OLD | NEW |
1 // Copyright (c) 2016 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2016 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/core/quic_buffered_packet_store.h" | 5 #include "net/quic/core/quic_buffered_packet_store.h" |
6 | 6 |
7 #include <list> | 7 #include <list> |
8 | 8 |
9 #include "base/stl_util.h" | 9 #include "base/stl_util.h" |
10 | 10 |
(...skipping 61 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
72 expiration_alarm_( | 72 expiration_alarm_( |
73 alarm_factory->CreateAlarm(new ConnectionExpireAlarm(this))) {} | 73 alarm_factory->CreateAlarm(new ConnectionExpireAlarm(this))) {} |
74 | 74 |
75 QuicBufferedPacketStore::~QuicBufferedPacketStore() {} | 75 QuicBufferedPacketStore::~QuicBufferedPacketStore() {} |
76 | 76 |
77 EnqueuePacketResult QuicBufferedPacketStore::EnqueuePacket( | 77 EnqueuePacketResult QuicBufferedPacketStore::EnqueuePacket( |
78 QuicConnectionId connection_id, | 78 QuicConnectionId connection_id, |
79 const QuicReceivedPacket& packet, | 79 const QuicReceivedPacket& packet, |
80 IPEndPoint server_address, | 80 IPEndPoint server_address, |
81 IPEndPoint client_address) { | 81 IPEndPoint client_address) { |
82 if (!ContainsKey(undecryptable_packets_, connection_id) && | 82 if (!base::ContainsKey(undecryptable_packets_, connection_id) && |
83 undecryptable_packets_.size() >= kDefaultMaxConnectionsInStore) { | 83 undecryptable_packets_.size() >= kDefaultMaxConnectionsInStore) { |
84 // Drop the packet if store can't keep track of more connections. | 84 // Drop the packet if store can't keep track of more connections. |
85 return TOO_MANY_CONNECTIONS; | 85 return TOO_MANY_CONNECTIONS; |
86 } else if (!ContainsKey(undecryptable_packets_, connection_id)) { | 86 } else if (!base::ContainsKey(undecryptable_packets_, connection_id)) { |
87 undecryptable_packets_.emplace( | 87 undecryptable_packets_.emplace( |
88 std::make_pair(connection_id, BufferedPacketList())); | 88 std::make_pair(connection_id, BufferedPacketList())); |
89 } | 89 } |
90 CHECK(ContainsKey(undecryptable_packets_, connection_id)); | 90 CHECK(base::ContainsKey(undecryptable_packets_, connection_id)); |
91 BufferedPacketList& queue = | 91 BufferedPacketList& queue = |
92 undecryptable_packets_.find(connection_id)->second; | 92 undecryptable_packets_.find(connection_id)->second; |
93 | 93 |
94 if (queue.buffered_packets.size() >= kDefaultMaxUndecryptablePackets) { | 94 if (queue.buffered_packets.size() >= kDefaultMaxUndecryptablePackets) { |
95 // If there are kMaxBufferedPacketsPerConnection packets buffered up for | 95 // If there are kMaxBufferedPacketsPerConnection packets buffered up for |
96 // this connection, drop the current packet. | 96 // this connection, drop the current packet. |
97 return TOO_MANY_PACKETS; | 97 return TOO_MANY_PACKETS; |
98 } | 98 } |
99 | 99 |
100 if (queue.buffered_packets.empty()) { | 100 if (queue.buffered_packets.empty()) { |
101 // If this is the first packet arrived on a new connection, initialize the | 101 // If this is the first packet arrived on a new connection, initialize the |
102 // creation time. | 102 // creation time. |
103 queue.creation_time = clock_->ApproximateNow(); | 103 queue.creation_time = clock_->ApproximateNow(); |
104 } | 104 } |
105 | 105 |
106 BufferedPacket new_entry(std::unique_ptr<QuicReceivedPacket>(packet.Clone()), | 106 BufferedPacket new_entry(std::unique_ptr<QuicReceivedPacket>(packet.Clone()), |
107 server_address, client_address); | 107 server_address, client_address); |
108 | 108 |
109 queue.buffered_packets.push_back(std::move(new_entry)); | 109 queue.buffered_packets.push_back(std::move(new_entry)); |
110 | 110 |
111 if (!expiration_alarm_->IsSet()) { | 111 if (!expiration_alarm_->IsSet()) { |
112 expiration_alarm_->Set(clock_->ApproximateNow() + connection_life_span_); | 112 expiration_alarm_->Set(clock_->ApproximateNow() + connection_life_span_); |
113 } | 113 } |
114 return SUCCESS; | 114 return SUCCESS; |
115 } | 115 } |
116 | 116 |
117 bool QuicBufferedPacketStore::HasBufferedPackets( | 117 bool QuicBufferedPacketStore::HasBufferedPackets( |
118 QuicConnectionId connection_id) const { | 118 QuicConnectionId connection_id) const { |
119 return ContainsKey(undecryptable_packets_, connection_id); | 119 return base::ContainsKey(undecryptable_packets_, connection_id); |
120 } | 120 } |
121 | 121 |
122 list<BufferedPacket> QuicBufferedPacketStore::DeliverPackets( | 122 list<BufferedPacket> QuicBufferedPacketStore::DeliverPackets( |
123 QuicConnectionId connection_id) { | 123 QuicConnectionId connection_id) { |
124 list<BufferedPacket> packets_to_deliver; | 124 list<BufferedPacket> packets_to_deliver; |
125 auto it = undecryptable_packets_.find(connection_id); | 125 auto it = undecryptable_packets_.find(connection_id); |
126 if (it != undecryptable_packets_.end()) { | 126 if (it != undecryptable_packets_.end()) { |
127 packets_to_deliver = std::move(it->second.buffered_packets); | 127 packets_to_deliver = std::move(it->second.buffered_packets); |
128 undecryptable_packets_.erase(connection_id); | 128 undecryptable_packets_.erase(connection_id); |
129 } | 129 } |
130 return packets_to_deliver; | 130 return packets_to_deliver; |
131 } | 131 } |
132 | 132 |
133 void QuicBufferedPacketStore::OnExpirationTimeout() { | 133 void QuicBufferedPacketStore::OnExpirationTimeout() { |
134 QuicTime expiration_time = clock_->ApproximateNow() - connection_life_span_; | 134 QuicTime expiration_time = clock_->ApproximateNow() - connection_life_span_; |
135 while (!undecryptable_packets_.empty()) { | 135 while (!undecryptable_packets_.empty()) { |
136 auto& entry = undecryptable_packets_.front(); | 136 auto& entry = undecryptable_packets_.front(); |
137 if (entry.second.creation_time > expiration_time) { | 137 if (entry.second.creation_time > expiration_time) { |
138 break; | 138 break; |
139 } | 139 } |
140 visitor_->OnExpiredPackets(entry.first, std::move(entry.second)); | 140 visitor_->OnExpiredPackets(entry.first, std::move(entry.second)); |
141 undecryptable_packets_.erase(undecryptable_packets_.begin()); | 141 undecryptable_packets_.erase(undecryptable_packets_.begin()); |
142 } | 142 } |
143 if (!undecryptable_packets_.empty()) { | 143 if (!undecryptable_packets_.empty()) { |
144 expiration_alarm_->Set(clock_->ApproximateNow() + connection_life_span_); | 144 expiration_alarm_->Set(clock_->ApproximateNow() + connection_life_span_); |
145 } | 145 } |
146 } | 146 } |
147 | 147 |
148 } // namespace net | 148 } // namespace net |
OLD | NEW |