Index: net/websockets/websocket_frame_parser.cc |
diff --git a/net/websockets/websocket_frame_parser.cc b/net/websockets/websocket_frame_parser.cc |
index 1acc64ce42af9825499e9c42a9e0147d8855b34c..edbd0e6fc82bf3baaa88662372474e1929cb107c 100644 |
--- a/net/websockets/websocket_frame_parser.cc |
+++ b/net/websockets/websocket_frame_parser.cc |
@@ -5,6 +5,7 @@ |
#include "net/websockets/websocket_frame_parser.h" |
#include <algorithm> |
+#include <limits> |
#include "base/basictypes.h" |
#include "base/logging.h" |
@@ -12,6 +13,7 @@ |
#include "base/memory/scoped_ptr.h" |
#include "base/memory/scoped_vector.h" |
#include "net/base/big_endian.h" |
+#include "net/base/io_buffer.h" |
#include "net/websockets/websocket_frame.h" |
namespace { |
@@ -120,6 +122,7 @@ void WebSocketFrameParser::DecodeFrameHeader() { |
bool masked = (second_byte & kMaskBit) != 0; |
uint64 payload_length = second_byte & kPayloadLengthMask; |
bool valid_length_format = true; |
+ bool message_too_big = false; |
mmenke
2012/07/30 14:20:08
Why is this needed? We don't read the entire mess
Takashi Toyoshima
2012/07/30 14:42:42
One WebSocket frame represents one JavaScript obje
|
if (payload_length == kPayloadLengthWithTwoByteExtendedLengthField) { |
if (end - current < 2) |
return; |
@@ -138,8 +141,10 @@ void WebSocketFrameParser::DecodeFrameHeader() { |
payload_length > static_cast<uint64>(kint64max)) { |
valid_length_format = false; |
} |
+ if (payload_length > static_cast<uint64>(kint32max)) |
Takashi Toyoshima
2012/07/30 14:42:42
So I think we should set proper value here.
kint32
mmenke
2012/07/30 14:55:53
Err...Sorry, I was thinking WebSockets were stream
|
+ message_too_big = true; |
} |
- if (!valid_length_format) { |
+ if (!valid_length_format || message_too_big) { |
failed_ = true; |
buffer_.clear(); |
current_read_pos_ = 0; |
@@ -178,26 +183,33 @@ scoped_ptr<WebSocketFrameChunk> WebSocketFrameParser::DecodeFramePayload( |
uint64 next_size = std::min<uint64>( |
end - current, |
current_frame_header_->payload_length - frame_offset_); |
+ // This check must pass because |payload_length| is already checked to be |
+ // less than std::numeric_limits<int>::max() when the header is parsed. |
+ DCHECK_LE(next_size, static_cast<uint64>(kint32max)); |
Takashi Toyoshima
2012/07/30 14:42:42
But, splitting incoming large frames into multiple
|
scoped_ptr<WebSocketFrameChunk> frame_chunk(new WebSocketFrameChunk); |
if (first_chunk) { |
frame_chunk->header.reset(new WebSocketFrameHeader(*current_frame_header_)); |
} |
frame_chunk->final_chunk = false; |
- frame_chunk->data.assign(current, current + next_size); |
- if (current_frame_header_->masked) { |
- // Unmask the payload. |
- // TODO(yutak): This could be faster by doing unmasking for each |
- // machine word (instead of each byte). |
- size_t key_offset = frame_offset_ % kMaskingKeyLength; |
- for (uint64 i = 0; i < next_size; ++i) { |
- frame_chunk->data[i] ^= masking_key_[key_offset]; |
- key_offset = (key_offset + 1) % kMaskingKeyLength; |
+ if (next_size) { |
+ frame_chunk->data = new IOBufferWithSize(static_cast<int>(next_size)); |
+ char* io_data = frame_chunk->data->data(); |
+ memcpy(io_data, current, next_size); |
+ if (current_frame_header_->masked) { |
+ // Unmask the payload. |
+ // TODO(yutak): This could be faster by doing unmasking for each |
+ // machine word (instead of each byte). |
+ size_t key_offset = frame_offset_ % kMaskingKeyLength; |
+ for (uint64 i = 0; i < next_size; ++i) { |
+ io_data[i] ^= masking_key_[key_offset]; |
+ key_offset = (key_offset + 1) % kMaskingKeyLength; |
+ } |
} |
- } |
- current_read_pos_ += next_size; |
- frame_offset_ += next_size; |
+ current_read_pos_ += next_size; |
+ frame_offset_ += next_size; |
+ } |
DCHECK_LE(frame_offset_, current_frame_header_->payload_length); |
if (frame_offset_ == current_frame_header_->payload_length) { |