| OLD | NEW |
| 1 // Copyright 2014 The Chromium Authors. All rights reserved. | 1 // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/quic/quic_dispatcher.h" | 5 #include "net/quic/quic_dispatcher.h" |
| 6 | 6 |
| 7 #include <errno.h> | 7 #include <errno.h> |
| 8 | 8 |
| 9 #include "base/debug/stack_trace.h" | 9 #include "base/debug/stack_trace.h" |
| 10 #include "base/logging.h" | 10 #include "base/logging.h" |
| (...skipping 186 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 197 // in OnAuthenticatedHeader. | 197 // in OnAuthenticatedHeader. |
| 198 framer_.ProcessPacket(packet); | 198 framer_.ProcessPacket(packet); |
| 199 // TODO(rjshade): Return a status describing if/why a packet was dropped, | 199 // TODO(rjshade): Return a status describing if/why a packet was dropped, |
| 200 // and log somehow. Maybe expose as a varz. | 200 // and log somehow. Maybe expose as a varz. |
| 201 } | 201 } |
| 202 | 202 |
| 203 bool QuicDispatcher::OnUnauthenticatedPublicHeader( | 203 bool QuicDispatcher::OnUnauthenticatedPublicHeader( |
| 204 const QuicPacketPublicHeader& header) { | 204 const QuicPacketPublicHeader& header) { |
| 205 QuicSession* session = nullptr; | 205 QuicSession* session = nullptr; |
| 206 | 206 |
| 207 // Port zero is only allowed for unidirectional UDP, so is disallowed by QUIC. | |
| 208 // Given that we can't even send a reply rejecting the packet, just black hole | |
| 209 // it. | |
| 210 if (current_client_address_.port() == 0) { | |
| 211 return false; | |
| 212 } | |
| 213 | |
| 214 QuicConnectionId connection_id = header.connection_id; | 207 QuicConnectionId connection_id = header.connection_id; |
| 215 SessionMap::iterator it = session_map_.find(connection_id); | 208 SessionMap::iterator it = session_map_.find(connection_id); |
| 216 if (it == session_map_.end()) { | 209 if (it == session_map_.end()) { |
| 217 if (header.reset_flag) { | 210 if (header.reset_flag) { |
| 218 return false; | 211 return false; |
| 219 } | 212 } |
| 220 if (time_wait_list_manager_->IsConnectionIdInTimeWait(connection_id)) { | 213 if (time_wait_list_manager_->IsConnectionIdInTimeWait(connection_id)) { |
| 221 return HandlePacketForTimeWait(header); | 214 return HandlePacketForTimeWait(header); |
| 222 } | 215 } |
| 223 | 216 |
| (...skipping 175 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 399 // be parsed correctly. | 392 // be parsed correctly. |
| 400 framer_.set_version(time_wait_list_manager_->GetQuicVersionFromConnectionId( | 393 framer_.set_version(time_wait_list_manager_->GetQuicVersionFromConnectionId( |
| 401 header.connection_id)); | 394 header.connection_id)); |
| 402 | 395 |
| 403 // Continue parsing the packet to extract the sequence number. Then | 396 // Continue parsing the packet to extract the sequence number. Then |
| 404 // send it to the time wait manager in OnUnathenticatedHeader. | 397 // send it to the time wait manager in OnUnathenticatedHeader. |
| 405 return true; | 398 return true; |
| 406 } | 399 } |
| 407 | 400 |
| 408 } // namespace net | 401 } // namespace net |
| OLD | NEW |