pepper_tcp_socket.cc revision 7d4cd473f85ac64c3747c96c277f9e506a0d2246
15c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved.
25c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be
35c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)// found in the LICENSE file.
45c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)
55c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "content/browser/renderer_host/pepper/pepper_tcp_socket.h"
65c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)
75c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include <string.h>
85c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)
95c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "base/bind.h"
105c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "base/bind_helpers.h"
115c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "base/compiler_specific.h"
125c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "base/logging.h"
135c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "base/strings/string_util.h"
145c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "content/browser/renderer_host/pepper/pepper_message_filter.h"
155c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "content/public/browser/browser_thread.h"
165c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/base/host_port_pair.h"
175c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/base/io_buffer.h"
185c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/base/ip_endpoint.h"
195c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/base/net_errors.h"
205c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/cert/cert_verifier.h"
215c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/cert/x509_certificate.h"
225c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/dns/host_resolver.h"
235c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/dns/single_request_host_resolver.h"
245c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/socket/client_socket_factory.h"
255c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/socket/client_socket_handle.h"
265c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/socket/ssl_client_socket.h"
275c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/socket/tcp_client_socket.h"
285c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "ppapi/proxy/ppapi_messages.h"
295c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "ppapi/shared_impl/private/net_address_private_impl.h"
305c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "ppapi/shared_impl/private/ppb_x509_certificate_private_shared.h"
31d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)#include "ppapi/shared_impl/private/tcp_socket_private_impl.h"
32f91f5fa1608c2cdd9af1842fb5dadbe78275be2aBo Liu
33591b958dee2cf159d33a0b931e6231072eaf38d5Ben Murdochusing ppapi::NetAddressPrivateImpl;
34591b958dee2cf159d33a0b931e6231072eaf38d5Ben Murdoch
355c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)namespace content {
3609380295ba73501a205346becac22c6978e4671dTorne (Richard Coles)
375c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)PepperTCPSocket::PepperTCPSocket(
38d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)    PepperMessageFilter* manager,
39d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)    int32 routing_id,
40d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)    uint32 plugin_dispatcher_id,
41f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles)    uint32 socket_id)
4276c265b59aa821ccbf8c75ab2bb0d036e97d2956Torne (Richard Coles)    : manager_(manager),
4376c265b59aa821ccbf8c75ab2bb0d036e97d2956Torne (Richard Coles)      routing_id_(routing_id),
44d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)      plugin_dispatcher_id_(plugin_dispatcher_id),
4507a852d8c1953036774d8f3b65d18dcfea3bb4a2Ben Murdoch      socket_id_(socket_id),
46d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)      connection_state_(BEFORE_CONNECT),
477242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci      end_of_file_reached_(false) {
485c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)  DCHECK(manager);
497242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci}
50d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)
51d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)PepperTCPSocket::PepperTCPSocket(
52d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)    PepperMessageFilter* manager,
5319cde67944066db31e633d9e386f2aa9bf9fadb3Torne (Richard Coles)    int32 routing_id,
54d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)    uint32 plugin_dispatcher_id,
557242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci    uint32 socket_id,
5619cde67944066db31e633d9e386f2aa9bf9fadb3Torne (Richard Coles)    net::StreamSocket* socket)
57c1847b1379d12d0e05df27436bf19a9b1bf12deaTorne (Richard Coles)    : manager_(manager),
58c1847b1379d12d0e05df27436bf19a9b1bf12deaTorne (Richard Coles)      routing_id_(routing_id),
5919cde67944066db31e633d9e386f2aa9bf9fadb3Torne (Richard Coles)      plugin_dispatcher_id_(plugin_dispatcher_id),
60d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)      socket_id_(socket_id),
61d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)      connection_state_(CONNECTED),
62d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)      end_of_file_reached_(false),
63d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)      socket_(socket) {
64d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)  DCHECK(manager);
65d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)}
66d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)
67d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)PepperTCPSocket::~PepperTCPSocket() {
6819cde67944066db31e633d9e386f2aa9bf9fadb3Torne (Richard Coles)  // Make sure no further callbacks from socket_.
69d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)  if (socket_)
70197021e6b966cfb06891637935ef33fff06433d1Ben Murdoch    socket_->Disconnect();
7119cde67944066db31e633d9e386f2aa9bf9fadb3Torne (Richard Coles)}
7210f88d5669dbd969c059d61ba09fa37dd72ac559Ben Murdoch
7307a852d8c1953036774d8f3b65d18dcfea3bb4a2Ben Murdochvoid PepperTCPSocket::Connect(const std::string& host, uint16_t port) {
74f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles)  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
75f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles)
7607a852d8c1953036774d8f3b65d18dcfea3bb4a2Ben Murdoch  if (connection_state_ != BEFORE_CONNECT) {
7776c265b59aa821ccbf8c75ab2bb0d036e97d2956Torne (Richard Coles)    SendConnectACKError();
78d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)    return;
7976c265b59aa821ccbf8c75ab2bb0d036e97d2956Torne (Richard Coles)  }
8076c265b59aa821ccbf8c75ab2bb0d036e97d2956Torne (Richard Coles)
8119cde67944066db31e633d9e386f2aa9bf9fadb3Torne (Richard Coles)  connection_state_ = CONNECT_IN_PROGRESS;
82d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)  net::HostResolver::RequestInfo request_info(net::HostPortPair(host, port));
83d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)  resolver_.reset(new net::SingleRequestHostResolver(
845c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)      manager_->GetHostResolver()));
8507a852d8c1953036774d8f3b65d18dcfea3bb4a2Ben Murdoch  int result = resolver_->Resolve(
865c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)      request_info, &address_list_,
87d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)      base::Bind(&PepperTCPSocket::OnResolveCompleted, base::Unretained(this)),
887242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci      net::BoundNetLog());
897242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci  if (result != net::ERR_IO_PENDING)
905c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)    OnResolveCompleted(result);
91d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)}
925c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)
93a9984bf9ddc3cf73fdae3f29134a2bab379e7029Ben Murdochvoid PepperTCPSocket::ConnectWithNetAddress(
94a9984bf9ddc3cf73fdae3f29134a2bab379e7029Ben Murdoch    const PP_NetAddress_Private& net_addr) {
95a9984bf9ddc3cf73fdae3f29134a2bab379e7029Ben Murdoch  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
96a9984bf9ddc3cf73fdae3f29134a2bab379e7029Ben Murdoch
97a9984bf9ddc3cf73fdae3f29134a2bab379e7029Ben Murdoch  net::IPAddressNumber address;
98a9984bf9ddc3cf73fdae3f29134a2bab379e7029Ben Murdoch  int port;
99d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)  if (connection_state_ != BEFORE_CONNECT ||
100f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles)      !NetAddressPrivateImpl::NetAddressToIPEndPoint(net_addr,
101d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)                                                     &address,
102d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)                                                     &port)) {
10309380295ba73501a205346becac22c6978e4671dTorne (Richard Coles)    SendConnectACKError();
1047242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci    return;
1057242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci  }
1065c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)
1077242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci  // Copy the single IPEndPoint to address_list_.
1085c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)  address_list_.clear();
109d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)  address_list_.push_back(net::IPEndPoint(address, port));
110d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)  connection_state_ = CONNECT_IN_PROGRESS;
1117242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci  StartConnect(address_list_);
112d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)}
1135c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)
114d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)void PepperTCPSocket::SSLHandshake(
115d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)    const std::string& server_name,
116d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)    uint16_t server_port,
117d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)    const std::vector<std::vector<char> >& trusted_certs,
118d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)    const std::vector<std::vector<char> >& untrusted_certs) {
119d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
120d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)
121d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)  // Allow to do SSL handshake only if currently the socket has been connected
122d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)  // and there isn't pending read or write.
123d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)  // IsConnected() includes the state that SSL handshake has been finished and
12476c265b59aa821ccbf8c75ab2bb0d036e97d2956Torne (Richard Coles)  // therefore isn't suitable here.
125d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)  if (connection_state_ != CONNECTED || read_buffer_.get() ||
126d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)      write_buffer_base_.get() || write_buffer_.get()) {
127d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)    SendSSLHandshakeACK(false);
12807a852d8c1953036774d8f3b65d18dcfea3bb4a2Ben Murdoch    return;
129f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles)  }
13007a852d8c1953036774d8f3b65d18dcfea3bb4a2Ben Murdoch
131f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles)  connection_state_ = SSL_HANDSHAKE_IN_PROGRESS;
132f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles)  // TODO(raymes,rsleevi): Use trusted/untrusted certificates when connecting.
133f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles)
134d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)  net::ClientSocketHandle* handle = new net::ClientSocketHandle();
135d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)  handle->set_socket(socket_.release());
136d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)  net::ClientSocketFactory* factory =
137d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)      net::ClientSocketFactory::GetDefaultFactory();
138d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)  net::HostPortPair host_port_pair(server_name, server_port);
139f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles)  net::SSLClientSocketContext ssl_context;
140f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles)  ssl_context.cert_verifier = manager_->GetCertVerifier();
141f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles)  ssl_context.transport_security_state = manager_->GetTransportSecurityState();
142c1847b1379d12d0e05df27436bf19a9b1bf12deaTorne (Richard Coles)  socket_.reset(factory->CreateSSLClientSocket(
1435c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)      handle, host_port_pair, manager_->ssl_config(), ssl_context));
1445c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)  if (!socket_) {
145    LOG(WARNING) << "Failed to create an SSL client socket.";
146    OnSSLHandshakeCompleted(net::ERR_UNEXPECTED);
147    return;
148  }
149
150  int result = socket_->Connect(
151      base::Bind(&PepperTCPSocket::OnSSLHandshakeCompleted,
152                 base::Unretained(this)));
153  if (result != net::ERR_IO_PENDING)
154    OnSSLHandshakeCompleted(result);
155}
156
157void PepperTCPSocket::Read(int32 bytes_to_read) {
158  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
159
160  if (!IsConnected() || end_of_file_reached_ || read_buffer_.get() ||
161      bytes_to_read <= 0) {
162    SendReadACKError();
163    return;
164  }
165
166  if (bytes_to_read > ppapi::TCPSocketPrivateImpl::kMaxReadSize) {
167    NOTREACHED();
168    bytes_to_read = ppapi::TCPSocketPrivateImpl::kMaxReadSize;
169  }
170
171  read_buffer_ = new net::IOBuffer(bytes_to_read);
172  int result = socket_->Read(
173      read_buffer_.get(),
174      bytes_to_read,
175      base::Bind(&PepperTCPSocket::OnReadCompleted, base::Unretained(this)));
176  if (result != net::ERR_IO_PENDING)
177    OnReadCompleted(result);
178}
179
180void PepperTCPSocket::Write(const std::string& data) {
181  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
182
183  if (!IsConnected() || write_buffer_base_.get() || write_buffer_.get() ||
184      data.empty()) {
185    SendWriteACKError();
186    return;
187  }
188
189  int data_size = data.size();
190  if (data_size > ppapi::TCPSocketPrivateImpl::kMaxWriteSize) {
191    NOTREACHED();
192    data_size = ppapi::TCPSocketPrivateImpl::kMaxWriteSize;
193  }
194
195  write_buffer_base_ = new net::IOBuffer(data_size);
196  memcpy(write_buffer_base_->data(), data.data(), data_size);
197  write_buffer_ =
198      new net::DrainableIOBuffer(write_buffer_base_.get(), data_size);
199  DoWrite();
200}
201
202void PepperTCPSocket::SetBoolOption(uint32_t name, bool value) {
203  DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
204  DCHECK(socket_.get());
205
206  switch (name) {
207    case PP_TCPSOCKETOPTION_NO_DELAY:
208      if (!IsSsl()) {
209        net::TCPClientSocket* tcp_socket =
210            static_cast<net::TCPClientSocket*>(socket_.get());
211        SendSetBoolOptionACK(tcp_socket->SetNoDelay(value));
212      } else {
213        SendSetBoolOptionACK(false);
214      }
215      return;
216    default:
217      break;
218  }
219
220  NOTREACHED();
221  SendSetBoolOptionACK(false);
222}
223
224void PepperTCPSocket::StartConnect(const net::AddressList& addresses) {
225  DCHECK(connection_state_ == CONNECT_IN_PROGRESS);
226
227  socket_.reset(new net::TCPClientSocket(addresses, NULL,
228                                         net::NetLog::Source()));
229  int result = socket_->Connect(
230      base::Bind(&PepperTCPSocket::OnConnectCompleted,
231                 base::Unretained(this)));
232  if (result != net::ERR_IO_PENDING)
233    OnConnectCompleted(result);
234}
235
236void PepperTCPSocket::SendConnectACKError() {
237  manager_->Send(new PpapiMsg_PPBTCPSocket_ConnectACK(
238      routing_id_, plugin_dispatcher_id_, socket_id_, false,
239      NetAddressPrivateImpl::kInvalidNetAddress,
240      NetAddressPrivateImpl::kInvalidNetAddress));
241}
242
243// static
244bool PepperTCPSocket::GetCertificateFields(
245    const net::X509Certificate& cert,
246    ppapi::PPB_X509Certificate_Fields* fields) {
247  const net::CertPrincipal& issuer = cert.issuer();
248  fields->SetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_COMMON_NAME,
249      new base::StringValue(issuer.common_name));
250  fields->SetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_LOCALITY_NAME,
251      new base::StringValue(issuer.locality_name));
252  fields->SetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_STATE_OR_PROVINCE_NAME,
253      new base::StringValue(issuer.state_or_province_name));
254  fields->SetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_COUNTRY_NAME,
255      new base::StringValue(issuer.country_name));
256  fields->SetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_ORGANIZATION_NAME,
257      new base::StringValue(JoinString(issuer.organization_names, '\n')));
258  fields->SetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_ORGANIZATION_UNIT_NAME,
259      new base::StringValue(JoinString(issuer.organization_unit_names, '\n')));
260
261  const net::CertPrincipal& subject = cert.subject();
262  fields->SetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_COMMON_NAME,
263      new base::StringValue(subject.common_name));
264  fields->SetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_LOCALITY_NAME,
265      new base::StringValue(subject.locality_name));
266  fields->SetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_STATE_OR_PROVINCE_NAME,
267      new base::StringValue(subject.state_or_province_name));
268  fields->SetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_COUNTRY_NAME,
269      new base::StringValue(subject.country_name));
270  fields->SetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_ORGANIZATION_NAME,
271      new base::StringValue(JoinString(subject.organization_names, '\n')));
272  fields->SetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_ORGANIZATION_UNIT_NAME,
273      new base::StringValue(JoinString(subject.organization_unit_names, '\n')));
274
275  const std::string& serial_number = cert.serial_number();
276  fields->SetField(PP_X509CERTIFICATE_PRIVATE_SERIAL_NUMBER,
277      base::BinaryValue::CreateWithCopiedBuffer(serial_number.data(),
278                                                serial_number.length()));
279  fields->SetField(PP_X509CERTIFICATE_PRIVATE_VALIDITY_NOT_BEFORE,
280      new base::FundamentalValue(cert.valid_start().ToDoubleT()));
281  fields->SetField(PP_X509CERTIFICATE_PRIVATE_VALIDITY_NOT_AFTER,
282      new base::FundamentalValue(cert.valid_expiry().ToDoubleT()));
283  std::string der;
284  net::X509Certificate::GetDEREncoded(cert.os_cert_handle(), &der);
285  fields->SetField(PP_X509CERTIFICATE_PRIVATE_RAW,
286      base::BinaryValue::CreateWithCopiedBuffer(der.data(), der.length()));
287  return true;
288}
289
290// static
291bool PepperTCPSocket::GetCertificateFields(
292    const char* der,
293    uint32_t length,
294    ppapi::PPB_X509Certificate_Fields* fields) {
295  scoped_refptr<net::X509Certificate> cert =
296      net::X509Certificate::CreateFromBytes(der, length);
297  if (!cert.get())
298    return false;
299  return GetCertificateFields(*cert.get(), fields);
300}
301
302void PepperTCPSocket::SendReadACKError() {
303  manager_->Send(new PpapiMsg_PPBTCPSocket_ReadACK(
304    routing_id_, plugin_dispatcher_id_, socket_id_, false, std::string()));
305}
306
307void PepperTCPSocket::SendWriteACKError() {
308  manager_->Send(new PpapiMsg_PPBTCPSocket_WriteACK(
309      routing_id_, plugin_dispatcher_id_, socket_id_, false, 0));
310}
311
312void PepperTCPSocket::SendSSLHandshakeACK(bool succeeded) {
313  ppapi::PPB_X509Certificate_Fields certificate_fields;
314  if (succeeded) {
315    // Our socket is guaranteed to be an SSL socket if we get here.
316    net::SSLClientSocket* ssl_socket =
317        static_cast<net::SSLClientSocket*>(socket_.get());
318    net::SSLInfo ssl_info;
319    ssl_socket->GetSSLInfo(&ssl_info);
320    if (ssl_info.cert.get())
321      GetCertificateFields(*ssl_info.cert.get(), &certificate_fields);
322  }
323  manager_->Send(new PpapiMsg_PPBTCPSocket_SSLHandshakeACK(
324      routing_id_,
325      plugin_dispatcher_id_,
326      socket_id_,
327      succeeded,
328      certificate_fields));
329}
330
331void PepperTCPSocket::SendSetBoolOptionACK(bool succeeded) {
332  manager_->Send(new PpapiMsg_PPBTCPSocket_SetBoolOptionACK(
333      routing_id_, plugin_dispatcher_id_, socket_id_, succeeded));
334}
335
336void PepperTCPSocket::OnResolveCompleted(int result) {
337  DCHECK(connection_state_ == CONNECT_IN_PROGRESS);
338
339  if (result != net::OK) {
340    SendConnectACKError();
341    connection_state_ = BEFORE_CONNECT;
342    return;
343  }
344
345  StartConnect(address_list_);
346}
347
348void PepperTCPSocket::OnConnectCompleted(int result) {
349  DCHECK(connection_state_ == CONNECT_IN_PROGRESS && socket_.get());
350
351  if (result != net::OK) {
352    SendConnectACKError();
353    connection_state_ = BEFORE_CONNECT;
354  } else {
355    net::IPEndPoint ip_end_point_local;
356    net::IPEndPoint ip_end_point_remote;
357    PP_NetAddress_Private local_addr =
358        NetAddressPrivateImpl::kInvalidNetAddress;
359    PP_NetAddress_Private remote_addr =
360        NetAddressPrivateImpl::kInvalidNetAddress;
361
362    if (socket_->GetLocalAddress(&ip_end_point_local) != net::OK ||
363        !NetAddressPrivateImpl::IPEndPointToNetAddress(
364            ip_end_point_local.address(),
365            ip_end_point_local.port(),
366            &local_addr) ||
367        socket_->GetPeerAddress(&ip_end_point_remote) != net::OK ||
368        !NetAddressPrivateImpl::IPEndPointToNetAddress(
369            ip_end_point_remote.address(),
370            ip_end_point_remote.port(),
371            &remote_addr)) {
372      SendConnectACKError();
373      connection_state_ = BEFORE_CONNECT;
374    } else {
375      manager_->Send(new PpapiMsg_PPBTCPSocket_ConnectACK(
376          routing_id_, plugin_dispatcher_id_, socket_id_, true,
377          local_addr, remote_addr));
378      connection_state_ = CONNECTED;
379    }
380  }
381}
382
383void PepperTCPSocket::OnSSLHandshakeCompleted(int result) {
384  DCHECK(connection_state_ == SSL_HANDSHAKE_IN_PROGRESS);
385
386  bool succeeded = result == net::OK;
387  SendSSLHandshakeACK(succeeded);
388  connection_state_ = succeeded ? SSL_CONNECTED : SSL_HANDSHAKE_FAILED;
389}
390
391void PepperTCPSocket::OnReadCompleted(int result) {
392  DCHECK(read_buffer_.get());
393
394  if (result > 0) {
395    manager_->Send(new PpapiMsg_PPBTCPSocket_ReadACK(
396        routing_id_, plugin_dispatcher_id_, socket_id_, true,
397        std::string(read_buffer_->data(), result)));
398  } else if (result == 0) {
399    end_of_file_reached_ = true;
400    manager_->Send(new PpapiMsg_PPBTCPSocket_ReadACK(
401        routing_id_, plugin_dispatcher_id_, socket_id_, true, std::string()));
402  } else {
403    SendReadACKError();
404  }
405  read_buffer_ = NULL;
406}
407
408void PepperTCPSocket::OnWriteCompleted(int result) {
409  DCHECK(write_buffer_base_.get());
410  DCHECK(write_buffer_.get());
411
412  // Note: For partial writes of 0 bytes, don't continue writing to avoid a
413  // likely infinite loop.
414  if (result > 0) {
415    write_buffer_->DidConsume(result);
416    if (write_buffer_->BytesRemaining() > 0) {
417      DoWrite();
418      return;
419    }
420  }
421
422  if (result >= 0) {
423    manager_->Send(new PpapiMsg_PPBTCPSocket_WriteACK(
424        routing_id_, plugin_dispatcher_id_, socket_id_, true,
425        write_buffer_->BytesConsumed()));
426  } else {
427    SendWriteACKError();
428  }
429
430  write_buffer_ = NULL;
431  write_buffer_base_ = NULL;
432}
433
434bool PepperTCPSocket::IsConnected() const {
435  return connection_state_ == CONNECTED || connection_state_ == SSL_CONNECTED;
436}
437
438bool PepperTCPSocket::IsSsl() const {
439 return connection_state_ == SSL_HANDSHAKE_IN_PROGRESS ||
440     connection_state_ == SSL_CONNECTED ||
441     connection_state_ == SSL_HANDSHAKE_FAILED;
442}
443
444void PepperTCPSocket::DoWrite() {
445  DCHECK(write_buffer_base_.get());
446  DCHECK(write_buffer_.get());
447  DCHECK_GT(write_buffer_->BytesRemaining(), 0);
448
449  int result = socket_->Write(
450      write_buffer_.get(),
451      write_buffer_->BytesRemaining(),
452      base::Bind(&PepperTCPSocket::OnWriteCompleted, base::Unretained(this)));
453  if (result != net::ERR_IO_PENDING)
454    OnWriteCompleted(result);
455}
456
457}  // namespace content
458