Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1255)

Side by Side Diff: remoting/host/security_key/security_key_message_handler.cc

Issue 2162083003: Renaming Gnubby and RemoteSecurityKey files/classes/members (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@master
Patch Set: Fixing a GYP build error Created 4 years, 5 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
1 // Copyright 2016 The Chromium Authors. All rights reserved. 1 // Copyright 2016 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include "remoting/host/security_key/remote_security_key_message_handler.h" 5 #include "remoting/host/security_key/security_key_message_handler.h"
6 6
7 #include <cstdint> 7 #include <cstdint>
8 #include <string> 8 #include <string>
9 #include <utility> 9 #include <utility>
10 10
11 #include "base/bind.h" 11 #include "base/bind.h"
12 #include "base/callback.h" 12 #include "base/callback.h"
13 #include "base/callback_helpers.h" 13 #include "base/callback_helpers.h"
14 #include "remoting/host/security_key/remote_security_key_ipc_client.h" 14 #include "remoting/host/security_key/security_key_ipc_client.h"
15 #include "remoting/host/security_key/remote_security_key_ipc_constants.h" 15 #include "remoting/host/security_key/security_key_ipc_constants.h"
16 #include "remoting/host/security_key/remote_security_key_message_reader_impl.h" 16 #include "remoting/host/security_key/security_key_message_reader_impl.h"
17 #include "remoting/host/security_key/remote_security_key_message_writer_impl.h" 17 #include "remoting/host/security_key/security_key_message_writer_impl.h"
18 18
19 namespace remoting { 19 namespace remoting {
20 20
21 RemoteSecurityKeyMessageHandler::RemoteSecurityKeyMessageHandler() {} 21 SecurityKeyMessageHandler::SecurityKeyMessageHandler() {}
22 22
23 RemoteSecurityKeyMessageHandler::~RemoteSecurityKeyMessageHandler() {} 23 SecurityKeyMessageHandler::~SecurityKeyMessageHandler() {}
24 24
25 void RemoteSecurityKeyMessageHandler::Start( 25 void SecurityKeyMessageHandler::Start(
26 base::File message_read_stream, 26 base::File message_read_stream,
27 base::File message_write_stream, 27 base::File message_write_stream,
28 std::unique_ptr<RemoteSecurityKeyIpcClient> ipc_client, 28 std::unique_ptr<SecurityKeyIpcClient> ipc_client,
29 const base::Closure& error_callback) { 29 const base::Closure& error_callback) {
30 DCHECK(thread_checker_.CalledOnValidThread()); 30 DCHECK(thread_checker_.CalledOnValidThread());
31 DCHECK(message_read_stream.IsValid()); 31 DCHECK(message_read_stream.IsValid());
32 DCHECK(message_write_stream.IsValid()); 32 DCHECK(message_write_stream.IsValid());
33 DCHECK(ipc_client); 33 DCHECK(ipc_client);
34 DCHECK(!error_callback.is_null()); 34 DCHECK(!error_callback.is_null());
35 DCHECK(error_callback_.is_null()); 35 DCHECK(error_callback_.is_null());
36 36
37 if (!reader_) { 37 if (!reader_) {
38 reader_.reset( 38 reader_.reset(
39 new RemoteSecurityKeyMessageReaderImpl(std::move(message_read_stream))); 39 new SecurityKeyMessageReaderImpl(std::move(message_read_stream)));
40 } 40 }
41 41
42 if (!writer_) { 42 if (!writer_) {
43 writer_.reset(new RemoteSecurityKeyMessageWriterImpl( 43 writer_.reset(
44 std::move(message_write_stream))); 44 new SecurityKeyMessageWriterImpl(std::move(message_write_stream)));
45 } 45 }
46 46
47 ipc_client_ = std::move(ipc_client); 47 ipc_client_ = std::move(ipc_client);
48 error_callback_ = error_callback; 48 error_callback_ = error_callback;
49 49
50 reader_->Start( 50 reader_->Start(
51 base::Bind( 51 base::Bind(&SecurityKeyMessageHandler::ProcessSecurityKeyMessage,
52 &RemoteSecurityKeyMessageHandler::ProcessRemoteSecurityKeyMessage, 52 base::Unretained(this)),
53 base::Unretained(this)), 53 base::Bind(&SecurityKeyMessageHandler::OnError, base::Unretained(this)));
54 base::Bind(&RemoteSecurityKeyMessageHandler::OnError,
55 base::Unretained(this)));
56 } 54 }
57 55
58 void RemoteSecurityKeyMessageHandler::SetRemoteSecurityKeyMessageReaderForTest( 56 void SecurityKeyMessageHandler::SetSecurityKeyMessageReaderForTest(
59 std::unique_ptr<RemoteSecurityKeyMessageReader> reader) { 57 std::unique_ptr<SecurityKeyMessageReader> reader) {
60 DCHECK(!reader_); 58 DCHECK(!reader_);
61 reader_ = std::move(reader); 59 reader_ = std::move(reader);
62 } 60 }
63 61
64 void RemoteSecurityKeyMessageHandler::SetRemoteSecurityKeyMessageWriterForTest( 62 void SecurityKeyMessageHandler::SetSecurityKeyMessageWriterForTest(
65 std::unique_ptr<RemoteSecurityKeyMessageWriter> writer) { 63 std::unique_ptr<SecurityKeyMessageWriter> writer) {
66 DCHECK(!writer_); 64 DCHECK(!writer_);
67 writer_ = std::move(writer); 65 writer_ = std::move(writer);
68 } 66 }
69 67
70 void RemoteSecurityKeyMessageHandler::ProcessRemoteSecurityKeyMessage( 68 void SecurityKeyMessageHandler::ProcessSecurityKeyMessage(
71 std::unique_ptr<SecurityKeyMessage> message) { 69 std::unique_ptr<SecurityKeyMessage> message) {
72 DCHECK(thread_checker_.CalledOnValidThread()); 70 DCHECK(thread_checker_.CalledOnValidThread());
73 71
74 RemoteSecurityKeyMessageType message_type = message->type(); 72 SecurityKeyMessageType message_type = message->type();
75 if (message_type == RemoteSecurityKeyMessageType::CONNECT) { 73 if (message_type == SecurityKeyMessageType::CONNECT) {
76 HandleConnectRequest(message->payload()); 74 HandleConnectRequest(message->payload());
77 } else if (message_type == RemoteSecurityKeyMessageType::REQUEST) { 75 } else if (message_type == SecurityKeyMessageType::REQUEST) {
78 HandleSecurityKeyRequest(message->payload()); 76 HandleSecurityKeyRequest(message->payload());
79 } else { 77 } else {
80 LOG(ERROR) << "Unknown message type: " 78 LOG(ERROR) << "Unknown message type: "
81 << static_cast<uint8_t>(message_type); 79 << static_cast<uint8_t>(message_type);
82 SendMessage(RemoteSecurityKeyMessageType::UNKNOWN_COMMAND); 80 SendMessage(SecurityKeyMessageType::UNKNOWN_COMMAND);
83 } 81 }
84 } 82 }
85 83
86 void RemoteSecurityKeyMessageHandler::HandleIpcConnectionChange( 84 void SecurityKeyMessageHandler::HandleIpcConnectionChange(
87 bool connection_established) { 85 bool connection_established) {
88 DCHECK(thread_checker_.CalledOnValidThread()); 86 DCHECK(thread_checker_.CalledOnValidThread());
89 if (connection_established) { 87 if (connection_established) {
90 SendMessageWithPayload(RemoteSecurityKeyMessageType::CONNECT_RESPONSE, 88 SendMessageWithPayload(SecurityKeyMessageType::CONNECT_RESPONSE,
91 std::string(1, kConnectResponseActiveSession)); 89 std::string(1, kConnectResponseActiveSession));
92 } else { 90 } else {
93 SendMessageWithPayload( 91 SendMessageWithPayload(
94 RemoteSecurityKeyMessageType::CONNECT_ERROR, 92 SecurityKeyMessageType::CONNECT_ERROR,
95 "Unknown error occurred while establishing connection."); 93 "Unknown error occurred while establishing connection.");
96 } 94 }
97 } 95 }
98 96
99 void RemoteSecurityKeyMessageHandler::HandleSecurityKeyResponse( 97 void SecurityKeyMessageHandler::HandleSecurityKeyResponse(
100 const std::string& response_data) { 98 const std::string& response_data) {
101 if (response_data.compare(kRemoteSecurityKeyConnectionError) == 0) { 99 if (response_data.compare(kSecurityKeyConnectionError) == 0) {
102 SendMessageWithPayload(RemoteSecurityKeyMessageType::REQUEST_ERROR, 100 SendMessageWithPayload(SecurityKeyMessageType::REQUEST_ERROR,
103 "An error occurred during the request."); 101 "An error occurred during the request.");
104 return; 102 return;
105 } 103 }
106 104
107 if (response_data.empty()) { 105 if (response_data.empty()) {
108 SendMessageWithPayload(RemoteSecurityKeyMessageType::REQUEST_ERROR, 106 SendMessageWithPayload(SecurityKeyMessageType::REQUEST_ERROR,
109 "Invalid client response received."); 107 "Invalid client response received.");
110 return; 108 return;
111 } 109 }
112 110
113 SendMessageWithPayload(RemoteSecurityKeyMessageType::REQUEST_RESPONSE, 111 SendMessageWithPayload(SecurityKeyMessageType::REQUEST_RESPONSE,
114 response_data); 112 response_data);
115 } 113 }
116 114
117 void RemoteSecurityKeyMessageHandler::HandleConnectRequest( 115 void SecurityKeyMessageHandler::HandleConnectRequest(
118 const std::string& message_payload) { 116 const std::string& message_payload) {
119 DCHECK(thread_checker_.CalledOnValidThread()); 117 DCHECK(thread_checker_.CalledOnValidThread());
120 if (!message_payload.empty()) { 118 if (!message_payload.empty()) {
121 SendMessageWithPayload(RemoteSecurityKeyMessageType::CONNECT_ERROR, 119 SendMessageWithPayload(SecurityKeyMessageType::CONNECT_ERROR,
122 "Unexpected payload data received."); 120 "Unexpected payload data received.");
123 return; 121 return;
124 } 122 }
125 123
126 if (ipc_client_->WaitForSecurityKeyIpcServerChannel()) { 124 if (ipc_client_->WaitForSecurityKeyIpcServerChannel()) {
127 // If we find an IPC server, then attempt to establish a connection. 125 // If we find an IPC server, then attempt to establish a connection.
128 ipc_client_->EstablishIpcConnection( 126 ipc_client_->EstablishIpcConnection(
129 base::Bind(&RemoteSecurityKeyMessageHandler::HandleIpcConnectionChange, 127 base::Bind(&SecurityKeyMessageHandler::HandleIpcConnectionChange,
130 base::Unretained(this), true), 128 base::Unretained(this), true),
131 base::Bind(&RemoteSecurityKeyMessageHandler::HandleIpcConnectionChange, 129 base::Bind(&SecurityKeyMessageHandler::HandleIpcConnectionChange,
132 base::Unretained(this), false)); 130 base::Unretained(this), false));
133 } else { 131 } else {
134 SendMessageWithPayload(RemoteSecurityKeyMessageType::CONNECT_RESPONSE, 132 SendMessageWithPayload(SecurityKeyMessageType::CONNECT_RESPONSE,
135 std::string(1, kConnectResponseNoSession)); 133 std::string(1, kConnectResponseNoSession));
136 } 134 }
137 } 135 }
138 136
139 void RemoteSecurityKeyMessageHandler::HandleSecurityKeyRequest( 137 void SecurityKeyMessageHandler::HandleSecurityKeyRequest(
140 const std::string& message_payload) { 138 const std::string& message_payload) {
141 DCHECK(thread_checker_.CalledOnValidThread()); 139 DCHECK(thread_checker_.CalledOnValidThread());
142 if (message_payload.empty()) { 140 if (message_payload.empty()) {
143 SendMessageWithPayload(RemoteSecurityKeyMessageType::REQUEST_ERROR, 141 SendMessageWithPayload(SecurityKeyMessageType::REQUEST_ERROR,
144 "Request sent without request data."); 142 "Request sent without request data.");
145 return; 143 return;
146 } 144 }
147 145
148 if (!ipc_client_->SendSecurityKeyRequest( 146 if (!ipc_client_->SendSecurityKeyRequest(
149 message_payload, 147 message_payload,
150 base::Bind( 148 base::Bind(&SecurityKeyMessageHandler::HandleSecurityKeyResponse,
151 &RemoteSecurityKeyMessageHandler::HandleSecurityKeyResponse, 149 base::Unretained(this)))) {
152 base::Unretained(this)))) { 150 SendMessageWithPayload(SecurityKeyMessageType::REQUEST_ERROR,
153 SendMessageWithPayload(RemoteSecurityKeyMessageType::REQUEST_ERROR,
154 "Failed to send request data."); 151 "Failed to send request data.");
155 } 152 }
156 } 153 }
157 154
158 void RemoteSecurityKeyMessageHandler::SendMessage( 155 void SecurityKeyMessageHandler::SendMessage(
159 RemoteSecurityKeyMessageType message_type) { 156 SecurityKeyMessageType message_type) {
160 if (!writer_->WriteMessage(message_type)) { 157 if (!writer_->WriteMessage(message_type)) {
161 OnError(); 158 OnError();
162 } 159 }
163 } 160 }
164 161
165 void RemoteSecurityKeyMessageHandler::SendMessageWithPayload( 162 void SecurityKeyMessageHandler::SendMessageWithPayload(
166 RemoteSecurityKeyMessageType message_type, 163 SecurityKeyMessageType message_type,
167 const std::string& message_payload) { 164 const std::string& message_payload) {
168 if (!writer_->WriteMessageWithPayload(message_type, message_payload)) { 165 if (!writer_->WriteMessageWithPayload(message_type, message_payload)) {
169 OnError(); 166 OnError();
170 } 167 }
171 } 168 }
172 169
173 void RemoteSecurityKeyMessageHandler::OnError() { 170 void SecurityKeyMessageHandler::OnError() {
174 DCHECK(thread_checker_.CalledOnValidThread()); 171 DCHECK(thread_checker_.CalledOnValidThread());
175 ipc_client_.reset(); 172 ipc_client_.reset();
176 writer_.reset(); 173 writer_.reset();
177 reader_.reset(); 174 reader_.reset();
178 175
179 if (!error_callback_.is_null()) { 176 if (!error_callback_.is_null()) {
180 base::ResetAndReturn(&error_callback_).Run(); 177 base::ResetAndReturn(&error_callback_).Run();
181 } 178 }
182 } 179 }
183 180
184 } // namespace remoting 181 } // namespace remoting
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698