Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(504)

Side by Side Diff: net/websockets/websocket_frame.cc

Issue 10384180: Add functions used for building WebSocket frame data. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Don't take std::vector as arguments. Created 8 years, 6 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/websockets/websocket_frame.h" 5 #include "net/websockets/websocket_frame.h"
6 6
7 #include "base/basictypes.h"
8 #include "base/logging.h"
9 #include "base/rand_util.h"
10 #include "net/base/big_endian.h"
11
12 namespace {
13
14 const uint8 kFinalBit = 0x80;
15 const uint8 kReserved1Bit = 0x40;
16 const uint8 kReserved2Bit = 0x20;
17 const uint8 kReserved3Bit = 0x10;
18 const uint8 kOpCodeMask = 0xF;
19 const uint8 kMaskBit = 0x80;
20 const uint64 kMaxPayloadLengthWithoutExtendedLengthField = 125;
21 const uint64 kPayloadLengthWithTwoByteExtendedLengthField = 126;
22 const uint64 kPayloadLengthWithEightByteExtendedLengthField = 127;
23
24 } // Unnamed namespace.
25
7 namespace net { 26 namespace net {
8 27
9 // Definitions for in-struct constants. 28 // Definitions for in-struct constants.
10 const WebSocketFrameHeader::OpCode WebSocketFrameHeader::kOpCodeContinuation = 29 const WebSocketFrameHeader::OpCode WebSocketFrameHeader::kOpCodeContinuation =
11 0x0; 30 0x0;
12 const WebSocketFrameHeader::OpCode WebSocketFrameHeader::kOpCodeText = 0x1; 31 const WebSocketFrameHeader::OpCode WebSocketFrameHeader::kOpCodeText = 0x1;
13 const WebSocketFrameHeader::OpCode WebSocketFrameHeader::kOpCodeBinary = 0x2; 32 const WebSocketFrameHeader::OpCode WebSocketFrameHeader::kOpCodeBinary = 0x2;
14 const WebSocketFrameHeader::OpCode WebSocketFrameHeader::kOpCodeClose = 0x8; 33 const WebSocketFrameHeader::OpCode WebSocketFrameHeader::kOpCodeClose = 0x8;
15 const WebSocketFrameHeader::OpCode WebSocketFrameHeader::kOpCodePing = 0x9; 34 const WebSocketFrameHeader::OpCode WebSocketFrameHeader::kOpCodePing = 0x9;
16 const WebSocketFrameHeader::OpCode WebSocketFrameHeader::kOpCodePong = 0xA; 35 const WebSocketFrameHeader::OpCode WebSocketFrameHeader::kOpCodePong = 0xA;
17 36
18 WebSocketFrameChunk::WebSocketFrameChunk() : final_chunk(false) { 37 WebSocketFrameChunk::WebSocketFrameChunk() : final_chunk(false) {
19 } 38 }
20 39
21 WebSocketFrameChunk::~WebSocketFrameChunk() { 40 WebSocketFrameChunk::~WebSocketFrameChunk() {
22 } 41 }
23 42
43 bool WriteWebSocketFrameHeader(const WebSocketFrameHeader& header,
44 const WebSocketMaskingKey* masking_key,
45 char* buffer,
46 size_t buffer_size) {
47 DCHECK((header.opcode & kOpCodeMask) == header.opcode)
48 << "header.opcode must fit to kOpCodeMask.";
49 DCHECK(header.payload_length <= static_cast<uint64>(kint64max))
50 << "WebSocket specification doesn't allow a frame longer than "
51 << "kint64max (0x7FFFFFFFFFFFFFFF) bytes.";
52
53 // WebSocket frame format is as follows:
54 // - Common header (2 bytes)
55 // - Optional extended payload length
56 // (2 or 8 bytes, present if actual payload length is more than 125 bytes)
57 // - Optional masking key (4 bytes, present if MASK bit is on)
58 // - Actual payload (XOR masked with masking key if MASK bit is on)
59 //
60 // This function constructs frame header (the first three in the list
61 // above).
62
63 size_t extended_length_size = 0;
64 if (header.payload_length > kMaxPayloadLengthWithoutExtendedLengthField &&
65 header.payload_length <= kuint16max) {
66 extended_length_size = 2;
67 } else if (header.payload_length > kuint16max) {
68 extended_length_size = 8;
69 }
70 size_t header_size =
71 WebSocketFrameHeader::kBaseHeaderSize +
72 extended_length_size +
73 (header.masked ? WebSocketFrameHeader::kMaskingKeyLength : 0);
74 if (header_size > buffer_size)
75 return false;
76
77 size_t buffer_index = 0;
78
79 uint8 first_byte = 0u;
80 first_byte |= header.final ? kFinalBit : 0u;
81 first_byte |= header.reserved1 ? kReserved1Bit : 0u;
82 first_byte |= header.reserved2 ? kReserved2Bit : 0u;
83 first_byte |= header.reserved3 ? kReserved3Bit : 0u;
84 first_byte |= header.opcode;
85 buffer[buffer_index++] = first_byte;
86
87 uint8 second_byte = 0u;
88 second_byte |= header.masked ? kMaskBit : 0u;
89 if (header.payload_length <=
90 kMaxPayloadLengthWithoutExtendedLengthField) {
91 second_byte |= header.payload_length;
92 } else if (header.payload_length <= kuint16max) {
93 second_byte |= kPayloadLengthWithTwoByteExtendedLengthField;
94 } else {
95 second_byte |= kPayloadLengthWithEightByteExtendedLengthField;
96 }
97 buffer[buffer_index++] = second_byte;
98
99 // Writes "extended payload length" field.
100 if (extended_length_size == 2u) {
101 uint16 payload_length_16 = static_cast<uint16>(header.payload_length);
102 WriteBigEndian(buffer + buffer_index, payload_length_16);
103 buffer_index += sizeof(uint16);
104 } else if (extended_length_size == 8u) {
105 WriteBigEndian(buffer + buffer_index, header.payload_length);
106 buffer_index += sizeof(uint64);
107 }
108
109 // Writes "masking key" field, if needed.
110 if (header.masked) {
111 DCHECK(masking_key);
112 std::copy(masking_key->key,
113 masking_key->key + WebSocketFrameHeader::kMaskingKeyLength,
114 buffer + buffer_index);
115 buffer_index += WebSocketFrameHeader::kMaskingKeyLength;
116 } else {
117 DCHECK(!masking_key);
118 }
119
120 DCHECK_EQ(header_size, buffer_index);
121 return true;
122 }
123
124 WebSocketMaskingKey GenerateWebSocketMaskingKey() {
125 // Masking keys should be generated from a cryptographically secure random
126 // number generator, which means web application authors should not be able
127 // to guess the next value of masking key.
128 WebSocketMaskingKey masking_key;
129 base::RandBytes(masking_key.key, WebSocketFrameHeader::kMaskingKeyLength);
130 return masking_key;
131 }
132
133 void MaskWebSocketFramePayload(const WebSocketMaskingKey& masking_key,
134 uint64 frame_offset,
135 char* data,
136 size_t data_size) {
137 static const size_t kMaskingKeyLength =
138 WebSocketFrameHeader::kMaskingKeyLength;
139
140 // TODO(yutak): Make masking more efficient by XOR'ing every machine word
141 // (4 or 8 bytes), instead of XOR'ing every byte.
142 size_t masking_key_offset = frame_offset % kMaskingKeyLength;
143 for (size_t i = 0; i < data_size; ++i) {
144 data[i] ^= masking_key.key[masking_key_offset++];
145 if (masking_key_offset == kMaskingKeyLength)
146 masking_key_offset = 0;
147 }
148 }
149
24 } // namespace net 150 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698