xref: /aosp_15_r20/external/cronet/net/dns/public/util.cc (revision 6777b5387eb2ff775bb5750e3f5d96f37fb7352b)
1*6777b538SAndroid Build Coastguard Worker // Copyright 2018 The Chromium Authors
2*6777b538SAndroid Build Coastguard Worker // Use of this source code is governed by a BSD-style license that can be
3*6777b538SAndroid Build Coastguard Worker // found in the LICENSE file.
4*6777b538SAndroid Build Coastguard Worker 
5*6777b538SAndroid Build Coastguard Worker #include "net/dns/public/util.h"
6*6777b538SAndroid Build Coastguard Worker 
7*6777b538SAndroid Build Coastguard Worker #include <stdint.h>
8*6777b538SAndroid Build Coastguard Worker 
9*6777b538SAndroid Build Coastguard Worker #include <string_view>
10*6777b538SAndroid Build Coastguard Worker 
11*6777b538SAndroid Build Coastguard Worker #include "base/check.h"
12*6777b538SAndroid Build Coastguard Worker #include "base/notreached.h"
13*6777b538SAndroid Build Coastguard Worker #include "base/strings/strcat.h"
14*6777b538SAndroid Build Coastguard Worker #include "base/strings/string_number_conversions.h"
15*6777b538SAndroid Build Coastguard Worker #include "build/build_config.h"
16*6777b538SAndroid Build Coastguard Worker #include "net/base/ip_address.h"
17*6777b538SAndroid Build Coastguard Worker #include "net/dns/public/dns_protocol.h"
18*6777b538SAndroid Build Coastguard Worker #include "url/scheme_host_port.h"
19*6777b538SAndroid Build Coastguard Worker #include "url/url_constants.h"
20*6777b538SAndroid Build Coastguard Worker 
21*6777b538SAndroid Build Coastguard Worker namespace net {
22*6777b538SAndroid Build Coastguard Worker 
23*6777b538SAndroid Build Coastguard Worker namespace {
24*6777b538SAndroid Build Coastguard Worker 
GetMdnsIPEndPoint(const char * address)25*6777b538SAndroid Build Coastguard Worker IPEndPoint GetMdnsIPEndPoint(const char* address) {
26*6777b538SAndroid Build Coastguard Worker   IPAddress multicast_group_number;
27*6777b538SAndroid Build Coastguard Worker   bool success = multicast_group_number.AssignFromIPLiteral(address);
28*6777b538SAndroid Build Coastguard Worker   DCHECK(success);
29*6777b538SAndroid Build Coastguard Worker   return IPEndPoint(multicast_group_number,
30*6777b538SAndroid Build Coastguard Worker                     dns_protocol::kDefaultPortMulticast);
31*6777b538SAndroid Build Coastguard Worker }
32*6777b538SAndroid Build Coastguard Worker 
33*6777b538SAndroid Build Coastguard Worker }  // namespace
34*6777b538SAndroid Build Coastguard Worker 
35*6777b538SAndroid Build Coastguard Worker namespace dns_util {
36*6777b538SAndroid Build Coastguard Worker 
GetMdnsGroupEndPoint(AddressFamily address_family)37*6777b538SAndroid Build Coastguard Worker IPEndPoint GetMdnsGroupEndPoint(AddressFamily address_family) {
38*6777b538SAndroid Build Coastguard Worker   switch (address_family) {
39*6777b538SAndroid Build Coastguard Worker     case ADDRESS_FAMILY_IPV4:
40*6777b538SAndroid Build Coastguard Worker       return GetMdnsIPEndPoint(dns_protocol::kMdnsMulticastGroupIPv4);
41*6777b538SAndroid Build Coastguard Worker     case ADDRESS_FAMILY_IPV6:
42*6777b538SAndroid Build Coastguard Worker       return GetMdnsIPEndPoint(dns_protocol::kMdnsMulticastGroupIPv6);
43*6777b538SAndroid Build Coastguard Worker     default:
44*6777b538SAndroid Build Coastguard Worker       NOTREACHED();
45*6777b538SAndroid Build Coastguard Worker       return IPEndPoint();
46*6777b538SAndroid Build Coastguard Worker   }
47*6777b538SAndroid Build Coastguard Worker }
48*6777b538SAndroid Build Coastguard Worker 
GetMdnsReceiveEndPoint(AddressFamily address_family)49*6777b538SAndroid Build Coastguard Worker IPEndPoint GetMdnsReceiveEndPoint(AddressFamily address_family) {
50*6777b538SAndroid Build Coastguard Worker // TODO(qingsi): MacOS should follow other POSIX platforms in the else-branch
51*6777b538SAndroid Build Coastguard Worker // after addressing crbug.com/899310. We have encountered a conflicting issue on
52*6777b538SAndroid Build Coastguard Worker // CrOS as described in crbug.com/931916, and the following is a temporary
53*6777b538SAndroid Build Coastguard Worker // mitigation to reconcile the two issues. Remove this after closing
54*6777b538SAndroid Build Coastguard Worker // crbug.com/899310.
55*6777b538SAndroid Build Coastguard Worker #if BUILDFLAG(IS_WIN) || BUILDFLAG(IS_APPLE)
56*6777b538SAndroid Build Coastguard Worker   // With Windows, binding to a mulitcast group address is not allowed.
57*6777b538SAndroid Build Coastguard Worker   // Multicast messages will be received appropriate to the multicast groups the
58*6777b538SAndroid Build Coastguard Worker   // socket has joined. Sockets intending to receive multicast messages should
59*6777b538SAndroid Build Coastguard Worker   // bind to a wildcard address (e.g. 0.0.0.0).
60*6777b538SAndroid Build Coastguard Worker   switch (address_family) {
61*6777b538SAndroid Build Coastguard Worker     case ADDRESS_FAMILY_IPV4:
62*6777b538SAndroid Build Coastguard Worker       return IPEndPoint(IPAddress::IPv4AllZeros(),
63*6777b538SAndroid Build Coastguard Worker                         dns_protocol::kDefaultPortMulticast);
64*6777b538SAndroid Build Coastguard Worker     case ADDRESS_FAMILY_IPV6:
65*6777b538SAndroid Build Coastguard Worker       return IPEndPoint(IPAddress::IPv6AllZeros(),
66*6777b538SAndroid Build Coastguard Worker                         dns_protocol::kDefaultPortMulticast);
67*6777b538SAndroid Build Coastguard Worker     default:
68*6777b538SAndroid Build Coastguard Worker       NOTREACHED();
69*6777b538SAndroid Build Coastguard Worker       return IPEndPoint();
70*6777b538SAndroid Build Coastguard Worker   }
71*6777b538SAndroid Build Coastguard Worker #elif BUILDFLAG(IS_POSIX) || BUILDFLAG(IS_FUCHSIA)
72*6777b538SAndroid Build Coastguard Worker   // With POSIX/Fuchsia, any socket can receive messages for multicast groups
73*6777b538SAndroid Build Coastguard Worker   // joined by any socket on the system. Sockets intending to receive messages
74*6777b538SAndroid Build Coastguard Worker   // for a specific multicast group should bind to that group address.
75*6777b538SAndroid Build Coastguard Worker   return GetMdnsGroupEndPoint(address_family);
76*6777b538SAndroid Build Coastguard Worker #else
77*6777b538SAndroid Build Coastguard Worker #error Platform not supported.
78*6777b538SAndroid Build Coastguard Worker #endif
79*6777b538SAndroid Build Coastguard Worker }
80*6777b538SAndroid Build Coastguard Worker 
GetNameForHttpsQuery(const url::SchemeHostPort & scheme_host_port,uint16_t * out_port)81*6777b538SAndroid Build Coastguard Worker std::string GetNameForHttpsQuery(const url::SchemeHostPort& scheme_host_port,
82*6777b538SAndroid Build Coastguard Worker                                  uint16_t* out_port) {
83*6777b538SAndroid Build Coastguard Worker   DCHECK(!scheme_host_port.host().empty() &&
84*6777b538SAndroid Build Coastguard Worker          scheme_host_port.host().front() != '.');
85*6777b538SAndroid Build Coastguard Worker 
86*6777b538SAndroid Build Coastguard Worker   // Normalize ws/wss schemes to http/https. Note that this behavior is not
87*6777b538SAndroid Build Coastguard Worker   // indicated by the draft-ietf-dnsop-svcb-https-08 spec.
88*6777b538SAndroid Build Coastguard Worker   std::string_view normalized_scheme = scheme_host_port.scheme();
89*6777b538SAndroid Build Coastguard Worker   if (normalized_scheme == url::kWsScheme) {
90*6777b538SAndroid Build Coastguard Worker     normalized_scheme = url::kHttpScheme;
91*6777b538SAndroid Build Coastguard Worker   } else if (normalized_scheme == url::kWssScheme) {
92*6777b538SAndroid Build Coastguard Worker     normalized_scheme = url::kHttpsScheme;
93*6777b538SAndroid Build Coastguard Worker   }
94*6777b538SAndroid Build Coastguard Worker 
95*6777b538SAndroid Build Coastguard Worker   // For http-schemed hosts, request the corresponding upgraded https host
96*6777b538SAndroid Build Coastguard Worker   // per the rules in draft-ietf-dnsop-svcb-https-08, Section 9.5.
97*6777b538SAndroid Build Coastguard Worker   uint16_t port = scheme_host_port.port();
98*6777b538SAndroid Build Coastguard Worker   if (normalized_scheme == url::kHttpScheme) {
99*6777b538SAndroid Build Coastguard Worker     normalized_scheme = url::kHttpsScheme;
100*6777b538SAndroid Build Coastguard Worker     if (port == 80)
101*6777b538SAndroid Build Coastguard Worker       port = 443;
102*6777b538SAndroid Build Coastguard Worker   }
103*6777b538SAndroid Build Coastguard Worker 
104*6777b538SAndroid Build Coastguard Worker   // Scheme should always end up normalized to "https" to create HTTPS
105*6777b538SAndroid Build Coastguard Worker   // transactions.
106*6777b538SAndroid Build Coastguard Worker   DCHECK_EQ(normalized_scheme, url::kHttpsScheme);
107*6777b538SAndroid Build Coastguard Worker 
108*6777b538SAndroid Build Coastguard Worker   if (out_port != nullptr)
109*6777b538SAndroid Build Coastguard Worker     *out_port = port;
110*6777b538SAndroid Build Coastguard Worker 
111*6777b538SAndroid Build Coastguard Worker   // Per the rules in draft-ietf-dnsop-svcb-https-08, Section 9.1 and 2.3,
112*6777b538SAndroid Build Coastguard Worker   // encode scheme and port in the transaction hostname, unless the port is
113*6777b538SAndroid Build Coastguard Worker   // the default 443.
114*6777b538SAndroid Build Coastguard Worker   if (port == 443)
115*6777b538SAndroid Build Coastguard Worker     return scheme_host_port.host();
116*6777b538SAndroid Build Coastguard Worker   return base::StrCat({"_", base::NumberToString(scheme_host_port.port()),
117*6777b538SAndroid Build Coastguard Worker                        "._https.", scheme_host_port.host()});
118*6777b538SAndroid Build Coastguard Worker }
119*6777b538SAndroid Build Coastguard Worker 
120*6777b538SAndroid Build Coastguard Worker }  // namespace dns_util
121*6777b538SAndroid Build Coastguard Worker }  // namespace net
122