OLD | NEW |
| (Empty) |
1 // Copyright 2016 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "remoting/host/security_key/remote_security_key_message_reader.h" | |
6 | |
7 #include <cstdint> | |
8 #include <string> | |
9 #include <utility> | |
10 | |
11 #include "base/bind.h" | |
12 #include "base/files/file.h" | |
13 #include "base/macros.h" | |
14 #include "base/single_thread_task_runner.h" | |
15 #include "base/stl_util.h" | |
16 #include "base/threading/thread_task_runner_handle.h" | |
17 #include "remoting/host/security_key/security_key_message.h" | |
18 | |
19 namespace remoting { | |
20 | |
21 RemoteSecurityKeyMessageReader::RemoteSecurityKeyMessageReader( | |
22 base::File input_file) | |
23 : read_stream_(std::move(input_file)), | |
24 reader_thread_("RemoteSecurityKeyMessageReader"), | |
25 weak_factory_(this) { | |
26 base::Thread::Options options; | |
27 options.message_loop_type = base::MessageLoop::TYPE_IO; | |
28 reader_thread_.StartWithOptions(options); | |
29 | |
30 read_task_runner_ = reader_thread_.task_runner(); | |
31 main_task_runner_ = base::ThreadTaskRunnerHandle::Get(); | |
32 } | |
33 | |
34 RemoteSecurityKeyMessageReader::~RemoteSecurityKeyMessageReader() { | |
35 DCHECK(main_task_runner_->RunsTasksOnCurrentThread()); | |
36 | |
37 // In order to ensure the reader thread is stopped cleanly, we close the | |
38 // stream it is blocking on and then wait for the thread to exit. | |
39 read_stream_.Close(); | |
40 reader_thread_.Stop(); | |
41 } | |
42 | |
43 void RemoteSecurityKeyMessageReader::Start( | |
44 SecurityKeyMessageCallback message_callback, | |
45 base::Closure error_callback) { | |
46 DCHECK(main_task_runner_->RunsTasksOnCurrentThread()); | |
47 | |
48 message_callback_ = message_callback; | |
49 error_callback_ = error_callback; | |
50 | |
51 // base::Unretained is safe since this class owns the thread running this task | |
52 // which will be destroyed before this instance is. | |
53 read_task_runner_->PostTask( | |
54 FROM_HERE, base::Bind(&RemoteSecurityKeyMessageReader::ReadMessage, | |
55 base::Unretained(this))); | |
56 } | |
57 | |
58 void RemoteSecurityKeyMessageReader::ReadMessage() { | |
59 DCHECK(read_task_runner_->RunsTasksOnCurrentThread()); | |
60 | |
61 while (true) { | |
62 if (!read_stream_.IsValid()) { | |
63 LOG(ERROR) << "Cannot read from invalid stream."; | |
64 NotifyError(); | |
65 return; | |
66 } | |
67 | |
68 // Read the message header to retrieve the remaining message length. | |
69 uint32_t total_message_size_bytes; | |
70 int read_result = read_stream_.ReadAtCurrentPos( | |
71 reinterpret_cast<char*>(&total_message_size_bytes), | |
72 SecurityKeyMessage::kHeaderSizeBytes); | |
73 if (read_result != SecurityKeyMessage::kHeaderSizeBytes) { | |
74 // 0 means EOF which is normal and should not be logged as an error. | |
75 if (read_result != 0) { | |
76 LOG(ERROR) << "Failed to read message header, read returned " | |
77 << read_result; | |
78 } | |
79 NotifyError(); | |
80 return; | |
81 } | |
82 | |
83 if (!SecurityKeyMessage::IsValidMessageSize(total_message_size_bytes)) { | |
84 LOG(ERROR) << "Message size too large: " << total_message_size_bytes; | |
85 NotifyError(); | |
86 return; | |
87 } | |
88 | |
89 std::string message_data(total_message_size_bytes, '\0'); | |
90 read_result = read_stream_.ReadAtCurrentPos(string_as_array(&message_data), | |
91 total_message_size_bytes); | |
92 // The static cast is safe as we know the value is smaller than max int. | |
93 if (read_result != static_cast<int>(total_message_size_bytes)) { | |
94 LOG(ERROR) << "Failed to read message: " << read_result; | |
95 NotifyError(); | |
96 return; | |
97 } | |
98 | |
99 std::unique_ptr<SecurityKeyMessage> message(new SecurityKeyMessage()); | |
100 if (!message->ParseMessage(message_data)) { | |
101 LOG(ERROR) << "Invalid message data received."; | |
102 NotifyError(); | |
103 return; | |
104 } | |
105 | |
106 // Notify callback of the new message received. | |
107 main_task_runner_->PostTask( | |
108 FROM_HERE, | |
109 base::Bind(&RemoteSecurityKeyMessageReader::InvokeMessageCallback, | |
110 weak_factory_.GetWeakPtr(), base::Passed(&message))); | |
111 } | |
112 } | |
113 | |
114 void RemoteSecurityKeyMessageReader::NotifyError() { | |
115 DCHECK(read_task_runner_->RunsTasksOnCurrentThread()); | |
116 | |
117 main_task_runner_->PostTask( | |
118 FROM_HERE, | |
119 base::Bind(&RemoteSecurityKeyMessageReader::InvokeErrorCallback, | |
120 weak_factory_.GetWeakPtr())); | |
121 } | |
122 | |
123 void RemoteSecurityKeyMessageReader::InvokeMessageCallback( | |
124 std::unique_ptr<SecurityKeyMessage> message) { | |
125 DCHECK(main_task_runner_->RunsTasksOnCurrentThread()); | |
126 message_callback_.Run(std::move(message)); | |
127 } | |
128 | |
129 void RemoteSecurityKeyMessageReader::InvokeErrorCallback() { | |
130 DCHECK(main_task_runner_->RunsTasksOnCurrentThread()); | |
131 error_callback_.Run(); | |
132 } | |
133 | |
134 } // namespace remoting | |
OLD | NEW |