940 | |
1941 if(_destIP[0] == 0) | |
1942 { | |
1943 return false; | |
1944 } | |
1945 if(_destPort == 0) | |
1946 { | |
1947 return false; | |
1948 } | |
1949 | |
1950 // Create socket if it hasn't been set up already. | |
1951 // TODO (hellner): why not fail here instead. Sockets not being initialized | |
1952 // indicates that there is a problem somewhere. | |
1953 if( _ptrSendRtpSocket == NULL && | |
1954 _ptrRtpSocket == NULL) | |
1955 { | |
1956 WEBRTC_TRACE( | |
1957 kTraceStateInfo, | |
1958 kTraceTransport, | |
1959 _id, | |
1960 "Creating RTP socket since no receive or source socket is\ | |
1961 configured"); | |
1962 | |
1963 _ptrRtpSocket = _socket_creator->CreateSocket(_id, _mgr, this, | |
1964 IncomingRTPCallback, | |
1965 IpV6Enabled(), false); | |
1966 | |
1967 // Don't bind to a specific IP address. | |
1968 if(! IpV6Enabled()) | |
1969 { | |
1970 strncpy(_localIP, "0.0.0.0",16); | |
1971 } else | |
1972 { | |
1973 strncpy(_localIP, "0000:0000:0000:0000:0000:0000:0000:0000", | |
1974 kIpAddressVersion6Length); | |
1975 } | |
1976 _localPort = _destPort; | |
1977 | |
1978 ErrorCode retVal = BindLocalRTPSocket(); | |
1979 if(retVal != kNoSocketError) | |
1980 { | |
1981 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
1982 "SendPacket() failed to bind RTP socket"); | |
1983 _lastError = retVal; | |
1984 CloseReceiveSockets(); | |
1985 return false; | |
1986 } | |
1987 } | |
1988 | |
1989 if(_ptrSendRtpSocket) | |
1990 { | |
1991 return _ptrSendRtpSocket->SendTo((const int8_t*)data, length, | |
1992 _remoteRTPAddr) >= 0; | |
1993 | |
1994 } else if(_ptrRtpSocket) | |
1995 { | |
1996 return _ptrRtpSocket->SendTo((const int8_t*)data, length, | |
1997 _remoteRTPAddr) >= 0; | |
1998 } | |
1999 return false; | |
2000 } | |
2001 | |
2002 bool UdpTransportImpl::SendRtcp(const uint8_t* data, size_t length) { | |
2003 CriticalSectionScoped cs(_crit); | |
2004 if(_destIP[0] == 0) | |
2005 { | |
2006 return false; | |
2007 } | |
2008 if(_destPortRTCP == 0) | |
2009 { | |
2010 return false; | |
2011 } | |
2012 | |
2013 // Create socket if it hasn't been set up already. | |
2014 // TODO (hellner): why not fail here instead. Sockets not being initialized | |
2015 // indicates that there is a problem somewhere. | |
2016 if( _ptrSendRtcpSocket == NULL && | |
2017 _ptrRtcpSocket == NULL) | |
2018 { | |
2019 WEBRTC_TRACE( | |
2020 kTraceStateInfo, | |
2021 kTraceTransport, | |
2022 _id, | |
2023 "Creating RTCP socket since no receive or source socket is\ | |
2024 configured"); | |
2025 | |
2026 _ptrRtcpSocket = _socket_creator->CreateSocket(_id, _mgr, this, | |
2027 IncomingRTCPCallback, | |
2028 IpV6Enabled(), false); | |
2029 | |
2030 // Don't bind to a specific IP address. | |
2031 if(! IpV6Enabled()) | |
2032 { | |
2033 strncpy(_localIP, "0.0.0.0",16); | |
2034 } else | |
2035 { | |
2036 strncpy(_localIP, "0000:0000:0000:0000:0000:0000:0000:0000", | |
2037 kIpAddressVersion6Length); | |
2038 } | |
2039 _localPortRTCP = _destPortRTCP; | |
2040 | |
2041 ErrorCode retVal = BindLocalRTCPSocket(); | |
2042 if(retVal != kNoSocketError) | |
2043 { | |
2044 _lastError = retVal; | |
2045 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, | |
2046 "SendRtcp() failed to bind RTCP socket"); | |
2047 CloseReceiveSockets(); | |
2048 return false; | |
2049 } | |
2050 } | |
2051 | |
2052 if(_ptrSendRtcpSocket) | |
2053 { | |
2054 return _ptrSendRtcpSocket->SendTo((const int8_t*)data, length, | |
2055 _remoteRTCPAddr) >= 0; | |
2056 } else if(_ptrRtcpSocket) | |
2057 { | |
2058 return _ptrRtcpSocket->SendTo((const int8_t*)data, length, | |
2059 _remoteRTCPAddr) >= 0; | |
2060 } | |
2061 return false; | |
2062 } | |
2063 | |
2064 int32_t UdpTransportImpl::SetSendIP(const char* ipaddr) | |
2065 { | |
2066 if(!IsIpAddressValid(ipaddr,IpV6Enabled())) | |
2067 { | |
2068 return kIpAddressInvalid; | |
2069 } | |
2070 CriticalSectionScoped cs(_crit); | |
2071 strncpy(_destIP, ipaddr,kIpAddressVersion6Length); | |
2072 BuildRemoteRTPAddr(); | |
2073 BuildRemoteRTCPAddr(); | |
2074 return 0; | |
2075 } | |
2076 | |
2077 int32_t UdpTransportImpl::SetSendPorts(uint16_t rtpPort, uint16_t rtcpPort) | |
2078 { | |
2079 CriticalSectionScoped cs(_crit); | |
2080 _destPort = rtpPort; | |
2081 if(rtcpPort == 0) | |
2082 { | |
2083 _destPortRTCP = _destPort+1; | |
2084 } else | |
2085 { | |
2086 _destPortRTCP = rtcpPort; | |
2087 } | |
2088 BuildRemoteRTPAddr(); | |
2089 BuildRemoteRTCPAddr(); | |
2090 return 0; | |
2091 } | |
2092 | |
2093 void UdpTransportImpl::IncomingRTPCallback(CallbackObj obj, | |
2094 const int8_t* rtpPacket, | |
2095 size_t rtpPacketLength, | |
2096 const SocketAddress* from) | |
2097 { | |
2098 if (rtpPacket && rtpPacketLength > 0) | |
2099 { | |
2100 UdpTransportImpl* socketTransport = (UdpTransportImpl*) obj; | |
2101 socketTransport->IncomingRTPFunction(rtpPacket, rtpPacketLength, from); | |
2102 } | |
2103 } | |
2104 | |
2105 void UdpTransportImpl::IncomingRTCPCallback(CallbackObj obj, | |
2106 const int8_t* rtcpPacket, | |
2107 size_t rtcpPacketLength, | |
2108 const SocketAddress* from) | |
2109 { | |
2110 if (rtcpPacket && rtcpPacketLength > 0) | |
2111 { | |
2112 UdpTransportImpl* socketTransport = (UdpTransportImpl*) obj; | |
2113 socketTransport->IncomingRTCPFunction(rtcpPacket, rtcpPacketLength, | |
2114 from); | |
2115 } | |
2116 } | |
2117 | |
2118 void UdpTransportImpl::IncomingRTPFunction(const int8_t* rtpPacket, | |
2119 size_t rtpPacketLength, | |
2120 const SocketAddress* fromSocket) | |
2121 { | |
2122 char ipAddress[kIpAddressVersion6Length]; | |
2123 uint32_t ipAddressLength = kIpAddressVersion6Length; | |
2124 uint16_t portNr = 0; | |
2125 | |
2126 { | |
2127 CriticalSectionScoped cs(_critFilter); | |
2128 if (FilterIPAddress(fromSocket) == false) | |
2129 { | |
2130 // Packet should be filtered out. Drop it. | |
2131 WEBRTC_TRACE(kTraceStream, kTraceTransport, _id, | |
2132 "Incoming RTP packet blocked by IP filter"); | |
2133 return; | |
2134 } | |
2135 | |
2136 if (IPAddressCached(*fromSocket, ipAddress, ipAddressLength, portNr) < | |
2137 0) | |
2138 { | |
2139 WEBRTC_TRACE( | |
2140 kTraceError, | |
2141 kTraceTransport, | |
2142 _id, | |
2143 "UdpTransportImpl::IncomingRTPFunction - Cannot get sender\ | |
2144 information"); | |
2145 }else | |
2146 { | |
2147 // Make sure ipAddress is null terminated. | |
2148 ipAddress[kIpAddressVersion6Length - 1] = 0; | |
2149 strncpy(_fromIP, ipAddress, kIpAddressVersion6Length - 1); | |
2150 } | |
2151 | |
2152 // Filter based on port. | |
2153 if (_rtpFilterPort != 0 && | |
2154 _rtpFilterPort != portNr) | |
2155 { | |
2156 // Drop packet. | |
2157 memset(_fromIP, 0, sizeof(_fromIP)); | |
2158 WEBRTC_TRACE( | |
2159 kTraceStream, | |
2160 kTraceTransport, | |
2161 _id, | |
2162 "Incoming RTP packet blocked by filter incoming from port:%d\ | |
2163 allowed port:%d", | |
2164 portNr, | |
2165 _rtpFilterPort); | |
2166 return; | |
2167 } | |
2168 _fromPort = portNr; | |
2169 } | |
2170 | |
2171 CriticalSectionScoped cs(_critPacketCallback); | |
2172 if (_packetCallback) | |
2173 { | |
2174 WEBRTC_TRACE(kTraceStream, kTraceTransport, _id, | |
2175 "Incoming RTP packet from ip:%s port:%d", ipAddress, portNr); | |
2176 _packetCallback->IncomingRTPPacket(rtpPacket, rtpPacketLength, | |
2177 ipAddress, portNr); | |
2178 } | |
2179 } | |
2180 | |
2181 void UdpTransportImpl::IncomingRTCPFunction(const int8_t* rtcpPacket, | |
2182 size_t rtcpPacketLength, | |
2183 const SocketAddress* fromSocket) | |
2184 { | |
2185 char ipAddress[kIpAddressVersion6Length]; | |
2186 uint32_t ipAddressLength = kIpAddressVersion6Length; | |
2187 uint16_t portNr = 0; | |
2188 | |
2189 { | |
2190 CriticalSectionScoped cs(_critFilter); | |
2191 if (FilterIPAddress(fromSocket) == false) | |
2192 { | |
2193 // Packet should be filtered out. Drop it. | |
2194 WEBRTC_TRACE(kTraceStream, kTraceTransport, _id, | |
2195 "Incoming RTCP packet blocked by IP filter"); | |
2196 return; | |
2197 } | |
2198 if (IPAddress(*fromSocket, ipAddress, ipAddressLength, portNr) < 0) | |
2199 { | |
2200 WEBRTC_TRACE( | |
2201 kTraceError, | |
2202 kTraceTransport, | |
2203 _id, | |
2204 "UdpTransportImpl::IncomingRTCPFunction - Cannot get sender\ | |
2205 information"); | |
2206 }else { | |
2207 // Make sure ipAddress is null terminated. | |
2208 ipAddress[kIpAddressVersion6Length - 1] = 0; | |
2209 strncpy(_fromIP, ipAddress, kIpAddressVersion6Length - 1); | |
2210 } | |
2211 | |
2212 // Filter based on port. | |
2213 if (_rtcpFilterPort != 0 && | |
2214 _rtcpFilterPort != portNr) | |
2215 { | |
2216 // Drop packet. | |
2217 WEBRTC_TRACE( | |
2218 kTraceStream, | |
2219 kTraceTransport, | |
2220 _id, | |
2221 "Incoming RTCP packet blocked by filter incoming from port:%d\ | |
2222 allowed port:%d", | |
2223 portNr, | |
2224 _rtpFilterPort); | |
2225 return; | |
2226 } | |
2227 _fromPortRTCP = portNr; | |
2228 } | |
2229 | |
2230 CriticalSectionScoped cs(_critPacketCallback); | |
2231 if (_packetCallback) | |
2232 { | |
2233 WEBRTC_TRACE(kTraceStream, kTraceTransport, _id, | |
2234 "Incoming RTCP packet from ip:%s port:%d", ipAddress, | |
2235 portNr); | |
2236 _packetCallback->IncomingRTCPPacket(rtcpPacket, rtcpPacketLength, | |
2237 ipAddress, portNr); | |
2238 } | |
2239 } | |
2240 | |
2241 bool UdpTransportImpl::FilterIPAddress(const SocketAddress* fromAddress) | |
2242 { | |
2243 if(fromAddress->_sockaddr_storage.sin_family == AF_INET) | |
2244 { | |
2245 if (_filterIPAddress._sockaddr_storage.sin_family == AF_INET) | |
2246 { | |
2247 // IP is stored in sin_addr. | |
2248 if (_filterIPAddress._sockaddr_in.sin_addr != 0 && | |
2249 (_filterIPAddress._sockaddr_in.sin_addr != | |
2250 fromAddress->_sockaddr_in.sin_addr)) | |
2251 { | |
2252 return false; | |
2253 } | |
2254 } | |
2255 } | |
2256 else if(fromAddress->_sockaddr_storage.sin_family == AF_INET6) | |
2257 { | |
2258 if (_filterIPAddress._sockaddr_storage.sin_family == AF_INET6) | |
2259 { | |
2260 // IP is stored in sin_6addr. | |
2261 for (int32_t i = 0; i < 4; i++) | |
2262 { | |
2263 if (_filterIPAddress._sockaddr_in6.sin6_addr.Version6AddressUnio
n._s6_u32[i] != 0 && | |
2264 _filterIPAddress._sockaddr_in6.sin6_addr.Version6AddressUnio
n._s6_u32[i] != fromAddress->_sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u3
2[i]) | |
2265 { | |
2266 return false; | |
2267 } | |
2268 } | |
2269 } | |
2270 } | |
2271 else | |
2272 { | |
2273 WEBRTC_TRACE( | |
2274 kTraceError, | |
2275 kTraceTransport, | |
2276 _id, | |
2277 "UdpTransportImpl::FilterIPAddress() unknown address family"); | |
2278 return false; | |
2279 } | |
2280 return true; | |
2281 } | |
2282 | |
2283 void UdpTransportImpl::CloseReceiveSockets() | |
2284 { | |
2285 if(_ptrRtpSocket) | |
2286 { | |
2287 _ptrRtpSocket->CloseBlocking(); | |
2288 _ptrRtpSocket = NULL; | |
2289 } | |
2290 if(_ptrRtcpSocket) | |
2291 { | |
2292 _ptrRtcpSocket->CloseBlocking(); | |
2293 _ptrRtcpSocket = NULL; | |
2294 } | |
2295 _receiving = false; | |
2296 } | |
2297 | |
2298 void UdpTransportImpl::CloseSendSockets() | |
2299 { | |
2300 if(_ptrSendRtpSocket) | |
2301 { | |
2302 _ptrSendRtpSocket->CloseBlocking(); | |
2303 _ptrSendRtpSocket = 0; | |
2304 } | |
2305 if(_ptrSendRtcpSocket) | |
2306 { | |
2307 _ptrSendRtcpSocket->CloseBlocking(); | |
2308 _ptrSendRtcpSocket = 0; | |
2309 } | |
2310 } | |
2311 | |
2312 uint16_t UdpTransport::Htons(const uint16_t port) | |
2313 { | |
2314 return htons(port); | |
2315 } | |
2316 | |
2317 uint32_t UdpTransport::Htonl(const uint32_t a) | |
2318 { | |
2319 return htonl(a); | |
2320 } | |
2321 | |
2322 uint32_t UdpTransport::InetAddrIPV4(const char* ip) | |
2323 { | |
2324 return ::inet_addr(ip); | |
2325 } | |
2326 | |
2327 int32_t UdpTransport::InetPresentationToNumeric(int32_t af, | |
2328 const char* src, | |
2329 void* dst) | |
2330 { | |
2331 #if defined(WEBRTC_LINUX) || defined(WEBRTC_MAC) | |
2332 const int32_t result = inet_pton(af, src, dst); | |
2333 return result > 0 ? 0 : -1; | |
2334 | |
2335 #elif defined(_WIN32) | |
2336 SocketAddress temp; | |
2337 int length=sizeof(SocketAddress); | |
2338 | |
2339 if(af == AF_INET) | |
2340 { | |
2341 int32_t result = WSAStringToAddressA( | |
2342 (const LPSTR)src, | |
2343 af, | |
2344 0, | |
2345 reinterpret_cast<struct sockaddr*>(&temp), | |
2346 &length); | |
2347 if(result != 0) | |
2348 { | |
2349 return -1; | |
2350 } | |
2351 memcpy(dst,&(temp._sockaddr_in.sin_addr), | |
2352 sizeof(temp._sockaddr_in.sin_addr)); | |
2353 return 0; | |
2354 } | |
2355 else if(af == AF_INET6) | |
2356 { | |
2357 int32_t result = WSAStringToAddressA( | |
2358 (const LPSTR)src, | |
2359 af, | |
2360 0, | |
2361 reinterpret_cast<struct sockaddr*>(&temp), | |
2362 &length); | |
2363 if(result !=0) | |
2364 { | |
2365 return -1; | |
2366 } | |
2367 memcpy(dst,&(temp._sockaddr_in6.sin6_addr), | |
2368 sizeof(temp._sockaddr_in6.sin6_addr)); | |
2369 return 0; | |
2370 | |
2371 }else | |
2372 { | |
2373 return -1; | |
2374 } | |
2375 #else | |
2376 return -1; | |
2377 #endif | |
2378 } | |
2379 | |
2380 int32_t UdpTransport::LocalHostAddressIPV6(char n_localIP[16]) | |
2381 { | |
2382 | |
2383 #if defined(_WIN32) | |
2384 struct addrinfo *result = NULL; | |
2385 struct addrinfo *ptr = NULL; | |
2386 struct addrinfo hints; | |
2387 | |
2388 ZeroMemory(&hints, sizeof(hints)); | |
2389 hints.ai_family = AF_INET6; | |
2390 | |
2391 char szHostName[256] = ""; | |
2392 if(::gethostname(szHostName, sizeof(szHostName) - 1)) | |
2393 { | |
2394 WEBRTC_TRACE(kTraceWarning, kTraceTransport, -1, "gethostname failed"); | |
2395 return -1; | |
2396 } | |
2397 | |
2398 DWORD dwRetval = getaddrinfo(szHostName, NULL, &hints, &result); | |
2399 if ( dwRetval != 0 ) | |
2400 { | |
2401 WEBRTC_TRACE(kTraceWarning, kTraceTransport, -1, | |
2402 "getaddrinfo failed, error:%d", dwRetval); | |
2403 return -1; | |
2404 } | |
2405 for(ptr=result; ptr != NULL ;ptr=ptr->ai_next) | |
2406 { | |
2407 switch (ptr->ai_family) | |
2408 { | |
2409 case AF_INET6: | |
2410 { | |
2411 for(int i = 0; i< 16; i++) | |
2412 { | |
2413 n_localIP[i] = (*(SocketAddress*)ptr->ai_addr). | |
2414 _sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u8[
i]; | |
2415 } | |
2416 bool islocalIP = true; | |
2417 | |
2418 for(int n = 0; n< 15; n++) | |
2419 { | |
2420 if(n_localIP[n] != 0) | |
2421 { | |
2422 islocalIP = false; | |
2423 break; | |
2424 } | |
2425 } | |
2426 | |
2427 if(islocalIP && n_localIP[15] != 1) | |
2428 { | |
2429 islocalIP = false; | |
2430 } | |
2431 | |
2432 if(islocalIP && ptr->ai_next) | |
2433 { | |
2434 continue; | |
2435 } | |
2436 if(n_localIP[0] == 0xfe && | |
2437 n_localIP[1] == 0x80 && ptr->ai_next) | |
2438 { | |
2439 continue; | |
2440 } | |
2441 freeaddrinfo(result); | |
2442 } | |
2443 return 0; | |
2444 default: | |
2445 break; | |
2446 }; | |
2447 } | |
2448 freeaddrinfo(result); | |
2449 WEBRTC_TRACE(kTraceWarning, kTraceTransport, -1, | |
2450 "getaddrinfo failed to find address"); | |
2451 return -1; | |
2452 | |
2453 #elif defined(WEBRTC_MAC) | |
2454 struct ifaddrs* ptrIfAddrs = NULL; | |
2455 struct ifaddrs* ptrIfAddrsStart = NULL; | |
2456 | |
2457 getifaddrs(&ptrIfAddrsStart); | |
2458 ptrIfAddrs = ptrIfAddrsStart; | |
2459 while(ptrIfAddrs) | |
2460 { | |
2461 if(ptrIfAddrs->ifa_addr->sa_family == AF_INET6) | |
2462 { | |
2463 const struct sockaddr_in6* sock_in6 = | |
2464 reinterpret_cast<struct sockaddr_in6*>(ptrIfAddrs->ifa_addr); | |
2465 const struct in6_addr* sin6_addr = &sock_in6->sin6_addr; | |
2466 | |
2467 if (IN6_IS_ADDR_LOOPBACK(sin6_addr) || | |
2468 IN6_IS_ADDR_LINKLOCAL(sin6_addr)) { | |
2469 ptrIfAddrs = ptrIfAddrs->ifa_next; | |
2470 continue; | |
2471 } | |
2472 memcpy(n_localIP, sin6_addr->s6_addr, sizeof(sin6_addr->s6_addr)); | |
2473 freeifaddrs(ptrIfAddrsStart); | |
2474 return 0; | |
2475 } | |
2476 ptrIfAddrs = ptrIfAddrs->ifa_next; | |
2477 } | |
2478 freeifaddrs(ptrIfAddrsStart); | |
2479 return -1; | |
2480 #elif defined(WEBRTC_ANDROID) | |
2481 return -1; | |
2482 #else // WEBRTC_LINUX | |
2483 struct | |
2484 { | |
2485 struct nlmsghdr n; | |
2486 struct ifaddrmsg r; | |
2487 } req; | |
2488 | |
2489 struct rtattr* rta = NULL; | |
2490 int status; | |
2491 char buf[16384]; // = 16 * 1024 (16 kB) | |
2492 struct nlmsghdr* nlmp; | |
2493 struct ifaddrmsg* rtmp; | |
2494 struct rtattr* rtatp; | |
2495 int rtattrlen; | |
2496 struct in6_addr* in6p; | |
2497 | |
2498 int fd = socket(PF_NETLINK, SOCK_DGRAM, NETLINK_ROUTE); | |
2499 if (fd == -1) | |
2500 { | |
2501 return -1; | |
2502 } | |
2503 | |
2504 // RTM_GETADDR is used to fetch the ip address from the kernel interface | |
2505 // table. Populate the msg structure (req) the size of the message buffer | |
2506 // is specified to netlinkmessage header, and flags values are set as | |
2507 // NLM_F_ROOT | NLM_F_REQUEST. | |
2508 // The request flag must be set for all messages requesting the data from | |
2509 // kernel. The root flag is used to notify the kernel to return the full | |
2510 // tabel. Another flag (not used) is NLM_F_MATCH. This is used to get only | |
2511 // specified entries in the table. At the time of writing this program this | |
2512 // flag is not implemented in kernel | |
2513 | |
2514 memset(&req, 0, sizeof(req)); | |
2515 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)); | |
2516 req.n.nlmsg_flags = NLM_F_REQUEST | NLM_F_ROOT; | |
2517 req.n.nlmsg_type = RTM_GETADDR; | |
2518 req.r.ifa_family = AF_INET6; | |
2519 | |
2520 // Fill up all the attributes for the rtnetlink header. | |
2521 // The lenght is very important. 16 signifies the ipv6 address. | |
2522 rta = (struct rtattr*)(((char*)&req) + NLMSG_ALIGN(req.n.nlmsg_len)); | |
2523 rta->rta_len = RTA_LENGTH(16); | |
2524 | |
2525 status = send(fd, &req, req.n.nlmsg_len, 0); | |
2526 if (status < 0) | |
2527 { | |
2528 close(fd); | |
2529 return -1; | |
2530 } | |
2531 status = recv(fd, buf, sizeof(buf), 0); | |
2532 if (status < 0) | |
2533 { | |
2534 close(fd); | |
2535 return -1; | |
2536 } | |
2537 if(status == 0) | |
2538 { | |
2539 close(fd); | |
2540 return -1; | |
2541 } | |
2542 close(fd); | |
2543 | |
2544 // The message is stored in buff. Parse the message to get the requested | |
2545 // data. | |
2546 { | |
2547 nlmp = (struct nlmsghdr*)buf; | |
2548 int len = nlmp->nlmsg_len; | |
2549 int req_len = len - sizeof(*nlmp); | |
2550 | |
2551 if (req_len < 0 || len > status) | |
2552 { | |
2553 return -1; | |
2554 } | |
2555 if (!NLMSG_OK_NO_WARNING(nlmp, status)) | |
2556 { | |
2557 return -1; | |
2558 } | |
2559 rtmp = (struct ifaddrmsg*)NLMSG_DATA(nlmp); | |
2560 rtatp = (struct rtattr*)IFA_RTA(rtmp); | |
2561 | |
2562 rtattrlen = IFA_PAYLOAD(nlmp); | |
2563 | |
2564 for (; RTA_OK(rtatp, rtattrlen); rtatp = RTA_NEXT(rtatp, rtattrlen)) | |
2565 { | |
2566 | |
2567 // Here we hit the fist chunk of the message. Time to validate the | |
2568 // type. For more info on the different types see | |
2569 // "man(7) rtnetlink" The table below is taken from man pages. | |
2570 // Attributes | |
2571 // rta_type value type description | |
2572 // ------------------------------------------------------------- | |
2573 // IFA_UNSPEC - unspecified. | |
2574 // IFA_ADDRESS raw protocol address interface address | |
2575 // IFA_LOCAL raw protocol address local address | |
2576 // IFA_LABEL asciiz string name of the interface | |
2577 // IFA_BROADCAST raw protocol address broadcast address. | |
2578 // IFA_ANYCAST raw protocol address anycast address | |
2579 // IFA_CACHEINFO struct ifa_cacheinfo Address information. | |
2580 | |
2581 if(rtatp->rta_type == IFA_ADDRESS) | |
2582 { | |
2583 bool islocalIP = true; | |
2584 in6p = (struct in6_addr*)RTA_DATA(rtatp); | |
2585 for(int n = 0; n< 15; n++) | |
2586 { | |
2587 if(in6p->s6_addr[n] != 0) | |
2588 { | |
2589 islocalIP = false; | |
2590 break; | |
2591 } | |
2592 } | |
2593 if(islocalIP && in6p->s6_addr[15] != 1) | |
2594 { | |
2595 islocalIP = false; | |
2596 } | |
2597 if(!islocalIP) | |
2598 { | |
2599 for(int i = 0; i< 16; i++) | |
2600 { | |
2601 n_localIP[i] = in6p->s6_addr[i]; | |
2602 } | |
2603 if(n_localIP[0] == static_cast<char> (0xfe) | |
2604 && n_localIP[1] == static_cast<char>(0x80) ) | |
2605 { | |
2606 // Auto configured IP. | |
2607 continue; | |
2608 } | |
2609 break; | |
2610 } | |
2611 } | |
2612 } | |
2613 } | |
2614 return 0; | |
2615 #endif | |
2616 } | |
2617 | |
2618 int32_t UdpTransport::LocalHostAddress(uint32_t& localIP) | |
2619 { | |
2620 #if defined(_WIN32) | |
2621 hostent* localHost; | |
2622 localHost = gethostbyname( "" ); | |
2623 if(localHost) | |
2624 { | |
2625 if(localHost->h_addrtype != AF_INET) | |
2626 { | |
2627 WEBRTC_TRACE( | |
2628 kTraceError, | |
2629 kTraceTransport, | |
2630 -1, | |
2631 "LocalHostAddress can only get local IP for IP Version 4"); | |
2632 return -1; | |
2633 } | |
2634 localIP= Htonl( | |
2635 (*(struct in_addr *)localHost->h_addr_list[0]).S_un.S_addr); | |
2636 return 0; | |
2637 } | |
2638 else | |
2639 { | |
2640 int32_t error = WSAGetLastError(); | |
2641 WEBRTC_TRACE(kTraceWarning, kTraceTransport, -1, | |
2642 "gethostbyname failed, error:%d", error); | |
2643 return -1; | |
2644 } | |
2645 #elif (defined(WEBRTC_MAC)) | |
2646 char localname[255]; | |
2647 if (gethostname(localname, 255) != -1) | |
2648 { | |
2649 hostent* localHost; | |
2650 localHost = gethostbyname(localname); | |
2651 if(localHost) | |
2652 { | |
2653 if(localHost->h_addrtype != AF_INET) | |
2654 { | |
2655 WEBRTC_TRACE( | |
2656 kTraceError, | |
2657 kTraceTransport, | |
2658 -1, | |
2659 "LocalHostAddress can only get local IP for IP Version 4"); | |
2660 return -1; | |
2661 } | |
2662 localIP = Htonl((*(struct in_addr*)*localHost->h_addr_list).s_addr); | |
2663 return 0; | |
2664 } | |
2665 } | |
2666 WEBRTC_TRACE(kTraceWarning, kTraceTransport, -1, "gethostname failed"); | |
2667 return -1; | |
2668 #else // WEBRTC_LINUX | |
2669 int sockfd, size = 1; | |
2670 struct ifreq* ifr; | |
2671 struct ifconf ifc; | |
2672 | |
2673 if (0 > (sockfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_IP))) | |
2674 { | |
2675 return -1; | |
2676 } | |
2677 ifc.ifc_len = IFRSIZE; | |
2678 ifc.ifc_req = NULL; | |
2679 do | |
2680 { | |
2681 ++size; | |
2682 // Buffer size needed is unknown. Try increasing it until no overflow | |
2683 // occurs. | |
2684 if (NULL == (ifc.ifc_req = (ifreq*)realloc(ifc.ifc_req, IFRSIZE))) { | |
2685 fprintf(stderr, "Out of memory.\n"); | |
2686 exit(EXIT_FAILURE); | |
2687 } | |
2688 ifc.ifc_len = IFRSIZE; | |
2689 if (ioctl(sockfd, SIOCGIFCONF, &ifc)) | |
2690 { | |
2691 free(ifc.ifc_req); | |
2692 close(sockfd); | |
2693 return -1; | |
2694 } | |
2695 } while (IFRSIZE <= ifc.ifc_len); | |
2696 | |
2697 ifr = ifc.ifc_req; | |
2698 for (;(char *) ifr < (char *) ifc.ifc_req + ifc.ifc_len; ++ifr) | |
2699 { | |
2700 if (ifr->ifr_addr.sa_data == (ifr+1)->ifr_addr.sa_data) | |
2701 { | |
2702 continue; // duplicate, skip it | |
2703 } | |
2704 if (ioctl(sockfd, SIOCGIFFLAGS, ifr)) | |
2705 { | |
2706 continue; // failed to get flags, skip it | |
2707 } | |
2708 if(strncmp(ifr->ifr_name, "lo",3) == 0) | |
2709 { | |
2710 continue; | |
2711 }else | |
2712 { | |
2713 struct sockaddr* saddr = &(ifr->ifr_addr); | |
2714 SocketAddress* socket_addess = reinterpret_cast<SocketAddress*>( | |
2715 saddr); | |
2716 localIP = Htonl(socket_addess->_sockaddr_in.sin_addr); | |
2717 close(sockfd); | |
2718 free(ifc.ifc_req); | |
2719 return 0; | |
2720 } | |
2721 } | |
2722 free(ifc.ifc_req); | |
2723 close(sockfd); | |
2724 return -1; | |
2725 #endif | |
2726 } | |
2727 | |
2728 int32_t UdpTransport::IPAddress(const SocketAddress& address, | |
2729 char* ip, | |
2730 uint32_t& ipSize, | |
2731 uint16_t& sourcePort) | |
2732 { | |
2733 #if defined(_WIN32) | |
2734 DWORD dwIPSize = ipSize; | |
2735 int32_t returnvalue = WSAAddressToStringA((LPSOCKADDR)(&address), | |
2736 sizeof(SocketAddress), | |
2737 NULL, | |
2738 ip, | |
2739 &dwIPSize); | |
2740 if(returnvalue == -1) | |
2741 { | |
2742 return -1; | |
2743 } | |
2744 | |
2745 uint16_t source_port = 0; | |
2746 if(address._sockaddr_storage.sin_family == AF_INET) | |
2747 { | |
2748 // Parse IP assuming format "a.b.c.d:port". | |
2749 char* ipEnd = strchr(ip,':'); | |
2750 if(ipEnd != NULL) | |
2751 { | |
2752 *ipEnd = '\0'; | |
2753 } | |
2754 ipSize = (int32_t)strlen(ip); | |
2755 if(ipSize == 0) | |
2756 { | |
2757 return -1; | |
2758 } | |
2759 source_port = address._sockaddr_in.sin_port; | |
2760 } | |
2761 else | |
2762 { | |
2763 // Parse IP assuming format "[address]:port". | |
2764 char* ipEnd = strchr(ip,']'); | |
2765 if(ipEnd != NULL) | |
2766 { | |
2767 // Calculate length | |
2768 int32_t adrSize = int32_t(ipEnd - ip) - 1; | |
2769 memmove(ip, &ip[1], adrSize); // Remove '[' | |
2770 *(ipEnd - 1) = '\0'; | |
2771 } | |
2772 ipSize = (int32_t)strlen(ip); | |
2773 if(ipSize == 0) | |
2774 { | |
2775 return -1; | |
2776 } | |
2777 | |
2778 source_port = address._sockaddr_in6.sin6_port; | |
2779 } | |
2780 // Convert port number to network byte order. | |
2781 sourcePort = htons(source_port); | |
2782 return 0; | |
2783 | |
2784 #elif defined(WEBRTC_LINUX) || defined(WEBRTC_MAC) | |
2785 int32_t ipFamily = address._sockaddr_storage.sin_family; | |
2786 const void* ptrNumericIP = NULL; | |
2787 | |
2788 if(ipFamily == AF_INET) | |
2789 { | |
2790 ptrNumericIP = &(address._sockaddr_in.sin_addr); | |
2791 } | |
2792 else if(ipFamily == AF_INET6) | |
2793 { | |
2794 ptrNumericIP = &(address._sockaddr_in6.sin6_addr); | |
2795 } | |
2796 else | |
2797 { | |
2798 return -1; | |
2799 } | |
2800 if(inet_ntop(ipFamily, ptrNumericIP, ip, ipSize) == NULL) | |
2801 { | |
2802 return -1; | |
2803 } | |
2804 uint16_t source_port; | |
2805 if(ipFamily == AF_INET) | |
2806 { | |
2807 source_port = address._sockaddr_in.sin_port; | |
2808 } else | |
2809 { | |
2810 source_port = address._sockaddr_in6.sin6_port; | |
2811 } | |
2812 // Convert port number to network byte order. | |
2813 sourcePort = htons(source_port); | |
2814 return 0; | |
2815 #else | |
2816 return -1; | |
2817 #endif | |
2818 } | |
2819 | |
2820 bool UdpTransport::IsIpAddressValid(const char* ipadr, const bool ipV6) | |
2821 { | |
2822 if(ipV6) | |
2823 { | |
2824 int32_t len = (int32_t)strlen(ipadr); | |
2825 if( len>39 || len == 0) | |
2826 { | |
2827 return false; | |
2828 } | |
2829 | |
2830 int32_t i; | |
2831 int32_t colonPos[7] = {0,0,0,0,0,0,0}; | |
2832 int32_t lastColonPos = -2; | |
2833 int32_t nColons = 0; | |
2834 int32_t nDubbleColons = 0; | |
2835 int32_t nDots = 0; | |
2836 int32_t error = 0; | |
2837 char c; | |
2838 for(i = 0; i < len ; i++) | |
2839 { | |
2840 c=ipadr[i]; | |
2841 if(isxdigit(c)) | |
2842 ; | |
2843 else if(c == ':') | |
2844 { | |
2845 if(nColons < 7) | |
2846 colonPos[nColons] = i; | |
2847 if((i-lastColonPos)==1) | |
2848 nDubbleColons++; | |
2849 lastColonPos=i; | |
2850 if(nDots != 0) | |
2851 { | |
2852 error = 1; | |
2853 } | |
2854 nColons++; | |
2855 } | |
2856 else if(c == '.') | |
2857 { | |
2858 nDots++; | |
2859 } | |
2860 else | |
2861 { | |
2862 error = 1; | |
2863 } | |
2864 | |
2865 } | |
2866 if(error) | |
2867 { | |
2868 return false; | |
2869 } | |
2870 if(nDubbleColons > 1) | |
2871 { | |
2872 return false; | |
2873 } | |
2874 if(nColons > 7 || nColons < 2) | |
2875 { | |
2876 return false; | |
2877 } | |
2878 if(!(nDots == 3 || nDots == 0)) | |
2879 { | |
2880 return false; | |
2881 } | |
2882 lastColonPos = -1; | |
2883 int32_t charsBeforeColon = 0; | |
2884 for(i = 0; i < nColons; i++) | |
2885 { | |
2886 charsBeforeColon=colonPos[i]-lastColonPos-1; | |
2887 if(charsBeforeColon > 4) | |
2888 { | |
2889 return false; | |
2890 } | |
2891 lastColonPos=colonPos[i]; | |
2892 } | |
2893 int32_t lengthAfterLastColon = len - lastColonPos - 1; | |
2894 if(nDots == 0) | |
2895 { | |
2896 if(lengthAfterLastColon > 4) | |
2897 return false; | |
2898 } | |
2899 if(nDots == 3 && lengthAfterLastColon > 0) | |
2900 { | |
2901 return IsIpAddressValid((ipadr+lastColonPos+1),false); | |
2902 } | |
2903 | |
2904 } | |
2905 else | |
2906 { | |
2907 int32_t len = (int32_t)strlen(ipadr); | |
2908 if((len>15)||(len==0)) | |
2909 { | |
2910 return false; | |
2911 } | |
2912 | |
2913 // IPv4 should be [0-255].[0-255].[0-255].[0-255] | |
2914 int32_t i; | |
2915 int32_t nDots = 0; | |
2916 int32_t iDotPos[4] = {0,0,0,0}; | |
2917 | |
2918 for (i = 0; (i < len) && (nDots < 4); i++) | |
2919 { | |
2920 if (ipadr[i] == (char)'.') | |
2921 { | |
2922 // Store index of dots and count number of dots. | |
2923 iDotPos[nDots++] = i; | |
2924 } | |
2925 else if (isdigit(ipadr[i]) == 0) | |
2926 { | |
2927 return false; | |
2928 } | |
2929 } | |
2930 | |
2931 bool allUnder256 = false; | |
2932 // TODO (hellner): while loop seems to be abused here to get | |
2933 // label like functionality. Fix later to avoid introducing bugs now. | |
2934 | |
2935 // Check that all numbers are smaller than 256. | |
2936 do | |
2937 { | |
2938 if (nDots != 3 ) | |
2939 { | |
2940 break; | |
2941 } | |
2942 | |
2943 if (iDotPos[0] <= 3) | |
2944 { | |
2945 char nr[4]; | |
2946 memset(nr,0,4); | |
2947 strncpy(nr,&ipadr[0],iDotPos[0]); | |
2948 int32_t num = atoi(nr); | |
2949 if (num > 255 || num < 0) | |
2950 { | |
2951 break; | |
2952 } | |
2953 } else { | |
2954 break; | |
2955 } | |
2956 | |
2957 if (iDotPos[1] - iDotPos[0] <= 4) | |
2958 { | |
2959 char nr[4]; | |
2960 memset(nr,0,4); | |
2961 strncpy(nr,&ipadr[iDotPos[0]+1], iDotPos[1] - iDotPos[0] - 1); | |
2962 int32_t num = atoi(nr); | |
2963 if (num > 255 || num < 0) | |
2964 break; | |
2965 } else { | |
2966 break; | |
2967 } | |
2968 | |
2969 if (iDotPos[2] - iDotPos[1] <= 4) | |
2970 { | |
2971 char nr[4]; | |
2972 memset(nr,0,4); | |
2973 strncpy(nr,&ipadr[iDotPos[1]+1], iDotPos[2] - iDotPos[1] - 1); | |
2974 int32_t num = atoi(nr); | |
2975 if (num > 255 || num < 0) | |
2976 break; | |
2977 } else { | |
2978 break; | |
2979 } | |
2980 | |
2981 if (len - iDotPos[2] <= 4) | |
2982 { | |
2983 char nr[4]; | |
2984 memset(nr,0,4); | |
2985 strncpy(nr,&ipadr[iDotPos[2]+1], len - iDotPos[2] -1); | |
2986 int32_t num = atoi(nr); | |
2987 if (num > 255 || num < 0) | |
2988 break; | |
2989 else | |
2990 allUnder256 = true; | |
2991 } else { | |
2992 break; | |
2993 } | |
2994 } while(false); | |
2995 | |
2996 if (nDots != 3 || !allUnder256) | |
2997 { | |
2998 return false; | |
2999 } | |
3000 } | |
3001 return true; | |
3002 } | |
3003 | |
3004 } // namespace test | |
3005 } // namespace webrtc | |
OLD | NEW |