Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(164)

Side by Side Diff: net/quic/quic_crypto_server_stream.cc

Issue 1565303002: Change IPEndpoint::address() to return a net::IPAddress (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: rebase for ChromeOS Created 4 years, 11 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « net/quic/quic_connection_logger.cc ('k') | net/quic/quic_framer_test.cc » ('j') | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "net/quic/quic_crypto_server_stream.h" 5 #include "net/quic/quic_crypto_server_stream.h"
6 6
7 #include "base/base64.h" 7 #include "base/base64.h"
8 #include "crypto/secure_hash.h" 8 #include "crypto/secure_hash.h"
9 #include "net/quic/crypto/crypto_protocol.h" 9 #include "net/quic/crypto/crypto_protocol.h"
10 #include "net/quic/crypto/crypto_utils.h" 10 #include "net/quic/crypto/crypto_utils.h"
(...skipping 94 matching lines...) Expand 10 before | Expand all | Expand 10 after
105 // does not allow for clients to send multiple handshake messages 105 // does not allow for clients to send multiple handshake messages
106 // before the server has a chance to respond. 106 // before the server has a chance to respond.
107 CloseConnectionWithDetails( 107 CloseConnectionWithDetails(
108 QUIC_CRYPTO_MESSAGE_WHILE_VALIDATING_CLIENT_HELLO, 108 QUIC_CRYPTO_MESSAGE_WHILE_VALIDATING_CLIENT_HELLO,
109 "Unexpected handshake message while processing CHLO"); 109 "Unexpected handshake message while processing CHLO");
110 return; 110 return;
111 } 111 }
112 112
113 validate_client_hello_cb_ = new ValidateCallback(this); 113 validate_client_hello_cb_ = new ValidateCallback(this);
114 return crypto_config_->ValidateClientHello( 114 return crypto_config_->ValidateClientHello(
115 message, session()->connection()->peer_address().address(), 115 message, session()->connection()->peer_address().address().bytes(),
116 session()->connection()->self_address().address(), version(), 116 session()->connection()->self_address().address().bytes(), version(),
117 session()->connection()->clock(), &crypto_proof_, 117 session()->connection()->clock(), &crypto_proof_,
118 validate_client_hello_cb_); 118 validate_client_hello_cb_);
119 } 119 }
120 120
121 void QuicCryptoServerStream::FinishProcessingHandshakeMessage( 121 void QuicCryptoServerStream::FinishProcessingHandshakeMessage(
122 const CryptoHandshakeMessage& message, 122 const CryptoHandshakeMessage& message,
123 const ValidateClientHelloResultCallback::Result& result) { 123 const ValidateClientHelloResultCallback::Result& result) {
124 // Clear the callback that got us here. 124 // Clear the callback that got us here.
125 DCHECK(validate_client_hello_cb_ != nullptr); 125 DCHECK(validate_client_hello_cb_ != nullptr);
126 validate_client_hello_cb_ = nullptr; 126 validate_client_hello_cb_ = nullptr;
(...skipping 87 matching lines...) Expand 10 before | Expand all | Expand 10 after
214 214
215 void QuicCryptoServerStream::SendServerConfigUpdate( 215 void QuicCryptoServerStream::SendServerConfigUpdate(
216 const CachedNetworkParameters* cached_network_params) { 216 const CachedNetworkParameters* cached_network_params) {
217 if (!handshake_confirmed_) { 217 if (!handshake_confirmed_) {
218 return; 218 return;
219 } 219 }
220 220
221 CryptoHandshakeMessage server_config_update_message; 221 CryptoHandshakeMessage server_config_update_message;
222 if (!crypto_config_->BuildServerConfigUpdateMessage( 222 if (!crypto_config_->BuildServerConfigUpdateMessage(
223 session()->connection()->version(), previous_source_address_tokens_, 223 session()->connection()->version(), previous_source_address_tokens_,
224 session()->connection()->self_address().address(), 224 session()->connection()->self_address().address().bytes(),
225 session()->connection()->peer_address().address(), 225 session()->connection()->peer_address().address().bytes(),
226 session()->connection()->clock(), 226 session()->connection()->clock(),
227 session()->connection()->random_generator(), 227 session()->connection()->random_generator(),
228 crypto_negotiated_params_, cached_network_params, 228 crypto_negotiated_params_, cached_network_params,
229 &server_config_update_message)) { 229 &server_config_update_message)) {
230 DVLOG(1) << "Server: Failed to build server config update (SCUP)!"; 230 DVLOG(1) << "Server: Failed to build server config update (SCUP)!";
231 return; 231 return;
232 } 232 }
233 233
234 DVLOG(1) << "Server: Sending server config update: " 234 DVLOG(1) << "Server: Sending server config update: "
235 << server_config_update_message.DebugString(); 235 << server_config_update_message.DebugString();
(...skipping 90 matching lines...) Expand 10 before | Expand all | Expand 10 after
326 326
327 const bool use_stateless_rejects_in_crypto_config = 327 const bool use_stateless_rejects_in_crypto_config =
328 use_stateless_rejects_if_peer_supported_ && 328 use_stateless_rejects_if_peer_supported_ &&
329 peer_supports_stateless_rejects_; 329 peer_supports_stateless_rejects_;
330 QuicConnection* connection = session()->connection(); 330 QuicConnection* connection = session()->connection();
331 const QuicConnectionId server_designated_connection_id = 331 const QuicConnectionId server_designated_connection_id =
332 use_stateless_rejects_in_crypto_config 332 use_stateless_rejects_in_crypto_config
333 ? GenerateConnectionIdForReject(connection->connection_id()) 333 ? GenerateConnectionIdForReject(connection->connection_id())
334 : 0; 334 : 0;
335 return crypto_config_->ProcessClientHello( 335 return crypto_config_->ProcessClientHello(
336 result, connection->connection_id(), connection->self_address().address(), 336 result, connection->connection_id(),
337 connection->peer_address(), version(), connection->supported_versions(), 337 connection->self_address().address().bytes(), connection->peer_address(),
338 version(), connection->supported_versions(),
338 use_stateless_rejects_in_crypto_config, server_designated_connection_id, 339 use_stateless_rejects_in_crypto_config, server_designated_connection_id,
339 connection->clock(), connection->random_generator(), 340 connection->clock(), connection->random_generator(),
340 &crypto_negotiated_params_, &crypto_proof_, reply, error_details); 341 &crypto_negotiated_params_, &crypto_proof_, reply, error_details);
341 } 342 }
342 343
343 void QuicCryptoServerStream::OverrideQuicConfigDefaults(QuicConfig* config) {} 344 void QuicCryptoServerStream::OverrideQuicConfigDefaults(QuicConfig* config) {}
344 345
345 QuicCryptoServerStream::ValidateCallback::ValidateCallback( 346 QuicCryptoServerStream::ValidateCallback::ValidateCallback(
346 QuicCryptoServerStream* parent) 347 QuicCryptoServerStream* parent)
347 : parent_(parent) {} 348 : parent_(parent) {}
(...skipping 29 matching lines...) Expand all
377 } 378 }
378 for (size_t i = 0; i < received_tags_length; ++i) { 379 for (size_t i = 0; i < received_tags_length; ++i) {
379 if (received_tags[i] == kSREJ) { 380 if (received_tags[i] == kSREJ) {
380 return true; 381 return true;
381 } 382 }
382 } 383 }
383 return false; 384 return false;
384 } 385 }
385 386
386 } // namespace net 387 } // namespace net
OLDNEW
« no previous file with comments | « net/quic/quic_connection_logger.cc ('k') | net/quic/quic_framer_test.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698