| OLD | NEW |
| 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2011 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/socket/ssl_client_socket_mac.h" | 5 #include "net/socket/ssl_client_socket_mac.h" |
| 6 | 6 |
| 7 #include <CoreServices/CoreServices.h> | 7 #include <CoreServices/CoreServices.h> |
| 8 #include <netdb.h> | 8 #include <netdb.h> |
| 9 #include <sys/socket.h> | 9 #include <sys/socket.h> |
| 10 #include <sys/types.h> | 10 #include <sys/types.h> |
| (...skipping 515 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 526 const SSLClientSocketContext& context) | 526 const SSLClientSocketContext& context) |
| 527 : transport_read_callback_(this, | 527 : transport_read_callback_(this, |
| 528 &SSLClientSocketMac::OnTransportReadComplete), | 528 &SSLClientSocketMac::OnTransportReadComplete), |
| 529 transport_write_callback_(this, | 529 transport_write_callback_(this, |
| 530 &SSLClientSocketMac::OnTransportWriteComplete), | 530 &SSLClientSocketMac::OnTransportWriteComplete), |
| 531 transport_(transport_socket), | 531 transport_(transport_socket), |
| 532 host_and_port_(host_and_port), | 532 host_and_port_(host_and_port), |
| 533 ssl_config_(ssl_config), | 533 ssl_config_(ssl_config), |
| 534 old_user_connect_callback_(NULL), | 534 old_user_connect_callback_(NULL), |
| 535 old_user_read_callback_(NULL), | 535 old_user_read_callback_(NULL), |
| 536 old_user_write_callback_(NULL), | 536 user_write_callback_(NULL), |
| 537 user_read_buf_len_(0), | 537 user_read_buf_len_(0), |
| 538 user_write_buf_len_(0), | 538 user_write_buf_len_(0), |
| 539 next_handshake_state_(STATE_NONE), | 539 next_handshake_state_(STATE_NONE), |
| 540 cert_verifier_(context.cert_verifier), | 540 cert_verifier_(context.cert_verifier), |
| 541 renegotiating_(false), | 541 renegotiating_(false), |
| 542 client_cert_requested_(false), | 542 client_cert_requested_(false), |
| 543 ssl_context_(NULL), | 543 ssl_context_(NULL), |
| 544 bytes_read_after_renegotiation_(0), | 544 bytes_read_after_renegotiation_(0), |
| 545 pending_send_error_(OK), | 545 pending_send_error_(OK), |
| 546 net_log_(transport_socket->socket()->NetLog()) { | 546 net_log_(transport_socket->socket()->NetLog()) { |
| (...skipping 183 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 730 } else { | 730 } else { |
| 731 user_read_buf_ = NULL; | 731 user_read_buf_ = NULL; |
| 732 user_read_buf_len_ = 0; | 732 user_read_buf_len_ = 0; |
| 733 } | 733 } |
| 734 return rv; | 734 return rv; |
| 735 } | 735 } |
| 736 | 736 |
| 737 int SSLClientSocketMac::Write(IOBuffer* buf, int buf_len, | 737 int SSLClientSocketMac::Write(IOBuffer* buf, int buf_len, |
| 738 OldCompletionCallback* callback) { | 738 OldCompletionCallback* callback) { |
| 739 DCHECK(completed_handshake()); | 739 DCHECK(completed_handshake()); |
| 740 DCHECK(!old_user_write_callback_ && user_write_callback_.is_null()); | 740 DCHECK(!user_write_callback_); |
| 741 DCHECK(!user_write_buf_); | 741 DCHECK(!user_write_buf_); |
| 742 | 742 |
| 743 user_write_buf_ = buf; | 743 user_write_buf_ = buf; |
| 744 user_write_buf_len_ = buf_len; | 744 user_write_buf_len_ = buf_len; |
| 745 | 745 |
| 746 int rv = DoPayloadWrite(); | 746 int rv = DoPayloadWrite(); |
| 747 if (rv == ERR_IO_PENDING) { | 747 if (rv == ERR_IO_PENDING) { |
| 748 old_user_write_callback_ = callback; | |
| 749 } else { | |
| 750 user_write_buf_ = NULL; | |
| 751 user_write_buf_len_ = 0; | |
| 752 } | |
| 753 return rv; | |
| 754 } | |
| 755 int SSLClientSocketMac::Write(IOBuffer* buf, int buf_len, | |
| 756 const CompletionCallback& callback) { | |
| 757 DCHECK(completed_handshake()); | |
| 758 DCHECK(!old_user_write_callback_ && user_write_callback_.is_null()); | |
| 759 DCHECK(!user_write_buf_); | |
| 760 | |
| 761 user_write_buf_ = buf; | |
| 762 user_write_buf_len_ = buf_len; | |
| 763 | |
| 764 int rv = DoPayloadWrite(); | |
| 765 if (rv == ERR_IO_PENDING) { | |
| 766 user_write_callback_ = callback; | 748 user_write_callback_ = callback; |
| 767 } else { | 749 } else { |
| 768 user_write_buf_ = NULL; | 750 user_write_buf_ = NULL; |
| 769 user_write_buf_len_ = 0; | 751 user_write_buf_len_ = 0; |
| 770 } | 752 } |
| 771 return rv; | 753 return rv; |
| 772 } | 754 } |
| 773 | 755 |
| 774 bool SSLClientSocketMac::SetReceiveBufferSize(int32 size) { | 756 bool SSLClientSocketMac::SetReceiveBufferSize(int32 size) { |
| 775 return transport_->socket()->SetReceiveBufferSize(size); | 757 return transport_->socket()->SetReceiveBufferSize(size); |
| (...skipping 207 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 983 CompletionCallback c = user_read_callback_; | 965 CompletionCallback c = user_read_callback_; |
| 984 user_read_callback_.Reset(); | 966 user_read_callback_.Reset(); |
| 985 user_read_buf_ = NULL; | 967 user_read_buf_ = NULL; |
| 986 user_read_buf_len_ = 0; | 968 user_read_buf_len_ = 0; |
| 987 c.Run(rv); | 969 c.Run(rv); |
| 988 } | 970 } |
| 989 } | 971 } |
| 990 | 972 |
| 991 void SSLClientSocketMac::DoWriteCallback(int rv) { | 973 void SSLClientSocketMac::DoWriteCallback(int rv) { |
| 992 DCHECK(rv != ERR_IO_PENDING); | 974 DCHECK(rv != ERR_IO_PENDING); |
| 993 DCHECK(old_user_write_callback_ && !user_write_callback_.is_null()); | 975 DCHECK(user_write_callback_); |
| 994 | 976 |
| 995 // Since Run may result in Write being called, clear user_write_callback_ up | 977 // Since Run may result in Write being called, clear user_write_callback_ up |
| 996 // front. | 978 // front. |
| 997 if (old_user_write_callback_) { | 979 OldCompletionCallback* c = user_write_callback_; |
| 998 OldCompletionCallback* c = old_user_write_callback_; | 980 user_write_callback_ = NULL; |
| 999 old_user_write_callback_ = NULL; | 981 user_write_buf_ = NULL; |
| 1000 user_write_buf_ = NULL; | 982 user_write_buf_len_ = 0; |
| 1001 user_write_buf_len_ = 0; | 983 c->Run(rv); |
| 1002 c->Run(rv); | |
| 1003 } else { | |
| 1004 CompletionCallback c = user_write_callback_; | |
| 1005 user_write_callback_.Reset(); | |
| 1006 user_write_buf_ = NULL; | |
| 1007 user_write_buf_len_ = 0; | |
| 1008 c.Run(rv); | |
| 1009 } | |
| 1010 } | 984 } |
| 1011 | 985 |
| 1012 void SSLClientSocketMac::OnHandshakeIOComplete(int result) { | 986 void SSLClientSocketMac::OnHandshakeIOComplete(int result) { |
| 1013 int rv = DoHandshakeLoop(result); | 987 int rv = DoHandshakeLoop(result); |
| 1014 if (rv != ERR_IO_PENDING) { | 988 if (rv != ERR_IO_PENDING) { |
| 1015 // If there is no connect callback available to call, we are | 989 // If there is no connect callback available to call, we are |
| 1016 // renegotiating (which occurs because we are in the middle of a Read | 990 // renegotiating (which occurs because we are in the middle of a Read |
| 1017 // when the renegotiation process starts). So we complete the Read | 991 // when the renegotiation process starts). So we complete the Read |
| 1018 // here. | 992 // here. |
| 1019 if (!old_user_connect_callback_ && user_connect_callback_.is_null()) { | 993 if (!old_user_connect_callback_ && user_connect_callback_.is_null()) { |
| (...skipping 489 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1509 if (rv < 0 && rv != ERR_IO_PENDING) { | 1483 if (rv < 0 && rv != ERR_IO_PENDING) { |
| 1510 us->write_io_buf_ = NULL; | 1484 us->write_io_buf_ = NULL; |
| 1511 return OSStatusFromNetError(rv); | 1485 return OSStatusFromNetError(rv); |
| 1512 } | 1486 } |
| 1513 | 1487 |
| 1514 // always lie to our caller | 1488 // always lie to our caller |
| 1515 return noErr; | 1489 return noErr; |
| 1516 } | 1490 } |
| 1517 | 1491 |
| 1518 } // namespace net | 1492 } // namespace net |
| OLD | NEW |