blob: 847cb2fd5cb4c18e39ca30d6322d14078c404809 [file] [log] [blame]
Andy Greena1ce6be2013-01-18 11:43:21 +08001/*
2 * libwebsockets - small server side websockets and web server implementation
3 *
4 * Copyright (C) 2010-2013 Andy Green <andy@warmcat.com>
5 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation:
9 * version 2.1 of the License.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
19 * MA 02110-1301 USA
20 */
21
22#include "private-libwebsockets.h"
23
24#define LWS_CPYAPP(ptr, str) { strcpy(ptr, str); ptr += strlen(str); }
Andy Greene7016aa2014-04-10 15:15:13 +080025#ifndef LWS_NO_EXTENSIONS
Andy Greend7340c12014-04-10 14:08:10 +080026LWS_VISIBLE int
Andy Green4b85c1d2015-12-04 11:08:32 +080027lws_extension_server_handshake(struct lws_context *context,
28 struct lws *wsi, char **p)
Andy Greend7340c12014-04-10 14:08:10 +080029{
30 int n;
31 char *c;
32 char ext_name[128];
Andy Green4b85c1d2015-12-04 11:08:32 +080033 struct lws_extension *ext;
Andy Greend7340c12014-04-10 14:08:10 +080034 int ext_count = 0;
35 int more = 1;
36
37 /*
38 * Figure out which extensions the client has that we want to
39 * enable on this connection, and give him back the list
40 */
41
42 if (!lws_hdr_total_length(wsi, WSI_TOKEN_EXTENSIONS))
43 return 0;
44
45 /*
46 * break down the list of client extensions
47 * and go through them
48 */
49
50 if (lws_hdr_copy(wsi, (char *)context->service_buffer,
51 sizeof(context->service_buffer),
52 WSI_TOKEN_EXTENSIONS) < 0)
53 return 1;
54
55 c = (char *)context->service_buffer;
56 lwsl_parser("WSI_TOKEN_EXTENSIONS = '%s'\n", c);
57 wsi->count_active_extensions = 0;
58 n = 0;
59 while (more) {
60
61 if (*c && (*c != ',' && *c != ' ' && *c != '\t')) {
62 ext_name[n] = *c++;
63 if (n < sizeof(ext_name) - 1)
64 n++;
65 continue;
66 }
67 ext_name[n] = '\0';
68 if (!*c)
69 more = 0;
70 else {
71 c++;
72 if (!n)
73 continue;
74 }
75
76 /* check a client's extension against our support */
77
78 ext = wsi->protocol->owning_server->extensions;
79
80 while (ext && ext->callback) {
81
82 if (strcmp(ext_name, ext->name)) {
83 ext++;
84 continue;
85 }
86
87 /*
88 * oh, we do support this one he
89 * asked for... but let's ask user
90 * code if it's OK to apply it on this
91 * particular connection + protocol
92 */
93
94 n = wsi->protocol->owning_server->
95 protocols[0].callback(
96 wsi->protocol->owning_server,
97 wsi,
98 LWS_CALLBACK_CONFIRM_EXTENSION_OKAY,
99 wsi->user_space, ext_name, 0);
100
101 /*
102 * zero return from callback means
103 * go ahead and allow the extension,
104 * it's what we get if the callback is
105 * unhandled
106 */
107
108 if (n) {
109 ext++;
110 continue;
111 }
112
113 /* apply it */
114
115 if (ext_count)
116 *(*p)++ = ',';
117 else
118 LWS_CPYAPP(*p,
119 "\x0d\x0aSec-WebSocket-Extensions: ");
120 *p += sprintf(*p, "%s", ext_name);
121 ext_count++;
122
123 /* instantiate the extension on this conn */
124
125 wsi->active_extensions_user[
126 wsi->count_active_extensions] =
Alejandro Mery6ff28242014-12-04 23:59:35 +0100127 lws_zalloc(ext->per_session_data_size);
Andy Greend7340c12014-04-10 14:08:10 +0800128 if (wsi->active_extensions_user[
129 wsi->count_active_extensions] == NULL) {
130 lwsl_err("Out of mem\n");
131 return 1;
132 }
Andy Greend7340c12014-04-10 14:08:10 +0800133
134 wsi->active_extensions[
135 wsi->count_active_extensions] = ext;
136
137 /* allow him to construct his context */
138
139 ext->callback(wsi->protocol->owning_server,
140 ext, wsi,
141 LWS_EXT_CALLBACK_CONSTRUCT,
142 wsi->active_extensions_user[
143 wsi->count_active_extensions], NULL, 0);
144
145 wsi->count_active_extensions++;
146 lwsl_parser("count_active_extensions <- %d\n",
147 wsi->count_active_extensions);
148
149 ext++;
150 }
151
152 n = 0;
153 }
Alejandro Mery6ff28242014-12-04 23:59:35 +0100154
Andy Greend7340c12014-04-10 14:08:10 +0800155 return 0;
156}
Andy Greene7016aa2014-04-10 15:15:13 +0800157#endif
Andy Greena1ce6be2013-01-18 11:43:21 +0800158int
Andy Green4b85c1d2015-12-04 11:08:32 +0800159handshake_0405(struct lws_context *context, struct lws *wsi)
Andy Greena1ce6be2013-01-18 11:43:21 +0800160{
Andy Greena1ce6be2013-01-18 11:43:21 +0800161 unsigned char hash[20];
162 int n;
163 char *response;
164 char *p;
Andy Greena1ce6be2013-01-18 11:43:21 +0800165 int accept_len;
Andy Greena1ce6be2013-01-18 11:43:21 +0800166
Andy Green16ab3182013-02-10 18:02:31 +0800167 if (!lws_hdr_total_length(wsi, WSI_TOKEN_HOST) ||
168 !lws_hdr_total_length(wsi, WSI_TOKEN_KEY)) {
Andy Greena1ce6be2013-01-18 11:43:21 +0800169 lwsl_parser("handshake_04 missing pieces\n");
170 /* completed header processing, but missing some bits */
171 goto bail;
172 }
173
Andy Greenb5b23192013-02-11 17:13:32 +0800174 if (lws_hdr_total_length(wsi, WSI_TOKEN_KEY) >=
175 MAX_WEBSOCKET_04_KEY_LEN) {
176 lwsl_warn("Client key too long %d\n", MAX_WEBSOCKET_04_KEY_LEN);
Andy Greena1ce6be2013-01-18 11:43:21 +0800177 goto bail;
178 }
179
Andy Greencecf5e72013-02-12 10:07:22 +0800180 /*
181 * since key length is restricted above (currently 128), cannot
182 * overflow
183 */
184 n = sprintf((char *)context->service_buffer,
Andy Green16ab3182013-02-10 18:02:31 +0800185 "%s258EAFA5-E914-47DA-95CA-C5AB0DC85B11",
186 lws_hdr_simple_ptr(wsi, WSI_TOKEN_KEY));
Andy Greena1ce6be2013-01-18 11:43:21 +0800187
Andy Green62304762015-12-04 08:43:54 +0800188 lws_SHA1(context->service_buffer, n, hash);
Andy Greena1ce6be2013-01-18 11:43:21 +0800189
Andy Greene48ba312013-02-10 15:34:59 +0800190 accept_len = lws_b64_encode_string((char *)hash, 20,
191 (char *)context->service_buffer,
Andy Greenb5b23192013-02-11 17:13:32 +0800192 sizeof(context->service_buffer));
Andy Greena1ce6be2013-01-18 11:43:21 +0800193 if (accept_len < 0) {
194 lwsl_warn("Base64 encoded hash too long\n");
195 goto bail;
196 }
197
198 /* allocate the per-connection user memory (if any) */
Andy Green3ef579b2015-12-04 09:23:56 +0800199 if (lws_ensure_user_space(wsi))
Andy Greena1ce6be2013-01-18 11:43:21 +0800200 goto bail;
201
202 /* create the response packet */
203
204 /* make a buffer big enough for everything */
205
Andy Green024eb6c2014-10-08 12:00:53 +0800206 response = (char *)context->service_buffer + MAX_WEBSOCKET_04_KEY_LEN + LWS_SEND_BUFFER_PRE_PADDING;
Andy Greena1ce6be2013-01-18 11:43:21 +0800207 p = response;
208 LWS_CPYAPP(p, "HTTP/1.1 101 Switching Protocols\x0d\x0a"
209 "Upgrade: WebSocket\x0d\x0a"
210 "Connection: Upgrade\x0d\x0a"
211 "Sec-WebSocket-Accept: ");
Andy Greene48ba312013-02-10 15:34:59 +0800212 strcpy(p, (char *)context->service_buffer);
Andy Greena1ce6be2013-01-18 11:43:21 +0800213 p += accept_len;
214
Andy Green16ab3182013-02-10 18:02:31 +0800215 if (lws_hdr_total_length(wsi, WSI_TOKEN_PROTOCOL)) {
Andy Greena1ce6be2013-01-18 11:43:21 +0800216 LWS_CPYAPP(p, "\x0d\x0aSec-WebSocket-Protocol: ");
Andy Green62fe0152014-12-01 19:28:28 +0800217 n = lws_hdr_copy(wsi, p, 128, WSI_TOKEN_PROTOCOL);
218 if (n < 0)
219 goto bail;
220 p += n;
Andy Greena1ce6be2013-01-18 11:43:21 +0800221 }
222
Andy Greene7016aa2014-04-10 15:15:13 +0800223#ifndef LWS_NO_EXTENSIONS
Andy Greena1ce6be2013-01-18 11:43:21 +0800224 /*
225 * Figure out which extensions the client has that we want to
226 * enable on this connection, and give him back the list
227 */
Andy Greend7340c12014-04-10 14:08:10 +0800228 if (lws_extension_server_handshake(context, wsi, &p))
229 goto bail;
Andy Greene7016aa2014-04-10 15:15:13 +0800230#endif
Andy Green8fb338f2015-04-07 08:19:30 +0800231
232 //LWS_CPYAPP(p, "\x0d\x0a""An-unknown-header: blah");
233
Andy Greena1ce6be2013-01-18 11:43:21 +0800234 /* end of response packet */
235
236 LWS_CPYAPP(p, "\x0d\x0a\x0d\x0a");
Andy Green2c24ec02014-04-02 19:45:42 +0800237
Andy Greena1ce6be2013-01-18 11:43:21 +0800238 if (!lws_any_extension_handled(context, wsi,
239 LWS_EXT_CALLBACK_HANDSHAKE_REPLY_TX,
Andy Greenb5b23192013-02-11 17:13:32 +0800240 response, p - response)) {
Andy Green2c24ec02014-04-02 19:45:42 +0800241
Andy Greena1ce6be2013-01-18 11:43:21 +0800242 /* okay send the handshake response accepting the connection */
243
Andy Greenb5b23192013-02-11 17:13:32 +0800244 lwsl_parser("issuing resp pkt %d len\n", (int)(p - response));
Andy Greend7340c12014-04-10 14:08:10 +0800245#ifdef DEBUG
Andy Greena1ce6be2013-01-18 11:43:21 +0800246 fwrite(response, 1, p - response, stderr);
Andy Greend7340c12014-04-10 14:08:10 +0800247#endif
Andy Green62304762015-12-04 08:43:54 +0800248 n = lws_write(wsi, (unsigned char *)response,
Andy Green024eb6c2014-10-08 12:00:53 +0800249 p - response, LWS_WRITE_HTTP_HEADERS);
Andy Greenfc7c5e42013-02-23 10:50:10 +0800250 if (n != (p - response)) {
Andy Greena1ce6be2013-01-18 11:43:21 +0800251 lwsl_debug("handshake_0405: ERROR writing to socket\n");
252 goto bail;
253 }
254
255 }
256
257 /* alright clean up and set ourselves into established state */
258
Andy Greena1ce6be2013-01-18 11:43:21 +0800259 wsi->state = WSI_STATE_ESTABLISHED;
260 wsi->lws_rx_parse_state = LWS_RXPS_NEW;
Andy Greena1ce6be2013-01-18 11:43:21 +0800261
262 /* notify user code that we're ready to roll */
263
264 if (wsi->protocol->callback)
265 wsi->protocol->callback(wsi->protocol->owning_server,
266 wsi, LWS_CALLBACK_ESTABLISHED,
267 wsi->user_space, NULL, 0);
268
269 return 0;
270
271
272bail:
Andy Green2b57a342013-02-06 15:15:25 +0900273 /* free up his parsing allocations */
Andrew Canadaya19d4852014-11-07 11:21:09 +0800274 lws_free_header_table(wsi);
Andy Greena1ce6be2013-01-18 11:43:21 +0800275 return -1;
276}
277