Repo created
This commit is contained in:
parent
81b91f4139
commit
f8c34fa5ee
22732 changed files with 4815320 additions and 2 deletions
279
TMessagesProj/jni/voip/webrtc/rtc_base/nat_server.cc
Normal file
279
TMessagesProj/jni/voip/webrtc/rtc_base/nat_server.cc
Normal file
|
|
@ -0,0 +1,279 @@
|
|||
/*
|
||||
* Copyright 2004 The WebRTC Project Authors. All rights reserved.
|
||||
*
|
||||
* Use of this source code is governed by a BSD-style license
|
||||
* that can be found in the LICENSE file in the root of the source
|
||||
* tree. An additional intellectual property rights grant can be found
|
||||
* in the file PATENTS. All contributing project authors may
|
||||
* be found in the AUTHORS file in the root of the source tree.
|
||||
*/
|
||||
|
||||
#include "rtc_base/nat_server.h"
|
||||
|
||||
#include <cstddef>
|
||||
#include <cstdint>
|
||||
#include <memory>
|
||||
|
||||
#include "api/array_view.h"
|
||||
#include "rtc_base/checks.h"
|
||||
#include "rtc_base/logging.h"
|
||||
#include "rtc_base/nat_socket_factory.h"
|
||||
#include "rtc_base/network/received_packet.h"
|
||||
#include "rtc_base/socket_adapters.h"
|
||||
#include "rtc_base/socket_address.h"
|
||||
|
||||
namespace rtc {
|
||||
|
||||
RouteCmp::RouteCmp(NAT* nat) : symmetric(nat->IsSymmetric()) {}
|
||||
|
||||
size_t RouteCmp::operator()(const SocketAddressPair& r) const {
|
||||
size_t h = r.source().Hash();
|
||||
if (symmetric)
|
||||
h ^= r.destination().Hash();
|
||||
return h;
|
||||
}
|
||||
|
||||
bool RouteCmp::operator()(const SocketAddressPair& r1,
|
||||
const SocketAddressPair& r2) const {
|
||||
if (r1.source() < r2.source())
|
||||
return true;
|
||||
if (r2.source() < r1.source())
|
||||
return false;
|
||||
if (symmetric && (r1.destination() < r2.destination()))
|
||||
return true;
|
||||
if (symmetric && (r2.destination() < r1.destination()))
|
||||
return false;
|
||||
return false;
|
||||
}
|
||||
|
||||
AddrCmp::AddrCmp(NAT* nat)
|
||||
: use_ip(nat->FiltersIP()), use_port(nat->FiltersPort()) {}
|
||||
|
||||
size_t AddrCmp::operator()(const SocketAddress& a) const {
|
||||
size_t h = 0;
|
||||
if (use_ip)
|
||||
h ^= HashIP(a.ipaddr());
|
||||
if (use_port)
|
||||
h ^= a.port() | (a.port() << 16);
|
||||
return h;
|
||||
}
|
||||
|
||||
bool AddrCmp::operator()(const SocketAddress& a1,
|
||||
const SocketAddress& a2) const {
|
||||
if (use_ip && (a1.ipaddr() < a2.ipaddr()))
|
||||
return true;
|
||||
if (use_ip && (a2.ipaddr() < a1.ipaddr()))
|
||||
return false;
|
||||
if (use_port && (a1.port() < a2.port()))
|
||||
return true;
|
||||
if (use_port && (a2.port() < a1.port()))
|
||||
return false;
|
||||
return false;
|
||||
}
|
||||
|
||||
// Proxy socket that will capture the external destination address intended for
|
||||
// a TCP connection to the NAT server.
|
||||
class NATProxyServerSocket : public AsyncProxyServerSocket {
|
||||
public:
|
||||
NATProxyServerSocket(Socket* socket)
|
||||
: AsyncProxyServerSocket(socket, kNATEncodedIPv6AddressSize) {
|
||||
BufferInput(true);
|
||||
}
|
||||
|
||||
void SendConnectResult(int err, const SocketAddress& addr) override {
|
||||
char code = err ? 1 : 0;
|
||||
BufferedReadAdapter::DirectSend(&code, sizeof(char));
|
||||
}
|
||||
|
||||
protected:
|
||||
void ProcessInput(char* data, size_t* len) override {
|
||||
if (*len < 2) {
|
||||
return;
|
||||
}
|
||||
|
||||
int family = data[1];
|
||||
RTC_DCHECK(family == AF_INET || family == AF_INET6);
|
||||
if ((family == AF_INET && *len < kNATEncodedIPv4AddressSize) ||
|
||||
(family == AF_INET6 && *len < kNATEncodedIPv6AddressSize)) {
|
||||
return;
|
||||
}
|
||||
|
||||
SocketAddress dest_addr;
|
||||
size_t address_length = UnpackAddressFromNAT(
|
||||
MakeArrayView(reinterpret_cast<const uint8_t*>(data), *len),
|
||||
&dest_addr);
|
||||
*len -= address_length;
|
||||
if (*len > 0) {
|
||||
memmove(data, data + address_length, *len);
|
||||
}
|
||||
|
||||
bool remainder = (*len > 0);
|
||||
BufferInput(false);
|
||||
SignalConnectRequest(this, dest_addr);
|
||||
if (remainder) {
|
||||
SignalReadEvent(this);
|
||||
}
|
||||
}
|
||||
};
|
||||
|
||||
class NATProxyServer : public ProxyServer {
|
||||
public:
|
||||
NATProxyServer(SocketFactory* int_factory,
|
||||
const SocketAddress& int_addr,
|
||||
SocketFactory* ext_factory,
|
||||
const SocketAddress& ext_ip)
|
||||
: ProxyServer(int_factory, int_addr, ext_factory, ext_ip) {}
|
||||
|
||||
protected:
|
||||
AsyncProxyServerSocket* WrapSocket(Socket* socket) override {
|
||||
return new NATProxyServerSocket(socket);
|
||||
}
|
||||
};
|
||||
|
||||
NATServer::NATServer(NATType type,
|
||||
rtc::Thread& internal_socket_thread,
|
||||
SocketFactory* internal,
|
||||
const SocketAddress& internal_udp_addr,
|
||||
const SocketAddress& internal_tcp_addr,
|
||||
rtc::Thread& external_socket_thread,
|
||||
SocketFactory* external,
|
||||
const SocketAddress& external_ip)
|
||||
: internal_socket_thread_(internal_socket_thread),
|
||||
external_socket_thread_(external_socket_thread),
|
||||
external_(external),
|
||||
external_ip_(external_ip.ipaddr(), 0) {
|
||||
nat_ = NAT::Create(type);
|
||||
|
||||
internal_socket_thread_.BlockingCall([&] {
|
||||
udp_server_socket_ = AsyncUDPSocket::Create(internal, internal_udp_addr);
|
||||
udp_server_socket_->RegisterReceivedPacketCallback(
|
||||
[&](rtc::AsyncPacketSocket* socket, const rtc::ReceivedPacket& packet) {
|
||||
OnInternalUDPPacket(socket, packet);
|
||||
});
|
||||
});
|
||||
|
||||
tcp_proxy_server_ =
|
||||
new NATProxyServer(internal, internal_tcp_addr, external, external_ip);
|
||||
|
||||
int_map_ = new InternalMap(RouteCmp(nat_));
|
||||
ext_map_ = new ExternalMap();
|
||||
}
|
||||
|
||||
NATServer::~NATServer() {
|
||||
for (InternalMap::iterator iter = int_map_->begin(); iter != int_map_->end();
|
||||
iter++)
|
||||
delete iter->second;
|
||||
|
||||
delete nat_;
|
||||
delete udp_server_socket_;
|
||||
delete tcp_proxy_server_;
|
||||
delete int_map_;
|
||||
delete ext_map_;
|
||||
}
|
||||
|
||||
void NATServer::OnInternalUDPPacket(AsyncPacketSocket* socket,
|
||||
const rtc::ReceivedPacket& packet) {
|
||||
RTC_DCHECK(internal_socket_thread_.IsCurrent());
|
||||
// Read the intended destination from the wire.
|
||||
SocketAddress dest_addr;
|
||||
size_t length = UnpackAddressFromNAT(packet.payload(), &dest_addr);
|
||||
|
||||
// Find the translation for these addresses (allocating one if necessary).
|
||||
SocketAddressPair route(packet.source_address(), dest_addr);
|
||||
InternalMap::iterator iter = int_map_->find(route);
|
||||
if (iter == int_map_->end()) {
|
||||
Translate(route);
|
||||
iter = int_map_->find(route);
|
||||
}
|
||||
RTC_DCHECK(iter != int_map_->end());
|
||||
|
||||
// Allow the destination to send packets back to the source.
|
||||
iter->second->AllowlistInsert(dest_addr);
|
||||
|
||||
// Send the packet to its intended destination.
|
||||
rtc::PacketOptions options;
|
||||
const char* buf = reinterpret_cast<const char*>(packet.payload().data());
|
||||
size_t size = packet.payload().size();
|
||||
iter->second->socket->SendTo(buf + length, size - length, dest_addr, options);
|
||||
}
|
||||
|
||||
void NATServer::OnExternalUDPPacket(AsyncPacketSocket* socket,
|
||||
const rtc::ReceivedPacket& packet) {
|
||||
RTC_DCHECK(external_socket_thread_.IsCurrent());
|
||||
SocketAddress local_addr = socket->GetLocalAddress();
|
||||
|
||||
// Find the translation for this addresses.
|
||||
ExternalMap::iterator iter = ext_map_->find(local_addr);
|
||||
RTC_DCHECK(iter != ext_map_->end());
|
||||
|
||||
// Allow the NAT to reject this packet.
|
||||
if (ShouldFilterOut(iter->second, packet.source_address())) {
|
||||
RTC_LOG(LS_INFO) << "Packet from "
|
||||
<< packet.source_address().ToSensitiveString()
|
||||
<< " was filtered out by the NAT.";
|
||||
return;
|
||||
}
|
||||
|
||||
// Forward this packet to the internal address.
|
||||
// First prepend the address in a quasi-STUN format.
|
||||
std::unique_ptr<char[]> real_buf(
|
||||
new char[packet.payload().size() + kNATEncodedIPv6AddressSize]);
|
||||
size_t addrlength = PackAddressForNAT(
|
||||
real_buf.get(), packet.payload().size() + kNATEncodedIPv6AddressSize,
|
||||
packet.source_address());
|
||||
// Copy the data part after the address.
|
||||
rtc::PacketOptions options;
|
||||
memcpy(real_buf.get() + addrlength, packet.payload().data(),
|
||||
packet.payload().size());
|
||||
udp_server_socket_->SendTo(real_buf.get(),
|
||||
packet.payload().size() + addrlength,
|
||||
iter->second->route.source(), options);
|
||||
}
|
||||
|
||||
void NATServer::Translate(const SocketAddressPair& route) {
|
||||
external_socket_thread_.BlockingCall([&] {
|
||||
AsyncUDPSocket* socket = AsyncUDPSocket::Create(external_, external_ip_);
|
||||
|
||||
if (!socket) {
|
||||
RTC_LOG(LS_ERROR) << "Couldn't find a free port!";
|
||||
return;
|
||||
}
|
||||
|
||||
TransEntry* entry = new TransEntry(route, socket, nat_);
|
||||
(*int_map_)[route] = entry;
|
||||
(*ext_map_)[socket->GetLocalAddress()] = entry;
|
||||
socket->RegisterReceivedPacketCallback(
|
||||
[&](rtc::AsyncPacketSocket* socket, const rtc::ReceivedPacket& packet) {
|
||||
OnExternalUDPPacket(socket, packet);
|
||||
});
|
||||
});
|
||||
}
|
||||
|
||||
bool NATServer::ShouldFilterOut(TransEntry* entry,
|
||||
const SocketAddress& ext_addr) {
|
||||
return entry->AllowlistContains(ext_addr);
|
||||
}
|
||||
|
||||
NATServer::TransEntry::TransEntry(const SocketAddressPair& r,
|
||||
AsyncUDPSocket* s,
|
||||
NAT* nat)
|
||||
: route(r), socket(s) {
|
||||
allowlist = new AddressSet(AddrCmp(nat));
|
||||
}
|
||||
|
||||
NATServer::TransEntry::~TransEntry() {
|
||||
delete allowlist;
|
||||
delete socket;
|
||||
}
|
||||
|
||||
void NATServer::TransEntry::AllowlistInsert(const SocketAddress& addr) {
|
||||
webrtc::MutexLock lock(&mutex_);
|
||||
allowlist->insert(addr);
|
||||
}
|
||||
|
||||
bool NATServer::TransEntry::AllowlistContains(const SocketAddress& ext_addr) {
|
||||
webrtc::MutexLock lock(&mutex_);
|
||||
return allowlist->find(ext_addr) == allowlist->end();
|
||||
}
|
||||
|
||||
} // namespace rtc
|
||||
Loading…
Add table
Add a link
Reference in a new issue