• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  *  Copyright 2004 The WebRTC Project Authors. All rights reserved.
3  *
4  *  Use of this source code is governed by a BSD-style license
5  *  that can be found in the LICENSE file in the root of the source
6  *  tree. An additional intellectual property rights grant can be found
7  *  in the file PATENTS.  All contributing project authors may
8  *  be found in the AUTHORS file in the root of the source tree.
9  */
10 
11 #ifndef WEBRTC_P2P_BASE_PORT_H_
12 #define WEBRTC_P2P_BASE_PORT_H_
13 
14 #include <map>
15 #include <set>
16 #include <string>
17 #include <vector>
18 
19 #include "webrtc/p2p/base/candidate.h"
20 #include "webrtc/p2p/base/packetsocketfactory.h"
21 #include "webrtc/p2p/base/portinterface.h"
22 #include "webrtc/p2p/base/stun.h"
23 #include "webrtc/p2p/base/stunrequest.h"
24 #include "webrtc/p2p/base/transport.h"
25 #include "webrtc/base/asyncpacketsocket.h"
26 #include "webrtc/base/network.h"
27 #include "webrtc/base/proxyinfo.h"
28 #include "webrtc/base/ratetracker.h"
29 #include "webrtc/base/sigslot.h"
30 #include "webrtc/base/socketaddress.h"
31 #include "webrtc/base/thread.h"
32 
33 namespace cricket {
34 
35 class Connection;
36 class ConnectionRequest;
37 
38 extern const char LOCAL_PORT_TYPE[];
39 extern const char STUN_PORT_TYPE[];
40 extern const char PRFLX_PORT_TYPE[];
41 extern const char RELAY_PORT_TYPE[];
42 
43 extern const char UDP_PROTOCOL_NAME[];
44 extern const char TCP_PROTOCOL_NAME[];
45 extern const char SSLTCP_PROTOCOL_NAME[];
46 
47 // RFC 6544, TCP candidate encoding rules.
48 extern const int DISCARD_PORT;
49 extern const char TCPTYPE_ACTIVE_STR[];
50 extern const char TCPTYPE_PASSIVE_STR[];
51 extern const char TCPTYPE_SIMOPEN_STR[];
52 
53 // The minimum time we will wait before destroying a connection after creating
54 // it.
55 const uint32_t MIN_CONNECTION_LIFETIME = 10 * 1000;  // 10 seconds.
56 
57 // A connection will be declared dead if it has not received anything for this
58 // long.
59 const uint32_t DEAD_CONNECTION_RECEIVE_TIMEOUT = 30 * 1000;  // 30 seconds.
60 
61 // The timeout duration when a connection does not receive anything.
62 const uint32_t WEAK_CONNECTION_RECEIVE_TIMEOUT = 2500;  // 2.5 seconds
63 
64 // The length of time we wait before timing out writability on a connection.
65 const uint32_t CONNECTION_WRITE_TIMEOUT = 15 * 1000;  // 15 seconds
66 
67 // The length of time we wait before we become unwritable.
68 const uint32_t CONNECTION_WRITE_CONNECT_TIMEOUT = 5 * 1000;  // 5 seconds
69 
70 // The number of pings that must fail to respond before we become unwritable.
71 const uint32_t CONNECTION_WRITE_CONNECT_FAILURES = 5;
72 
73 // This is the length of time that we wait for a ping response to come back.
74 const int CONNECTION_RESPONSE_TIMEOUT = 5 * 1000;   // 5 seconds
75 
76 enum RelayType {
77   RELAY_GTURN,   // Legacy google relay service.
78   RELAY_TURN     // Standard (TURN) relay service.
79 };
80 
81 enum IcePriorityValue {
82   // The reason we are choosing Relay preference 2 is because, we can run
83   // Relay from client to server on UDP/TCP/TLS. To distinguish the transport
84   // protocol, we prefer UDP over TCP over TLS.
85   // For UDP ICE_TYPE_PREFERENCE_RELAY will be 2.
86   // For TCP ICE_TYPE_PREFERENCE_RELAY will be 1.
87   // For TLS ICE_TYPE_PREFERENCE_RELAY will be 0.
88   // Check turnport.cc for setting these values.
89   ICE_TYPE_PREFERENCE_RELAY = 2,
90   ICE_TYPE_PREFERENCE_HOST_TCP = 90,
91   ICE_TYPE_PREFERENCE_SRFLX = 100,
92   ICE_TYPE_PREFERENCE_PRFLX = 110,
93   ICE_TYPE_PREFERENCE_HOST = 126
94 };
95 
96 const char* ProtoToString(ProtocolType proto);
97 bool StringToProto(const char* value, ProtocolType* proto);
98 
99 struct ProtocolAddress {
100   rtc::SocketAddress address;
101   ProtocolType proto;
102   bool secure;
103 
ProtocolAddressProtocolAddress104   ProtocolAddress(const rtc::SocketAddress& a, ProtocolType p)
105       : address(a), proto(p), secure(false) { }
ProtocolAddressProtocolAddress106   ProtocolAddress(const rtc::SocketAddress& a, ProtocolType p, bool sec)
107       : address(a), proto(p), secure(sec) { }
108 };
109 
110 typedef std::set<rtc::SocketAddress> ServerAddresses;
111 
112 // Represents a local communication mechanism that can be used to create
113 // connections to similar mechanisms of the other client.  Subclasses of this
114 // one add support for specific mechanisms like local UDP ports.
115 class Port : public PortInterface, public rtc::MessageHandler,
116              public sigslot::has_slots<> {
117  public:
118   Port(rtc::Thread* thread,
119        rtc::PacketSocketFactory* factory,
120        rtc::Network* network,
121        const rtc::IPAddress& ip,
122        const std::string& username_fragment,
123        const std::string& password);
124   Port(rtc::Thread* thread,
125        const std::string& type,
126        rtc::PacketSocketFactory* factory,
127        rtc::Network* network,
128        const rtc::IPAddress& ip,
129        uint16_t min_port,
130        uint16_t max_port,
131        const std::string& username_fragment,
132        const std::string& password);
133   virtual ~Port();
134 
Type()135   virtual const std::string& Type() const { return type_; }
Network()136   virtual rtc::Network* Network() const { return network_; }
137 
138   // Methods to set/get ICE role and tiebreaker values.
GetIceRole()139   IceRole GetIceRole() const { return ice_role_; }
SetIceRole(IceRole role)140   void SetIceRole(IceRole role) { ice_role_ = role; }
141 
SetIceTiebreaker(uint64_t tiebreaker)142   void SetIceTiebreaker(uint64_t tiebreaker) { tiebreaker_ = tiebreaker; }
IceTiebreaker()143   uint64_t IceTiebreaker() const { return tiebreaker_; }
144 
SharedSocket()145   virtual bool SharedSocket() const { return shared_socket_; }
ResetSharedSocket()146   void ResetSharedSocket() { shared_socket_ = false; }
147 
148   // The thread on which this port performs its I/O.
thread()149   rtc::Thread* thread() { return thread_; }
150 
151   // The factory used to create the sockets of this port.
socket_factory()152   rtc::PacketSocketFactory* socket_factory() const { return factory_; }
set_socket_factory(rtc::PacketSocketFactory * factory)153   void set_socket_factory(rtc::PacketSocketFactory* factory) {
154     factory_ = factory;
155   }
156 
157   // For debugging purposes.
content_name()158   const std::string& content_name() const { return content_name_; }
set_content_name(const std::string & content_name)159   void set_content_name(const std::string& content_name) {
160     content_name_ = content_name;
161   }
162 
component()163   int component() const { return component_; }
set_component(int component)164   void set_component(int component) { component_ = component; }
165 
send_retransmit_count_attribute()166   bool send_retransmit_count_attribute() const {
167     return send_retransmit_count_attribute_;
168   }
set_send_retransmit_count_attribute(bool enable)169   void set_send_retransmit_count_attribute(bool enable) {
170     send_retransmit_count_attribute_ = enable;
171   }
172 
173   // Identifies the generation that this port was created in.
generation()174   uint32_t generation() { return generation_; }
set_generation(uint32_t generation)175   void set_generation(uint32_t generation) { generation_ = generation; }
176 
177   // ICE requires a single username/password per content/media line. So the
178   // |ice_username_fragment_| of the ports that belongs to the same content will
179   // be the same. However this causes a small complication with our relay
180   // server, which expects different username for RTP and RTCP.
181   //
182   // To resolve this problem, we implemented the username_fragment(),
183   // which returns a different username (calculated from
184   // |ice_username_fragment_|) for RTCP in the case of ICEPROTO_GOOGLE. And the
185   // username_fragment() simply returns |ice_username_fragment_| when running
186   // in ICEPROTO_RFC5245.
187   //
188   // As a result the ICEPROTO_GOOGLE will use different usernames for RTP and
189   // RTCP. And the ICEPROTO_RFC5245 will use same username for both RTP and
190   // RTCP.
191   const std::string username_fragment() const;
password()192   const std::string& password() const { return password_; }
193 
194   // Fired when candidates are discovered by the port. When all candidates
195   // are discovered that belong to port SignalAddressReady is fired.
196   sigslot::signal2<Port*, const Candidate&> SignalCandidateReady;
197 
198   // Provides all of the above information in one handy object.
Candidates()199   virtual const std::vector<Candidate>& Candidates() const {
200     return candidates_;
201   }
202 
203   // SignalPortComplete is sent when port completes the task of candidates
204   // allocation.
205   sigslot::signal1<Port*> SignalPortComplete;
206   // This signal sent when port fails to allocate candidates and this port
207   // can't be used in establishing the connections. When port is in shared mode
208   // and port fails to allocate one of the candidates, port shouldn't send
209   // this signal as other candidates might be usefull in establishing the
210   // connection.
211   sigslot::signal1<Port*> SignalPortError;
212 
213   // Returns a map containing all of the connections of this port, keyed by the
214   // remote address.
215   typedef std::map<rtc::SocketAddress, Connection*> AddressMap;
connections()216   const AddressMap& connections() { return connections_; }
217 
218   // Returns the connection to the given address or NULL if none exists.
219   virtual Connection* GetConnection(
220       const rtc::SocketAddress& remote_addr);
221 
222   // Called each time a connection is created.
223   sigslot::signal2<Port*, Connection*> SignalConnectionCreated;
224 
225   // In a shared socket mode each port which shares the socket will decide
226   // to accept the packet based on the |remote_addr|. Currently only UDP
227   // port implemented this method.
228   // TODO(mallinath) - Make it pure virtual.
HandleIncomingPacket(rtc::AsyncPacketSocket * socket,const char * data,size_t size,const rtc::SocketAddress & remote_addr,const rtc::PacketTime & packet_time)229   virtual bool HandleIncomingPacket(
230       rtc::AsyncPacketSocket* socket, const char* data, size_t size,
231       const rtc::SocketAddress& remote_addr,
232       const rtc::PacketTime& packet_time) {
233     ASSERT(false);
234     return false;
235   }
236 
237   // Sends a response message (normal or error) to the given request.  One of
238   // these methods should be called as a response to SignalUnknownAddress.
239   // NOTE: You MUST call CreateConnection BEFORE SendBindingResponse.
240   virtual void SendBindingResponse(StunMessage* request,
241                                    const rtc::SocketAddress& addr);
242   virtual void SendBindingErrorResponse(
243       StunMessage* request, const rtc::SocketAddress& addr,
244       int error_code, const std::string& reason);
245 
set_proxy(const std::string & user_agent,const rtc::ProxyInfo & proxy)246   void set_proxy(const std::string& user_agent,
247                  const rtc::ProxyInfo& proxy) {
248     user_agent_ = user_agent;
249     proxy_ = proxy;
250   }
user_agent()251   const std::string& user_agent() { return user_agent_; }
proxy()252   const rtc::ProxyInfo& proxy() { return proxy_; }
253 
254   virtual void EnablePortPackets();
255 
256   // Called if the port has no connections and is no longer useful.
257   void Destroy();
258 
259   virtual void OnMessage(rtc::Message *pmsg);
260 
261   // Debugging description of this port
262   virtual std::string ToString() const;
ip()263   const rtc::IPAddress& ip() const { return ip_; }
min_port()264   uint16_t min_port() { return min_port_; }
max_port()265   uint16_t max_port() { return max_port_; }
266 
267   // Timeout shortening function to speed up unit tests.
set_timeout_delay(int delay)268   void set_timeout_delay(int delay) { timeout_delay_ = delay; }
269 
270   // This method will return local and remote username fragements from the
271   // stun username attribute if present.
272   bool ParseStunUsername(const StunMessage* stun_msg,
273                          std::string* local_username,
274                          std::string* remote_username) const;
275   void CreateStunUsername(const std::string& remote_username,
276                           std::string* stun_username_attr_str) const;
277 
278   bool MaybeIceRoleConflict(const rtc::SocketAddress& addr,
279                             IceMessage* stun_msg,
280                             const std::string& remote_ufrag);
281 
282   // Called when a packet has been sent to the socket.
283   // This is made pure virtual to notify subclasses of Port that they MUST
284   // listen to AsyncPacketSocket::SignalSentPacket and then call
285   // PortInterface::OnSentPacket.
286   virtual void OnSentPacket(rtc::AsyncPacketSocket* socket,
287                             const rtc::SentPacket& sent_packet) = 0;
288 
289   // Called when the socket is currently able to send.
290   void OnReadyToSend();
291 
292   // Called when the Connection discovers a local peer reflexive candidate.
293   // Returns the index of the new local candidate.
294   size_t AddPrflxCandidate(const Candidate& local);
295 
set_candidate_filter(uint32_t candidate_filter)296   void set_candidate_filter(uint32_t candidate_filter) {
297     candidate_filter_ = candidate_filter;
298   }
299 
300  protected:
301   enum {
302     MSG_DEAD = 0,
303     MSG_FIRST_AVAILABLE
304   };
305 
set_type(const std::string & type)306   void set_type(const std::string& type) { type_ = type; }
307 
308   void AddAddress(const rtc::SocketAddress& address,
309                   const rtc::SocketAddress& base_address,
310                   const rtc::SocketAddress& related_address,
311                   const std::string& protocol,
312                   const std::string& relay_protocol,
313                   const std::string& tcptype,
314                   const std::string& type,
315                   uint32_t type_preference,
316                   uint32_t relay_preference,
317                   bool final);
318 
319   // Adds the given connection to the list.  (Deleting removes them.)
320   void AddConnection(Connection* conn);
321 
322   // Called when a packet is received from an unknown address that is not
323   // currently a connection.  If this is an authenticated STUN binding request,
324   // then we will signal the client.
325   void OnReadPacket(const char* data, size_t size,
326                     const rtc::SocketAddress& addr,
327                     ProtocolType proto);
328 
329   // If the given data comprises a complete and correct STUN message then the
330   // return value is true, otherwise false. If the message username corresponds
331   // with this port's username fragment, msg will contain the parsed STUN
332   // message.  Otherwise, the function may send a STUN response internally.
333   // remote_username contains the remote fragment of the STUN username.
334   bool GetStunMessage(const char* data, size_t size,
335                       const rtc::SocketAddress& addr,
336                       IceMessage** out_msg, std::string* out_username);
337 
338   // Checks if the address in addr is compatible with the port's ip.
339   bool IsCompatibleAddress(const rtc::SocketAddress& addr);
340 
341   // Returns default DSCP value.
DefaultDscpValue()342   rtc::DiffServCodePoint DefaultDscpValue() const {
343     // No change from what MediaChannel set.
344     return rtc::DSCP_NO_CHANGE;
345   }
346 
candidate_filter()347   uint32_t candidate_filter() { return candidate_filter_; }
348 
349  private:
350   void Construct();
351   // Called when one of our connections deletes itself.
352   void OnConnectionDestroyed(Connection* conn);
353 
354   // Whether this port is dead, and hence, should be destroyed on the controlled
355   // side.
dead()356   bool dead() const {
357     return ice_role_ == ICEROLE_CONTROLLED && connections_.empty();
358   }
359 
360   rtc::Thread* thread_;
361   rtc::PacketSocketFactory* factory_;
362   std::string type_;
363   bool send_retransmit_count_attribute_;
364   rtc::Network* network_;
365   rtc::IPAddress ip_;
366   uint16_t min_port_;
367   uint16_t max_port_;
368   std::string content_name_;
369   int component_;
370   uint32_t generation_;
371   // In order to establish a connection to this Port (so that real data can be
372   // sent through), the other side must send us a STUN binding request that is
373   // authenticated with this username_fragment and password.
374   // PortAllocatorSession will provide these username_fragment and password.
375   //
376   // Note: we should always use username_fragment() instead of using
377   // |ice_username_fragment_| directly. For the details see the comment on
378   // username_fragment().
379   std::string ice_username_fragment_;
380   std::string password_;
381   std::vector<Candidate> candidates_;
382   AddressMap connections_;
383   int timeout_delay_;
384   bool enable_port_packets_;
385   IceRole ice_role_;
386   uint64_t tiebreaker_;
387   bool shared_socket_;
388   // Information to use when going through a proxy.
389   std::string user_agent_;
390   rtc::ProxyInfo proxy_;
391 
392   // Candidate filter is pushed down to Port such that each Port could
393   // make its own decision on how to create candidates. For example,
394   // when IceTransportsType is set to relay, both RelayPort and
395   // TurnPort will hide raddr to avoid local address leakage.
396   uint32_t candidate_filter_;
397 
398   friend class Connection;
399 };
400 
401 // Represents a communication link between a port on the local client and a
402 // port on the remote client.
403 class Connection : public rtc::MessageHandler,
404     public sigslot::has_slots<> {
405  public:
406   struct SentPing {
SentPingSentPing407     SentPing(const std::string id, uint32_t sent_time)
408         : id(id), sent_time(sent_time) {}
409 
410     std::string id;
411     uint32_t sent_time;
412   };
413 
414   // States are from RFC 5245. http://tools.ietf.org/html/rfc5245#section-5.7.4
415   enum State {
416     STATE_WAITING = 0,  // Check has not been performed, Waiting pair on CL.
417     STATE_INPROGRESS,   // Check has been sent, transaction is in progress.
418     STATE_SUCCEEDED,    // Check already done, produced a successful result.
419     STATE_FAILED        // Check for this connection failed.
420   };
421 
422   virtual ~Connection();
423 
424   // The local port where this connection sends and receives packets.
port()425   Port* port() { return port_; }
port()426   const Port* port() const { return port_; }
427 
428   // Returns the description of the local port
429   virtual const Candidate& local_candidate() const;
430 
431   // Returns the description of the remote port to which we communicate.
remote_candidate()432   const Candidate& remote_candidate() const { return remote_candidate_; }
433 
434   // Returns the pair priority.
435   uint64_t priority() const;
436 
437   enum WriteState {
438     STATE_WRITABLE          = 0,  // we have received ping responses recently
439     STATE_WRITE_UNRELIABLE  = 1,  // we have had a few ping failures
440     STATE_WRITE_INIT        = 2,  // we have yet to receive a ping response
441     STATE_WRITE_TIMEOUT     = 3,  // we have had a large number of ping failures
442   };
443 
write_state()444   WriteState write_state() const { return write_state_; }
writable()445   bool writable() const { return write_state_ == STATE_WRITABLE; }
receiving()446   bool receiving() const { return receiving_; }
447 
448   // Determines whether the connection has finished connecting.  This can only
449   // be false for TCP connections.
connected()450   bool connected() const { return connected_; }
weak()451   bool weak() const { return !(writable() && receiving() && connected()); }
active()452   bool active() const {
453     return write_state_ != STATE_WRITE_TIMEOUT;
454   }
455   // A connection is dead if it can be safely deleted.
456   bool dead(uint32_t now) const;
457 
458   // Estimate of the round-trip time over this connection.
rtt()459   uint32_t rtt() const { return rtt_; }
460 
461   size_t sent_total_bytes();
462   size_t sent_bytes_second();
463   // Used to track how many packets are discarded in the application socket due
464   // to errors.
465   size_t sent_discarded_packets();
466   size_t sent_total_packets();
467   size_t recv_total_bytes();
468   size_t recv_bytes_second();
469   sigslot::signal1<Connection*> SignalStateChange;
470 
471   // Sent when the connection has decided that it is no longer of value.  It
472   // will delete itself immediately after this call.
473   sigslot::signal1<Connection*> SignalDestroyed;
474 
475   // The connection can send and receive packets asynchronously.  This matches
476   // the interface of AsyncPacketSocket, which may use UDP or TCP under the
477   // covers.
478   virtual int Send(const void* data, size_t size,
479                    const rtc::PacketOptions& options) = 0;
480 
481   // Error if Send() returns < 0
482   virtual int GetError() = 0;
483 
484   sigslot::signal4<Connection*, const char*, size_t, const rtc::PacketTime&>
485       SignalReadPacket;
486 
487   sigslot::signal1<Connection*> SignalReadyToSend;
488 
489   // Called when a packet is received on this connection.
490   void OnReadPacket(const char* data, size_t size,
491                     const rtc::PacketTime& packet_time);
492 
493   // Called when the socket is currently able to send.
494   void OnReadyToSend();
495 
496   // Called when a connection is determined to be no longer useful to us.  We
497   // still keep it around in case the other side wants to use it.  But we can
498   // safely stop pinging on it and we can allow it to time out if the other
499   // side stops using it as well.
pruned()500   bool pruned() const { return pruned_; }
501   void Prune();
502 
use_candidate_attr()503   bool use_candidate_attr() const { return use_candidate_attr_; }
504   void set_use_candidate_attr(bool enable);
505 
nominated()506   bool nominated() const { return nominated_; }
set_nominated(bool nominated)507   void set_nominated(bool nominated) { nominated_ = nominated; }
508 
set_remote_ice_mode(IceMode mode)509   void set_remote_ice_mode(IceMode mode) {
510     remote_ice_mode_ = mode;
511   }
512 
set_receiving_timeout(uint32_t receiving_timeout_ms)513   void set_receiving_timeout(uint32_t receiving_timeout_ms) {
514     receiving_timeout_ = receiving_timeout_ms;
515   }
516 
517   // Makes the connection go away.
518   void Destroy();
519 
520   // Makes the connection go away, in a failed state.
521   void FailAndDestroy();
522 
523   // Checks that the state of this connection is up-to-date.  The argument is
524   // the current time, which is compared against various timeouts.
525   void UpdateState(uint32_t now);
526 
527   // Called when this connection should try checking writability again.
last_ping_sent()528   uint32_t last_ping_sent() const { return last_ping_sent_; }
529   void Ping(uint32_t now);
530   void ReceivedPingResponse();
last_ping_response_received()531   uint32_t last_ping_response_received() const {
532     return last_ping_response_received_;
533   }
534 
535   // Called whenever a valid ping is received on this connection.  This is
536   // public because the connection intercepts the first ping for us.
last_ping_received()537   uint32_t last_ping_received() const { return last_ping_received_; }
538   void ReceivedPing();
539   // Handles the binding request; sends a response if this is a valid request.
540   void HandleBindingRequest(IceMessage* msg);
541 
542   // Debugging description of this connection
543   std::string ToDebugId() const;
544   std::string ToString() const;
545   std::string ToSensitiveString() const;
546   // Prints pings_since_last_response_ into a string.
547   void PrintPingsSinceLastResponse(std::string* pings, size_t max);
548 
reported()549   bool reported() const { return reported_; }
set_reported(bool reported)550   void set_reported(bool reported) { reported_ = reported;}
551 
552   // This signal will be fired if this connection is nominated by the
553   // controlling side.
554   sigslot::signal1<Connection*> SignalNominated;
555 
556   // Invoked when Connection receives STUN error response with 487 code.
557   void HandleRoleConflictFromPeer();
558 
state()559   State state() const { return state_; }
560 
remote_ice_mode()561   IceMode remote_ice_mode() const { return remote_ice_mode_; }
562 
563   // Update the ICE password of the remote candidate if |ice_ufrag| matches
564   // the candidate's ufrag, and the candidate's passwrod has not been set.
565   void MaybeSetRemoteIceCredentials(const std::string& ice_ufrag,
566                                     const std::string& ice_pwd);
567 
568   // If |remote_candidate_| is peer reflexive and is equivalent to
569   // |new_candidate| except the type, update |remote_candidate_| to
570   // |new_candidate|.
571   void MaybeUpdatePeerReflexiveCandidate(const Candidate& new_candidate);
572 
573   // Returns the last received time of any data, stun request, or stun
574   // response in milliseconds
575   uint32_t last_received() const;
576 
577  protected:
578   enum { MSG_DELETE = 0, MSG_FIRST_AVAILABLE };
579 
580   // Constructs a new connection to the given remote port.
581   Connection(Port* port, size_t index, const Candidate& candidate);
582 
583   // Called back when StunRequestManager has a stun packet to send
584   void OnSendStunPacket(const void* data, size_t size, StunRequest* req);
585 
586   // Callbacks from ConnectionRequest
587   virtual void OnConnectionRequestResponse(ConnectionRequest* req,
588                                            StunMessage* response);
589   void OnConnectionRequestErrorResponse(ConnectionRequest* req,
590                                         StunMessage* response);
591   void OnConnectionRequestTimeout(ConnectionRequest* req);
592   void OnConnectionRequestSent(ConnectionRequest* req);
593 
594   // Changes the state and signals if necessary.
595   void set_write_state(WriteState value);
596   void set_receiving(bool value);
597   void set_state(State state);
598   void set_connected(bool value);
599 
600   void OnMessage(rtc::Message *pmsg);
601 
602   Port* port_;
603   size_t local_candidate_index_;
604   Candidate remote_candidate_;
605   WriteState write_state_;
606   bool receiving_;
607   bool connected_;
608   bool pruned_;
609   // By default |use_candidate_attr_| flag will be true,
610   // as we will be using aggressive nomination.
611   // But when peer is ice-lite, this flag "must" be initialized to false and
612   // turn on when connection becomes "best connection".
613   bool use_candidate_attr_;
614   // Whether this connection has been nominated by the controlling side via
615   // the use_candidate attribute.
616   bool nominated_;
617   IceMode remote_ice_mode_;
618   StunRequestManager requests_;
619   uint32_t rtt_;
620   uint32_t last_ping_sent_;      // last time we sent a ping to the other side
621   uint32_t last_ping_received_;  // last time we received a ping from the other
622                                  // side
623   uint32_t last_data_received_;
624   uint32_t last_ping_response_received_;
625   std::vector<SentPing> pings_since_last_response_;
626 
627   rtc::RateTracker recv_rate_tracker_;
628   rtc::RateTracker send_rate_tracker_;
629   uint32_t sent_packets_discarded_;
630   uint32_t sent_packets_total_;
631 
632  private:
633   void MaybeAddPrflxCandidate(ConnectionRequest* request,
634                               StunMessage* response);
635 
636   bool reported_;
637   State state_;
638   // Time duration to switch from receiving to not receiving.
639   uint32_t receiving_timeout_;
640   uint32_t time_created_ms_;
641 
642   friend class Port;
643   friend class ConnectionRequest;
644 };
645 
646 // ProxyConnection defers all the interesting work to the port.
647 class ProxyConnection : public Connection {
648  public:
649   ProxyConnection(Port* port, size_t index, const Candidate& remote_candidate);
650 
651   int Send(const void* data,
652            size_t size,
653            const rtc::PacketOptions& options) override;
GetError()654   int GetError() override { return error_; }
655 
656  private:
657   int error_ = 0;
658 };
659 
660 }  // namespace cricket
661 
662 #endif  // WEBRTC_P2P_BASE_PORT_H_
663