Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(8)

Side by Side Diff: remoting/host/security_key/remote_security_key_message_reader.cc

Issue 2162083003: Renaming Gnubby and RemoteSecurityKey files/classes/members (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fixing a GYP build error Created 4 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2016 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "remoting/host/security_key/remote_security_key_message_reader.h"
6
7 #include <cstdint>
8 #include <string>
9 #include <utility>
10
11 #include "base/bind.h"
12 #include "base/files/file.h"
13 #include "base/macros.h"
14 #include "base/single_thread_task_runner.h"
15 #include "base/stl_util.h"
16 #include "base/threading/thread_task_runner_handle.h"
17 #include "remoting/host/security_key/security_key_message.h"
18
19 namespace remoting {
20
21 RemoteSecurityKeyMessageReader::RemoteSecurityKeyMessageReader(
22 base::File input_file)
23 : read_stream_(std::move(input_file)),
24 reader_thread_("RemoteSecurityKeyMessageReader"),
25 weak_factory_(this) {
26 base::Thread::Options options;
27 options.message_loop_type = base::MessageLoop::TYPE_IO;
28 reader_thread_.StartWithOptions(options);
29
30 read_task_runner_ = reader_thread_.task_runner();
31 main_task_runner_ = base::ThreadTaskRunnerHandle::Get();
32 }
33
34 RemoteSecurityKeyMessageReader::~RemoteSecurityKeyMessageReader() {
35 DCHECK(main_task_runner_->RunsTasksOnCurrentThread());
36
37 // In order to ensure the reader thread is stopped cleanly, we close the
38 // stream it is blocking on and then wait for the thread to exit.
39 read_stream_.Close();
40 reader_thread_.Stop();
41 }
42
43 void RemoteSecurityKeyMessageReader::Start(
44 SecurityKeyMessageCallback message_callback,
45 base::Closure error_callback) {
46 DCHECK(main_task_runner_->RunsTasksOnCurrentThread());
47
48 message_callback_ = message_callback;
49 error_callback_ = error_callback;
50
51 // base::Unretained is safe since this class owns the thread running this task
52 // which will be destroyed before this instance is.
53 read_task_runner_->PostTask(
54 FROM_HERE, base::Bind(&RemoteSecurityKeyMessageReader::ReadMessage,
55 base::Unretained(this)));
56 }
57
58 void RemoteSecurityKeyMessageReader::ReadMessage() {
59 DCHECK(read_task_runner_->RunsTasksOnCurrentThread());
60
61 while (true) {
62 if (!read_stream_.IsValid()) {
63 LOG(ERROR) << "Cannot read from invalid stream.";
64 NotifyError();
65 return;
66 }
67
68 // Read the message header to retrieve the remaining message length.
69 uint32_t total_message_size_bytes;
70 int read_result = read_stream_.ReadAtCurrentPos(
71 reinterpret_cast<char*>(&total_message_size_bytes),
72 SecurityKeyMessage::kHeaderSizeBytes);
73 if (read_result != SecurityKeyMessage::kHeaderSizeBytes) {
74 // 0 means EOF which is normal and should not be logged as an error.
75 if (read_result != 0) {
76 LOG(ERROR) << "Failed to read message header, read returned "
77 << read_result;
78 }
79 NotifyError();
80 return;
81 }
82
83 if (!SecurityKeyMessage::IsValidMessageSize(total_message_size_bytes)) {
84 LOG(ERROR) << "Message size too large: " << total_message_size_bytes;
85 NotifyError();
86 return;
87 }
88
89 std::string message_data(total_message_size_bytes, '\0');
90 read_result = read_stream_.ReadAtCurrentPos(string_as_array(&message_data),
91 total_message_size_bytes);
92 // The static cast is safe as we know the value is smaller than max int.
93 if (read_result != static_cast<int>(total_message_size_bytes)) {
94 LOG(ERROR) << "Failed to read message: " << read_result;
95 NotifyError();
96 return;
97 }
98
99 std::unique_ptr<SecurityKeyMessage> message(new SecurityKeyMessage());
100 if (!message->ParseMessage(message_data)) {
101 LOG(ERROR) << "Invalid message data received.";
102 NotifyError();
103 return;
104 }
105
106 // Notify callback of the new message received.
107 main_task_runner_->PostTask(
108 FROM_HERE,
109 base::Bind(&RemoteSecurityKeyMessageReader::InvokeMessageCallback,
110 weak_factory_.GetWeakPtr(), base::Passed(&message)));
111 }
112 }
113
114 void RemoteSecurityKeyMessageReader::NotifyError() {
115 DCHECK(read_task_runner_->RunsTasksOnCurrentThread());
116
117 main_task_runner_->PostTask(
118 FROM_HERE,
119 base::Bind(&RemoteSecurityKeyMessageReader::InvokeErrorCallback,
120 weak_factory_.GetWeakPtr()));
121 }
122
123 void RemoteSecurityKeyMessageReader::InvokeMessageCallback(
124 std::unique_ptr<SecurityKeyMessage> message) {
125 DCHECK(main_task_runner_->RunsTasksOnCurrentThread());
126 message_callback_.Run(std::move(message));
127 }
128
129 void RemoteSecurityKeyMessageReader::InvokeErrorCallback() {
130 DCHECK(main_task_runner_->RunsTasksOnCurrentThread());
131 error_callback_.Run();
132 }
133
134 } // namespace remoting
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698