OLD | NEW |
(Empty) | |
| 1 /* |
| 2 * Copyright (c) 2012 The WebRTC project authors. All Rights Reserved. |
| 3 * |
| 4 * Use of this source code is governed by a BSD-style license |
| 5 * that can be found in the LICENSE file in the root of the source |
| 6 * tree. An additional intellectual property rights grant can be found |
| 7 * in the file PATENTS. All contributing project authors may |
| 8 * be found in the AUTHORS file in the root of the source tree. |
| 9 */ |
| 10 |
| 11 #include "webrtc/test/channel_transport/udp_transport_impl.h" |
| 12 |
| 13 #include <stdio.h> |
| 14 #include <stdlib.h> |
| 15 #include <string.h> |
| 16 #include <time.h> |
| 17 |
| 18 #if defined(_WIN32) |
| 19 #include <winsock2.h> |
| 20 #include <ws2tcpip.h> |
| 21 #elif defined(WEBRTC_LINUX) || defined(WEBRTC_MAC) |
| 22 #include <arpa/inet.h> |
| 23 #include <ctype.h> |
| 24 #include <fcntl.h> |
| 25 #include <net/if.h> |
| 26 #include <netdb.h> |
| 27 #include <netinet/in.h> |
| 28 #include <stdlib.h> |
| 29 #include <sys/ioctl.h> |
| 30 #include <sys/socket.h> |
| 31 #include <sys/time.h> |
| 32 #include <unistd.h> |
| 33 #ifndef WEBRTC_IOS |
| 34 #include <net/if_arp.h> |
| 35 #endif |
| 36 #endif // defined(WEBRTC_LINUX) || defined(WEBRTC_MAC) |
| 37 |
| 38 #if defined(WEBRTC_MAC) |
| 39 #include <ifaddrs.h> |
| 40 #include <machine/types.h> |
| 41 #endif |
| 42 #if defined(WEBRTC_LINUX) |
| 43 #include <linux/netlink.h> |
| 44 #include <linux/rtnetlink.h> |
| 45 #endif |
| 46 |
| 47 #include "webrtc/common_types.h" |
| 48 #include "webrtc/system_wrappers/include/critical_section_wrapper.h" |
| 49 #include "webrtc/system_wrappers/include/rw_lock_wrapper.h" |
| 50 #include "webrtc/system_wrappers/include/trace.h" |
| 51 #include "webrtc/test/channel_transport/udp_socket_manager_wrapper.h" |
| 52 #include "webrtc/typedefs.h" |
| 53 |
| 54 #if defined(WEBRTC_LINUX) || defined(WEBRTC_MAC) |
| 55 #define GetLastError() errno |
| 56 |
| 57 #define IFRSIZE ((int)(size * sizeof (struct ifreq))) |
| 58 |
| 59 #define NLMSG_OK_NO_WARNING(nlh,len) \ |
| 60 ((len) >= (int)sizeof(struct nlmsghdr) && \ |
| 61 (int)(nlh)->nlmsg_len >= (int)sizeof(struct nlmsghdr) && \ |
| 62 (int)(nlh)->nlmsg_len <= (len)) |
| 63 |
| 64 #endif // defined(WEBRTC_LINUX) || defined(WEBRTC_MAC) |
| 65 |
| 66 namespace webrtc { |
| 67 namespace test { |
| 68 |
| 69 class SocketFactory : public UdpTransportImpl::SocketFactoryInterface { |
| 70 public: |
| 71 UdpSocketWrapper* CreateSocket(const int32_t id, |
| 72 UdpSocketManager* mgr, |
| 73 CallbackObj obj, |
| 74 IncomingSocketCallback cb, |
| 75 bool ipV6Enable, |
| 76 bool disableGQOS) override { |
| 77 return UdpSocketWrapper::CreateSocket(id, mgr, obj, cb, ipV6Enable, |
| 78 disableGQOS); |
| 79 } |
| 80 }; |
| 81 |
| 82 // Creates an UdpTransport using the definition of SocketFactory above, |
| 83 // and passes (creating if needed) a pointer to the static singleton |
| 84 // UdpSocketManager. |
| 85 UdpTransport* UdpTransport::Create(const int32_t id, |
| 86 uint8_t& numSocketThreads) |
| 87 { |
| 88 return new UdpTransportImpl(id, |
| 89 new SocketFactory(), |
| 90 UdpSocketManager::Create(id, numSocketThreads)); |
| 91 } |
| 92 |
| 93 // Deletes the UdpTransport and decrements the refcount of the |
| 94 // static singleton UdpSocketManager, possibly destroying it. |
| 95 // Should only be used on UdpTransports that are created using Create. |
| 96 void UdpTransport::Destroy(UdpTransport* module) |
| 97 { |
| 98 if(module) |
| 99 { |
| 100 delete module; |
| 101 UdpSocketManager::Return(); |
| 102 } |
| 103 } |
| 104 |
| 105 UdpTransportImpl::UdpTransportImpl(const int32_t id, |
| 106 SocketFactoryInterface* maker, |
| 107 UdpSocketManager* socket_manager) |
| 108 : _id(id), |
| 109 _socket_creator(maker), |
| 110 _crit(CriticalSectionWrapper::CreateCriticalSection()), |
| 111 _critFilter(CriticalSectionWrapper::CreateCriticalSection()), |
| 112 _critPacketCallback(CriticalSectionWrapper::CreateCriticalSection()), |
| 113 _mgr(socket_manager), |
| 114 _lastError(kNoSocketError), |
| 115 _destPort(0), |
| 116 _destPortRTCP(0), |
| 117 _localPort(0), |
| 118 _localPortRTCP(0), |
| 119 _srcPort(0), |
| 120 _srcPortRTCP(0), |
| 121 _fromPort(0), |
| 122 _fromPortRTCP(0), |
| 123 _fromIP(), |
| 124 _destIP(), |
| 125 _localIP(), |
| 126 _localMulticastIP(), |
| 127 _ptrRtpSocket(NULL), |
| 128 _ptrRtcpSocket(NULL), |
| 129 _ptrSendRtpSocket(NULL), |
| 130 _ptrSendRtcpSocket(NULL), |
| 131 _remoteRTPAddr(), |
| 132 _remoteRTCPAddr(), |
| 133 _localRTPAddr(), |
| 134 _localRTCPAddr(), |
| 135 _tos(0), |
| 136 _receiving(false), |
| 137 _useSetSockOpt(false), |
| 138 _qos(false), |
| 139 _pcp(0), |
| 140 _ipV6Enabled(false), |
| 141 _serviceType(0), |
| 142 _overrideDSCP(0), |
| 143 _maxBitrate(0), |
| 144 _cachLock(RWLockWrapper::CreateRWLock()), |
| 145 _previousAddress(), |
| 146 _previousIP(), |
| 147 _previousIPSize(0), |
| 148 _previousSourcePort(0), |
| 149 _filterIPAddress(), |
| 150 _rtpFilterPort(0), |
| 151 _rtcpFilterPort(0), |
| 152 _packetCallback(0) |
| 153 { |
| 154 memset(&_remoteRTPAddr, 0, sizeof(_remoteRTPAddr)); |
| 155 memset(&_remoteRTCPAddr, 0, sizeof(_remoteRTCPAddr)); |
| 156 memset(&_localRTPAddr, 0, sizeof(_localRTPAddr)); |
| 157 memset(&_localRTCPAddr, 0, sizeof(_localRTCPAddr)); |
| 158 |
| 159 memset(_fromIP, 0, sizeof(_fromIP)); |
| 160 memset(_destIP, 0, sizeof(_destIP)); |
| 161 memset(_localIP, 0, sizeof(_localIP)); |
| 162 memset(_localMulticastIP, 0, sizeof(_localMulticastIP)); |
| 163 |
| 164 memset(&_filterIPAddress, 0, sizeof(_filterIPAddress)); |
| 165 |
| 166 WEBRTC_TRACE(kTraceMemory, kTraceTransport, id, "%s created", __FUNCTION__); |
| 167 } |
| 168 |
| 169 UdpTransportImpl::~UdpTransportImpl() |
| 170 { |
| 171 CloseSendSockets(); |
| 172 CloseReceiveSockets(); |
| 173 delete _crit; |
| 174 delete _critFilter; |
| 175 delete _critPacketCallback; |
| 176 delete _cachLock; |
| 177 delete _socket_creator; |
| 178 |
| 179 WEBRTC_TRACE(kTraceMemory, kTraceTransport, _id, "%s deleted", |
| 180 __FUNCTION__); |
| 181 } |
| 182 |
| 183 UdpTransport::ErrorCode UdpTransportImpl::LastError() const |
| 184 { |
| 185 return _lastError; |
| 186 } |
| 187 |
| 188 bool SameAddress(const SocketAddress& address1, const SocketAddress& address2) |
| 189 { |
| 190 return (memcmp(&address1,&address2,sizeof(address1)) == 0); |
| 191 } |
| 192 |
| 193 void UdpTransportImpl::GetCachedAddress(char* ip, |
| 194 uint32_t& ipSize, |
| 195 uint16_t& sourcePort) |
| 196 { |
| 197 const uint32_t originalIPSize = ipSize; |
| 198 // If the incoming string is too small, fill it as much as there is room |
| 199 // for. Make sure that there is room for the '\0' character. |
| 200 ipSize = (ipSize - 1 < _previousIPSize) ? ipSize - 1 : _previousIPSize; |
| 201 memcpy(ip,_previousIP,sizeof(int8_t)*(ipSize + 1)); |
| 202 ip[originalIPSize - 1] = '\0'; |
| 203 sourcePort = _previousSourcePort; |
| 204 } |
| 205 |
| 206 int32_t UdpTransportImpl::IPAddressCached(const SocketAddress& address, |
| 207 char* ip, |
| 208 uint32_t& ipSize, |
| 209 uint16_t& sourcePort) |
| 210 { |
| 211 { |
| 212 ReadLockScoped rl(*_cachLock); |
| 213 // Check if the old address can be re-used (is the same). |
| 214 if(SameAddress(address,_previousAddress)) |
| 215 { |
| 216 GetCachedAddress(ip,ipSize,sourcePort); |
| 217 return 0; |
| 218 } |
| 219 } |
| 220 // Get the new address and store it. |
| 221 WriteLockScoped wl(*_cachLock); |
| 222 ipSize = kIpAddressVersion6Length; |
| 223 if(IPAddress(address,_previousIP,ipSize,_previousSourcePort) != 0) |
| 224 { |
| 225 return -1; |
| 226 } |
| 227 _previousIPSize = ipSize; |
| 228 memcpy(&_previousAddress, &address, sizeof(address)); |
| 229 // Address has been cached at this point. |
| 230 GetCachedAddress(ip,ipSize,sourcePort); |
| 231 return 0; |
| 232 } |
| 233 |
| 234 int32_t UdpTransportImpl::InitializeReceiveSockets( |
| 235 UdpTransportData* const packetCallback, |
| 236 const uint16_t portnr, |
| 237 const char* ip, |
| 238 const char* multicastIpAddr, |
| 239 const uint16_t rtcpPort) |
| 240 { |
| 241 { |
| 242 CriticalSectionScoped cs(_critPacketCallback); |
| 243 _packetCallback = packetCallback; |
| 244 |
| 245 if(packetCallback == NULL) |
| 246 { |
| 247 WEBRTC_TRACE(kTraceStateInfo, kTraceTransport, _id, |
| 248 "Closing down receive sockets"); |
| 249 return 0; |
| 250 } |
| 251 } |
| 252 |
| 253 CriticalSectionScoped cs(_crit); |
| 254 CloseReceiveSockets(); |
| 255 |
| 256 if(portnr == 0) |
| 257 { |
| 258 // TODO (hellner): why not just fail here? |
| 259 if(_destPort == 0) |
| 260 { |
| 261 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 262 "InitializeReceiveSockets port 0 not allowed"); |
| 263 _lastError = kPortInvalid; |
| 264 return -1; |
| 265 } |
| 266 _localPort = _destPort; |
| 267 } else { |
| 268 _localPort = portnr; |
| 269 } |
| 270 if(rtcpPort) |
| 271 { |
| 272 _localPortRTCP = rtcpPort; |
| 273 }else { |
| 274 _localPortRTCP = _localPort + 1; |
| 275 WEBRTC_TRACE( |
| 276 kTraceStateInfo, |
| 277 kTraceTransport, |
| 278 _id, |
| 279 "InitializeReceiveSockets RTCP port not configured using RTP\ |
| 280 port+1=%d", |
| 281 _localPortRTCP); |
| 282 } |
| 283 |
| 284 if(ip) |
| 285 { |
| 286 if(IsIpAddressValid(ip,IpV6Enabled())) |
| 287 { |
| 288 strncpy(_localIP, ip,kIpAddressVersion6Length); |
| 289 } else |
| 290 { |
| 291 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 292 "InitializeReceiveSockets invalid IP address"); |
| 293 _lastError = kIpAddressInvalid; |
| 294 return -1; |
| 295 } |
| 296 }else |
| 297 { |
| 298 // Don't bind to a specific IP address. |
| 299 if(! IpV6Enabled()) |
| 300 { |
| 301 strncpy(_localIP, "0.0.0.0",16); |
| 302 } else |
| 303 { |
| 304 strncpy(_localIP, "0000:0000:0000:0000:0000:0000:0000:0000", |
| 305 kIpAddressVersion6Length); |
| 306 } |
| 307 } |
| 308 if(multicastIpAddr && !IpV6Enabled()) |
| 309 { |
| 310 if(IsIpAddressValid(multicastIpAddr,IpV6Enabled())) |
| 311 { |
| 312 strncpy(_localMulticastIP, multicastIpAddr, |
| 313 kIpAddressVersion6Length); |
| 314 } else |
| 315 { |
| 316 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 317 "InitializeReceiveSockets invalid IP address"); |
| 318 _lastError = kIpAddressInvalid; |
| 319 return -1; |
| 320 } |
| 321 } |
| 322 if(_mgr == NULL) |
| 323 { |
| 324 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 325 "InitializeReceiveSockets no socket manager"); |
| 326 return -1; |
| 327 } |
| 328 |
| 329 _useSetSockOpt=false; |
| 330 _tos=0; |
| 331 _pcp=0; |
| 332 |
| 333 _ptrRtpSocket = _socket_creator->CreateSocket(_id, _mgr, this, |
| 334 IncomingRTPCallback, |
| 335 IpV6Enabled(), false); |
| 336 |
| 337 _ptrRtcpSocket = _socket_creator->CreateSocket(_id, _mgr, this, |
| 338 IncomingRTCPCallback, |
| 339 IpV6Enabled(), false); |
| 340 |
| 341 ErrorCode retVal = BindLocalRTPSocket(); |
| 342 if(retVal != kNoSocketError) |
| 343 { |
| 344 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 345 "InitializeReceiveSockets faild to bind RTP socket"); |
| 346 _lastError = retVal; |
| 347 CloseReceiveSockets(); |
| 348 return -1; |
| 349 } |
| 350 retVal = BindLocalRTCPSocket(); |
| 351 if(retVal != kNoSocketError) |
| 352 { |
| 353 _lastError = retVal; |
| 354 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 355 "InitializeReceiveSockets faild to bind RTCP socket"); |
| 356 CloseReceiveSockets(); |
| 357 return -1; |
| 358 } |
| 359 return 0; |
| 360 } |
| 361 |
| 362 int32_t UdpTransportImpl::ReceiveSocketInformation( |
| 363 char ipAddr[kIpAddressVersion6Length], |
| 364 uint16_t& rtpPort, |
| 365 uint16_t& rtcpPort, |
| 366 char multicastIpAddr[kIpAddressVersion6Length]) const |
| 367 { |
| 368 CriticalSectionScoped cs(_crit); |
| 369 rtpPort = _localPort; |
| 370 rtcpPort = _localPortRTCP; |
| 371 if (ipAddr) |
| 372 { |
| 373 strncpy(ipAddr, _localIP, IpV6Enabled() ? |
| 374 UdpTransport::kIpAddressVersion6Length : |
| 375 UdpTransport::kIpAddressVersion4Length); |
| 376 } |
| 377 if (multicastIpAddr) |
| 378 { |
| 379 strncpy(multicastIpAddr, _localMulticastIP, IpV6Enabled() ? |
| 380 UdpTransport::kIpAddressVersion6Length : |
| 381 UdpTransport::kIpAddressVersion4Length); |
| 382 } |
| 383 return 0; |
| 384 } |
| 385 |
| 386 int32_t UdpTransportImpl::SendSocketInformation( |
| 387 char ipAddr[kIpAddressVersion6Length], |
| 388 uint16_t& rtpPort, |
| 389 uint16_t& rtcpPort) const |
| 390 { |
| 391 CriticalSectionScoped cs(_crit); |
| 392 rtpPort = _destPort; |
| 393 rtcpPort = _destPortRTCP; |
| 394 strncpy(ipAddr, _destIP, IpV6Enabled() ? |
| 395 UdpTransport::kIpAddressVersion6Length : |
| 396 UdpTransport::kIpAddressVersion4Length); |
| 397 return 0; |
| 398 } |
| 399 |
| 400 int32_t UdpTransportImpl::RemoteSocketInformation( |
| 401 char ipAddr[kIpAddressVersion6Length], |
| 402 uint16_t& rtpPort, |
| 403 uint16_t& rtcpPort) const |
| 404 { |
| 405 CriticalSectionScoped cs(_crit); |
| 406 rtpPort = _fromPort; |
| 407 rtcpPort = _fromPortRTCP; |
| 408 if(ipAddr) |
| 409 { |
| 410 strncpy(ipAddr, _fromIP, IpV6Enabled() ? |
| 411 kIpAddressVersion6Length : |
| 412 kIpAddressVersion4Length); |
| 413 } |
| 414 return 0; |
| 415 } |
| 416 |
| 417 int32_t UdpTransportImpl::FilterPorts( |
| 418 uint16_t& rtpFilterPort, |
| 419 uint16_t& rtcpFilterPort) const |
| 420 { |
| 421 CriticalSectionScoped cs(_critFilter); |
| 422 rtpFilterPort = _rtpFilterPort; |
| 423 rtcpFilterPort = _rtcpFilterPort; |
| 424 return 0; |
| 425 } |
| 426 |
| 427 int32_t UdpTransportImpl::SetQoS(bool QoS, int32_t serviceType, |
| 428 uint32_t maxBitrate, |
| 429 int32_t overrideDSCP, bool audio) |
| 430 { |
| 431 if(QoS) |
| 432 { |
| 433 return EnableQoS(serviceType, audio, maxBitrate, overrideDSCP); |
| 434 }else |
| 435 { |
| 436 return DisableQoS(); |
| 437 } |
| 438 } |
| 439 |
| 440 int32_t UdpTransportImpl::EnableQoS(int32_t serviceType, |
| 441 bool audio, uint32_t maxBitrate, |
| 442 int32_t overrideDSCP) |
| 443 { |
| 444 if (_ipV6Enabled) |
| 445 { |
| 446 WEBRTC_TRACE( |
| 447 kTraceError, |
| 448 kTraceTransport, |
| 449 _id, |
| 450 "QOS is enabled but will be ignored since IPv6 is enabled"); |
| 451 _lastError = kQosError; |
| 452 return -1; |
| 453 } |
| 454 if (_tos) |
| 455 { |
| 456 WEBRTC_TRACE( |
| 457 kTraceError, |
| 458 kTraceTransport, |
| 459 _id, |
| 460 "TOS already enabled, can't use TOS and QoS at the same time"); |
| 461 _lastError = kQosError; |
| 462 return -1; |
| 463 } |
| 464 if (_pcp) |
| 465 { |
| 466 WEBRTC_TRACE( |
| 467 kTraceError, |
| 468 kTraceTransport, |
| 469 _id, |
| 470 "PCP already enabled, can't use PCP and QoS at the same time"); |
| 471 _lastError = kQosError; |
| 472 return -1; |
| 473 } |
| 474 if(_destPort == 0) |
| 475 { |
| 476 WEBRTC_TRACE( |
| 477 kTraceError, |
| 478 kTraceTransport, |
| 479 _id, |
| 480 "QOS is enabled but not started since we have not yet configured\ |
| 481 the send destination"); |
| 482 return -1; |
| 483 } |
| 484 if(_qos) |
| 485 { |
| 486 if(_overrideDSCP == 0 && overrideDSCP != 0) |
| 487 { |
| 488 WEBRTC_TRACE( |
| 489 kTraceError, |
| 490 kTraceTransport, |
| 491 _id, |
| 492 "QOS is already enabled and overrideDSCP differs, not allowed"); |
| 493 return -1; |
| 494 } |
| 495 } |
| 496 CriticalSectionScoped cs(_crit); |
| 497 |
| 498 UdpSocketWrapper* rtpSock = _ptrSendRtpSocket ? |
| 499 _ptrSendRtpSocket : |
| 500 _ptrRtpSocket; |
| 501 if (!rtpSock || !rtpSock->ValidHandle()) |
| 502 { |
| 503 WEBRTC_TRACE( |
| 504 kTraceError, |
| 505 kTraceTransport, |
| 506 _id, |
| 507 "QOS is enabled but not started since we have not yet created the\ |
| 508 RTP socket"); |
| 509 return -1; |
| 510 } |
| 511 UdpSocketWrapper* rtcpSock = _ptrSendRtcpSocket ? |
| 512 _ptrSendRtcpSocket : |
| 513 _ptrRtcpSocket; |
| 514 if (!rtcpSock || !rtcpSock->ValidHandle()) |
| 515 { |
| 516 WEBRTC_TRACE( |
| 517 kTraceError, |
| 518 kTraceTransport, |
| 519 _id, |
| 520 "QOS is enabled but not started since we have not yet created the\ |
| 521 RTCP socket"); |
| 522 return -1; |
| 523 } |
| 524 |
| 525 // Minimum packet size in bytes for which the requested quality of service |
| 526 // will be provided. The smallest RTP header is 12 byte. |
| 527 const int32_t min_policed_size = 12; |
| 528 // Max SDU, maximum packet size permitted or used in the traffic flow, in |
| 529 // bytes. |
| 530 const int32_t max_sdu_size = 1500; |
| 531 |
| 532 // Enable QoS for RTP sockets. |
| 533 if(maxBitrate) |
| 534 { |
| 535 // Note: 1 kbit is 125 bytes. |
| 536 // Token Rate is typically set to the average bit rate from peak to |
| 537 // peak. |
| 538 // Bucket size is normally set to the largest average frame size. |
| 539 if(audio) |
| 540 { |
| 541 WEBRTC_TRACE(kTraceStateInfo, |
| 542 kTraceTransport, |
| 543 _id, |
| 544 "Enable QOS for audio with max bitrate:%d", |
| 545 maxBitrate); |
| 546 |
| 547 const int32_t token_rate = maxBitrate*125; |
| 548 // The largest audio packets are 60ms frames. This is a fraction |
| 549 // more than 16 packets/second. These 16 frames are sent, at max, |
| 550 // at a bitrate of maxBitrate*125 -> 1 frame is maxBitrate*125/16 ~ |
| 551 // maxBitrate * 8. |
| 552 const int32_t bucket_size = maxBitrate * 8; |
| 553 const int32_t peek_bandwith = maxBitrate * 125; |
| 554 if (!rtpSock->SetQos(serviceType, token_rate, bucket_size, |
| 555 peek_bandwith, min_policed_size, |
| 556 max_sdu_size, _remoteRTPAddr, overrideDSCP)) |
| 557 { |
| 558 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 559 "QOS failed on the RTP socket"); |
| 560 _lastError = kQosError; |
| 561 return -1; |
| 562 } |
| 563 }else |
| 564 { |
| 565 WEBRTC_TRACE(kTraceStateInfo, kTraceTransport, _id, |
| 566 "Enable QOS for video with max bitrate:%d", |
| 567 maxBitrate); |
| 568 |
| 569 // Allow for a token rate that is twice that of the maximum bitrate |
| 570 // (in bytes). |
| 571 const int32_t token_rate = maxBitrate*250; |
| 572 // largest average frame size (key frame size). Assuming that a |
| 573 // keyframe is 25% of the bitrate during the second its sent |
| 574 // Assume that a key frame is 25% of the bitrate the second that it |
| 575 // is sent. The largest frame size is then maxBitrate* 125 * 0.25 ~ |
| 576 // 31. |
| 577 const int32_t bucket_size = maxBitrate*31; |
| 578 const int32_t peek_bandwith = maxBitrate*125; |
| 579 if (!rtpSock->SetQos(serviceType, token_rate, bucket_size, |
| 580 peek_bandwith, min_policed_size, max_sdu_size, |
| 581 _remoteRTPAddr, overrideDSCP)) |
| 582 { |
| 583 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 584 "QOS failed on the RTP socket"); |
| 585 _lastError = kQosError; |
| 586 return -1; |
| 587 } |
| 588 } |
| 589 } else if(audio) |
| 590 { |
| 591 // No max bitrate set. Audio. |
| 592 WEBRTC_TRACE(kTraceStateInfo, kTraceTransport, _id, |
| 593 "Enable QOS for audio with default max bitrate"); |
| 594 |
| 595 // Let max bitrate be 240kbit/s. |
| 596 const int32_t token_rate = 30000; |
| 597 const int32_t bucket_size = 2000; |
| 598 const int32_t peek_bandwith = 30000; |
| 599 if (!rtpSock->SetQos(serviceType, token_rate, bucket_size, |
| 600 peek_bandwith, min_policed_size, max_sdu_size, |
| 601 _remoteRTPAddr, overrideDSCP)) |
| 602 { |
| 603 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 604 "QOS failed on the RTP socket"); |
| 605 _lastError = kQosError; |
| 606 return -1; |
| 607 } |
| 608 }else |
| 609 { |
| 610 // No max bitrate set. Video. |
| 611 WEBRTC_TRACE(kTraceStateInfo, kTraceTransport, _id, |
| 612 "Enable QOS for video with default max bitrate"); |
| 613 |
| 614 // Let max bitrate be 10mbit/s. |
| 615 const int32_t token_rate = 128000*10; |
| 616 const int32_t bucket_size = 32000; |
| 617 const int32_t peek_bandwith = 256000; |
| 618 if (!rtpSock->SetQos(serviceType, token_rate, bucket_size, |
| 619 peek_bandwith, min_policed_size, max_sdu_size, |
| 620 _remoteRTPAddr, overrideDSCP)) |
| 621 { |
| 622 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 623 "QOS failed on the RTP socket"); |
| 624 _lastError = kQosError; |
| 625 return -1; |
| 626 } |
| 627 } |
| 628 |
| 629 // Enable QoS for RTCP sockets. |
| 630 // TODO (hellner): shouldn't RTCP be based on 5% of the maximum bandwidth? |
| 631 if(audio) |
| 632 { |
| 633 const int32_t token_rate = 200; |
| 634 const int32_t bucket_size = 200; |
| 635 const int32_t peek_bandwith = 400; |
| 636 if (!rtcpSock->SetQos(serviceType, token_rate, bucket_size, |
| 637 peek_bandwith, min_policed_size, max_sdu_size, |
| 638 _remoteRTCPAddr, overrideDSCP)) |
| 639 { |
| 640 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, |
| 641 "QOS failed on the RTCP socket"); |
| 642 _lastError = kQosError; |
| 643 } |
| 644 }else |
| 645 { |
| 646 const int32_t token_rate = 5000; |
| 647 const int32_t bucket_size = 100; |
| 648 const int32_t peek_bandwith = 10000; |
| 649 if (!rtcpSock->SetQos(serviceType, token_rate, bucket_size, |
| 650 peek_bandwith, min_policed_size, max_sdu_size, |
| 651 _remoteRTCPAddr, _overrideDSCP)) |
| 652 { |
| 653 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, |
| 654 "QOS failed on the RTCP socket"); |
| 655 _lastError = kQosError; |
| 656 } |
| 657 } |
| 658 _qos = true; |
| 659 _serviceType = serviceType; |
| 660 _maxBitrate = maxBitrate; |
| 661 _overrideDSCP = overrideDSCP; |
| 662 return 0; |
| 663 } |
| 664 |
| 665 int32_t UdpTransportImpl::DisableQoS() |
| 666 { |
| 667 if(_qos == false) |
| 668 { |
| 669 return 0; |
| 670 } |
| 671 CriticalSectionScoped cs(_crit); |
| 672 |
| 673 UdpSocketWrapper* rtpSock = (_ptrSendRtpSocket ? |
| 674 _ptrSendRtpSocket : _ptrRtpSocket); |
| 675 if (!rtpSock || !rtpSock->ValidHandle()) |
| 676 { |
| 677 WEBRTC_TRACE( |
| 678 kTraceError, |
| 679 kTraceTransport, |
| 680 _id, |
| 681 "QOS is enabled but not started since we have not yet created the\ |
| 682 RTP socket"); |
| 683 return -1; |
| 684 } |
| 685 UdpSocketWrapper* rtcpSock = (_ptrSendRtcpSocket ? |
| 686 _ptrSendRtcpSocket : _ptrRtcpSocket); |
| 687 if (!rtcpSock || !rtcpSock->ValidHandle()) |
| 688 { |
| 689 WEBRTC_TRACE( |
| 690 kTraceError, |
| 691 kTraceTransport, |
| 692 _id, |
| 693 "QOS is enabled but not started since we have not yet created the\ |
| 694 RTCP socket"); |
| 695 return -1; |
| 696 } |
| 697 |
| 698 const int32_t service_type = 0; // = SERVICETYPE_NOTRAFFIC |
| 699 const int32_t not_specified = -1; |
| 700 if (!rtpSock->SetQos(service_type, not_specified, not_specified, |
| 701 not_specified, not_specified, not_specified, |
| 702 _remoteRTPAddr, _overrideDSCP)) |
| 703 { |
| 704 _lastError = kQosError; |
| 705 return -1; |
| 706 } |
| 707 if (!rtcpSock->SetQos(service_type, not_specified, not_specified, |
| 708 not_specified, not_specified, not_specified, |
| 709 _remoteRTCPAddr,_overrideDSCP)) |
| 710 { |
| 711 _lastError = kQosError; |
| 712 } |
| 713 _qos = false; |
| 714 return 0; |
| 715 } |
| 716 |
| 717 int32_t UdpTransportImpl::QoS(bool& QoS, int32_t& serviceType, |
| 718 int32_t& overrideDSCP) const |
| 719 { |
| 720 CriticalSectionScoped cs(_crit); |
| 721 QoS = _qos; |
| 722 serviceType = _serviceType; |
| 723 overrideDSCP = _overrideDSCP; |
| 724 return 0; |
| 725 } |
| 726 |
| 727 int32_t UdpTransportImpl::SetToS(int32_t DSCP, bool useSetSockOpt) |
| 728 { |
| 729 if (_qos) |
| 730 { |
| 731 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, "QoS already enabled"); |
| 732 _lastError = kQosError; |
| 733 return -1; |
| 734 } |
| 735 if (DSCP < 0 || DSCP > 63) |
| 736 { |
| 737 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, "Invalid DSCP"); |
| 738 _lastError = kTosInvalid; |
| 739 return -1; |
| 740 } |
| 741 if(_tos) |
| 742 { |
| 743 if(useSetSockOpt != _useSetSockOpt) |
| 744 { |
| 745 WEBRTC_TRACE( |
| 746 kTraceError, |
| 747 kTraceTransport, |
| 748 _id, |
| 749 "Can't switch SetSockOpt method without disabling TOS first"); |
| 750 _lastError = kTosInvalid; |
| 751 return -1; |
| 752 } |
| 753 } |
| 754 CriticalSectionScoped cs(_crit); |
| 755 UdpSocketWrapper* rtpSock = NULL; |
| 756 UdpSocketWrapper* rtcpSock = NULL; |
| 757 if(_ptrSendRtpSocket) |
| 758 { |
| 759 rtpSock = _ptrSendRtpSocket; |
| 760 }else |
| 761 { |
| 762 rtpSock = _ptrRtpSocket; |
| 763 } |
| 764 if (rtpSock == NULL) |
| 765 { |
| 766 _lastError = kSocketInvalid; |
| 767 return -1; |
| 768 } |
| 769 if(!rtpSock->ValidHandle()) |
| 770 { |
| 771 _lastError = kSocketInvalid; |
| 772 return -1; |
| 773 } |
| 774 if(_ptrSendRtcpSocket) |
| 775 { |
| 776 rtcpSock = _ptrSendRtcpSocket; |
| 777 }else |
| 778 { |
| 779 rtcpSock = _ptrRtcpSocket; |
| 780 } |
| 781 if (rtcpSock == NULL) |
| 782 { |
| 783 _lastError = kSocketInvalid; |
| 784 return -1; |
| 785 } |
| 786 if(!rtcpSock->ValidHandle()) |
| 787 { |
| 788 _lastError = kSocketInvalid; |
| 789 return -1; |
| 790 } |
| 791 |
| 792 if (useSetSockOpt) |
| 793 { |
| 794 #ifdef _WIN32 |
| 795 OSVERSIONINFO OsVersion; |
| 796 OsVersion.dwOSVersionInfoSize = sizeof(OSVERSIONINFO); |
| 797 GetVersionEx(&OsVersion); |
| 798 // Disable QoS before setting ToS on Windows XP. This is done by closing |
| 799 // and re-opening the sockets. |
| 800 // TODO (hellner): why not just fail here and force the user to |
| 801 // re-initialize sockets? Doing this may trick the user |
| 802 // into thinking that the sockets are in a state which |
| 803 // they aren't. |
| 804 if (OsVersion.dwMajorVersion == 5 && |
| 805 OsVersion.dwMinorVersion == 1) |
| 806 { |
| 807 if(!_useSetSockOpt) |
| 808 { |
| 809 if(_ptrSendRtpSocket) |
| 810 { |
| 811 CloseSendSockets(); |
| 812 _ptrSendRtpSocket = |
| 813 _socket_creator->CreateSocket(_id, _mgr, NULL, |
| 814 NULL, IpV6Enabled(), |
| 815 true); |
| 816 _ptrSendRtcpSocket = |
| 817 _socket_creator->CreateSocket(_id, _mgr, NULL, |
| 818 NULL, IpV6Enabled(), |
| 819 true); |
| 820 rtpSock=_ptrSendRtpSocket; |
| 821 rtcpSock=_ptrSendRtcpSocket; |
| 822 ErrorCode retVal = BindRTPSendSocket(); |
| 823 if(retVal != kNoSocketError) |
| 824 { |
| 825 _lastError = retVal; |
| 826 return -1; |
| 827 } |
| 828 retVal = BindRTCPSendSocket(); |
| 829 if(retVal != kNoSocketError) |
| 830 { |
| 831 _lastError = retVal; |
| 832 return -1; |
| 833 } |
| 834 } |
| 835 else |
| 836 { |
| 837 bool receiving=_receiving; |
| 838 uint32_t noOfReceiveBuffers = 0; |
| 839 if(receiving) |
| 840 { |
| 841 noOfReceiveBuffers=_ptrRtpSocket->ReceiveBuffers(); |
| 842 if(StopReceiving()!=0) |
| 843 { |
| 844 return -1; |
| 845 } |
| 846 } |
| 847 CloseReceiveSockets(); |
| 848 _ptrRtpSocket = _socket_creator->CreateSocket( |
| 849 _id, _mgr, this, IncomingRTPCallback, IpV6Enabled(), |
| 850 true); |
| 851 _ptrRtcpSocket = _socket_creator->CreateSocket( |
| 852 _id, _mgr, this, IncomingRTCPCallback, IpV6Enabled(), |
| 853 true); |
| 854 rtpSock=_ptrRtpSocket; |
| 855 rtcpSock=_ptrRtcpSocket; |
| 856 ErrorCode retVal = BindLocalRTPSocket(); |
| 857 if(retVal != kNoSocketError) |
| 858 { |
| 859 _lastError = retVal; |
| 860 return -1; |
| 861 } |
| 862 retVal = BindLocalRTCPSocket(); |
| 863 if(retVal != kNoSocketError) |
| 864 { |
| 865 _lastError = retVal; |
| 866 return -1; |
| 867 } |
| 868 if(receiving) |
| 869 { |
| 870 if(StartReceiving(noOfReceiveBuffers) != |
| 871 kNoSocketError) |
| 872 { |
| 873 return -1; |
| 874 } |
| 875 } |
| 876 } |
| 877 } |
| 878 } |
| 879 #endif // #ifdef _WIN32 |
| 880 WEBRTC_TRACE(kTraceDebug, kTraceTransport, _id, |
| 881 "Setting TOS using SetSockopt"); |
| 882 int32_t TOSShifted = DSCP << 2; |
| 883 if (!rtpSock->SetSockopt(IPPROTO_IP, IP_TOS, |
| 884 (int8_t*) &TOSShifted, 4)) |
| 885 { |
| 886 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 887 "Could not SetSockopt tos value on RTP socket"); |
| 888 _lastError = kTosInvalid; |
| 889 return -1; |
| 890 } |
| 891 if (!rtcpSock->SetSockopt(IPPROTO_IP, IP_TOS, |
| 892 (int8_t*) &TOSShifted, 4)) |
| 893 { |
| 894 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 895 "Could not sSetSockopt tos value on RTCP socket"); |
| 896 _lastError = kTosInvalid; |
| 897 return -1; |
| 898 } |
| 899 } else |
| 900 { |
| 901 WEBRTC_TRACE(kTraceDebug, kTraceTransport, _id, |
| 902 "Setting TOS NOT using SetSockopt"); |
| 903 if (rtpSock->SetTOS(DSCP) != 0) |
| 904 { |
| 905 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 906 "Could not set tos value on RTP socket"); |
| 907 _lastError = kTosError; |
| 908 return -1; |
| 909 } |
| 910 if (rtcpSock->SetTOS(DSCP) != 0) |
| 911 { |
| 912 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 913 "Could not set tos value on RTCP socket"); |
| 914 _lastError = kTosError; |
| 915 return -1; |
| 916 } |
| 917 } |
| 918 _useSetSockOpt = useSetSockOpt; |
| 919 _tos = DSCP; |
| 920 return 0; |
| 921 } |
| 922 |
| 923 int32_t UdpTransportImpl::ToS(int32_t& DSCP, |
| 924 bool& useSetSockOpt) const |
| 925 { |
| 926 CriticalSectionScoped cs(_crit); |
| 927 DSCP = _tos; |
| 928 useSetSockOpt = _useSetSockOpt; |
| 929 return 0; |
| 930 } |
| 931 |
| 932 int32_t UdpTransportImpl::SetPCP(int32_t PCP) |
| 933 { |
| 934 |
| 935 if (_qos) |
| 936 { |
| 937 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, "QoS already enabled"); |
| 938 _lastError = kQosError; |
| 939 return -1; |
| 940 } |
| 941 if ((PCP < 0) || (PCP > 7)) |
| 942 { |
| 943 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, "Invalid PCP"); |
| 944 _lastError = kPcpError; |
| 945 return -1; |
| 946 } |
| 947 |
| 948 CriticalSectionScoped cs(_crit); |
| 949 UdpSocketWrapper* rtpSock = NULL; |
| 950 UdpSocketWrapper* rtcpSock = NULL; |
| 951 if(_ptrSendRtpSocket) |
| 952 { |
| 953 rtpSock = _ptrSendRtpSocket; |
| 954 }else |
| 955 { |
| 956 rtpSock = _ptrRtpSocket; |
| 957 } |
| 958 if (rtpSock == NULL) |
| 959 { |
| 960 _lastError = kSocketInvalid; |
| 961 return -1; |
| 962 } |
| 963 if(!rtpSock->ValidHandle()) |
| 964 { |
| 965 _lastError = kSocketInvalid; |
| 966 return -1; |
| 967 } |
| 968 if(_ptrSendRtcpSocket) |
| 969 { |
| 970 rtcpSock = _ptrSendRtcpSocket; |
| 971 }else |
| 972 { |
| 973 rtcpSock = _ptrRtcpSocket; |
| 974 } |
| 975 if (rtcpSock == NULL) |
| 976 { |
| 977 _lastError = kSocketInvalid; |
| 978 return -1; |
| 979 } |
| 980 if(!rtcpSock->ValidHandle()) |
| 981 { |
| 982 _lastError = kSocketInvalid; |
| 983 return -1; |
| 984 } |
| 985 |
| 986 #if defined(_WIN32) |
| 987 if (rtpSock->SetPCP(PCP) != 0) |
| 988 { |
| 989 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 990 "Could not set PCP value on RTP socket"); |
| 991 _lastError = kPcpError; |
| 992 return -1; |
| 993 } |
| 994 if (rtcpSock->SetPCP(PCP) != 0) |
| 995 { |
| 996 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 997 "Could not set PCP value on RTCP socket"); |
| 998 _lastError = kPcpError; |
| 999 return -1; |
| 1000 } |
| 1001 |
| 1002 #elif defined(WEBRTC_LINUX) |
| 1003 if (!rtpSock->SetSockopt(SOL_SOCKET, SO_PRIORITY, (int8_t*) &PCP, |
| 1004 sizeof(PCP))) |
| 1005 { |
| 1006 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1007 "Could not SetSockopt PCP value on RTP socket"); |
| 1008 _lastError = kPcpError; |
| 1009 return -1; |
| 1010 } |
| 1011 if (!rtcpSock->SetSockopt(SOL_SOCKET, SO_PRIORITY, (int8_t*) &PCP, |
| 1012 sizeof(PCP))) |
| 1013 { |
| 1014 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1015 "Could not SetSockopt PCP value on RTCP socket"); |
| 1016 _lastError = kPcpError; |
| 1017 return -1; |
| 1018 } |
| 1019 #else |
| 1020 // Not supported on other platforms (WEBRTC_MAC) |
| 1021 _lastError = kPcpError; |
| 1022 return -1; |
| 1023 #endif |
| 1024 _pcp = PCP; |
| 1025 return 0; |
| 1026 } |
| 1027 |
| 1028 int32_t UdpTransportImpl::PCP(int32_t& PCP) const |
| 1029 { |
| 1030 CriticalSectionScoped cs(_crit); |
| 1031 PCP = _pcp; |
| 1032 return 0; |
| 1033 } |
| 1034 |
| 1035 bool UdpTransportImpl::SetSockOptUsed() |
| 1036 { |
| 1037 return _useSetSockOpt; |
| 1038 } |
| 1039 |
| 1040 int32_t UdpTransportImpl::EnableIpV6() { |
| 1041 |
| 1042 CriticalSectionScoped cs(_crit); |
| 1043 const bool initialized = (_ptrSendRtpSocket || _ptrRtpSocket); |
| 1044 |
| 1045 if (_ipV6Enabled) { |
| 1046 return 0; |
| 1047 } |
| 1048 if (initialized) { |
| 1049 _lastError = kIpVersion6Error; |
| 1050 return -1; |
| 1051 } |
| 1052 _ipV6Enabled = true; |
| 1053 return 0; |
| 1054 } |
| 1055 |
| 1056 int32_t UdpTransportImpl::FilterIP( |
| 1057 char filterIPAddress[kIpAddressVersion6Length]) const |
| 1058 { |
| 1059 |
| 1060 if(filterIPAddress == NULL) |
| 1061 { |
| 1062 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1063 "FilterIP: Invalid argument"); |
| 1064 return -1; |
| 1065 } |
| 1066 if(_filterIPAddress._sockaddr_storage.sin_family == 0) |
| 1067 { |
| 1068 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, "No Filter configured"); |
| 1069 return -1; |
| 1070 } |
| 1071 CriticalSectionScoped cs(_critFilter); |
| 1072 uint32_t ipSize = kIpAddressVersion6Length; |
| 1073 uint16_t sourcePort; |
| 1074 return IPAddress(_filterIPAddress, filterIPAddress, ipSize, sourcePort); |
| 1075 } |
| 1076 |
| 1077 int32_t UdpTransportImpl::SetFilterIP( |
| 1078 const char filterIPAddress[kIpAddressVersion6Length]) |
| 1079 { |
| 1080 if(filterIPAddress == NULL) |
| 1081 { |
| 1082 memset(&_filterIPAddress, 0, sizeof(_filterIPAddress)); |
| 1083 WEBRTC_TRACE(kTraceDebug, kTraceTransport, _id, "Filter IP reset"); |
| 1084 return 0; |
| 1085 } |
| 1086 CriticalSectionScoped cs(_critFilter); |
| 1087 if (_ipV6Enabled) |
| 1088 { |
| 1089 _filterIPAddress._sockaddr_storage.sin_family = AF_INET6; |
| 1090 |
| 1091 if (InetPresentationToNumeric( |
| 1092 AF_INET6, |
| 1093 filterIPAddress, |
| 1094 &_filterIPAddress._sockaddr_in6.sin6_addr) < 0) |
| 1095 { |
| 1096 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, "Failed to set\ |
| 1097 filter IP for IPv6"); |
| 1098 _lastError = FILTER_ERROR; |
| 1099 return -1; |
| 1100 } |
| 1101 } |
| 1102 else |
| 1103 { |
| 1104 _filterIPAddress._sockaddr_storage.sin_family = AF_INET; |
| 1105 |
| 1106 if(InetPresentationToNumeric( |
| 1107 AF_INET, |
| 1108 filterIPAddress, |
| 1109 &_filterIPAddress._sockaddr_in.sin_addr) < 0) |
| 1110 { |
| 1111 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1112 "Failed to set filter IP for IPv4"); |
| 1113 _lastError = FILTER_ERROR; |
| 1114 return -1; |
| 1115 } |
| 1116 } |
| 1117 WEBRTC_TRACE(kTraceDebug, kTraceTransport, _id, "Filter IP set"); |
| 1118 return 0; |
| 1119 } |
| 1120 |
| 1121 int32_t UdpTransportImpl::SetFilterPorts(uint16_t rtpFilterPort, |
| 1122 uint16_t rtcpFilterPort) |
| 1123 { |
| 1124 CriticalSectionScoped cs(_critFilter); |
| 1125 _rtpFilterPort = rtpFilterPort; |
| 1126 _rtcpFilterPort = rtcpFilterPort; |
| 1127 return 0; |
| 1128 } |
| 1129 |
| 1130 bool UdpTransportImpl::SendSocketsInitialized() const |
| 1131 { |
| 1132 CriticalSectionScoped cs(_crit); |
| 1133 if(_ptrSendRtpSocket) |
| 1134 { |
| 1135 return true; |
| 1136 } |
| 1137 if(_destPort !=0) |
| 1138 { |
| 1139 return true; |
| 1140 } |
| 1141 return false; |
| 1142 } |
| 1143 |
| 1144 bool UdpTransportImpl::ReceiveSocketsInitialized() const |
| 1145 { |
| 1146 if(_ptrRtpSocket) |
| 1147 { |
| 1148 return true; |
| 1149 } |
| 1150 return false; |
| 1151 } |
| 1152 |
| 1153 bool UdpTransportImpl::SourcePortsInitialized() const |
| 1154 { |
| 1155 if(_ptrSendRtpSocket) |
| 1156 { |
| 1157 return true; |
| 1158 } |
| 1159 return false; |
| 1160 } |
| 1161 |
| 1162 bool UdpTransportImpl::IpV6Enabled() const |
| 1163 { |
| 1164 WEBRTC_TRACE(kTraceStream, kTraceTransport, _id, "%s", __FUNCTION__); |
| 1165 return _ipV6Enabled; |
| 1166 } |
| 1167 |
| 1168 void UdpTransportImpl::BuildRemoteRTPAddr() |
| 1169 { |
| 1170 if(_ipV6Enabled) |
| 1171 { |
| 1172 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1173 _remoteRTPAddr.sin_length = 0; |
| 1174 _remoteRTPAddr.sin_family = PF_INET6; |
| 1175 #else |
| 1176 _remoteRTPAddr._sockaddr_storage.sin_family = PF_INET6; |
| 1177 #endif |
| 1178 |
| 1179 _remoteRTPAddr._sockaddr_in6.sin6_flowinfo=0; |
| 1180 _remoteRTPAddr._sockaddr_in6.sin6_scope_id=0; |
| 1181 _remoteRTPAddr._sockaddr_in6.sin6_port = Htons(_destPort); |
| 1182 InetPresentationToNumeric(AF_INET6,_destIP, |
| 1183 &_remoteRTPAddr._sockaddr_in6.sin6_addr); |
| 1184 } else |
| 1185 { |
| 1186 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1187 _remoteRTPAddr.sin_length = 0; |
| 1188 _remoteRTPAddr.sin_family = PF_INET; |
| 1189 #else |
| 1190 _remoteRTPAddr._sockaddr_storage.sin_family = PF_INET; |
| 1191 #endif |
| 1192 _remoteRTPAddr._sockaddr_in.sin_port = Htons(_destPort); |
| 1193 _remoteRTPAddr._sockaddr_in.sin_addr = InetAddrIPV4(_destIP); |
| 1194 } |
| 1195 } |
| 1196 |
| 1197 void UdpTransportImpl::BuildRemoteRTCPAddr() |
| 1198 { |
| 1199 if(_ipV6Enabled) |
| 1200 { |
| 1201 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1202 _remoteRTCPAddr.sin_length = 0; |
| 1203 _remoteRTCPAddr.sin_family = PF_INET6; |
| 1204 #else |
| 1205 _remoteRTCPAddr._sockaddr_storage.sin_family = PF_INET6; |
| 1206 #endif |
| 1207 |
| 1208 _remoteRTCPAddr._sockaddr_in6.sin6_flowinfo=0; |
| 1209 _remoteRTCPAddr._sockaddr_in6.sin6_scope_id=0; |
| 1210 _remoteRTCPAddr._sockaddr_in6.sin6_port = Htons(_destPortRTCP); |
| 1211 InetPresentationToNumeric(AF_INET6,_destIP, |
| 1212 &_remoteRTCPAddr._sockaddr_in6.sin6_addr); |
| 1213 |
| 1214 } else |
| 1215 { |
| 1216 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1217 _remoteRTCPAddr.sin_length = 0; |
| 1218 _remoteRTCPAddr.sin_family = PF_INET; |
| 1219 #else |
| 1220 _remoteRTCPAddr._sockaddr_storage.sin_family = PF_INET; |
| 1221 #endif |
| 1222 _remoteRTCPAddr._sockaddr_in.sin_port = Htons(_destPortRTCP); |
| 1223 _remoteRTCPAddr._sockaddr_in.sin_addr= InetAddrIPV4(_destIP); |
| 1224 } |
| 1225 } |
| 1226 |
| 1227 UdpTransportImpl::ErrorCode UdpTransportImpl::BindRTPSendSocket() |
| 1228 { |
| 1229 if(!_ptrSendRtpSocket) |
| 1230 { |
| 1231 return kSocketInvalid; |
| 1232 } |
| 1233 if(!_ptrSendRtpSocket->ValidHandle()) |
| 1234 { |
| 1235 return kIpAddressInvalid; |
| 1236 } |
| 1237 if(_ipV6Enabled) |
| 1238 { |
| 1239 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1240 _localRTPAddr.sin_length = 0; |
| 1241 _localRTPAddr.sin_family = PF_INET6; |
| 1242 #else |
| 1243 _localRTPAddr._sockaddr_storage.sin_family = PF_INET6; |
| 1244 #endif |
| 1245 _localRTPAddr._sockaddr_in6.sin6_flowinfo=0; |
| 1246 _localRTPAddr._sockaddr_in6.sin6_scope_id=0; |
| 1247 _localRTPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[0] = |
| 1248 0; // = INADDR_ANY |
| 1249 _localRTPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[1] = |
| 1250 0; |
| 1251 _localRTPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[2] = |
| 1252 0; |
| 1253 _localRTPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[3] = |
| 1254 0; |
| 1255 _localRTPAddr._sockaddr_in6.sin6_port = Htons(_srcPort); |
| 1256 if(_ptrSendRtpSocket->Bind(_localRTPAddr) == false) |
| 1257 { |
| 1258 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, |
| 1259 "Failed to bind to port:%d ", _srcPort); |
| 1260 return kFailedToBindPort; |
| 1261 } |
| 1262 |
| 1263 } else { |
| 1264 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1265 _localRTPAddr.sin_length = 0; |
| 1266 _localRTPAddr.sin_family = PF_INET; |
| 1267 #else |
| 1268 _localRTPAddr._sockaddr_storage.sin_family = PF_INET; |
| 1269 #endif |
| 1270 _localRTPAddr._sockaddr_in.sin_addr = 0; |
| 1271 _localRTPAddr._sockaddr_in.sin_port = Htons(_srcPort); |
| 1272 if(_ptrSendRtpSocket->Bind(_localRTPAddr) == false) |
| 1273 { |
| 1274 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, |
| 1275 "Failed to bind to port:%d ", _srcPort); |
| 1276 return kFailedToBindPort; |
| 1277 } |
| 1278 } |
| 1279 return kNoSocketError; |
| 1280 } |
| 1281 |
| 1282 UdpTransportImpl::ErrorCode UdpTransportImpl::BindRTCPSendSocket() |
| 1283 { |
| 1284 if(!_ptrSendRtcpSocket) |
| 1285 { |
| 1286 return kSocketInvalid; |
| 1287 } |
| 1288 |
| 1289 if(_ipV6Enabled) |
| 1290 { |
| 1291 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1292 _localRTCPAddr.sin_length = 0; |
| 1293 _localRTCPAddr.sin_family = PF_INET6; |
| 1294 #else |
| 1295 _localRTCPAddr._sockaddr_storage.sin_family = PF_INET6; |
| 1296 #endif |
| 1297 _localRTCPAddr._sockaddr_in6.sin6_flowinfo=0; |
| 1298 _localRTCPAddr._sockaddr_in6.sin6_scope_id=0; |
| 1299 _localRTCPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[0] = |
| 1300 0; // = INADDR_ANY |
| 1301 _localRTCPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[1] = |
| 1302 0; |
| 1303 _localRTCPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[2] = |
| 1304 0; |
| 1305 _localRTCPAddr._sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u32[3] = |
| 1306 0; |
| 1307 _localRTCPAddr._sockaddr_in6.sin6_port = Htons(_srcPortRTCP); |
| 1308 if(_ptrSendRtcpSocket->Bind(_localRTCPAddr) == false) |
| 1309 { |
| 1310 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, |
| 1311 "Failed to bind to port:%d ", _srcPortRTCP); |
| 1312 return kFailedToBindPort; |
| 1313 } |
| 1314 } else { |
| 1315 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1316 _localRTCPAddr.sin_length = 0; |
| 1317 _localRTCPAddr.sin_family = PF_INET; |
| 1318 #else |
| 1319 _localRTCPAddr._sockaddr_storage.sin_family = PF_INET; |
| 1320 #endif |
| 1321 _localRTCPAddr._sockaddr_in.sin_addr= 0; |
| 1322 _localRTCPAddr._sockaddr_in.sin_port = Htons(_srcPortRTCP); |
| 1323 if(_ptrSendRtcpSocket->Bind(_localRTCPAddr) == false) |
| 1324 { |
| 1325 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, |
| 1326 "Failed to bind to port:%d ", _srcPortRTCP); |
| 1327 return kFailedToBindPort; |
| 1328 } |
| 1329 } |
| 1330 return kNoSocketError; |
| 1331 } |
| 1332 |
| 1333 UdpTransportImpl::ErrorCode UdpTransportImpl::BindLocalRTPSocket() |
| 1334 { |
| 1335 if(!_ptrRtpSocket) |
| 1336 { |
| 1337 return kSocketInvalid; |
| 1338 } |
| 1339 if(!IpV6Enabled()) |
| 1340 { |
| 1341 SocketAddress recAddr; |
| 1342 memset(&recAddr, 0, sizeof(SocketAddress)); |
| 1343 recAddr._sockaddr_storage.sin_family = AF_INET; |
| 1344 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1345 recAddr.sin_length = 0; |
| 1346 recAddr.sin_family = PF_INET; |
| 1347 #else |
| 1348 recAddr._sockaddr_storage.sin_family = PF_INET; |
| 1349 #endif |
| 1350 recAddr._sockaddr_in.sin_addr = InetAddrIPV4(_localIP); |
| 1351 recAddr._sockaddr_in.sin_port = Htons(_localPort); |
| 1352 |
| 1353 if (!_ptrRtpSocket->Bind(recAddr)) |
| 1354 { |
| 1355 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, |
| 1356 "Failed to bind to port:%d ", _localPort); |
| 1357 return kFailedToBindPort; |
| 1358 } |
| 1359 } |
| 1360 else |
| 1361 { |
| 1362 SocketAddress stLclName; |
| 1363 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1364 stLclName.sin_lenght = 0; |
| 1365 stLclName.sin_family = PF_INET6; |
| 1366 #else |
| 1367 stLclName._sockaddr_storage.sin_family = PF_INET6; |
| 1368 #endif |
| 1369 InetPresentationToNumeric(AF_INET6,_localIP, |
| 1370 &stLclName._sockaddr_in6.sin6_addr); |
| 1371 stLclName._sockaddr_in6.sin6_port = Htons(_localPort); |
| 1372 stLclName._sockaddr_in6.sin6_flowinfo = 0; |
| 1373 stLclName._sockaddr_in6.sin6_scope_id = 0; |
| 1374 |
| 1375 if (!_ptrRtpSocket->Bind(stLclName)) |
| 1376 { |
| 1377 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, |
| 1378 "Failed to bind to port:%d ", _localPort); |
| 1379 return kFailedToBindPort; |
| 1380 } |
| 1381 } |
| 1382 |
| 1383 if(_localMulticastIP[0] != 0) |
| 1384 { |
| 1385 // Join the multicast group from which to receive datagrams. |
| 1386 struct ip_mreq mreq; |
| 1387 mreq.imr_multiaddr.s_addr = InetAddrIPV4(_localMulticastIP); |
| 1388 mreq.imr_interface.s_addr = INADDR_ANY; |
| 1389 |
| 1390 if (!_ptrRtpSocket->SetSockopt(IPPROTO_IP,IP_ADD_MEMBERSHIP, |
| 1391 (int8_t*)&mreq,sizeof (mreq))) |
| 1392 { |
| 1393 WEBRTC_TRACE( |
| 1394 kTraceError, |
| 1395 kTraceTransport, |
| 1396 _id, |
| 1397 "setsockopt() for multicast failed, not closing socket"); |
| 1398 }else |
| 1399 { |
| 1400 WEBRTC_TRACE(kTraceInfo, kTraceTransport, _id, |
| 1401 "multicast group successfully joined"); |
| 1402 } |
| 1403 } |
| 1404 return kNoSocketError; |
| 1405 } |
| 1406 |
| 1407 UdpTransportImpl::ErrorCode UdpTransportImpl::BindLocalRTCPSocket() |
| 1408 { |
| 1409 if(!_ptrRtcpSocket) |
| 1410 { |
| 1411 return kSocketInvalid; |
| 1412 } |
| 1413 if(! IpV6Enabled()) |
| 1414 { |
| 1415 SocketAddress recAddr; |
| 1416 memset(&recAddr, 0, sizeof(SocketAddress)); |
| 1417 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1418 recAddr.sin_length = 0; |
| 1419 recAddr.sin_family = AF_INET; |
| 1420 #else |
| 1421 recAddr._sockaddr_storage.sin_family = AF_INET; |
| 1422 #endif |
| 1423 recAddr._sockaddr_in.sin_addr = InetAddrIPV4(_localIP); |
| 1424 recAddr._sockaddr_in.sin_port = Htons(_localPortRTCP); |
| 1425 |
| 1426 if (!_ptrRtcpSocket->Bind(recAddr)) |
| 1427 { |
| 1428 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, |
| 1429 "Failed to bind to port:%d ", _localPortRTCP); |
| 1430 return kFailedToBindPort; |
| 1431 } |
| 1432 } |
| 1433 else |
| 1434 { |
| 1435 SocketAddress stLclName; |
| 1436 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1437 stLclName.sin_length = 0; |
| 1438 stLclName.sin_family = PF_INET6; |
| 1439 #else |
| 1440 stLclName._sockaddr_storage.sin_family = PF_INET6; |
| 1441 #endif |
| 1442 stLclName._sockaddr_in6.sin6_flowinfo = 0; |
| 1443 stLclName._sockaddr_in6.sin6_scope_id = 0; |
| 1444 stLclName._sockaddr_in6.sin6_port = Htons(_localPortRTCP); |
| 1445 |
| 1446 InetPresentationToNumeric(AF_INET6,_localIP, |
| 1447 &stLclName._sockaddr_in6.sin6_addr); |
| 1448 if (!_ptrRtcpSocket->Bind(stLclName)) |
| 1449 { |
| 1450 WEBRTC_TRACE(kTraceWarning, kTraceTransport, _id, |
| 1451 "Failed to bind to port:%d ", _localPortRTCP); |
| 1452 return kFailedToBindPort; |
| 1453 } |
| 1454 } |
| 1455 if(_localMulticastIP[0] != 0) |
| 1456 { |
| 1457 // Join the multicast group from which to receive datagrams. |
| 1458 struct ip_mreq mreq; |
| 1459 mreq.imr_multiaddr.s_addr = InetAddrIPV4(_localMulticastIP); |
| 1460 mreq.imr_interface.s_addr = INADDR_ANY; |
| 1461 |
| 1462 if (!_ptrRtcpSocket->SetSockopt(IPPROTO_IP,IP_ADD_MEMBERSHIP, |
| 1463 (int8_t*)&mreq,sizeof (mreq))) |
| 1464 { |
| 1465 WEBRTC_TRACE( |
| 1466 kTraceError, |
| 1467 kTraceTransport, |
| 1468 _id, |
| 1469 "setsockopt() for multicast failed, not closing socket"); |
| 1470 }else |
| 1471 { |
| 1472 WEBRTC_TRACE(kTraceInfo, kTraceTransport, _id, |
| 1473 "multicast group successfully joined"); |
| 1474 } |
| 1475 } |
| 1476 return kNoSocketError; |
| 1477 } |
| 1478 |
| 1479 int32_t UdpTransportImpl::InitializeSourcePorts(uint16_t rtpPort, |
| 1480 uint16_t rtcpPort) |
| 1481 { |
| 1482 |
| 1483 if(rtpPort == 0) |
| 1484 { |
| 1485 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1486 "InitializeSourcePorts port 0 not allowed"); |
| 1487 _lastError = kPortInvalid; |
| 1488 return -1; |
| 1489 } |
| 1490 |
| 1491 CriticalSectionScoped cs(_crit); |
| 1492 |
| 1493 CloseSendSockets(); |
| 1494 |
| 1495 if(_mgr == NULL) |
| 1496 { |
| 1497 return -1; |
| 1498 } |
| 1499 |
| 1500 _srcPort = rtpPort; |
| 1501 if(rtcpPort == 0) |
| 1502 { |
| 1503 _srcPortRTCP = rtpPort+1; |
| 1504 } else |
| 1505 { |
| 1506 _srcPortRTCP = rtcpPort; |
| 1507 } |
| 1508 _useSetSockOpt =false; |
| 1509 _tos=0; |
| 1510 _pcp=0; |
| 1511 |
| 1512 _ptrSendRtpSocket = _socket_creator->CreateSocket(_id, _mgr, NULL, NULL, |
| 1513 IpV6Enabled(), false); |
| 1514 _ptrSendRtcpSocket = _socket_creator->CreateSocket(_id, _mgr, NULL, NULL, |
| 1515 IpV6Enabled(), false); |
| 1516 |
| 1517 ErrorCode retVal = BindRTPSendSocket(); |
| 1518 if(retVal != kNoSocketError) |
| 1519 { |
| 1520 _lastError = retVal; |
| 1521 return -1; |
| 1522 } |
| 1523 retVal = BindRTCPSendSocket(); |
| 1524 if(retVal != kNoSocketError) |
| 1525 { |
| 1526 _lastError = retVal; |
| 1527 return -1; |
| 1528 } |
| 1529 return 0; |
| 1530 } |
| 1531 |
| 1532 int32_t UdpTransportImpl::SourcePorts(uint16_t& rtpPort, |
| 1533 uint16_t& rtcpPort) const |
| 1534 { |
| 1535 CriticalSectionScoped cs(_crit); |
| 1536 |
| 1537 rtpPort = (_srcPort != 0) ? _srcPort : _localPort; |
| 1538 rtcpPort = (_srcPortRTCP != 0) ? _srcPortRTCP : _localPortRTCP; |
| 1539 return 0; |
| 1540 } |
| 1541 |
| 1542 |
| 1543 #ifdef _WIN32 |
| 1544 int32_t UdpTransportImpl::StartReceiving(uint32_t numberOfSocketBuffers) |
| 1545 #else |
| 1546 int32_t UdpTransportImpl::StartReceiving(uint32_t /*numberOfSocketBuffers*/) |
| 1547 #endif |
| 1548 { |
| 1549 CriticalSectionScoped cs(_crit); |
| 1550 if(_receiving) |
| 1551 { |
| 1552 return 0; |
| 1553 } |
| 1554 if(_ptrRtpSocket) |
| 1555 { |
| 1556 #ifdef _WIN32 |
| 1557 if(!_ptrRtpSocket->StartReceiving(numberOfSocketBuffers)) |
| 1558 #else |
| 1559 if(!_ptrRtpSocket->StartReceiving()) |
| 1560 #endif |
| 1561 { |
| 1562 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1563 "Failed to start receive on RTP socket"); |
| 1564 _lastError = kStartReceiveError; |
| 1565 return -1; |
| 1566 } |
| 1567 } |
| 1568 if(_ptrRtcpSocket) |
| 1569 { |
| 1570 if(!_ptrRtcpSocket->StartReceiving()) |
| 1571 { |
| 1572 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1573 "Failed to start receive on RTCP socket"); |
| 1574 _lastError = kStartReceiveError; |
| 1575 return -1; |
| 1576 } |
| 1577 } |
| 1578 if( _ptrRtpSocket == NULL && |
| 1579 _ptrRtcpSocket == NULL) |
| 1580 { |
| 1581 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1582 "Failed to StartReceiving, no socket initialized"); |
| 1583 _lastError = kStartReceiveError; |
| 1584 return -1; |
| 1585 } |
| 1586 _receiving = true; |
| 1587 return 0; |
| 1588 } |
| 1589 |
| 1590 bool UdpTransportImpl::Receiving() const |
| 1591 { |
| 1592 return _receiving; |
| 1593 } |
| 1594 |
| 1595 int32_t UdpTransportImpl::StopReceiving() |
| 1596 { |
| 1597 |
| 1598 CriticalSectionScoped cs(_crit); |
| 1599 |
| 1600 _receiving = false; |
| 1601 |
| 1602 if (_ptrRtpSocket) |
| 1603 { |
| 1604 if (!_ptrRtpSocket->StopReceiving()) |
| 1605 { |
| 1606 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1607 "Failed to stop receiving on RTP socket"); |
| 1608 _lastError = kStopReceiveError; |
| 1609 return -1; |
| 1610 } |
| 1611 } |
| 1612 if (_ptrRtcpSocket) |
| 1613 { |
| 1614 if (!_ptrRtcpSocket->StopReceiving()) |
| 1615 { |
| 1616 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1617 "Failed to stop receiving on RTCP socket"); |
| 1618 _lastError = kStopReceiveError; |
| 1619 return -1; |
| 1620 } |
| 1621 } |
| 1622 return 0; |
| 1623 } |
| 1624 |
| 1625 int32_t UdpTransportImpl::InitializeSendSockets( |
| 1626 const char* ipaddr, |
| 1627 const uint16_t rtpPort, |
| 1628 const uint16_t rtcpPort) |
| 1629 { |
| 1630 { |
| 1631 CriticalSectionScoped cs(_crit); |
| 1632 _destPort = rtpPort; |
| 1633 if(rtcpPort == 0) |
| 1634 { |
| 1635 _destPortRTCP = _destPort+1; |
| 1636 } else |
| 1637 { |
| 1638 _destPortRTCP = rtcpPort; |
| 1639 } |
| 1640 |
| 1641 if(ipaddr == NULL) |
| 1642 { |
| 1643 if (!IsIpAddressValid(_destIP, IpV6Enabled())) |
| 1644 { |
| 1645 _destPort = 0; |
| 1646 _destPortRTCP = 0; |
| 1647 _lastError = kIpAddressInvalid; |
| 1648 return -1; |
| 1649 } |
| 1650 } else |
| 1651 { |
| 1652 if (IsIpAddressValid(ipaddr, IpV6Enabled())) |
| 1653 { |
| 1654 strncpy( |
| 1655 _destIP, |
| 1656 ipaddr, |
| 1657 IpV6Enabled() ? kIpAddressVersion6Length : |
| 1658 kIpAddressVersion4Length); |
| 1659 } else { |
| 1660 _destPort = 0; |
| 1661 _destPortRTCP = 0; |
| 1662 _lastError = kIpAddressInvalid; |
| 1663 return -1; |
| 1664 } |
| 1665 } |
| 1666 BuildRemoteRTPAddr(); |
| 1667 BuildRemoteRTCPAddr(); |
| 1668 } |
| 1669 |
| 1670 if (_ipV6Enabled) |
| 1671 { |
| 1672 if (_qos) |
| 1673 { |
| 1674 WEBRTC_TRACE( |
| 1675 kTraceWarning, |
| 1676 kTraceTransport, |
| 1677 _id, |
| 1678 "QOS is enabled but will be ignored since IPv6 is enabled"); |
| 1679 } |
| 1680 }else |
| 1681 { |
| 1682 // TODO (grunell): Multicast support is experimantal. |
| 1683 |
| 1684 // Put the first digit of the remote address in val. |
| 1685 int32_t val = ntohl(_remoteRTPAddr._sockaddr_in.sin_addr)>> 24; |
| 1686 |
| 1687 if((val > 223) && (val < 240)) |
| 1688 { |
| 1689 // Multicast address. |
| 1690 CriticalSectionScoped cs(_crit); |
| 1691 |
| 1692 UdpSocketWrapper* rtpSock = (_ptrSendRtpSocket ? |
| 1693 _ptrSendRtpSocket : _ptrRtpSocket); |
| 1694 if (!rtpSock || !rtpSock->ValidHandle()) |
| 1695 { |
| 1696 _lastError = kSocketInvalid; |
| 1697 return -1; |
| 1698 } |
| 1699 UdpSocketWrapper* rtcpSock = (_ptrSendRtcpSocket ? |
| 1700 _ptrSendRtcpSocket : _ptrRtcpSocket); |
| 1701 if (!rtcpSock || !rtcpSock->ValidHandle()) |
| 1702 { |
| 1703 _lastError = kSocketInvalid; |
| 1704 return -1; |
| 1705 } |
| 1706 |
| 1707 // Set Time To Live to same region |
| 1708 int32_t iOptVal = 64; |
| 1709 if (!rtpSock->SetSockopt(IPPROTO_IP, IP_MULTICAST_TTL, |
| 1710 (int8_t*)&iOptVal, |
| 1711 sizeof (int32_t))) |
| 1712 { |
| 1713 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1714 "setsockopt for multicast error on RTP socket"); |
| 1715 _ptrRtpSocket->CloseBlocking(); |
| 1716 _ptrRtpSocket = NULL; |
| 1717 _lastError = kMulticastAddressInvalid; |
| 1718 return -1; |
| 1719 } |
| 1720 if (!rtcpSock->SetSockopt(IPPROTO_IP, IP_MULTICAST_TTL, |
| 1721 (int8_t*)&iOptVal, |
| 1722 sizeof (int32_t))) |
| 1723 { |
| 1724 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1725 "setsockopt for multicast error on RTCP socket"); |
| 1726 _ptrRtpSocket->CloseBlocking(); |
| 1727 _ptrRtpSocket = NULL; |
| 1728 _lastError = kMulticastAddressInvalid; |
| 1729 return -1; |
| 1730 } |
| 1731 } |
| 1732 } |
| 1733 return 0; |
| 1734 } |
| 1735 |
| 1736 void UdpTransportImpl::BuildSockaddrIn(uint16_t portnr, |
| 1737 const char* ip, |
| 1738 SocketAddress& remoteAddr) const |
| 1739 { |
| 1740 if(_ipV6Enabled) |
| 1741 { |
| 1742 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1743 remoteAddr.sin_length = 0; |
| 1744 remoteAddr.sin_family = PF_INET6; |
| 1745 #else |
| 1746 remoteAddr._sockaddr_storage.sin_family = PF_INET6; |
| 1747 #endif |
| 1748 remoteAddr._sockaddr_in6.sin6_port = Htons(portnr); |
| 1749 InetPresentationToNumeric(AF_INET6, ip, |
| 1750 &remoteAddr._sockaddr_in6.sin6_addr); |
| 1751 remoteAddr._sockaddr_in6.sin6_flowinfo=0; |
| 1752 remoteAddr._sockaddr_in6.sin6_scope_id=0; |
| 1753 } else |
| 1754 { |
| 1755 #ifdef HAVE_STRUCT_SOCKADDR_SA_LEN |
| 1756 remoteAddr.sin_length = 0; |
| 1757 remoteAddr.sin_family = PF_INET; |
| 1758 #else |
| 1759 remoteAddr._sockaddr_storage.sin_family = PF_INET; |
| 1760 #endif |
| 1761 remoteAddr._sockaddr_in.sin_port = Htons(portnr); |
| 1762 remoteAddr._sockaddr_in.sin_addr= InetAddrIPV4( |
| 1763 const_cast<char*>(ip)); |
| 1764 } |
| 1765 } |
| 1766 |
| 1767 int32_t UdpTransportImpl::SendRaw(const int8_t *data, |
| 1768 size_t length, |
| 1769 int32_t isRTCP, |
| 1770 uint16_t portnr, |
| 1771 const char* ip) |
| 1772 { |
| 1773 CriticalSectionScoped cs(_crit); |
| 1774 if(isRTCP) |
| 1775 { |
| 1776 UdpSocketWrapper* rtcpSock = NULL; |
| 1777 if(_ptrSendRtcpSocket) |
| 1778 { |
| 1779 rtcpSock = _ptrSendRtcpSocket; |
| 1780 } else if(_ptrRtcpSocket) |
| 1781 { |
| 1782 rtcpSock = _ptrRtcpSocket; |
| 1783 } else |
| 1784 { |
| 1785 return -1; |
| 1786 } |
| 1787 if(portnr == 0 && ip == NULL) |
| 1788 { |
| 1789 return rtcpSock->SendTo(data,length,_remoteRTCPAddr); |
| 1790 |
| 1791 } else if(portnr != 0 && ip != NULL) |
| 1792 { |
| 1793 SocketAddress remoteAddr; |
| 1794 BuildSockaddrIn(portnr, ip, remoteAddr); |
| 1795 return rtcpSock->SendTo(data,length,remoteAddr); |
| 1796 } else if(ip != NULL) |
| 1797 { |
| 1798 SocketAddress remoteAddr; |
| 1799 BuildSockaddrIn(_destPortRTCP, ip, remoteAddr); |
| 1800 return rtcpSock->SendTo(data,length,remoteAddr); |
| 1801 } else |
| 1802 { |
| 1803 SocketAddress remoteAddr; |
| 1804 BuildSockaddrIn(portnr, _destIP, remoteAddr); |
| 1805 return rtcpSock->SendTo(data,length,remoteAddr); |
| 1806 } |
| 1807 } else { |
| 1808 UdpSocketWrapper* rtpSock = NULL; |
| 1809 if(_ptrSendRtpSocket) |
| 1810 { |
| 1811 rtpSock = _ptrSendRtpSocket; |
| 1812 |
| 1813 } else if(_ptrRtpSocket) |
| 1814 { |
| 1815 rtpSock = _ptrRtpSocket; |
| 1816 } else |
| 1817 { |
| 1818 return -1; |
| 1819 } |
| 1820 if(portnr == 0 && ip == NULL) |
| 1821 { |
| 1822 return rtpSock->SendTo(data,length,_remoteRTPAddr); |
| 1823 |
| 1824 } else if(portnr != 0 && ip != NULL) |
| 1825 { |
| 1826 SocketAddress remoteAddr; |
| 1827 BuildSockaddrIn(portnr, ip, remoteAddr); |
| 1828 return rtpSock->SendTo(data,length,remoteAddr); |
| 1829 } else if(ip != NULL) |
| 1830 { |
| 1831 SocketAddress remoteAddr; |
| 1832 BuildSockaddrIn(_destPort, ip, remoteAddr); |
| 1833 return rtpSock->SendTo(data,length,remoteAddr); |
| 1834 } else |
| 1835 { |
| 1836 SocketAddress remoteAddr; |
| 1837 BuildSockaddrIn(portnr, _destIP, remoteAddr); |
| 1838 return rtpSock->SendTo(data,length,remoteAddr); |
| 1839 } |
| 1840 } |
| 1841 } |
| 1842 |
| 1843 int32_t UdpTransportImpl::SendRTPPacketTo(const int8_t* data, |
| 1844 size_t length, |
| 1845 const SocketAddress& to) |
| 1846 { |
| 1847 CriticalSectionScoped cs(_crit); |
| 1848 if(_ptrSendRtpSocket) |
| 1849 { |
| 1850 return _ptrSendRtpSocket->SendTo(data,length,to); |
| 1851 |
| 1852 } else if(_ptrRtpSocket) |
| 1853 { |
| 1854 return _ptrRtpSocket->SendTo(data,length,to); |
| 1855 } |
| 1856 return -1; |
| 1857 } |
| 1858 |
| 1859 int32_t UdpTransportImpl::SendRTCPPacketTo(const int8_t* data, |
| 1860 size_t length, |
| 1861 const SocketAddress& to) |
| 1862 { |
| 1863 |
| 1864 CriticalSectionScoped cs(_crit); |
| 1865 |
| 1866 if(_ptrSendRtcpSocket) |
| 1867 { |
| 1868 return _ptrSendRtcpSocket->SendTo(data,length,to); |
| 1869 |
| 1870 } else if(_ptrRtcpSocket) |
| 1871 { |
| 1872 return _ptrRtcpSocket->SendTo(data,length,to); |
| 1873 } |
| 1874 return -1; |
| 1875 } |
| 1876 |
| 1877 int32_t UdpTransportImpl::SendRTPPacketTo(const int8_t* data, |
| 1878 size_t length, |
| 1879 const uint16_t rtpPort) |
| 1880 { |
| 1881 CriticalSectionScoped cs(_crit); |
| 1882 // Use the current SocketAdress but update it with rtpPort. |
| 1883 SocketAddress to; |
| 1884 memcpy(&to, &_remoteRTPAddr, sizeof(SocketAddress)); |
| 1885 |
| 1886 if(_ipV6Enabled) |
| 1887 { |
| 1888 to._sockaddr_in6.sin6_port = Htons(rtpPort); |
| 1889 } else |
| 1890 { |
| 1891 to._sockaddr_in.sin_port = Htons(rtpPort); |
| 1892 } |
| 1893 |
| 1894 if(_ptrSendRtpSocket) |
| 1895 { |
| 1896 return _ptrSendRtpSocket->SendTo(data,length,to); |
| 1897 |
| 1898 } else if(_ptrRtpSocket) |
| 1899 { |
| 1900 return _ptrRtpSocket->SendTo(data,length,to); |
| 1901 } |
| 1902 return -1; |
| 1903 } |
| 1904 |
| 1905 int32_t UdpTransportImpl::SendRTCPPacketTo(const int8_t* data, |
| 1906 size_t length, |
| 1907 const uint16_t rtcpPort) |
| 1908 { |
| 1909 CriticalSectionScoped cs(_crit); |
| 1910 |
| 1911 // Use the current SocketAdress but update it with rtcpPort. |
| 1912 SocketAddress to; |
| 1913 memcpy(&to, &_remoteRTCPAddr, sizeof(SocketAddress)); |
| 1914 |
| 1915 if(_ipV6Enabled) |
| 1916 { |
| 1917 to._sockaddr_in6.sin6_port = Htons(rtcpPort); |
| 1918 } else |
| 1919 { |
| 1920 to._sockaddr_in.sin_port = Htons(rtcpPort); |
| 1921 } |
| 1922 |
| 1923 if(_ptrSendRtcpSocket) |
| 1924 { |
| 1925 return _ptrSendRtcpSocket->SendTo(data,length,to); |
| 1926 |
| 1927 } else if(_ptrRtcpSocket) |
| 1928 { |
| 1929 return _ptrRtcpSocket->SendTo(data,length,to); |
| 1930 } |
| 1931 return -1; |
| 1932 } |
| 1933 |
| 1934 bool UdpTransportImpl::SendRtp(const uint8_t* data, |
| 1935 size_t length, |
| 1936 const PacketOptions& packet_options) { |
| 1937 WEBRTC_TRACE(kTraceStream, kTraceTransport, _id, "%s", __FUNCTION__); |
| 1938 |
| 1939 CriticalSectionScoped cs(_crit); |
| 1940 |
| 1941 if(_destIP[0] == 0) |
| 1942 { |
| 1943 return false; |
| 1944 } |
| 1945 if(_destPort == 0) |
| 1946 { |
| 1947 return false; |
| 1948 } |
| 1949 |
| 1950 // Create socket if it hasn't been set up already. |
| 1951 // TODO (hellner): why not fail here instead. Sockets not being initialized |
| 1952 // indicates that there is a problem somewhere. |
| 1953 if( _ptrSendRtpSocket == NULL && |
| 1954 _ptrRtpSocket == NULL) |
| 1955 { |
| 1956 WEBRTC_TRACE( |
| 1957 kTraceStateInfo, |
| 1958 kTraceTransport, |
| 1959 _id, |
| 1960 "Creating RTP socket since no receive or source socket is\ |
| 1961 configured"); |
| 1962 |
| 1963 _ptrRtpSocket = _socket_creator->CreateSocket(_id, _mgr, this, |
| 1964 IncomingRTPCallback, |
| 1965 IpV6Enabled(), false); |
| 1966 |
| 1967 // Don't bind to a specific IP address. |
| 1968 if(! IpV6Enabled()) |
| 1969 { |
| 1970 strncpy(_localIP, "0.0.0.0",16); |
| 1971 } else |
| 1972 { |
| 1973 strncpy(_localIP, "0000:0000:0000:0000:0000:0000:0000:0000", |
| 1974 kIpAddressVersion6Length); |
| 1975 } |
| 1976 _localPort = _destPort; |
| 1977 |
| 1978 ErrorCode retVal = BindLocalRTPSocket(); |
| 1979 if(retVal != kNoSocketError) |
| 1980 { |
| 1981 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 1982 "SendPacket() failed to bind RTP socket"); |
| 1983 _lastError = retVal; |
| 1984 CloseReceiveSockets(); |
| 1985 return false; |
| 1986 } |
| 1987 } |
| 1988 |
| 1989 if(_ptrSendRtpSocket) |
| 1990 { |
| 1991 return _ptrSendRtpSocket->SendTo((const int8_t*)data, length, |
| 1992 _remoteRTPAddr) >= 0; |
| 1993 |
| 1994 } else if(_ptrRtpSocket) |
| 1995 { |
| 1996 return _ptrRtpSocket->SendTo((const int8_t*)data, length, |
| 1997 _remoteRTPAddr) >= 0; |
| 1998 } |
| 1999 return false; |
| 2000 } |
| 2001 |
| 2002 bool UdpTransportImpl::SendRtcp(const uint8_t* data, size_t length) { |
| 2003 CriticalSectionScoped cs(_crit); |
| 2004 if(_destIP[0] == 0) |
| 2005 { |
| 2006 return false; |
| 2007 } |
| 2008 if(_destPortRTCP == 0) |
| 2009 { |
| 2010 return false; |
| 2011 } |
| 2012 |
| 2013 // Create socket if it hasn't been set up already. |
| 2014 // TODO (hellner): why not fail here instead. Sockets not being initialized |
| 2015 // indicates that there is a problem somewhere. |
| 2016 if( _ptrSendRtcpSocket == NULL && |
| 2017 _ptrRtcpSocket == NULL) |
| 2018 { |
| 2019 WEBRTC_TRACE( |
| 2020 kTraceStateInfo, |
| 2021 kTraceTransport, |
| 2022 _id, |
| 2023 "Creating RTCP socket since no receive or source socket is\ |
| 2024 configured"); |
| 2025 |
| 2026 _ptrRtcpSocket = _socket_creator->CreateSocket(_id, _mgr, this, |
| 2027 IncomingRTCPCallback, |
| 2028 IpV6Enabled(), false); |
| 2029 |
| 2030 // Don't bind to a specific IP address. |
| 2031 if(! IpV6Enabled()) |
| 2032 { |
| 2033 strncpy(_localIP, "0.0.0.0",16); |
| 2034 } else |
| 2035 { |
| 2036 strncpy(_localIP, "0000:0000:0000:0000:0000:0000:0000:0000", |
| 2037 kIpAddressVersion6Length); |
| 2038 } |
| 2039 _localPortRTCP = _destPortRTCP; |
| 2040 |
| 2041 ErrorCode retVal = BindLocalRTCPSocket(); |
| 2042 if(retVal != kNoSocketError) |
| 2043 { |
| 2044 _lastError = retVal; |
| 2045 WEBRTC_TRACE(kTraceError, kTraceTransport, _id, |
| 2046 "SendRtcp() failed to bind RTCP socket"); |
| 2047 CloseReceiveSockets(); |
| 2048 return false; |
| 2049 } |
| 2050 } |
| 2051 |
| 2052 if(_ptrSendRtcpSocket) |
| 2053 { |
| 2054 return _ptrSendRtcpSocket->SendTo((const int8_t*)data, length, |
| 2055 _remoteRTCPAddr) >= 0; |
| 2056 } else if(_ptrRtcpSocket) |
| 2057 { |
| 2058 return _ptrRtcpSocket->SendTo((const int8_t*)data, length, |
| 2059 _remoteRTCPAddr) >= 0; |
| 2060 } |
| 2061 return false; |
| 2062 } |
| 2063 |
| 2064 int32_t UdpTransportImpl::SetSendIP(const char* ipaddr) |
| 2065 { |
| 2066 if(!IsIpAddressValid(ipaddr,IpV6Enabled())) |
| 2067 { |
| 2068 return kIpAddressInvalid; |
| 2069 } |
| 2070 CriticalSectionScoped cs(_crit); |
| 2071 strncpy(_destIP, ipaddr,kIpAddressVersion6Length); |
| 2072 BuildRemoteRTPAddr(); |
| 2073 BuildRemoteRTCPAddr(); |
| 2074 return 0; |
| 2075 } |
| 2076 |
| 2077 int32_t UdpTransportImpl::SetSendPorts(uint16_t rtpPort, uint16_t rtcpPort) |
| 2078 { |
| 2079 CriticalSectionScoped cs(_crit); |
| 2080 _destPort = rtpPort; |
| 2081 if(rtcpPort == 0) |
| 2082 { |
| 2083 _destPortRTCP = _destPort+1; |
| 2084 } else |
| 2085 { |
| 2086 _destPortRTCP = rtcpPort; |
| 2087 } |
| 2088 BuildRemoteRTPAddr(); |
| 2089 BuildRemoteRTCPAddr(); |
| 2090 return 0; |
| 2091 } |
| 2092 |
| 2093 void UdpTransportImpl::IncomingRTPCallback(CallbackObj obj, |
| 2094 const int8_t* rtpPacket, |
| 2095 size_t rtpPacketLength, |
| 2096 const SocketAddress* from) |
| 2097 { |
| 2098 if (rtpPacket && rtpPacketLength > 0) |
| 2099 { |
| 2100 UdpTransportImpl* socketTransport = (UdpTransportImpl*) obj; |
| 2101 socketTransport->IncomingRTPFunction(rtpPacket, rtpPacketLength, from); |
| 2102 } |
| 2103 } |
| 2104 |
| 2105 void UdpTransportImpl::IncomingRTCPCallback(CallbackObj obj, |
| 2106 const int8_t* rtcpPacket, |
| 2107 size_t rtcpPacketLength, |
| 2108 const SocketAddress* from) |
| 2109 { |
| 2110 if (rtcpPacket && rtcpPacketLength > 0) |
| 2111 { |
| 2112 UdpTransportImpl* socketTransport = (UdpTransportImpl*) obj; |
| 2113 socketTransport->IncomingRTCPFunction(rtcpPacket, rtcpPacketLength, |
| 2114 from); |
| 2115 } |
| 2116 } |
| 2117 |
| 2118 void UdpTransportImpl::IncomingRTPFunction(const int8_t* rtpPacket, |
| 2119 size_t rtpPacketLength, |
| 2120 const SocketAddress* fromSocket) |
| 2121 { |
| 2122 char ipAddress[kIpAddressVersion6Length]; |
| 2123 uint32_t ipAddressLength = kIpAddressVersion6Length; |
| 2124 uint16_t portNr = 0; |
| 2125 |
| 2126 { |
| 2127 CriticalSectionScoped cs(_critFilter); |
| 2128 if (FilterIPAddress(fromSocket) == false) |
| 2129 { |
| 2130 // Packet should be filtered out. Drop it. |
| 2131 WEBRTC_TRACE(kTraceStream, kTraceTransport, _id, |
| 2132 "Incoming RTP packet blocked by IP filter"); |
| 2133 return; |
| 2134 } |
| 2135 |
| 2136 if (IPAddressCached(*fromSocket, ipAddress, ipAddressLength, portNr) < |
| 2137 0) |
| 2138 { |
| 2139 WEBRTC_TRACE( |
| 2140 kTraceError, |
| 2141 kTraceTransport, |
| 2142 _id, |
| 2143 "UdpTransportImpl::IncomingRTPFunction - Cannot get sender\ |
| 2144 information"); |
| 2145 }else |
| 2146 { |
| 2147 // Make sure ipAddress is null terminated. |
| 2148 ipAddress[kIpAddressVersion6Length - 1] = 0; |
| 2149 strncpy(_fromIP, ipAddress, kIpAddressVersion6Length - 1); |
| 2150 } |
| 2151 |
| 2152 // Filter based on port. |
| 2153 if (_rtpFilterPort != 0 && |
| 2154 _rtpFilterPort != portNr) |
| 2155 { |
| 2156 // Drop packet. |
| 2157 memset(_fromIP, 0, sizeof(_fromIP)); |
| 2158 WEBRTC_TRACE( |
| 2159 kTraceStream, |
| 2160 kTraceTransport, |
| 2161 _id, |
| 2162 "Incoming RTP packet blocked by filter incoming from port:%d\ |
| 2163 allowed port:%d", |
| 2164 portNr, |
| 2165 _rtpFilterPort); |
| 2166 return; |
| 2167 } |
| 2168 _fromPort = portNr; |
| 2169 } |
| 2170 |
| 2171 CriticalSectionScoped cs(_critPacketCallback); |
| 2172 if (_packetCallback) |
| 2173 { |
| 2174 WEBRTC_TRACE(kTraceStream, kTraceTransport, _id, |
| 2175 "Incoming RTP packet from ip:%s port:%d", ipAddress, portNr); |
| 2176 _packetCallback->IncomingRTPPacket(rtpPacket, rtpPacketLength, |
| 2177 ipAddress, portNr); |
| 2178 } |
| 2179 } |
| 2180 |
| 2181 void UdpTransportImpl::IncomingRTCPFunction(const int8_t* rtcpPacket, |
| 2182 size_t rtcpPacketLength, |
| 2183 const SocketAddress* fromSocket) |
| 2184 { |
| 2185 char ipAddress[kIpAddressVersion6Length]; |
| 2186 uint32_t ipAddressLength = kIpAddressVersion6Length; |
| 2187 uint16_t portNr = 0; |
| 2188 |
| 2189 { |
| 2190 CriticalSectionScoped cs(_critFilter); |
| 2191 if (FilterIPAddress(fromSocket) == false) |
| 2192 { |
| 2193 // Packet should be filtered out. Drop it. |
| 2194 WEBRTC_TRACE(kTraceStream, kTraceTransport, _id, |
| 2195 "Incoming RTCP packet blocked by IP filter"); |
| 2196 return; |
| 2197 } |
| 2198 if (IPAddress(*fromSocket, ipAddress, ipAddressLength, portNr) < 0) |
| 2199 { |
| 2200 WEBRTC_TRACE( |
| 2201 kTraceError, |
| 2202 kTraceTransport, |
| 2203 _id, |
| 2204 "UdpTransportImpl::IncomingRTCPFunction - Cannot get sender\ |
| 2205 information"); |
| 2206 }else { |
| 2207 // Make sure ipAddress is null terminated. |
| 2208 ipAddress[kIpAddressVersion6Length - 1] = 0; |
| 2209 strncpy(_fromIP, ipAddress, kIpAddressVersion6Length - 1); |
| 2210 } |
| 2211 |
| 2212 // Filter based on port. |
| 2213 if (_rtcpFilterPort != 0 && |
| 2214 _rtcpFilterPort != portNr) |
| 2215 { |
| 2216 // Drop packet. |
| 2217 WEBRTC_TRACE( |
| 2218 kTraceStream, |
| 2219 kTraceTransport, |
| 2220 _id, |
| 2221 "Incoming RTCP packet blocked by filter incoming from port:%d\ |
| 2222 allowed port:%d", |
| 2223 portNr, |
| 2224 _rtpFilterPort); |
| 2225 return; |
| 2226 } |
| 2227 _fromPortRTCP = portNr; |
| 2228 } |
| 2229 |
| 2230 CriticalSectionScoped cs(_critPacketCallback); |
| 2231 if (_packetCallback) |
| 2232 { |
| 2233 WEBRTC_TRACE(kTraceStream, kTraceTransport, _id, |
| 2234 "Incoming RTCP packet from ip:%s port:%d", ipAddress, |
| 2235 portNr); |
| 2236 _packetCallback->IncomingRTCPPacket(rtcpPacket, rtcpPacketLength, |
| 2237 ipAddress, portNr); |
| 2238 } |
| 2239 } |
| 2240 |
| 2241 bool UdpTransportImpl::FilterIPAddress(const SocketAddress* fromAddress) |
| 2242 { |
| 2243 if(fromAddress->_sockaddr_storage.sin_family == AF_INET) |
| 2244 { |
| 2245 if (_filterIPAddress._sockaddr_storage.sin_family == AF_INET) |
| 2246 { |
| 2247 // IP is stored in sin_addr. |
| 2248 if (_filterIPAddress._sockaddr_in.sin_addr != 0 && |
| 2249 (_filterIPAddress._sockaddr_in.sin_addr != |
| 2250 fromAddress->_sockaddr_in.sin_addr)) |
| 2251 { |
| 2252 return false; |
| 2253 } |
| 2254 } |
| 2255 } |
| 2256 else if(fromAddress->_sockaddr_storage.sin_family == AF_INET6) |
| 2257 { |
| 2258 if (_filterIPAddress._sockaddr_storage.sin_family == AF_INET6) |
| 2259 { |
| 2260 // IP is stored in sin_6addr. |
| 2261 for (int32_t i = 0; i < 4; i++) |
| 2262 { |
| 2263 if (_filterIPAddress._sockaddr_in6.sin6_addr.Version6AddressUnio
n._s6_u32[i] != 0 && |
| 2264 _filterIPAddress._sockaddr_in6.sin6_addr.Version6AddressUnio
n._s6_u32[i] != fromAddress->_sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u3
2[i]) |
| 2265 { |
| 2266 return false; |
| 2267 } |
| 2268 } |
| 2269 } |
| 2270 } |
| 2271 else |
| 2272 { |
| 2273 WEBRTC_TRACE( |
| 2274 kTraceError, |
| 2275 kTraceTransport, |
| 2276 _id, |
| 2277 "UdpTransportImpl::FilterIPAddress() unknown address family"); |
| 2278 return false; |
| 2279 } |
| 2280 return true; |
| 2281 } |
| 2282 |
| 2283 void UdpTransportImpl::CloseReceiveSockets() |
| 2284 { |
| 2285 if(_ptrRtpSocket) |
| 2286 { |
| 2287 _ptrRtpSocket->CloseBlocking(); |
| 2288 _ptrRtpSocket = NULL; |
| 2289 } |
| 2290 if(_ptrRtcpSocket) |
| 2291 { |
| 2292 _ptrRtcpSocket->CloseBlocking(); |
| 2293 _ptrRtcpSocket = NULL; |
| 2294 } |
| 2295 _receiving = false; |
| 2296 } |
| 2297 |
| 2298 void UdpTransportImpl::CloseSendSockets() |
| 2299 { |
| 2300 if(_ptrSendRtpSocket) |
| 2301 { |
| 2302 _ptrSendRtpSocket->CloseBlocking(); |
| 2303 _ptrSendRtpSocket = 0; |
| 2304 } |
| 2305 if(_ptrSendRtcpSocket) |
| 2306 { |
| 2307 _ptrSendRtcpSocket->CloseBlocking(); |
| 2308 _ptrSendRtcpSocket = 0; |
| 2309 } |
| 2310 } |
| 2311 |
| 2312 uint16_t UdpTransport::Htons(const uint16_t port) |
| 2313 { |
| 2314 return htons(port); |
| 2315 } |
| 2316 |
| 2317 uint32_t UdpTransport::Htonl(const uint32_t a) |
| 2318 { |
| 2319 return htonl(a); |
| 2320 } |
| 2321 |
| 2322 uint32_t UdpTransport::InetAddrIPV4(const char* ip) |
| 2323 { |
| 2324 return ::inet_addr(ip); |
| 2325 } |
| 2326 |
| 2327 int32_t UdpTransport::InetPresentationToNumeric(int32_t af, |
| 2328 const char* src, |
| 2329 void* dst) |
| 2330 { |
| 2331 #if defined(WEBRTC_LINUX) || defined(WEBRTC_MAC) |
| 2332 const int32_t result = inet_pton(af, src, dst); |
| 2333 return result > 0 ? 0 : -1; |
| 2334 |
| 2335 #elif defined(_WIN32) |
| 2336 SocketAddress temp; |
| 2337 int length=sizeof(SocketAddress); |
| 2338 |
| 2339 if(af == AF_INET) |
| 2340 { |
| 2341 int32_t result = WSAStringToAddressA( |
| 2342 (const LPSTR)src, |
| 2343 af, |
| 2344 0, |
| 2345 reinterpret_cast<struct sockaddr*>(&temp), |
| 2346 &length); |
| 2347 if(result != 0) |
| 2348 { |
| 2349 return -1; |
| 2350 } |
| 2351 memcpy(dst,&(temp._sockaddr_in.sin_addr), |
| 2352 sizeof(temp._sockaddr_in.sin_addr)); |
| 2353 return 0; |
| 2354 } |
| 2355 else if(af == AF_INET6) |
| 2356 { |
| 2357 int32_t result = WSAStringToAddressA( |
| 2358 (const LPSTR)src, |
| 2359 af, |
| 2360 0, |
| 2361 reinterpret_cast<struct sockaddr*>(&temp), |
| 2362 &length); |
| 2363 if(result !=0) |
| 2364 { |
| 2365 return -1; |
| 2366 } |
| 2367 memcpy(dst,&(temp._sockaddr_in6.sin6_addr), |
| 2368 sizeof(temp._sockaddr_in6.sin6_addr)); |
| 2369 return 0; |
| 2370 |
| 2371 }else |
| 2372 { |
| 2373 return -1; |
| 2374 } |
| 2375 #else |
| 2376 return -1; |
| 2377 #endif |
| 2378 } |
| 2379 |
| 2380 int32_t UdpTransport::LocalHostAddressIPV6(char n_localIP[16]) |
| 2381 { |
| 2382 |
| 2383 #if defined(_WIN32) |
| 2384 struct addrinfo *result = NULL; |
| 2385 struct addrinfo *ptr = NULL; |
| 2386 struct addrinfo hints; |
| 2387 |
| 2388 ZeroMemory(&hints, sizeof(hints)); |
| 2389 hints.ai_family = AF_INET6; |
| 2390 |
| 2391 char szHostName[256] = ""; |
| 2392 if(::gethostname(szHostName, sizeof(szHostName) - 1)) |
| 2393 { |
| 2394 WEBRTC_TRACE(kTraceWarning, kTraceTransport, -1, "gethostname failed"); |
| 2395 return -1; |
| 2396 } |
| 2397 |
| 2398 DWORD dwRetval = getaddrinfo(szHostName, NULL, &hints, &result); |
| 2399 if ( dwRetval != 0 ) |
| 2400 { |
| 2401 WEBRTC_TRACE(kTraceWarning, kTraceTransport, -1, |
| 2402 "getaddrinfo failed, error:%d", dwRetval); |
| 2403 return -1; |
| 2404 } |
| 2405 for(ptr=result; ptr != NULL ;ptr=ptr->ai_next) |
| 2406 { |
| 2407 switch (ptr->ai_family) |
| 2408 { |
| 2409 case AF_INET6: |
| 2410 { |
| 2411 for(int i = 0; i< 16; i++) |
| 2412 { |
| 2413 n_localIP[i] = (*(SocketAddress*)ptr->ai_addr). |
| 2414 _sockaddr_in6.sin6_addr.Version6AddressUnion._s6_u8[
i]; |
| 2415 } |
| 2416 bool islocalIP = true; |
| 2417 |
| 2418 for(int n = 0; n< 15; n++) |
| 2419 { |
| 2420 if(n_localIP[n] != 0) |
| 2421 { |
| 2422 islocalIP = false; |
| 2423 break; |
| 2424 } |
| 2425 } |
| 2426 |
| 2427 if(islocalIP && n_localIP[15] != 1) |
| 2428 { |
| 2429 islocalIP = false; |
| 2430 } |
| 2431 |
| 2432 if(islocalIP && ptr->ai_next) |
| 2433 { |
| 2434 continue; |
| 2435 } |
| 2436 if(n_localIP[0] == 0xfe && |
| 2437 n_localIP[1] == 0x80 && ptr->ai_next) |
| 2438 { |
| 2439 continue; |
| 2440 } |
| 2441 freeaddrinfo(result); |
| 2442 } |
| 2443 return 0; |
| 2444 default: |
| 2445 break; |
| 2446 }; |
| 2447 } |
| 2448 freeaddrinfo(result); |
| 2449 WEBRTC_TRACE(kTraceWarning, kTraceTransport, -1, |
| 2450 "getaddrinfo failed to find address"); |
| 2451 return -1; |
| 2452 |
| 2453 #elif defined(WEBRTC_MAC) |
| 2454 struct ifaddrs* ptrIfAddrs = NULL; |
| 2455 struct ifaddrs* ptrIfAddrsStart = NULL; |
| 2456 |
| 2457 getifaddrs(&ptrIfAddrsStart); |
| 2458 ptrIfAddrs = ptrIfAddrsStart; |
| 2459 while(ptrIfAddrs) |
| 2460 { |
| 2461 if(ptrIfAddrs->ifa_addr->sa_family == AF_INET6) |
| 2462 { |
| 2463 const struct sockaddr_in6* sock_in6 = |
| 2464 reinterpret_cast<struct sockaddr_in6*>(ptrIfAddrs->ifa_addr); |
| 2465 const struct in6_addr* sin6_addr = &sock_in6->sin6_addr; |
| 2466 |
| 2467 if (IN6_IS_ADDR_LOOPBACK(sin6_addr) || |
| 2468 IN6_IS_ADDR_LINKLOCAL(sin6_addr)) { |
| 2469 ptrIfAddrs = ptrIfAddrs->ifa_next; |
| 2470 continue; |
| 2471 } |
| 2472 memcpy(n_localIP, sin6_addr->s6_addr, sizeof(sin6_addr->s6_addr)); |
| 2473 freeifaddrs(ptrIfAddrsStart); |
| 2474 return 0; |
| 2475 } |
| 2476 ptrIfAddrs = ptrIfAddrs->ifa_next; |
| 2477 } |
| 2478 freeifaddrs(ptrIfAddrsStart); |
| 2479 return -1; |
| 2480 #elif defined(WEBRTC_ANDROID) |
| 2481 return -1; |
| 2482 #else // WEBRTC_LINUX |
| 2483 struct |
| 2484 { |
| 2485 struct nlmsghdr n; |
| 2486 struct ifaddrmsg r; |
| 2487 } req; |
| 2488 |
| 2489 struct rtattr* rta = NULL; |
| 2490 int status; |
| 2491 char buf[16384]; // = 16 * 1024 (16 kB) |
| 2492 struct nlmsghdr* nlmp; |
| 2493 struct ifaddrmsg* rtmp; |
| 2494 struct rtattr* rtatp; |
| 2495 int rtattrlen; |
| 2496 struct in6_addr* in6p; |
| 2497 |
| 2498 int fd = socket(PF_NETLINK, SOCK_DGRAM, NETLINK_ROUTE); |
| 2499 if (fd == -1) |
| 2500 { |
| 2501 return -1; |
| 2502 } |
| 2503 |
| 2504 // RTM_GETADDR is used to fetch the ip address from the kernel interface |
| 2505 // table. Populate the msg structure (req) the size of the message buffer |
| 2506 // is specified to netlinkmessage header, and flags values are set as |
| 2507 // NLM_F_ROOT | NLM_F_REQUEST. |
| 2508 // The request flag must be set for all messages requesting the data from |
| 2509 // kernel. The root flag is used to notify the kernel to return the full |
| 2510 // tabel. Another flag (not used) is NLM_F_MATCH. This is used to get only |
| 2511 // specified entries in the table. At the time of writing this program this |
| 2512 // flag is not implemented in kernel |
| 2513 |
| 2514 memset(&req, 0, sizeof(req)); |
| 2515 req.n.nlmsg_len = NLMSG_LENGTH(sizeof(struct ifaddrmsg)); |
| 2516 req.n.nlmsg_flags = NLM_F_REQUEST | NLM_F_ROOT; |
| 2517 req.n.nlmsg_type = RTM_GETADDR; |
| 2518 req.r.ifa_family = AF_INET6; |
| 2519 |
| 2520 // Fill up all the attributes for the rtnetlink header. |
| 2521 // The lenght is very important. 16 signifies the ipv6 address. |
| 2522 rta = (struct rtattr*)(((char*)&req) + NLMSG_ALIGN(req.n.nlmsg_len)); |
| 2523 rta->rta_len = RTA_LENGTH(16); |
| 2524 |
| 2525 status = send(fd, &req, req.n.nlmsg_len, 0); |
| 2526 if (status < 0) |
| 2527 { |
| 2528 close(fd); |
| 2529 return -1; |
| 2530 } |
| 2531 status = recv(fd, buf, sizeof(buf), 0); |
| 2532 if (status < 0) |
| 2533 { |
| 2534 close(fd); |
| 2535 return -1; |
| 2536 } |
| 2537 if(status == 0) |
| 2538 { |
| 2539 close(fd); |
| 2540 return -1; |
| 2541 } |
| 2542 close(fd); |
| 2543 |
| 2544 // The message is stored in buff. Parse the message to get the requested |
| 2545 // data. |
| 2546 { |
| 2547 nlmp = (struct nlmsghdr*)buf; |
| 2548 int len = nlmp->nlmsg_len; |
| 2549 int req_len = len - sizeof(*nlmp); |
| 2550 |
| 2551 if (req_len < 0 || len > status) |
| 2552 { |
| 2553 return -1; |
| 2554 } |
| 2555 if (!NLMSG_OK_NO_WARNING(nlmp, status)) |
| 2556 { |
| 2557 return -1; |
| 2558 } |
| 2559 rtmp = (struct ifaddrmsg*)NLMSG_DATA(nlmp); |
| 2560 rtatp = (struct rtattr*)IFA_RTA(rtmp); |
| 2561 |
| 2562 rtattrlen = IFA_PAYLOAD(nlmp); |
| 2563 |
| 2564 for (; RTA_OK(rtatp, rtattrlen); rtatp = RTA_NEXT(rtatp, rtattrlen)) |
| 2565 { |
| 2566 |
| 2567 // Here we hit the fist chunk of the message. Time to validate the |
| 2568 // type. For more info on the different types see |
| 2569 // "man(7) rtnetlink" The table below is taken from man pages. |
| 2570 // Attributes |
| 2571 // rta_type value type description |
| 2572 // ------------------------------------------------------------- |
| 2573 // IFA_UNSPEC - unspecified. |
| 2574 // IFA_ADDRESS raw protocol address interface address |
| 2575 // IFA_LOCAL raw protocol address local address |
| 2576 // IFA_LABEL asciiz string name of the interface |
| 2577 // IFA_BROADCAST raw protocol address broadcast address. |
| 2578 // IFA_ANYCAST raw protocol address anycast address |
| 2579 // IFA_CACHEINFO struct ifa_cacheinfo Address information. |
| 2580 |
| 2581 if(rtatp->rta_type == IFA_ADDRESS) |
| 2582 { |
| 2583 bool islocalIP = true; |
| 2584 in6p = (struct in6_addr*)RTA_DATA(rtatp); |
| 2585 for(int n = 0; n< 15; n++) |
| 2586 { |
| 2587 if(in6p->s6_addr[n] != 0) |
| 2588 { |
| 2589 islocalIP = false; |
| 2590 break; |
| 2591 } |
| 2592 } |
| 2593 if(islocalIP && in6p->s6_addr[15] != 1) |
| 2594 { |
| 2595 islocalIP = false; |
| 2596 } |
| 2597 if(!islocalIP) |
| 2598 { |
| 2599 for(int i = 0; i< 16; i++) |
| 2600 { |
| 2601 n_localIP[i] = in6p->s6_addr[i]; |
| 2602 } |
| 2603 if(n_localIP[0] == static_cast<char> (0xfe) |
| 2604 && n_localIP[1] == static_cast<char>(0x80) ) |
| 2605 { |
| 2606 // Auto configured IP. |
| 2607 continue; |
| 2608 } |
| 2609 break; |
| 2610 } |
| 2611 } |
| 2612 } |
| 2613 } |
| 2614 return 0; |
| 2615 #endif |
| 2616 } |
| 2617 |
| 2618 int32_t UdpTransport::LocalHostAddress(uint32_t& localIP) |
| 2619 { |
| 2620 #if defined(_WIN32) |
| 2621 hostent* localHost; |
| 2622 localHost = gethostbyname( "" ); |
| 2623 if(localHost) |
| 2624 { |
| 2625 if(localHost->h_addrtype != AF_INET) |
| 2626 { |
| 2627 WEBRTC_TRACE( |
| 2628 kTraceError, |
| 2629 kTraceTransport, |
| 2630 -1, |
| 2631 "LocalHostAddress can only get local IP for IP Version 4"); |
| 2632 return -1; |
| 2633 } |
| 2634 localIP= Htonl( |
| 2635 (*(struct in_addr *)localHost->h_addr_list[0]).S_un.S_addr); |
| 2636 return 0; |
| 2637 } |
| 2638 else |
| 2639 { |
| 2640 int32_t error = WSAGetLastError(); |
| 2641 WEBRTC_TRACE(kTraceWarning, kTraceTransport, -1, |
| 2642 "gethostbyname failed, error:%d", error); |
| 2643 return -1; |
| 2644 } |
| 2645 #elif (defined(WEBRTC_MAC)) |
| 2646 char localname[255]; |
| 2647 if (gethostname(localname, 255) != -1) |
| 2648 { |
| 2649 hostent* localHost; |
| 2650 localHost = gethostbyname(localname); |
| 2651 if(localHost) |
| 2652 { |
| 2653 if(localHost->h_addrtype != AF_INET) |
| 2654 { |
| 2655 WEBRTC_TRACE( |
| 2656 kTraceError, |
| 2657 kTraceTransport, |
| 2658 -1, |
| 2659 "LocalHostAddress can only get local IP for IP Version 4"); |
| 2660 return -1; |
| 2661 } |
| 2662 localIP = Htonl((*(struct in_addr*)*localHost->h_addr_list).s_addr); |
| 2663 return 0; |
| 2664 } |
| 2665 } |
| 2666 WEBRTC_TRACE(kTraceWarning, kTraceTransport, -1, "gethostname failed"); |
| 2667 return -1; |
| 2668 #else // WEBRTC_LINUX |
| 2669 int sockfd, size = 1; |
| 2670 struct ifreq* ifr; |
| 2671 struct ifconf ifc; |
| 2672 |
| 2673 if (0 > (sockfd = socket(AF_INET, SOCK_DGRAM, IPPROTO_IP))) |
| 2674 { |
| 2675 return -1; |
| 2676 } |
| 2677 ifc.ifc_len = IFRSIZE; |
| 2678 ifc.ifc_req = NULL; |
| 2679 do |
| 2680 { |
| 2681 ++size; |
| 2682 // Buffer size needed is unknown. Try increasing it until no overflow |
| 2683 // occurs. |
| 2684 if (NULL == (ifc.ifc_req = (ifreq*)realloc(ifc.ifc_req, IFRSIZE))) { |
| 2685 fprintf(stderr, "Out of memory.\n"); |
| 2686 exit(EXIT_FAILURE); |
| 2687 } |
| 2688 ifc.ifc_len = IFRSIZE; |
| 2689 if (ioctl(sockfd, SIOCGIFCONF, &ifc)) |
| 2690 { |
| 2691 free(ifc.ifc_req); |
| 2692 close(sockfd); |
| 2693 return -1; |
| 2694 } |
| 2695 } while (IFRSIZE <= ifc.ifc_len); |
| 2696 |
| 2697 ifr = ifc.ifc_req; |
| 2698 for (;(char *) ifr < (char *) ifc.ifc_req + ifc.ifc_len; ++ifr) |
| 2699 { |
| 2700 if (ifr->ifr_addr.sa_data == (ifr+1)->ifr_addr.sa_data) |
| 2701 { |
| 2702 continue; // duplicate, skip it |
| 2703 } |
| 2704 if (ioctl(sockfd, SIOCGIFFLAGS, ifr)) |
| 2705 { |
| 2706 continue; // failed to get flags, skip it |
| 2707 } |
| 2708 if(strncmp(ifr->ifr_name, "lo",3) == 0) |
| 2709 { |
| 2710 continue; |
| 2711 }else |
| 2712 { |
| 2713 struct sockaddr* saddr = &(ifr->ifr_addr); |
| 2714 SocketAddress* socket_addess = reinterpret_cast<SocketAddress*>( |
| 2715 saddr); |
| 2716 localIP = Htonl(socket_addess->_sockaddr_in.sin_addr); |
| 2717 close(sockfd); |
| 2718 free(ifc.ifc_req); |
| 2719 return 0; |
| 2720 } |
| 2721 } |
| 2722 free(ifc.ifc_req); |
| 2723 close(sockfd); |
| 2724 return -1; |
| 2725 #endif |
| 2726 } |
| 2727 |
| 2728 int32_t UdpTransport::IPAddress(const SocketAddress& address, |
| 2729 char* ip, |
| 2730 uint32_t& ipSize, |
| 2731 uint16_t& sourcePort) |
| 2732 { |
| 2733 #if defined(_WIN32) |
| 2734 DWORD dwIPSize = ipSize; |
| 2735 int32_t returnvalue = WSAAddressToStringA((LPSOCKADDR)(&address), |
| 2736 sizeof(SocketAddress), |
| 2737 NULL, |
| 2738 ip, |
| 2739 &dwIPSize); |
| 2740 if(returnvalue == -1) |
| 2741 { |
| 2742 return -1; |
| 2743 } |
| 2744 |
| 2745 uint16_t source_port = 0; |
| 2746 if(address._sockaddr_storage.sin_family == AF_INET) |
| 2747 { |
| 2748 // Parse IP assuming format "a.b.c.d:port". |
| 2749 char* ipEnd = strchr(ip,':'); |
| 2750 if(ipEnd != NULL) |
| 2751 { |
| 2752 *ipEnd = '\0'; |
| 2753 } |
| 2754 ipSize = (int32_t)strlen(ip); |
| 2755 if(ipSize == 0) |
| 2756 { |
| 2757 return -1; |
| 2758 } |
| 2759 source_port = address._sockaddr_in.sin_port; |
| 2760 } |
| 2761 else |
| 2762 { |
| 2763 // Parse IP assuming format "[address]:port". |
| 2764 char* ipEnd = strchr(ip,']'); |
| 2765 if(ipEnd != NULL) |
| 2766 { |
| 2767 // Calculate length |
| 2768 int32_t adrSize = int32_t(ipEnd - ip) - 1; |
| 2769 memmove(ip, &ip[1], adrSize); // Remove '[' |
| 2770 *(ipEnd - 1) = '\0'; |
| 2771 } |
| 2772 ipSize = (int32_t)strlen(ip); |
| 2773 if(ipSize == 0) |
| 2774 { |
| 2775 return -1; |
| 2776 } |
| 2777 |
| 2778 source_port = address._sockaddr_in6.sin6_port; |
| 2779 } |
| 2780 // Convert port number to network byte order. |
| 2781 sourcePort = htons(source_port); |
| 2782 return 0; |
| 2783 |
| 2784 #elif defined(WEBRTC_LINUX) || defined(WEBRTC_MAC) |
| 2785 int32_t ipFamily = address._sockaddr_storage.sin_family; |
| 2786 const void* ptrNumericIP = NULL; |
| 2787 |
| 2788 if(ipFamily == AF_INET) |
| 2789 { |
| 2790 ptrNumericIP = &(address._sockaddr_in.sin_addr); |
| 2791 } |
| 2792 else if(ipFamily == AF_INET6) |
| 2793 { |
| 2794 ptrNumericIP = &(address._sockaddr_in6.sin6_addr); |
| 2795 } |
| 2796 else |
| 2797 { |
| 2798 return -1; |
| 2799 } |
| 2800 if(inet_ntop(ipFamily, ptrNumericIP, ip, ipSize) == NULL) |
| 2801 { |
| 2802 return -1; |
| 2803 } |
| 2804 uint16_t source_port; |
| 2805 if(ipFamily == AF_INET) |
| 2806 { |
| 2807 source_port = address._sockaddr_in.sin_port; |
| 2808 } else |
| 2809 { |
| 2810 source_port = address._sockaddr_in6.sin6_port; |
| 2811 } |
| 2812 // Convert port number to network byte order. |
| 2813 sourcePort = htons(source_port); |
| 2814 return 0; |
| 2815 #else |
| 2816 return -1; |
| 2817 #endif |
| 2818 } |
| 2819 |
| 2820 bool UdpTransport::IsIpAddressValid(const char* ipadr, const bool ipV6) |
| 2821 { |
| 2822 if(ipV6) |
| 2823 { |
| 2824 int32_t len = (int32_t)strlen(ipadr); |
| 2825 if( len>39 || len == 0) |
| 2826 { |
| 2827 return false; |
| 2828 } |
| 2829 |
| 2830 int32_t i; |
| 2831 int32_t colonPos[7] = {0,0,0,0,0,0,0}; |
| 2832 int32_t lastColonPos = -2; |
| 2833 int32_t nColons = 0; |
| 2834 int32_t nDubbleColons = 0; |
| 2835 int32_t nDots = 0; |
| 2836 int32_t error = 0; |
| 2837 char c; |
| 2838 for(i = 0; i < len ; i++) |
| 2839 { |
| 2840 c=ipadr[i]; |
| 2841 if(isxdigit(c)) |
| 2842 ; |
| 2843 else if(c == ':') |
| 2844 { |
| 2845 if(nColons < 7) |
| 2846 colonPos[nColons] = i; |
| 2847 if((i-lastColonPos)==1) |
| 2848 nDubbleColons++; |
| 2849 lastColonPos=i; |
| 2850 if(nDots != 0) |
| 2851 { |
| 2852 error = 1; |
| 2853 } |
| 2854 nColons++; |
| 2855 } |
| 2856 else if(c == '.') |
| 2857 { |
| 2858 nDots++; |
| 2859 } |
| 2860 else |
| 2861 { |
| 2862 error = 1; |
| 2863 } |
| 2864 |
| 2865 } |
| 2866 if(error) |
| 2867 { |
| 2868 return false; |
| 2869 } |
| 2870 if(nDubbleColons > 1) |
| 2871 { |
| 2872 return false; |
| 2873 } |
| 2874 if(nColons > 7 || nColons < 2) |
| 2875 { |
| 2876 return false; |
| 2877 } |
| 2878 if(!(nDots == 3 || nDots == 0)) |
| 2879 { |
| 2880 return false; |
| 2881 } |
| 2882 lastColonPos = -1; |
| 2883 int32_t charsBeforeColon = 0; |
| 2884 for(i = 0; i < nColons; i++) |
| 2885 { |
| 2886 charsBeforeColon=colonPos[i]-lastColonPos-1; |
| 2887 if(charsBeforeColon > 4) |
| 2888 { |
| 2889 return false; |
| 2890 } |
| 2891 lastColonPos=colonPos[i]; |
| 2892 } |
| 2893 int32_t lengthAfterLastColon = len - lastColonPos - 1; |
| 2894 if(nDots == 0) |
| 2895 { |
| 2896 if(lengthAfterLastColon > 4) |
| 2897 return false; |
| 2898 } |
| 2899 if(nDots == 3 && lengthAfterLastColon > 0) |
| 2900 { |
| 2901 return IsIpAddressValid((ipadr+lastColonPos+1),false); |
| 2902 } |
| 2903 |
| 2904 } |
| 2905 else |
| 2906 { |
| 2907 int32_t len = (int32_t)strlen(ipadr); |
| 2908 if((len>15)||(len==0)) |
| 2909 { |
| 2910 return false; |
| 2911 } |
| 2912 |
| 2913 // IPv4 should be [0-255].[0-255].[0-255].[0-255] |
| 2914 int32_t i; |
| 2915 int32_t nDots = 0; |
| 2916 int32_t iDotPos[4] = {0,0,0,0}; |
| 2917 |
| 2918 for (i = 0; (i < len) && (nDots < 4); i++) |
| 2919 { |
| 2920 if (ipadr[i] == (char)'.') |
| 2921 { |
| 2922 // Store index of dots and count number of dots. |
| 2923 iDotPos[nDots++] = i; |
| 2924 } |
| 2925 else if (isdigit(ipadr[i]) == 0) |
| 2926 { |
| 2927 return false; |
| 2928 } |
| 2929 } |
| 2930 |
| 2931 bool allUnder256 = false; |
| 2932 // TODO (hellner): while loop seems to be abused here to get |
| 2933 // label like functionality. Fix later to avoid introducing bugs now. |
| 2934 |
| 2935 // Check that all numbers are smaller than 256. |
| 2936 do |
| 2937 { |
| 2938 if (nDots != 3 ) |
| 2939 { |
| 2940 break; |
| 2941 } |
| 2942 |
| 2943 if (iDotPos[0] <= 3) |
| 2944 { |
| 2945 char nr[4]; |
| 2946 memset(nr,0,4); |
| 2947 strncpy(nr,&ipadr[0],iDotPos[0]); |
| 2948 int32_t num = atoi(nr); |
| 2949 if (num > 255 || num < 0) |
| 2950 { |
| 2951 break; |
| 2952 } |
| 2953 } else { |
| 2954 break; |
| 2955 } |
| 2956 |
| 2957 if (iDotPos[1] - iDotPos[0] <= 4) |
| 2958 { |
| 2959 char nr[4]; |
| 2960 memset(nr,0,4); |
| 2961 strncpy(nr,&ipadr[iDotPos[0]+1], iDotPos[1] - iDotPos[0] - 1); |
| 2962 int32_t num = atoi(nr); |
| 2963 if (num > 255 || num < 0) |
| 2964 break; |
| 2965 } else { |
| 2966 break; |
| 2967 } |
| 2968 |
| 2969 if (iDotPos[2] - iDotPos[1] <= 4) |
| 2970 { |
| 2971 char nr[4]; |
| 2972 memset(nr,0,4); |
| 2973 strncpy(nr,&ipadr[iDotPos[1]+1], iDotPos[2] - iDotPos[1] - 1); |
| 2974 int32_t num = atoi(nr); |
| 2975 if (num > 255 || num < 0) |
| 2976 break; |
| 2977 } else { |
| 2978 break; |
| 2979 } |
| 2980 |
| 2981 if (len - iDotPos[2] <= 4) |
| 2982 { |
| 2983 char nr[4]; |
| 2984 memset(nr,0,4); |
| 2985 strncpy(nr,&ipadr[iDotPos[2]+1], len - iDotPos[2] -1); |
| 2986 int32_t num = atoi(nr); |
| 2987 if (num > 255 || num < 0) |
| 2988 break; |
| 2989 else |
| 2990 allUnder256 = true; |
| 2991 } else { |
| 2992 break; |
| 2993 } |
| 2994 } while(false); |
| 2995 |
| 2996 if (nDots != 3 || !allUnder256) |
| 2997 { |
| 2998 return false; |
| 2999 } |
| 3000 } |
| 3001 return true; |
| 3002 } |
| 3003 |
| 3004 } // namespace test |
| 3005 } // namespace webrtc |
OLD | NEW |