| /* | 
 |  *  Copyright 2004 The WebRTC Project Authors. All rights reserved. | 
 |  * | 
 |  *  Use of this source code is governed by a BSD-style license | 
 |  *  that can be found in the LICENSE file in the root of the source | 
 |  *  tree. An additional intellectual property rights grant can be found | 
 |  *  in the file PATENTS.  All contributing project authors may | 
 |  *  be found in the AUTHORS file in the root of the source tree. | 
 |  */ | 
 |  | 
 | #include "rtc_base/socket_adapters.h" | 
 |  | 
 | #include <algorithm> | 
 | #include <cerrno> | 
 | #include <cstddef> | 
 | #include <cstdint> | 
 | #include <cstring> | 
 |  | 
 | #include "api/array_view.h" | 
 | #include "rtc_base/async_socket.h" | 
 | #include "rtc_base/checks.h" | 
 | #include "rtc_base/logging.h" | 
 | #include "rtc_base/socket.h" | 
 | #include "rtc_base/socket_address.h" | 
 |  | 
 | namespace webrtc { | 
 |  | 
 | BufferedReadAdapter::BufferedReadAdapter(Socket* socket, size_t size) | 
 |     : AsyncSocketAdapter(socket), | 
 |       buffer_size_(size), | 
 |       data_len_(0), | 
 |       buffering_(false) { | 
 |   buffer_ = new char[buffer_size_]; | 
 | } | 
 |  | 
 | BufferedReadAdapter::~BufferedReadAdapter() { | 
 |   delete[] buffer_; | 
 | } | 
 |  | 
 | int BufferedReadAdapter::Send(const void* pv, size_t cb) { | 
 |   if (buffering_) { | 
 |     // TODO: Spoof error better; Signal Writeable | 
 |     SetError(EWOULDBLOCK); | 
 |     return -1; | 
 |   } | 
 |   return AsyncSocketAdapter::Send(pv, cb); | 
 | } | 
 |  | 
 | int BufferedReadAdapter::Recv(void* pv, size_t cb, int64_t* timestamp) { | 
 |   if (buffering_) { | 
 |     SetError(EWOULDBLOCK); | 
 |     return -1; | 
 |   } | 
 |  | 
 |   size_t read = 0; | 
 |  | 
 |   if (data_len_) { | 
 |     read = std::min(cb, data_len_); | 
 |     memcpy(pv, buffer_, read); | 
 |     data_len_ -= read; | 
 |     if (data_len_ > 0) { | 
 |       memmove(buffer_, buffer_ + read, data_len_); | 
 |     } | 
 |     pv = static_cast<char*>(pv) + read; | 
 |     cb -= read; | 
 |   } | 
 |  | 
 |   // FIX: If cb == 0, we won't generate another read event | 
 |  | 
 |   int res = AsyncSocketAdapter::Recv(pv, cb, timestamp); | 
 |   if (res >= 0) { | 
 |     // Read from socket and possibly buffer; return combined length | 
 |     return res + static_cast<int>(read); | 
 |   } | 
 |  | 
 |   if (read > 0) { | 
 |     // Failed to read from socket, but still read something from buffer | 
 |     return static_cast<int>(read); | 
 |   } | 
 |  | 
 |   // Didn't read anything; return error from socket | 
 |   return res; | 
 | } | 
 |  | 
 | void BufferedReadAdapter::BufferInput(bool on) { | 
 |   buffering_ = on; | 
 | } | 
 |  | 
 | void BufferedReadAdapter::OnReadEvent(Socket* socket) { | 
 |   RTC_DCHECK(socket == GetSocket()); | 
 |  | 
 |   if (!buffering_) { | 
 |     AsyncSocketAdapter::OnReadEvent(socket); | 
 |     return; | 
 |   } | 
 |  | 
 |   if (data_len_ >= buffer_size_) { | 
 |     RTC_LOG(LS_ERROR) << "Input buffer overflow"; | 
 |     RTC_DCHECK_NOTREACHED(); | 
 |     data_len_ = 0; | 
 |   } | 
 |  | 
 |   int len = AsyncSocketAdapter::Recv(buffer_ + data_len_, | 
 |                                      buffer_size_ - data_len_, nullptr); | 
 |   if (len < 0) { | 
 |     // TODO: Do something better like forwarding the error to the user. | 
 |     RTC_LOG_ERR(LS_INFO) << "Recv"; | 
 |     return; | 
 |   } | 
 |  | 
 |   data_len_ += len; | 
 |  | 
 |   ProcessInput(buffer_, &data_len_); | 
 | } | 
 |  | 
 | /////////////////////////////////////////////////////////////////////////////// | 
 |  | 
 | // This is a SSL v2 CLIENT_HELLO message. | 
 | // TODO: Should this have a session id? The response doesn't have a | 
 | // certificate, so the hello should have a session id. | 
 | static const uint8_t kSslClientHello[] = { | 
 |     0x80, 0x46,                                            // msg len | 
 |     0x01,                                                  // CLIENT_HELLO | 
 |     0x03, 0x01,                                            // SSL 3.1 | 
 |     0x00, 0x2d,                                            // ciphersuite len | 
 |     0x00, 0x00,                                            // session id len | 
 |     0x00, 0x10,                                            // challenge len | 
 |     0x01, 0x00, 0x80, 0x03, 0x00, 0x80, 0x07, 0x00, 0xc0,  // ciphersuites | 
 |     0x06, 0x00, 0x40, 0x02, 0x00, 0x80, 0x04, 0x00, 0x80,  // | 
 |     0x00, 0x00, 0x04, 0x00, 0xfe, 0xff, 0x00, 0x00, 0x0a,  // | 
 |     0x00, 0xfe, 0xfe, 0x00, 0x00, 0x09, 0x00, 0x00, 0x64,  // | 
 |     0x00, 0x00, 0x62, 0x00, 0x00, 0x03, 0x00, 0x00, 0x06,  // | 
 |     0x1f, 0x17, 0x0c, 0xa6, 0x2f, 0x00, 0x78, 0xfc,        // challenge | 
 |     0x46, 0x55, 0x2e, 0xb1, 0x83, 0x39, 0xf1, 0xea         // | 
 | }; | 
 |  | 
 | // static | 
 | ArrayView<const uint8_t> AsyncSSLSocket::SslClientHello() { | 
 |   // Implicit conversion directly from kSslClientHello to ArrayView fails when | 
 |   // built with gcc. | 
 |   return {kSslClientHello, sizeof(kSslClientHello)}; | 
 | } | 
 |  | 
 | // This is a TLSv1 SERVER_HELLO message. | 
 | static const uint8_t kSslServerHello[] = { | 
 |     0x16,                                            // handshake message | 
 |     0x03, 0x01,                                      // SSL 3.1 | 
 |     0x00, 0x4a,                                      // message len | 
 |     0x02,                                            // SERVER_HELLO | 
 |     0x00, 0x00, 0x46,                                // handshake len | 
 |     0x03, 0x01,                                      // SSL 3.1 | 
 |     0x42, 0x85, 0x45, 0xa7, 0x27, 0xa9, 0x5d, 0xa0,  // server random | 
 |     0xb3, 0xc5, 0xe7, 0x53, 0xda, 0x48, 0x2b, 0x3f,  // | 
 |     0xc6, 0x5a, 0xca, 0x89, 0xc1, 0x58, 0x52, 0xa1,  // | 
 |     0x78, 0x3c, 0x5b, 0x17, 0x46, 0x00, 0x85, 0x3f,  // | 
 |     0x20,                                            // session id len | 
 |     0x0e, 0xd3, 0x06, 0x72, 0x5b, 0x5b, 0x1b, 0x5f,  // session id | 
 |     0x15, 0xac, 0x13, 0xf9, 0x88, 0x53, 0x9d, 0x9b,  // | 
 |     0xe8, 0x3d, 0x7b, 0x0c, 0x30, 0x32, 0x6e, 0x38,  // | 
 |     0x4d, 0xa2, 0x75, 0x57, 0x41, 0x6c, 0x34, 0x5c,  // | 
 |     0x00, 0x04,                                      // RSA/RC4-128/MD5 | 
 |     0x00                                             // null compression | 
 | }; | 
 |  | 
 | // static | 
 | ArrayView<const uint8_t> AsyncSSLSocket::SslServerHello() { | 
 |   return {kSslServerHello, sizeof(kSslServerHello)}; | 
 | } | 
 |  | 
 | AsyncSSLSocket::AsyncSSLSocket(Socket* socket) | 
 |     : BufferedReadAdapter(socket, 1024) {} | 
 |  | 
 | int AsyncSSLSocket::Connect(const SocketAddress& addr) { | 
 |   // Begin buffering before we connect, so that there isn't a race condition | 
 |   // between potential senders and receiving the OnConnectEvent signal | 
 |   BufferInput(true); | 
 |   return BufferedReadAdapter::Connect(addr); | 
 | } | 
 |  | 
 | void AsyncSSLSocket::OnConnectEvent(Socket* socket) { | 
 |   RTC_DCHECK(socket == GetSocket()); | 
 |   // TODO: we could buffer output too... | 
 |   const int res = DirectSend(kSslClientHello, sizeof(kSslClientHello)); | 
 |   if (res != sizeof(kSslClientHello)) { | 
 |     RTC_LOG(LS_ERROR) << "Sending fake SSL ClientHello message failed."; | 
 |     Close(); | 
 |     NotifyCloseEvent(this, 0); | 
 |   } | 
 | } | 
 |  | 
 | void AsyncSSLSocket::ProcessInput(char* data, size_t* len) { | 
 |   if (*len < sizeof(kSslServerHello)) | 
 |     return; | 
 |  | 
 |   if (memcmp(kSslServerHello, data, sizeof(kSslServerHello)) != 0) { | 
 |     RTC_LOG(LS_ERROR) << "Received non-matching fake SSL ServerHello message."; | 
 |     Close(); | 
 |     NotifyCloseEvent(this, 0);  // TODO: error code? | 
 |     return; | 
 |   } | 
 |  | 
 |   *len -= sizeof(kSslServerHello); | 
 |   if (*len > 0) { | 
 |     memmove(data, data + sizeof(kSslServerHello), *len); | 
 |   } | 
 |  | 
 |   bool remainder = (*len > 0); | 
 |   BufferInput(false); | 
 |   NotifyConnectEvent(this); | 
 |  | 
 |   // FIX: if SignalConnect causes the socket to be destroyed, we are in trouble | 
 |   if (remainder) | 
 |     SignalReadEvent(this); | 
 | } | 
 |  | 
 | }  // namespace webrtc |