pepper_tcp_socket.cc revision 7d4cd473f85ac64c3747c96c277f9e506a0d2246
15c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)// Copyright (c) 2012 The Chromium Authors. All rights reserved. 25c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)// Use of this source code is governed by a BSD-style license that can be 35c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)// found in the LICENSE file. 45c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) 55c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "content/browser/renderer_host/pepper/pepper_tcp_socket.h" 65c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) 75c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include <string.h> 85c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) 95c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "base/bind.h" 105c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "base/bind_helpers.h" 115c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "base/compiler_specific.h" 125c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "base/logging.h" 135c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "base/strings/string_util.h" 145c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "content/browser/renderer_host/pepper/pepper_message_filter.h" 155c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "content/public/browser/browser_thread.h" 165c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/base/host_port_pair.h" 175c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/base/io_buffer.h" 185c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/base/ip_endpoint.h" 195c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/base/net_errors.h" 205c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/cert/cert_verifier.h" 215c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/cert/x509_certificate.h" 225c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/dns/host_resolver.h" 235c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/dns/single_request_host_resolver.h" 245c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/socket/client_socket_factory.h" 255c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/socket/client_socket_handle.h" 265c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/socket/ssl_client_socket.h" 275c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "net/socket/tcp_client_socket.h" 285c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "ppapi/proxy/ppapi_messages.h" 295c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "ppapi/shared_impl/private/net_address_private_impl.h" 305c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)#include "ppapi/shared_impl/private/ppb_x509_certificate_private_shared.h" 31d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)#include "ppapi/shared_impl/private/tcp_socket_private_impl.h" 32f91f5fa1608c2cdd9af1842fb5dadbe78275be2aBo Liu 33591b958dee2cf159d33a0b931e6231072eaf38d5Ben Murdochusing ppapi::NetAddressPrivateImpl; 34591b958dee2cf159d33a0b931e6231072eaf38d5Ben Murdoch 355c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)namespace content { 3609380295ba73501a205346becac22c6978e4671dTorne (Richard Coles) 375c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles)PepperTCPSocket::PepperTCPSocket( 38d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) PepperMessageFilter* manager, 39d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) int32 routing_id, 40d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) uint32 plugin_dispatcher_id, 41f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles) uint32 socket_id) 4276c265b59aa821ccbf8c75ab2bb0d036e97d2956Torne (Richard Coles) : manager_(manager), 4376c265b59aa821ccbf8c75ab2bb0d036e97d2956Torne (Richard Coles) routing_id_(routing_id), 44d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) plugin_dispatcher_id_(plugin_dispatcher_id), 4507a852d8c1953036774d8f3b65d18dcfea3bb4a2Ben Murdoch socket_id_(socket_id), 46d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) connection_state_(BEFORE_CONNECT), 477242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci end_of_file_reached_(false) { 485c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) DCHECK(manager); 497242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci} 50d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) 51d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)PepperTCPSocket::PepperTCPSocket( 52d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) PepperMessageFilter* manager, 5319cde67944066db31e633d9e386f2aa9bf9fadb3Torne (Richard Coles) int32 routing_id, 54d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) uint32 plugin_dispatcher_id, 557242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci uint32 socket_id, 5619cde67944066db31e633d9e386f2aa9bf9fadb3Torne (Richard Coles) net::StreamSocket* socket) 57c1847b1379d12d0e05df27436bf19a9b1bf12deaTorne (Richard Coles) : manager_(manager), 58c1847b1379d12d0e05df27436bf19a9b1bf12deaTorne (Richard Coles) routing_id_(routing_id), 5919cde67944066db31e633d9e386f2aa9bf9fadb3Torne (Richard Coles) plugin_dispatcher_id_(plugin_dispatcher_id), 60d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) socket_id_(socket_id), 61d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) connection_state_(CONNECTED), 62d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) end_of_file_reached_(false), 63d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) socket_(socket) { 64d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) DCHECK(manager); 65d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)} 66d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) 67d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)PepperTCPSocket::~PepperTCPSocket() { 6819cde67944066db31e633d9e386f2aa9bf9fadb3Torne (Richard Coles) // Make sure no further callbacks from socket_. 69d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) if (socket_) 70197021e6b966cfb06891637935ef33fff06433d1Ben Murdoch socket_->Disconnect(); 7119cde67944066db31e633d9e386f2aa9bf9fadb3Torne (Richard Coles)} 7210f88d5669dbd969c059d61ba09fa37dd72ac559Ben Murdoch 7307a852d8c1953036774d8f3b65d18dcfea3bb4a2Ben Murdochvoid PepperTCPSocket::Connect(const std::string& host, uint16_t port) { 74f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles) DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); 75f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles) 7607a852d8c1953036774d8f3b65d18dcfea3bb4a2Ben Murdoch if (connection_state_ != BEFORE_CONNECT) { 7776c265b59aa821ccbf8c75ab2bb0d036e97d2956Torne (Richard Coles) SendConnectACKError(); 78d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) return; 7976c265b59aa821ccbf8c75ab2bb0d036e97d2956Torne (Richard Coles) } 8076c265b59aa821ccbf8c75ab2bb0d036e97d2956Torne (Richard Coles) 8119cde67944066db31e633d9e386f2aa9bf9fadb3Torne (Richard Coles) connection_state_ = CONNECT_IN_PROGRESS; 82d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) net::HostResolver::RequestInfo request_info(net::HostPortPair(host, port)); 83d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) resolver_.reset(new net::SingleRequestHostResolver( 845c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) manager_->GetHostResolver())); 8507a852d8c1953036774d8f3b65d18dcfea3bb4a2Ben Murdoch int result = resolver_->Resolve( 865c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) request_info, &address_list_, 87d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) base::Bind(&PepperTCPSocket::OnResolveCompleted, base::Unretained(this)), 887242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci net::BoundNetLog()); 897242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci if (result != net::ERR_IO_PENDING) 905c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) OnResolveCompleted(result); 91d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)} 925c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) 93a9984bf9ddc3cf73fdae3f29134a2bab379e7029Ben Murdochvoid PepperTCPSocket::ConnectWithNetAddress( 94a9984bf9ddc3cf73fdae3f29134a2bab379e7029Ben Murdoch const PP_NetAddress_Private& net_addr) { 95a9984bf9ddc3cf73fdae3f29134a2bab379e7029Ben Murdoch DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); 96a9984bf9ddc3cf73fdae3f29134a2bab379e7029Ben Murdoch 97a9984bf9ddc3cf73fdae3f29134a2bab379e7029Ben Murdoch net::IPAddressNumber address; 98a9984bf9ddc3cf73fdae3f29134a2bab379e7029Ben Murdoch int port; 99d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) if (connection_state_ != BEFORE_CONNECT || 100f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles) !NetAddressPrivateImpl::NetAddressToIPEndPoint(net_addr, 101d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) &address, 102d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) &port)) { 10309380295ba73501a205346becac22c6978e4671dTorne (Richard Coles) SendConnectACKError(); 1047242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci return; 1057242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci } 1065c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) 1077242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci // Copy the single IPEndPoint to address_list_. 1085c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) address_list_.clear(); 109d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) address_list_.push_back(net::IPEndPoint(address, port)); 110d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) connection_state_ = CONNECT_IN_PROGRESS; 1117242dc3dbeb210b5e876a3c42d1ec1a667fc621aPrimiano Tucci StartConnect(address_list_); 112d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles)} 1135c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) 114d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles)void PepperTCPSocket::SSLHandshake( 115d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) const std::string& server_name, 116d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) uint16_t server_port, 117d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) const std::vector<std::vector<char> >& trusted_certs, 118d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) const std::vector<std::vector<char> >& untrusted_certs) { 119d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); 120d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) 121d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) // Allow to do SSL handshake only if currently the socket has been connected 122d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) // and there isn't pending read or write. 123d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) // IsConnected() includes the state that SSL handshake has been finished and 12476c265b59aa821ccbf8c75ab2bb0d036e97d2956Torne (Richard Coles) // therefore isn't suitable here. 125d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) if (connection_state_ != CONNECTED || read_buffer_.get() || 126d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) write_buffer_base_.get() || write_buffer_.get()) { 127d5428f32f5d1719f774f62e19147104ca245a3abTorne (Richard Coles) SendSSLHandshakeACK(false); 12807a852d8c1953036774d8f3b65d18dcfea3bb4a2Ben Murdoch return; 129f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles) } 13007a852d8c1953036774d8f3b65d18dcfea3bb4a2Ben Murdoch 131f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles) connection_state_ = SSL_HANDSHAKE_IN_PROGRESS; 132f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles) // TODO(raymes,rsleevi): Use trusted/untrusted certificates when connecting. 133f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles) 134d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) net::ClientSocketHandle* handle = new net::ClientSocketHandle(); 135d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) handle->set_socket(socket_.release()); 136d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) net::ClientSocketFactory* factory = 137d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) net::ClientSocketFactory::GetDefaultFactory(); 138d6cdb82654e8f3343a693ca752d5c4cee0324e17Torne (Richard Coles) net::HostPortPair host_port_pair(server_name, server_port); 139f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles) net::SSLClientSocketContext ssl_context; 140f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles) ssl_context.cert_verifier = manager_->GetCertVerifier(); 141f6b7aed3f7ce69aca0d7a032d144cbd088b04393Torne (Richard Coles) ssl_context.transport_security_state = manager_->GetTransportSecurityState(); 142c1847b1379d12d0e05df27436bf19a9b1bf12deaTorne (Richard Coles) socket_.reset(factory->CreateSSLClientSocket( 1435c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) handle, host_port_pair, manager_->ssl_config(), ssl_context)); 1445c87bf8b86a7c82ef50fb7a89697d8e02e2553beTorne (Richard Coles) if (!socket_) { 145 LOG(WARNING) << "Failed to create an SSL client socket."; 146 OnSSLHandshakeCompleted(net::ERR_UNEXPECTED); 147 return; 148 } 149 150 int result = socket_->Connect( 151 base::Bind(&PepperTCPSocket::OnSSLHandshakeCompleted, 152 base::Unretained(this))); 153 if (result != net::ERR_IO_PENDING) 154 OnSSLHandshakeCompleted(result); 155} 156 157void PepperTCPSocket::Read(int32 bytes_to_read) { 158 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); 159 160 if (!IsConnected() || end_of_file_reached_ || read_buffer_.get() || 161 bytes_to_read <= 0) { 162 SendReadACKError(); 163 return; 164 } 165 166 if (bytes_to_read > ppapi::TCPSocketPrivateImpl::kMaxReadSize) { 167 NOTREACHED(); 168 bytes_to_read = ppapi::TCPSocketPrivateImpl::kMaxReadSize; 169 } 170 171 read_buffer_ = new net::IOBuffer(bytes_to_read); 172 int result = socket_->Read( 173 read_buffer_.get(), 174 bytes_to_read, 175 base::Bind(&PepperTCPSocket::OnReadCompleted, base::Unretained(this))); 176 if (result != net::ERR_IO_PENDING) 177 OnReadCompleted(result); 178} 179 180void PepperTCPSocket::Write(const std::string& data) { 181 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); 182 183 if (!IsConnected() || write_buffer_base_.get() || write_buffer_.get() || 184 data.empty()) { 185 SendWriteACKError(); 186 return; 187 } 188 189 int data_size = data.size(); 190 if (data_size > ppapi::TCPSocketPrivateImpl::kMaxWriteSize) { 191 NOTREACHED(); 192 data_size = ppapi::TCPSocketPrivateImpl::kMaxWriteSize; 193 } 194 195 write_buffer_base_ = new net::IOBuffer(data_size); 196 memcpy(write_buffer_base_->data(), data.data(), data_size); 197 write_buffer_ = 198 new net::DrainableIOBuffer(write_buffer_base_.get(), data_size); 199 DoWrite(); 200} 201 202void PepperTCPSocket::SetBoolOption(uint32_t name, bool value) { 203 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); 204 DCHECK(socket_.get()); 205 206 switch (name) { 207 case PP_TCPSOCKETOPTION_NO_DELAY: 208 if (!IsSsl()) { 209 net::TCPClientSocket* tcp_socket = 210 static_cast<net::TCPClientSocket*>(socket_.get()); 211 SendSetBoolOptionACK(tcp_socket->SetNoDelay(value)); 212 } else { 213 SendSetBoolOptionACK(false); 214 } 215 return; 216 default: 217 break; 218 } 219 220 NOTREACHED(); 221 SendSetBoolOptionACK(false); 222} 223 224void PepperTCPSocket::StartConnect(const net::AddressList& addresses) { 225 DCHECK(connection_state_ == CONNECT_IN_PROGRESS); 226 227 socket_.reset(new net::TCPClientSocket(addresses, NULL, 228 net::NetLog::Source())); 229 int result = socket_->Connect( 230 base::Bind(&PepperTCPSocket::OnConnectCompleted, 231 base::Unretained(this))); 232 if (result != net::ERR_IO_PENDING) 233 OnConnectCompleted(result); 234} 235 236void PepperTCPSocket::SendConnectACKError() { 237 manager_->Send(new PpapiMsg_PPBTCPSocket_ConnectACK( 238 routing_id_, plugin_dispatcher_id_, socket_id_, false, 239 NetAddressPrivateImpl::kInvalidNetAddress, 240 NetAddressPrivateImpl::kInvalidNetAddress)); 241} 242 243// static 244bool PepperTCPSocket::GetCertificateFields( 245 const net::X509Certificate& cert, 246 ppapi::PPB_X509Certificate_Fields* fields) { 247 const net::CertPrincipal& issuer = cert.issuer(); 248 fields->SetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_COMMON_NAME, 249 new base::StringValue(issuer.common_name)); 250 fields->SetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_LOCALITY_NAME, 251 new base::StringValue(issuer.locality_name)); 252 fields->SetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_STATE_OR_PROVINCE_NAME, 253 new base::StringValue(issuer.state_or_province_name)); 254 fields->SetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_COUNTRY_NAME, 255 new base::StringValue(issuer.country_name)); 256 fields->SetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_ORGANIZATION_NAME, 257 new base::StringValue(JoinString(issuer.organization_names, '\n'))); 258 fields->SetField(PP_X509CERTIFICATE_PRIVATE_ISSUER_ORGANIZATION_UNIT_NAME, 259 new base::StringValue(JoinString(issuer.organization_unit_names, '\n'))); 260 261 const net::CertPrincipal& subject = cert.subject(); 262 fields->SetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_COMMON_NAME, 263 new base::StringValue(subject.common_name)); 264 fields->SetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_LOCALITY_NAME, 265 new base::StringValue(subject.locality_name)); 266 fields->SetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_STATE_OR_PROVINCE_NAME, 267 new base::StringValue(subject.state_or_province_name)); 268 fields->SetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_COUNTRY_NAME, 269 new base::StringValue(subject.country_name)); 270 fields->SetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_ORGANIZATION_NAME, 271 new base::StringValue(JoinString(subject.organization_names, '\n'))); 272 fields->SetField(PP_X509CERTIFICATE_PRIVATE_SUBJECT_ORGANIZATION_UNIT_NAME, 273 new base::StringValue(JoinString(subject.organization_unit_names, '\n'))); 274 275 const std::string& serial_number = cert.serial_number(); 276 fields->SetField(PP_X509CERTIFICATE_PRIVATE_SERIAL_NUMBER, 277 base::BinaryValue::CreateWithCopiedBuffer(serial_number.data(), 278 serial_number.length())); 279 fields->SetField(PP_X509CERTIFICATE_PRIVATE_VALIDITY_NOT_BEFORE, 280 new base::FundamentalValue(cert.valid_start().ToDoubleT())); 281 fields->SetField(PP_X509CERTIFICATE_PRIVATE_VALIDITY_NOT_AFTER, 282 new base::FundamentalValue(cert.valid_expiry().ToDoubleT())); 283 std::string der; 284 net::X509Certificate::GetDEREncoded(cert.os_cert_handle(), &der); 285 fields->SetField(PP_X509CERTIFICATE_PRIVATE_RAW, 286 base::BinaryValue::CreateWithCopiedBuffer(der.data(), der.length())); 287 return true; 288} 289 290// static 291bool PepperTCPSocket::GetCertificateFields( 292 const char* der, 293 uint32_t length, 294 ppapi::PPB_X509Certificate_Fields* fields) { 295 scoped_refptr<net::X509Certificate> cert = 296 net::X509Certificate::CreateFromBytes(der, length); 297 if (!cert.get()) 298 return false; 299 return GetCertificateFields(*cert.get(), fields); 300} 301 302void PepperTCPSocket::SendReadACKError() { 303 manager_->Send(new PpapiMsg_PPBTCPSocket_ReadACK( 304 routing_id_, plugin_dispatcher_id_, socket_id_, false, std::string())); 305} 306 307void PepperTCPSocket::SendWriteACKError() { 308 manager_->Send(new PpapiMsg_PPBTCPSocket_WriteACK( 309 routing_id_, plugin_dispatcher_id_, socket_id_, false, 0)); 310} 311 312void PepperTCPSocket::SendSSLHandshakeACK(bool succeeded) { 313 ppapi::PPB_X509Certificate_Fields certificate_fields; 314 if (succeeded) { 315 // Our socket is guaranteed to be an SSL socket if we get here. 316 net::SSLClientSocket* ssl_socket = 317 static_cast<net::SSLClientSocket*>(socket_.get()); 318 net::SSLInfo ssl_info; 319 ssl_socket->GetSSLInfo(&ssl_info); 320 if (ssl_info.cert.get()) 321 GetCertificateFields(*ssl_info.cert.get(), &certificate_fields); 322 } 323 manager_->Send(new PpapiMsg_PPBTCPSocket_SSLHandshakeACK( 324 routing_id_, 325 plugin_dispatcher_id_, 326 socket_id_, 327 succeeded, 328 certificate_fields)); 329} 330 331void PepperTCPSocket::SendSetBoolOptionACK(bool succeeded) { 332 manager_->Send(new PpapiMsg_PPBTCPSocket_SetBoolOptionACK( 333 routing_id_, plugin_dispatcher_id_, socket_id_, succeeded)); 334} 335 336void PepperTCPSocket::OnResolveCompleted(int result) { 337 DCHECK(connection_state_ == CONNECT_IN_PROGRESS); 338 339 if (result != net::OK) { 340 SendConnectACKError(); 341 connection_state_ = BEFORE_CONNECT; 342 return; 343 } 344 345 StartConnect(address_list_); 346} 347 348void PepperTCPSocket::OnConnectCompleted(int result) { 349 DCHECK(connection_state_ == CONNECT_IN_PROGRESS && socket_.get()); 350 351 if (result != net::OK) { 352 SendConnectACKError(); 353 connection_state_ = BEFORE_CONNECT; 354 } else { 355 net::IPEndPoint ip_end_point_local; 356 net::IPEndPoint ip_end_point_remote; 357 PP_NetAddress_Private local_addr = 358 NetAddressPrivateImpl::kInvalidNetAddress; 359 PP_NetAddress_Private remote_addr = 360 NetAddressPrivateImpl::kInvalidNetAddress; 361 362 if (socket_->GetLocalAddress(&ip_end_point_local) != net::OK || 363 !NetAddressPrivateImpl::IPEndPointToNetAddress( 364 ip_end_point_local.address(), 365 ip_end_point_local.port(), 366 &local_addr) || 367 socket_->GetPeerAddress(&ip_end_point_remote) != net::OK || 368 !NetAddressPrivateImpl::IPEndPointToNetAddress( 369 ip_end_point_remote.address(), 370 ip_end_point_remote.port(), 371 &remote_addr)) { 372 SendConnectACKError(); 373 connection_state_ = BEFORE_CONNECT; 374 } else { 375 manager_->Send(new PpapiMsg_PPBTCPSocket_ConnectACK( 376 routing_id_, plugin_dispatcher_id_, socket_id_, true, 377 local_addr, remote_addr)); 378 connection_state_ = CONNECTED; 379 } 380 } 381} 382 383void PepperTCPSocket::OnSSLHandshakeCompleted(int result) { 384 DCHECK(connection_state_ == SSL_HANDSHAKE_IN_PROGRESS); 385 386 bool succeeded = result == net::OK; 387 SendSSLHandshakeACK(succeeded); 388 connection_state_ = succeeded ? SSL_CONNECTED : SSL_HANDSHAKE_FAILED; 389} 390 391void PepperTCPSocket::OnReadCompleted(int result) { 392 DCHECK(read_buffer_.get()); 393 394 if (result > 0) { 395 manager_->Send(new PpapiMsg_PPBTCPSocket_ReadACK( 396 routing_id_, plugin_dispatcher_id_, socket_id_, true, 397 std::string(read_buffer_->data(), result))); 398 } else if (result == 0) { 399 end_of_file_reached_ = true; 400 manager_->Send(new PpapiMsg_PPBTCPSocket_ReadACK( 401 routing_id_, plugin_dispatcher_id_, socket_id_, true, std::string())); 402 } else { 403 SendReadACKError(); 404 } 405 read_buffer_ = NULL; 406} 407 408void PepperTCPSocket::OnWriteCompleted(int result) { 409 DCHECK(write_buffer_base_.get()); 410 DCHECK(write_buffer_.get()); 411 412 // Note: For partial writes of 0 bytes, don't continue writing to avoid a 413 // likely infinite loop. 414 if (result > 0) { 415 write_buffer_->DidConsume(result); 416 if (write_buffer_->BytesRemaining() > 0) { 417 DoWrite(); 418 return; 419 } 420 } 421 422 if (result >= 0) { 423 manager_->Send(new PpapiMsg_PPBTCPSocket_WriteACK( 424 routing_id_, plugin_dispatcher_id_, socket_id_, true, 425 write_buffer_->BytesConsumed())); 426 } else { 427 SendWriteACKError(); 428 } 429 430 write_buffer_ = NULL; 431 write_buffer_base_ = NULL; 432} 433 434bool PepperTCPSocket::IsConnected() const { 435 return connection_state_ == CONNECTED || connection_state_ == SSL_CONNECTED; 436} 437 438bool PepperTCPSocket::IsSsl() const { 439 return connection_state_ == SSL_HANDSHAKE_IN_PROGRESS || 440 connection_state_ == SSL_CONNECTED || 441 connection_state_ == SSL_HANDSHAKE_FAILED; 442} 443 444void PepperTCPSocket::DoWrite() { 445 DCHECK(write_buffer_base_.get()); 446 DCHECK(write_buffer_.get()); 447 DCHECK_GT(write_buffer_->BytesRemaining(), 0); 448 449 int result = socket_->Write( 450 write_buffer_.get(), 451 write_buffer_->BytesRemaining(), 452 base::Bind(&PepperTCPSocket::OnWriteCompleted, base::Unretained(this))); 453 if (result != net::ERR_IO_PENDING) 454 OnWriteCompleted(result); 455} 456 457} // namespace content 458