blob: 213a4ec81dc87b6041698af6d2a92622fcb798a9 [file] [log] [blame]
Andy Greenb429d482013-01-16 12:21:29 +08001/*
2 * libwebsockets - small server side websockets and web server implementation
3 *
Andy Green27e770b2014-03-23 11:21:51 +08004 * Copyright (C) 2010-2014 Andy Green <andy@warmcat.com>
Andy Greenb429d482013-01-16 12:21:29 +08005 *
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation:
9 * version 2.1 of the License.
10 *
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
15 *
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
19 * MA 02110-1301 USA
20 */
21
22#include "private-libwebsockets.h"
23
Andy Greenb429d482013-01-16 12:21:29 +080024static int
Andy Green4b85c1d2015-12-04 11:08:32 +080025lws_0405_frame_mask_generate(struct lws *wsi)
Andy Greenb429d482013-01-16 12:21:29 +080026{
Andy Greenb429d482013-01-16 12:21:29 +080027 int n;
28
29 /* fetch the per-frame nonce */
30
Andy Green62304762015-12-04 08:43:54 +080031 n = lws_get_random(wsi->protocol->owning_server,
Andy Greenb5b23192013-02-11 17:13:32 +080032 wsi->u.ws.frame_masking_nonce_04, 4);
Andy Greenb429d482013-01-16 12:21:29 +080033 if (n != 4) {
34 lwsl_parser("Unable to read from random device %s %d\n",
35 SYSTEM_RANDOM_FILEPATH, n);
36 return 1;
37 }
38
39 /* start masking from first byte of masking key buffer */
Andy Green623a98d2013-01-21 11:04:23 +080040 wsi->u.ws.frame_mask_index = 0;
Andy Greenb429d482013-01-16 12:21:29 +080041
Andy Greenb429d482013-01-16 12:21:29 +080042 return 0;
43}
44
Andy Greencf3590e2013-01-16 14:35:27 +080045#ifdef _DEBUG
Andy Greenb429d482013-01-16 12:21:29 +080046
Peter Pentchev9a4fef72013-03-30 09:52:21 +080047LWS_VISIBLE void lwsl_hexdump(void *vbuf, size_t len)
Andy Greenb429d482013-01-16 12:21:29 +080048{
Andy Greencf3590e2013-01-16 14:35:27 +080049 unsigned char *buf = (unsigned char *)vbuf;
Andy Greend607bb92015-12-06 05:52:09 +080050 unsigned int n, m, start;
Andy Greencf3590e2013-01-16 14:35:27 +080051 char line[80];
52 char *p;
Andy Greenb429d482013-01-16 12:21:29 +080053
54 lwsl_parser("\n");
55
56 for (n = 0; n < len;) {
57 start = n;
Andy Greencf3590e2013-01-16 14:35:27 +080058 p = line;
Andy Greenb429d482013-01-16 12:21:29 +080059
Andy Greencf3590e2013-01-16 14:35:27 +080060 p += sprintf(p, "%04X: ", start);
Andy Greenb429d482013-01-16 12:21:29 +080061
62 for (m = 0; m < 16 && n < len; m++)
Andy Greencf3590e2013-01-16 14:35:27 +080063 p += sprintf(p, "%02X ", buf[n++]);
Andy Greenb429d482013-01-16 12:21:29 +080064 while (m++ < 16)
Andy Greencf3590e2013-01-16 14:35:27 +080065 p += sprintf(p, " ");
Andy Greenb429d482013-01-16 12:21:29 +080066
Andy Greencf3590e2013-01-16 14:35:27 +080067 p += sprintf(p, " ");
Andy Greenb429d482013-01-16 12:21:29 +080068
69 for (m = 0; m < 16 && (start + m) < len; m++) {
Andy Green3182ece2013-01-20 17:08:31 +080070 if (buf[start + m] >= ' ' && buf[start + m] < 127)
Andy Greencf3590e2013-01-16 14:35:27 +080071 *p++ = buf[start + m];
Andy Greenb429d482013-01-16 12:21:29 +080072 else
Andy Greencf3590e2013-01-16 14:35:27 +080073 *p++ = '.';
Andy Greenb429d482013-01-16 12:21:29 +080074 }
75 while (m++ < 16)
Andy Greencf3590e2013-01-16 14:35:27 +080076 *p++ = ' ';
Andy Greenb429d482013-01-16 12:21:29 +080077
Andy Greencf3590e2013-01-16 14:35:27 +080078 *p++ = '\n';
79 *p = '\0';
Andy Green3182ece2013-01-20 17:08:31 +080080 lwsl_debug("%s", line);
Andy Greenb429d482013-01-16 12:21:29 +080081 }
82 lwsl_debug("\n");
83}
84
Andy Greencf3590e2013-01-16 14:35:27 +080085#endif
86
Andy Greenfc7c5e42013-02-23 10:50:10 +080087/*
Andy Green1f4267b2013-10-17 08:09:19 +080088 * notice this returns number of bytes consumed, or -1
Andy Greenfc7c5e42013-02-23 10:50:10 +080089 */
90
Andy Green4b85c1d2015-12-04 11:08:32 +080091int lws_issue_raw(struct lws *wsi, unsigned char *buf, size_t len)
Andy Greenb429d482013-01-16 12:21:29 +080092{
Andy Green4b85c1d2015-12-04 11:08:32 +080093 struct lws_context *context = wsi->protocol->owning_server;
mroszko793e7c02013-12-10 21:15:00 +080094 size_t real_len = len;
Andy Greend607bb92015-12-06 05:52:09 +080095 int n, m;
Andy Green03cf1dd2014-04-01 14:20:44 +080096
97 if (!len)
98 return 0;
Andy Greena1a24d22014-04-10 14:25:24 +080099 /* just ignore sends after we cleared the truncation buffer */
100 if (wsi->state == WSI_STATE_FLUSHING_STORED_SEND_BEFORE_CLOSE &&
Andy Green11f27342015-11-08 12:10:26 +0800101 !wsi->truncated_send_len)
Andy Greena1a24d22014-04-10 14:25:24 +0800102 return len;
Andy Green2764eba2013-12-09 14:16:17 +0800103
Andy Greene254d952014-03-23 11:41:15 +0800104 if (wsi->truncated_send_len && (buf < wsi->truncated_send_malloc ||
Andy Green11f27342015-11-08 12:10:26 +0800105 buf > (wsi->truncated_send_malloc + wsi->truncated_send_len +
106 wsi->truncated_send_offset))) {
Andy Green27e770b2014-03-23 11:21:51 +0800107 lwsl_err("****** %x Sending new, pending truncated ...\n", wsi);
Andy Green2764eba2013-12-09 14:16:17 +0800108 assert(0);
109 }
Andy Greenb429d482013-01-16 12:21:29 +0800110
Andy Green2c24ec02014-04-02 19:45:42 +0800111 m = lws_ext_callback_for_each_active(wsi,
112 LWS_EXT_CALLBACK_PACKET_TX_DO_SEND, &buf, len);
113 if (m < 0)
114 return -1;
115 if (m) /* handled */ {
116 n = m;
117 goto handle_truncated_send;
Andy Greenb429d482013-01-16 12:21:29 +0800118 }
Andy Green8c0d3c02015-11-02 20:34:12 +0800119
Andy Greenfc772cc2015-11-14 13:48:58 +0800120 if (!lws_socket_is_valid(wsi->sock))
Andy Green1f4267b2013-10-17 08:09:19 +0800121 lwsl_warn("** error invalid sock but expected to send\n");
Andy Greenb429d482013-01-16 12:21:29 +0800122
Andy Greend607bb92015-12-06 05:52:09 +0800123 /* nope, send it on the socket directly */
Andy Greene000a702013-01-29 12:37:35 +0800124 lws_latency_pre(context, wsi);
Andy Green02138122014-04-06 06:26:35 +0100125 n = lws_ssl_capable_write(wsi, buf, len);
Andy Green2cd30742015-11-02 13:10:33 +0800126 lws_latency(context, wsi, "send lws_issue_raw", n, (unsigned int)n == len);
Andy Greend7340c12014-04-10 14:08:10 +0800127
Andy Green02138122014-04-06 06:26:35 +0100128 switch (n) {
129 case LWS_SSL_CAPABLE_ERROR:
Andy Green11f27342015-11-08 12:10:26 +0800130 lwsl_err("%s: wsi %p: LWS_SSL_CAPABLE_ERROR\n", __func__, (void *)wsi);
Andy Green1e499182014-10-16 08:23:46 +0800131 /* we're going to close, let close know sends aren't possible */
132 wsi->socket_is_permanently_unusable = 1;
Andy Green02138122014-04-06 06:26:35 +0100133 return -1;
134 case LWS_SSL_CAPABLE_MORE_SERVICE:
Andy Greend7340c12014-04-10 14:08:10 +0800135 /* nothing got sent, not fatal, retry the whole thing later */
Andy Green02138122014-04-06 06:26:35 +0100136 n = 0;
Andy Greend7340c12014-04-10 14:08:10 +0800137 break;
Andy Greenb429d482013-01-16 12:21:29 +0800138 }
Andy Green1f4267b2013-10-17 08:09:19 +0800139
140handle_truncated_send:
Andy Green1f4267b2013-10-17 08:09:19 +0800141 /*
Andy Greend7340c12014-04-10 14:08:10 +0800142 * we were already handling a truncated send?
Andy Green1f4267b2013-10-17 08:09:19 +0800143 */
Andy Greene254d952014-03-23 11:41:15 +0800144 if (wsi->truncated_send_len) {
Andy Green27e770b2014-03-23 11:21:51 +0800145 lwsl_info("***** %x partial send moved on by %d (vs %d)\n",
146 wsi, n, real_len);
Andy Green2764eba2013-12-09 14:16:17 +0800147 wsi->truncated_send_offset += n;
148 wsi->truncated_send_len -= n;
Andy Green1f4267b2013-10-17 08:09:19 +0800149
Andy Green2764eba2013-12-09 14:16:17 +0800150 if (!wsi->truncated_send_len) {
151 lwsl_info("***** %x partial send completed\n", wsi);
Andy Greene254d952014-03-23 11:41:15 +0800152 /* done with it, but don't free it */
Andy Green2764eba2013-12-09 14:16:17 +0800153 n = real_len;
Andy Greenf4ffc1e2014-04-10 17:06:59 +0800154 if (wsi->state == WSI_STATE_FLUSHING_STORED_SEND_BEFORE_CLOSE) {
Andy Greena1a24d22014-04-10 14:25:24 +0800155 lwsl_info("***** %x signalling to close now\n", wsi);
156 return -1; /* retry closing now */
Andy Greenf4ffc1e2014-04-10 17:06:59 +0800157 }
Andy Green15d56dd2014-04-10 11:23:18 +0800158 }
159 /* always callback on writeable */
Andy Greend607bb92015-12-06 05:52:09 +0800160 lws_callback_on_writable(wsi->protocol->owning_server, wsi);
Andy Green1f4267b2013-10-17 08:09:19 +0800161
162 return n;
163 }
164
Andy Green2cd30742015-11-02 13:10:33 +0800165 if ((unsigned int)n == real_len)
Andy Greend7340c12014-04-10 14:08:10 +0800166 /* what we just sent went out cleanly */
167 return n;
Andy Green1f4267b2013-10-17 08:09:19 +0800168
Andy Greend7340c12014-04-10 14:08:10 +0800169 if (n && wsi->u.ws.clean_buffer)
Andy Green1f4267b2013-10-17 08:09:19 +0800170 /*
Andy Greend7340c12014-04-10 14:08:10 +0800171 * This buffer unaffected by extension rewriting.
172 * It means the user code is expected to deal with
173 * partial sends. (lws knows the header was already
174 * sent, so on next send will just resume sending
175 * payload)
Andy Green1f4267b2013-10-17 08:09:19 +0800176 */
Andy Greend7340c12014-04-10 14:08:10 +0800177 return n;
Andy Green1f4267b2013-10-17 08:09:19 +0800178
Andy Greend7340c12014-04-10 14:08:10 +0800179 /*
180 * Newly truncated send. Buffer the remainder (it will get
181 * first priority next time the socket is writable)
182 */
183 lwsl_info("***** %x new partial sent %d from %d total\n",
Andy Greend607bb92015-12-06 05:52:09 +0800184 wsi, n, real_len);
Andy Green1f4267b2013-10-17 08:09:19 +0800185
Andy Greend7340c12014-04-10 14:08:10 +0800186 /*
187 * - if we still have a suitable malloc lying around, use it
188 * - or, if too small, reallocate it
189 * - or, if no buffer, create it
190 */
191 if (!wsi->truncated_send_malloc ||
Andy Greend607bb92015-12-06 05:52:09 +0800192 real_len - n > wsi->truncated_send_allocation) {
Alejandro Mery6ff28242014-12-04 23:59:35 +0100193 lws_free(wsi->truncated_send_malloc);
Andy Greend7340c12014-04-10 14:08:10 +0800194
195 wsi->truncated_send_allocation = real_len - n;
Alejandro Mery6ff28242014-12-04 23:59:35 +0100196 wsi->truncated_send_malloc = lws_malloc(real_len - n);
Andy Greend7340c12014-04-10 14:08:10 +0800197 if (!wsi->truncated_send_malloc) {
198 lwsl_err("truncated send: unable to malloc %d\n",
Andy Greend607bb92015-12-06 05:52:09 +0800199 real_len - n);
Andy Greend7340c12014-04-10 14:08:10 +0800200 return -1;
Andy Greene254d952014-03-23 11:41:15 +0800201 }
Andy Green1f4267b2013-10-17 08:09:19 +0800202 }
Andy Greend7340c12014-04-10 14:08:10 +0800203 wsi->truncated_send_offset = 0;
204 wsi->truncated_send_len = real_len - n;
205 memcpy(wsi->truncated_send_malloc, buf + n, real_len - n);
Andy Green1f4267b2013-10-17 08:09:19 +0800206
Andy Greend7340c12014-04-10 14:08:10 +0800207 /* since something buffered, force it to get another chance to send */
Andy Green62304762015-12-04 08:43:54 +0800208 lws_callback_on_writable(wsi->protocol->owning_server, wsi);
Andy Greend7340c12014-04-10 14:08:10 +0800209
210 return real_len;
Andy Greenb429d482013-01-16 12:21:29 +0800211}
212
Andy Greenb429d482013-01-16 12:21:29 +0800213/**
Andy Green62304762015-12-04 08:43:54 +0800214 * lws_write() - Apply protocol then write data to client
Andy Greenb429d482013-01-16 12:21:29 +0800215 * @wsi: Websocket instance (available from user callback)
216 * @buf: The data to send. For data being sent on a websocket
217 * connection (ie, not default http), this buffer MUST have
218 * LWS_SEND_BUFFER_PRE_PADDING bytes valid BEFORE the pointer
219 * and an additional LWS_SEND_BUFFER_POST_PADDING bytes valid
220 * in the buffer after (buf + len). This is so the protocol
221 * header and trailer data can be added in-situ.
222 * @len: Count of the data bytes in the payload starting from buf
223 * @protocol: Use LWS_WRITE_HTTP to reply to an http connection, and one
224 * of LWS_WRITE_BINARY or LWS_WRITE_TEXT to send appropriate
225 * data on a websockets connection. Remember to allow the extra
226 * bytes before and after buf if LWS_WRITE_BINARY or LWS_WRITE_TEXT
227 * are used.
228 *
229 * This function provides the way to issue data back to the client
230 * for both http and websocket protocols.
231 *
232 * In the case of sending using websocket protocol, be sure to allocate
233 * valid storage before and after buf as explained above. This scheme
234 * allows maximum efficiency of sending data and protocol in a single
235 * packet while not burdening the user code with any protocol knowledge.
Andy Greenfc7c5e42013-02-23 10:50:10 +0800236 *
237 * Return may be -1 for a fatal error needing connection close, or a
238 * positive number reflecting the amount of bytes actually sent. This
239 * can be less than the requested number of bytes due to OS memory
240 * pressure at any given time.
Andy Greenb429d482013-01-16 12:21:29 +0800241 */
242
Andy Green4b85c1d2015-12-04 11:08:32 +0800243LWS_VISIBLE int lws_write(struct lws *wsi, unsigned char *buf,
Andy Green62304762015-12-04 08:43:54 +0800244 size_t len, enum lws_write_protocol protocol)
Andy Greenb429d482013-01-16 12:21:29 +0800245{
Andy Green5738c0e2013-01-21 09:53:35 +0800246 int masked7 = wsi->mode == LWS_CONNMODE_WS_CLIENT;
Andy Greenb429d482013-01-16 12:21:29 +0800247 unsigned char is_masked_bit = 0;
Andy Greend607bb92015-12-06 05:52:09 +0800248 unsigned char *dropmask = NULL;
Andy Greenb429d482013-01-16 12:21:29 +0800249 struct lws_tokens eff_buf;
Andy Greend607bb92015-12-06 05:52:09 +0800250 int post = 0, pre = 0, n;
251 size_t orig_len = len;
Andy Greenb429d482013-01-16 12:21:29 +0800252
Andy Green1f4267b2013-10-17 08:09:19 +0800253 if (len == 0 && protocol != LWS_WRITE_CLOSE &&
Andy Greend607bb92015-12-06 05:52:09 +0800254 protocol != LWS_WRITE_PING && protocol != LWS_WRITE_PONG) {
Andy Green62304762015-12-04 08:43:54 +0800255 lwsl_warn("zero length lws_write attempt\n");
Andy Greenb429d482013-01-16 12:21:29 +0800256 return 0;
257 }
258
Andy Green200f3852014-10-18 12:23:05 +0800259 if (protocol == LWS_WRITE_HTTP ||
260 protocol == LWS_WRITE_HTTP_FINAL ||
261 protocol == LWS_WRITE_HTTP_HEADERS)
Andy Greenb429d482013-01-16 12:21:29 +0800262 goto send_raw;
263
264 /* websocket protocol, either binary or text */
265
Andrejs Hanins140ac6e2015-11-06 18:18:32 +0200266 if (wsi->state != WSI_STATE_ESTABLISHED &&
267 !(wsi->state == WSI_STATE_RETURNED_CLOSE_ALREADY &&
268 protocol == LWS_WRITE_CLOSE))
Andy Greenb429d482013-01-16 12:21:29 +0800269 return -1;
270
Andy Green1f4267b2013-10-17 08:09:19 +0800271 /* if we are continuing a frame that already had its header done */
272
273 if (wsi->u.ws.inside_frame)
274 goto do_more_inside_frame;
275
Andy Green822241c2014-08-18 22:21:51 +0800276 wsi->u.ws.clean_buffer = 1;
Andy Green1f4267b2013-10-17 08:09:19 +0800277
Andy Green1f4267b2013-10-17 08:09:19 +0800278 /*
279 * give a chance to the extensions to modify payload
280 * pre-TX mangling is not allowed to truncate
281 */
Andy Greenb429d482013-01-16 12:21:29 +0800282 eff_buf.token = (char *)buf;
283 eff_buf.token_len = len;
284
Andy Green0303db42013-01-17 14:46:43 +0800285 switch (protocol) {
286 case LWS_WRITE_PING:
287 case LWS_WRITE_PONG:
288 case LWS_WRITE_CLOSE:
289 break;
290 default:
Andy Green2c24ec02014-04-02 19:45:42 +0800291 if (lws_ext_callback_for_each_active(wsi,
292 LWS_EXT_CALLBACK_PAYLOAD_TX, &eff_buf, 0) < 0)
293 return -1;
Andy Greenb429d482013-01-16 12:21:29 +0800294 }
295
Andy Green1f4267b2013-10-17 08:09:19 +0800296 /*
297 * an extension did something we need to keep... for example, if
298 * compression extension, it has already updated its state according
299 * to this being issued
300 */
301 if ((char *)buf != eff_buf.token)
Andy Green27e770b2014-03-23 11:21:51 +0800302 /*
303 * extension recreated it:
304 * need to buffer this if not all sent
305 */
306 wsi->u.ws.clean_buffer = 0;
Andy Green1f4267b2013-10-17 08:09:19 +0800307
Andy Greenb429d482013-01-16 12:21:29 +0800308 buf = (unsigned char *)eff_buf.token;
309 len = eff_buf.token_len;
310
311 switch (wsi->ietf_spec_revision) {
Andy Greenb429d482013-01-16 12:21:29 +0800312 case 13:
313 if (masked7) {
314 pre += 4;
315 dropmask = &buf[0 - pre];
316 is_masked_bit = 0x80;
317 }
Andy Green5738c0e2013-01-21 09:53:35 +0800318
Andy Greenb429d482013-01-16 12:21:29 +0800319 switch (protocol & 0xf) {
320 case LWS_WRITE_TEXT:
Andy Green5738c0e2013-01-21 09:53:35 +0800321 n = LWS_WS_OPCODE_07__TEXT_FRAME;
Andy Greenb429d482013-01-16 12:21:29 +0800322 break;
323 case LWS_WRITE_BINARY:
Andy Green5738c0e2013-01-21 09:53:35 +0800324 n = LWS_WS_OPCODE_07__BINARY_FRAME;
Andy Greenb429d482013-01-16 12:21:29 +0800325 break;
326 case LWS_WRITE_CONTINUATION:
Andy Green5738c0e2013-01-21 09:53:35 +0800327 n = LWS_WS_OPCODE_07__CONTINUATION;
Andy Greenb429d482013-01-16 12:21:29 +0800328 break;
329
330 case LWS_WRITE_CLOSE:
Andy Green5738c0e2013-01-21 09:53:35 +0800331 n = LWS_WS_OPCODE_07__CLOSE;
Andy Greenb429d482013-01-16 12:21:29 +0800332
333 /*
Andy Green5738c0e2013-01-21 09:53:35 +0800334 * 06+ has a 2-byte status code in network order
335 * we can do this because we demand post-buf
Andy Greenb429d482013-01-16 12:21:29 +0800336 */
337
Andy Green623a98d2013-01-21 11:04:23 +0800338 if (wsi->u.ws.close_reason) {
Andy Green5738c0e2013-01-21 09:53:35 +0800339 /* reason codes count as data bytes */
340 buf -= 2;
Andy Green623a98d2013-01-21 11:04:23 +0800341 buf[0] = wsi->u.ws.close_reason >> 8;
342 buf[1] = wsi->u.ws.close_reason;
Andy Green5738c0e2013-01-21 09:53:35 +0800343 len += 2;
Andy Greenb429d482013-01-16 12:21:29 +0800344 }
345 break;
346 case LWS_WRITE_PING:
Andy Green5738c0e2013-01-21 09:53:35 +0800347 n = LWS_WS_OPCODE_07__PING;
Andy Greenb429d482013-01-16 12:21:29 +0800348 break;
349 case LWS_WRITE_PONG:
Andy Green5738c0e2013-01-21 09:53:35 +0800350 n = LWS_WS_OPCODE_07__PONG;
Andy Greenb429d482013-01-16 12:21:29 +0800351 break;
352 default:
Andy Greenb5b23192013-02-11 17:13:32 +0800353 lwsl_warn("lws_write: unknown write opc / protocol\n");
Andy Greenb429d482013-01-16 12:21:29 +0800354 return -1;
355 }
356
357 if (!(protocol & LWS_WRITE_NO_FIN))
358 n |= 1 << 7;
359
360 if (len < 126) {
361 pre += 2;
362 buf[-pre] = n;
363 buf[-pre + 1] = len | is_masked_bit;
364 } else {
365 if (len < 65536) {
366 pre += 4;
367 buf[-pre] = n;
368 buf[-pre + 1] = 126 | is_masked_bit;
369 buf[-pre + 2] = len >> 8;
370 buf[-pre + 3] = len;
371 } else {
372 pre += 10;
373 buf[-pre] = n;
374 buf[-pre + 1] = 127 | is_masked_bit;
375#if defined __LP64__
376 buf[-pre + 2] = (len >> 56) & 0x7f;
377 buf[-pre + 3] = len >> 48;
378 buf[-pre + 4] = len >> 40;
379 buf[-pre + 5] = len >> 32;
380#else
381 buf[-pre + 2] = 0;
382 buf[-pre + 3] = 0;
383 buf[-pre + 4] = 0;
384 buf[-pre + 5] = 0;
385#endif
386 buf[-pre + 6] = len >> 24;
387 buf[-pre + 7] = len >> 16;
388 buf[-pre + 8] = len >> 8;
389 buf[-pre + 9] = len;
390 }
391 }
392 break;
393 }
394
Andy Green1f4267b2013-10-17 08:09:19 +0800395do_more_inside_frame:
396
Andy Greenb429d482013-01-16 12:21:29 +0800397 /*
398 * Deal with masking if we are in client -> server direction and
399 * the protocol demands it
400 */
401
Andy Green5738c0e2013-01-21 09:53:35 +0800402 if (wsi->mode == LWS_CONNMODE_WS_CLIENT) {
Andy Greenb429d482013-01-16 12:21:29 +0800403
Andy Green1f4267b2013-10-17 08:09:19 +0800404 if (!wsi->u.ws.inside_frame)
Andy Green3ef579b2015-12-04 09:23:56 +0800405 if (lws_0405_frame_mask_generate(wsi)) {
Andy Green27e770b2014-03-23 11:21:51 +0800406 lwsl_err("frame mask generation failed\n");
Andy Green1f4267b2013-10-17 08:09:19 +0800407 return -1;
408 }
Andy Greenb429d482013-01-16 12:21:29 +0800409
Andy Green5738c0e2013-01-21 09:53:35 +0800410 /*
411 * in v7, just mask the payload
412 */
Nikolay Dimitrova8268e72013-12-21 10:22:17 +0800413 if (dropmask) { /* never set if already inside frame */
414 for (n = 4; n < (int)len + 4; n++)
415 dropmask[n] = dropmask[n] ^
Andy Greenb5b23192013-02-11 17:13:32 +0800416 wsi->u.ws.frame_masking_nonce_04[
417 (wsi->u.ws.frame_mask_index++) & 3];
Andy Green5738c0e2013-01-21 09:53:35 +0800418
Andy Green5738c0e2013-01-21 09:53:35 +0800419 /* copy the frame nonce into place */
Andy Green1f4267b2013-10-17 08:09:19 +0800420 memcpy(dropmask, wsi->u.ws.frame_masking_nonce_04, 4);
Nikolay Dimitrova8268e72013-12-21 10:22:17 +0800421 }
Andy Greenb429d482013-01-16 12:21:29 +0800422 }
423
424send_raw:
Andy Green0303db42013-01-17 14:46:43 +0800425 switch (protocol) {
426 case LWS_WRITE_CLOSE:
Andy Greenb5b23192013-02-11 17:13:32 +0800427/* lwsl_hexdump(&buf[-pre], len + post); */
Andy Green0303db42013-01-17 14:46:43 +0800428 case LWS_WRITE_HTTP:
Andy Green200f3852014-10-18 12:23:05 +0800429 case LWS_WRITE_HTTP_FINAL:
Andy Green024eb6c2014-10-08 12:00:53 +0800430 case LWS_WRITE_HTTP_HEADERS:
Andy Green0303db42013-01-17 14:46:43 +0800431 case LWS_WRITE_PONG:
432 case LWS_WRITE_PING:
Andy Green095d3032014-10-08 12:15:15 +0800433#ifdef LWS_USE_HTTP2
Andy Green024eb6c2014-10-08 12:00:53 +0800434 if (wsi->mode == LWS_CONNMODE_HTTP2_SERVING) {
Andy Green2add6342014-10-12 08:38:16 +0800435 unsigned char flags = 0;
436
Andy Green024eb6c2014-10-08 12:00:53 +0800437 n = LWS_HTTP2_FRAME_TYPE_DATA;
Andy Green2add6342014-10-12 08:38:16 +0800438 if (protocol == LWS_WRITE_HTTP_HEADERS) {
Andy Green024eb6c2014-10-08 12:00:53 +0800439 n = LWS_HTTP2_FRAME_TYPE_HEADERS;
Andy Green91b05892014-10-17 08:38:44 +0800440 flags = LWS_HTTP2_FLAG_END_HEADERS;
Andy Green1cea5812014-10-19 07:36:20 +0800441 if (wsi->u.http2.send_END_STREAM)
442 flags |= LWS_HTTP2_FLAG_END_STREAM;
Andy Green2add6342014-10-12 08:38:16 +0800443 }
Andy Green200f3852014-10-18 12:23:05 +0800444
445 if ((protocol == LWS_WRITE_HTTP || protocol == LWS_WRITE_HTTP_FINAL) && wsi->u.http.content_length) {
446 wsi->u.http.content_remain -= len;
447 lwsl_info("%s: content_remain = %lu\n", __func__, wsi->u.http.content_remain);
448 if (!wsi->u.http.content_remain) {
449 lwsl_info("%s: selecting final write mode\n", __func__);
450 protocol = LWS_WRITE_HTTP_FINAL;
451 }
452 }
453
Andy Green1cea5812014-10-19 07:36:20 +0800454 if (protocol == LWS_WRITE_HTTP_FINAL && wsi->u.http2.END_STREAM) {
Andy Green200f3852014-10-18 12:23:05 +0800455 lwsl_info("%s: setting END_STREAM\n", __func__);
456 flags |= LWS_HTTP2_FLAG_END_STREAM;
457 }
458
Andy Green2add6342014-10-12 08:38:16 +0800459 return lws_http2_frame_write(wsi, n, flags, wsi->u.http2.my_stream_id, len, buf);
Andy Green024eb6c2014-10-08 12:00:53 +0800460 }
Andy Green095d3032014-10-08 12:15:15 +0800461#endif
Andy Greenfc7c5e42013-02-23 10:50:10 +0800462 return lws_issue_raw(wsi, (unsigned char *)buf - pre,
463 len + pre + post);
Andy Green0303db42013-01-17 14:46:43 +0800464 default:
465 break;
Andy Greenb429d482013-01-16 12:21:29 +0800466 }
467
Andy Green1f4267b2013-10-17 08:09:19 +0800468 wsi->u.ws.inside_frame = 1;
469
Andy Greenb429d482013-01-16 12:21:29 +0800470 /*
471 * give any active extensions a chance to munge the buffer
472 * before send. We pass in a pointer to an lws_tokens struct
473 * prepared with the default buffer and content length that's in
474 * there. Rather than rewrite the default buffer, extensions
475 * that expect to grow the buffer can adapt .token to
476 * point to their own per-connection buffer in the extension
477 * user allocation. By default with no extensions or no
478 * extension callback handling, just the normal input buffer is
479 * used then so it is efficient.
480 *
481 * callback returns 1 in case it wants to spill more buffers
Andy Green1f4267b2013-10-17 08:09:19 +0800482 *
483 * This takes care of holding the buffer if send is incomplete, ie,
484 * if wsi->u.ws.clean_buffer is 0 (meaning an extension meddled with
485 * the buffer). If wsi->u.ws.clean_buffer is 1, it will instead
486 * return to the user code how much OF THE USER BUFFER was consumed.
Andy Greenb429d482013-01-16 12:21:29 +0800487 */
488
Andy Greenfc7c5e42013-02-23 10:50:10 +0800489 n = lws_issue_raw_ext_access(wsi, buf - pre, len + pre + post);
Andy Green03cf1dd2014-04-01 14:20:44 +0800490 if (n <= 0)
Andy Greenfc7c5e42013-02-23 10:50:10 +0800491 return n;
492
Andy Green2cd30742015-11-02 13:10:33 +0800493 if (n == (int)len + pre + post) {
Andy Green1f4267b2013-10-17 08:09:19 +0800494 /* everything in the buffer was handled (or rebuffered...) */
495 wsi->u.ws.inside_frame = 0;
496 return orig_len;
497 }
498
499 /*
500 * it is how many bytes of user buffer got sent... may be < orig_len
501 * in which case callback when writable has already been arranged
Andy Green62304762015-12-04 08:43:54 +0800502 * and user code can call lws_write() again with the rest
Andy Green1f4267b2013-10-17 08:09:19 +0800503 * later.
504 */
505
506 return n - (pre + post);
Andy Greenb429d482013-01-16 12:21:29 +0800507}
508
Andy Green5c9660d2015-12-04 11:30:53 +0800509LWS_VISIBLE int lws_serve_http_file_fragment(struct lws_context *context,
510 struct lws *wsi)
Andy Greenb8b247d2013-01-22 07:20:08 +0800511{
Patrick Gansterer81338aa2014-02-27 03:21:50 +0100512 int n;
Patrick Gansterer81338aa2014-02-27 03:21:50 +0100513 int m;
Andy Greenb8b247d2013-01-22 07:20:08 +0800514
515 while (!lws_send_pipe_choked(wsi)) {
Andy Green2764eba2013-12-09 14:16:17 +0800516
Andy Greene254d952014-03-23 11:41:15 +0800517 if (wsi->truncated_send_len) {
Andy Greena1a24d22014-04-10 14:25:24 +0800518 if (lws_issue_raw(wsi, wsi->truncated_send_malloc +
Andy Greend607bb92015-12-06 05:52:09 +0800519 wsi->truncated_send_offset,
520 wsi->truncated_send_len) < 0) {
Andy Green62304762015-12-04 08:43:54 +0800521 lwsl_info("closing from lws_serve_http_file_fragment\n");
Andy Greena1a24d22014-04-10 14:25:24 +0800522 return -1;
523 }
Andy Green2764eba2013-12-09 14:16:17 +0800524 continue;
525 }
526
527 if (wsi->u.http.filepos == wsi->u.http.filelen)
528 goto all_sent;
529
Andy Green158e8042014-04-02 14:25:10 +0800530 compatible_file_read(n, wsi->u.http.fd, context->service_buffer,
Andy Greend607bb92015-12-06 05:52:09 +0800531 sizeof(context->service_buffer));
Patrick Gansterer81338aa2014-02-27 03:21:50 +0100532 if (n < 0)
533 return -1; /* caller will close */
Patrick Gansterer81338aa2014-02-27 03:21:50 +0100534 if (n) {
Andy Greend607bb92015-12-06 05:52:09 +0800535 lws_set_timeout(wsi, PENDING_TIMEOUT_HTTP_CONTENT,
536 AWAITING_TIMEOUT);
Andy Green200f3852014-10-18 12:23:05 +0800537 wsi->u.http.filepos += n;
Andy Green62304762015-12-04 08:43:54 +0800538 m = lws_write(wsi, context->service_buffer, n,
Andy Greend607bb92015-12-06 05:52:09 +0800539 wsi->u.http.filepos == wsi->u.http.filelen ?
540 LWS_WRITE_HTTP_FINAL : LWS_WRITE_HTTP);
Andy Greenfc7c5e42013-02-23 10:50:10 +0800541 if (m < 0)
542 return -1;
543
Andy Green158e8042014-04-02 14:25:10 +0800544 if (m != n)
Andy Greenfc7c5e42013-02-23 10:50:10 +0800545 /* adjust for what was not sent */
Andy Green7ef4b2e2014-11-30 13:00:47 +0800546 if (compatible_file_seek_cur(wsi->u.http.fd, m - n) < 0)
547 return -1;
Andy Greenb8b247d2013-01-22 07:20:08 +0800548 }
Andy Green2764eba2013-12-09 14:16:17 +0800549all_sent:
Andy Greene254d952014-03-23 11:41:15 +0800550 if (!wsi->truncated_send_len &&
Andy Greend607bb92015-12-06 05:52:09 +0800551 wsi->u.http.filepos == wsi->u.http.filelen) {
Andy Greenb8b247d2013-01-22 07:20:08 +0800552 wsi->state = WSI_STATE_HTTP;
553
Andy Greenc6f95d32015-10-27 07:07:14 +0800554 /* we might be in keepalive, so close it off here */
555 compatible_file_close(wsi->u.http.fd);
556 wsi->u.http.fd = LWS_INVALID_FILE;
557
Andy Greenb8b247d2013-01-22 07:20:08 +0800558 if (wsi->protocol->callback)
David Gauchard6c582282013-06-29 10:24:16 +0800559 /* ignore callback returned value */
560 user_callback_handle_rxflow(
Andy Greenb5b23192013-02-11 17:13:32 +0800561 wsi->protocol->callback, context, wsi,
562 LWS_CALLBACK_HTTP_FILE_COMPLETION,
563 wsi->user_space, NULL, 0);
David Gauchard6c582282013-06-29 10:24:16 +0800564 return 1; /* >0 indicates completed */
Andy Greenb8b247d2013-01-22 07:20:08 +0800565 }
566 }
567
Andy Green2764eba2013-12-09 14:16:17 +0800568 lwsl_info("choked before able to send whole file (post)\n");
Andy Green62304762015-12-04 08:43:54 +0800569 lws_callback_on_writable(context, wsi);
Andy Greenb8b247d2013-01-22 07:20:08 +0800570
David Gauchard6c582282013-06-29 10:24:16 +0800571 return 0; /* indicates further processing must be done */
Andy Greenb8b247d2013-01-22 07:20:08 +0800572}
Andy Green02138122014-04-06 06:26:35 +0100573
Andy Green11f27342015-11-08 12:10:26 +0800574#if LWS_POSIX
Andy Green02138122014-04-06 06:26:35 +0100575LWS_VISIBLE int
Andy Green4b85c1d2015-12-04 11:08:32 +0800576lws_ssl_capable_read_no_ssl(struct lws_context *context,
577 struct lws *wsi, unsigned char *buf, int len)
Andy Green02138122014-04-06 06:26:35 +0100578{
579 int n;
580
Andy Green2cd30742015-11-02 13:10:33 +0800581 (void)context;
Andy Green11f27342015-11-08 12:10:26 +0800582
Stephan Eberleb820e2c2015-10-23 08:10:55 +0200583 n = recv(wsi->sock, (char *)buf, len, 0);
Andy Greend7340c12014-04-10 14:08:10 +0800584 if (n >= 0)
585 return n;
Andy Green11f27342015-11-08 12:10:26 +0800586#if LWS_POSIX
Mark Liknessdbe624d2015-10-15 21:21:06 +0800587 if (LWS_ERRNO == LWS_EAGAIN ||
588 LWS_ERRNO == LWS_EWOULDBLOCK ||
589 LWS_ERRNO == LWS_EINTR)
590 return LWS_SSL_CAPABLE_MORE_SERVICE;
Andy Green8c0d3c02015-11-02 20:34:12 +0800591#endif
Andy Greend7340c12014-04-10 14:08:10 +0800592 lwsl_warn("error on reading from skt\n");
593 return LWS_SSL_CAPABLE_ERROR;
Andy Green02138122014-04-06 06:26:35 +0100594}
595
596LWS_VISIBLE int
Andy Green4b85c1d2015-12-04 11:08:32 +0800597lws_ssl_capable_write_no_ssl(struct lws *wsi, unsigned char *buf, int len)
Andy Green02138122014-04-06 06:26:35 +0100598{
Andy Green11f27342015-11-08 12:10:26 +0800599 int n = 0;
Andy Green8c0d3c02015-11-02 20:34:12 +0800600
601#if LWS_POSIX
Stephan Eberleb820e2c2015-10-23 08:10:55 +0200602 n = send(wsi->sock, (char *)buf, len, MSG_NOSIGNAL);
Andy Greend7340c12014-04-10 14:08:10 +0800603 if (n >= 0)
604 return n;
Andy Green02138122014-04-06 06:26:35 +0100605
Andy Greend7340c12014-04-10 14:08:10 +0800606 if (LWS_ERRNO == LWS_EAGAIN ||
607 LWS_ERRNO == LWS_EWOULDBLOCK ||
608 LWS_ERRNO == LWS_EINTR) {
609 if (LWS_ERRNO == LWS_EWOULDBLOCK)
610 lws_set_blocking_send(wsi);
611
612 return LWS_SSL_CAPABLE_MORE_SERVICE;
613 }
Andy Green8c0d3c02015-11-02 20:34:12 +0800614#else
615 (void)n;
616 (void)wsi;
617 (void)buf;
618 (void)len;
619 // !!!
620#endif
621
Andy Greend7340c12014-04-10 14:08:10 +0800622 lwsl_debug("ERROR writing len %d to skt %d\n", len, n);
623 return LWS_SSL_CAPABLE_ERROR;
Andy Green02138122014-04-06 06:26:35 +0100624}
Andy Green11f27342015-11-08 12:10:26 +0800625#endif
=?UTF-8?q?Jos=C3=A9=20Luis=20Mill=C3=A1n?=4c0ba022015-08-19 16:23:33 +0200626LWS_VISIBLE int
Andy Green4b85c1d2015-12-04 11:08:32 +0800627lws_ssl_pending_no_ssl(struct lws *wsi)
=?UTF-8?q?Jos=C3=A9=20Luis=20Mill=C3=A1n?=4c0ba022015-08-19 16:23:33 +0200628{
Andy Green2cd30742015-11-02 13:10:33 +0800629 (void)wsi;
=?UTF-8?q?Jos=C3=A9=20Luis=20Mill=C3=A1n?=4c0ba022015-08-19 16:23:33 +0200630 return 0;
631}