Chromium Code Reviews| OLD | NEW |
|---|---|
| (Empty) | |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | |
| 2 // Use of this source code is governed by a BSD-style license that can be | |
| 3 // found in the LICENSE file. | |
| 4 | |
| 5 #include "net/websockets/websocket_frame_parser.h" | |
| 6 | |
| 7 #include <algorithm> | |
| 8 #include "base/basictypes.h" | |
| 9 #include "base/logging.h" | |
| 10 #include "base/memory/scoped_ptr.h" | |
| 11 #include "base/memory/scoped_vector.h" | |
| 12 #include "base/memory/ref_counted.h" | |
|
mmenke
2012/05/02 16:15:41
nit: Alphabetize
Yuta Kitamura
2012/05/08 08:21:58
Done.
| |
| 13 #include "net/base/big_endian.h" | |
| 14 #include "net/websockets/websocket_frame.h" | |
| 15 | |
| 16 const uint8 kFinalBit = 0x80; | |
| 17 const uint8 kReserved1Bit = 0x40; | |
| 18 const uint8 kReserved2Bit = 0x20; | |
| 19 const uint8 kReserved3Bit = 0x10; | |
| 20 const uint8 kOpCodeMask = 0xF; | |
| 21 const uint8 kMaskBit = 0x80; | |
| 22 const uint8 kPayloadLengthMask = 0x7F; | |
| 23 const uint64 kMaxPayloadLengthWithoutExtendedLengthField = 125; | |
| 24 const uint64 kPayloadLengthWithTwoByteExtendedLengthField = 126; | |
| 25 const uint64 kPayloadLengthWithEightByteExtendedLengthField = 127; | |
|
mmenke
2012/05/02 16:15:41
These should be in an anonymous namespace.
Yuta Kitamura
2012/05/08 08:21:58
Fixed.
Global variables with "const" keyword have
mmenke
2012/05/08 18:35:55
I did not know that.
| |
| 26 | |
| 27 namespace net { | |
| 28 | |
| 29 WebSocketFrameParser::WebSocketFrameParser() | |
| 30 : current_read_pos_(0), | |
| 31 frame_offset_(0), | |
| 32 failed_(false) { | |
| 33 std::fill(masking_key_, | |
| 34 masking_key_ + WebSocketFrameHeader::kMaskingKeyLength, | |
| 35 '\0'); | |
| 36 } | |
| 37 | |
| 38 WebSocketFrameParser::~WebSocketFrameParser() { | |
| 39 } | |
| 40 | |
| 41 bool WebSocketFrameParser::Decode( | |
| 42 const char* data, | |
| 43 size_t length, | |
| 44 ScopedVector<WebSocketPartialFrame>* frames) { | |
| 45 if (failed_) | |
| 46 return false; | |
| 47 if (!length) | |
| 48 return true; | |
| 49 | |
| 50 // TODO(yutak): Remove copy. | |
| 51 buffer_.insert(buffer_.end(), data, data + length); | |
| 52 | |
| 53 while (current_read_pos_ < buffer_.size()) { | |
| 54 if (!current_frame_header_.get()) { | |
| 55 DecodeFrameHeader(); | |
| 56 if (failed_) | |
| 57 return false; | |
| 58 // If frame header is incomplete, then carry over the remaining | |
| 59 // data to the next round of Decode(). | |
| 60 if (!current_frame_header_.get()) | |
| 61 break; | |
| 62 } | |
| 63 | |
| 64 scoped_ptr<WebSocketPartialFrame> frame = DecodeFramePayload(); | |
| 65 DCHECK(frame.get()); | |
| 66 frames->push_back(frame.release()); | |
| 67 | |
| 68 if (current_frame_header_.get()) { | |
| 69 DCHECK(current_read_pos_ == buffer_.size()); | |
| 70 break; | |
| 71 } | |
| 72 } | |
| 73 | |
| 74 // Drain unnecessary data. TODO(yutak): Remove copy. (but how?) | |
| 75 buffer_.erase(buffer_.begin(), buffer_.begin() + current_read_pos_); | |
| 76 current_read_pos_ = 0; | |
| 77 | |
| 78 // Sanity check: the size of carried-over data should not exceed | |
| 79 // the maximum possible length of a frame header. | |
| 80 static const size_t kMaximumFrameHeaderSize = | |
| 81 WebSocketFrameHeader::kBaseHeaderSize + | |
| 82 WebSocketFrameHeader::kMaximumExtendedLengthSize + | |
| 83 WebSocketFrameHeader::kMaskingKeyLength; | |
| 84 DCHECK_LT(buffer_.size(), kMaximumFrameHeaderSize); | |
| 85 | |
| 86 return true; | |
| 87 } | |
| 88 | |
| 89 void WebSocketFrameParser::DecodeFrameHeader() { | |
| 90 typedef WebSocketFrameHeader::OpCode OpCode; | |
| 91 static const int kMaskingKeyLength = WebSocketFrameHeader::kMaskingKeyLength; | |
| 92 | |
| 93 DCHECK(!current_frame_header_.get()); | |
| 94 | |
| 95 const char* start = &buffer_.front() + current_read_pos_; | |
| 96 const char* current = start; | |
| 97 const char* end = &buffer_.front() + buffer_.size(); | |
| 98 | |
| 99 // Header needs 2 bytes at minimum. | |
| 100 if (end - current < 2) | |
| 101 return; | |
| 102 | |
| 103 uint8 first_byte = *current++; | |
| 104 uint8 second_byte = *current++; | |
| 105 | |
| 106 bool final = (first_byte & kFinalBit) != 0; | |
| 107 bool reserved1 = (first_byte & kReserved1Bit) != 0; | |
| 108 bool reserved2 = (first_byte & kReserved2Bit) != 0; | |
| 109 bool reserved3 = (first_byte & kReserved3Bit) != 0; | |
| 110 OpCode opcode = first_byte & kOpCodeMask; | |
| 111 | |
| 112 bool masked = (second_byte & kMaskBit) != 0; | |
| 113 uint64 payload_length = second_byte & kPayloadLengthMask; | |
| 114 bool valid_length_format = true; | |
| 115 if (payload_length == kPayloadLengthWithTwoByteExtendedLengthField) { | |
| 116 if (end - current < 2) | |
| 117 return; | |
| 118 uint16 payload_length_16; | |
| 119 ReadBigEndian(current, &payload_length_16); | |
| 120 current += 2; | |
| 121 payload_length = payload_length_16; | |
| 122 if (payload_length <= kMaxPayloadLengthWithoutExtendedLengthField) | |
| 123 valid_length_format = false; | |
| 124 } else if (payload_length == kPayloadLengthWithEightByteExtendedLengthField) { | |
| 125 if (end - current < 8) | |
| 126 return; | |
| 127 ReadBigEndian(current, &payload_length); | |
| 128 current += 8; | |
| 129 if (payload_length <= kuint16max || | |
| 130 payload_length > static_cast<uint64>(kint64max)) { | |
| 131 valid_length_format = false; | |
| 132 } | |
| 133 } | |
| 134 if (!valid_length_format) { | |
| 135 failed_ = true; | |
| 136 buffer_.clear(); | |
| 137 current_read_pos_ = 0; | |
| 138 current_frame_header_ = NULL; | |
| 139 frame_offset_ = 0; | |
| 140 return; | |
| 141 } | |
| 142 | |
| 143 if (masked) { | |
| 144 if (end - current < kMaskingKeyLength) | |
| 145 return; | |
| 146 std::copy(current, current + kMaskingKeyLength, masking_key_); | |
| 147 current += kMaskingKeyLength; | |
| 148 } | |
| 149 | |
| 150 current_frame_header_ = new WebSocketFrameHeader; | |
| 151 current_frame_header_->final = final; | |
| 152 current_frame_header_->reserved1 = reserved1; | |
| 153 current_frame_header_->reserved2 = reserved2; | |
| 154 current_frame_header_->reserved3 = reserved3; | |
| 155 current_frame_header_->opcode = opcode; | |
| 156 current_frame_header_->masked = masked; | |
| 157 current_frame_header_->payload_length = payload_length; | |
| 158 current_read_pos_ += current - start; | |
| 159 DCHECK_EQ(0u, frame_offset_); | |
| 160 } | |
| 161 | |
| 162 scoped_ptr<WebSocketPartialFrame> WebSocketFrameParser::DecodeFramePayload() { | |
| 163 static const int kMaskingKeyLength = WebSocketFrameHeader::kMaskingKeyLength; | |
| 164 | |
| 165 const char* current = &buffer_.front() + current_read_pos_; | |
| 166 const char* end = &buffer_.front() + buffer_.size(); | |
| 167 uint64 next_size = std::min<uint64>( | |
| 168 end - current, | |
| 169 current_frame_header_->payload_length - frame_offset_); | |
| 170 | |
| 171 scoped_ptr<WebSocketPartialFrame> frame(new WebSocketPartialFrame); | |
| 172 frame->header = current_frame_header_; | |
| 173 frame->final_part = false; | |
| 174 frame->data.assign(current, current + next_size); | |
| 175 if (current_frame_header_->masked) { | |
| 176 // Unmask the payload. | |
| 177 // TODO(yutak): This could be faster by doing unmasking for each | |
| 178 // machine word (instead of each byte). | |
| 179 size_t key_offset = frame_offset_ % kMaskingKeyLength; | |
| 180 for (uint64 i = 0; i < next_size; ++i) { | |
| 181 frame->data[i] ^= masking_key_[key_offset]; | |
| 182 key_offset = (key_offset + 1) % kMaskingKeyLength; | |
| 183 } | |
| 184 } | |
| 185 | |
| 186 current_read_pos_ += next_size; | |
| 187 frame_offset_ += next_size; | |
| 188 | |
| 189 DCHECK_LE(frame_offset_, current_frame_header_->payload_length); | |
| 190 if (frame_offset_ == current_frame_header_->payload_length) { | |
| 191 frame->final_part = true; | |
| 192 current_frame_header_ = NULL; | |
| 193 frame_offset_ = 0; | |
| 194 std::fill(masking_key_, masking_key_ + kMaskingKeyLength, '\0'); | |
| 195 } | |
| 196 | |
| 197 return frame.Pass(); | |
| 198 } | |
| 199 | |
| 200 } // namespace net | |
| OLD | NEW |