2020-12-05 11:26:32 +00:00
|
|
|
#include "ws.h"
|
|
|
|
|
|
|
|
#include "base64.h"
|
2022-07-28 10:18:17 +01:00
|
|
|
#include "fmt.h"
|
2020-12-05 11:26:32 +00:00
|
|
|
#include "http.h"
|
|
|
|
#include "log.h"
|
|
|
|
#include "sha1.h"
|
|
|
|
#include "url.h"
|
|
|
|
#include "util.h"
|
|
|
|
|
|
|
|
struct ws_msg {
|
|
|
|
uint8_t flags;
|
|
|
|
size_t header_len;
|
|
|
|
size_t data_len;
|
|
|
|
};
|
|
|
|
|
2022-06-05 14:59:50 +01:00
|
|
|
size_t mg_ws_vprintf(struct mg_connection *c, int op, const char *fmt,
|
2022-08-13 11:16:13 +01:00
|
|
|
va_list *ap) {
|
|
|
|
size_t len = c->send.len;
|
|
|
|
size_t n = mg_vrprintf(mg_pfn_iobuf, &c->send, fmt, ap);
|
|
|
|
mg_ws_wrap(c, c->send.len - len, op);
|
|
|
|
return n;
|
2022-06-05 14:59:50 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
size_t mg_ws_printf(struct mg_connection *c, int op, const char *fmt, ...) {
|
|
|
|
size_t len = 0;
|
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
2022-08-13 11:16:13 +01:00
|
|
|
len = mg_ws_vprintf(c, op, fmt, &ap);
|
2022-06-05 14:59:50 +01:00
|
|
|
va_end(ap);
|
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
2021-08-04 11:38:32 +01:00
|
|
|
static void ws_handshake(struct mg_connection *c, const struct mg_str *wskey,
|
|
|
|
const struct mg_str *wsproto, const char *fmt,
|
|
|
|
va_list ap) {
|
2020-12-05 11:26:32 +00:00
|
|
|
const char *magic = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11";
|
|
|
|
unsigned char sha[20], b64_sha[30];
|
2021-01-16 22:48:43 +00:00
|
|
|
char mem[128], *buf = mem;
|
|
|
|
|
2020-12-05 11:26:32 +00:00
|
|
|
mg_sha1_ctx sha_ctx;
|
|
|
|
mg_sha1_init(&sha_ctx);
|
2021-08-04 11:38:32 +01:00
|
|
|
mg_sha1_update(&sha_ctx, (unsigned char *) wskey->ptr, wskey->len);
|
2020-12-05 11:26:32 +00:00
|
|
|
mg_sha1_update(&sha_ctx, (unsigned char *) magic, 36);
|
|
|
|
mg_sha1_final(sha, &sha_ctx);
|
|
|
|
mg_base64_encode(sha, sizeof(sha), (char *) b64_sha);
|
2021-01-16 22:48:43 +00:00
|
|
|
buf[0] = '\0';
|
|
|
|
if (fmt != NULL) mg_vasprintf(&buf, sizeof(mem), fmt, ap);
|
2020-12-05 11:26:32 +00:00
|
|
|
mg_printf(c,
|
|
|
|
"HTTP/1.1 101 Switching Protocols\r\n"
|
|
|
|
"Upgrade: websocket\r\n"
|
|
|
|
"Connection: Upgrade\r\n"
|
2021-01-16 22:48:43 +00:00
|
|
|
"Sec-WebSocket-Accept: %s\r\n"
|
2021-08-04 11:38:32 +01:00
|
|
|
"%s",
|
2021-01-16 22:48:43 +00:00
|
|
|
b64_sha, buf);
|
|
|
|
if (buf != mem) free(buf);
|
2021-08-04 11:38:32 +01:00
|
|
|
if (wsproto != NULL) {
|
|
|
|
mg_printf(c, "Sec-WebSocket-Protocol: %.*s\r\n", (int) wsproto->len,
|
|
|
|
wsproto->ptr);
|
|
|
|
}
|
|
|
|
mg_send(c, "\r\n", 2);
|
2020-12-05 11:26:32 +00:00
|
|
|
}
|
|
|
|
|
2022-08-13 11:16:13 +01:00
|
|
|
static uint32_t be32(const uint8_t *p) {
|
|
|
|
return (((uint32_t) p[3]) << 0) | (((uint32_t) p[2]) << 8) |
|
|
|
|
(((uint32_t) p[1]) << 16) | (((uint32_t) p[0]) << 24);
|
|
|
|
}
|
|
|
|
|
2020-12-05 11:26:32 +00:00
|
|
|
static size_t ws_process(uint8_t *buf, size_t len, struct ws_msg *msg) {
|
|
|
|
size_t i, n = 0, mask_len = 0;
|
|
|
|
memset(msg, 0, sizeof(*msg));
|
|
|
|
if (len >= 2) {
|
2021-08-27 10:25:24 +01:00
|
|
|
n = buf[1] & 0x7f; // Frame length
|
|
|
|
mask_len = buf[1] & 128 ? 4 : 0; // last bit is a mask bit
|
|
|
|
msg->flags = buf[0];
|
2020-12-05 11:26:32 +00:00
|
|
|
if (n < 126 && len >= mask_len) {
|
|
|
|
msg->data_len = n;
|
|
|
|
msg->header_len = 2 + mask_len;
|
|
|
|
} else if (n == 126 && len >= 4 + mask_len) {
|
|
|
|
msg->header_len = 4 + mask_len;
|
2022-08-13 11:16:13 +01:00
|
|
|
msg->data_len = (((size_t) buf[2]) << 8) | buf[3];
|
2020-12-05 11:26:32 +00:00
|
|
|
} else if (len >= 10 + mask_len) {
|
|
|
|
msg->header_len = 10 + mask_len;
|
|
|
|
msg->data_len =
|
2022-08-13 11:16:13 +01:00
|
|
|
(size_t) (((uint64_t) be32(buf + 2) << 32) + be32(buf + 6));
|
2020-12-05 11:26:32 +00:00
|
|
|
}
|
|
|
|
}
|
2021-09-14 10:26:03 +01:00
|
|
|
// Sanity check, and integer overflow protection for the boundary check below
|
|
|
|
// data_len should not be larger than 1 Gb
|
2021-09-17 10:56:58 +01:00
|
|
|
if (msg->data_len > 1024 * 1024 * 1024) return 0;
|
2020-12-05 11:26:32 +00:00
|
|
|
if (msg->header_len + msg->data_len > len) return 0;
|
|
|
|
if (mask_len > 0) {
|
|
|
|
uint8_t *p = buf + msg->header_len, *m = p - mask_len;
|
|
|
|
for (i = 0; i < msg->data_len; i++) p[i] ^= m[i & 3];
|
|
|
|
}
|
|
|
|
return msg->header_len + msg->data_len;
|
|
|
|
}
|
|
|
|
|
2021-08-01 14:10:21 +01:00
|
|
|
static size_t mkhdr(size_t len, int op, bool is_client, uint8_t *buf) {
|
|
|
|
size_t n = 0;
|
2021-08-27 10:25:24 +01:00
|
|
|
buf[0] = (uint8_t) (op | 128);
|
2020-12-05 11:26:32 +00:00
|
|
|
if (len < 126) {
|
2021-08-01 14:10:21 +01:00
|
|
|
buf[1] = (unsigned char) len;
|
|
|
|
n = 2;
|
2020-12-23 16:18:49 +00:00
|
|
|
} else if (len < 65536) {
|
2020-12-05 11:26:32 +00:00
|
|
|
uint16_t tmp = mg_htons((uint16_t) len);
|
2021-08-01 14:10:21 +01:00
|
|
|
buf[1] = 126;
|
|
|
|
memcpy(&buf[2], &tmp, sizeof(tmp));
|
|
|
|
n = 4;
|
2020-12-05 11:26:32 +00:00
|
|
|
} else {
|
|
|
|
uint32_t tmp;
|
2021-08-01 14:10:21 +01:00
|
|
|
buf[1] = 127;
|
2022-08-13 11:16:13 +01:00
|
|
|
tmp = mg_htonl((uint32_t) (len >> 32));
|
2021-08-01 14:10:21 +01:00
|
|
|
memcpy(&buf[2], &tmp, sizeof(tmp));
|
2022-08-13 11:16:13 +01:00
|
|
|
tmp = mg_htonl((uint32_t) (len & 0xffffffffU));
|
2021-08-01 14:10:21 +01:00
|
|
|
memcpy(&buf[6], &tmp, sizeof(tmp));
|
|
|
|
n = 10;
|
2020-12-05 11:26:32 +00:00
|
|
|
}
|
2021-08-01 14:10:21 +01:00
|
|
|
if (is_client) {
|
|
|
|
buf[1] |= 1 << 7; // Set masking flag
|
|
|
|
mg_random(&buf[n], 4);
|
|
|
|
n += 4;
|
2020-12-05 11:26:32 +00:00
|
|
|
}
|
2021-08-01 14:10:21 +01:00
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void mg_ws_mask(struct mg_connection *c, size_t len) {
|
2021-01-02 12:20:08 +00:00
|
|
|
if (c->is_client && c->send.buf != NULL) {
|
2021-08-01 14:10:21 +01:00
|
|
|
size_t i;
|
|
|
|
uint8_t *p = c->send.buf + c->send.len - len, *mask = p - 4;
|
2020-12-05 11:26:32 +00:00
|
|
|
for (i = 0; i < len; i++) p[i] ^= mask[i & 3];
|
|
|
|
}
|
2021-08-01 14:10:21 +01:00
|
|
|
}
|
|
|
|
|
2022-08-11 12:11:12 +01:00
|
|
|
size_t mg_ws_send(struct mg_connection *c, const void *buf, size_t len,
|
2021-08-01 14:10:21 +01:00
|
|
|
int op) {
|
|
|
|
uint8_t header[14];
|
|
|
|
size_t header_len = mkhdr(len, op, c->is_client, header);
|
|
|
|
mg_send(c, header, header_len);
|
2022-02-12 18:17:25 +00:00
|
|
|
MG_VERBOSE(("WS out: %d [%.*s]", (int) len, (int) len, buf));
|
2021-08-01 14:10:21 +01:00
|
|
|
mg_send(c, buf, len);
|
|
|
|
mg_ws_mask(c, len);
|
2020-12-05 11:26:32 +00:00
|
|
|
return header_len + len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void mg_ws_cb(struct mg_connection *c, int ev, void *ev_data,
|
|
|
|
void *fn_data) {
|
|
|
|
struct ws_msg msg;
|
2021-08-27 10:25:24 +01:00
|
|
|
size_t ofs = (size_t) c->pfn_data;
|
2020-12-05 11:26:32 +00:00
|
|
|
|
2021-08-27 10:25:24 +01:00
|
|
|
// assert(ofs < c->recv.len);
|
2020-12-05 11:26:32 +00:00
|
|
|
if (ev == MG_EV_READ) {
|
|
|
|
if (!c->is_websocket && c->is_client) {
|
|
|
|
int n = mg_http_get_request_len(c->recv.buf, c->recv.len);
|
|
|
|
if (n < 0) {
|
|
|
|
c->is_closing = 1; // Some just, not an HTTP request
|
|
|
|
} else if (n > 0) {
|
|
|
|
if (n < 15 || memcmp(c->recv.buf + 9, "101", 3) != 0) {
|
2022-02-12 18:17:25 +00:00
|
|
|
MG_ERROR(("%lu WS handshake error: %.*s", c->id, 15, c->recv.buf));
|
2020-12-05 11:26:32 +00:00
|
|
|
c->is_closing = 1;
|
|
|
|
} else {
|
2021-01-17 11:16:19 +00:00
|
|
|
struct mg_http_message hm;
|
|
|
|
mg_http_parse((char *) c->recv.buf, c->recv.len, &hm);
|
2020-12-05 11:26:32 +00:00
|
|
|
c->is_websocket = 1;
|
2021-01-17 11:16:19 +00:00
|
|
|
mg_call(c, MG_EV_WS_OPEN, &hm);
|
2020-12-05 11:26:32 +00:00
|
|
|
}
|
2021-08-28 07:16:38 +01:00
|
|
|
mg_iobuf_del(&c->recv, 0, (size_t) n);
|
2020-12-05 11:26:32 +00:00
|
|
|
} else {
|
|
|
|
return; // A request is not yet received
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-08-27 10:25:24 +01:00
|
|
|
while (ws_process(c->recv.buf + ofs, c->recv.len - ofs, &msg) > 0) {
|
|
|
|
char *s = (char *) c->recv.buf + ofs + msg.header_len;
|
2020-12-23 11:58:08 +00:00
|
|
|
struct mg_ws_message m = {{s, msg.data_len}, msg.flags};
|
2021-08-27 10:25:24 +01:00
|
|
|
size_t len = msg.header_len + msg.data_len;
|
|
|
|
uint8_t final = msg.flags & 128, op = msg.flags & 15;
|
2022-02-12 18:17:25 +00:00
|
|
|
// MG_VERBOSE ("fin %d op %d len %d [%.*s]", final, op,
|
2021-08-27 10:25:24 +01:00
|
|
|
// (int) m.data.len, (int) m.data.len, m.data.ptr));
|
|
|
|
switch (op) {
|
2021-06-10 19:15:50 +01:00
|
|
|
case WEBSOCKET_OP_CONTINUE:
|
|
|
|
mg_call(c, MG_EV_WS_CTL, &m);
|
|
|
|
break;
|
2020-12-05 11:26:32 +00:00
|
|
|
case WEBSOCKET_OP_PING:
|
2022-02-12 18:17:25 +00:00
|
|
|
MG_DEBUG(("%s", "WS PONG"));
|
2020-12-05 11:26:32 +00:00
|
|
|
mg_ws_send(c, s, msg.data_len, WEBSOCKET_OP_PONG);
|
2020-12-23 11:58:08 +00:00
|
|
|
mg_call(c, MG_EV_WS_CTL, &m);
|
2020-12-05 11:26:32 +00:00
|
|
|
break;
|
|
|
|
case WEBSOCKET_OP_PONG:
|
2020-12-23 11:58:08 +00:00
|
|
|
mg_call(c, MG_EV_WS_CTL, &m);
|
2020-12-05 11:26:32 +00:00
|
|
|
break;
|
2021-06-10 19:15:50 +01:00
|
|
|
case WEBSOCKET_OP_TEXT:
|
|
|
|
case WEBSOCKET_OP_BINARY:
|
2021-08-27 10:25:24 +01:00
|
|
|
if (final) mg_call(c, MG_EV_WS_MSG, &m);
|
2021-06-10 19:15:50 +01:00
|
|
|
break;
|
2020-12-23 11:58:08 +00:00
|
|
|
case WEBSOCKET_OP_CLOSE:
|
2022-02-12 18:17:25 +00:00
|
|
|
MG_DEBUG(("%lu Got WS CLOSE", c->id));
|
2020-12-23 11:58:08 +00:00
|
|
|
mg_call(c, MG_EV_WS_CTL, &m);
|
2022-04-05 14:45:39 +01:00
|
|
|
mg_ws_send(c, "", 0, WEBSOCKET_OP_CLOSE);
|
|
|
|
c->is_draining = 1;
|
2020-12-05 11:26:32 +00:00
|
|
|
break;
|
2021-06-10 19:15:50 +01:00
|
|
|
default:
|
|
|
|
// Per RFC6455, close conn when an unknown op is recvd
|
2021-08-27 10:25:24 +01:00
|
|
|
mg_error(c, "unknown WS op %d", op);
|
2021-06-10 19:15:50 +01:00
|
|
|
break;
|
2020-12-05 11:26:32 +00:00
|
|
|
}
|
2021-08-27 10:25:24 +01:00
|
|
|
|
|
|
|
// Handle fragmented frames: strip header, keep in c->recv
|
|
|
|
if (final == 0 || op == 0) {
|
|
|
|
if (op) ofs++, len--, msg.header_len--; // First frame
|
|
|
|
mg_iobuf_del(&c->recv, ofs, msg.header_len); // Strip header
|
|
|
|
len -= msg.header_len;
|
|
|
|
ofs += len;
|
|
|
|
c->pfn_data = (void *) ofs;
|
2022-02-12 18:17:25 +00:00
|
|
|
// MG_INFO(("FRAG %d [%.*s]", (int) ofs, (int) ofs, c->recv.buf));
|
2021-08-27 10:25:24 +01:00
|
|
|
}
|
|
|
|
// Remove non-fragmented frame
|
|
|
|
if (final && op) mg_iobuf_del(&c->recv, ofs, len);
|
|
|
|
// Last chunk of the fragmented frame
|
|
|
|
if (final && !op) {
|
|
|
|
m.flags = c->recv.buf[0];
|
|
|
|
m.data = mg_str_n((char *) &c->recv.buf[1], (size_t) (ofs - 1));
|
|
|
|
mg_call(c, MG_EV_WS_MSG, &m);
|
|
|
|
mg_iobuf_del(&c->recv, 0, ofs);
|
|
|
|
ofs = 0;
|
|
|
|
c->pfn_data = NULL;
|
|
|
|
}
|
2020-12-05 11:26:32 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
(void) fn_data;
|
|
|
|
(void) ev_data;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct mg_connection *mg_ws_connect(struct mg_mgr *mgr, const char *url,
|
|
|
|
mg_event_handler_t fn, void *fn_data,
|
|
|
|
const char *fmt, ...) {
|
|
|
|
struct mg_connection *c = mg_connect(mgr, url, fn, fn_data);
|
|
|
|
if (c != NULL) {
|
|
|
|
char nonce[16], key[30], mem1[128], mem2[256], *buf1 = mem1, *buf2 = mem2;
|
|
|
|
struct mg_str host = mg_url_host(url);
|
2022-02-10 17:11:03 +00:00
|
|
|
size_t n1 = 0, n2 = 0;
|
2022-03-21 15:17:09 +00:00
|
|
|
nonce[0] = key[0] = mem1[0] = mem2[0] = '\0';
|
2020-12-05 11:26:32 +00:00
|
|
|
if (fmt != NULL) {
|
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
|
|
|
n1 = mg_vasprintf(&buf1, sizeof(mem1), fmt, ap);
|
|
|
|
va_end(ap);
|
|
|
|
}
|
|
|
|
// Send handshake request
|
|
|
|
mg_random(nonce, sizeof(nonce));
|
|
|
|
mg_base64_encode((unsigned char *) nonce, sizeof(nonce), key);
|
|
|
|
n2 = mg_asprintf(&buf2, sizeof(mem2),
|
|
|
|
"GET %s HTTP/1.1\r\n"
|
|
|
|
"Upgrade: websocket\r\n"
|
|
|
|
"Host: %.*s\r\n"
|
|
|
|
"Connection: Upgrade\r\n"
|
|
|
|
"%.*s"
|
|
|
|
"Sec-WebSocket-Version: 13\r\n"
|
|
|
|
"Sec-WebSocket-Key: %s\r\n"
|
|
|
|
"\r\n",
|
2022-03-21 15:17:09 +00:00
|
|
|
mg_url_uri(url), (int) host.len, host.ptr, (int) n1, buf1,
|
|
|
|
key);
|
|
|
|
mg_send(c, buf2, n2);
|
2020-12-05 11:26:32 +00:00
|
|
|
if (buf1 != mem1) free(buf1);
|
|
|
|
if (buf2 != mem2) free(buf2);
|
|
|
|
c->pfn = mg_ws_cb;
|
2021-08-27 10:25:24 +01:00
|
|
|
c->pfn_data = NULL;
|
2020-12-05 11:26:32 +00:00
|
|
|
}
|
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
2021-01-16 22:48:43 +00:00
|
|
|
void mg_ws_upgrade(struct mg_connection *c, struct mg_http_message *hm,
|
|
|
|
const char *fmt, ...) {
|
2020-12-05 11:26:32 +00:00
|
|
|
struct mg_str *wskey = mg_http_get_header(hm, "Sec-WebSocket-Key");
|
|
|
|
c->pfn = mg_ws_cb;
|
2021-08-27 10:25:24 +01:00
|
|
|
c->pfn_data = NULL;
|
2021-08-03 23:37:50 +01:00
|
|
|
if (wskey == NULL) {
|
|
|
|
mg_http_reply(c, 426, "", "WS upgrade expected\n");
|
|
|
|
c->is_draining = 1;
|
|
|
|
} else {
|
2021-08-04 11:38:32 +01:00
|
|
|
struct mg_str *wsproto = mg_http_get_header(hm, "Sec-WebSocket-Protocol");
|
2021-01-16 22:48:43 +00:00
|
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
2021-08-04 11:38:32 +01:00
|
|
|
ws_handshake(c, wskey, wsproto, fmt, ap);
|
2021-01-16 22:48:43 +00:00
|
|
|
va_end(ap);
|
2021-08-03 23:37:50 +01:00
|
|
|
c->is_websocket = 1;
|
2021-08-11 04:52:39 +01:00
|
|
|
mg_call(c, MG_EV_WS_OPEN, hm);
|
2021-01-16 22:48:43 +00:00
|
|
|
}
|
2020-12-05 11:26:32 +00:00
|
|
|
}
|
2021-08-01 14:10:21 +01:00
|
|
|
|
|
|
|
size_t mg_ws_wrap(struct mg_connection *c, size_t len, int op) {
|
|
|
|
uint8_t header[14], *p;
|
|
|
|
size_t header_len = mkhdr(len, op, c->is_client, header);
|
|
|
|
|
|
|
|
// NOTE: order of operations is important!
|
2022-08-01 12:53:25 +01:00
|
|
|
mg_iobuf_add(&c->send, c->send.len, NULL, header_len);
|
2021-08-28 08:08:54 +01:00
|
|
|
p = &c->send.buf[c->send.len - len]; // p points to data
|
|
|
|
memmove(p, p - header_len, len); // Shift data
|
|
|
|
memcpy(p - header_len, header, header_len); // Prepend header
|
|
|
|
mg_ws_mask(c, len); // Mask data
|
2021-08-01 14:10:21 +01:00
|
|
|
|
|
|
|
return c->send.len;
|
|
|
|
}
|