parsers.c 38 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521
  1. /*
  2. * libwebsockets - small server side websockets and web server implementation
  3. *
  4. * Copyright (C) 2010-2013 Andy Green <andy@warmcat.com>
  5. *
  6. * This library is free software; you can redistribute it and/or
  7. * modify it under the terms of the GNU Lesser General Public
  8. * License as published by the Free Software Foundation:
  9. * version 2.1 of the License.
  10. *
  11. * This library is distributed in the hope that it will be useful,
  12. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  14. * Lesser General Public License for more details.
  15. *
  16. * You should have received a copy of the GNU Lesser General Public
  17. * License along with this library; if not, write to the Free Software
  18. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
  19. * MA 02110-1301 USA
  20. */
  21. #include "private-libwebsockets.h"
  22. const unsigned char lextable[] = {
  23. #include "lextable.h"
  24. };
  25. #define FAIL_CHAR 0x08
  26. int LWS_WARN_UNUSED_RESULT
  27. lextable_decode(int pos, char c)
  28. {
  29. if (c >= 'A' && c <= 'Z')
  30. c += 'a' - 'A';
  31. while (1) {
  32. if (lextable[pos] & (1 << 7)) { /* 1-byte, fail on mismatch */
  33. if ((lextable[pos] & 0x7f) != c)
  34. return -1;
  35. /* fall thru */
  36. pos++;
  37. if (lextable[pos] == FAIL_CHAR)
  38. return -1;
  39. return pos;
  40. }
  41. if (lextable[pos] == FAIL_CHAR)
  42. return -1;
  43. /* b7 = 0, end or 3-byte */
  44. if (lextable[pos] < FAIL_CHAR) /* terminal marker */
  45. return pos;
  46. if (lextable[pos] == c) /* goto */
  47. return pos + (lextable[pos + 1]) +
  48. (lextable[pos + 2] << 8);
  49. /* fall thru goto */
  50. pos += 3;
  51. /* continue */
  52. }
  53. }
  54. // doesn't scrub the ah rxbuffer by default, parent must do if needed
  55. void
  56. lws_header_table_reset(struct lws *wsi, int autoservice)
  57. {
  58. struct allocated_headers *ah = wsi->u.hdr.ah;
  59. struct lws_context_per_thread *pt;
  60. struct lws_pollfd *pfd;
  61. /* if we have the idea we're resetting 'our' ah, must be bound to one */
  62. assert(ah);
  63. /* ah also concurs with ownership */
  64. assert(ah->wsi == wsi);
  65. /* init the ah to reflect no headers or data have appeared yet */
  66. memset(ah->frag_index, 0, sizeof(ah->frag_index));
  67. ah->nfrag = 0;
  68. ah->pos = 0;
  69. /* since we will restart the ah, our new headers are not completed */
  70. // wsi->hdr_parsing_completed = 0;
  71. /*
  72. * if we inherited pending rx (from socket adoption deferred
  73. * processing), apply and free it.
  74. */
  75. if (wsi->u.hdr.preamble_rx) {
  76. memcpy(ah->rx, wsi->u.hdr.preamble_rx,
  77. wsi->u.hdr.preamble_rx_len);
  78. ah->rxlen = wsi->u.hdr.preamble_rx_len;
  79. lws_free_set_NULL(wsi->u.hdr.preamble_rx);
  80. if (autoservice) {
  81. lwsl_notice("%s: calling service on readbuf ah\n", __func__);
  82. pt = &wsi->context->pt[(int)wsi->tsi];
  83. /* unlike a normal connect, we have the headers already
  84. * (or the first part of them anyway)
  85. */
  86. pfd = &pt->fds[wsi->position_in_fds_table];
  87. pfd->revents |= LWS_POLLIN;
  88. lwsl_err("%s: calling service\n", __func__);
  89. lws_service_fd_tsi(wsi->context, pfd, wsi->tsi);
  90. }
  91. }
  92. }
  93. int LWS_WARN_UNUSED_RESULT
  94. lws_header_table_attach(struct lws *wsi, int autoservice)
  95. {
  96. struct lws_context *context = wsi->context;
  97. struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
  98. struct lws_pollargs pa;
  99. struct lws **pwsi;
  100. int n;
  101. lwsl_info("%s: wsi %p: ah %p (tsi %d, count = %d) in\n", __func__, (void *)wsi,
  102. (void *)wsi->u.hdr.ah, wsi->tsi, pt->ah_count_in_use);
  103. /* if we are already bound to one, just clear it down */
  104. if (wsi->u.hdr.ah) {
  105. lwsl_info("cleardown\n");
  106. goto reset;
  107. }
  108. lws_pt_lock(pt);
  109. pwsi = &pt->ah_wait_list;
  110. while (*pwsi) {
  111. if (*pwsi == wsi) {
  112. /* if already waiting on list, if no new ah just ret */
  113. if (pt->ah_count_in_use ==
  114. context->max_http_header_pool) {
  115. lwsl_notice("%s: no free ah to attach\n", __func__);
  116. goto bail;
  117. }
  118. /* new ah.... remove ourselves from waiting list */
  119. *pwsi = wsi->u.hdr.ah_wait_list; /* set our prev to our next */
  120. wsi->u.hdr.ah_wait_list = NULL; /* no next any more */
  121. pt->ah_wait_list_length--;
  122. break;
  123. }
  124. pwsi = &(*pwsi)->u.hdr.ah_wait_list;
  125. }
  126. /*
  127. * pool is all busy... add us to waiting list and return that we
  128. * weren't able to deliver it right now
  129. */
  130. if (pt->ah_count_in_use == context->max_http_header_pool) {
  131. lwsl_notice("%s: adding %p to ah waiting list\n", __func__, wsi);
  132. wsi->u.hdr.ah_wait_list = pt->ah_wait_list;
  133. pt->ah_wait_list = wsi;
  134. pt->ah_wait_list_length++;
  135. /* we cannot accept input then */
  136. _lws_change_pollfd(wsi, LWS_POLLIN, 0, &pa);
  137. goto bail;
  138. }
  139. for (n = 0; n < context->max_http_header_pool; n++)
  140. if (!pt->ah_pool[n].in_use)
  141. break;
  142. /* if the count of in use said something free... */
  143. assert(n != context->max_http_header_pool);
  144. wsi->u.hdr.ah = &pt->ah_pool[n];
  145. wsi->u.hdr.ah->in_use = 1;
  146. pt->ah_pool[n].wsi = wsi; /* mark our owner */
  147. pt->ah_count_in_use++;
  148. _lws_change_pollfd(wsi, 0, LWS_POLLIN, &pa);
  149. lwsl_info("%s: wsi %p: ah %p: count %d (on exit)\n", __func__,
  150. (void *)wsi, (void *)wsi->u.hdr.ah, pt->ah_count_in_use);
  151. lws_pt_unlock(pt);
  152. reset:
  153. /* and reset the rx state */
  154. wsi->u.hdr.ah->rxpos = 0;
  155. wsi->u.hdr.ah->rxlen = 0;
  156. lws_header_table_reset(wsi, autoservice);
  157. time(&wsi->u.hdr.ah->assigned);
  158. #ifndef LWS_NO_CLIENT
  159. if (wsi->state == LWSS_CLIENT_UNCONNECTED)
  160. if (!lws_client_connect_via_info2(wsi))
  161. /* our client connect has failed, the wsi
  162. * has been closed
  163. */
  164. return -1;
  165. #endif
  166. return 0;
  167. bail:
  168. lws_pt_unlock(pt);
  169. return 1;
  170. }
  171. int lws_header_table_detach(struct lws *wsi, int autoservice)
  172. {
  173. struct lws_context *context = wsi->context;
  174. struct allocated_headers *ah = wsi->u.hdr.ah;
  175. struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
  176. struct lws_pollargs pa;
  177. struct lws **pwsi;
  178. time_t now;
  179. lwsl_info("%s: wsi %p: ah %p (tsi=%d, count = %d)\n", __func__,
  180. (void *)wsi, (void *)ah, wsi->tsi,
  181. pt->ah_count_in_use);
  182. if (wsi->u.hdr.preamble_rx)
  183. lws_free_set_NULL(wsi->u.hdr.preamble_rx);
  184. /* may not be detached while he still has unprocessed rx */
  185. if (ah && ah->rxpos != ah->rxlen) {
  186. lwsl_err("%s: %p: CANNOT DETACH rxpos:%d, rxlen:%d\n", __func__, wsi,
  187. ah->rxpos, ah->rxlen);
  188. assert(ah->rxpos == ah->rxlen);
  189. return 0;
  190. }
  191. lws_pt_lock(pt);
  192. pwsi = &pt->ah_wait_list;
  193. if (!ah) { /* remove from wait list if none attached */
  194. while (*pwsi) {
  195. if (*pwsi == wsi) {
  196. lwsl_info("%s: wsi %p, remv wait\n",
  197. __func__, wsi);
  198. *pwsi = wsi->u.hdr.ah_wait_list;
  199. wsi->u.hdr.ah_wait_list = NULL;
  200. pt->ah_wait_list_length--;
  201. goto bail;
  202. }
  203. pwsi = &(*pwsi)->u.hdr.ah_wait_list;
  204. }
  205. /* no ah, not on list... no more business here */
  206. goto bail;
  207. }
  208. /* we did have an ah attached */
  209. time(&now);
  210. if (ah->assigned && now - ah->assigned > 3) {
  211. /*
  212. * we're detaching the ah, but it was held an
  213. * unreasonably long time
  214. */
  215. lwsl_notice("%s: wsi %p: ah held %ds, "
  216. "ah.rxpos %d, ah.rxlen %d, mode/state %d %d,"
  217. "wsi->more_rx_waiting %d\n", __func__, wsi,
  218. (int)(now - ah->assigned),
  219. ah->rxpos, ah->rxlen, wsi->mode, wsi->state,
  220. wsi->more_rx_waiting);
  221. }
  222. ah->assigned = 0;
  223. /* if we think we're detaching one, there should be one in use */
  224. assert(pt->ah_count_in_use > 0);
  225. /* and this specific one should have been in use */
  226. assert(ah->in_use);
  227. wsi->u.hdr.ah = NULL;
  228. ah->wsi = NULL; /* no owner */
  229. /* oh there is nobody on the waiting list... leave it at that then */
  230. if (!*pwsi) {
  231. ah->in_use = 0;
  232. pt->ah_count_in_use--;
  233. goto bail;
  234. }
  235. /* somebody else on same tsi is waiting, give it to oldest guy */
  236. lwsl_info("pt wait list %p\n", *pwsi);
  237. while ((*pwsi)->u.hdr.ah_wait_list)
  238. pwsi = &(*pwsi)->u.hdr.ah_wait_list;
  239. wsi = *pwsi;
  240. lwsl_info("last wsi in wait list %p\n", wsi);
  241. wsi->u.hdr.ah = ah;
  242. ah->wsi = wsi; /* new owner */
  243. /* and reset the rx state */
  244. ah->rxpos = 0;
  245. ah->rxlen = 0;
  246. lws_header_table_reset(wsi, autoservice);
  247. time(&wsi->u.hdr.ah->assigned);
  248. /* clients acquire the ah and then insert themselves in fds table... */
  249. if (wsi->position_in_fds_table != -1) {
  250. lwsl_info("%s: Enabling %p POLLIN\n", __func__, wsi);
  251. /* he has been stuck waiting for an ah, but now his wait is over,
  252. * let him progress
  253. */
  254. _lws_change_pollfd(wsi, 0, LWS_POLLIN, &pa);
  255. }
  256. /* point prev guy to next guy in list instead */
  257. *pwsi = wsi->u.hdr.ah_wait_list;
  258. /* the guy who got one is out of the list */
  259. wsi->u.hdr.ah_wait_list = NULL;
  260. pt->ah_wait_list_length--;
  261. #ifndef LWS_NO_CLIENT
  262. if (wsi->state == LWSS_CLIENT_UNCONNECTED)
  263. if (!lws_client_connect_via_info2(wsi)) {
  264. /* our client connect has failed, the wsi
  265. * has been closed
  266. */
  267. lws_pt_unlock(pt);
  268. return -1;
  269. }
  270. #endif
  271. assert(!!pt->ah_wait_list_length == !!(int)(long)pt->ah_wait_list);
  272. bail:
  273. lwsl_info("%s: wsi %p: ah %p (tsi=%d, count = %d)\n", __func__,
  274. (void *)wsi, (void *)ah, wsi->tsi,
  275. pt->ah_count_in_use);
  276. lws_pt_unlock(pt);
  277. return 0;
  278. }
  279. LWS_VISIBLE int
  280. lws_hdr_fragment_length(struct lws *wsi, enum lws_token_indexes h, int frag_idx)
  281. {
  282. int n;
  283. n = wsi->u.hdr.ah->frag_index[h];
  284. if (!n)
  285. return 0;
  286. do {
  287. if (!frag_idx)
  288. return wsi->u.hdr.ah->frags[n].len;
  289. n = wsi->u.hdr.ah->frags[n].nfrag;
  290. } while (frag_idx-- && n);
  291. return 0;
  292. }
  293. LWS_VISIBLE int lws_hdr_total_length(struct lws *wsi, enum lws_token_indexes h)
  294. {
  295. int n;
  296. int len = 0;
  297. n = wsi->u.hdr.ah->frag_index[h];
  298. if (!n)
  299. return 0;
  300. do {
  301. len += wsi->u.hdr.ah->frags[n].len;
  302. n = wsi->u.hdr.ah->frags[n].nfrag;
  303. } while (n);
  304. return len;
  305. }
  306. LWS_VISIBLE int lws_hdr_copy_fragment(struct lws *wsi, char *dst, int len,
  307. enum lws_token_indexes h, int frag_idx)
  308. {
  309. int n = 0;
  310. int f = wsi->u.hdr.ah->frag_index[h];
  311. if (!f)
  312. return -1;
  313. while (n < frag_idx) {
  314. f = wsi->u.hdr.ah->frags[f].nfrag;
  315. if (!f)
  316. return -1;
  317. n++;
  318. }
  319. if (wsi->u.hdr.ah->frags[f].len >= len)
  320. return -1;
  321. memcpy(dst, wsi->u.hdr.ah->data + wsi->u.hdr.ah->frags[f].offset,
  322. wsi->u.hdr.ah->frags[f].len);
  323. dst[wsi->u.hdr.ah->frags[f].len] = '\0';
  324. return wsi->u.hdr.ah->frags[f].len;
  325. }
  326. LWS_VISIBLE int lws_hdr_copy(struct lws *wsi, char *dst, int len,
  327. enum lws_token_indexes h)
  328. {
  329. int toklen = lws_hdr_total_length(wsi, h);
  330. int n;
  331. if (toklen >= len)
  332. return -1;
  333. n = wsi->u.hdr.ah->frag_index[h];
  334. if (!n)
  335. return 0;
  336. do {
  337. strcpy(dst, &wsi->u.hdr.ah->data[wsi->u.hdr.ah->frags[n].offset]);
  338. dst += wsi->u.hdr.ah->frags[n].len;
  339. n = wsi->u.hdr.ah->frags[n].nfrag;
  340. } while (n);
  341. return toklen;
  342. }
  343. char *lws_hdr_simple_ptr(struct lws *wsi, enum lws_token_indexes h)
  344. {
  345. int n;
  346. n = wsi->u.hdr.ah->frag_index[h];
  347. if (!n)
  348. return NULL;
  349. return wsi->u.hdr.ah->data + wsi->u.hdr.ah->frags[n].offset;
  350. }
  351. int LWS_WARN_UNUSED_RESULT
  352. lws_pos_in_bounds(struct lws *wsi)
  353. {
  354. if (wsi->u.hdr.ah->pos < (unsigned int)wsi->context->max_http_header_data)
  355. return 0;
  356. if (wsi->u.hdr.ah->pos == wsi->context->max_http_header_data) {
  357. lwsl_err("Ran out of header data space\n");
  358. return 1;
  359. }
  360. /*
  361. * with these tests everywhere, it should never be able to exceed
  362. * the limit, only meet the limit
  363. */
  364. lwsl_err("%s: pos %d, limit %d\n", __func__, wsi->u.hdr.ah->pos,
  365. wsi->context->max_http_header_data);
  366. assert(0);
  367. return 1;
  368. }
  369. int LWS_WARN_UNUSED_RESULT
  370. lws_hdr_simple_create(struct lws *wsi, enum lws_token_indexes h, const char *s)
  371. {
  372. wsi->u.hdr.ah->nfrag++;
  373. if (wsi->u.hdr.ah->nfrag == ARRAY_SIZE(wsi->u.hdr.ah->frags)) {
  374. lwsl_warn("More hdr frags than we can deal with, dropping\n");
  375. return -1;
  376. }
  377. wsi->u.hdr.ah->frag_index[h] = wsi->u.hdr.ah->nfrag;
  378. wsi->u.hdr.ah->frags[wsi->u.hdr.ah->nfrag].offset = wsi->u.hdr.ah->pos;
  379. wsi->u.hdr.ah->frags[wsi->u.hdr.ah->nfrag].len = 0;
  380. wsi->u.hdr.ah->frags[wsi->u.hdr.ah->nfrag].nfrag = 0;
  381. do {
  382. if (lws_pos_in_bounds(wsi))
  383. return -1;
  384. wsi->u.hdr.ah->data[wsi->u.hdr.ah->pos++] = *s;
  385. if (*s)
  386. wsi->u.hdr.ah->frags[wsi->u.hdr.ah->nfrag].len++;
  387. } while (*s++);
  388. return 0;
  389. }
  390. signed char char_to_hex(const char c)
  391. {
  392. if (c >= '0' && c <= '9')
  393. return c - '0';
  394. if (c >= 'a' && c <= 'f')
  395. return c - 'a' + 10;
  396. if (c >= 'A' && c <= 'F')
  397. return c - 'A' + 10;
  398. return -1;
  399. }
  400. static int LWS_WARN_UNUSED_RESULT
  401. issue_char(struct lws *wsi, unsigned char c)
  402. {
  403. unsigned short frag_len;
  404. if (lws_pos_in_bounds(wsi))
  405. return -1;
  406. frag_len = wsi->u.hdr.ah->frags[wsi->u.hdr.ah->nfrag].len;
  407. /*
  408. * If we haven't hit the token limit, just copy the character into
  409. * the header
  410. */
  411. if (frag_len < wsi->u.hdr.current_token_limit) {
  412. wsi->u.hdr.ah->data[wsi->u.hdr.ah->pos++] = c;
  413. if (c)
  414. wsi->u.hdr.ah->frags[wsi->u.hdr.ah->nfrag].len++;
  415. return 0;
  416. }
  417. /* Insert a null character when we *hit* the limit: */
  418. if (frag_len == wsi->u.hdr.current_token_limit) {
  419. if (lws_pos_in_bounds(wsi))
  420. return -1;
  421. wsi->u.hdr.ah->data[wsi->u.hdr.ah->pos++] = '\0';
  422. lwsl_warn("header %i exceeds limit %d\n",
  423. wsi->u.hdr.parser_state,
  424. wsi->u.hdr.current_token_limit);
  425. }
  426. return 1;
  427. }
  428. int LWS_WARN_UNUSED_RESULT
  429. lws_parse(struct lws *wsi, unsigned char c)
  430. {
  431. static const unsigned char methods[] = {
  432. WSI_TOKEN_GET_URI,
  433. WSI_TOKEN_POST_URI,
  434. WSI_TOKEN_OPTIONS_URI,
  435. WSI_TOKEN_PUT_URI,
  436. WSI_TOKEN_PATCH_URI,
  437. WSI_TOKEN_DELETE_URI,
  438. };
  439. struct allocated_headers *ah = wsi->u.hdr.ah;
  440. struct lws_context *context = wsi->context;
  441. unsigned int n, m, enc = 0;
  442. assert(wsi->u.hdr.ah);
  443. switch (wsi->u.hdr.parser_state) {
  444. default:
  445. lwsl_parser("WSI_TOK_(%d) '%c'\n", wsi->u.hdr.parser_state, c);
  446. /* collect into malloc'd buffers */
  447. /* optional initial space swallow */
  448. if (!ah->frags[ah->frag_index[wsi->u.hdr.parser_state]].len &&
  449. c == ' ')
  450. break;
  451. for (m = 0; m < ARRAY_SIZE(methods); m++)
  452. if (wsi->u.hdr.parser_state == methods[m])
  453. break;
  454. if (m == ARRAY_SIZE(methods))
  455. /* it was not any of the methods */
  456. goto check_eol;
  457. /* special URI processing... end at space */
  458. if (c == ' ') {
  459. /* enforce starting with / */
  460. if (!ah->frags[ah->nfrag].len)
  461. if (issue_char(wsi, '/') < 0)
  462. return -1;
  463. if (wsi->u.hdr.ups == URIPS_SEEN_SLASH_DOT_DOT) {
  464. /*
  465. * back up one dir level if possible
  466. * safe against header fragmentation because
  467. * the method URI can only be in 1 fragment
  468. */
  469. if (ah->frags[ah->nfrag].len > 2) {
  470. ah->pos--;
  471. ah->frags[ah->nfrag].len--;
  472. do {
  473. ah->pos--;
  474. ah->frags[ah->nfrag].len--;
  475. } while (ah->frags[ah->nfrag].len > 1 &&
  476. ah->data[ah->pos] != '/');
  477. }
  478. }
  479. /* begin parsing HTTP version: */
  480. if (issue_char(wsi, '\0') < 0)
  481. return -1;
  482. wsi->u.hdr.parser_state = WSI_TOKEN_HTTP;
  483. goto start_fragment;
  484. }
  485. /*
  486. * PRIORITY 1
  487. * special URI processing... convert %xx
  488. */
  489. switch (wsi->u.hdr.ues) {
  490. case URIES_IDLE:
  491. if (c == '%') {
  492. wsi->u.hdr.ues = URIES_SEEN_PERCENT;
  493. goto swallow;
  494. }
  495. break;
  496. case URIES_SEEN_PERCENT:
  497. if (char_to_hex(c) < 0)
  498. /* illegal post-% char */
  499. goto forbid;
  500. wsi->u.hdr.esc_stash = c;
  501. wsi->u.hdr.ues = URIES_SEEN_PERCENT_H1;
  502. goto swallow;
  503. case URIES_SEEN_PERCENT_H1:
  504. if (char_to_hex(c) < 0)
  505. /* illegal post-% char */
  506. goto forbid;
  507. c = (char_to_hex(wsi->u.hdr.esc_stash) << 4) |
  508. char_to_hex(c);
  509. enc = 1;
  510. wsi->u.hdr.ues = URIES_IDLE;
  511. break;
  512. }
  513. /*
  514. * PRIORITY 2
  515. * special URI processing...
  516. * convert /.. or /... or /../ etc to /
  517. * convert /./ to /
  518. * convert // or /// etc to /
  519. * leave /.dir or whatever alone
  520. */
  521. switch (wsi->u.hdr.ups) {
  522. case URIPS_IDLE:
  523. if (!c)
  524. return -1;
  525. /* genuine delimiter */
  526. if ((c == '&' || c == ';') && !enc) {
  527. if (issue_char(wsi, c) < 0)
  528. return -1;
  529. /* swallow the terminator */
  530. ah->frags[ah->nfrag].len--;
  531. /* link to next fragment */
  532. ah->frags[ah->nfrag].nfrag = ah->nfrag + 1;
  533. ah->nfrag++;
  534. if (ah->nfrag >= ARRAY_SIZE(ah->frags))
  535. goto excessive;
  536. /* start next fragment after the & */
  537. wsi->u.hdr.post_literal_equal = 0;
  538. ah->frags[ah->nfrag].offset = ah->pos;
  539. ah->frags[ah->nfrag].len = 0;
  540. ah->frags[ah->nfrag].nfrag = 0;
  541. goto swallow;
  542. }
  543. /* uriencoded = in the name part, disallow */
  544. if (c == '=' && enc &&
  545. ah->frag_index[WSI_TOKEN_HTTP_URI_ARGS] &&
  546. !wsi->u.hdr.post_literal_equal)
  547. c = '_';
  548. /* after the real =, we don't care how many = */
  549. if (c == '=' && !enc)
  550. wsi->u.hdr.post_literal_equal = 1;
  551. /* + to space */
  552. if (c == '+' && !enc)
  553. c = ' ';
  554. /* issue the first / always */
  555. if (c == '/' && !ah->frag_index[WSI_TOKEN_HTTP_URI_ARGS])
  556. wsi->u.hdr.ups = URIPS_SEEN_SLASH;
  557. break;
  558. case URIPS_SEEN_SLASH:
  559. /* swallow subsequent slashes */
  560. if (c == '/')
  561. goto swallow;
  562. /* track and swallow the first . after / */
  563. if (c == '.') {
  564. wsi->u.hdr.ups = URIPS_SEEN_SLASH_DOT;
  565. goto swallow;
  566. }
  567. wsi->u.hdr.ups = URIPS_IDLE;
  568. break;
  569. case URIPS_SEEN_SLASH_DOT:
  570. /* swallow second . */
  571. if (c == '.') {
  572. wsi->u.hdr.ups = URIPS_SEEN_SLASH_DOT_DOT;
  573. goto swallow;
  574. }
  575. /* change /./ to / */
  576. if (c == '/') {
  577. wsi->u.hdr.ups = URIPS_SEEN_SLASH;
  578. goto swallow;
  579. }
  580. /* it was like /.dir ... regurgitate the . */
  581. wsi->u.hdr.ups = URIPS_IDLE;
  582. if (issue_char(wsi, '.') < 0)
  583. return -1;
  584. break;
  585. case URIPS_SEEN_SLASH_DOT_DOT:
  586. /* /../ or /..[End of URI] --> backup to last / */
  587. if (c == '/' || c == '?') {
  588. /*
  589. * back up one dir level if possible
  590. * safe against header fragmentation because
  591. * the method URI can only be in 1 fragment
  592. */
  593. if (ah->frags[ah->nfrag].len > 2) {
  594. ah->pos--;
  595. ah->frags[ah->nfrag].len--;
  596. do {
  597. ah->pos--;
  598. ah->frags[ah->nfrag].len--;
  599. } while (ah->frags[ah->nfrag].len > 1 &&
  600. ah->data[ah->pos] != '/');
  601. }
  602. wsi->u.hdr.ups = URIPS_SEEN_SLASH;
  603. if (ah->frags[ah->nfrag].len > 1)
  604. break;
  605. goto swallow;
  606. }
  607. /* /..[^/] ... regurgitate and allow */
  608. if (issue_char(wsi, '.') < 0)
  609. return -1;
  610. if (issue_char(wsi, '.') < 0)
  611. return -1;
  612. wsi->u.hdr.ups = URIPS_IDLE;
  613. break;
  614. }
  615. if (c == '?' && !enc &&
  616. !ah->frag_index[WSI_TOKEN_HTTP_URI_ARGS]) { /* start of URI arguments */
  617. if (wsi->u.hdr.ues != URIES_IDLE)
  618. goto forbid;
  619. /* seal off uri header */
  620. if (issue_char(wsi, '\0') < 0)
  621. return -1;
  622. /* move to using WSI_TOKEN_HTTP_URI_ARGS */
  623. ah->nfrag++;
  624. if (ah->nfrag >= ARRAY_SIZE(ah->frags))
  625. goto excessive;
  626. ah->frags[ah->nfrag].offset = ah->pos;
  627. ah->frags[ah->nfrag].len = 0;
  628. ah->frags[ah->nfrag].nfrag = 0;
  629. wsi->u.hdr.post_literal_equal = 0;
  630. ah->frag_index[WSI_TOKEN_HTTP_URI_ARGS] = ah->nfrag;
  631. wsi->u.hdr.ups = URIPS_IDLE;
  632. goto swallow;
  633. }
  634. check_eol:
  635. /* bail at EOL */
  636. if (wsi->u.hdr.parser_state != WSI_TOKEN_CHALLENGE &&
  637. c == '\x0d') {
  638. if (wsi->u.hdr.ues != URIES_IDLE)
  639. goto forbid;
  640. c = '\0';
  641. wsi->u.hdr.parser_state = WSI_TOKEN_SKIPPING_SAW_CR;
  642. lwsl_parser("*\n");
  643. }
  644. n = issue_char(wsi, c);
  645. if ((int)n < 0)
  646. return -1;
  647. if (n > 0)
  648. wsi->u.hdr.parser_state = WSI_TOKEN_SKIPPING;
  649. swallow:
  650. /* per-protocol end of headers management */
  651. if (wsi->u.hdr.parser_state == WSI_TOKEN_CHALLENGE)
  652. goto set_parsing_complete;
  653. break;
  654. /* collecting and checking a name part */
  655. case WSI_TOKEN_NAME_PART:
  656. lwsl_parser("WSI_TOKEN_NAME_PART '%c' (mode=%d)\n", c, wsi->mode);
  657. wsi->u.hdr.lextable_pos =
  658. lextable_decode(wsi->u.hdr.lextable_pos, c);
  659. /*
  660. * Server needs to look out for unknown methods...
  661. */
  662. if (wsi->u.hdr.lextable_pos < 0 &&
  663. wsi->mode == LWSCM_HTTP_SERVING) {
  664. /* this is not a header we know about */
  665. for (m = 0; m < ARRAY_SIZE(methods); m++)
  666. if (ah->frag_index[methods[m]]) {
  667. /*
  668. * already had the method, no idea what
  669. * this crap from the client is, ignore
  670. */
  671. wsi->u.hdr.parser_state = WSI_TOKEN_SKIPPING;
  672. break;
  673. }
  674. /*
  675. * hm it's an unknown http method from a client in fact,
  676. * treat as dangerous
  677. */
  678. if (m == ARRAY_SIZE(methods)) {
  679. lwsl_info("Unknown method - dropping\n");
  680. goto forbid;
  681. }
  682. break;
  683. }
  684. /*
  685. * ...otherwise for a client, let him ignore unknown headers
  686. * coming from the server
  687. */
  688. if (wsi->u.hdr.lextable_pos < 0) {
  689. wsi->u.hdr.parser_state = WSI_TOKEN_SKIPPING;
  690. break;
  691. }
  692. if (lextable[wsi->u.hdr.lextable_pos] < FAIL_CHAR) {
  693. /* terminal state */
  694. n = ((unsigned int)lextable[wsi->u.hdr.lextable_pos] << 8) |
  695. lextable[wsi->u.hdr.lextable_pos + 1];
  696. lwsl_parser("known hdr %d\n", n);
  697. for (m = 0; m < ARRAY_SIZE(methods); m++)
  698. if (n == methods[m] &&
  699. ah->frag_index[methods[m]]) {
  700. lwsl_warn("Duplicated method\n");
  701. return -1;
  702. }
  703. /*
  704. * WSORIGIN is protocol equiv to ORIGIN,
  705. * JWebSocket likes to send it, map to ORIGIN
  706. */
  707. if (n == WSI_TOKEN_SWORIGIN)
  708. n = WSI_TOKEN_ORIGIN;
  709. wsi->u.hdr.parser_state = (enum lws_token_indexes)
  710. (WSI_TOKEN_GET_URI + n);
  711. if (context->token_limits)
  712. wsi->u.hdr.current_token_limit =
  713. context->token_limits->token_limit[
  714. wsi->u.hdr.parser_state];
  715. else
  716. wsi->u.hdr.current_token_limit =
  717. wsi->context->max_http_header_data;
  718. if (wsi->u.hdr.parser_state == WSI_TOKEN_CHALLENGE)
  719. goto set_parsing_complete;
  720. goto start_fragment;
  721. }
  722. break;
  723. start_fragment:
  724. ah->nfrag++;
  725. excessive:
  726. if (ah->nfrag == ARRAY_SIZE(ah->frags)) {
  727. lwsl_warn("More hdr frags than we can deal with\n");
  728. return -1;
  729. }
  730. ah->frags[ah->nfrag].offset = ah->pos;
  731. ah->frags[ah->nfrag].len = 0;
  732. ah->frags[ah->nfrag].nfrag = 0;
  733. n = ah->frag_index[wsi->u.hdr.parser_state];
  734. if (!n) { /* first fragment */
  735. ah->frag_index[wsi->u.hdr.parser_state] = ah->nfrag;
  736. break;
  737. }
  738. /* continuation */
  739. while (ah->frags[n].nfrag)
  740. n = ah->frags[n].nfrag;
  741. ah->frags[n].nfrag = ah->nfrag;
  742. if (issue_char(wsi, ' ') < 0)
  743. return -1;
  744. break;
  745. /* skipping arg part of a name we didn't recognize */
  746. case WSI_TOKEN_SKIPPING:
  747. lwsl_parser("WSI_TOKEN_SKIPPING '%c'\n", c);
  748. if (c == '\x0d')
  749. wsi->u.hdr.parser_state = WSI_TOKEN_SKIPPING_SAW_CR;
  750. break;
  751. case WSI_TOKEN_SKIPPING_SAW_CR:
  752. lwsl_parser("WSI_TOKEN_SKIPPING_SAW_CR '%c'\n", c);
  753. if (wsi->u.hdr.ues != URIES_IDLE)
  754. goto forbid;
  755. if (c == '\x0a') {
  756. wsi->u.hdr.parser_state = WSI_TOKEN_NAME_PART;
  757. wsi->u.hdr.lextable_pos = 0;
  758. } else
  759. wsi->u.hdr.parser_state = WSI_TOKEN_SKIPPING;
  760. break;
  761. /* we're done, ignore anything else */
  762. case WSI_PARSING_COMPLETE:
  763. lwsl_parser("WSI_PARSING_COMPLETE '%c'\n", c);
  764. break;
  765. }
  766. return 0;
  767. set_parsing_complete:
  768. if (wsi->u.hdr.ues != URIES_IDLE)
  769. goto forbid;
  770. if (lws_hdr_total_length(wsi, WSI_TOKEN_UPGRADE)) {
  771. if (lws_hdr_total_length(wsi, WSI_TOKEN_VERSION))
  772. wsi->ietf_spec_revision =
  773. atoi(lws_hdr_simple_ptr(wsi, WSI_TOKEN_VERSION));
  774. lwsl_parser("v%02d hdrs completed\n", wsi->ietf_spec_revision);
  775. }
  776. wsi->u.hdr.parser_state = WSI_PARSING_COMPLETE;
  777. wsi->hdr_parsing_completed = 1;
  778. return 0;
  779. forbid:
  780. lwsl_notice(" forbidding on uri sanitation\n");
  781. lws_return_http_status(wsi, HTTP_STATUS_FORBIDDEN, NULL);
  782. return -1;
  783. }
  784. LWS_VISIBLE int lws_frame_is_binary(struct lws *wsi)
  785. {
  786. return wsi->u.ws.frame_is_binary;
  787. }
  788. int
  789. lws_rx_sm(struct lws *wsi, unsigned char c)
  790. {
  791. struct lws_context_per_thread *pt = &wsi->context->pt[(int)wsi->tsi];
  792. int callback_action = LWS_CALLBACK_RECEIVE;
  793. int ret = 0, n, rx_draining_ext = 0;
  794. struct lws_tokens eff_buf;
  795. if (wsi->socket_is_permanently_unusable)
  796. return -1;
  797. switch (wsi->lws_rx_parse_state) {
  798. case LWS_RXPS_NEW:
  799. if (wsi->u.ws.rx_draining_ext) {
  800. struct lws **w = &pt->rx_draining_ext_list;
  801. eff_buf.token = NULL;
  802. eff_buf.token_len = 0;
  803. wsi->u.ws.rx_draining_ext = 0;
  804. /* remove us from context draining ext list */
  805. while (*w) {
  806. if (*w == wsi) {
  807. *w = wsi->u.ws.rx_draining_ext_list;
  808. break;
  809. }
  810. w = &((*w)->u.ws.rx_draining_ext_list);
  811. }
  812. wsi->u.ws.rx_draining_ext_list = NULL;
  813. rx_draining_ext = 1;
  814. lwsl_err("%s: doing draining flow\n", __func__);
  815. goto drain_extension;
  816. }
  817. switch (wsi->ietf_spec_revision) {
  818. case 13:
  819. /*
  820. * no prepended frame key any more
  821. */
  822. wsi->u.ws.all_zero_nonce = 1;
  823. goto handle_first;
  824. default:
  825. lwsl_warn("lws_rx_sm: unknown spec version %d\n",
  826. wsi->ietf_spec_revision);
  827. break;
  828. }
  829. break;
  830. case LWS_RXPS_04_mask_1:
  831. wsi->u.ws.mask[1] = c;
  832. if (c)
  833. wsi->u.ws.all_zero_nonce = 0;
  834. wsi->lws_rx_parse_state = LWS_RXPS_04_mask_2;
  835. break;
  836. case LWS_RXPS_04_mask_2:
  837. wsi->u.ws.mask[2] = c;
  838. if (c)
  839. wsi->u.ws.all_zero_nonce = 0;
  840. wsi->lws_rx_parse_state = LWS_RXPS_04_mask_3;
  841. break;
  842. case LWS_RXPS_04_mask_3:
  843. wsi->u.ws.mask[3] = c;
  844. if (c)
  845. wsi->u.ws.all_zero_nonce = 0;
  846. /*
  847. * start from the zero'th byte in the XOR key buffer since
  848. * this is the start of a frame with a new key
  849. */
  850. wsi->u.ws.mask_idx = 0;
  851. wsi->lws_rx_parse_state = LWS_RXPS_04_FRAME_HDR_1;
  852. break;
  853. /*
  854. * 04 logical framing from the spec (all this is masked when incoming
  855. * and has to be unmasked)
  856. *
  857. * We ignore the possibility of extension data because we don't
  858. * negotiate any extensions at the moment.
  859. *
  860. * 0 1 2 3
  861. * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
  862. * +-+-+-+-+-------+-+-------------+-------------------------------+
  863. * |F|R|R|R| opcode|R| Payload len | Extended payload length |
  864. * |I|S|S|S| (4) |S| (7) | (16/63) |
  865. * |N|V|V|V| |V| | (if payload len==126/127) |
  866. * | |1|2|3| |4| | |
  867. * +-+-+-+-+-------+-+-------------+ - - - - - - - - - - - - - - - +
  868. * | Extended payload length continued, if payload len == 127 |
  869. * + - - - - - - - - - - - - - - - +-------------------------------+
  870. * | | Extension data |
  871. * +-------------------------------+ - - - - - - - - - - - - - - - +
  872. * : :
  873. * +---------------------------------------------------------------+
  874. * : Application data :
  875. * +---------------------------------------------------------------+
  876. *
  877. * We pass payload through to userland as soon as we get it, ignoring
  878. * FIN. It's up to userland to buffer it up if it wants to see a
  879. * whole unfragmented block of the original size (which may be up to
  880. * 2^63 long!)
  881. */
  882. case LWS_RXPS_04_FRAME_HDR_1:
  883. handle_first:
  884. wsi->u.ws.opcode = c & 0xf;
  885. wsi->u.ws.rsv = c & 0x70;
  886. wsi->u.ws.final = !!((c >> 7) & 1);
  887. switch (wsi->u.ws.opcode) {
  888. case LWSWSOPC_TEXT_FRAME:
  889. case LWSWSOPC_BINARY_FRAME:
  890. wsi->u.ws.rsv_first_msg = (c & 0x70);
  891. wsi->u.ws.frame_is_binary =
  892. wsi->u.ws.opcode == LWSWSOPC_BINARY_FRAME;
  893. break;
  894. case 3:
  895. case 4:
  896. case 5:
  897. case 6:
  898. case 7:
  899. case 0xb:
  900. case 0xc:
  901. case 0xd:
  902. case 0xe:
  903. case 0xf:
  904. lwsl_info("illegal opcode\n");
  905. return -1;
  906. }
  907. wsi->lws_rx_parse_state = LWS_RXPS_04_FRAME_HDR_LEN;
  908. break;
  909. case LWS_RXPS_04_FRAME_HDR_LEN:
  910. wsi->u.ws.this_frame_masked = !!(c & 0x80);
  911. switch (c & 0x7f) {
  912. case 126:
  913. /* control frames are not allowed to have big lengths */
  914. if (wsi->u.ws.opcode & 8)
  915. goto illegal_ctl_length;
  916. wsi->lws_rx_parse_state = LWS_RXPS_04_FRAME_HDR_LEN16_2;
  917. break;
  918. case 127:
  919. /* control frames are not allowed to have big lengths */
  920. if (wsi->u.ws.opcode & 8)
  921. goto illegal_ctl_length;
  922. wsi->lws_rx_parse_state = LWS_RXPS_04_FRAME_HDR_LEN64_8;
  923. break;
  924. default:
  925. wsi->u.ws.rx_packet_length = c & 0x7f;
  926. if (wsi->u.ws.this_frame_masked)
  927. wsi->lws_rx_parse_state =
  928. LWS_RXPS_07_COLLECT_FRAME_KEY_1;
  929. else
  930. if (wsi->u.ws.rx_packet_length)
  931. wsi->lws_rx_parse_state =
  932. LWS_RXPS_PAYLOAD_UNTIL_LENGTH_EXHAUSTED;
  933. else {
  934. wsi->lws_rx_parse_state = LWS_RXPS_NEW;
  935. goto spill;
  936. }
  937. break;
  938. }
  939. break;
  940. case LWS_RXPS_04_FRAME_HDR_LEN16_2:
  941. wsi->u.ws.rx_packet_length = c << 8;
  942. wsi->lws_rx_parse_state = LWS_RXPS_04_FRAME_HDR_LEN16_1;
  943. break;
  944. case LWS_RXPS_04_FRAME_HDR_LEN16_1:
  945. wsi->u.ws.rx_packet_length |= c;
  946. if (wsi->u.ws.this_frame_masked)
  947. wsi->lws_rx_parse_state =
  948. LWS_RXPS_07_COLLECT_FRAME_KEY_1;
  949. else
  950. wsi->lws_rx_parse_state =
  951. LWS_RXPS_PAYLOAD_UNTIL_LENGTH_EXHAUSTED;
  952. break;
  953. case LWS_RXPS_04_FRAME_HDR_LEN64_8:
  954. if (c & 0x80) {
  955. lwsl_warn("b63 of length must be zero\n");
  956. /* kill the connection */
  957. return -1;
  958. }
  959. #if defined __LP64__
  960. wsi->u.ws.rx_packet_length = ((size_t)c) << 56;
  961. #else
  962. wsi->u.ws.rx_packet_length = 0;
  963. #endif
  964. wsi->lws_rx_parse_state = LWS_RXPS_04_FRAME_HDR_LEN64_7;
  965. break;
  966. case LWS_RXPS_04_FRAME_HDR_LEN64_7:
  967. #if defined __LP64__
  968. wsi->u.ws.rx_packet_length |= ((size_t)c) << 48;
  969. #endif
  970. wsi->lws_rx_parse_state = LWS_RXPS_04_FRAME_HDR_LEN64_6;
  971. break;
  972. case LWS_RXPS_04_FRAME_HDR_LEN64_6:
  973. #if defined __LP64__
  974. wsi->u.ws.rx_packet_length |= ((size_t)c) << 40;
  975. #endif
  976. wsi->lws_rx_parse_state = LWS_RXPS_04_FRAME_HDR_LEN64_5;
  977. break;
  978. case LWS_RXPS_04_FRAME_HDR_LEN64_5:
  979. #if defined __LP64__
  980. wsi->u.ws.rx_packet_length |= ((size_t)c) << 32;
  981. #endif
  982. wsi->lws_rx_parse_state = LWS_RXPS_04_FRAME_HDR_LEN64_4;
  983. break;
  984. case LWS_RXPS_04_FRAME_HDR_LEN64_4:
  985. wsi->u.ws.rx_packet_length |= ((size_t)c) << 24;
  986. wsi->lws_rx_parse_state = LWS_RXPS_04_FRAME_HDR_LEN64_3;
  987. break;
  988. case LWS_RXPS_04_FRAME_HDR_LEN64_3:
  989. wsi->u.ws.rx_packet_length |= ((size_t)c) << 16;
  990. wsi->lws_rx_parse_state = LWS_RXPS_04_FRAME_HDR_LEN64_2;
  991. break;
  992. case LWS_RXPS_04_FRAME_HDR_LEN64_2:
  993. wsi->u.ws.rx_packet_length |= ((size_t)c) << 8;
  994. wsi->lws_rx_parse_state = LWS_RXPS_04_FRAME_HDR_LEN64_1;
  995. break;
  996. case LWS_RXPS_04_FRAME_HDR_LEN64_1:
  997. wsi->u.ws.rx_packet_length |= ((size_t)c);
  998. if (wsi->u.ws.this_frame_masked)
  999. wsi->lws_rx_parse_state =
  1000. LWS_RXPS_07_COLLECT_FRAME_KEY_1;
  1001. else
  1002. wsi->lws_rx_parse_state =
  1003. LWS_RXPS_PAYLOAD_UNTIL_LENGTH_EXHAUSTED;
  1004. break;
  1005. case LWS_RXPS_07_COLLECT_FRAME_KEY_1:
  1006. wsi->u.ws.mask[0] = c;
  1007. if (c)
  1008. wsi->u.ws.all_zero_nonce = 0;
  1009. wsi->lws_rx_parse_state = LWS_RXPS_07_COLLECT_FRAME_KEY_2;
  1010. break;
  1011. case LWS_RXPS_07_COLLECT_FRAME_KEY_2:
  1012. wsi->u.ws.mask[1] = c;
  1013. if (c)
  1014. wsi->u.ws.all_zero_nonce = 0;
  1015. wsi->lws_rx_parse_state = LWS_RXPS_07_COLLECT_FRAME_KEY_3;
  1016. break;
  1017. case LWS_RXPS_07_COLLECT_FRAME_KEY_3:
  1018. wsi->u.ws.mask[2] = c;
  1019. if (c)
  1020. wsi->u.ws.all_zero_nonce = 0;
  1021. wsi->lws_rx_parse_state = LWS_RXPS_07_COLLECT_FRAME_KEY_4;
  1022. break;
  1023. case LWS_RXPS_07_COLLECT_FRAME_KEY_4:
  1024. wsi->u.ws.mask[3] = c;
  1025. if (c)
  1026. wsi->u.ws.all_zero_nonce = 0;
  1027. wsi->lws_rx_parse_state =
  1028. LWS_RXPS_PAYLOAD_UNTIL_LENGTH_EXHAUSTED;
  1029. wsi->u.ws.mask_idx = 0;
  1030. if (wsi->u.ws.rx_packet_length == 0) {
  1031. wsi->lws_rx_parse_state = LWS_RXPS_NEW;
  1032. goto spill;
  1033. }
  1034. break;
  1035. case LWS_RXPS_PAYLOAD_UNTIL_LENGTH_EXHAUSTED:
  1036. assert(wsi->u.ws.rx_ubuf);
  1037. if (wsi->u.ws.rx_ubuf_head + LWS_PRE >=
  1038. wsi->u.ws.rx_ubuf_alloc) {
  1039. lwsl_err("Attempted overflow \n");
  1040. return -1;
  1041. }
  1042. if (wsi->u.ws.all_zero_nonce)
  1043. wsi->u.ws.rx_ubuf[LWS_PRE +
  1044. (wsi->u.ws.rx_ubuf_head++)] = c;
  1045. else
  1046. wsi->u.ws.rx_ubuf[LWS_PRE +
  1047. (wsi->u.ws.rx_ubuf_head++)] =
  1048. c ^ wsi->u.ws.mask[
  1049. (wsi->u.ws.mask_idx++) & 3];
  1050. if (--wsi->u.ws.rx_packet_length == 0) {
  1051. /* spill because we have the whole frame */
  1052. wsi->lws_rx_parse_state = LWS_RXPS_NEW;
  1053. goto spill;
  1054. }
  1055. /*
  1056. * if there's no protocol max frame size given, we are
  1057. * supposed to default to context->pt_serv_buf_size
  1058. */
  1059. if (!wsi->protocol->rx_buffer_size &&
  1060. wsi->u.ws.rx_ubuf_head != wsi->context->pt_serv_buf_size)
  1061. break;
  1062. else
  1063. if (wsi->protocol->rx_buffer_size &&
  1064. wsi->u.ws.rx_ubuf_head !=
  1065. wsi->protocol->rx_buffer_size)
  1066. break;
  1067. /* spill because we filled our rx buffer */
  1068. spill:
  1069. /*
  1070. * is this frame a control packet we should take care of at this
  1071. * layer? If so service it and hide it from the user callback
  1072. */
  1073. lwsl_parser("spill on %s\n", wsi->protocol->name);
  1074. switch (wsi->u.ws.opcode) {
  1075. case LWSWSOPC_CLOSE:
  1076. /* is this an acknowledgement of our close? */
  1077. if (wsi->state == LWSS_AWAITING_CLOSE_ACK) {
  1078. /*
  1079. * fine he has told us he is closing too, let's
  1080. * finish our close
  1081. */
  1082. lwsl_parser("seen client close ack\n");
  1083. return -1;
  1084. }
  1085. if (wsi->state == LWSS_RETURNED_CLOSE_ALREADY)
  1086. /* if he sends us 2 CLOSE, kill him */
  1087. return -1;
  1088. if (lws_partial_buffered(wsi)) {
  1089. /*
  1090. * if we're in the middle of something,
  1091. * we can't do a normal close response and
  1092. * have to just close our end.
  1093. */
  1094. wsi->socket_is_permanently_unusable = 1;
  1095. lwsl_parser("Closing on peer close due to Pending tx\n");
  1096. return -1;
  1097. }
  1098. if (user_callback_handle_rxflow(
  1099. wsi->protocol->callback, wsi,
  1100. LWS_CALLBACK_WS_PEER_INITIATED_CLOSE,
  1101. wsi->user_space,
  1102. &wsi->u.ws.rx_ubuf[LWS_PRE],
  1103. wsi->u.ws.rx_ubuf_head))
  1104. return -1;
  1105. lwsl_parser("server sees client close packet\n");
  1106. wsi->state = LWSS_RETURNED_CLOSE_ALREADY;
  1107. /* deal with the close packet contents as a PONG */
  1108. wsi->u.ws.payload_is_close = 1;
  1109. goto process_as_ping;
  1110. case LWSWSOPC_PING:
  1111. lwsl_info("received %d byte ping, sending pong\n",
  1112. wsi->u.ws.rx_ubuf_head);
  1113. if (wsi->u.ws.ping_pending_flag) {
  1114. /*
  1115. * there is already a pending ping payload
  1116. * we should just log and drop
  1117. */
  1118. lwsl_parser("DROP PING since one pending\n");
  1119. goto ping_drop;
  1120. }
  1121. process_as_ping:
  1122. /* control packets can only be < 128 bytes long */
  1123. if (wsi->u.ws.rx_ubuf_head > 128 - 3) {
  1124. lwsl_parser("DROP PING payload too large\n");
  1125. goto ping_drop;
  1126. }
  1127. /* stash the pong payload */
  1128. memcpy(wsi->u.ws.ping_payload_buf + LWS_PRE,
  1129. &wsi->u.ws.rx_ubuf[LWS_PRE],
  1130. wsi->u.ws.rx_ubuf_head);
  1131. wsi->u.ws.ping_payload_len = wsi->u.ws.rx_ubuf_head;
  1132. wsi->u.ws.ping_pending_flag = 1;
  1133. /* get it sent as soon as possible */
  1134. lws_callback_on_writable(wsi);
  1135. ping_drop:
  1136. wsi->u.ws.rx_ubuf_head = 0;
  1137. return 0;
  1138. case LWSWSOPC_PONG:
  1139. lwsl_info("received pong\n");
  1140. lwsl_hexdump(&wsi->u.ws.rx_ubuf[LWS_PRE],
  1141. wsi->u.ws.rx_ubuf_head);
  1142. if (wsi->pending_timeout == PENDING_TIMEOUT_WS_PONG_CHECK_GET_PONG) {
  1143. lwsl_info("received expected PONG on wsi %p\n", wsi);
  1144. lws_set_timeout(wsi, NO_PENDING_TIMEOUT, 0);
  1145. }
  1146. /* issue it */
  1147. callback_action = LWS_CALLBACK_RECEIVE_PONG;
  1148. break;
  1149. case LWSWSOPC_TEXT_FRAME:
  1150. case LWSWSOPC_BINARY_FRAME:
  1151. case LWSWSOPC_CONTINUATION:
  1152. break;
  1153. default:
  1154. lwsl_parser("passing opc %x up to exts\n",
  1155. wsi->u.ws.opcode);
  1156. /*
  1157. * It's something special we can't understand here.
  1158. * Pass the payload up to the extension's parsing
  1159. * state machine.
  1160. */
  1161. eff_buf.token = &wsi->u.ws.rx_ubuf[LWS_PRE];
  1162. eff_buf.token_len = wsi->u.ws.rx_ubuf_head;
  1163. if (lws_ext_cb_active(wsi, LWS_EXT_CB_EXTENDED_PAYLOAD_RX,
  1164. &eff_buf, 0) <= 0)
  1165. /* not handle or fail */
  1166. lwsl_ext("ext opc opcode 0x%x unknown\n",
  1167. wsi->u.ws.opcode);
  1168. wsi->u.ws.rx_ubuf_head = 0;
  1169. return 0;
  1170. }
  1171. /*
  1172. * No it's real payload, pass it up to the user callback.
  1173. * It's nicely buffered with the pre-padding taken care of
  1174. * so it can be sent straight out again using lws_write
  1175. */
  1176. eff_buf.token = &wsi->u.ws.rx_ubuf[LWS_PRE];
  1177. eff_buf.token_len = wsi->u.ws.rx_ubuf_head;
  1178. drain_extension:
  1179. lwsl_ext("%s: passing %d to ext\n", __func__, eff_buf.token_len);
  1180. if (wsi->state == LWSS_RETURNED_CLOSE_ALREADY ||
  1181. wsi->state == LWSS_AWAITING_CLOSE_ACK)
  1182. goto already_done;
  1183. n = lws_ext_cb_active(wsi, LWS_EXT_CB_PAYLOAD_RX, &eff_buf, 0);
  1184. if (n < 0) {
  1185. /*
  1186. * we may rely on this to get RX, just drop connection
  1187. */
  1188. wsi->socket_is_permanently_unusable = 1;
  1189. return -1;
  1190. }
  1191. if (rx_draining_ext && eff_buf.token_len == 0)
  1192. goto already_done;
  1193. if (n && eff_buf.token_len) {
  1194. /* extension had more... main loop will come back */
  1195. wsi->u.ws.rx_draining_ext = 1;
  1196. wsi->u.ws.rx_draining_ext_list = pt->rx_draining_ext_list;
  1197. pt->rx_draining_ext_list = wsi;
  1198. }
  1199. if (eff_buf.token_len > 0 ||
  1200. callback_action == LWS_CALLBACK_RECEIVE_PONG) {
  1201. eff_buf.token[eff_buf.token_len] = '\0';
  1202. if (wsi->protocol->callback) {
  1203. if (callback_action == LWS_CALLBACK_RECEIVE_PONG)
  1204. lwsl_info("Doing pong callback\n");
  1205. ret = user_callback_handle_rxflow(
  1206. wsi->protocol->callback,
  1207. wsi,
  1208. (enum lws_callback_reasons)callback_action,
  1209. wsi->user_space,
  1210. eff_buf.token,
  1211. eff_buf.token_len);
  1212. }
  1213. else
  1214. lwsl_err("No callback on payload spill!\n");
  1215. }
  1216. already_done:
  1217. wsi->u.ws.rx_ubuf_head = 0;
  1218. break;
  1219. }
  1220. return ret;
  1221. illegal_ctl_length:
  1222. lwsl_warn("Control frame with xtended length is illegal\n");
  1223. /* kill the connection */
  1224. return -1;
  1225. }
  1226. LWS_VISIBLE size_t
  1227. lws_remaining_packet_payload(struct lws *wsi)
  1228. {
  1229. return wsi->u.ws.rx_packet_length;
  1230. }
  1231. /* Once we reach LWS_RXPS_PAYLOAD_UNTIL_LENGTH_EXHAUSTED, we know how much
  1232. * to expect in that state and can deal with it in bulk more efficiently.
  1233. */
  1234. int
  1235. lws_payload_until_length_exhausted(struct lws *wsi, unsigned char **buf,
  1236. size_t *len)
  1237. {
  1238. unsigned char *buffer = *buf, mask[4];
  1239. int buffer_size, n;
  1240. unsigned int avail;
  1241. char *rx_ubuf;
  1242. if (wsi->protocol->rx_buffer_size)
  1243. buffer_size = wsi->protocol->rx_buffer_size;
  1244. else
  1245. buffer_size = wsi->context->pt_serv_buf_size;
  1246. avail = buffer_size - wsi->u.ws.rx_ubuf_head;
  1247. /* do not consume more than we should */
  1248. if (avail > wsi->u.ws.rx_packet_length)
  1249. avail = wsi->u.ws.rx_packet_length;
  1250. /* do not consume more than what is in the buffer */
  1251. if (avail > *len)
  1252. avail = *len;
  1253. /* we want to leave 1 byte for the parser to handle properly */
  1254. if (avail <= 1)
  1255. return 0;
  1256. avail--;
  1257. rx_ubuf = wsi->u.ws.rx_ubuf + LWS_PRE + wsi->u.ws.rx_ubuf_head;
  1258. if (wsi->u.ws.all_zero_nonce)
  1259. memcpy(rx_ubuf, buffer, avail);
  1260. else {
  1261. for (n = 0; n < 4; n++)
  1262. mask[n] = wsi->u.ws.mask[(wsi->u.ws.mask_idx + n) & 3];
  1263. /* deal with 4-byte chunks using unwrapped loop */
  1264. n = avail >> 2;
  1265. while (n--) {
  1266. *(rx_ubuf++) = *(buffer++) ^ mask[0];
  1267. *(rx_ubuf++) = *(buffer++) ^ mask[1];
  1268. *(rx_ubuf++) = *(buffer++) ^ mask[2];
  1269. *(rx_ubuf++) = *(buffer++) ^ mask[3];
  1270. }
  1271. /* and the remaining bytes bytewise */
  1272. for (n = 0; n < (int)(avail & 3); n++)
  1273. *(rx_ubuf++) = *(buffer++) ^ mask[n];
  1274. wsi->u.ws.mask_idx = (wsi->u.ws.mask_idx + avail) & 3;
  1275. }
  1276. (*buf) += avail;
  1277. wsi->u.ws.rx_ubuf_head += avail;
  1278. wsi->u.ws.rx_packet_length -= avail;
  1279. *len -= avail;
  1280. return avail;
  1281. }