OLD | NEW |
---|---|
1 // Copyright 2013 The Chromium Authors. All rights reserved. | 1 // Copyright 2013 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "chrome/browser/extensions/api/cast_channel/cast_socket.h" | 5 #include "chrome/browser/extensions/api/cast_channel/cast_socket.h" |
6 | 6 |
7 #include <stdlib.h> | 7 #include <stdlib.h> |
8 #include <string.h> | 8 #include <string.h> |
9 | 9 |
10 #include "base/bind.h" | 10 #include "base/bind.h" |
(...skipping 140 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
151 return false; | 151 return false; |
152 bool result = net::X509Certificate::GetDEREncoded( | 152 bool result = net::X509Certificate::GetDEREncoded( |
153 ssl_info.cert->os_cert_handle(), cert); | 153 ssl_info.cert->os_cert_handle(), cert); |
154 if (result) | 154 if (result) |
155 VLOG_WITH_CONNECTION(1) << "Successfully extracted peer certificate: " | 155 VLOG_WITH_CONNECTION(1) << "Successfully extracted peer certificate: " |
156 << *cert; | 156 << *cert; |
157 return result; | 157 return result; |
158 } | 158 } |
159 | 159 |
160 bool CastSocket::VerifyChallengeReply() { | 160 bool CastSocket::VerifyChallengeReply() { |
161 return AuthenticateChallengeReply(*challenge_reply_.get(), peer_cert_); | 161 return AuthenticateChallengeReply(*challenge_reply_, peer_cert_); |
162 } | 162 } |
163 | 163 |
164 void CastSocket::Connect(const net::CompletionCallback& callback) { | 164 void CastSocket::Connect(const net::CompletionCallback& callback) { |
165 DCHECK(CalledOnValidThread()); | 165 DCHECK(CalledOnValidThread()); |
166 VLOG_WITH_CONNECTION(1) << "Connect readyState = " << ready_state_; | 166 VLOG_WITH_CONNECTION(1) << "Connect readyState = " << ready_state_; |
167 if (ready_state_ != READY_STATE_NONE) { | 167 if (ready_state_ != READY_STATE_NONE) { |
168 callback.Run(net::ERR_CONNECTION_FAILED); | 168 callback.Run(net::ERR_CONNECTION_FAILED); |
169 return; | 169 return; |
170 } | 170 } |
171 ready_state_ = READY_STATE_CONNECTING; | 171 ready_state_ = READY_STATE_CONNECTING; |
(...skipping 353 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... | |
525 rv = DoRead(); | 525 rv = DoRead(); |
526 break; | 526 break; |
527 case READ_STATE_READ_COMPLETE: | 527 case READ_STATE_READ_COMPLETE: |
528 rv = DoReadComplete(rv); | 528 rv = DoReadComplete(rv); |
529 break; | 529 break; |
530 case READ_STATE_DO_CALLBACK: | 530 case READ_STATE_DO_CALLBACK: |
531 rv = DoReadCallback(); | 531 rv = DoReadCallback(); |
532 break; | 532 break; |
533 case READ_STATE_ERROR: | 533 case READ_STATE_ERROR: |
534 rv = DoReadError(rv); | 534 rv = DoReadError(rv); |
535 DCHECK_EQ(read_state_, READ_STATE_NONE); | |
535 break; | 536 break; |
536 default: | 537 default: |
537 NOTREACHED() << "BUG in read flow. Unknown state: " << state; | 538 NOTREACHED() << "BUG in read flow. Unknown state: " << state; |
538 break; | 539 break; |
539 } | 540 } |
540 } while (rv != net::ERR_IO_PENDING && read_state_ != READ_STATE_NONE); | 541 } while (rv != net::ERR_IO_PENDING && read_state_ != READ_STATE_NONE); |
541 | 542 |
542 // Read loop is done - If the result is ERR_FAILED then close with error. | 543 if (rv == net::ERR_FAILED) { |
543 if (rv == net::ERR_FAILED) | 544 if (ready_state_ == READY_STATE_CONNECTING) { |
544 CloseWithError(error_state_); | 545 // Connection not yet established. |
Wez
2014/07/23 21:27:42
nit: No need for this; should be implicit from rea
Kevin M
2014/07/23 23:40:46
Done.
| |
546 // Read errors during the handshake should notify the caller via | |
547 // the connect callback, rather than the message event delegate. | |
548 PostTaskToStartConnectLoop(net::ERR_FAILED); | |
549 } else { | |
550 // Connection is already established. | |
551 // Close and send error status via the message event delegate. | |
552 CloseWithError(error_state_); | |
553 } | |
554 } | |
545 } | 555 } |
546 | 556 |
547 int CastSocket::DoRead() { | 557 int CastSocket::DoRead() { |
548 read_state_ = READ_STATE_READ_COMPLETE; | 558 read_state_ = READ_STATE_READ_COMPLETE; |
549 // Figure out whether to read header or body, and the remaining bytes. | 559 // Figure out whether to read header or body, and the remaining bytes. |
550 uint32 num_bytes_to_read = 0; | 560 uint32 num_bytes_to_read = 0; |
551 if (header_read_buffer_->RemainingCapacity() > 0) { | 561 if (header_read_buffer_->RemainingCapacity() > 0) { |
552 current_read_buffer_ = header_read_buffer_; | 562 current_read_buffer_ = header_read_buffer_; |
553 num_bytes_to_read = header_read_buffer_->RemainingCapacity(); | 563 num_bytes_to_read = header_read_buffer_->RemainingCapacity(); |
554 DCHECK_LE(num_bytes_to_read, MessageHeader::header_size()); | 564 if (num_bytes_to_read > MessageHeader::header_size()) { |
565 error_state_ = CHANNEL_ERROR_INVALID_MESSAGE; | |
566 return net::ERR_FAILED; | |
567 } | |
555 } else { | 568 } else { |
556 DCHECK_GT(current_message_size_, 0U); | 569 DCHECK_GT(current_message_size_, 0U); |
557 num_bytes_to_read = current_message_size_ - body_read_buffer_->offset(); | 570 num_bytes_to_read = current_message_size_ - body_read_buffer_->offset(); |
558 current_read_buffer_ = body_read_buffer_; | 571 current_read_buffer_ = body_read_buffer_; |
559 DCHECK_LE(num_bytes_to_read, MessageHeader::max_message_size()); | 572 if (num_bytes_to_read > MessageHeader::max_message_size()) { |
573 error_state_ = CHANNEL_ERROR_INVALID_MESSAGE; | |
574 return net::ERR_FAILED; | |
575 } | |
560 } | 576 } |
561 DCHECK_GT(num_bytes_to_read, 0U); | 577 if (num_bytes_to_read == 0) { |
578 error_state_ = CHANNEL_ERROR_INVALID_MESSAGE; | |
579 return net::ERR_FAILED; | |
580 } | |
562 | 581 |
563 // Read up to num_bytes_to_read into |current_read_buffer_|. | 582 // Read up to num_bytes_to_read into |current_read_buffer_|. |
564 return socket_->Read( | 583 return socket_->Read( |
565 current_read_buffer_.get(), | 584 current_read_buffer_.get(), |
566 num_bytes_to_read, | 585 num_bytes_to_read, |
567 base::Bind(&CastSocket::DoReadLoop, AsWeakPtr())); | 586 base::Bind(&CastSocket::DoReadLoop, AsWeakPtr())); |
568 } | 587 } |
569 | 588 |
570 int CastSocket::DoReadComplete(int result) { | 589 int CastSocket::DoReadComplete(int result) { |
571 VLOG_WITH_CONNECTION(2) << "DoReadComplete result = " << result | 590 VLOG_WITH_CONNECTION(2) << "DoReadComplete result = " << result |
572 << " header offset = " | 591 << " header offset = " |
573 << header_read_buffer_->offset() | 592 << header_read_buffer_->offset() |
574 << " body offset = " << body_read_buffer_->offset(); | 593 << " body offset = " << body_read_buffer_->offset(); |
575 if (result <= 0) { // 0 means EOF: the peer closed the socket | 594 if (result <= 0) { // 0 means EOF: the peer closed the socket |
576 VLOG_WITH_CONNECTION(1) << "Read error, peer closed the socket"; | 595 VLOG_WITH_CONNECTION(1) << "Read error, peer closed the socket"; |
577 error_state_ = CHANNEL_ERROR_SOCKET_ERROR; | 596 error_state_ = CHANNEL_ERROR_SOCKET_ERROR; |
578 read_state_ = READ_STATE_ERROR; | 597 read_state_ = READ_STATE_ERROR; |
579 return result == 0 ? net::ERR_FAILED : result; | 598 return result == 0 ? net::ERR_FAILED : result; |
580 } | 599 } |
581 | 600 |
582 // Some data was read. Move the offset in the current buffer forward. | 601 // Some data was read. Move the offset in the current buffer forward. |
583 DCHECK_LE(current_read_buffer_->offset() + result, | 602 CHECK_LE(current_read_buffer_->offset() + result, |
584 current_read_buffer_->capacity()); | 603 current_read_buffer_->capacity()); |
585 current_read_buffer_->set_offset(current_read_buffer_->offset() + result); | 604 current_read_buffer_->set_offset(current_read_buffer_->offset() + result); |
586 read_state_ = READ_STATE_READ; | 605 read_state_ = READ_STATE_READ; |
587 | 606 |
588 if (current_read_buffer_.get() == header_read_buffer_.get() && | 607 if (current_read_buffer_.get() == header_read_buffer_.get() && |
589 current_read_buffer_->RemainingCapacity() == 0) { | 608 current_read_buffer_->RemainingCapacity() == 0) { |
590 // A full header is read, process the contents. | 609 // A full header is read, process the contents. |
591 if (!ProcessHeader()) { | 610 if (!ProcessHeader()) { |
592 error_state_ = cast_channel::CHANNEL_ERROR_INVALID_MESSAGE; | 611 error_state_ = cast_channel::CHANNEL_ERROR_INVALID_MESSAGE; |
593 read_state_ = READ_STATE_ERROR; | 612 read_state_ = READ_STATE_ERROR; |
594 } | 613 } |
595 } else if (current_read_buffer_.get() == body_read_buffer_.get() && | 614 } else if (current_read_buffer_.get() == body_read_buffer_.get() && |
596 static_cast<uint32>(current_read_buffer_->offset()) == | 615 static_cast<uint32>(current_read_buffer_->offset()) == |
597 current_message_size_) { | 616 current_message_size_) { |
598 // Full body is read, process the contents. | 617 // Full body is read, process the contents. |
599 if (ProcessBody()) { | 618 if (ProcessBody()) { |
600 read_state_ = READ_STATE_DO_CALLBACK; | 619 read_state_ = READ_STATE_DO_CALLBACK; |
601 } else { | 620 } else { |
602 error_state_ = cast_channel::CHANNEL_ERROR_INVALID_MESSAGE; | 621 error_state_ = cast_channel::CHANNEL_ERROR_INVALID_MESSAGE; |
603 read_state_ = READ_STATE_ERROR; | 622 read_state_ = READ_STATE_ERROR; |
604 } | 623 } |
605 } | 624 } |
606 | 625 |
607 return net::OK; | 626 return net::OK; |
608 } | 627 } |
609 | 628 |
610 int CastSocket::DoReadCallback() { | 629 int CastSocket::DoReadCallback() { |
611 read_state_ = READ_STATE_READ; | 630 read_state_ = READ_STATE_READ; |
612 const CastMessage& message = *(current_message_.get()); | 631 const CastMessage& message = *current_message_; |
613 if (IsAuthMessage(message)) { | 632 if (ready_state_ == READY_STATE_CONNECTING) { |
614 // An auth message is received, check that connect flow is running. | 633 if (IsAuthMessage(message)) { |
615 if (ready_state_ == READY_STATE_CONNECTING) { | |
616 challenge_reply_.reset(new CastMessage(message)); | 634 challenge_reply_.reset(new CastMessage(message)); |
617 PostTaskToStartConnectLoop(net::OK); | 635 PostTaskToStartConnectLoop(net::OK); |
636 return net::OK; | |
618 } else { | 637 } else { |
638 // Expected an auth message, got something else instead. Handle as error. | |
619 read_state_ = READ_STATE_ERROR; | 639 read_state_ = READ_STATE_ERROR; |
640 return net::ERR_INVALID_RESPONSE; | |
620 } | 641 } |
621 } else if (delegate_) { | |
622 MessageInfo message_info; | |
623 if (CastMessageToMessageInfo(message, &message_info)) | |
624 delegate_->OnMessage(this, message_info); | |
625 else | |
626 read_state_ = READ_STATE_ERROR; | |
627 } | 642 } |
643 | |
644 MessageInfo message_info; | |
645 if (!CastMessageToMessageInfo(message, &message_info)) { | |
646 current_message_->Clear(); | |
647 read_state_ = READ_STATE_ERROR; | |
648 return net::ERR_INVALID_RESPONSE; | |
649 } | |
650 delegate_->OnMessage(this, message_info); | |
628 current_message_->Clear(); | 651 current_message_->Clear(); |
629 return net::OK; | 652 return net::OK; |
630 } | 653 } |
631 | 654 |
632 int CastSocket::DoReadError(int result) { | 655 int CastSocket::DoReadError(int result) { |
633 DCHECK_LE(result, 0); | 656 DCHECK_LE(result, 0); |
634 // If inside connection flow, then get back to connect loop. | |
635 if (ready_state_ == READY_STATE_CONNECTING) { | |
636 PostTaskToStartConnectLoop(result); | |
637 // does not try to report error also. | |
638 return net::OK; | |
639 } | |
640 return net::ERR_FAILED; | 657 return net::ERR_FAILED; |
641 } | 658 } |
642 | 659 |
643 bool CastSocket::ProcessHeader() { | 660 bool CastSocket::ProcessHeader() { |
644 DCHECK_EQ(static_cast<uint32>(header_read_buffer_->offset()), | 661 CHECK_EQ(static_cast<uint32>(header_read_buffer_->offset()), |
645 MessageHeader::header_size()); | 662 MessageHeader::header_size()); |
646 MessageHeader header; | 663 MessageHeader header; |
647 MessageHeader::ReadFromIOBuffer(header_read_buffer_.get(), &header); | 664 MessageHeader::ReadFromIOBuffer(header_read_buffer_.get(), &header); |
648 if (header.message_size > MessageHeader::max_message_size()) | 665 if (header.message_size > MessageHeader::max_message_size()) |
649 return false; | 666 return false; |
650 | 667 |
651 VLOG_WITH_CONNECTION(2) << "Parsed header { message_size: " | 668 VLOG_WITH_CONNECTION(2) << "Parsed header { message_size: " |
652 << header.message_size << " }"; | 669 << header.message_size << " }"; |
653 current_message_size_ = header.message_size; | 670 current_message_size_ = header.message_size; |
654 return true; | 671 return true; |
655 } | 672 } |
656 | 673 |
657 bool CastSocket::ProcessBody() { | 674 bool CastSocket::ProcessBody() { |
658 DCHECK_EQ(static_cast<uint32>(body_read_buffer_->offset()), | 675 if (static_cast<uint32>(body_read_buffer_->offset()) != |
659 current_message_size_); | 676 current_message_size_) { |
677 return false; | |
678 } | |
660 if (!current_message_->ParseFromArray( | 679 if (!current_message_->ParseFromArray( |
661 body_read_buffer_->StartOfBuffer(), current_message_size_)) { | 680 body_read_buffer_->StartOfBuffer(), current_message_size_)) { |
662 return false; | 681 return false; |
663 } | 682 } |
664 current_message_size_ = 0; | 683 current_message_size_ = 0; |
665 header_read_buffer_->set_offset(0); | 684 header_read_buffer_->set_offset(0); |
666 body_read_buffer_->set_offset(0); | 685 body_read_buffer_->set_offset(0); |
667 current_read_buffer_ = header_read_buffer_; | 686 current_read_buffer_ = header_read_buffer_; |
668 return true; | 687 return true; |
669 } | 688 } |
670 | 689 |
671 // static | 690 // static |
672 bool CastSocket::Serialize(const CastMessage& message_proto, | 691 bool CastSocket::Serialize(const CastMessage& message_proto, |
673 std::string* message_data) { | 692 std::string* message_data) { |
674 DCHECK(message_data); | 693 DCHECK(message_data); |
675 message_proto.SerializeToString(message_data); | 694 message_proto.SerializeToString(message_data); |
676 size_t message_size = message_data->size(); | 695 size_t message_size = message_data->size(); |
677 if (message_size > MessageHeader::max_message_size()) { | 696 if (message_size > MessageHeader::max_message_size()) { |
678 message_data->clear(); | 697 message_data->clear(); |
679 return false; | 698 return false; |
680 } | 699 } |
681 CastSocket::MessageHeader header; | 700 CastSocket::MessageHeader header; |
682 header.SetMessageSize(message_size); | 701 if (!header.SetMessageSize(message_size)) { |
702 return false; | |
703 } | |
683 header.PrependToString(message_data); | 704 header.PrependToString(message_data); |
684 return true; | 705 return true; |
685 }; | 706 } |
686 | 707 |
687 void CastSocket::CloseWithError(ChannelError error) { | 708 void CastSocket::CloseWithError(ChannelError error) { |
688 DCHECK(CalledOnValidThread()); | 709 DCHECK(CalledOnValidThread()); |
689 socket_.reset(NULL); | 710 socket_.reset(NULL); |
690 ready_state_ = READY_STATE_CLOSED; | 711 ready_state_ = READY_STATE_CLOSED; |
691 error_state_ = error; | 712 error_state_ = error; |
692 if (delegate_) | 713 if (delegate_) |
693 delegate_->OnError(this, error); | 714 delegate_->OnError(this, error); |
694 } | 715 } |
695 | 716 |
696 std::string CastSocket::CastUrl() const { | 717 std::string CastSocket::CastUrl() const { |
697 return ((channel_auth_ == CHANNEL_AUTH_TYPE_SSL_VERIFIED) ? | 718 return ((channel_auth_ == CHANNEL_AUTH_TYPE_SSL_VERIFIED) ? |
698 "casts://" : "cast://") + ip_endpoint_.ToString(); | 719 "casts://" : "cast://") + ip_endpoint_.ToString(); |
699 } | 720 } |
700 | 721 |
701 bool CastSocket::CalledOnValidThread() const { | 722 bool CastSocket::CalledOnValidThread() const { |
702 return thread_checker_.CalledOnValidThread(); | 723 return thread_checker_.CalledOnValidThread(); |
703 } | 724 } |
704 | 725 |
705 CastSocket::MessageHeader::MessageHeader() : message_size(0) { } | 726 CastSocket::MessageHeader::MessageHeader() : message_size(0) { } |
706 | 727 |
707 void CastSocket::MessageHeader::SetMessageSize(size_t size) { | 728 bool CastSocket::MessageHeader::SetMessageSize(size_t size) { |
708 DCHECK(size < static_cast<size_t>(kuint32max)); | 729 if (size >= static_cast<size_t>(kuint32max) || |
Wez
2014/07/23 21:27:42
Don't we already have a check against max_message_
Ryan Sleevi
2014/07/23 22:31:13
It would matter for 64-bit
Wez
2014/07/23 22:33:31
Except that we already check against max_message_s
Kevin M
2014/07/23 23:40:46
True. Removed the check. Thanks.
| |
709 DCHECK(size > 0); | 730 size == 0) { |
731 return false; | |
732 } | |
710 message_size = static_cast<size_t>(size); | 733 message_size = static_cast<size_t>(size); |
Ryan Sleevi
2014/07/23 22:31:13
Why is this static cast needed?
It feels like bot
Kevin M
2014/07/23 23:40:46
Done.
| |
734 return true; | |
711 } | 735 } |
712 | 736 |
713 // TODO(mfoltz): Investigate replacing header serialization with base::Pickle, | 737 // TODO(mfoltz): Investigate replacing header serialization with base::Pickle, |
714 // if bit-for-bit compatible. | 738 // if bit-for-bit compatible. |
715 void CastSocket::MessageHeader::PrependToString(std::string* str) { | 739 void CastSocket::MessageHeader::PrependToString(std::string* str) { |
716 MessageHeader output = *this; | 740 MessageHeader output = *this; |
717 output.message_size = base::HostToNet32(message_size); | 741 output.message_size = base::HostToNet32(message_size); |
718 size_t header_size = base::checked_cast<size_t,uint32>( | 742 size_t header_size = base::checked_cast<size_t,uint32>( |
719 MessageHeader::header_size()); | 743 MessageHeader::header_size()); |
720 scoped_ptr<char, base::FreeDeleter> char_array( | 744 scoped_ptr<char, base::FreeDeleter> char_array( |
(...skipping 30 matching lines...) Expand all Loading... | |
751 return true; | 775 return true; |
752 } | 776 } |
753 | 777 |
754 CastSocket::WriteRequest::~WriteRequest() { } | 778 CastSocket::WriteRequest::~WriteRequest() { } |
755 | 779 |
756 } // namespace cast_channel | 780 } // namespace cast_channel |
757 } // namespace api | 781 } // namespace api |
758 } // namespace extensions | 782 } // namespace extensions |
759 | 783 |
760 #undef VLOG_WITH_CONNECTION | 784 #undef VLOG_WITH_CONNECTION |
OLD | NEW |