client.c 26 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079
  1. /*
  2. * libwebsockets - small server side websockets and web server implementation
  3. *
  4. * Copyright (C) 2010-2014 Andy Green <andy@warmcat.com>
  5. *
  6. * This library is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation:
  9. * version 2.1 of the License.
  10. *
  11. * This library is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public
  17. * License along with this library; if not, write to the Free Software
  18. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
  19. * MA 02110-1301 USA
  20. */
  21. #include "private-libwebsockets.h"
  22. int
  23. lws_handshake_client(struct lws *wsi, unsigned char **buf, size_t len)
  24. {
  25. int m;
  26. switch (wsi->mode) {
  27. case LWSCM_WSCL_WAITING_PROXY_REPLY:
  28. case LWSCM_WSCL_ISSUE_HANDSHAKE:
  29. case LWSCM_WSCL_WAITING_SERVER_REPLY:
  30. case LWSCM_WSCL_WAITING_EXTENSION_CONNECT:
  31. case LWSCM_WS_CLIENT:
  32. while (len) {
  33. /*
  34. * we were accepting input but now we stopped doing so
  35. */
  36. if (!(wsi->rxflow_change_to & LWS_RXFLOW_ALLOW)) {
  37. lwsl_debug("%s: caching %d\n", __func__, len);
  38. lws_rxflow_cache(wsi, *buf, 0, len);
  39. return 0;
  40. }
  41. if (wsi->u.ws.rx_draining_ext) {
  42. m = lws_rx_sm(wsi, 0);
  43. if (m < 0)
  44. return -1;
  45. continue;
  46. }
  47. /* account for what we're using in rxflow buffer */
  48. if (wsi->rxflow_buffer)
  49. wsi->rxflow_pos++;
  50. if (lws_client_rx_sm(wsi, *(*buf)++)) {
  51. lwsl_debug("client_rx_sm exited\n");
  52. return -1;
  53. }
  54. len--;
  55. }
  56. lwsl_debug("%s: finished with %d\n", __func__, len);
  57. return 0;
  58. default:
  59. break;
  60. }
  61. return 0;
  62. }
  63. LWS_VISIBLE LWS_EXTERN void
  64. lws_client_http_body_pending(struct lws *wsi, int something_left_to_send)
  65. {
  66. wsi->client_http_body_pending = !!something_left_to_send;
  67. }
  68. int
  69. lws_client_socket_service(struct lws_context *context, struct lws *wsi,
  70. struct lws_pollfd *pollfd)
  71. {
  72. struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
  73. char *p = (char *)&pt->serv_buf[0];
  74. const char *cce = NULL;
  75. unsigned char c;
  76. char *sb = p;
  77. int n, len;
  78. switch (wsi->mode) {
  79. case LWSCM_WSCL_WAITING_CONNECT:
  80. /*
  81. * we are under PENDING_TIMEOUT_SENT_CLIENT_HANDSHAKE
  82. * timeout protection set in client-handshake.c
  83. */
  84. if (!lws_client_connect_2(wsi)) {
  85. /* closed */
  86. lwsl_client("closed\n");
  87. return -1;
  88. }
  89. /* either still pending connection, or changed mode */
  90. return 0;
  91. case LWSCM_WSCL_WAITING_PROXY_REPLY:
  92. /* handle proxy hung up on us */
  93. if (pollfd->revents & LWS_POLLHUP) {
  94. lwsl_warn("Proxy connection %p (fd=%d) dead\n",
  95. (void *)wsi, pollfd->fd);
  96. lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS);
  97. return 0;
  98. }
  99. n = recv(wsi->sock, sb, context->pt_serv_buf_size, 0);
  100. if (n < 0) {
  101. if (LWS_ERRNO == LWS_EAGAIN) {
  102. lwsl_debug("Proxy read returned EAGAIN... retrying\n");
  103. return 0;
  104. }
  105. lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS);
  106. lwsl_err("ERROR reading from proxy socket\n");
  107. return 0;
  108. }
  109. pt->serv_buf[13] = '\0';
  110. if (strcmp(sb, "HTTP/1.0 200 ") &&
  111. strcmp(sb, "HTTP/1.1 200 ")) {
  112. lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS);
  113. lwsl_err("ERROR proxy: %s\n", sb);
  114. return 0;
  115. }
  116. /* clear his proxy connection timeout */
  117. lws_set_timeout(wsi, NO_PENDING_TIMEOUT, 0);
  118. /* fallthru */
  119. case LWSCM_WSCL_ISSUE_HANDSHAKE:
  120. /*
  121. * we are under PENDING_TIMEOUT_SENT_CLIENT_HANDSHAKE
  122. * timeout protection set in client-handshake.c
  123. *
  124. * take care of our lws_callback_on_writable
  125. * happening at a time when there's no real connection yet
  126. */
  127. if (lws_change_pollfd(wsi, LWS_POLLOUT, 0))
  128. return -1;
  129. #ifdef LWS_OPENSSL_SUPPORT
  130. /* we can retry this... just cook the SSL BIO the first time */
  131. if (wsi->use_ssl && !wsi->ssl) {
  132. if (lws_ssl_client_bio_create(wsi))
  133. return -1;
  134. }
  135. if (wsi->use_ssl) {
  136. n = lws_ssl_client_connect1(wsi);
  137. if (!n)
  138. return 0;
  139. if (n < 0) {
  140. cce = "lws_ssl_client_connect1 failed";
  141. goto bail3;
  142. }
  143. } else
  144. wsi->ssl = NULL;
  145. /* fallthru */
  146. case LWSCM_WSCL_WAITING_SSL:
  147. if (wsi->use_ssl) {
  148. n = lws_ssl_client_connect2(wsi);
  149. if (!n)
  150. return 0;
  151. if (n < 0) {
  152. cce = "lws_ssl_client_connect2 failed";
  153. goto bail3;
  154. }
  155. } else
  156. wsi->ssl = NULL;
  157. #endif
  158. wsi->mode = LWSCM_WSCL_ISSUE_HANDSHAKE2;
  159. lws_set_timeout(wsi, PENDING_TIMEOUT_AWAITING_CLIENT_HS_SEND,
  160. context->timeout_secs);
  161. /* fallthru */
  162. case LWSCM_WSCL_ISSUE_HANDSHAKE2:
  163. p = lws_generate_client_handshake(wsi, p);
  164. if (p == NULL) {
  165. lwsl_err("Failed to generate handshake for client\n");
  166. lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS);
  167. return 0;
  168. }
  169. /* send our request to the server */
  170. lws_latency_pre(context, wsi);
  171. n = lws_ssl_capable_write(wsi, (unsigned char *)sb, p - sb);
  172. lws_latency(context, wsi, "send lws_issue_raw", n,
  173. n == p - sb);
  174. switch (n) {
  175. case LWS_SSL_CAPABLE_ERROR:
  176. lwsl_debug("ERROR writing to client socket\n");
  177. lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS);
  178. return 0;
  179. case LWS_SSL_CAPABLE_MORE_SERVICE:
  180. lws_callback_on_writable(wsi);
  181. break;
  182. }
  183. if (wsi->client_http_body_pending) {
  184. wsi->mode = LWSCM_WSCL_ISSUE_HTTP_BODY;
  185. lws_set_timeout(wsi, PENDING_TIMEOUT_CLIENT_ISSUE_PAYLOAD,
  186. context->timeout_secs);
  187. /* user code must ask for writable callback */
  188. break;
  189. }
  190. goto client_http_body_sent;
  191. case LWSCM_WSCL_ISSUE_HTTP_BODY:
  192. if (wsi->client_http_body_pending) {
  193. lws_set_timeout(wsi, PENDING_TIMEOUT_CLIENT_ISSUE_PAYLOAD,
  194. context->timeout_secs);
  195. /* user code must ask for writable callback */
  196. break;
  197. }
  198. client_http_body_sent:
  199. wsi->u.hdr.parser_state = WSI_TOKEN_NAME_PART;
  200. wsi->u.hdr.lextable_pos = 0;
  201. wsi->mode = LWSCM_WSCL_WAITING_SERVER_REPLY;
  202. lws_set_timeout(wsi, PENDING_TIMEOUT_AWAITING_SERVER_RESPONSE,
  203. context->timeout_secs);
  204. break;
  205. case LWSCM_WSCL_WAITING_SERVER_REPLY:
  206. /* handle server hung up on us */
  207. if (pollfd->revents & LWS_POLLHUP) {
  208. lwsl_debug("Server connection %p (fd=%d) dead\n",
  209. (void *)wsi, pollfd->fd);
  210. cce = "Peer hung up";
  211. goto bail3;
  212. }
  213. if (!(pollfd->revents & LWS_POLLIN))
  214. break;
  215. /* interpret the server response */
  216. /*
  217. * HTTP/1.1 101 Switching Protocols
  218. * Upgrade: websocket
  219. * Connection: Upgrade
  220. * Sec-WebSocket-Accept: me89jWimTRKTWwrS3aRrL53YZSo=
  221. * Sec-WebSocket-Nonce: AQIDBAUGBwgJCgsMDQ4PEC==
  222. * Sec-WebSocket-Protocol: chat
  223. */
  224. /*
  225. * we have to take some care here to only take from the
  226. * socket bytewise. The browser may (and has been seen to
  227. * in the case that onopen() performs websocket traffic)
  228. * coalesce both handshake response and websocket traffic
  229. * in one packet, since at that point the connection is
  230. * definitively ready from browser pov.
  231. */
  232. len = 1;
  233. while (wsi->u.hdr.parser_state != WSI_PARSING_COMPLETE &&
  234. len > 0) {
  235. n = lws_ssl_capable_read(wsi, &c, 1);
  236. lws_latency(context, wsi, "send lws_issue_raw", n,
  237. n == 1);
  238. switch (n) {
  239. case 0:
  240. case LWS_SSL_CAPABLE_ERROR:
  241. cce = "read failed";
  242. goto bail3;
  243. case LWS_SSL_CAPABLE_MORE_SERVICE:
  244. return 0;
  245. }
  246. if (lws_parse(wsi, c)) {
  247. lwsl_warn("problems parsing header\n");
  248. goto bail3;
  249. }
  250. }
  251. /*
  252. * hs may also be coming in multiple packets, there is a 5-sec
  253. * libwebsocket timeout still active here too, so if parsing did
  254. * not complete just wait for next packet coming in this state
  255. */
  256. if (wsi->u.hdr.parser_state != WSI_PARSING_COMPLETE)
  257. break;
  258. /*
  259. * otherwise deal with the handshake. If there's any
  260. * packet traffic already arrived we'll trigger poll() again
  261. * right away and deal with it that way
  262. */
  263. return lws_client_interpret_server_handshake(wsi);
  264. bail3:
  265. lwsl_info("closing conn at LWS_CONNMODE...SERVER_REPLY\n");
  266. wsi->vhost->protocols[0].callback(wsi,
  267. LWS_CALLBACK_CLIENT_CONNECTION_ERROR,
  268. wsi->user_space, (void *)cce, cce ? strlen(cce) : 0);
  269. wsi->already_did_cce = 1;
  270. lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS);
  271. return -1;
  272. case LWSCM_WSCL_WAITING_EXTENSION_CONNECT:
  273. lwsl_ext("LWSCM_WSCL_WAITING_EXTENSION_CONNECT\n");
  274. break;
  275. case LWSCM_WSCL_PENDING_CANDIDATE_CHILD:
  276. lwsl_ext("LWSCM_WSCL_PENDING_CANDIDATE_CHILD\n");
  277. break;
  278. default:
  279. break;
  280. }
  281. return 0;
  282. }
  283. /*
  284. * In-place str to lower case
  285. */
  286. static void
  287. strtolower(char *s)
  288. {
  289. while (*s) {
  290. *s = tolower((int)*s);
  291. s++;
  292. }
  293. }
  294. int LWS_WARN_UNUSED_RESULT
  295. lws_http_transaction_completed_client(struct lws *wsi)
  296. {
  297. lwsl_debug("%s: wsi %p\n", __func__, wsi);
  298. /* if we can't go back to accept new headers, drop the connection */
  299. if (wsi->u.http.connection_type != HTTP_CONNECTION_KEEP_ALIVE) {
  300. lwsl_info("%s: %p: close connection\n", __func__, wsi);
  301. return 1;
  302. }
  303. /* otherwise set ourselves up ready to go again */
  304. wsi->state = LWSS_CLIENT_HTTP_ESTABLISHED;
  305. wsi->mode = LWSCM_HTTP_CLIENT_ACCEPTED;
  306. wsi->u.http.content_length = 0;
  307. wsi->hdr_parsing_completed = 0;
  308. /* He asked for it to stay alive indefinitely */
  309. lws_set_timeout(wsi, NO_PENDING_TIMEOUT, 0);
  310. /*
  311. * As client, nothing new is going to come until we ask for it
  312. * we can drop the ah, if any
  313. */
  314. if (wsi->u.hdr.ah) {
  315. wsi->u.hdr.ah->rxpos = wsi->u.hdr.ah->rxlen;
  316. lws_header_table_detach(wsi, 0);
  317. }
  318. /* If we're (re)starting on headers, need other implied init */
  319. wsi->u.hdr.ues = URIES_IDLE;
  320. lwsl_info("%s: %p: keep-alive await new transaction\n", __func__, wsi);
  321. return 0;
  322. }
  323. int
  324. lws_client_interpret_server_handshake(struct lws *wsi)
  325. {
  326. int n, len, okay = 0, port = 0, ssl = 0;
  327. int close_reason = LWS_CLOSE_STATUS_PROTOCOL_ERR;
  328. struct lws_context *context = wsi->context;
  329. const char *pc, *prot, *ads = NULL, *path, *cce = NULL;
  330. struct allocated_headers *ah;
  331. char *p;
  332. #ifndef LWS_NO_EXTENSIONS
  333. struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
  334. char *sb = (char *)&pt->serv_buf[0];
  335. const struct lws_ext_options *opts;
  336. const struct lws_extension *ext;
  337. char ext_name[128];
  338. const char *c, *a;
  339. char ignore;
  340. int more = 1;
  341. void *v;
  342. #endif
  343. if (!wsi->do_ws) {
  344. /* we are being an http client...
  345. */
  346. ah = wsi->u.hdr.ah;
  347. lws_union_transition(wsi, LWSCM_HTTP_CLIENT_ACCEPTED);
  348. wsi->state = LWSS_CLIENT_HTTP_ESTABLISHED;
  349. wsi->u.http.ah = ah;
  350. }
  351. /*
  352. * well, what the server sent looked reasonable for syntax.
  353. * Now let's confirm it sent all the necessary headers
  354. *
  355. * http (non-ws) client will expect something like this
  356. *
  357. * HTTP/1.0.200
  358. * server:.libwebsockets
  359. * content-type:.text/html
  360. * content-length:.17703
  361. * set-cookie:.test=LWS_1456736240_336776_COOKIE;Max-Age=360000
  362. *
  363. *
  364. *
  365. */
  366. wsi->u.http.connection_type = HTTP_CONNECTION_KEEP_ALIVE;
  367. p = lws_hdr_simple_ptr(wsi, WSI_TOKEN_HTTP);
  368. if (wsi->do_ws && !p) {
  369. lwsl_info("no URI\n");
  370. cce = "HS: URI missing";
  371. goto bail3;
  372. }
  373. if (!p) {
  374. p = lws_hdr_simple_ptr(wsi, WSI_TOKEN_HTTP1_0);
  375. wsi->u.http.connection_type = HTTP_CONNECTION_CLOSE;
  376. }
  377. if (!p) {
  378. cce = "HS: URI missing";
  379. lwsl_info("no URI\n");
  380. goto bail3;
  381. }
  382. n = atoi(p);
  383. if (n == 301 || n == 302 || n == 303 || n == 307 || n == 308) {
  384. p = lws_hdr_simple_ptr(wsi, WSI_TOKEN_HTTP_LOCATION);
  385. if (!p) {
  386. cce = "HS: Redirect code but no Location";
  387. goto bail3;
  388. }
  389. if (lws_parse_uri(p, &prot, &ads, &port, &path)) {
  390. cce = "HS: URI did not parse";
  391. goto bail3;
  392. }
  393. if (!strcmp(prot, "wss://") || !strcmp(prot, "https://"))
  394. ssl = 1;
  395. if (lws_client_reset(wsi, ssl, ads, port, path, ads)) {
  396. lwsl_err("Redirect failed\n");
  397. cce = "HS: Redirect failed";
  398. goto bail3;
  399. }
  400. return 0;
  401. }
  402. if (!wsi->do_ws) {
  403. if (n != 200) {
  404. lwsl_notice("Connection failed with code %d", n);
  405. cce = "HS: Server did not return 200";
  406. goto bail2;
  407. }
  408. #ifdef LWS_WITH_HTTP_PROXY
  409. wsi->perform_rewrite = 0;
  410. if (lws_hdr_total_length(wsi, WSI_TOKEN_HTTP_CONTENT_TYPE)) {
  411. if (!strncmp(lws_hdr_simple_ptr(wsi, WSI_TOKEN_HTTP_CONTENT_TYPE),
  412. "text/html", 9))
  413. wsi->perform_rewrite = 1;
  414. }
  415. #endif
  416. /* allocate the per-connection user memory (if any) */
  417. if (lws_ensure_user_space(wsi)) {
  418. lwsl_err("Problem allocating wsi user mem\n");
  419. cce = "HS: OOM";
  420. goto bail2;
  421. }
  422. /* he may choose to send us stuff in chunked transfer-coding */
  423. wsi->chunked = 0;
  424. wsi->chunk_remaining = 0; /* ie, next thing is chunk size */
  425. if (lws_hdr_total_length(wsi, WSI_TOKEN_HTTP_TRANSFER_ENCODING)) {
  426. wsi->chunked = !strcmp(lws_hdr_simple_ptr(wsi,
  427. WSI_TOKEN_HTTP_TRANSFER_ENCODING),
  428. "chunked");
  429. /* first thing is hex, after payload there is crlf */
  430. wsi->chunk_parser = ELCP_HEX;
  431. }
  432. if (lws_hdr_total_length(wsi, WSI_TOKEN_HTTP_CONTENT_LENGTH)) {
  433. wsi->u.http.content_length =
  434. atoi(lws_hdr_simple_ptr(wsi,
  435. WSI_TOKEN_HTTP_CONTENT_LENGTH));
  436. lwsl_notice("%s: incoming content length %d\n", __func__,
  437. wsi->u.http.content_length);
  438. wsi->u.http.content_remain = wsi->u.http.content_length;
  439. } else /* can't do 1.1 without a content length or chunked */
  440. if (!wsi->chunked)
  441. wsi->u.http.connection_type = HTTP_CONNECTION_CLOSE;
  442. /*
  443. * we seem to be good to go, give client last chance to check
  444. * headers and OK it
  445. */
  446. if (wsi->protocol->callback(wsi, LWS_CALLBACK_CLIENT_FILTER_PRE_ESTABLISH,
  447. wsi->user_space, NULL, 0)) {
  448. cce = "HS: disallowed by client filter";
  449. goto bail2;
  450. }
  451. /* clear his proxy connection timeout */
  452. lws_set_timeout(wsi, NO_PENDING_TIMEOUT, 0);
  453. wsi->rxflow_change_to = LWS_RXFLOW_ALLOW;
  454. /* call him back to inform him he is up */
  455. if (wsi->protocol->callback(wsi,
  456. LWS_CALLBACK_ESTABLISHED_CLIENT_HTTP,
  457. wsi->user_space, NULL, 0)) {
  458. cce = "HS: disallowed at ESTABLISHED";
  459. goto bail3;
  460. }
  461. /* free up his parsing allocations */
  462. lws_header_table_detach(wsi, 0);
  463. lwsl_notice("%s: client connection up\n", __func__);
  464. return 0;
  465. }
  466. if (lws_hdr_total_length(wsi, WSI_TOKEN_ACCEPT) == 0) {
  467. lwsl_info("no ACCEPT\n");
  468. cce = "HS: ACCEPT missing";
  469. goto bail3;
  470. }
  471. if (p && strncmp(p, "101", 3)) {
  472. lwsl_warn(
  473. "lws_client_handshake: got bad HTTP response '%s'\n", p);
  474. cce = "HS: ws upgrade response not 101";
  475. goto bail3;
  476. }
  477. p = lws_hdr_simple_ptr(wsi, WSI_TOKEN_UPGRADE);
  478. if (!p) {
  479. lwsl_info("no UPGRADE\n");
  480. cce = "HS: UPGRADE missing";
  481. goto bail3;
  482. }
  483. strtolower(p);
  484. if (strcmp(p, "websocket")) {
  485. lwsl_warn(
  486. "lws_client_handshake: got bad Upgrade header '%s'\n", p);
  487. cce = "HS: Upgrade to something other than websocket";
  488. goto bail3;
  489. }
  490. p = lws_hdr_simple_ptr(wsi, WSI_TOKEN_CONNECTION);
  491. if (!p) {
  492. lwsl_info("no Connection hdr\n");
  493. cce = "HS: CONNECTION missing";
  494. goto bail3;
  495. }
  496. strtolower(p);
  497. if (strcmp(p, "upgrade")) {
  498. lwsl_warn("lws_client_int_s_hs: bad header %s\n", p);
  499. cce = "HS: UPGRADE malformed";
  500. goto bail3;
  501. }
  502. pc = lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_SENT_PROTOCOLS);
  503. if (!pc) {
  504. lwsl_parser("lws_client_int_s_hs: no protocol list\n");
  505. } else
  506. lwsl_parser("lws_client_int_s_hs: protocol list '%s'\n", pc);
  507. /*
  508. * confirm the protocol the server wants to talk was in the list
  509. * of protocols we offered
  510. */
  511. len = lws_hdr_total_length(wsi, WSI_TOKEN_PROTOCOL);
  512. if (!len) {
  513. lwsl_info("lws_client_int_s_hs: WSI_TOKEN_PROTOCOL is null\n");
  514. /*
  515. * no protocol name to work from,
  516. * default to first protocol
  517. */
  518. wsi->protocol = &wsi->vhost->protocols[0];
  519. goto check_extensions;
  520. }
  521. p = lws_hdr_simple_ptr(wsi, WSI_TOKEN_PROTOCOL);
  522. len = strlen(p);
  523. while (pc && *pc && !okay) {
  524. if (!strncmp(pc, p, len) &&
  525. (pc[len] == ',' || pc[len] == '\0')) {
  526. okay = 1;
  527. continue;
  528. }
  529. while (*pc && *pc++ != ',')
  530. ;
  531. while (*pc && *pc == ' ')
  532. pc++;
  533. }
  534. if (!okay) {
  535. lwsl_err("lws_client_int_s_hs: got bad protocol %s\n", p);
  536. cce = "HS: PROTOCOL malformed";
  537. goto bail2;
  538. }
  539. /*
  540. * identify the selected protocol struct and set it
  541. */
  542. n = 0;
  543. wsi->protocol = NULL;
  544. while (wsi->vhost->protocols[n].callback && !wsi->protocol) {
  545. if (strcmp(p, wsi->vhost->protocols[n].name) == 0) {
  546. wsi->protocol = &wsi->vhost->protocols[n];
  547. break;
  548. }
  549. n++;
  550. }
  551. if (wsi->protocol == NULL) {
  552. lwsl_err("lws_client_int_s_hs: fail protocol %s\n", p);
  553. cce = "HS: Cannot match protocol";
  554. goto bail2;
  555. }
  556. /*
  557. * stitch protocol choice into the vh protocol linked list
  558. * We always insert ourselves at the start of the list
  559. *
  560. * X <-> B
  561. * X <-> pAn <-> pB
  562. */
  563. //lwsl_err("%s: pre insert vhost start wsi %p, that wsi prev == %p\n",
  564. // __func__,
  565. // wsi->vhost->same_vh_protocol_list[n],
  566. // wsi->same_vh_protocol_prev);
  567. wsi->same_vh_protocol_prev = /* guy who points to us */
  568. &wsi->vhost->same_vh_protocol_list[n];
  569. wsi->same_vh_protocol_next = /* old first guy is our next */
  570. wsi->vhost->same_vh_protocol_list[n];
  571. /* we become the new first guy */
  572. wsi->vhost->same_vh_protocol_list[n] = wsi;
  573. if (wsi->same_vh_protocol_next)
  574. /* old first guy points back to us now */
  575. wsi->same_vh_protocol_next->same_vh_protocol_prev =
  576. &wsi->same_vh_protocol_next;
  577. check_extensions:
  578. #ifndef LWS_NO_EXTENSIONS
  579. /* instantiate the accepted extensions */
  580. if (!lws_hdr_total_length(wsi, WSI_TOKEN_EXTENSIONS)) {
  581. lwsl_ext("no client extensions allowed by server\n");
  582. goto check_accept;
  583. }
  584. /*
  585. * break down the list of server accepted extensions
  586. * and go through matching them or identifying bogons
  587. */
  588. if (lws_hdr_copy(wsi, sb, context->pt_serv_buf_size, WSI_TOKEN_EXTENSIONS) < 0) {
  589. lwsl_warn("ext list from server failed to copy\n");
  590. cce = "HS: EXT: list too big";
  591. goto bail2;
  592. }
  593. c = sb;
  594. n = 0;
  595. ignore = 0;
  596. a = NULL;
  597. while (more) {
  598. if (*c && (*c != ',' && *c != '\t')) {
  599. if (*c == ';') {
  600. ignore = 1;
  601. if (!a)
  602. a = c + 1;
  603. }
  604. if (ignore || *c == ' ') {
  605. c++;
  606. continue;
  607. }
  608. ext_name[n] = *c++;
  609. if (n < sizeof(ext_name) - 1)
  610. n++;
  611. continue;
  612. }
  613. ext_name[n] = '\0';
  614. ignore = 0;
  615. if (!*c)
  616. more = 0;
  617. else {
  618. c++;
  619. if (!n)
  620. continue;
  621. }
  622. /* check we actually support it */
  623. lwsl_notice("checking client ext %s\n", ext_name);
  624. n = 0;
  625. ext = wsi->vhost->extensions;
  626. while (ext && ext->callback) {
  627. if (strcmp(ext_name, ext->name)) {
  628. ext++;
  629. continue;
  630. }
  631. n = 1;
  632. lwsl_notice("instantiating client ext %s\n", ext_name);
  633. /* instantiate the extension on this conn */
  634. wsi->active_extensions[wsi->count_act_ext] = ext;
  635. /* allow him to construct his ext instance */
  636. if (ext->callback(lws_get_context(wsi), ext, wsi,
  637. LWS_EXT_CB_CLIENT_CONSTRUCT,
  638. (void *)&wsi->act_ext_user[wsi->count_act_ext],
  639. (void *)&opts, 0)) {
  640. lwsl_notice(" ext %s failed construction\n", ext_name);
  641. ext++;
  642. continue;
  643. }
  644. /*
  645. * allow the user code to override ext defaults if it
  646. * wants to
  647. */
  648. ext_name[0] = '\0';
  649. if (user_callback_handle_rxflow(wsi->protocol->callback,
  650. wsi, LWS_CALLBACK_WS_EXT_DEFAULTS,
  651. (char *)ext->name, ext_name,
  652. sizeof(ext_name))) {
  653. cce = "HS: EXT: failed setting defaults";
  654. goto bail2;
  655. }
  656. if (ext_name[0] &&
  657. lws_ext_parse_options(ext, wsi, wsi->act_ext_user[
  658. wsi->count_act_ext], opts, ext_name,
  659. strlen(ext_name))) {
  660. lwsl_err("%s: unable to parse user defaults '%s'",
  661. __func__, ext_name);
  662. cce = "HS: EXT: failed parsing defaults";
  663. goto bail2;
  664. }
  665. /*
  666. * give the extension the server options
  667. */
  668. if (a && lws_ext_parse_options(ext, wsi,
  669. wsi->act_ext_user[wsi->count_act_ext],
  670. opts, a, c - a)) {
  671. lwsl_err("%s: unable to parse remote def '%s'",
  672. __func__, a);
  673. cce = "HS: EXT: failed parsing options";
  674. goto bail2;
  675. }
  676. if (ext->callback(lws_get_context(wsi), ext, wsi,
  677. LWS_EXT_CB_OPTION_CONFIRM,
  678. wsi->act_ext_user[wsi->count_act_ext],
  679. NULL, 0)) {
  680. lwsl_err("%s: ext %s rejects server options %s",
  681. ext->name, a);
  682. cce = "HS: EXT: Rejects server options";
  683. goto bail2;
  684. }
  685. wsi->count_act_ext++;
  686. ext++;
  687. }
  688. if (n == 0) {
  689. lwsl_warn("Unknown ext '%s'!\n", ext_name);
  690. cce = "HS: EXT: unknown ext";
  691. goto bail2;
  692. }
  693. a = NULL;
  694. n = 0;
  695. }
  696. check_accept:
  697. #endif
  698. /*
  699. * Confirm his accept token is the one we precomputed
  700. */
  701. p = lws_hdr_simple_ptr(wsi, WSI_TOKEN_ACCEPT);
  702. if (strcmp(p, wsi->u.hdr.ah->initial_handshake_hash_base64)) {
  703. lwsl_warn("lws_client_int_s_hs: accept '%s' wrong vs '%s'\n", p,
  704. wsi->u.hdr.ah->initial_handshake_hash_base64);
  705. cce = "HS: Accept hash wrong";
  706. goto bail2;
  707. }
  708. /* allocate the per-connection user memory (if any) */
  709. if (lws_ensure_user_space(wsi)) {
  710. lwsl_err("Problem allocating wsi user mem\n");
  711. cce = "HS: OOM";
  712. goto bail2;
  713. }
  714. /*
  715. * we seem to be good to go, give client last chance to check
  716. * headers and OK it
  717. */
  718. if (wsi->protocol->callback(wsi, LWS_CALLBACK_CLIENT_FILTER_PRE_ESTABLISH,
  719. wsi->user_space, NULL, 0)) {
  720. cce = "HS: Rejected by filter cb";
  721. goto bail2;
  722. }
  723. /* clear his proxy connection timeout */
  724. lws_set_timeout(wsi, NO_PENDING_TIMEOUT, 0);
  725. /* free up his parsing allocations */
  726. lws_header_table_detach(wsi, 0);
  727. lws_union_transition(wsi, LWSCM_WS_CLIENT);
  728. wsi->state = LWSS_ESTABLISHED;
  729. lws_restart_ws_ping_pong_timer(wsi);
  730. wsi->rxflow_change_to = LWS_RXFLOW_ALLOW;
  731. /*
  732. * create the frame buffer for this connection according to the
  733. * size mentioned in the protocol definition. If 0 there, then
  734. * use a big default for compatibility
  735. */
  736. n = wsi->protocol->rx_buffer_size;
  737. if (!n)
  738. n = context->pt_serv_buf_size;
  739. n += LWS_PRE;
  740. wsi->u.ws.rx_ubuf = lws_malloc(n + 4 /* 0x0000ffff zlib */);
  741. if (!wsi->u.ws.rx_ubuf) {
  742. lwsl_err("Out of Mem allocating rx buffer %d\n", n);
  743. cce = "HS: OOM";
  744. goto bail2;
  745. }
  746. wsi->u.ws.rx_ubuf_alloc = n;
  747. lwsl_info("Allocating client RX buffer %d\n", n);
  748. if (setsockopt(wsi->sock, SOL_SOCKET, SO_SNDBUF, (const char *)&n,
  749. sizeof n)) {
  750. lwsl_warn("Failed to set SNDBUF to %d", n);
  751. cce = "HS: SO_SNDBUF failed";
  752. goto bail3;
  753. }
  754. lwsl_debug("handshake OK for protocol %s\n", wsi->protocol->name);
  755. /* call him back to inform him he is up */
  756. if (wsi->protocol->callback(wsi, LWS_CALLBACK_CLIENT_ESTABLISHED,
  757. wsi->user_space, NULL, 0)) {
  758. cce = "HS: Rejected at CLIENT_ESTABLISHED";
  759. goto bail3;
  760. }
  761. #ifndef LWS_NO_EXTENSIONS
  762. /*
  763. * inform all extensions, not just active ones since they
  764. * already know
  765. */
  766. ext = wsi->vhost->extensions;
  767. while (ext && ext->callback) {
  768. v = NULL;
  769. for (n = 0; n < wsi->count_act_ext; n++)
  770. if (wsi->active_extensions[n] == ext)
  771. v = wsi->act_ext_user[n];
  772. ext->callback(context, ext, wsi,
  773. LWS_EXT_CB_ANY_WSI_ESTABLISHED, v, NULL, 0);
  774. ext++;
  775. }
  776. #endif
  777. return 0;
  778. bail3:
  779. close_reason = LWS_CLOSE_STATUS_NOSTATUS;
  780. bail2:
  781. if (wsi->protocol)
  782. wsi->protocol->callback(wsi, LWS_CALLBACK_CLIENT_CONNECTION_ERROR,
  783. wsi->user_space, (void *)cce,
  784. (unsigned int)strlen(cce));
  785. wsi->already_did_cce = 1;
  786. lwsl_info("closing connection due to bail2 connection error\n");
  787. /* closing will free up his parsing allocations */
  788. lws_close_free_wsi(wsi, close_reason);
  789. return 1;
  790. }
  791. char *
  792. lws_generate_client_handshake(struct lws *wsi, char *pkt)
  793. {
  794. char buf[128], hash[20], key_b64[40], *p = pkt;
  795. struct lws_context *context = wsi->context;
  796. const char *meth;
  797. int n;
  798. #ifndef LWS_NO_EXTENSIONS
  799. const struct lws_extension *ext;
  800. int ext_count = 0;
  801. #endif
  802. meth = lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_METHOD);
  803. if (!meth) {
  804. meth = "GET";
  805. wsi->do_ws = 1;
  806. } else
  807. wsi->do_ws = 0;
  808. if (wsi->do_ws) {
  809. /*
  810. * create the random key
  811. */
  812. n = lws_get_random(context, hash, 16);
  813. if (n != 16) {
  814. lwsl_err("Unable to read from random dev %s\n",
  815. SYSTEM_RANDOM_FILEPATH);
  816. lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS);
  817. return NULL;
  818. }
  819. lws_b64_encode_string(hash, 16, key_b64, sizeof(key_b64));
  820. }
  821. /*
  822. * 04 example client handshake
  823. *
  824. * GET /chat HTTP/1.1
  825. * Host: server.example.com
  826. * Upgrade: websocket
  827. * Connection: Upgrade
  828. * Sec-WebSocket-Key: dGhlIHNhbXBsZSBub25jZQ==
  829. * Sec-WebSocket-Origin: http://example.com
  830. * Sec-WebSocket-Protocol: chat, superchat
  831. * Sec-WebSocket-Version: 4
  832. */
  833. p += sprintf(p, "%s %s HTTP/1.1\x0d\x0a", meth,
  834. lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_URI));
  835. p += sprintf(p, "Pragma: no-cache\x0d\x0a"
  836. "Cache-Control: no-cache\x0d\x0a");
  837. p += sprintf(p, "Host: %s\x0d\x0a",
  838. lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_HOST));
  839. if (lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_ORIGIN))
  840. p += sprintf(p, "Origin: http://%s\x0d\x0a",
  841. lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_ORIGIN));
  842. if (wsi->do_ws) {
  843. p += sprintf(p, "Upgrade: websocket\x0d\x0a"
  844. "Connection: Upgrade\x0d\x0a"
  845. "Sec-WebSocket-Key: ");
  846. strcpy(p, key_b64);
  847. p += strlen(key_b64);
  848. p += sprintf(p, "\x0d\x0a");
  849. if (lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_SENT_PROTOCOLS))
  850. p += sprintf(p, "Sec-WebSocket-Protocol: %s\x0d\x0a",
  851. lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_SENT_PROTOCOLS));
  852. /* tell the server what extensions we could support */
  853. #ifndef LWS_NO_EXTENSIONS
  854. ext = wsi->vhost->extensions;
  855. while (ext && ext->callback) {
  856. n = lws_ext_cb_all_exts(context, wsi,
  857. LWS_EXT_CB_CHECK_OK_TO_PROPOSE_EXTENSION,
  858. (char *)ext->name, 0);
  859. if (n) { /* an extension vetos us */
  860. lwsl_ext("ext %s vetoed\n", (char *)ext->name);
  861. ext++;
  862. continue;
  863. }
  864. n = wsi->vhost->protocols[0].callback(wsi,
  865. LWS_CALLBACK_CLIENT_CONFIRM_EXTENSION_SUPPORTED,
  866. wsi->user_space, (char *)ext->name, 0);
  867. /*
  868. * zero return from callback means
  869. * go ahead and allow the extension,
  870. * it's what we get if the callback is
  871. * unhandled
  872. */
  873. if (n) {
  874. ext++;
  875. continue;
  876. }
  877. /* apply it */
  878. if (ext_count)
  879. *p++ = ',';
  880. else
  881. p += sprintf(p, "Sec-WebSocket-Extensions: ");
  882. p += sprintf(p, "%s", ext->client_offer);
  883. ext_count++;
  884. ext++;
  885. }
  886. if (ext_count)
  887. p += sprintf(p, "\x0d\x0a");
  888. #endif
  889. if (wsi->ietf_spec_revision)
  890. p += sprintf(p, "Sec-WebSocket-Version: %d\x0d\x0a",
  891. wsi->ietf_spec_revision);
  892. /* prepare the expected server accept response */
  893. key_b64[39] = '\0'; /* enforce composed length below buf sizeof */
  894. n = sprintf(buf, "%s258EAFA5-E914-47DA-95CA-C5AB0DC85B11", key_b64);
  895. lws_SHA1((unsigned char *)buf, n, (unsigned char *)hash);
  896. lws_b64_encode_string(hash, 20,
  897. wsi->u.hdr.ah->initial_handshake_hash_base64,
  898. sizeof(wsi->u.hdr.ah->initial_handshake_hash_base64));
  899. }
  900. /* give userland a chance to append, eg, cookies */
  901. wsi->vhost->protocols[0].callback(wsi, LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER,
  902. wsi->user_space, &p, (pkt + context->pt_serv_buf_size) - p - 12);
  903. p += sprintf(p, "\x0d\x0a");
  904. return p;
  905. }