// Copyright 2013 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "ppapi/shared_impl/tcp_socket_shared.h" #include #include #include "base/basictypes.h" #include "base/bind.h" #include "base/logging.h" #include "ppapi/c/pp_bool.h" #include "ppapi/c/pp_completion_callback.h" #include "ppapi/c/pp_errors.h" #include "ppapi/shared_impl/ppapi_globals.h" #include "ppapi/shared_impl/private/ppb_x509_certificate_private_shared.h" #include "ppapi/shared_impl/socket_option_data.h" #include "ppapi/shared_impl/var_tracker.h" #include "ppapi/shared_impl/var.h" #include "ppapi/thunk/enter.h" #include "ppapi/thunk/ppb_x509_certificate_private_api.h" namespace ppapi { const int32_t TCPSocketShared::kMaxReadSize = 1024 * 1024; const int32_t TCPSocketShared::kMaxWriteSize = 1024 * 1024; const int32_t TCPSocketShared::kMaxSendBufferSize = 1024 * TCPSocketShared::kMaxWriteSize; const int32_t TCPSocketShared::kMaxReceiveBufferSize = 1024 * TCPSocketShared::kMaxReadSize; TCPSocketShared::TCPSocketShared(ResourceObjectType resource_type, uint32 socket_id) : resource_type_(resource_type) { Init(socket_id); } TCPSocketShared::~TCPSocketShared() { } void TCPSocketShared::OnConnectCompleted( int32_t result, const PP_NetAddress_Private& local_addr, const PP_NetAddress_Private& remote_addr) { // It is possible that |connect_callback_| is pending while // |connection_state_| is not BEFORE_CONNECT: DisconnectImpl() has been // called, but a ConnectCompleted notification came earlier than the task to // abort |connect_callback_|. We don't want to update |connection_state_| or // other members in that case. if (connection_state_ != BEFORE_CONNECT || !TrackedCallback::IsPending(connect_callback_)) { return; } result = OverridePPError(result); if (result == PP_OK) { local_addr_ = local_addr; remote_addr_ = remote_addr; connection_state_ = CONNECTED; } connect_callback_->Run(result); } void TCPSocketShared::OnSSLHandshakeCompleted( bool succeeded, const PPB_X509Certificate_Fields& certificate_fields) { // It is possible that |ssl_handshake_callback_| is pending while // |connection_state_| is not CONNECT: DisconnectImpl() has been // called, but a SSLHandshakeCompleted notification came earlier than the task // to abort |ssl_handshake_callback_|. We don't want to update // |connection_state_| or other members in that case. if (connection_state_ != CONNECTED || !TrackedCallback::IsPending(ssl_handshake_callback_)) { return; } if (succeeded) { connection_state_ = SSL_CONNECTED; server_certificate_ = new PPB_X509Certificate_Private_Shared( resource_type_, GetOwnerResource()->pp_instance(), certificate_fields); ssl_handshake_callback_->Run(PP_OK); } else { // The resource might be released in the callback so we need to hold // a reference so we can Disconnect() first. GetOwnerResource()->AddRef(); ssl_handshake_callback_->Run(PP_ERROR_FAILED); DisconnectImpl(); GetOwnerResource()->Release(); } } void TCPSocketShared::OnReadCompleted(int32_t result, const std::string& data) { // It is possible that |read_callback_| is pending while |read_buffer_| is // NULL: DisconnectImpl() has been called, but a ReadCompleted notification // came earlier than the task to abort |read_callback_|. We shouldn't access // the buffer in that case. The user may have released it. if (!TrackedCallback::IsPending(read_callback_) || !read_buffer_) return; result = OverridePPError(result); bool succeeded = result == PP_OK; if (succeeded) { CHECK_LE(static_cast(data.size()), bytes_to_read_); if (!data.empty()) memcpy(read_buffer_, data.c_str(), data.size()); } read_buffer_ = NULL; bytes_to_read_ = -1; read_callback_->Run( succeeded ? static_cast(data.size()) : result); } void TCPSocketShared::OnWriteCompleted(int32_t result) { if (!TrackedCallback::IsPending(write_callback_)) return; result = OverridePPError(result); write_callback_->Run(result); } void TCPSocketShared::OnSetOptionCompleted(int32_t result) { if (set_option_callbacks_.empty()) { NOTREACHED(); return; } result = OverridePPError(result); scoped_refptr callback = set_option_callbacks_.front(); set_option_callbacks_.pop(); if (TrackedCallback::IsPending(callback)) callback->Run(result); } int32_t TCPSocketShared::OverridePPError(int32_t pp_error) { return pp_error; } int32_t TCPSocketShared::ConnectImpl(const char* host, uint16_t port, scoped_refptr callback) { if (!host) return PP_ERROR_BADARGUMENT; if (connection_state_ != BEFORE_CONNECT) return PP_ERROR_FAILED; if (TrackedCallback::IsPending(connect_callback_)) return PP_ERROR_INPROGRESS; // Can only have one pending request. connect_callback_ = callback; // Send the request, the browser will call us back via ConnectACK. SendConnect(host, port); return PP_OK_COMPLETIONPENDING; } int32_t TCPSocketShared::ConnectWithNetAddressImpl( const PP_NetAddress_Private* addr, scoped_refptr callback) { if (!addr) return PP_ERROR_BADARGUMENT; if (connection_state_ != BEFORE_CONNECT) return PP_ERROR_FAILED; if (TrackedCallback::IsPending(connect_callback_)) return PP_ERROR_INPROGRESS; // Can only have one pending request. connect_callback_ = callback; // Send the request, the browser will call us back via ConnectACK. SendConnectWithNetAddress(*addr); return PP_OK_COMPLETIONPENDING; } PP_Bool TCPSocketShared::GetLocalAddressImpl( PP_NetAddress_Private* local_addr) { if (!IsConnected() || !local_addr) return PP_FALSE; *local_addr = local_addr_; return PP_TRUE; } PP_Bool TCPSocketShared::GetRemoteAddressImpl( PP_NetAddress_Private* remote_addr) { if (!IsConnected() || !remote_addr) return PP_FALSE; *remote_addr = remote_addr_; return PP_TRUE; } int32_t TCPSocketShared::SSLHandshakeImpl( const char* server_name, uint16_t server_port, scoped_refptr callback) { if (!server_name) return PP_ERROR_BADARGUMENT; if (connection_state_ != CONNECTED) return PP_ERROR_FAILED; if (TrackedCallback::IsPending(ssl_handshake_callback_) || TrackedCallback::IsPending(read_callback_) || TrackedCallback::IsPending(write_callback_)) return PP_ERROR_INPROGRESS; ssl_handshake_callback_ = callback; // Send the request, the browser will call us back via SSLHandshakeACK. SendSSLHandshake(server_name, server_port, trusted_certificates_, untrusted_certificates_); return PP_OK_COMPLETIONPENDING; } PP_Resource TCPSocketShared::GetServerCertificateImpl() { if (!server_certificate_.get()) return 0; return server_certificate_->GetReference(); } PP_Bool TCPSocketShared::AddChainBuildingCertificateImpl( PP_Resource certificate, PP_Bool trusted) { // TODO(raymes): The plumbing for this functionality is implemented but the // certificates aren't yet used for the connection, so just return false for // now. return PP_FALSE; thunk::EnterResourceNoLock enter_cert(certificate, true); if (enter_cert.failed()) return PP_FALSE; PP_Var der_var = enter_cert.object()->GetField( PP_X509CERTIFICATE_PRIVATE_RAW); ArrayBufferVar* der_array_buffer = ArrayBufferVar::FromPPVar(der_var); PP_Bool success = PP_FALSE; if (der_array_buffer) { const char* der_bytes = static_cast(der_array_buffer->Map()); uint32_t der_length = der_array_buffer->ByteLength(); std::vector der(der_bytes, der_bytes + der_length); if (PP_ToBool(trusted)) trusted_certificates_.push_back(der); else untrusted_certificates_.push_back(der); success = PP_TRUE; } PpapiGlobals::Get()->GetVarTracker()->ReleaseVar(der_var); return success; } int32_t TCPSocketShared::ReadImpl(char* buffer, int32_t bytes_to_read, scoped_refptr callback) { if (!buffer || bytes_to_read <= 0) return PP_ERROR_BADARGUMENT; if (!IsConnected()) return PP_ERROR_FAILED; if (TrackedCallback::IsPending(read_callback_) || TrackedCallback::IsPending(ssl_handshake_callback_)) return PP_ERROR_INPROGRESS; read_buffer_ = buffer; bytes_to_read_ = std::min(bytes_to_read, kMaxReadSize); read_callback_ = callback; // Send the request, the browser will call us back via ReadACK. SendRead(bytes_to_read_); return PP_OK_COMPLETIONPENDING; } int32_t TCPSocketShared::WriteImpl(const char* buffer, int32_t bytes_to_write, scoped_refptr callback) { if (!buffer || bytes_to_write <= 0) return PP_ERROR_BADARGUMENT; if (!IsConnected()) return PP_ERROR_FAILED; if (TrackedCallback::IsPending(write_callback_) || TrackedCallback::IsPending(ssl_handshake_callback_)) return PP_ERROR_INPROGRESS; if (bytes_to_write > kMaxWriteSize) bytes_to_write = kMaxWriteSize; write_callback_ = callback; // Send the request, the browser will call us back via WriteACK. SendWrite(std::string(buffer, bytes_to_write)); return PP_OK_COMPLETIONPENDING; } void TCPSocketShared::DisconnectImpl() { if (connection_state_ == DISCONNECTED) return; connection_state_ = DISCONNECTED; SendDisconnect(); socket_id_ = 0; PostAbortIfNecessary(&connect_callback_); PostAbortIfNecessary(&ssl_handshake_callback_); PostAbortIfNecessary(&read_callback_); PostAbortIfNecessary(&write_callback_); read_buffer_ = NULL; bytes_to_read_ = -1; server_certificate_ = NULL; } int32_t TCPSocketShared::SetOptionImpl( PP_TCPSocket_Option name, const PP_Var& value, scoped_refptr callback) { if (!IsConnected()) return PP_ERROR_FAILED; SocketOptionData option_data; switch (name) { case PP_TCPSOCKET_OPTION_NO_DELAY: { if (value.type != PP_VARTYPE_BOOL) return PP_ERROR_BADARGUMENT; option_data.SetBool(PP_ToBool(value.value.as_bool)); break; } case PP_TCPSOCKET_OPTION_SEND_BUFFER_SIZE: case PP_TCPSOCKET_OPTION_RECV_BUFFER_SIZE: { if (value.type != PP_VARTYPE_INT32) return PP_ERROR_BADARGUMENT; option_data.SetInt32(value.value.as_int); break; } default: { NOTREACHED(); return PP_ERROR_BADARGUMENT; } } set_option_callbacks_.push(callback); SendSetOption(name, option_data); return PP_OK_COMPLETIONPENDING; } void TCPSocketShared::Init(uint32 socket_id) { DCHECK(socket_id != 0); socket_id_ = socket_id; connection_state_ = BEFORE_CONNECT; read_buffer_ = NULL; bytes_to_read_ = -1; local_addr_.size = 0; memset(local_addr_.data, 0, arraysize(local_addr_.data) * sizeof(*local_addr_.data)); remote_addr_.size = 0; memset(remote_addr_.data, 0, arraysize(remote_addr_.data) * sizeof(*remote_addr_.data)); } bool TCPSocketShared::IsConnected() const { return connection_state_ == CONNECTED || connection_state_ == SSL_CONNECTED; } void TCPSocketShared::PostAbortIfNecessary( scoped_refptr* callback) { if (TrackedCallback::IsPending(*callback)) (*callback)->PostAbort(); } } // namespace ppapi