Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(23)

Side by Side Diff: net/websockets/websocket_frame_parser.cc

Issue 9956013: Add WebSocketFrameParser. (Closed) Base URL: svn://svn.chromium.org/chrome/trunk/src
Patch Set: Address comments, add tests. Created 8 years, 8 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch | Annotate | Revision Log
OLDNEW
(Empty)
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "net/websockets/websocket_frame_parser.h"
6
7 #include <algorithm>
8 #include "base/basictypes.h"
9 #include "base/logging.h"
10 #include "base/memory/scoped_ptr.h"
11 #include "base/memory/scoped_vector.h"
12 #include "base/memory/ref_counted.h"
13 #include "net/base/big_endian.h"
14 #include "net/websockets/websocket_frame.h"
15
16 const uint8 kFinalBit = 0x80;
17 const uint8 kReserved1Bit = 0x40;
18 const uint8 kReserved2Bit = 0x20;
19 const uint8 kReserved3Bit = 0x10;
20 const uint8 kOpCodeMask = 0xF;
21 const uint8 kMaskBit = 0x80;
22 const uint8 kPayloadLengthMask = 0x7F;
23 const uint64 kMaxPayloadLengthWithoutExtendedLengthField = 125;
24 const uint64 kPayloadLengthWithTwoByteExtendedLengthField = 126;
25 const uint64 kPayloadLengthWithEightByteExtendedLengthField = 127;
26
27 namespace net {
28
29 WebSocketFrameParser::WebSocketFrameParser()
30 : current_read_pos_(0),
31 frame_offset_(0),
32 failed_(false) {
33 std::fill(masking_key_,
34 masking_key_ + WebSocketFrameHeader::kMaskingKeyLength,
35 '\0');
36 }
37
38 WebSocketFrameParser::~WebSocketFrameParser() {
39 }
40
41 bool WebSocketFrameParser::Decode(
42 const char* data,
43 size_t length,
44 ScopedVector<WebSocketPartialFrame>* frames) {
45 if (failed_)
46 return false;
47 if (!length)
48 return true;
49
50 // TODO(yutak): Remove copy.
51 buffer_.insert(buffer_.end(), data, data + length);
52
53 while (current_read_pos_ < buffer_.size()) {
54 if (!current_frame_header_.get()) {
55 DecodeFrameHeader();
56 if (failed_)
57 return false;
58 // If frame header is incomplete, then carry over the remaining
59 // data to the next round of Decode().
60 if (!current_frame_header_.get())
61 break;
62 }
63
64 scoped_ptr<WebSocketPartialFrame> frame = DecodeFramePayload();
65 DCHECK(frame.get());
66 frames->push_back(frame.release());
67
68 if (current_frame_header_.get()) {
69 DCHECK(current_read_pos_ == buffer_.size());
70 break;
71 }
72 }
73
74 // Drain unnecessary data. TODO(yutak): Remove copy. (but how?)
75 buffer_.erase(buffer_.begin(), buffer_.begin() + current_read_pos_);
76 current_read_pos_ = 0;
77
78 // Sanity check: the size of carried-over data should not exceed
79 // the maximum possible length of a frame header.
80 static const size_t kMaximumFrameHeaderSize =
81 WebSocketFrameHeader::kBaseHeaderSize +
82 WebSocketFrameHeader::kMaximumExtendedLengthSize +
83 WebSocketFrameHeader::kMaskingKeyLength;
84 DCHECK_LT(buffer_.size(), kMaximumFrameHeaderSize);
85
86 return true;
87 }
88
89 void WebSocketFrameParser::DecodeFrameHeader() {
90 typedef WebSocketFrameHeader::OpCode OpCode;
91 static const int kMaskingKeyLength = WebSocketFrameHeader::kMaskingKeyLength;
92
93 DCHECK(!current_frame_header_.get());
94
95 const char* start = &buffer_.front() + current_read_pos_;
96 const char* current = start;
97 const char* end = &buffer_.front() + buffer_.size();
98
99 // Header needs 2 bytes at minimum.
100 if (end - current < 2)
101 return;
102
103 uint8 first_byte = *current++;
104 uint8 second_byte = *current++;
105
106 bool final = (first_byte & kFinalBit) != 0;
107 bool reserved1 = (first_byte & kReserved1Bit) != 0;
108 bool reserved2 = (first_byte & kReserved2Bit) != 0;
109 bool reserved3 = (first_byte & kReserved3Bit) != 0;
110 OpCode opcode = first_byte & kOpCodeMask;
111
112 bool masked = (second_byte & kMaskBit) != 0;
113 uint64 payload_length = second_byte & kPayloadLengthMask;
114 bool valid_length_format = true;
115 if (payload_length == kPayloadLengthWithTwoByteExtendedLengthField) {
116 if (end - current < 2)
117 return;
118 uint16 payload_length_16;
119 ReadBigEndian(current, &payload_length_16);
120 current += 2;
121 payload_length = payload_length_16;
122 if (payload_length <= kMaxPayloadLengthWithoutExtendedLengthField)
123 valid_length_format = false;
124 } else if (payload_length == kPayloadLengthWithEightByteExtendedLengthField) {
125 if (end - current < 8)
126 return;
127 ReadBigEndian(current, &payload_length);
128 current += 8;
129 if (payload_length <= kuint16max ||
130 payload_length > static_cast<uint64>(kint64max)) {
131 valid_length_format = false;
132 }
133 }
134 if (!valid_length_format) {
135 failed_ = true;
136 buffer_.clear();
137 current_read_pos_ = 0;
138 current_frame_header_ = NULL;
139 frame_offset_ = 0;
140 return;
141 }
142
143 if (masked) {
144 if (end - current < kMaskingKeyLength)
145 return;
146 std::copy(current, current + kMaskingKeyLength, masking_key_);
147 current += kMaskingKeyLength;
148 }
149
150 current_frame_header_ = new WebSocketFrameHeader;
151 current_frame_header_->final = final;
152 current_frame_header_->reserved1 = reserved1;
153 current_frame_header_->reserved2 = reserved2;
154 current_frame_header_->reserved3 = reserved3;
155 current_frame_header_->opcode = opcode;
156 current_frame_header_->masked = masked;
157 current_frame_header_->payload_length = payload_length;
158 current_read_pos_ += current - start;
159 DCHECK_EQ(0u, frame_offset_);
160 }
161
162 scoped_ptr<WebSocketPartialFrame> WebSocketFrameParser::DecodeFramePayload() {
163 static const int kMaskingKeyLength = WebSocketFrameHeader::kMaskingKeyLength;
164
165 const char* current = &buffer_.front() + current_read_pos_;
166 const char* end = &buffer_.front() + buffer_.size();
167 uint64 next_size = std::min<uint64>(
168 end - current,
169 current_frame_header_->payload_length - frame_offset_);
170
171 scoped_ptr<WebSocketPartialFrame> frame(new WebSocketPartialFrame);
172 frame->header = current_frame_header_;
173 frame->final_part = false;
174 frame->data.assign(current, current + next_size);
175 if (current_frame_header_->masked) {
176 // Unmask the payload.
177 // TODO(yutak): This could be faster by doing unmasking for each
178 // machine word (instead of each byte).
179 size_t key_offset = frame_offset_ % kMaskingKeyLength;
180 for (uint64 i = 0; i < next_size; ++i) {
181 frame->data[i] ^= masking_key_[key_offset];
182 key_offset = (key_offset + 1) % kMaskingKeyLength;
183 }
184 }
185
186 current_read_pos_ += next_size;
187 frame_offset_ += next_size;
188
189 DCHECK_LE(frame_offset_, current_frame_header_->payload_length);
190 if (frame_offset_ == current_frame_header_->payload_length) {
191 frame->final_part = true;
192 current_frame_header_ = NULL;
193 frame_offset_ = 0;
194 std::fill(masking_key_, masking_key_ + kMaskingKeyLength, '\0');
195 }
196
197 return frame.Pass();
198 }
199
200 } // namespace net
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698