/* * Copyright 2017 The WebRTC Project Authors. All rights reserved. * * Use of this source code is governed by a BSD-style license * that can be found in the LICENSE file in the root of the source * tree. An additional intellectual property rights grant can be found * in the file PATENTS. All contributing project authors may * be found in the AUTHORS file in the root of the source tree. */ #include "pc/jsep_transport_controller.h" #include #include #include "absl/algorithm/container.h" #include "absl/memory/memory.h" #include "p2p/base/ice_transport_internal.h" #include "p2p/base/no_op_dtls_transport.h" #include "p2p/base/port.h" #include "pc/srtp_filter.h" #include "rtc_base/bind.h" #include "rtc_base/checks.h" #include "rtc_base/key_derivation.h" #include "rtc_base/thread.h" using webrtc::SdpType; namespace { webrtc::RTCError VerifyCandidate(const cricket::Candidate& cand) { // No address zero. if (cand.address().IsNil() || cand.address().IsAnyIP()) { return webrtc::RTCError(webrtc::RTCErrorType::INVALID_PARAMETER, "candidate has address of zero"); } // Disallow all ports below 1024, except for 80 and 443 on public addresses. int port = cand.address().port(); if (cand.protocol() == cricket::TCP_PROTOCOL_NAME && (cand.tcptype() == cricket::TCPTYPE_ACTIVE_STR || port == 0)) { // Expected for active-only candidates per // http://tools.ietf.org/html/rfc6544#section-4.5 so no error. // Libjingle clients emit port 0, in "active" mode. return webrtc::RTCError::OK(); } if (port < 1024) { if ((port != 80) && (port != 443)) { return webrtc::RTCError( webrtc::RTCErrorType::INVALID_PARAMETER, "candidate has port below 1024, but not 80 or 443"); } if (cand.address().IsPrivateIP()) { return webrtc::RTCError( webrtc::RTCErrorType::INVALID_PARAMETER, "candidate has port of 80 or 443 with private IP address"); } } return webrtc::RTCError::OK(); } webrtc::RTCError VerifyCandidates(const cricket::Candidates& candidates) { for (const cricket::Candidate& candidate : candidates) { webrtc::RTCError error = VerifyCandidate(candidate); if (!error.ok()) { return error; } } return webrtc::RTCError::OK(); } } // namespace namespace webrtc { JsepTransportController::JsepTransportController( rtc::Thread* signaling_thread, rtc::Thread* network_thread, cricket::PortAllocator* port_allocator, AsyncResolverFactory* async_resolver_factory, Config config) : signaling_thread_(signaling_thread), network_thread_(network_thread), port_allocator_(port_allocator), async_resolver_factory_(async_resolver_factory), config_(config) { // The |transport_observer| is assumed to be non-null. RTC_DCHECK(config_.transport_observer); } JsepTransportController::~JsepTransportController() { // Channel destructors may try to send packets, so this needs to happen on // the network thread. network_thread_->Invoke( RTC_FROM_HERE, rtc::Bind(&JsepTransportController::DestroyAllJsepTransports_n, this)); } RTCError JsepTransportController::SetLocalDescription( SdpType type, const cricket::SessionDescription* description) { if (!network_thread_->IsCurrent()) { return network_thread_->Invoke( RTC_FROM_HERE, [=] { return SetLocalDescription(type, description); }); } if (!initial_offerer_.has_value()) { initial_offerer_.emplace(type == SdpType::kOffer); if (*initial_offerer_) { SetIceRole_n(cricket::ICEROLE_CONTROLLING); } else { SetIceRole_n(cricket::ICEROLE_CONTROLLED); } } return ApplyDescription_n(/*local=*/true, type, description); } RTCError JsepTransportController::SetRemoteDescription( SdpType type, const cricket::SessionDescription* description) { if (!network_thread_->IsCurrent()) { return network_thread_->Invoke( RTC_FROM_HERE, [=] { return SetRemoteDescription(type, description); }); } return ApplyDescription_n(/*local=*/false, type, description); } RtpTransportInternal* JsepTransportController::GetRtpTransport( const std::string& mid) const { auto jsep_transport = GetJsepTransportForMid(mid); if (!jsep_transport) { return nullptr; } return jsep_transport->rtp_transport(); } MediaTransportInterface* JsepTransportController::GetMediaTransport( const std::string& mid) const { auto jsep_transport = GetJsepTransportForMid(mid); if (!jsep_transport) { return nullptr; } return jsep_transport->media_transport(); } MediaTransportState JsepTransportController::GetMediaTransportState( const std::string& mid) const { auto jsep_transport = GetJsepTransportForMid(mid); if (!jsep_transport) { return MediaTransportState::kPending; } return jsep_transport->media_transport_state(); } cricket::DtlsTransportInternal* JsepTransportController::GetDtlsTransport( const std::string& mid) { auto jsep_transport = GetJsepTransportForMid(mid); if (!jsep_transport) { return nullptr; } return jsep_transport->rtp_dtls_transport(); } const cricket::DtlsTransportInternal* JsepTransportController::GetRtcpDtlsTransport(const std::string& mid) const { auto jsep_transport = GetJsepTransportForMid(mid); if (!jsep_transport) { return nullptr; } return jsep_transport->rtcp_dtls_transport(); } rtc::scoped_refptr JsepTransportController::LookupDtlsTransportByMid(const std::string& mid) { auto jsep_transport = GetJsepTransportForMid(mid); if (!jsep_transport) { return nullptr; } return jsep_transport->RtpDtlsTransport(); } void JsepTransportController::SetIceConfig(const cricket::IceConfig& config) { if (!network_thread_->IsCurrent()) { network_thread_->Invoke(RTC_FROM_HERE, [&] { SetIceConfig(config); }); return; } ice_config_ = config; for (auto& dtls : GetDtlsTransports()) { dtls->ice_transport()->SetIceConfig(ice_config_); } } void JsepTransportController::SetNeedsIceRestartFlag() { for (auto& kv : jsep_transports_by_name_) { kv.second->SetNeedsIceRestartFlag(); } } bool JsepTransportController::NeedsIceRestart( const std::string& transport_name) const { const cricket::JsepTransport* transport = GetJsepTransportByName(transport_name); if (!transport) { return false; } return transport->needs_ice_restart(); } absl::optional JsepTransportController::GetDtlsRole( const std::string& mid) const { if (!network_thread_->IsCurrent()) { return network_thread_->Invoke>( RTC_FROM_HERE, [&] { return GetDtlsRole(mid); }); } const cricket::JsepTransport* t = GetJsepTransportForMid(mid); if (!t) { return absl::optional(); } return t->GetDtlsRole(); } bool JsepTransportController::SetLocalCertificate( const rtc::scoped_refptr& certificate) { if (!network_thread_->IsCurrent()) { return network_thread_->Invoke( RTC_FROM_HERE, [&] { return SetLocalCertificate(certificate); }); } // Can't change a certificate, or set a null certificate. if (certificate_ || !certificate) { return false; } certificate_ = certificate; // Set certificate for JsepTransport, which verifies it matches the // fingerprint in SDP, and DTLS transport. // Fallback from DTLS to SDES is not supported. for (auto& kv : jsep_transports_by_name_) { kv.second->SetLocalCertificate(certificate_); } for (auto& dtls : GetDtlsTransports()) { bool set_cert_success = dtls->SetLocalCertificate(certificate_); RTC_DCHECK(set_cert_success); } return true; } rtc::scoped_refptr JsepTransportController::GetLocalCertificate( const std::string& transport_name) const { if (!network_thread_->IsCurrent()) { return network_thread_->Invoke>( RTC_FROM_HERE, [&] { return GetLocalCertificate(transport_name); }); } const cricket::JsepTransport* t = GetJsepTransportByName(transport_name); if (!t) { return nullptr; } return t->GetLocalCertificate(); } std::unique_ptr JsepTransportController::GetRemoteSSLCertChain( const std::string& transport_name) const { if (!network_thread_->IsCurrent()) { return network_thread_->Invoke>( RTC_FROM_HERE, [&] { return GetRemoteSSLCertChain(transport_name); }); } // Get the certificate from the RTP transport's DTLS handshake. Should be // identical to the RTCP transport's, since they were given the same remote // fingerprint. auto jsep_transport = GetJsepTransportByName(transport_name); if (!jsep_transport) { return nullptr; } auto dtls = jsep_transport->rtp_dtls_transport(); if (!dtls) { return nullptr; } return dtls->GetRemoteSSLCertChain(); } void JsepTransportController::MaybeStartGathering() { if (!network_thread_->IsCurrent()) { network_thread_->Invoke(RTC_FROM_HERE, [&] { MaybeStartGathering(); }); return; } for (auto& dtls : GetDtlsTransports()) { dtls->ice_transport()->MaybeStartGathering(); } } RTCError JsepTransportController::AddRemoteCandidates( const std::string& transport_name, const cricket::Candidates& candidates) { if (!network_thread_->IsCurrent()) { return network_thread_->Invoke(RTC_FROM_HERE, [&] { return AddRemoteCandidates(transport_name, candidates); }); } // Verify each candidate before passing down to the transport layer. RTCError error = VerifyCandidates(candidates); if (!error.ok()) { return error; } auto jsep_transport = GetJsepTransportByName(transport_name); if (!jsep_transport) { RTC_LOG(LS_WARNING) << "Not adding candidate because the JsepTransport " "doesn't exist. Ignore it."; return RTCError::OK(); } return jsep_transport->AddRemoteCandidates(candidates); } RTCError JsepTransportController::RemoveRemoteCandidates( const cricket::Candidates& candidates) { if (!network_thread_->IsCurrent()) { return network_thread_->Invoke( RTC_FROM_HERE, [&] { return RemoveRemoteCandidates(candidates); }); } // Verify each candidate before passing down to the transport layer. RTCError error = VerifyCandidates(candidates); if (!error.ok()) { return error; } std::map candidates_by_transport_name; for (const cricket::Candidate& cand : candidates) { if (!cand.transport_name().empty()) { candidates_by_transport_name[cand.transport_name()].push_back(cand); } else { RTC_LOG(LS_ERROR) << "Not removing candidate because it does not have a " "transport name set: " << cand.ToString(); } } for (const auto& kv : candidates_by_transport_name) { const std::string& transport_name = kv.first; const cricket::Candidates& candidates = kv.second; cricket::JsepTransport* jsep_transport = GetJsepTransportByName(transport_name); if (!jsep_transport) { RTC_LOG(LS_WARNING) << "Not removing candidate because the JsepTransport doesn't exist."; continue; } for (const cricket::Candidate& candidate : candidates) { cricket::DtlsTransportInternal* dtls = candidate.component() == cricket::ICE_CANDIDATE_COMPONENT_RTP ? jsep_transport->rtp_dtls_transport() : jsep_transport->rtcp_dtls_transport(); if (dtls) { dtls->ice_transport()->RemoveRemoteCandidate(candidate); } } } return RTCError::OK(); } bool JsepTransportController::GetStats(const std::string& transport_name, cricket::TransportStats* stats) { if (!network_thread_->IsCurrent()) { return network_thread_->Invoke( RTC_FROM_HERE, [=] { return GetStats(transport_name, stats); }); } cricket::JsepTransport* transport = GetJsepTransportByName(transport_name); if (!transport) { return false; } return transport->GetStats(stats); } void JsepTransportController::SetActiveResetSrtpParams( bool active_reset_srtp_params) { if (!network_thread_->IsCurrent()) { network_thread_->Invoke(RTC_FROM_HERE, [=] { SetActiveResetSrtpParams(active_reset_srtp_params); }); return; } RTC_LOG(INFO) << "Updating the active_reset_srtp_params for JsepTransportController: " << active_reset_srtp_params; config_.active_reset_srtp_params = active_reset_srtp_params; for (auto& kv : jsep_transports_by_name_) { kv.second->SetActiveResetSrtpParams(active_reset_srtp_params); } } void JsepTransportController::SetMediaTransportSettings( bool use_media_transport_for_media, bool use_media_transport_for_data_channels) { RTC_DCHECK(use_media_transport_for_media == config_.use_media_transport_for_media || jsep_transports_by_name_.empty()) << "You can only change media transport configuration before creating " "the first transport."; RTC_DCHECK(use_media_transport_for_data_channels == config_.use_media_transport_for_data_channels || jsep_transports_by_name_.empty()) << "You can only change media transport configuration before creating " "the first transport."; config_.use_media_transport_for_media = use_media_transport_for_media; config_.use_media_transport_for_data_channels = use_media_transport_for_data_channels; } std::unique_ptr JsepTransportController::CreateIceTransport(const std::string transport_name, bool rtcp) { int component = rtcp ? cricket::ICE_CANDIDATE_COMPONENT_RTCP : cricket::ICE_CANDIDATE_COMPONENT_RTP; if (config_.external_transport_factory) { return config_.external_transport_factory->CreateIceTransport( transport_name, component); } else { return absl::make_unique( transport_name, component, port_allocator_, async_resolver_factory_, config_.event_log); } } std::unique_ptr JsepTransportController::CreateDtlsTransport( std::unique_ptr ice) { RTC_DCHECK(network_thread_->IsCurrent()); std::unique_ptr dtls; // If media transport is used for both media and data channels, // then we don't need to create DTLS. // Otherwise, DTLS is still created. if (is_media_transport_factory_enabled_ && config_.media_transport_factory && config_.use_media_transport_for_media && config_.use_media_transport_for_data_channels) { dtls = absl::make_unique( std::move(ice), config_.crypto_options); } else if (config_.external_transport_factory) { dtls = config_.external_transport_factory->CreateDtlsTransport( std::move(ice), config_.crypto_options); } else { dtls = absl::make_unique( std::move(ice), config_.crypto_options, config_.event_log); } RTC_DCHECK(dtls); dtls->SetSslMaxProtocolVersion(config_.ssl_max_version); dtls->ice_transport()->SetIceRole(ice_role_); dtls->ice_transport()->SetIceTiebreaker(ice_tiebreaker_); dtls->ice_transport()->SetIceConfig(ice_config_); if (certificate_) { bool set_cert_success = dtls->SetLocalCertificate(certificate_); RTC_DCHECK(set_cert_success); } // Connect to signals offered by the DTLS and ICE transport. dtls->SignalWritableState.connect( this, &JsepTransportController::OnTransportWritableState_n); dtls->SignalReceivingState.connect( this, &JsepTransportController::OnTransportReceivingState_n); dtls->SignalDtlsHandshakeError.connect( this, &JsepTransportController::OnDtlsHandshakeError); dtls->ice_transport()->SignalGatheringState.connect( this, &JsepTransportController::OnTransportGatheringState_n); dtls->ice_transport()->SignalCandidateGathered.connect( this, &JsepTransportController::OnTransportCandidateGathered_n); dtls->ice_transport()->SignalCandidatesRemoved.connect( this, &JsepTransportController::OnTransportCandidatesRemoved_n); dtls->ice_transport()->SignalRoleConflict.connect( this, &JsepTransportController::OnTransportRoleConflict_n); dtls->ice_transport()->SignalStateChanged.connect( this, &JsepTransportController::OnTransportStateChanged_n); dtls->ice_transport()->SignalIceTransportStateChanged.connect( this, &JsepTransportController::OnTransportStateChanged_n); return dtls; } std::unique_ptr JsepTransportController::CreateUnencryptedRtpTransport( const std::string& transport_name, rtc::PacketTransportInternal* rtp_packet_transport, rtc::PacketTransportInternal* rtcp_packet_transport) { RTC_DCHECK(network_thread_->IsCurrent()); auto unencrypted_rtp_transport = absl::make_unique(rtcp_packet_transport == nullptr); unencrypted_rtp_transport->SetRtpPacketTransport(rtp_packet_transport); if (rtcp_packet_transport) { unencrypted_rtp_transport->SetRtcpPacketTransport(rtcp_packet_transport); } return unencrypted_rtp_transport; } std::unique_ptr JsepTransportController::CreateSdesTransport( const std::string& transport_name, cricket::DtlsTransportInternal* rtp_dtls_transport, cricket::DtlsTransportInternal* rtcp_dtls_transport) { RTC_DCHECK(network_thread_->IsCurrent()); auto srtp_transport = absl::make_unique(rtcp_dtls_transport == nullptr); RTC_DCHECK(rtp_dtls_transport); srtp_transport->SetRtpPacketTransport(rtp_dtls_transport); if (rtcp_dtls_transport) { srtp_transport->SetRtcpPacketTransport(rtcp_dtls_transport); } if (config_.enable_external_auth) { srtp_transport->EnableExternalAuth(); } return srtp_transport; } std::unique_ptr JsepTransportController::CreateDtlsSrtpTransport( const std::string& transport_name, cricket::DtlsTransportInternal* rtp_dtls_transport, cricket::DtlsTransportInternal* rtcp_dtls_transport) { RTC_DCHECK(network_thread_->IsCurrent()); auto dtls_srtp_transport = absl::make_unique( rtcp_dtls_transport == nullptr); if (config_.enable_external_auth) { dtls_srtp_transport->EnableExternalAuth(); } dtls_srtp_transport->SetDtlsTransports(rtp_dtls_transport, rtcp_dtls_transport); dtls_srtp_transport->SetActiveResetSrtpParams( config_.active_reset_srtp_params); dtls_srtp_transport->SignalDtlsStateChange.connect( this, &JsepTransportController::UpdateAggregateStates_n); return dtls_srtp_transport; } std::vector JsepTransportController::GetDtlsTransports() { std::vector dtls_transports; for (auto it = jsep_transports_by_name_.begin(); it != jsep_transports_by_name_.end(); ++it) { auto jsep_transport = it->second.get(); RTC_DCHECK(jsep_transport); if (jsep_transport->rtp_dtls_transport()) { dtls_transports.push_back(jsep_transport->rtp_dtls_transport()); } if (jsep_transport->rtcp_dtls_transport()) { dtls_transports.push_back(jsep_transport->rtcp_dtls_transport()); } } return dtls_transports; } RTCError JsepTransportController::ApplyDescription_n( bool local, SdpType type, const cricket::SessionDescription* description) { RTC_DCHECK(network_thread_->IsCurrent()); RTC_DCHECK(description); if (local) { local_desc_ = description; } else { remote_desc_ = description; } RTCError error; error = ValidateAndMaybeUpdateBundleGroup(local, type, description); if (!error.ok()) { return error; } std::vector merged_encrypted_extension_ids; if (bundle_group_) { merged_encrypted_extension_ids = MergeEncryptedHeaderExtensionIdsForBundle(description); } for (const cricket::ContentInfo& content_info : description->contents()) { // Don't create transports for rejected m-lines and bundled m-lines." if (content_info.rejected || (IsBundled(content_info.name) && content_info.name != *bundled_mid())) { continue; } error = MaybeCreateJsepTransport(local, content_info); if (!error.ok()) { return error; } } RTC_DCHECK(description->contents().size() == description->transport_infos().size()); for (size_t i = 0; i < description->contents().size(); ++i) { const cricket::ContentInfo& content_info = description->contents()[i]; const cricket::TransportInfo& transport_info = description->transport_infos()[i]; if (content_info.rejected) { HandleRejectedContent(content_info, description); continue; } if (IsBundled(content_info.name) && content_info.name != *bundled_mid()) { if (!HandleBundledContent(content_info)) { return RTCError(RTCErrorType::INVALID_PARAMETER, "Failed to process the bundled m= section."); } continue; } error = ValidateContent(content_info); if (!error.ok()) { return error; } std::vector extension_ids; if (bundled_mid() && content_info.name == *bundled_mid()) { extension_ids = merged_encrypted_extension_ids; } else { extension_ids = GetEncryptedHeaderExtensionIds(content_info); } int rtp_abs_sendtime_extn_id = GetRtpAbsSendTimeHeaderExtensionId(content_info); cricket::JsepTransport* transport = GetJsepTransportForMid(content_info.name); RTC_DCHECK(transport); SetIceRole_n(DetermineIceRole(transport, transport_info, type, local)); cricket::JsepTransportDescription jsep_description = CreateJsepTransportDescription(content_info, transport_info, extension_ids, rtp_abs_sendtime_extn_id); if (local) { error = transport->SetLocalJsepTransportDescription(jsep_description, type); } else { error = transport->SetRemoteJsepTransportDescription(jsep_description, type); } if (!error.ok()) { LOG_AND_RETURN_ERROR(RTCErrorType::INVALID_PARAMETER, "Failed to apply the description for " + content_info.name + ": " + error.message()); } } return RTCError::OK(); } RTCError JsepTransportController::ValidateAndMaybeUpdateBundleGroup( bool local, SdpType type, const cricket::SessionDescription* description) { RTC_DCHECK(description); const cricket::ContentGroup* new_bundle_group = description->GetGroupByName(cricket::GROUP_TYPE_BUNDLE); // The BUNDLE group containing a MID that no m= section has is invalid. if (new_bundle_group) { for (const auto& content_name : new_bundle_group->content_names()) { if (!description->GetContentByName(content_name)) { return RTCError(RTCErrorType::INVALID_PARAMETER, "The BUNDLE group contains MID:" + content_name + " matching no m= section."); } } } if (type == SdpType::kAnswer) { const cricket::ContentGroup* offered_bundle_group = local ? remote_desc_->GetGroupByName(cricket::GROUP_TYPE_BUNDLE) : local_desc_->GetGroupByName(cricket::GROUP_TYPE_BUNDLE); if (new_bundle_group) { // The BUNDLE group in answer should be a subset of offered group. for (const auto& content_name : new_bundle_group->content_names()) { if (!offered_bundle_group || !offered_bundle_group->HasContentName(content_name)) { return RTCError(RTCErrorType::INVALID_PARAMETER, "The BUNDLE group in answer contains a MID that was " "not in the offered group."); } } } if (bundle_group_) { for (const auto& content_name : bundle_group_->content_names()) { // An answer that removes m= sections from pre-negotiated BUNDLE group // without rejecting it, is invalid. if (!new_bundle_group || !new_bundle_group->HasContentName(content_name)) { auto* content_info = description->GetContentByName(content_name); if (!content_info || !content_info->rejected) { return RTCError(RTCErrorType::INVALID_PARAMETER, "Answer cannot remove m= section " + content_name + " from already-established BUNDLE group."); } } } } } if (config_.bundle_policy == PeerConnectionInterface::kBundlePolicyMaxBundle && !description->HasGroup(cricket::GROUP_TYPE_BUNDLE)) { return RTCError(RTCErrorType::INVALID_PARAMETER, "max-bundle is used but no bundle group found."); } if (ShouldUpdateBundleGroup(type, description)) { bundle_group_ = *new_bundle_group; } if (!bundled_mid()) { return RTCError::OK(); } auto bundled_content = description->GetContentByName(*bundled_mid()); if (!bundled_content) { return RTCError( RTCErrorType::INVALID_PARAMETER, "An m= section associated with the BUNDLE-tag doesn't exist."); } // If the |bundled_content| is rejected, other contents in the bundle group // should be rejected. if (bundled_content->rejected) { for (const auto& content_name : bundle_group_->content_names()) { auto other_content = description->GetContentByName(content_name); if (!other_content->rejected) { return RTCError( RTCErrorType::INVALID_PARAMETER, "The m= section:" + content_name + " should be rejected."); } } } return RTCError::OK(); } RTCError JsepTransportController::ValidateContent( const cricket::ContentInfo& content_info) { if (config_.rtcp_mux_policy == PeerConnectionInterface::kRtcpMuxPolicyRequire && content_info.type == cricket::MediaProtocolType::kRtp && !content_info.media_description()->rtcp_mux()) { return RTCError(RTCErrorType::INVALID_PARAMETER, "The m= section:" + content_info.name + " is invalid. RTCP-MUX is not " "enabled when it is required."); } return RTCError::OK(); } void JsepTransportController::HandleRejectedContent( const cricket::ContentInfo& content_info, const cricket::SessionDescription* description) { // If the content is rejected, let the // BaseChannel/SctpTransport change the RtpTransport/DtlsTransport first, // then destroy the cricket::JsepTransport. RemoveTransportForMid(content_info.name); if (content_info.name == bundled_mid()) { for (const auto& content_name : bundle_group_->content_names()) { RemoveTransportForMid(content_name); } bundle_group_.reset(); } else if (IsBundled(content_info.name)) { // Remove the rejected content from the |bundle_group_|. bundle_group_->RemoveContentName(content_info.name); // Reset the bundle group if nothing left. if (!bundle_group_->FirstContentName()) { bundle_group_.reset(); } } MaybeDestroyJsepTransport(content_info.name); } bool JsepTransportController::HandleBundledContent( const cricket::ContentInfo& content_info) { auto jsep_transport = GetJsepTransportByName(*bundled_mid()); RTC_DCHECK(jsep_transport); // If the content is bundled, let the // BaseChannel/SctpTransport change the RtpTransport/DtlsTransport first, // then destroy the cricket::JsepTransport. if (SetTransportForMid(content_info.name, jsep_transport)) { // TODO(bugs.webrtc.org/9719) For media transport this is far from ideal, // because it means that we first create media transport and start // connecting it, and then we destroy it. We will need to address it before // video path is enabled. MaybeDestroyJsepTransport(content_info.name); return true; } return false; } bool JsepTransportController::SetTransportForMid( const std::string& mid, cricket::JsepTransport* jsep_transport) { RTC_DCHECK(jsep_transport); if (mid_to_transport_[mid] == jsep_transport) { return true; } mid_to_transport_[mid] = jsep_transport; return config_.transport_observer->OnTransportChanged( mid, jsep_transport->rtp_transport(), jsep_transport->rtp_dtls_transport(), jsep_transport->media_transport()); } void JsepTransportController::RemoveTransportForMid(const std::string& mid) { bool ret = config_.transport_observer->OnTransportChanged(mid, nullptr, nullptr, nullptr); // Calling OnTransportChanged with nullptr should always succeed, since it is // only expected to fail when adding media to a transport (not removing). RTC_DCHECK(ret); mid_to_transport_.erase(mid); } cricket::JsepTransportDescription JsepTransportController::CreateJsepTransportDescription( cricket::ContentInfo content_info, cricket::TransportInfo transport_info, const std::vector& encrypted_extension_ids, int rtp_abs_sendtime_extn_id) { const cricket::MediaContentDescription* content_desc = static_cast( content_info.description); RTC_DCHECK(content_desc); bool rtcp_mux_enabled = content_info.type == cricket::MediaProtocolType::kSctp ? true : content_desc->rtcp_mux(); return cricket::JsepTransportDescription( rtcp_mux_enabled, content_desc->cryptos(), encrypted_extension_ids, rtp_abs_sendtime_extn_id, transport_info.description); } bool JsepTransportController::ShouldUpdateBundleGroup( SdpType type, const cricket::SessionDescription* description) { if (config_.bundle_policy == PeerConnectionInterface::kBundlePolicyMaxBundle) { return true; } if (type != SdpType::kAnswer) { return false; } RTC_DCHECK(local_desc_ && remote_desc_); const cricket::ContentGroup* local_bundle = local_desc_->GetGroupByName(cricket::GROUP_TYPE_BUNDLE); const cricket::ContentGroup* remote_bundle = remote_desc_->GetGroupByName(cricket::GROUP_TYPE_BUNDLE); return local_bundle && remote_bundle; } std::vector JsepTransportController::GetEncryptedHeaderExtensionIds( const cricket::ContentInfo& content_info) { const cricket::MediaContentDescription* content_desc = static_cast( content_info.description); if (!config_.crypto_options.srtp.enable_encrypted_rtp_header_extensions) { return std::vector(); } std::vector encrypted_header_extension_ids; for (const auto& extension : content_desc->rtp_header_extensions()) { if (!extension.encrypt) { continue; } if (!absl::c_linear_search(encrypted_header_extension_ids, extension.id)) { encrypted_header_extension_ids.push_back(extension.id); } } return encrypted_header_extension_ids; } std::vector JsepTransportController::MergeEncryptedHeaderExtensionIdsForBundle( const cricket::SessionDescription* description) { RTC_DCHECK(description); RTC_DCHECK(bundle_group_); std::vector merged_ids; // Union the encrypted header IDs in the group when bundle is enabled. for (const cricket::ContentInfo& content_info : description->contents()) { if (bundle_group_->HasContentName(content_info.name)) { std::vector extension_ids = GetEncryptedHeaderExtensionIds(content_info); for (int id : extension_ids) { if (!absl::c_linear_search(merged_ids, id)) { merged_ids.push_back(id); } } } } return merged_ids; } int JsepTransportController::GetRtpAbsSendTimeHeaderExtensionId( const cricket::ContentInfo& content_info) { if (!config_.enable_external_auth) { return -1; } const cricket::MediaContentDescription* content_desc = static_cast( content_info.description); const webrtc::RtpExtension* send_time_extension = webrtc::RtpExtension::FindHeaderExtensionByUri( content_desc->rtp_header_extensions(), webrtc::RtpExtension::kAbsSendTimeUri); return send_time_extension ? send_time_extension->id : -1; } const cricket::JsepTransport* JsepTransportController::GetJsepTransportForMid( const std::string& mid) const { auto it = mid_to_transport_.find(mid); return it == mid_to_transport_.end() ? nullptr : it->second; } cricket::JsepTransport* JsepTransportController::GetJsepTransportForMid( const std::string& mid) { auto it = mid_to_transport_.find(mid); return it == mid_to_transport_.end() ? nullptr : it->second; } const cricket::JsepTransport* JsepTransportController::GetJsepTransportByName( const std::string& transport_name) const { auto it = jsep_transports_by_name_.find(transport_name); return (it == jsep_transports_by_name_.end()) ? nullptr : it->second.get(); } cricket::JsepTransport* JsepTransportController::GetJsepTransportByName( const std::string& transport_name) { auto it = jsep_transports_by_name_.find(transport_name); return (it == jsep_transports_by_name_.end()) ? nullptr : it->second.get(); } std::unique_ptr JsepTransportController::MaybeCreateMediaTransport( const cricket::ContentInfo& content_info, bool local, cricket::IceTransportInternal* ice_transport) { if (!is_media_transport_factory_enabled_) { return nullptr; } if (config_.media_transport_factory == nullptr) { return nullptr; } if (!config_.use_media_transport_for_media && !config_.use_media_transport_for_data_channels) { return nullptr; } absl::optional selected_crypto_for_media_transport; if (content_info.media_description() && !content_info.media_description()->cryptos().empty()) { // Order of cryptos is deterministic (rfc4568, 5.1.1), so we just select the // first one (in fact the first one should be the most preferred one.) We // ignore the HMAC size, as media transport crypto settings currently don't // expose HMAC size, nor crypto protocol for that matter. selected_crypto_for_media_transport = content_info.media_description()->cryptos()[0]; } if (!selected_crypto_for_media_transport.has_value()) { RTC_LOG(LS_WARNING) << "a=cryto line was not found in the offer. Most " "likely you did not enable SDES. " "Make sure to pass config.enable_dtls_srtp=false " "to RTCConfiguration. " "Cannot continue with media transport. Falling " "back to RTP. is_local=" << local; // Remove media_transport_factory from config, because we don't want to // use it on the subsequent call (for the other side of the offer). is_media_transport_factory_enabled_ = false; return nullptr; } // Note that we ignore here lifetime and length. // In fact we take those bits (inline, lifetime and length) and keep it as // part of key derivation. // // Technically, we are also not following rfc4568, which requires us to // send and answer with the key that we chose. In practice, for media // transport, the current approach should be sufficient (we take the key // that sender offered, and caller assumes we will use it. We are not // signaling back that we indeed used it.) std::unique_ptr key_derivation = rtc::KeyDerivation::Create(rtc::KeyDerivationAlgorithm::HKDF_SHA256); const std::string label = "MediaTransportLabel"; constexpr int kDerivedKeyByteSize = 32; int key_len, salt_len; if (!rtc::GetSrtpKeyAndSaltLengths( rtc::SrtpCryptoSuiteFromName( selected_crypto_for_media_transport.value().cipher_suite), &key_len, &salt_len)) { RTC_CHECK(false) << "Cannot set up secure media transport"; } rtc::ZeroOnFreeBuffer raw_key(key_len + salt_len); cricket::SrtpFilter::ParseKeyParams( selected_crypto_for_media_transport.value().key_params, raw_key.data(), raw_key.size()); absl::optional> key = key_derivation->DeriveKey( raw_key, /*salt=*/nullptr, rtc::ArrayView( reinterpret_cast(label.data()), label.size()), kDerivedKeyByteSize); // We want to crash the app if we don't have a key, and not silently fall // back to the unsecure communication. RTC_CHECK(key.has_value()); MediaTransportSettings settings; settings.is_caller = local; settings.pre_shared_key = std::string( reinterpret_cast(key.value().data()), key.value().size()); settings.event_log = config_.event_log; auto media_transport_result = config_.media_transport_factory->CreateMediaTransport( ice_transport, network_thread_, settings); // TODO(sukhanov): Proper error handling. RTC_CHECK(media_transport_result.ok()); return media_transport_result.MoveValue(); } RTCError JsepTransportController::MaybeCreateJsepTransport( bool local, const cricket::ContentInfo& content_info) { RTC_DCHECK(network_thread_->IsCurrent()); cricket::JsepTransport* transport = GetJsepTransportByName(content_info.name); if (transport) { return RTCError::OK(); } const cricket::MediaContentDescription* content_desc = static_cast( content_info.description); if (certificate_ && !content_desc->cryptos().empty()) { return RTCError(RTCErrorType::INVALID_PARAMETER, "SDES and DTLS-SRTP cannot be enabled at the same time."); } std::unique_ptr ice = CreateIceTransport(content_info.name, /*rtcp=*/false); std::unique_ptr media_transport = MaybeCreateMediaTransport(content_info, local, ice.get()); std::unique_ptr rtp_dtls_transport = CreateDtlsTransport(std::move(ice)); std::unique_ptr rtcp_dtls_transport; std::unique_ptr unencrypted_rtp_transport; std::unique_ptr sdes_transport; std::unique_ptr dtls_srtp_transport; if (config_.rtcp_mux_policy != PeerConnectionInterface::kRtcpMuxPolicyRequire && content_info.type == cricket::MediaProtocolType::kRtp) { RTC_DCHECK(media_transport == nullptr); rtcp_dtls_transport = CreateDtlsTransport( CreateIceTransport(content_info.name, /*rtcp=*/true)); } // TODO(sukhanov): Do not create RTP/RTCP transports if media transport is // used, and remove the no-op dtls transport when that's done. if (config_.disable_encryption) { unencrypted_rtp_transport = CreateUnencryptedRtpTransport( content_info.name, rtp_dtls_transport.get(), rtcp_dtls_transport.get()); } else if (!content_desc->cryptos().empty()) { sdes_transport = CreateSdesTransport( content_info.name, rtp_dtls_transport.get(), rtcp_dtls_transport.get()); } else { dtls_srtp_transport = CreateDtlsSrtpTransport( content_info.name, rtp_dtls_transport.get(), rtcp_dtls_transport.get()); } std::unique_ptr jsep_transport = absl::make_unique( content_info.name, certificate_, std::move(unencrypted_rtp_transport), std::move(sdes_transport), std::move(dtls_srtp_transport), std::move(rtp_dtls_transport), std::move(rtcp_dtls_transport), std::move(media_transport)); jsep_transport->SignalRtcpMuxActive.connect( this, &JsepTransportController::UpdateAggregateStates_n); jsep_transport->SignalMediaTransportStateChanged.connect( this, &JsepTransportController::OnMediaTransportStateChanged_n); SetTransportForMid(content_info.name, jsep_transport.get()); jsep_transports_by_name_[content_info.name] = std::move(jsep_transport); UpdateAggregateStates_n(); return RTCError::OK(); } void JsepTransportController::MaybeDestroyJsepTransport( const std::string& mid) { auto jsep_transport = GetJsepTransportByName(mid); if (!jsep_transport) { return; } // Don't destroy the JsepTransport if there are still media sections referring // to it. for (const auto& kv : mid_to_transport_) { if (kv.second == jsep_transport) { return; } } jsep_transports_by_name_.erase(mid); UpdateAggregateStates_n(); } void JsepTransportController::DestroyAllJsepTransports_n() { RTC_DCHECK(network_thread_->IsCurrent()); for (const auto& jsep_transport : jsep_transports_by_name_) { config_.transport_observer->OnTransportChanged(jsep_transport.first, nullptr, nullptr, nullptr); } jsep_transports_by_name_.clear(); } void JsepTransportController::SetIceRole_n(cricket::IceRole ice_role) { RTC_DCHECK(network_thread_->IsCurrent()); ice_role_ = ice_role; for (auto& dtls : GetDtlsTransports()) { dtls->ice_transport()->SetIceRole(ice_role_); } } cricket::IceRole JsepTransportController::DetermineIceRole( cricket::JsepTransport* jsep_transport, const cricket::TransportInfo& transport_info, SdpType type, bool local) { cricket::IceRole ice_role = ice_role_; auto tdesc = transport_info.description; if (local) { // The initial offer side may use ICE Lite, in which case, per RFC5245 // Section 5.1.1, the answer side should take the controlling role if it is // in the full ICE mode. // // When both sides use ICE Lite, the initial offer side must take the // controlling role, and this is the default logic implemented in // SetLocalDescription in JsepTransportController. if (jsep_transport->remote_description() && jsep_transport->remote_description()->transport_desc.ice_mode == cricket::ICEMODE_LITE && ice_role_ == cricket::ICEROLE_CONTROLLED && tdesc.ice_mode == cricket::ICEMODE_FULL) { ice_role = cricket::ICEROLE_CONTROLLING; } // Older versions of Chrome expect the ICE role to be re-determined when an // ICE restart occurs, and also don't perform conflict resolution correctly, // so for now we can't safely stop doing this, unless the application opts // in by setting |config_.redetermine_role_on_ice_restart_| to false. See: // https://bugs.chromium.org/p/chromium/issues/detail?id=628676 // TODO(deadbeef): Remove this when these old versions of Chrome reach a low // enough population. if (config_.redetermine_role_on_ice_restart && jsep_transport->local_description() && cricket::IceCredentialsChanged( jsep_transport->local_description()->transport_desc.ice_ufrag, jsep_transport->local_description()->transport_desc.ice_pwd, tdesc.ice_ufrag, tdesc.ice_pwd) && // Don't change the ICE role if the remote endpoint is ICE lite; we // should always be controlling in that case. (!jsep_transport->remote_description() || jsep_transport->remote_description()->transport_desc.ice_mode != cricket::ICEMODE_LITE)) { ice_role = (type == SdpType::kOffer) ? cricket::ICEROLE_CONTROLLING : cricket::ICEROLE_CONTROLLED; } } else { // If our role is cricket::ICEROLE_CONTROLLED and the remote endpoint // supports only ice_lite, this local endpoint should take the CONTROLLING // role. // TODO(deadbeef): This is a session-level attribute, so it really shouldn't // be in a TransportDescription in the first place... if (ice_role_ == cricket::ICEROLE_CONTROLLED && tdesc.ice_mode == cricket::ICEMODE_LITE) { ice_role = cricket::ICEROLE_CONTROLLING; } // If we use ICE Lite and the remote endpoint uses the full implementation // of ICE, the local endpoint must take the controlled role, and the other // side must be the controlling role. if (jsep_transport->local_description() && jsep_transport->local_description()->transport_desc.ice_mode == cricket::ICEMODE_LITE && ice_role_ == cricket::ICEROLE_CONTROLLING && tdesc.ice_mode == cricket::ICEMODE_FULL) { ice_role = cricket::ICEROLE_CONTROLLED; } } return ice_role; } void JsepTransportController::OnTransportWritableState_n( rtc::PacketTransportInternal* transport) { RTC_DCHECK(network_thread_->IsCurrent()); RTC_LOG(LS_INFO) << " Transport " << transport->transport_name() << " writability changed to " << transport->writable() << "."; UpdateAggregateStates_n(); } void JsepTransportController::OnTransportReceivingState_n( rtc::PacketTransportInternal* transport) { RTC_DCHECK(network_thread_->IsCurrent()); UpdateAggregateStates_n(); } void JsepTransportController::OnTransportGatheringState_n( cricket::IceTransportInternal* transport) { RTC_DCHECK(network_thread_->IsCurrent()); UpdateAggregateStates_n(); } void JsepTransportController::OnTransportCandidateGathered_n( cricket::IceTransportInternal* transport, const cricket::Candidate& candidate) { RTC_DCHECK(network_thread_->IsCurrent()); // We should never signal peer-reflexive candidates. if (candidate.type() == cricket::PRFLX_PORT_TYPE) { RTC_NOTREACHED(); return; } std::string transport_name = transport->transport_name(); invoker_.AsyncInvoke( RTC_FROM_HERE, signaling_thread_, [this, transport_name, candidate] { SignalIceCandidatesGathered(transport_name, {candidate}); }); } void JsepTransportController::OnTransportCandidatesRemoved_n( cricket::IceTransportInternal* transport, const cricket::Candidates& candidates) { invoker_.AsyncInvoke( RTC_FROM_HERE, signaling_thread_, [this, candidates] { SignalIceCandidatesRemoved(candidates); }); } void JsepTransportController::OnTransportRoleConflict_n( cricket::IceTransportInternal* transport) { RTC_DCHECK(network_thread_->IsCurrent()); // Note: since the role conflict is handled entirely on the network thread, // we don't need to worry about role conflicts occurring on two ports at // once. The first one encountered should immediately reverse the role. cricket::IceRole reversed_role = (ice_role_ == cricket::ICEROLE_CONTROLLING) ? cricket::ICEROLE_CONTROLLED : cricket::ICEROLE_CONTROLLING; RTC_LOG(LS_INFO) << "Got role conflict; switching to " << (reversed_role == cricket::ICEROLE_CONTROLLING ? "controlling" : "controlled") << " role."; SetIceRole_n(reversed_role); } void JsepTransportController::OnTransportStateChanged_n( cricket::IceTransportInternal* transport) { RTC_DCHECK(network_thread_->IsCurrent()); RTC_LOG(LS_INFO) << transport->transport_name() << " Transport " << transport->component() << " state changed. Check if state is complete."; UpdateAggregateStates_n(); } void JsepTransportController::OnMediaTransportStateChanged_n() { SignalMediaTransportStateChanged(); UpdateAggregateStates_n(); } void JsepTransportController::UpdateAggregateStates_n() { RTC_DCHECK(network_thread_->IsCurrent()); auto dtls_transports = GetDtlsTransports(); cricket::IceConnectionState new_connection_state = cricket::kIceConnectionConnecting; PeerConnectionInterface::IceConnectionState new_ice_connection_state = PeerConnectionInterface::IceConnectionState::kIceConnectionNew; PeerConnectionInterface::PeerConnectionState new_combined_state = PeerConnectionInterface::PeerConnectionState::kNew; cricket::IceGatheringState new_gathering_state = cricket::kIceGatheringNew; bool any_failed = false; // TODO(http://bugs.webrtc.org/9719) If(when) media_transport disables // dtls_transports entirely, the below line will have to be changed to account // for the fact that dtls transports might be absent. bool all_connected = !dtls_transports.empty(); bool all_completed = !dtls_transports.empty(); bool any_gathering = false; bool all_done_gathering = !dtls_transports.empty(); std::map ice_state_counts; std::map dtls_state_counts; for (const auto& dtls : dtls_transports) { any_failed = any_failed || dtls->ice_transport()->GetState() == cricket::IceTransportState::STATE_FAILED; all_connected = all_connected && dtls->writable(); all_completed = all_completed && dtls->writable() && dtls->ice_transport()->GetState() == cricket::IceTransportState::STATE_COMPLETED && dtls->ice_transport()->GetIceRole() == cricket::ICEROLE_CONTROLLING && dtls->ice_transport()->gathering_state() == cricket::kIceGatheringComplete; any_gathering = any_gathering || dtls->ice_transport()->gathering_state() != cricket::kIceGatheringNew; all_done_gathering = all_done_gathering && dtls->ice_transport()->gathering_state() == cricket::kIceGatheringComplete; dtls_state_counts[dtls->dtls_state()]++; ice_state_counts[dtls->ice_transport()->GetIceTransportState()]++; } for (auto it = jsep_transports_by_name_.begin(); it != jsep_transports_by_name_.end(); ++it) { auto jsep_transport = it->second.get(); if (!jsep_transport->media_transport()) { continue; } // There is no 'kIceConnectionDisconnected', so we only need to handle // connected and completed. // We treat kClosed as failed, because if it happens before shutting down // media transports it means that there was a failure. // MediaTransportInterface allows to flip back and forth between kWritable // and kPending, but there does not exist an implementation that does that, // and the contract of jsep transport controller doesn't quite expect that. // When this happens, we would go from connected to connecting state, but // this may change in future. any_failed |= jsep_transport->media_transport_state() == webrtc::MediaTransportState::kClosed; all_completed &= jsep_transport->media_transport_state() == webrtc::MediaTransportState::kWritable; all_connected &= jsep_transport->media_transport_state() == webrtc::MediaTransportState::kWritable; } if (any_failed) { new_connection_state = cricket::kIceConnectionFailed; } else if (all_completed) { new_connection_state = cricket::kIceConnectionCompleted; } else if (all_connected) { new_connection_state = cricket::kIceConnectionConnected; } if (ice_connection_state_ != new_connection_state) { ice_connection_state_ = new_connection_state; invoker_.AsyncInvoke(RTC_FROM_HERE, signaling_thread_, [this, new_connection_state] { SignalIceConnectionState(new_connection_state); }); } // Compute the current RTCIceConnectionState as described in // https://www.w3.org/TR/webrtc/#dom-rtciceconnectionstate. // The PeerConnection is responsible for handling the "closed" state. int total_ice_checking = ice_state_counts[IceTransportState::kChecking]; int total_ice_connected = ice_state_counts[IceTransportState::kConnected]; int total_ice_completed = ice_state_counts[IceTransportState::kCompleted]; int total_ice_failed = ice_state_counts[IceTransportState::kFailed]; int total_ice_disconnected = ice_state_counts[IceTransportState::kDisconnected]; int total_ice_closed = ice_state_counts[IceTransportState::kClosed]; int total_ice_new = ice_state_counts[IceTransportState::kNew]; int total_ice = dtls_transports.size(); if (total_ice_failed > 0) { // Any RTCIceTransports are in the "failed" state. new_ice_connection_state = PeerConnectionInterface::kIceConnectionFailed; } else if (total_ice_disconnected > 0) { // None of the previous states apply and any RTCIceTransports are in the // "disconnected" state. new_ice_connection_state = PeerConnectionInterface::kIceConnectionDisconnected; } else if (total_ice_new + total_ice_closed == total_ice) { // None of the previous states apply and all RTCIceTransports are in the // "new" or "closed" state, or there are no transports. new_ice_connection_state = PeerConnectionInterface::kIceConnectionNew; } else if (total_ice_new + total_ice_checking > 0) { // None of the previous states apply and any RTCIceTransports are in the // "new" or "checking" state. new_ice_connection_state = PeerConnectionInterface::kIceConnectionChecking; } else if (total_ice_completed + total_ice_closed == total_ice) { // None of the previous states apply and all RTCIceTransports are in the // "completed" or "closed" state. new_ice_connection_state = PeerConnectionInterface::kIceConnectionCompleted; } else if (total_ice_connected + total_ice_completed + total_ice_closed == total_ice) { // None of the previous states apply and all RTCIceTransports are in the // "connected", "completed" or "closed" state. new_ice_connection_state = PeerConnectionInterface::kIceConnectionConnected; } else { RTC_NOTREACHED(); } if (standardized_ice_connection_state_ != new_ice_connection_state) { standardized_ice_connection_state_ = new_ice_connection_state; invoker_.AsyncInvoke( RTC_FROM_HERE, signaling_thread_, [this, new_ice_connection_state] { SignalStandardizedIceConnectionState(new_ice_connection_state); }); } // Compute the current RTCPeerConnectionState as described in // https://www.w3.org/TR/webrtc/#dom-rtcpeerconnectionstate. // The PeerConnection is responsible for handling the "closed" state. // Note that "connecting" is only a valid state for DTLS transports while // "checking", "completed" and "disconnected" are only valid for ICE // transports. int total_connected = total_ice_connected + dtls_state_counts[cricket::DTLS_TRANSPORT_CONNECTED]; int total_dtls_connecting = dtls_state_counts[cricket::DTLS_TRANSPORT_CONNECTING]; int total_failed = total_ice_failed + dtls_state_counts[cricket::DTLS_TRANSPORT_FAILED]; int total_closed = total_ice_closed + dtls_state_counts[cricket::DTLS_TRANSPORT_CLOSED]; int total_new = total_ice_new + dtls_state_counts[cricket::DTLS_TRANSPORT_NEW]; int total_transports = total_ice * 2; if (total_failed > 0) { // Any of the RTCIceTransports or RTCDtlsTransports are in a "failed" state. new_combined_state = PeerConnectionInterface::PeerConnectionState::kFailed; } else if (total_ice_disconnected > 0) { // None of the previous states apply and any RTCIceTransports or // RTCDtlsTransports are in the "disconnected" state. new_combined_state = PeerConnectionInterface::PeerConnectionState::kDisconnected; } else if (total_new + total_closed == total_transports) { // None of the previous states apply and all RTCIceTransports and // RTCDtlsTransports are in the "new" or "closed" state, or there are no // transports. new_combined_state = PeerConnectionInterface::PeerConnectionState::kNew; } else if (total_new + total_dtls_connecting + total_ice_checking > 0) { // None of the previous states apply and all RTCIceTransports or // RTCDtlsTransports are in the "new", "connecting" or "checking" state. new_combined_state = PeerConnectionInterface::PeerConnectionState::kConnecting; } else if (total_connected + total_ice_completed + total_closed == total_transports) { // None of the previous states apply and all RTCIceTransports and // RTCDtlsTransports are in the "connected", "completed" or "closed" state. new_combined_state = PeerConnectionInterface::PeerConnectionState::kConnected; } else { RTC_NOTREACHED(); } if (combined_connection_state_ != new_combined_state) { combined_connection_state_ = new_combined_state; invoker_.AsyncInvoke(RTC_FROM_HERE, signaling_thread_, [this, new_combined_state] { SignalConnectionState(new_combined_state); }); } if (all_done_gathering) { new_gathering_state = cricket::kIceGatheringComplete; } else if (any_gathering) { new_gathering_state = cricket::kIceGatheringGathering; } if (ice_gathering_state_ != new_gathering_state) { ice_gathering_state_ = new_gathering_state; invoker_.AsyncInvoke(RTC_FROM_HERE, signaling_thread_, [this, new_gathering_state] { SignalIceGatheringState(new_gathering_state); }); } } void JsepTransportController::OnDtlsHandshakeError( rtc::SSLHandshakeError error) { SignalDtlsHandshakeError(error); } } // namespace webrtc