Index: net/quic/quic_buffered_packet_store.cc |
diff --git a/net/quic/quic_buffered_packet_store.cc b/net/quic/quic_buffered_packet_store.cc |
new file mode 100644 |
index 0000000000000000000000000000000000000000..45077bda27331b47209eca4ae98de84408a5a0f7 |
--- /dev/null |
+++ b/net/quic/quic_buffered_packet_store.cc |
@@ -0,0 +1,142 @@ |
+// Copyright (c) 2016 The Chromium Authors. All rights reserved. |
+// Use of this source code is governed by a BSD-style license that can be |
+// found in the LICENSE file. |
+ |
+#include "net/quic/quic_buffered_packet_store.h" |
+ |
+#include <list> |
+ |
+#include "base/stl_util.h" |
+ |
+namespace net { |
+ |
+typedef QuicBufferedPacketStore::BufferedPacket BufferedPacket; |
+typedef QuicBufferedPacketStore::EnqueuePacketResult EnqueuePacketResult; |
+typedef QuicBufferedPacketStore::BufferedPacketList BufferedPacketList; |
+ |
+// Max number of connections this store can keep track. |
+static const size_t kDefaultMaxConnectionsInStore = 100; |
+ |
+namespace { |
+ |
+// This alarm removes expired entries in map each time this alarm fires. |
+class NET_EXPORT_PRIVATE ConnectionExpireAlarm : public QuicAlarm::Delegate { |
Ryan Hamilton
2016/05/27 15:47:51
From the windows error message, I think you don't
|
+ public: |
+ explicit ConnectionExpireAlarm(QuicBufferedPacketStore* store) |
+ : connection_store_(store) {} |
+ |
+ void OnAlarm() override { connection_store_->OnExpirationTimeout(); } |
+ |
+ // Disallow copy and asign. |
+ ConnectionExpireAlarm(const ConnectionExpireAlarm&) = delete; |
+ ConnectionExpireAlarm& operator=(const ConnectionExpireAlarm&) = delete; |
+ |
+ private: |
+ QuicBufferedPacketStore* connection_store_; |
+}; |
+ |
+} // namespace |
+ |
+BufferedPacket::BufferedPacket(std::unique_ptr<QuicEncryptedPacket> packet, |
+ IPEndPoint server_address, |
+ IPEndPoint client_address) |
+ : packet(std::move(packet)), |
+ server_address(server_address), |
+ client_address(client_address) {} |
+ |
+BufferedPacket::BufferedPacket(BufferedPacket&& other) = default; |
+ |
+BufferedPacket& BufferedPacket::operator=(BufferedPacket&& other) = default; |
+ |
+BufferedPacket::~BufferedPacket() {} |
+ |
+BufferedPacketList::BufferedPacketList() : creation_time(QuicTime::Zero()) {} |
+ |
+BufferedPacketList::BufferedPacketList(BufferedPacketList&& other) = default; |
+ |
+BufferedPacketList& BufferedPacketList::operator=(BufferedPacketList&& other) = |
+ default; |
+ |
+BufferedPacketList::~BufferedPacketList() {} |
+ |
+QuicBufferedPacketStore::QuicBufferedPacketStore( |
+ VisitorInterface* visitor, |
+ QuicClock* clock, |
+ QuicAlarmFactory* alarm_factory) |
+ : connection_life_span_( |
+ QuicTime::Delta::FromSeconds(kInitialIdleTimeoutSecs)), |
+ visitor_(visitor), |
+ clock_(clock), |
+ expiration_alarm_( |
+ alarm_factory->CreateAlarm(new ConnectionExpireAlarm(this))) {} |
+ |
+QuicBufferedPacketStore::~QuicBufferedPacketStore() {} |
+ |
+EnqueuePacketResult QuicBufferedPacketStore::EnqueuePacket( |
+ QuicConnectionId connection_id, |
+ const QuicEncryptedPacket& packet, |
+ IPEndPoint server_address, |
+ IPEndPoint client_address) { |
+ if (!ContainsKey(undecryptable_packets_, connection_id) && |
+ undecryptable_packets_.size() >= kDefaultMaxConnectionsInStore) { |
+ // Drop the packet if store can't keep track of more connections. |
+ return TOO_MANY_CONNECTIONS; |
+ } else if (!ContainsKey(undecryptable_packets_, connection_id)) { |
+ undecryptable_packets_.emplace( |
+ std::make_pair(connection_id, BufferedPacketList())); |
+ } |
+ CHECK(ContainsKey(undecryptable_packets_, connection_id)); |
+ BufferedPacketList& queue = |
+ undecryptable_packets_.find(connection_id)->second; |
+ |
+ if (queue.buffered_packets.size() >= kDefaultMaxUndecryptablePackets) { |
+ // If there are kMaxBufferedPacketsPerConnection packets buffered up for |
+ // this connection, drop the current packet. |
+ return TOO_MANY_PACKETS; |
+ } |
+ |
+ if (queue.buffered_packets.empty()) { |
+ // If this is the first packet arrived on a new connection, initialize the |
+ // creation time. |
+ queue.creation_time = clock_->ApproximateNow(); |
+ } |
+ |
+ BufferedPacket new_entry(std::unique_ptr<QuicEncryptedPacket>(packet.Clone()), |
+ server_address, client_address); |
+ |
+ queue.buffered_packets.push_back(std::move(new_entry)); |
+ |
+ if (!expiration_alarm_->IsSet()) { |
+ expiration_alarm_->Set(clock_->ApproximateNow().Add(connection_life_span_)); |
+ } |
+ return SUCCESS; |
+} |
+ |
+std::list<BufferedPacket> QuicBufferedPacketStore::DeliverPackets( |
+ QuicConnectionId connection_id) { |
+ std::list<BufferedPacket> packets_to_deliver; |
+ auto it = undecryptable_packets_.find(connection_id); |
+ if (it != undecryptable_packets_.end()) { |
+ packets_to_deliver = std::move(it->second.buffered_packets); |
+ undecryptable_packets_.erase(connection_id); |
+ } |
+ return packets_to_deliver; |
+} |
+ |
+void QuicBufferedPacketStore::OnExpirationTimeout() { |
+ QuicTime expiration_time = |
+ clock_->ApproximateNow().Subtract(connection_life_span_); |
+ while (!undecryptable_packets_.empty()) { |
+ auto& entry = undecryptable_packets_.front(); |
+ if (entry.second.creation_time > expiration_time) { |
+ break; |
+ } |
+ visitor_->OnExpiredPackets(entry.first, std::move(entry.second)); |
+ undecryptable_packets_.erase(undecryptable_packets_.begin()); |
+ } |
+ if (!undecryptable_packets_.empty()) { |
+ expiration_alarm_->Set(clock_->ApproximateNow().Add(connection_life_span_)); |
+ } |
+} |
+ |
+} // namespace net |