| OLD | NEW |
| 1 // Copyright 2016 The Chromium Authors. All rights reserved. | 1 // Copyright 2016 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "remoting/host/security_key/security_key_socket.h" | 5 #include "remoting/host/security_key/security_key_socket.h" |
| 6 | 6 |
| 7 #include <utility> | 7 #include <utility> |
| 8 | 8 |
| 9 #include "base/callback_helpers.h" | 9 #include "base/callback_helpers.h" |
| 10 #include "base/macros.h" | 10 #include "base/macros.h" |
| (...skipping 24 matching lines...) Expand all Loading... |
| 35 timer_.reset(new base::Timer(false, false)); | 35 timer_.reset(new base::Timer(false, false)); |
| 36 timer_->Start(FROM_HERE, timeout, timeout_callback); | 36 timer_->Start(FROM_HERE, timeout, timeout_callback); |
| 37 } | 37 } |
| 38 | 38 |
| 39 SecurityKeySocket::~SecurityKeySocket() {} | 39 SecurityKeySocket::~SecurityKeySocket() {} |
| 40 | 40 |
| 41 bool SecurityKeySocket::GetAndClearRequestData(std::string* data_out) { | 41 bool SecurityKeySocket::GetAndClearRequestData(std::string* data_out) { |
| 42 DCHECK(thread_checker_.CalledOnValidThread()); | 42 DCHECK(thread_checker_.CalledOnValidThread()); |
| 43 DCHECK(read_completed_); | 43 DCHECK(read_completed_); |
| 44 | 44 |
| 45 if (!read_completed_) | 45 if (!read_completed_) { |
| 46 return false; | 46 return false; |
| 47 if (!IsRequestComplete() || IsRequestTooLarge()) | 47 } |
| 48 if (!IsRequestComplete() || IsRequestTooLarge()) { |
| 48 return false; | 49 return false; |
| 50 } |
| 49 // The request size is not part of the data; don't send it. | 51 // The request size is not part of the data; don't send it. |
| 50 data_out->assign(request_data_.begin() + kRequestSizeBytes, | 52 data_out->assign(request_data_.begin() + kRequestSizeBytes, |
| 51 request_data_.end()); | 53 request_data_.end()); |
| 52 request_data_.clear(); | 54 request_data_.clear(); |
| 53 return true; | 55 return true; |
| 54 } | 56 } |
| 55 | 57 |
| 56 void SecurityKeySocket::SendResponse(const std::string& response_data) { | 58 void SecurityKeySocket::SendResponse(const std::string& response_data) { |
| 57 DCHECK(thread_checker_.CalledOnValidThread()); | 59 DCHECK(thread_checker_.CalledOnValidThread()); |
| 58 DCHECK(!write_buffer_); | 60 DCHECK(!write_buffer_); |
| 59 | 61 |
| 60 std::string response_length_string = GetResponseLengthAsBytes(response_data); | 62 std::string response_length_string = GetResponseLengthAsBytes(response_data); |
| 61 int response_len = response_length_string.size() + response_data.size(); | 63 int response_len = response_length_string.size() + response_data.size(); |
| 62 std::unique_ptr<std::string> response( | 64 std::unique_ptr<std::string> response( |
| 63 new std::string(response_length_string + response_data)); | 65 new std::string(response_length_string + response_data)); |
| 64 write_buffer_ = new net::DrainableIOBuffer( | 66 write_buffer_ = new net::DrainableIOBuffer( |
| 65 new net::StringIOBuffer(std::move(response)), response_len); | 67 new net::StringIOBuffer(std::move(response)), response_len); |
| 68 |
| 69 DCHECK(write_buffer_->BytesRemaining()); |
| 66 DoWrite(); | 70 DoWrite(); |
| 67 } | 71 } |
| 68 | 72 |
| 69 void SecurityKeySocket::SendSshError() { | 73 void SecurityKeySocket::SendSshError() { |
| 70 DCHECK(thread_checker_.CalledOnValidThread()); | 74 DCHECK(thread_checker_.CalledOnValidThread()); |
| 71 | 75 |
| 72 SendResponse(std::string(kSshError, arraysize(kSshError))); | 76 SendResponse(std::string(kSshError, arraysize(kSshError))); |
| 73 } | 77 } |
| 74 | 78 |
| 75 void SecurityKeySocket::StartReadingRequest( | 79 void SecurityKeySocket::StartReadingRequest( |
| 76 const base::Closure& request_received_callback) { | 80 const base::Closure& request_received_callback) { |
| 77 DCHECK(thread_checker_.CalledOnValidThread()); | 81 DCHECK(thread_checker_.CalledOnValidThread()); |
| 78 DCHECK(request_received_callback_.is_null()); | 82 DCHECK(request_received_callback_.is_null()); |
| 79 | 83 |
| 80 request_received_callback_ = request_received_callback; | 84 request_received_callback_ = request_received_callback; |
| 81 DoRead(); | 85 DoRead(); |
| 82 } | 86 } |
| 83 | 87 |
| 84 void SecurityKeySocket::OnDataWritten(int result) { | 88 void SecurityKeySocket::OnDataWritten(int result) { |
| 85 DCHECK(thread_checker_.CalledOnValidThread()); | 89 DCHECK(thread_checker_.CalledOnValidThread()); |
| 86 DCHECK(write_buffer_); | 90 DCHECK(write_buffer_); |
| 87 | 91 |
| 88 if (result < 0) { | 92 if (result < 0) { |
| 89 LOG(ERROR) << "Error sending response: " << result; | 93 LOG(ERROR) << "Error sending response: " << result; |
| 90 return; | 94 return; |
| 91 } | 95 } |
| 92 ResetTimer(); | 96 ResetTimer(); |
| 93 write_buffer_->DidConsume(result); | 97 write_buffer_->DidConsume(result); |
| 98 |
| 99 if (!write_buffer_->BytesRemaining()) { |
| 100 write_buffer_ = nullptr; |
| 101 return; |
| 102 } |
| 103 |
| 94 DoWrite(); | 104 DoWrite(); |
| 95 } | 105 } |
| 96 | 106 |
| 97 void SecurityKeySocket::DoWrite() { | 107 void SecurityKeySocket::DoWrite() { |
| 98 DCHECK(thread_checker_.CalledOnValidThread()); | 108 DCHECK(thread_checker_.CalledOnValidThread()); |
| 99 DCHECK(write_buffer_); | 109 DCHECK(write_buffer_); |
| 100 | 110 |
| 101 if (!write_buffer_->BytesRemaining()) { | |
| 102 write_buffer_ = nullptr; | |
| 103 return; | |
| 104 } | |
| 105 int result = socket_->Write( | 111 int result = socket_->Write( |
| 106 write_buffer_.get(), write_buffer_->BytesRemaining(), | 112 write_buffer_.get(), write_buffer_->BytesRemaining(), |
| 107 base::Bind(&SecurityKeySocket::OnDataWritten, base::Unretained(this))); | 113 base::Bind(&SecurityKeySocket::OnDataWritten, base::Unretained(this))); |
| 108 if (result != net::ERR_IO_PENDING) | 114 if (result != net::ERR_IO_PENDING) { |
| 109 OnDataWritten(result); | 115 OnDataWritten(result); |
| 116 } |
| 110 } | 117 } |
| 111 | 118 |
| 112 void SecurityKeySocket::OnDataRead(int result) { | 119 void SecurityKeySocket::OnDataRead(int result) { |
| 113 DCHECK(thread_checker_.CalledOnValidThread()); | 120 DCHECK(thread_checker_.CalledOnValidThread()); |
| 114 | 121 |
| 115 if (result <= 0) { | 122 if (result <= 0) { |
| 116 if (result < 0) | 123 if (result < 0) { |
| 117 LOG(ERROR) << "Error reading request: " << result; | 124 LOG(ERROR) << "Error reading request: " << result; |
| 125 } |
| 118 read_completed_ = true; | 126 read_completed_ = true; |
| 119 base::ResetAndReturn(&request_received_callback_).Run(); | 127 base::ResetAndReturn(&request_received_callback_).Run(); |
| 120 return; | 128 return; |
| 121 } | 129 } |
| 122 | 130 |
| 123 ResetTimer(); | 131 ResetTimer(); |
| 124 request_data_.insert(request_data_.end(), read_buffer_->data(), | 132 request_data_.insert(request_data_.end(), read_buffer_->data(), |
| 125 read_buffer_->data() + result); | 133 read_buffer_->data() + result); |
| 126 if (IsRequestComplete()) { | 134 if (IsRequestComplete()) { |
| 127 read_completed_ = true; | 135 read_completed_ = true; |
| 128 base::ResetAndReturn(&request_received_callback_).Run(); | 136 base::ResetAndReturn(&request_received_callback_).Run(); |
| 129 return; | 137 return; |
| 130 } | 138 } |
| 131 | 139 |
| 132 DoRead(); | 140 DoRead(); |
| 133 } | 141 } |
| 134 | 142 |
| 135 void SecurityKeySocket::DoRead() { | 143 void SecurityKeySocket::DoRead() { |
| 136 DCHECK(thread_checker_.CalledOnValidThread()); | 144 DCHECK(thread_checker_.CalledOnValidThread()); |
| 137 | 145 |
| 138 int result = socket_->Read( | 146 int result = socket_->Read( |
| 139 read_buffer_.get(), kRequestReadBufferLength, | 147 read_buffer_.get(), kRequestReadBufferLength, |
| 140 base::Bind(&SecurityKeySocket::OnDataRead, base::Unretained(this))); | 148 base::Bind(&SecurityKeySocket::OnDataRead, base::Unretained(this))); |
| 141 if (result != net::ERR_IO_PENDING) | 149 if (result != net::ERR_IO_PENDING) { |
| 142 OnDataRead(result); | 150 OnDataRead(result); |
| 151 } |
| 143 } | 152 } |
| 144 | 153 |
| 145 bool SecurityKeySocket::IsRequestComplete() const { | 154 bool SecurityKeySocket::IsRequestComplete() const { |
| 146 DCHECK(thread_checker_.CalledOnValidThread()); | 155 DCHECK(thread_checker_.CalledOnValidThread()); |
| 147 | 156 |
| 148 if (request_data_.size() < kRequestSizeBytes) | 157 if (request_data_.size() < kRequestSizeBytes) { |
| 149 return false; | 158 return false; |
| 159 } |
| 150 return GetRequestLength() <= request_data_.size(); | 160 return GetRequestLength() <= request_data_.size(); |
| 151 } | 161 } |
| 152 | 162 |
| 153 bool SecurityKeySocket::IsRequestTooLarge() const { | 163 bool SecurityKeySocket::IsRequestTooLarge() const { |
| 154 DCHECK(thread_checker_.CalledOnValidThread()); | 164 DCHECK(thread_checker_.CalledOnValidThread()); |
| 155 | 165 |
| 156 if (request_data_.size() < kRequestSizeBytes) | 166 if (request_data_.size() < kRequestSizeBytes) { |
| 157 return false; | 167 return false; |
| 168 } |
| 158 return GetRequestLength() > kMaxRequestLength; | 169 return GetRequestLength() > kMaxRequestLength; |
| 159 } | 170 } |
| 160 | 171 |
| 161 size_t SecurityKeySocket::GetRequestLength() const { | 172 size_t SecurityKeySocket::GetRequestLength() const { |
| 162 DCHECK(request_data_.size() >= kRequestSizeBytes); | 173 DCHECK(request_data_.size() >= kRequestSizeBytes); |
| 163 | 174 |
| 164 return ((request_data_[0] & 255) << 24) + ((request_data_[1] & 255) << 16) + | 175 return ((request_data_[0] & 255) << 24) + ((request_data_[1] & 255) << 16) + |
| 165 ((request_data_[2] & 255) << 8) + (request_data_[3] & 255) + | 176 ((request_data_[2] & 255) << 8) + (request_data_[3] & 255) + |
| 166 kRequestSizeBytes; | 177 kRequestSizeBytes; |
| 167 } | 178 } |
| 168 | 179 |
| 169 std::string SecurityKeySocket::GetResponseLengthAsBytes( | 180 std::string SecurityKeySocket::GetResponseLengthAsBytes( |
| 170 const std::string& response) const { | 181 const std::string& response) const { |
| 171 std::string response_len; | 182 std::string response_len; |
| 172 response_len.reserve(kRequestSizeBytes); | 183 response_len.reserve(kRequestSizeBytes); |
| 173 int len = response.size(); | 184 int len = response.size(); |
| 174 | 185 |
| 175 response_len.push_back((len >> 24) & 255); | 186 response_len.push_back((len >> 24) & 255); |
| 176 response_len.push_back((len >> 16) & 255); | 187 response_len.push_back((len >> 16) & 255); |
| 177 response_len.push_back((len >> 8) & 255); | 188 response_len.push_back((len >> 8) & 255); |
| 178 response_len.push_back(len & 255); | 189 response_len.push_back(len & 255); |
| 179 | 190 |
| 180 return response_len; | 191 return response_len; |
| 181 } | 192 } |
| 182 | 193 |
| 183 void SecurityKeySocket::ResetTimer() { | 194 void SecurityKeySocket::ResetTimer() { |
| 184 if (timer_->IsRunning()) | 195 if (timer_->IsRunning()) { |
| 185 timer_->Reset(); | 196 timer_->Reset(); |
| 197 } |
| 186 } | 198 } |
| 187 | 199 |
| 188 } // namespace remoting | 200 } // namespace remoting |
| OLD | NEW |