OLD | NEW |
1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "net/quic/quic_dispatcher.h" | 5 #include "net/quic/quic_dispatcher.h" |
6 | 6 |
7 #include <errno.h> | 7 #include <errno.h> |
8 | 8 |
9 #include "base/debug/stack_trace.h" | 9 #include "base/debug/stack_trace.h" |
10 #include "base/logging.h" | 10 #include "base/logging.h" |
(...skipping 186 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
197 // in OnAuthenticatedHeader. | 197 // in OnAuthenticatedHeader. |
198 framer_.ProcessPacket(packet); | 198 framer_.ProcessPacket(packet); |
199 // TODO(rjshade): Return a status describing if/why a packet was dropped, | 199 // TODO(rjshade): Return a status describing if/why a packet was dropped, |
200 // and log somehow. Maybe expose as a varz. | 200 // and log somehow. Maybe expose as a varz. |
201 } | 201 } |
202 | 202 |
203 bool QuicDispatcher::OnUnauthenticatedPublicHeader( | 203 bool QuicDispatcher::OnUnauthenticatedPublicHeader( |
204 const QuicPacketPublicHeader& header) { | 204 const QuicPacketPublicHeader& header) { |
205 QuicSession* session = nullptr; | 205 QuicSession* session = nullptr; |
206 | 206 |
| 207 // Port zero is only allowed for unidirectional UDP, so is disallowed by QUIC. |
| 208 // Given that we can't even send a reply rejecting the packet, just black hole |
| 209 // it. |
| 210 if (current_client_address_.port() == 0) { |
| 211 return false; |
| 212 } |
| 213 |
207 QuicConnectionId connection_id = header.connection_id; | 214 QuicConnectionId connection_id = header.connection_id; |
208 SessionMap::iterator it = session_map_.find(connection_id); | 215 SessionMap::iterator it = session_map_.find(connection_id); |
209 if (it == session_map_.end()) { | 216 if (it == session_map_.end()) { |
210 if (header.reset_flag) { | 217 if (header.reset_flag) { |
211 return false; | 218 return false; |
212 } | 219 } |
213 if (time_wait_list_manager_->IsConnectionIdInTimeWait(connection_id)) { | 220 if (time_wait_list_manager_->IsConnectionIdInTimeWait(connection_id)) { |
214 return HandlePacketForTimeWait(header); | 221 return HandlePacketForTimeWait(header); |
215 } | 222 } |
216 | 223 |
(...skipping 175 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
392 // be parsed correctly. | 399 // be parsed correctly. |
393 framer_.set_version(time_wait_list_manager_->GetQuicVersionFromConnectionId( | 400 framer_.set_version(time_wait_list_manager_->GetQuicVersionFromConnectionId( |
394 header.connection_id)); | 401 header.connection_id)); |
395 | 402 |
396 // Continue parsing the packet to extract the sequence number. Then | 403 // Continue parsing the packet to extract the sequence number. Then |
397 // send it to the time wait manager in OnUnathenticatedHeader. | 404 // send it to the time wait manager in OnUnathenticatedHeader. |
398 return true; | 405 return true; |
399 } | 406 } |
400 | 407 |
401 } // namespace net | 408 } // namespace net |
OLD | NEW |