OLD | NEW |
(Empty) | |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "net/websockets/websocket_frame_parser.h" |
| 6 |
| 7 #include <algorithm> |
| 8 #include "base/basictypes.h" |
| 9 #include "base/logging.h" |
| 10 #include "base/memory/scoped_ptr.h" |
| 11 #include "base/memory/scoped_vector.h" |
| 12 #include "base/memory/ref_counted.h" |
| 13 #include "net/base/big_endian.h" |
| 14 #include "net/websockets/websocket_frame.h" |
| 15 |
| 16 const uint8 kFinalBit = 0x80; |
| 17 const uint8 kReserved1Bit = 0x40; |
| 18 const uint8 kReserved2Bit = 0x20; |
| 19 const uint8 kReserved3Bit = 0x10; |
| 20 const uint8 kOpCodeMask = 0xF; |
| 21 const uint8 kMaskBit = 0x80; |
| 22 const uint8 kPayloadLengthMask = 0x7F; |
| 23 const uint64 kMaxPayloadLengthWithoutExtendedLengthField = 125; |
| 24 const uint64 kPayloadLengthWithTwoByteExtendedLengthField = 126; |
| 25 const uint64 kPayloadLengthWithEightByteExtendedLengthField = 127; |
| 26 |
| 27 namespace net { |
| 28 |
| 29 WebSocketFrameParser::WebSocketFrameParser() |
| 30 : current_read_pos_(0), |
| 31 frame_offset_(0), |
| 32 failed_(false) { |
| 33 std::fill(masking_key_, |
| 34 masking_key_ + WebSocketFrameHeader::kMaskingKeyLength, |
| 35 '\0'); |
| 36 } |
| 37 |
| 38 WebSocketFrameParser::~WebSocketFrameParser() { |
| 39 } |
| 40 |
| 41 bool WebSocketFrameParser::Decode( |
| 42 const char* data, |
| 43 size_t length, |
| 44 ScopedVector<WebSocketPartialFrame>* frames) { |
| 45 if (failed_) |
| 46 return false; |
| 47 if (!length) |
| 48 return true; |
| 49 |
| 50 // TODO(yutak): Remove copy. |
| 51 buffer_.insert(buffer_.end(), data, data + length); |
| 52 |
| 53 while (current_read_pos_ < buffer_.size()) { |
| 54 if (!current_frame_header_.get()) { |
| 55 DecodeFrameHeader(); |
| 56 if (failed_) |
| 57 return false; |
| 58 // If frame header is incomplete, then carry over the remaining |
| 59 // data to the next round of Decode(). |
| 60 if (!current_frame_header_.get()) |
| 61 break; |
| 62 } |
| 63 |
| 64 scoped_ptr<WebSocketPartialFrame> frame = DecodeFramePayload(); |
| 65 DCHECK(frame.get()); |
| 66 frames->push_back(frame.release()); |
| 67 |
| 68 if (current_frame_header_.get()) { |
| 69 DCHECK(current_read_pos_ == buffer_.size()); |
| 70 break; |
| 71 } |
| 72 } |
| 73 |
| 74 // Drain unnecessary data. TODO(yutak): Remove copy. (but how?) |
| 75 buffer_.erase(buffer_.begin(), buffer_.begin() + current_read_pos_); |
| 76 current_read_pos_ = 0; |
| 77 |
| 78 // Sanity check: the size of carried-over data should not exceed |
| 79 // the maximum possible length of a frame header. |
| 80 static const size_t kMaximumFrameHeaderSize = |
| 81 WebSocketFrameHeader::kBaseHeaderSize + |
| 82 WebSocketFrameHeader::kMaximumExtendedLengthSize + |
| 83 WebSocketFrameHeader::kMaskingKeyLength; |
| 84 DCHECK_LT(buffer_.size(), kMaximumFrameHeaderSize); |
| 85 |
| 86 return true; |
| 87 } |
| 88 |
| 89 void WebSocketFrameParser::DecodeFrameHeader() { |
| 90 typedef WebSocketFrameHeader::OpCode OpCode; |
| 91 static const int kMaskingKeyLength = WebSocketFrameHeader::kMaskingKeyLength; |
| 92 |
| 93 DCHECK(!current_frame_header_.get()); |
| 94 |
| 95 const char* start = &buffer_.front() + current_read_pos_; |
| 96 const char* current = start; |
| 97 const char* end = &buffer_.front() + buffer_.size(); |
| 98 |
| 99 // Header needs 2 bytes at minimum. |
| 100 if (end - current < 2) |
| 101 return; |
| 102 |
| 103 uint8 first_byte = *current++; |
| 104 uint8 second_byte = *current++; |
| 105 |
| 106 bool final = (first_byte & kFinalBit) != 0; |
| 107 bool reserved1 = (first_byte & kReserved1Bit) != 0; |
| 108 bool reserved2 = (first_byte & kReserved2Bit) != 0; |
| 109 bool reserved3 = (first_byte & kReserved3Bit) != 0; |
| 110 OpCode opcode = first_byte & kOpCodeMask; |
| 111 |
| 112 bool masked = (second_byte & kMaskBit) != 0; |
| 113 uint64 payload_length = second_byte & kPayloadLengthMask; |
| 114 bool valid_length_format = true; |
| 115 if (payload_length == kPayloadLengthWithTwoByteExtendedLengthField) { |
| 116 if (end - current < 2) |
| 117 return; |
| 118 uint16 payload_length_16; |
| 119 ReadBigEndian(current, &payload_length_16); |
| 120 current += 2; |
| 121 payload_length = payload_length_16; |
| 122 if (payload_length <= kMaxPayloadLengthWithoutExtendedLengthField) |
| 123 valid_length_format = false; |
| 124 } else if (payload_length == kPayloadLengthWithEightByteExtendedLengthField) { |
| 125 if (end - current < 8) |
| 126 return; |
| 127 ReadBigEndian(current, &payload_length); |
| 128 current += 8; |
| 129 if (payload_length <= kuint16max || |
| 130 payload_length > static_cast<uint64>(kint64max)) { |
| 131 valid_length_format = false; |
| 132 } |
| 133 } |
| 134 if (!valid_length_format) { |
| 135 failed_ = true; |
| 136 buffer_.clear(); |
| 137 current_read_pos_ = 0; |
| 138 current_frame_header_ = NULL; |
| 139 frame_offset_ = 0; |
| 140 return; |
| 141 } |
| 142 |
| 143 if (masked) { |
| 144 if (end - current < kMaskingKeyLength) |
| 145 return; |
| 146 std::copy(current, current + kMaskingKeyLength, masking_key_); |
| 147 current += kMaskingKeyLength; |
| 148 } |
| 149 |
| 150 current_frame_header_ = new WebSocketFrameHeader; |
| 151 current_frame_header_->final = final; |
| 152 current_frame_header_->reserved1 = reserved1; |
| 153 current_frame_header_->reserved2 = reserved2; |
| 154 current_frame_header_->reserved3 = reserved3; |
| 155 current_frame_header_->opcode = opcode; |
| 156 current_frame_header_->masked = masked; |
| 157 current_frame_header_->payload_length = payload_length; |
| 158 current_read_pos_ += current - start; |
| 159 DCHECK_EQ(0u, frame_offset_); |
| 160 } |
| 161 |
| 162 scoped_ptr<WebSocketPartialFrame> WebSocketFrameParser::DecodeFramePayload() { |
| 163 static const int kMaskingKeyLength = WebSocketFrameHeader::kMaskingKeyLength; |
| 164 |
| 165 const char* current = &buffer_.front() + current_read_pos_; |
| 166 const char* end = &buffer_.front() + buffer_.size(); |
| 167 uint64 next_size = std::min<uint64>( |
| 168 end - current, |
| 169 current_frame_header_->payload_length - frame_offset_); |
| 170 |
| 171 scoped_ptr<WebSocketPartialFrame> frame(new WebSocketPartialFrame); |
| 172 frame->header = current_frame_header_; |
| 173 frame->final_part = false; |
| 174 frame->data.assign(current, current + next_size); |
| 175 if (current_frame_header_->masked) { |
| 176 // Unmask the payload. |
| 177 // TODO(yutak): This could be faster by doing unmasking for each |
| 178 // machine word (instead of each byte). |
| 179 size_t key_offset = frame_offset_ % kMaskingKeyLength; |
| 180 for (uint64 i = 0; i < next_size; ++i) { |
| 181 frame->data[i] ^= masking_key_[key_offset]; |
| 182 key_offset = (key_offset + 1) % kMaskingKeyLength; |
| 183 } |
| 184 } |
| 185 |
| 186 current_read_pos_ += next_size; |
| 187 frame_offset_ += next_size; |
| 188 |
| 189 DCHECK_LE(frame_offset_, current_frame_header_->payload_length); |
| 190 if (frame_offset_ == current_frame_header_->payload_length) { |
| 191 frame->final_part = true; |
| 192 current_frame_header_ = NULL; |
| 193 frame_offset_ = 0; |
| 194 std::fill(masking_key_, masking_key_ + kMaskingKeyLength, '\0'); |
| 195 } |
| 196 |
| 197 return frame.Pass(); |
| 198 } |
| 199 |
| 200 } // namespace net |
OLD | NEW |