blob: b914f281cb3ece3926fac97fc21a65ed7689f475 [file] [log] [blame]
Andy Greenb429d482013-01-16 12:21:29 +08001/*
2 * libwebsockets - small server side websockets and web server implementation
3 *
Andy Green27e770b2014-03-23 11:21:51 +08004 * Copyright (C) 2010-2014 Andy Green <andy@warmcat.com>
Andy Greenb429d482013-01-16 12:21:29 +08005 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation:
9 * version 2.1 of the License.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
19 * MA 02110-1301 USA
20 */
21
22#include "private-libwebsockets.h"
23
Andy Greenb429d482013-01-16 12:21:29 +080024static int
25libwebsocket_0405_frame_mask_generate(struct libwebsocket *wsi)
26{
Andy Greenb429d482013-01-16 12:21:29 +080027 int n;
28
29 /* fetch the per-frame nonce */
30
31 n = libwebsockets_get_random(wsi->protocol->owning_server,
Andy Greenb5b23192013-02-11 17:13:32 +080032 wsi->u.ws.frame_masking_nonce_04, 4);
Andy Greenb429d482013-01-16 12:21:29 +080033 if (n != 4) {
34 lwsl_parser("Unable to read from random device %s %d\n",
35 SYSTEM_RANDOM_FILEPATH, n);
36 return 1;
37 }
38
39 /* start masking from first byte of masking key buffer */
Andy Green623a98d2013-01-21 11:04:23 +080040 wsi->u.ws.frame_mask_index = 0;
Andy Greenb429d482013-01-16 12:21:29 +080041
Andy Greenb429d482013-01-16 12:21:29 +080042 return 0;
43}
44
Andy Greencf3590e2013-01-16 14:35:27 +080045#ifdef _DEBUG
Andy Greenb429d482013-01-16 12:21:29 +080046
Peter Pentchev9a4fef72013-03-30 09:52:21 +080047LWS_VISIBLE void lwsl_hexdump(void *vbuf, size_t len)
Andy Greenb429d482013-01-16 12:21:29 +080048{
49 int n;
50 int m;
51 int start;
Andy Greencf3590e2013-01-16 14:35:27 +080052 unsigned char *buf = (unsigned char *)vbuf;
53 char line[80];
54 char *p;
Andy Greenb429d482013-01-16 12:21:29 +080055
56 lwsl_parser("\n");
57
58 for (n = 0; n < len;) {
59 start = n;
Andy Greencf3590e2013-01-16 14:35:27 +080060 p = line;
Andy Greenb429d482013-01-16 12:21:29 +080061
Andy Greencf3590e2013-01-16 14:35:27 +080062 p += sprintf(p, "%04X: ", start);
Andy Greenb429d482013-01-16 12:21:29 +080063
64 for (m = 0; m < 16 && n < len; m++)
Andy Greencf3590e2013-01-16 14:35:27 +080065 p += sprintf(p, "%02X ", buf[n++]);
Andy Greenb429d482013-01-16 12:21:29 +080066 while (m++ < 16)
Andy Greencf3590e2013-01-16 14:35:27 +080067 p += sprintf(p, " ");
Andy Greenb429d482013-01-16 12:21:29 +080068
Andy Greencf3590e2013-01-16 14:35:27 +080069 p += sprintf(p, " ");
Andy Greenb429d482013-01-16 12:21:29 +080070
71 for (m = 0; m < 16 && (start + m) < len; m++) {
Andy Green3182ece2013-01-20 17:08:31 +080072 if (buf[start + m] >= ' ' && buf[start + m] < 127)
Andy Greencf3590e2013-01-16 14:35:27 +080073 *p++ = buf[start + m];
Andy Greenb429d482013-01-16 12:21:29 +080074 else
Andy Greencf3590e2013-01-16 14:35:27 +080075 *p++ = '.';
Andy Greenb429d482013-01-16 12:21:29 +080076 }
77 while (m++ < 16)
Andy Greencf3590e2013-01-16 14:35:27 +080078 *p++ = ' ';
Andy Greenb429d482013-01-16 12:21:29 +080079
Andy Greencf3590e2013-01-16 14:35:27 +080080 *p++ = '\n';
81 *p = '\0';
Andy Green3182ece2013-01-20 17:08:31 +080082 lwsl_debug("%s", line);
Andy Greenb429d482013-01-16 12:21:29 +080083 }
84 lwsl_debug("\n");
85}
86
Andy Greencf3590e2013-01-16 14:35:27 +080087#endif
88
Andy Greenfc7c5e42013-02-23 10:50:10 +080089/*
Andy Green1f4267b2013-10-17 08:09:19 +080090 * notice this returns number of bytes consumed, or -1
Andy Greenfc7c5e42013-02-23 10:50:10 +080091 */
92
Andy Greenb429d482013-01-16 12:21:29 +080093int lws_issue_raw(struct libwebsocket *wsi, unsigned char *buf, size_t len)
94{
Andy Greene000a702013-01-29 12:37:35 +080095 struct libwebsocket_context *context = wsi->protocol->owning_server;
Andy Greenb429d482013-01-16 12:21:29 +080096 int n;
mroszko793e7c02013-12-10 21:15:00 +080097 size_t real_len = len;
Andy Greenb429d482013-01-16 12:21:29 +080098 int m;
Andy Green03cf1dd2014-04-01 14:20:44 +080099
100 if (!len)
101 return 0;
Andy Greena1a24d22014-04-10 14:25:24 +0800102 /* just ignore sends after we cleared the truncation buffer */
103 if (wsi->state == WSI_STATE_FLUSHING_STORED_SEND_BEFORE_CLOSE &&
104 !wsi->truncated_send_len)
105 return len;
Andy Green2764eba2013-12-09 14:16:17 +0800106
Andy Greene254d952014-03-23 11:41:15 +0800107 if (wsi->truncated_send_len && (buf < wsi->truncated_send_malloc ||
Andy Green27e770b2014-03-23 11:21:51 +0800108 buf > (wsi->truncated_send_malloc +
109 wsi->truncated_send_len +
110 wsi->truncated_send_offset))) {
111 lwsl_err("****** %x Sending new, pending truncated ...\n", wsi);
Andy Green2764eba2013-12-09 14:16:17 +0800112 assert(0);
113 }
Andy Greenb429d482013-01-16 12:21:29 +0800114
Andy Green2c24ec02014-04-02 19:45:42 +0800115 m = lws_ext_callback_for_each_active(wsi,
116 LWS_EXT_CALLBACK_PACKET_TX_DO_SEND, &buf, len);
117 if (m < 0)
118 return -1;
119 if (m) /* handled */ {
120 n = m;
121 goto handle_truncated_send;
Andy Greenb429d482013-01-16 12:21:29 +0800122 }
Andy Green1f4267b2013-10-17 08:09:19 +0800123 if (wsi->sock < 0)
124 lwsl_warn("** error invalid sock but expected to send\n");
Andy Greenb429d482013-01-16 12:21:29 +0800125
126 /*
127 * nope, send it on the socket directly
128 */
Andy Greene000a702013-01-29 12:37:35 +0800129 lws_latency_pre(context, wsi);
Andy Green02138122014-04-06 06:26:35 +0100130 n = lws_ssl_capable_write(wsi, buf, len);
131 lws_latency(context, wsi, "send lws_issue_raw", n, n == len);
Andy Greend7340c12014-04-10 14:08:10 +0800132
Andy Green02138122014-04-06 06:26:35 +0100133 switch (n) {
134 case LWS_SSL_CAPABLE_ERROR:
Andy Green1e499182014-10-16 08:23:46 +0800135 /* we're going to close, let close know sends aren't possible */
136 wsi->socket_is_permanently_unusable = 1;
Andy Green02138122014-04-06 06:26:35 +0100137 return -1;
138 case LWS_SSL_CAPABLE_MORE_SERVICE:
Andy Greend7340c12014-04-10 14:08:10 +0800139 /* nothing got sent, not fatal, retry the whole thing later */
Andy Green02138122014-04-06 06:26:35 +0100140 n = 0;
Andy Greend7340c12014-04-10 14:08:10 +0800141 break;
Andy Greenb429d482013-01-16 12:21:29 +0800142 }
Andy Green1f4267b2013-10-17 08:09:19 +0800143
144handle_truncated_send:
Andy Green1f4267b2013-10-17 08:09:19 +0800145 /*
Andy Greend7340c12014-04-10 14:08:10 +0800146 * we were already handling a truncated send?
Andy Green1f4267b2013-10-17 08:09:19 +0800147 */
Andy Greene254d952014-03-23 11:41:15 +0800148 if (wsi->truncated_send_len) {
Andy Green27e770b2014-03-23 11:21:51 +0800149 lwsl_info("***** %x partial send moved on by %d (vs %d)\n",
150 wsi, n, real_len);
Andy Green2764eba2013-12-09 14:16:17 +0800151 wsi->truncated_send_offset += n;
152 wsi->truncated_send_len -= n;
Andy Green1f4267b2013-10-17 08:09:19 +0800153
Andy Green2764eba2013-12-09 14:16:17 +0800154 if (!wsi->truncated_send_len) {
155 lwsl_info("***** %x partial send completed\n", wsi);
Andy Greene254d952014-03-23 11:41:15 +0800156 /* done with it, but don't free it */
Andy Green2764eba2013-12-09 14:16:17 +0800157 n = real_len;
Andy Greenf4ffc1e2014-04-10 17:06:59 +0800158 if (wsi->state == WSI_STATE_FLUSHING_STORED_SEND_BEFORE_CLOSE) {
Andy Greena1a24d22014-04-10 14:25:24 +0800159 lwsl_info("***** %x signalling to close now\n", wsi);
160 return -1; /* retry closing now */
Andy Greenf4ffc1e2014-04-10 17:06:59 +0800161 }
Andy Green15d56dd2014-04-10 11:23:18 +0800162 }
163 /* always callback on writeable */
164 libwebsocket_callback_on_writable(
Andy Green1f4267b2013-10-17 08:09:19 +0800165 wsi->protocol->owning_server, wsi);
166
167 return n;
168 }
169
Andy Greend7340c12014-04-10 14:08:10 +0800170 if (n == real_len)
171 /* what we just sent went out cleanly */
172 return n;
Andy Green1f4267b2013-10-17 08:09:19 +0800173
Andy Greend7340c12014-04-10 14:08:10 +0800174 if (n && wsi->u.ws.clean_buffer)
Andy Green1f4267b2013-10-17 08:09:19 +0800175 /*
Andy Greend7340c12014-04-10 14:08:10 +0800176 * This buffer unaffected by extension rewriting.
177 * It means the user code is expected to deal with
178 * partial sends. (lws knows the header was already
179 * sent, so on next send will just resume sending
180 * payload)
Andy Green1f4267b2013-10-17 08:09:19 +0800181 */
Andy Greend7340c12014-04-10 14:08:10 +0800182 return n;
Andy Green1f4267b2013-10-17 08:09:19 +0800183
Andy Greend7340c12014-04-10 14:08:10 +0800184 /*
185 * Newly truncated send. Buffer the remainder (it will get
186 * first priority next time the socket is writable)
187 */
188 lwsl_info("***** %x new partial sent %d from %d total\n",
189 wsi, n, real_len);
Andy Green1f4267b2013-10-17 08:09:19 +0800190
Andy Greend7340c12014-04-10 14:08:10 +0800191 /*
192 * - if we still have a suitable malloc lying around, use it
193 * - or, if too small, reallocate it
194 * - or, if no buffer, create it
195 */
196 if (!wsi->truncated_send_malloc ||
197 real_len - n > wsi->truncated_send_allocation) {
Alejandro Mery6ff28242014-12-04 23:59:35 +0100198 lws_free(wsi->truncated_send_malloc);
Andy Greend7340c12014-04-10 14:08:10 +0800199
200 wsi->truncated_send_allocation = real_len - n;
Alejandro Mery6ff28242014-12-04 23:59:35 +0100201 wsi->truncated_send_malloc = lws_malloc(real_len - n);
Andy Greend7340c12014-04-10 14:08:10 +0800202 if (!wsi->truncated_send_malloc) {
203 lwsl_err("truncated send: unable to malloc %d\n",
204 real_len - n);
205 return -1;
Andy Greene254d952014-03-23 11:41:15 +0800206 }
Andy Green1f4267b2013-10-17 08:09:19 +0800207 }
Andy Greend7340c12014-04-10 14:08:10 +0800208 wsi->truncated_send_offset = 0;
209 wsi->truncated_send_len = real_len - n;
210 memcpy(wsi->truncated_send_malloc, buf + n, real_len - n);
Andy Green1f4267b2013-10-17 08:09:19 +0800211
Andy Greend7340c12014-04-10 14:08:10 +0800212 /* since something buffered, force it to get another chance to send */
213 libwebsocket_callback_on_writable(wsi->protocol->owning_server, wsi);
214
215 return real_len;
Andy Greenb429d482013-01-16 12:21:29 +0800216}
217
Andy Greenb429d482013-01-16 12:21:29 +0800218/**
219 * libwebsocket_write() - Apply protocol then write data to client
220 * @wsi: Websocket instance (available from user callback)
221 * @buf: The data to send. For data being sent on a websocket
222 * connection (ie, not default http), this buffer MUST have
223 * LWS_SEND_BUFFER_PRE_PADDING bytes valid BEFORE the pointer
224 * and an additional LWS_SEND_BUFFER_POST_PADDING bytes valid
225 * in the buffer after (buf + len). This is so the protocol
226 * header and trailer data can be added in-situ.
227 * @len: Count of the data bytes in the payload starting from buf
228 * @protocol: Use LWS_WRITE_HTTP to reply to an http connection, and one
229 * of LWS_WRITE_BINARY or LWS_WRITE_TEXT to send appropriate
230 * data on a websockets connection. Remember to allow the extra
231 * bytes before and after buf if LWS_WRITE_BINARY or LWS_WRITE_TEXT
232 * are used.
233 *
234 * This function provides the way to issue data back to the client
235 * for both http and websocket protocols.
236 *
237 * In the case of sending using websocket protocol, be sure to allocate
238 * valid storage before and after buf as explained above. This scheme
239 * allows maximum efficiency of sending data and protocol in a single
240 * packet while not burdening the user code with any protocol knowledge.
Andy Greenfc7c5e42013-02-23 10:50:10 +0800241 *
242 * Return may be -1 for a fatal error needing connection close, or a
243 * positive number reflecting the amount of bytes actually sent. This
244 * can be less than the requested number of bytes due to OS memory
245 * pressure at any given time.
Andy Greenb429d482013-01-16 12:21:29 +0800246 */
247
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800248LWS_VISIBLE int libwebsocket_write(struct libwebsocket *wsi, unsigned char *buf,
Andy Greenb429d482013-01-16 12:21:29 +0800249 size_t len, enum libwebsocket_write_protocol protocol)
250{
251 int n;
252 int pre = 0;
253 int post = 0;
Andy Green5738c0e2013-01-21 09:53:35 +0800254 int masked7 = wsi->mode == LWS_CONNMODE_WS_CLIENT;
Andy Greenb429d482013-01-16 12:21:29 +0800255 unsigned char *dropmask = NULL;
256 unsigned char is_masked_bit = 0;
Andy Greenfc7c5e42013-02-23 10:50:10 +0800257 size_t orig_len = len;
Andy Greenb429d482013-01-16 12:21:29 +0800258 struct lws_tokens eff_buf;
Andy Greenb429d482013-01-16 12:21:29 +0800259
Andy Green1f4267b2013-10-17 08:09:19 +0800260 if (len == 0 && protocol != LWS_WRITE_CLOSE &&
261 protocol != LWS_WRITE_PING && protocol != LWS_WRITE_PONG) {
Andy Greenb429d482013-01-16 12:21:29 +0800262 lwsl_warn("zero length libwebsocket_write attempt\n");
263 return 0;
264 }
265
Andy Green200f3852014-10-18 12:23:05 +0800266 if (protocol == LWS_WRITE_HTTP ||
267 protocol == LWS_WRITE_HTTP_FINAL ||
268 protocol == LWS_WRITE_HTTP_HEADERS)
Andy Greenb429d482013-01-16 12:21:29 +0800269 goto send_raw;
270
271 /* websocket protocol, either binary or text */
272
273 if (wsi->state != WSI_STATE_ESTABLISHED)
274 return -1;
275
Andy Green1f4267b2013-10-17 08:09:19 +0800276 /* if we are continuing a frame that already had its header done */
277
278 if (wsi->u.ws.inside_frame)
279 goto do_more_inside_frame;
280
Andy Green822241c2014-08-18 22:21:51 +0800281 wsi->u.ws.clean_buffer = 1;
Andy Green1f4267b2013-10-17 08:09:19 +0800282
Andy Green1f4267b2013-10-17 08:09:19 +0800283 /*
284 * give a chance to the extensions to modify payload
285 * pre-TX mangling is not allowed to truncate
286 */
Andy Greenb429d482013-01-16 12:21:29 +0800287 eff_buf.token = (char *)buf;
288 eff_buf.token_len = len;
289
Andy Green0303db42013-01-17 14:46:43 +0800290 switch (protocol) {
291 case LWS_WRITE_PING:
292 case LWS_WRITE_PONG:
293 case LWS_WRITE_CLOSE:
294 break;
295 default:
Andy Green2c24ec02014-04-02 19:45:42 +0800296 if (lws_ext_callback_for_each_active(wsi,
297 LWS_EXT_CALLBACK_PAYLOAD_TX, &eff_buf, 0) < 0)
298 return -1;
Andy Greenb429d482013-01-16 12:21:29 +0800299 }
300
Andy Green1f4267b2013-10-17 08:09:19 +0800301 /*
302 * an extension did something we need to keep... for example, if
303 * compression extension, it has already updated its state according
304 * to this being issued
305 */
306 if ((char *)buf != eff_buf.token)
Andy Green27e770b2014-03-23 11:21:51 +0800307 /*
308 * extension recreated it:
309 * need to buffer this if not all sent
310 */
311 wsi->u.ws.clean_buffer = 0;
Andy Green1f4267b2013-10-17 08:09:19 +0800312
Andy Greenb429d482013-01-16 12:21:29 +0800313 buf = (unsigned char *)eff_buf.token;
314 len = eff_buf.token_len;
315
316 switch (wsi->ietf_spec_revision) {
Andy Greenb429d482013-01-16 12:21:29 +0800317 case 13:
Andy Green1f4267b2013-10-17 08:09:19 +0800318
Andy Greenb429d482013-01-16 12:21:29 +0800319 if (masked7) {
320 pre += 4;
321 dropmask = &buf[0 - pre];
322 is_masked_bit = 0x80;
323 }
Andy Green5738c0e2013-01-21 09:53:35 +0800324
Andy Greenb429d482013-01-16 12:21:29 +0800325 switch (protocol & 0xf) {
326 case LWS_WRITE_TEXT:
Andy Green5738c0e2013-01-21 09:53:35 +0800327 n = LWS_WS_OPCODE_07__TEXT_FRAME;
Andy Greenb429d482013-01-16 12:21:29 +0800328 break;
329 case LWS_WRITE_BINARY:
Andy Green5738c0e2013-01-21 09:53:35 +0800330 n = LWS_WS_OPCODE_07__BINARY_FRAME;
Andy Greenb429d482013-01-16 12:21:29 +0800331 break;
332 case LWS_WRITE_CONTINUATION:
Andy Green5738c0e2013-01-21 09:53:35 +0800333 n = LWS_WS_OPCODE_07__CONTINUATION;
Andy Greenb429d482013-01-16 12:21:29 +0800334 break;
335
336 case LWS_WRITE_CLOSE:
Andy Green5738c0e2013-01-21 09:53:35 +0800337 n = LWS_WS_OPCODE_07__CLOSE;
Andy Greenb429d482013-01-16 12:21:29 +0800338
339 /*
Andy Green5738c0e2013-01-21 09:53:35 +0800340 * 06+ has a 2-byte status code in network order
341 * we can do this because we demand post-buf
Andy Greenb429d482013-01-16 12:21:29 +0800342 */
343
Andy Green623a98d2013-01-21 11:04:23 +0800344 if (wsi->u.ws.close_reason) {
Andy Green5738c0e2013-01-21 09:53:35 +0800345 /* reason codes count as data bytes */
346 buf -= 2;
Andy Green623a98d2013-01-21 11:04:23 +0800347 buf[0] = wsi->u.ws.close_reason >> 8;
348 buf[1] = wsi->u.ws.close_reason;
Andy Green5738c0e2013-01-21 09:53:35 +0800349 len += 2;
Andy Greenb429d482013-01-16 12:21:29 +0800350 }
351 break;
352 case LWS_WRITE_PING:
Andy Green5738c0e2013-01-21 09:53:35 +0800353 n = LWS_WS_OPCODE_07__PING;
Andy Greenb429d482013-01-16 12:21:29 +0800354 break;
355 case LWS_WRITE_PONG:
Andy Green5738c0e2013-01-21 09:53:35 +0800356 n = LWS_WS_OPCODE_07__PONG;
Andy Greenb429d482013-01-16 12:21:29 +0800357 break;
358 default:
Andy Greenb5b23192013-02-11 17:13:32 +0800359 lwsl_warn("lws_write: unknown write opc / protocol\n");
Andy Greenb429d482013-01-16 12:21:29 +0800360 return -1;
361 }
362
363 if (!(protocol & LWS_WRITE_NO_FIN))
364 n |= 1 << 7;
365
366 if (len < 126) {
367 pre += 2;
368 buf[-pre] = n;
369 buf[-pre + 1] = len | is_masked_bit;
370 } else {
371 if (len < 65536) {
372 pre += 4;
373 buf[-pre] = n;
374 buf[-pre + 1] = 126 | is_masked_bit;
375 buf[-pre + 2] = len >> 8;
376 buf[-pre + 3] = len;
377 } else {
378 pre += 10;
379 buf[-pre] = n;
380 buf[-pre + 1] = 127 | is_masked_bit;
381#if defined __LP64__
382 buf[-pre + 2] = (len >> 56) & 0x7f;
383 buf[-pre + 3] = len >> 48;
384 buf[-pre + 4] = len >> 40;
385 buf[-pre + 5] = len >> 32;
386#else
387 buf[-pre + 2] = 0;
388 buf[-pre + 3] = 0;
389 buf[-pre + 4] = 0;
390 buf[-pre + 5] = 0;
391#endif
392 buf[-pre + 6] = len >> 24;
393 buf[-pre + 7] = len >> 16;
394 buf[-pre + 8] = len >> 8;
395 buf[-pre + 9] = len;
396 }
397 }
398 break;
399 }
400
Andy Green1f4267b2013-10-17 08:09:19 +0800401do_more_inside_frame:
402
Andy Greenb429d482013-01-16 12:21:29 +0800403 /*
404 * Deal with masking if we are in client -> server direction and
405 * the protocol demands it
406 */
407
Andy Green5738c0e2013-01-21 09:53:35 +0800408 if (wsi->mode == LWS_CONNMODE_WS_CLIENT) {
Andy Greenb429d482013-01-16 12:21:29 +0800409
Andy Green1f4267b2013-10-17 08:09:19 +0800410 if (!wsi->u.ws.inside_frame)
411 if (libwebsocket_0405_frame_mask_generate(wsi)) {
Andy Green27e770b2014-03-23 11:21:51 +0800412 lwsl_err("frame mask generation failed\n");
Andy Green1f4267b2013-10-17 08:09:19 +0800413 return -1;
414 }
Andy Greenb429d482013-01-16 12:21:29 +0800415
Andy Green5738c0e2013-01-21 09:53:35 +0800416 /*
417 * in v7, just mask the payload
418 */
Nikolay Dimitrova8268e72013-12-21 10:22:17 +0800419 if (dropmask) { /* never set if already inside frame */
420 for (n = 4; n < (int)len + 4; n++)
421 dropmask[n] = dropmask[n] ^
Andy Greenb5b23192013-02-11 17:13:32 +0800422 wsi->u.ws.frame_masking_nonce_04[
423 (wsi->u.ws.frame_mask_index++) & 3];
Andy Green5738c0e2013-01-21 09:53:35 +0800424
Andy Green5738c0e2013-01-21 09:53:35 +0800425 /* copy the frame nonce into place */
Andy Green1f4267b2013-10-17 08:09:19 +0800426 memcpy(dropmask, wsi->u.ws.frame_masking_nonce_04, 4);
Nikolay Dimitrova8268e72013-12-21 10:22:17 +0800427 }
Andy Greenb429d482013-01-16 12:21:29 +0800428 }
429
430send_raw:
Andy Green0303db42013-01-17 14:46:43 +0800431 switch (protocol) {
432 case LWS_WRITE_CLOSE:
Andy Greenb5b23192013-02-11 17:13:32 +0800433/* lwsl_hexdump(&buf[-pre], len + post); */
Andy Green0303db42013-01-17 14:46:43 +0800434 case LWS_WRITE_HTTP:
Andy Green200f3852014-10-18 12:23:05 +0800435 case LWS_WRITE_HTTP_FINAL:
Andy Green024eb6c2014-10-08 12:00:53 +0800436 case LWS_WRITE_HTTP_HEADERS:
Andy Green0303db42013-01-17 14:46:43 +0800437 case LWS_WRITE_PONG:
438 case LWS_WRITE_PING:
Andy Green095d3032014-10-08 12:15:15 +0800439#ifdef LWS_USE_HTTP2
Andy Green024eb6c2014-10-08 12:00:53 +0800440 if (wsi->mode == LWS_CONNMODE_HTTP2_SERVING) {
Andy Green2add6342014-10-12 08:38:16 +0800441 unsigned char flags = 0;
442
Andy Green024eb6c2014-10-08 12:00:53 +0800443 n = LWS_HTTP2_FRAME_TYPE_DATA;
Andy Green2add6342014-10-12 08:38:16 +0800444 if (protocol == LWS_WRITE_HTTP_HEADERS) {
Andy Green024eb6c2014-10-08 12:00:53 +0800445 n = LWS_HTTP2_FRAME_TYPE_HEADERS;
Andy Green91b05892014-10-17 08:38:44 +0800446 flags = LWS_HTTP2_FLAG_END_HEADERS;
Andy Green1cea5812014-10-19 07:36:20 +0800447 if (wsi->u.http2.send_END_STREAM)
448 flags |= LWS_HTTP2_FLAG_END_STREAM;
Andy Green2add6342014-10-12 08:38:16 +0800449 }
Andy Green200f3852014-10-18 12:23:05 +0800450
451 if ((protocol == LWS_WRITE_HTTP || protocol == LWS_WRITE_HTTP_FINAL) && wsi->u.http.content_length) {
452 wsi->u.http.content_remain -= len;
453 lwsl_info("%s: content_remain = %lu\n", __func__, wsi->u.http.content_remain);
454 if (!wsi->u.http.content_remain) {
455 lwsl_info("%s: selecting final write mode\n", __func__);
456 protocol = LWS_WRITE_HTTP_FINAL;
457 }
458 }
459
Andy Green1cea5812014-10-19 07:36:20 +0800460 if (protocol == LWS_WRITE_HTTP_FINAL && wsi->u.http2.END_STREAM) {
Andy Green200f3852014-10-18 12:23:05 +0800461 lwsl_info("%s: setting END_STREAM\n", __func__);
462 flags |= LWS_HTTP2_FLAG_END_STREAM;
463 }
464
Andy Green2add6342014-10-12 08:38:16 +0800465 return lws_http2_frame_write(wsi, n, flags, wsi->u.http2.my_stream_id, len, buf);
Andy Green024eb6c2014-10-08 12:00:53 +0800466 }
Andy Green095d3032014-10-08 12:15:15 +0800467#endif
Andy Greenfc7c5e42013-02-23 10:50:10 +0800468 return lws_issue_raw(wsi, (unsigned char *)buf - pre,
469 len + pre + post);
Andy Green0303db42013-01-17 14:46:43 +0800470 default:
471 break;
Andy Greenb429d482013-01-16 12:21:29 +0800472 }
473
Andy Green1f4267b2013-10-17 08:09:19 +0800474 wsi->u.ws.inside_frame = 1;
475
Andy Greenb429d482013-01-16 12:21:29 +0800476 /*
477 * give any active extensions a chance to munge the buffer
478 * before send. We pass in a pointer to an lws_tokens struct
479 * prepared with the default buffer and content length that's in
480 * there. Rather than rewrite the default buffer, extensions
481 * that expect to grow the buffer can adapt .token to
482 * point to their own per-connection buffer in the extension
483 * user allocation. By default with no extensions or no
484 * extension callback handling, just the normal input buffer is
485 * used then so it is efficient.
486 *
487 * callback returns 1 in case it wants to spill more buffers
Andy Green1f4267b2013-10-17 08:09:19 +0800488 *
489 * This takes care of holding the buffer if send is incomplete, ie,
490 * if wsi->u.ws.clean_buffer is 0 (meaning an extension meddled with
491 * the buffer). If wsi->u.ws.clean_buffer is 1, it will instead
492 * return to the user code how much OF THE USER BUFFER was consumed.
Andy Greenb429d482013-01-16 12:21:29 +0800493 */
494
Andy Greenfc7c5e42013-02-23 10:50:10 +0800495 n = lws_issue_raw_ext_access(wsi, buf - pre, len + pre + post);
Andy Green03cf1dd2014-04-01 14:20:44 +0800496 if (n <= 0)
Andy Greenfc7c5e42013-02-23 10:50:10 +0800497 return n;
498
Andy Green1f4267b2013-10-17 08:09:19 +0800499 if (n == len + pre + post) {
500 /* everything in the buffer was handled (or rebuffered...) */
501 wsi->u.ws.inside_frame = 0;
502 return orig_len;
503 }
504
505 /*
506 * it is how many bytes of user buffer got sent... may be < orig_len
507 * in which case callback when writable has already been arranged
508 * and user code can call libwebsocket_write() again with the rest
509 * later.
510 */
511
512 return n - (pre + post);
Andy Greenb429d482013-01-16 12:21:29 +0800513}
514
Peter Pentchev9a4fef72013-03-30 09:52:21 +0800515LWS_VISIBLE int libwebsockets_serve_http_file_fragment(
Andy Greenb5b23192013-02-11 17:13:32 +0800516 struct libwebsocket_context *context, struct libwebsocket *wsi)
Andy Greenb8b247d2013-01-22 07:20:08 +0800517{
Patrick Gansterer81338aa2014-02-27 03:21:50 +0100518 int n;
Patrick Gansterer81338aa2014-02-27 03:21:50 +0100519 int m;
Andy Greenb8b247d2013-01-22 07:20:08 +0800520
521 while (!lws_send_pipe_choked(wsi)) {
Andy Green2764eba2013-12-09 14:16:17 +0800522
Andy Greene254d952014-03-23 11:41:15 +0800523 if (wsi->truncated_send_len) {
Andy Greena1a24d22014-04-10 14:25:24 +0800524 if (lws_issue_raw(wsi, wsi->truncated_send_malloc +
Andy Green2764eba2013-12-09 14:16:17 +0800525 wsi->truncated_send_offset,
Andy Greena1a24d22014-04-10 14:25:24 +0800526 wsi->truncated_send_len) < 0) {
527 lwsl_info("closing from libwebsockets_serve_http_file_fragment\n");
528 return -1;
529 }
Andy Green2764eba2013-12-09 14:16:17 +0800530 continue;
531 }
532
533 if (wsi->u.http.filepos == wsi->u.http.filelen)
534 goto all_sent;
535
Andy Green158e8042014-04-02 14:25:10 +0800536 compatible_file_read(n, wsi->u.http.fd, context->service_buffer,
Andy Greenb5b23192013-02-11 17:13:32 +0800537 sizeof(context->service_buffer));
Patrick Gansterer81338aa2014-02-27 03:21:50 +0100538 if (n < 0)
539 return -1; /* caller will close */
Patrick Gansterer81338aa2014-02-27 03:21:50 +0100540 if (n) {
Andy Green200f3852014-10-18 12:23:05 +0800541 wsi->u.http.filepos += n;
Andy Greenfc7c5e42013-02-23 10:50:10 +0800542 m = libwebsocket_write(wsi, context->service_buffer, n,
Andy Green200f3852014-10-18 12:23:05 +0800543 wsi->u.http.filepos == wsi->u.http.filelen ? LWS_WRITE_HTTP_FINAL : LWS_WRITE_HTTP);
Andy Greenfc7c5e42013-02-23 10:50:10 +0800544 if (m < 0)
545 return -1;
546
Andy Green158e8042014-04-02 14:25:10 +0800547 if (m != n)
Andy Greenfc7c5e42013-02-23 10:50:10 +0800548 /* adjust for what was not sent */
Andy Green7ef4b2e2014-11-30 13:00:47 +0800549 if (compatible_file_seek_cur(wsi->u.http.fd, m - n) < 0)
550 return -1;
Andy Greenb8b247d2013-01-22 07:20:08 +0800551 }
Andy Green2764eba2013-12-09 14:16:17 +0800552all_sent:
Andy Greene254d952014-03-23 11:41:15 +0800553 if (!wsi->truncated_send_len &&
Andy Green2764eba2013-12-09 14:16:17 +0800554 wsi->u.http.filepos == wsi->u.http.filelen) {
Andy Greenb8b247d2013-01-22 07:20:08 +0800555 wsi->state = WSI_STATE_HTTP;
556
557 if (wsi->protocol->callback)
David Gauchard6c582282013-06-29 10:24:16 +0800558 /* ignore callback returned value */
559 user_callback_handle_rxflow(
Andy Greenb5b23192013-02-11 17:13:32 +0800560 wsi->protocol->callback, context, wsi,
561 LWS_CALLBACK_HTTP_FILE_COMPLETION,
562 wsi->user_space, NULL, 0);
David Gauchard6c582282013-06-29 10:24:16 +0800563 return 1; /* >0 indicates completed */
Andy Greenb8b247d2013-01-22 07:20:08 +0800564 }
565 }
566
Andy Green2764eba2013-12-09 14:16:17 +0800567 lwsl_info("choked before able to send whole file (post)\n");
Andy Greenb8b247d2013-01-22 07:20:08 +0800568 libwebsocket_callback_on_writable(context, wsi);
569
David Gauchard6c582282013-06-29 10:24:16 +0800570 return 0; /* indicates further processing must be done */
Andy Greenb8b247d2013-01-22 07:20:08 +0800571}
Andy Green02138122014-04-06 06:26:35 +0100572
573LWS_VISIBLE int
Andy Green1f5c9f02014-10-09 08:14:30 +0800574lws_ssl_capable_read_no_ssl(struct libwebsocket_context *context,
575 struct libwebsocket *wsi, unsigned char *buf, int len)
Andy Green02138122014-04-06 06:26:35 +0100576{
577 int n;
578
579 n = recv(wsi->sock, buf, len, 0);
Andy Greend7340c12014-04-10 14:08:10 +0800580 if (n >= 0)
581 return n;
582
583 lwsl_warn("error on reading from skt\n");
584 return LWS_SSL_CAPABLE_ERROR;
Andy Green02138122014-04-06 06:26:35 +0100585}
586
587LWS_VISIBLE int
588lws_ssl_capable_write_no_ssl(struct libwebsocket *wsi, unsigned char *buf, int len)
589{
590 int n;
591
Andy Green485abc12014-04-06 12:41:20 +0100592 n = send(wsi->sock, buf, len, 0);
Andy Greend7340c12014-04-10 14:08:10 +0800593 if (n >= 0)
594 return n;
Andy Green02138122014-04-06 06:26:35 +0100595
Andy Greend7340c12014-04-10 14:08:10 +0800596 if (LWS_ERRNO == LWS_EAGAIN ||
597 LWS_ERRNO == LWS_EWOULDBLOCK ||
598 LWS_ERRNO == LWS_EINTR) {
599 if (LWS_ERRNO == LWS_EWOULDBLOCK)
600 lws_set_blocking_send(wsi);
601
602 return LWS_SSL_CAPABLE_MORE_SERVICE;
603 }
604 lwsl_debug("ERROR writing len %d to skt %d\n", len, n);
605 return LWS_SSL_CAPABLE_ERROR;
Andy Green02138122014-04-06 06:26:35 +0100606}