Index: webrtc/base/socketadapters.cc |
diff --git a/webrtc/base/socketadapters.cc b/webrtc/base/socketadapters.cc |
index b1c2a87aa9b2b5ac9e5d7038bb3176104fc1765b..af2efb82c794f2596f23359f6cf8efa851f8abdb 100644 |
--- a/webrtc/base/socketadapters.cc |
+++ b/webrtc/base/socketadapters.cc |
@@ -137,41 +137,41 @@ AsyncProxyServerSocket::~AsyncProxyServerSocket() = default; |
// This is a SSL v2 CLIENT_HELLO message. |
// TODO: Should this have a session id? The response doesn't have a |
// certificate, so the hello should have a session id. |
-static const uint8 kSslClientHello[] = { |
- 0x80, 0x46, // msg len |
- 0x01, // CLIENT_HELLO |
- 0x03, 0x01, // SSL 3.1 |
- 0x00, 0x2d, // ciphersuite len |
- 0x00, 0x00, // session id len |
- 0x00, 0x10, // challenge len |
- 0x01, 0x00, 0x80, 0x03, 0x00, 0x80, 0x07, 0x00, 0xc0, // ciphersuites |
- 0x06, 0x00, 0x40, 0x02, 0x00, 0x80, 0x04, 0x00, 0x80, // |
- 0x00, 0x00, 0x04, 0x00, 0xfe, 0xff, 0x00, 0x00, 0x0a, // |
- 0x00, 0xfe, 0xfe, 0x00, 0x00, 0x09, 0x00, 0x00, 0x64, // |
- 0x00, 0x00, 0x62, 0x00, 0x00, 0x03, 0x00, 0x00, 0x06, // |
- 0x1f, 0x17, 0x0c, 0xa6, 0x2f, 0x00, 0x78, 0xfc, // challenge |
- 0x46, 0x55, 0x2e, 0xb1, 0x83, 0x39, 0xf1, 0xea // |
+static const uint8_t kSslClientHello[] = { |
+ 0x80, 0x46, // msg len |
+ 0x01, // CLIENT_HELLO |
+ 0x03, 0x01, // SSL 3.1 |
+ 0x00, 0x2d, // ciphersuite len |
+ 0x00, 0x00, // session id len |
+ 0x00, 0x10, // challenge len |
+ 0x01, 0x00, 0x80, 0x03, 0x00, 0x80, 0x07, 0x00, 0xc0, // ciphersuites |
+ 0x06, 0x00, 0x40, 0x02, 0x00, 0x80, 0x04, 0x00, 0x80, // |
+ 0x00, 0x00, 0x04, 0x00, 0xfe, 0xff, 0x00, 0x00, 0x0a, // |
+ 0x00, 0xfe, 0xfe, 0x00, 0x00, 0x09, 0x00, 0x00, 0x64, // |
+ 0x00, 0x00, 0x62, 0x00, 0x00, 0x03, 0x00, 0x00, 0x06, // |
+ 0x1f, 0x17, 0x0c, 0xa6, 0x2f, 0x00, 0x78, 0xfc, // challenge |
+ 0x46, 0x55, 0x2e, 0xb1, 0x83, 0x39, 0xf1, 0xea // |
}; |
// This is a TLSv1 SERVER_HELLO message. |
-static const uint8 kSslServerHello[] = { |
- 0x16, // handshake message |
- 0x03, 0x01, // SSL 3.1 |
- 0x00, 0x4a, // message len |
- 0x02, // SERVER_HELLO |
- 0x00, 0x00, 0x46, // handshake len |
- 0x03, 0x01, // SSL 3.1 |
- 0x42, 0x85, 0x45, 0xa7, 0x27, 0xa9, 0x5d, 0xa0, // server random |
- 0xb3, 0xc5, 0xe7, 0x53, 0xda, 0x48, 0x2b, 0x3f, // |
- 0xc6, 0x5a, 0xca, 0x89, 0xc1, 0x58, 0x52, 0xa1, // |
- 0x78, 0x3c, 0x5b, 0x17, 0x46, 0x00, 0x85, 0x3f, // |
- 0x20, // session id len |
- 0x0e, 0xd3, 0x06, 0x72, 0x5b, 0x5b, 0x1b, 0x5f, // session id |
- 0x15, 0xac, 0x13, 0xf9, 0x88, 0x53, 0x9d, 0x9b, // |
- 0xe8, 0x3d, 0x7b, 0x0c, 0x30, 0x32, 0x6e, 0x38, // |
- 0x4d, 0xa2, 0x75, 0x57, 0x41, 0x6c, 0x34, 0x5c, // |
- 0x00, 0x04, // RSA/RC4-128/MD5 |
- 0x00 // null compression |
+static const uint8_t kSslServerHello[] = { |
+ 0x16, // handshake message |
+ 0x03, 0x01, // SSL 3.1 |
+ 0x00, 0x4a, // message len |
+ 0x02, // SERVER_HELLO |
+ 0x00, 0x00, 0x46, // handshake len |
+ 0x03, 0x01, // SSL 3.1 |
+ 0x42, 0x85, 0x45, 0xa7, 0x27, 0xa9, 0x5d, 0xa0, // server random |
+ 0xb3, 0xc5, 0xe7, 0x53, 0xda, 0x48, 0x2b, 0x3f, // |
+ 0xc6, 0x5a, 0xca, 0x89, 0xc1, 0x58, 0x52, 0xa1, // |
+ 0x78, 0x3c, 0x5b, 0x17, 0x46, 0x00, 0x85, 0x3f, // |
+ 0x20, // session id len |
+ 0x0e, 0xd3, 0x06, 0x72, 0x5b, 0x5b, 0x1b, 0x5f, // session id |
+ 0x15, 0xac, 0x13, 0xf9, 0x88, 0x53, 0x9d, 0x9b, // |
+ 0xe8, 0x3d, 0x7b, 0x0c, 0x30, 0x32, 0x6e, 0x38, // |
+ 0x4d, 0xa2, 0x75, 0x57, 0x41, 0x6c, 0x34, 0x5c, // |
+ 0x00, 0x04, // RSA/RC4-128/MD5 |
+ 0x00 // null compression |
}; |
AsyncSSLSocket::AsyncSSLSocket(AsyncSocket* socket) |
@@ -564,7 +564,7 @@ void AsyncSocksProxySocket::ProcessInput(char* data, size_t* len) { |
ByteBuffer response(data, *len); |
if (state_ == SS_HELLO) { |
- uint8 ver, method; |
+ uint8_t ver, method; |
if (!response.ReadUInt8(&ver) || |
!response.ReadUInt8(&method)) |
return; |
@@ -583,7 +583,7 @@ void AsyncSocksProxySocket::ProcessInput(char* data, size_t* len) { |
return; |
} |
} else if (state_ == SS_AUTH) { |
- uint8 ver, status; |
+ uint8_t ver, status; |
if (!response.ReadUInt8(&ver) || |
!response.ReadUInt8(&status)) |
return; |
@@ -595,7 +595,7 @@ void AsyncSocksProxySocket::ProcessInput(char* data, size_t* len) { |
SendConnect(); |
} else if (state_ == SS_CONNECT) { |
- uint8 ver, rep, rsv, atyp; |
+ uint8_t ver, rep, rsv, atyp; |
if (!response.ReadUInt8(&ver) || |
!response.ReadUInt8(&rep) || |
!response.ReadUInt8(&rsv) || |
@@ -607,15 +607,15 @@ void AsyncSocksProxySocket::ProcessInput(char* data, size_t* len) { |
return; |
} |
- uint16 port; |
+ uint16_t port; |
if (atyp == 1) { |
- uint32 addr; |
+ uint32_t addr; |
if (!response.ReadUInt32(&addr) || |
!response.ReadUInt16(&port)) |
return; |
LOG(LS_VERBOSE) << "Bound on " << addr << ":" << port; |
} else if (atyp == 3) { |
- uint8 len; |
+ uint8_t len; |
std::string addr; |
if (!response.ReadUInt8(&len) || |
!response.ReadString(&addr, len) || |
@@ -670,9 +670,9 @@ void AsyncSocksProxySocket::SendHello() { |
void AsyncSocksProxySocket::SendAuth() { |
ByteBuffer request; |
request.WriteUInt8(1); // Negotiation Version |
- request.WriteUInt8(static_cast<uint8>(user_.size())); |
+ request.WriteUInt8(static_cast<uint8_t>(user_.size())); |
request.WriteString(user_); // Username |
- request.WriteUInt8(static_cast<uint8>(pass_.GetLength())); |
+ request.WriteUInt8(static_cast<uint8_t>(pass_.GetLength())); |
size_t len = pass_.GetLength() + 1; |
char * sensitive = new char[len]; |
pass_.CopyTo(sensitive, true); |
@@ -691,7 +691,7 @@ void AsyncSocksProxySocket::SendConnect() { |
if (dest_.IsUnresolved()) { |
std::string hostname = dest_.hostname(); |
request.WriteUInt8(3); // DOMAINNAME |
- request.WriteUInt8(static_cast<uint8>(hostname.size())); |
+ request.WriteUInt8(static_cast<uint8_t>(hostname.size())); |
request.WriteString(hostname); // Destination Hostname |
} else { |
request.WriteUInt8(1); // IPV4 |
@@ -738,7 +738,7 @@ void AsyncSocksProxyServerSocket::DirectSend(const ByteBuffer& buf) { |
} |
void AsyncSocksProxyServerSocket::HandleHello(ByteBuffer* request) { |
- uint8 ver, num_methods; |
+ uint8_t ver, num_methods; |
if (!request->ReadUInt8(&ver) || |
!request->ReadUInt8(&num_methods)) { |
Error(0); |
@@ -751,7 +751,7 @@ void AsyncSocksProxyServerSocket::HandleHello(ByteBuffer* request) { |
} |
// Handle either no-auth (0) or user/pass auth (2) |
- uint8 method = 0xFF; |
+ uint8_t method = 0xFF; |
if (num_methods > 0 && !request->ReadUInt8(&method)) { |
Error(0); |
return; |
@@ -768,7 +768,7 @@ void AsyncSocksProxyServerSocket::HandleHello(ByteBuffer* request) { |
} |
} |
-void AsyncSocksProxyServerSocket::SendHelloReply(uint8 method) { |
+void AsyncSocksProxyServerSocket::SendHelloReply(uint8_t method) { |
ByteBuffer response; |
response.WriteUInt8(5); // Socks Version |
response.WriteUInt8(method); // Auth method |
@@ -776,7 +776,7 @@ void AsyncSocksProxyServerSocket::SendHelloReply(uint8 method) { |
} |
void AsyncSocksProxyServerSocket::HandleAuth(ByteBuffer* request) { |
- uint8 ver, user_len, pass_len; |
+ uint8_t ver, user_len, pass_len; |
std::string user, pass; |
if (!request->ReadUInt8(&ver) || |
!request->ReadUInt8(&user_len) || |
@@ -792,7 +792,7 @@ void AsyncSocksProxyServerSocket::HandleAuth(ByteBuffer* request) { |
state_ = SS_CONNECT; |
} |
-void AsyncSocksProxyServerSocket::SendAuthReply(uint8 result) { |
+void AsyncSocksProxyServerSocket::SendAuthReply(uint8_t result) { |
ByteBuffer response; |
response.WriteUInt8(1); // Negotiation Version |
response.WriteUInt8(result); |
@@ -800,9 +800,9 @@ void AsyncSocksProxyServerSocket::SendAuthReply(uint8 result) { |
} |
void AsyncSocksProxyServerSocket::HandleConnect(ByteBuffer* request) { |
- uint8 ver, command, reserved, addr_type; |
- uint32 ip; |
- uint16 port; |
+ uint8_t ver, command, reserved, addr_type; |
+ uint32_t ip; |
+ uint16_t port; |
if (!request->ReadUInt8(&ver) || |
!request->ReadUInt8(&command) || |
!request->ReadUInt8(&reserved) || |