client-handshake.c 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745
  1. #include "private-libwebsockets.h"
  2. struct lws *
  3. lws_client_connect_2(struct lws *wsi)
  4. {
  5. #ifdef LWS_USE_IPV6
  6. struct sockaddr_in6 server_addr6;
  7. struct addrinfo hints, *result;
  8. #endif
  9. struct lws_context *context = wsi->context;
  10. struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
  11. struct sockaddr_in server_addr4;
  12. struct lws_pollfd pfd;
  13. struct sockaddr *v;
  14. const char *cce = "";
  15. int n, plen = 0;
  16. const char *ads;
  17. lwsl_client("%s\n", __func__);
  18. /* proxy? */
  19. if (wsi->vhost->http_proxy_port) {
  20. plen = sprintf((char *)pt->serv_buf,
  21. "CONNECT %s:%u HTTP/1.0\x0d\x0a"
  22. "User-agent: libwebsockets\x0d\x0a",
  23. lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_PEER_ADDRESS),
  24. wsi->u.hdr.c_port);
  25. if (wsi->vhost->proxy_basic_auth_token[0])
  26. plen += sprintf((char *)pt->serv_buf + plen,
  27. "Proxy-authorization: basic %s\x0d\x0a",
  28. wsi->vhost->proxy_basic_auth_token);
  29. plen += sprintf((char *)pt->serv_buf + plen, "\x0d\x0a");
  30. ads = wsi->vhost->http_proxy_address;
  31. #ifdef LWS_USE_IPV6
  32. if (LWS_IPV6_ENABLED(wsi->vhost)) {
  33. memset(&server_addr6, 0, sizeof(struct sockaddr_in6));
  34. server_addr6.sin6_port = htons(wsi->vhost->http_proxy_port);
  35. } else
  36. #endif
  37. server_addr4.sin_port = htons(wsi->vhost->http_proxy_port);
  38. } else {
  39. ads = lws_hdr_simple_ptr(wsi, _WSI_TOKEN_CLIENT_PEER_ADDRESS);
  40. #ifdef LWS_USE_IPV6
  41. if (LWS_IPV6_ENABLED(wsi->vhost)) {
  42. memset(&server_addr6, 0, sizeof(struct sockaddr_in6));
  43. server_addr6.sin6_port = htons(wsi->u.hdr.c_port);
  44. } else
  45. #endif
  46. server_addr4.sin_port = htons(wsi->u.hdr.c_port);
  47. }
  48. /*
  49. * prepare the actual connection (to the proxy, if any)
  50. */
  51. lwsl_client("%s: address %s\n", __func__, ads);
  52. #ifdef LWS_USE_IPV6
  53. if (LWS_IPV6_ENABLED(wsi->vhost)) {
  54. memset(&hints, 0, sizeof(struct addrinfo));
  55. #if !defined(__ANDROID__)
  56. hints.ai_family = AF_INET6;
  57. hints.ai_flags = AI_V4MAPPED;
  58. #endif
  59. n = getaddrinfo(ads, NULL, &hints, &result);
  60. if (n) {
  61. #ifdef _WIN32
  62. lwsl_err("getaddrinfo: %ls\n", gai_strerrorW(n));
  63. #else
  64. lwsl_err("getaddrinfo: %s\n", gai_strerror(n));
  65. #endif
  66. cce = "getaddrinfo (ipv6) failed";
  67. goto oom4;
  68. }
  69. server_addr6.sin6_family = AF_INET6;
  70. switch (result->ai_family) {
  71. #if defined(__ANDROID__)
  72. case AF_INET:
  73. /* map IPv4 to IPv6 */
  74. bzero((char *)&server_addr6.sin6_addr,
  75. sizeof(struct in6_addr));
  76. server_addr6.sin6_addr.s6_addr[10] = 0xff;
  77. server_addr6.sin6_addr.s6_addr[11] = 0xff;
  78. memcpy(&server_addr6.sin6_addr.s6_addr[12],
  79. &((struct sockaddr_in *)result->ai_addr)->sin_addr,
  80. sizeof(struct in_addr));
  81. break;
  82. #endif
  83. case AF_INET6:
  84. memcpy(&server_addr6.sin6_addr,
  85. &((struct sockaddr_in6 *)result->ai_addr)->sin6_addr,
  86. sizeof(struct in6_addr));
  87. break;
  88. default:
  89. lwsl_err("Unknown address family\n");
  90. freeaddrinfo(result);
  91. cce = "unknown address family";
  92. goto oom4;
  93. }
  94. freeaddrinfo(result);
  95. } else
  96. #endif
  97. {
  98. struct addrinfo ai, *res, *result;
  99. void *p = NULL;
  100. memset (&ai, 0, sizeof ai);
  101. ai.ai_family = PF_UNSPEC;
  102. ai.ai_socktype = SOCK_STREAM;
  103. ai.ai_flags = AI_CANONNAME;
  104. if (getaddrinfo(ads, NULL, &ai, &result)) {
  105. lwsl_err("getaddrinfo failed\n");
  106. cce = "getaddrinfo (ipv4) failed";
  107. goto oom4;
  108. }
  109. res = result;
  110. while (!p && res) {
  111. switch (res->ai_family) {
  112. case AF_INET:
  113. p = &((struct sockaddr_in *)res->ai_addr)->sin_addr;
  114. break;
  115. }
  116. res = res->ai_next;
  117. }
  118. if (!p) {
  119. lwsl_err("Couldn't identify address\n");
  120. freeaddrinfo(result);
  121. goto oom4;
  122. }
  123. server_addr4.sin_family = AF_INET;
  124. server_addr4.sin_addr = *((struct in_addr *)p);
  125. bzero(&server_addr4.sin_zero, 8);
  126. freeaddrinfo(result);
  127. }
  128. if (!lws_socket_is_valid(wsi->sock)) {
  129. #ifdef LWS_USE_IPV6
  130. if (LWS_IPV6_ENABLED(wsi->vhost))
  131. wsi->sock = socket(AF_INET6, SOCK_STREAM, 0);
  132. else
  133. #endif
  134. wsi->sock = socket(AF_INET, SOCK_STREAM, 0);
  135. if (!lws_socket_is_valid(wsi->sock)) {
  136. lwsl_warn("Unable to open socket\n");
  137. goto oom4;
  138. }
  139. if (lws_plat_set_socket_options(wsi->vhost, wsi->sock)) {
  140. lwsl_err("Failed to set wsi socket options\n");
  141. compatible_close(wsi->sock);
  142. cce = "set socket opts failed";
  143. goto oom4;
  144. }
  145. wsi->mode = LWSCM_WSCL_WAITING_CONNECT;
  146. lws_libev_accept(wsi, wsi->sock);
  147. lws_libuv_accept(wsi, wsi->sock);
  148. if (insert_wsi_socket_into_fds(context, wsi)) {
  149. compatible_close(wsi->sock);
  150. cce = "insert wsi failed";
  151. goto oom4;
  152. }
  153. lws_change_pollfd(wsi, 0, LWS_POLLIN);
  154. /*
  155. * past here, we can't simply free the structs as error
  156. * handling as oom4 does. We have to run the whole close flow.
  157. */
  158. if (!wsi->protocol)
  159. wsi->protocol = &wsi->vhost->protocols[0];
  160. wsi->protocol->callback(wsi, LWS_CALLBACK_WSI_CREATE,
  161. wsi->user_space, NULL, 0);
  162. lws_set_timeout(wsi, PENDING_TIMEOUT_AWAITING_CONNECT_RESPONSE,
  163. AWAITING_TIMEOUT);
  164. n = lws_socket_bind(wsi->vhost, wsi->sock, 0, wsi->vhost->iface);
  165. if (n < 0)
  166. goto failed;
  167. }
  168. #ifdef LWS_USE_IPV6
  169. if (LWS_IPV6_ENABLED(wsi->vhost)) {
  170. v = (struct sockaddr *)&server_addr6;
  171. n = sizeof(struct sockaddr_in6);
  172. } else
  173. #endif
  174. {
  175. v = (struct sockaddr *)&server_addr4;
  176. n = sizeof(struct sockaddr);
  177. }
  178. if (connect(wsi->sock, v, n) == -1 || LWS_ERRNO == LWS_EISCONN) {
  179. if (LWS_ERRNO == LWS_EALREADY ||
  180. LWS_ERRNO == LWS_EINPROGRESS ||
  181. LWS_ERRNO == LWS_EWOULDBLOCK
  182. #ifdef _WIN32
  183. || LWS_ERRNO == WSAEINVAL
  184. #endif
  185. ) {
  186. lwsl_client("nonblocking connect retry (errno = %d)\n",
  187. LWS_ERRNO);
  188. if (lws_plat_check_connection_error(wsi))
  189. goto failed;
  190. /*
  191. * must do specifically a POLLOUT poll to hear
  192. * about the connect completion
  193. */
  194. if (lws_change_pollfd(wsi, 0, LWS_POLLOUT))
  195. goto failed;
  196. return wsi;
  197. }
  198. if (LWS_ERRNO != LWS_EISCONN) {
  199. lwsl_debug("Connect failed errno=%d\n", LWS_ERRNO);
  200. goto failed;
  201. }
  202. }
  203. lwsl_client("connected\n");
  204. /* we are connected to server, or proxy */
  205. if (wsi->vhost->http_proxy_port) {
  206. /*
  207. * OK from now on we talk via the proxy, so connect to that
  208. *
  209. * (will overwrite existing pointer,
  210. * leaving old string/frag there but unreferenced)
  211. */
  212. if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_PEER_ADDRESS,
  213. wsi->vhost->http_proxy_address))
  214. goto failed;
  215. wsi->u.hdr.c_port = wsi->vhost->http_proxy_port;
  216. n = send(wsi->sock, (char *)pt->serv_buf, plen,
  217. MSG_NOSIGNAL);
  218. if (n < 0) {
  219. lwsl_debug("ERROR writing to proxy socket\n");
  220. goto failed;
  221. }
  222. lws_set_timeout(wsi, PENDING_TIMEOUT_AWAITING_PROXY_RESPONSE,
  223. AWAITING_TIMEOUT);
  224. wsi->mode = LWSCM_WSCL_WAITING_PROXY_REPLY;
  225. return wsi;
  226. }
  227. /*
  228. * provoke service to issue the handshake directly
  229. * we need to do it this way because in the proxy case, this is the
  230. * next state and executed only if and when we get a good proxy
  231. * response inside the state machine... but notice in SSL case this
  232. * may not have sent anything yet with 0 return, and won't until some
  233. * many retries from main loop. To stop that becoming endless,
  234. * cover with a timeout.
  235. */
  236. lws_set_timeout(wsi, PENDING_TIMEOUT_SENT_CLIENT_HANDSHAKE,
  237. AWAITING_TIMEOUT);
  238. wsi->mode = LWSCM_WSCL_ISSUE_HANDSHAKE;
  239. pfd.fd = wsi->sock;
  240. pfd.events = LWS_POLLIN;
  241. pfd.revents = LWS_POLLIN;
  242. n = lws_service_fd(context, &pfd);
  243. if (n < 0)
  244. goto failed;
  245. if (n) /* returns 1 on failure after closing wsi */
  246. return NULL;
  247. return wsi;
  248. oom4:
  249. /* we're closing, losing some rx is OK */
  250. wsi->u.hdr.ah->rxpos = wsi->u.hdr.ah->rxlen;
  251. //lwsl_err("%d\n", wsi->mode);
  252. if (wsi->mode == LWSCM_HTTP_CLIENT) {
  253. wsi->vhost->protocols[0].callback(wsi,
  254. LWS_CALLBACK_CLIENT_CONNECTION_ERROR,
  255. wsi->user_space, (void *)cce, strlen(cce));
  256. wsi->already_did_cce = 1;
  257. }
  258. /* take care that we might be inserted in fds already */
  259. if (wsi->position_in_fds_table != -1)
  260. goto failed;
  261. lws_header_table_detach(wsi, 0);
  262. lws_free(wsi);
  263. return NULL;
  264. failed:
  265. lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS);
  266. return NULL;
  267. }
  268. /**
  269. * lws_client_reset() - retarget a connected wsi to start over with a new connection (ie, redirect)
  270. * this only works if still in HTTP, ie, not upgraded yet
  271. * wsi: connection to reset
  272. * address: network address of the new server
  273. * port: port to connect to
  274. * path: uri path to connect to on the new server
  275. * host: host header to send to the new server
  276. */
  277. LWS_VISIBLE struct lws *
  278. lws_client_reset(struct lws *wsi, int ssl, const char *address, int port, const char *path, const char *host)
  279. {
  280. if (wsi->u.hdr.redirects == 3) {
  281. lwsl_err("%s: Too many redirects\n", __func__);
  282. return NULL;
  283. }
  284. wsi->u.hdr.redirects++;
  285. #ifdef LWS_OPENSSL_SUPPORT
  286. wsi->use_ssl = ssl;
  287. #else
  288. if (ssl) {
  289. lwsl_err("%s: not configured for ssl\n", __func__);
  290. return NULL;
  291. }
  292. #endif
  293. lwsl_notice("redirect ads='%s', port=%d, path='%s'\n", address, port, path);
  294. if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_PEER_ADDRESS, address))
  295. return NULL;
  296. if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_URI, path))
  297. return NULL;
  298. if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_HOST, host))
  299. return NULL;
  300. compatible_close(wsi->sock);
  301. remove_wsi_socket_from_fds(wsi);
  302. wsi->sock = LWS_SOCK_INVALID;
  303. wsi->state = LWSS_CLIENT_UNCONNECTED;
  304. wsi->protocol = NULL;
  305. wsi->pending_timeout = NO_PENDING_TIMEOUT;
  306. wsi->u.hdr.c_port = port;
  307. return lws_client_connect_2(wsi);
  308. }
  309. #ifdef LWS_WITH_HTTP_PROXY
  310. static hubbub_error
  311. html_parser_cb(const hubbub_token *token, void *pw)
  312. {
  313. struct lws_rewrite *r = (struct lws_rewrite *)pw;
  314. char buf[1024], *start = buf + LWS_PRE, *p = start,
  315. *end = &buf[sizeof(buf) - 1];
  316. size_t i;
  317. switch (token->type) {
  318. case HUBBUB_TOKEN_DOCTYPE:
  319. p += lws_snprintf(p, end - p, "<!DOCTYPE %.*s %s ",
  320. (int) token->data.doctype.name.len,
  321. token->data.doctype.name.ptr,
  322. token->data.doctype.force_quirks ?
  323. "(force-quirks) " : "");
  324. if (token->data.doctype.public_missing)
  325. printf("\tpublic: missing\n");
  326. else
  327. p += lws_snprintf(p, end - p, "PUBLIC \"%.*s\"\n",
  328. (int) token->data.doctype.public_id.len,
  329. token->data.doctype.public_id.ptr);
  330. if (token->data.doctype.system_missing)
  331. printf("\tsystem: missing\n");
  332. else
  333. p += lws_snprintf(p, end - p, " \"%.*s\">\n",
  334. (int) token->data.doctype.system_id.len,
  335. token->data.doctype.system_id.ptr);
  336. break;
  337. case HUBBUB_TOKEN_START_TAG:
  338. p += lws_snprintf(p, end - p, "<%.*s", (int)token->data.tag.name.len,
  339. token->data.tag.name.ptr);
  340. /* (token->data.tag.self_closing) ?
  341. "(self-closing) " : "",
  342. (token->data.tag.n_attributes > 0) ?
  343. "attributes:" : "");
  344. */
  345. for (i = 0; i < token->data.tag.n_attributes; i++) {
  346. if (!hstrcmp(&token->data.tag.attributes[i].name, "href", 4) ||
  347. !hstrcmp(&token->data.tag.attributes[i].name, "action", 6) ||
  348. !hstrcmp(&token->data.tag.attributes[i].name, "src", 3)) {
  349. const char *pp = (const char *)token->data.tag.attributes[i].value.ptr;
  350. int plen = (int) token->data.tag.attributes[i].value.len;
  351. if (!hstrcmp(&token->data.tag.attributes[i].value,
  352. r->from, r->from_len)) {
  353. pp += r->from_len;
  354. plen -= r->from_len;
  355. }
  356. p += lws_snprintf(p, end - p, " %.*s=\"%s/%.*s\"",
  357. (int) token->data.tag.attributes[i].name.len,
  358. token->data.tag.attributes[i].name.ptr,
  359. r->to, plen, pp);
  360. } else
  361. p += lws_snprintf(p, end - p, " %.*s=\"%.*s\"",
  362. (int) token->data.tag.attributes[i].name.len,
  363. token->data.tag.attributes[i].name.ptr,
  364. (int) token->data.tag.attributes[i].value.len,
  365. token->data.tag.attributes[i].value.ptr);
  366. }
  367. p += lws_snprintf(p, end - p, ">\n");
  368. break;
  369. case HUBBUB_TOKEN_END_TAG:
  370. p += lws_snprintf(p, end - p, "</%.*s", (int) token->data.tag.name.len,
  371. token->data.tag.name.ptr);
  372. /*
  373. (token->data.tag.self_closing) ?
  374. "(self-closing) " : "",
  375. (token->data.tag.n_attributes > 0) ?
  376. "attributes:" : "");
  377. */
  378. for (i = 0; i < token->data.tag.n_attributes; i++) {
  379. p += lws_snprintf(p, end - p, " %.*s='%.*s'\n",
  380. (int) token->data.tag.attributes[i].name.len,
  381. token->data.tag.attributes[i].name.ptr,
  382. (int) token->data.tag.attributes[i].value.len,
  383. token->data.tag.attributes[i].value.ptr);
  384. }
  385. p += lws_snprintf(p, end - p, ">\n");
  386. break;
  387. case HUBBUB_TOKEN_COMMENT:
  388. p += lws_snprintf(p, end - p, "<!-- %.*s -->\n",
  389. (int) token->data.comment.len,
  390. token->data.comment.ptr);
  391. break;
  392. case HUBBUB_TOKEN_CHARACTER:
  393. p += lws_snprintf(p, end - p, "%.*s", (int) token->data.character.len,
  394. token->data.character.ptr);
  395. break;
  396. case HUBBUB_TOKEN_EOF:
  397. p += lws_snprintf(p, end - p, "\n");
  398. break;
  399. }
  400. if (user_callback_handle_rxflow(r->wsi->protocol->callback,
  401. r->wsi, LWS_CALLBACK_RECEIVE_CLIENT_HTTP_READ,
  402. r->wsi->user_space, start, p - start))
  403. return -1;
  404. return HUBBUB_OK;
  405. }
  406. #endif
  407. LWS_VISIBLE struct lws *
  408. lws_client_connect_via_info(struct lws_client_connect_info *i)
  409. {
  410. struct lws *wsi;
  411. int v = SPEC_LATEST_SUPPORTED;
  412. if (i->context->requested_kill)
  413. return NULL;
  414. if (!i->context->protocol_init_done)
  415. lws_protocol_init(i->context);
  416. wsi = lws_zalloc(sizeof(struct lws));
  417. if (wsi == NULL)
  418. goto bail;
  419. wsi->context = i->context;
  420. /* assert the mode and union status (hdr) clearly */
  421. lws_union_transition(wsi, LWSCM_HTTP_CLIENT);
  422. wsi->sock = LWS_SOCK_INVALID;
  423. /* 1) fill up the wsi with stuff from the connect_info as far as it
  424. * can go. It's because not only is our connection async, we might
  425. * not even be able to get ahold of an ah at this point.
  426. */
  427. /* -1 means just use latest supported */
  428. if (i->ietf_version_or_minus_one != -1 && i->ietf_version_or_minus_one)
  429. v = i->ietf_version_or_minus_one;
  430. wsi->ietf_spec_revision = v;
  431. wsi->user_space = NULL;
  432. wsi->state = LWSS_CLIENT_UNCONNECTED;
  433. wsi->protocol = NULL;
  434. wsi->pending_timeout = NO_PENDING_TIMEOUT;
  435. wsi->position_in_fds_table = -1;
  436. wsi->u.hdr.c_port = i->port;
  437. wsi->vhost = i->vhost;
  438. if (!wsi->vhost)
  439. wsi->vhost = i->context->vhost_list;
  440. wsi->protocol = &wsi->vhost->protocols[0];
  441. if (wsi && !wsi->user_space && i->userdata) {
  442. wsi->user_space_externally_allocated = 1;
  443. wsi->user_space = i->userdata;
  444. } else
  445. /* if we stay in http, we can assign the user space now,
  446. * otherwise do it after the protocol negotiated
  447. */
  448. if (i->method)
  449. if (lws_ensure_user_space(wsi))
  450. goto bail;
  451. #ifdef LWS_OPENSSL_SUPPORT
  452. wsi->use_ssl = i->ssl_connection;
  453. #else
  454. if (i->ssl_connection) {
  455. lwsl_err("libwebsockets not configured for ssl\n");
  456. goto bail;
  457. }
  458. #endif
  459. /* 2) stash the things from connect_info that we can't process without
  460. * an ah. Because if no ah, we will go on the ah waiting list and
  461. * process those things later (after the connect_info and maybe the
  462. * things pointed to have gone out of scope.
  463. */
  464. wsi->u.hdr.stash = lws_malloc(sizeof(*wsi->u.hdr.stash));
  465. if (!wsi->u.hdr.stash) {
  466. lwsl_err("%s: OOM\n", __func__);
  467. goto bail;
  468. }
  469. wsi->u.hdr.stash->origin[0] = '\0';
  470. wsi->u.hdr.stash->protocol[0] = '\0';
  471. wsi->u.hdr.stash->method[0] = '\0';
  472. strncpy(wsi->u.hdr.stash->address, i->address,
  473. sizeof(wsi->u.hdr.stash->address) - 1);
  474. strncpy(wsi->u.hdr.stash->path, i->path,
  475. sizeof(wsi->u.hdr.stash->path) - 1);
  476. strncpy(wsi->u.hdr.stash->host, i->host,
  477. sizeof(wsi->u.hdr.stash->host) - 1);
  478. if (i->origin)
  479. strncpy(wsi->u.hdr.stash->origin, i->origin,
  480. sizeof(wsi->u.hdr.stash->origin) - 1);
  481. if (i->protocol)
  482. strncpy(wsi->u.hdr.stash->protocol, i->protocol,
  483. sizeof(wsi->u.hdr.stash->protocol) - 1);
  484. if (i->method)
  485. strncpy(wsi->u.hdr.stash->method, i->method,
  486. sizeof(wsi->u.hdr.stash->method) - 1);
  487. wsi->u.hdr.stash->address[sizeof(wsi->u.hdr.stash->address) - 1] = '\0';
  488. wsi->u.hdr.stash->path[sizeof(wsi->u.hdr.stash->path) - 1] = '\0';
  489. wsi->u.hdr.stash->host[sizeof(wsi->u.hdr.stash->host) - 1] = '\0';
  490. wsi->u.hdr.stash->origin[sizeof(wsi->u.hdr.stash->origin) - 1] = '\0';
  491. wsi->u.hdr.stash->protocol[sizeof(wsi->u.hdr.stash->protocol) - 1] = '\0';
  492. wsi->u.hdr.stash->method[sizeof(wsi->u.hdr.stash->method) - 1] = '\0';
  493. if (i->pwsi)
  494. *i->pwsi = wsi;
  495. /* if we went on the waiting list, no probs just return the wsi
  496. * when we get the ah, now or later, he will call
  497. * lws_client_connect_via_info2() below.
  498. */
  499. if (lws_header_table_attach(wsi, 0) < 0) {
  500. /*
  501. * if we failed here, the connection is already closed
  502. * and freed.
  503. */
  504. goto bail1;
  505. }
  506. if (i->parent_wsi) {
  507. lwsl_info("%s: created child %p of parent %p\n", __func__,
  508. wsi, i->parent_wsi);
  509. wsi->parent = i->parent_wsi;
  510. wsi->sibling_list = i->parent_wsi->child_list;
  511. i->parent_wsi->child_list = wsi;
  512. }
  513. #ifdef LWS_WITH_HTTP_PROXY
  514. if (i->uri_replace_to)
  515. wsi->rw = lws_rewrite_create(wsi, html_parser_cb,
  516. i->uri_replace_from,
  517. i->uri_replace_to);
  518. #endif
  519. return wsi;
  520. bail:
  521. lws_free(wsi);
  522. bail1:
  523. if (i->pwsi)
  524. *i->pwsi = NULL;
  525. return NULL;
  526. }
  527. struct lws *
  528. lws_client_connect_via_info2(struct lws *wsi)
  529. {
  530. struct client_info_stash *stash = wsi->u.hdr.stash;
  531. if (!stash)
  532. return wsi;
  533. /*
  534. * we're not necessarily in a position to action these right away,
  535. * stash them... we only need during connect phase so u.hdr is fine
  536. */
  537. if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_PEER_ADDRESS,
  538. stash->address))
  539. goto bail1;
  540. /* these only need u.hdr lifetime as well */
  541. if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_URI, stash->path))
  542. goto bail1;
  543. if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_HOST, stash->host))
  544. goto bail1;
  545. if (stash->origin[0])
  546. if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_ORIGIN,
  547. stash->origin))
  548. goto bail1;
  549. /*
  550. * this is a list of protocols we tell the server we're okay with
  551. * stash it for later when we compare server response with it
  552. */
  553. if (stash->protocol[0])
  554. if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_SENT_PROTOCOLS,
  555. stash->protocol))
  556. goto bail1;
  557. if (stash->method[0])
  558. if (lws_hdr_simple_create(wsi, _WSI_TOKEN_CLIENT_METHOD,
  559. stash->method))
  560. goto bail1;
  561. lws_free_set_NULL(wsi->u.hdr.stash);
  562. /*
  563. * Check with each extension if it is able to route and proxy this
  564. * connection for us. For example, an extension like x-google-mux
  565. * can handle this and then we don't need an actual socket for this
  566. * connection.
  567. */
  568. if (lws_ext_cb_all_exts(wsi->context, wsi,
  569. LWS_EXT_CB_CAN_PROXY_CLIENT_CONNECTION,
  570. (void *)stash->address,
  571. wsi->u.hdr.c_port) > 0) {
  572. lwsl_client("lws_client_connect: ext handling conn\n");
  573. lws_set_timeout(wsi,
  574. PENDING_TIMEOUT_AWAITING_EXTENSION_CONNECT_RESPONSE,
  575. AWAITING_TIMEOUT);
  576. wsi->mode = LWSCM_WSCL_WAITING_EXTENSION_CONNECT;
  577. return wsi;
  578. }
  579. lwsl_client("lws_client_connect: direct conn\n");
  580. wsi->context->count_wsi_allocated++;
  581. return lws_client_connect_2(wsi);
  582. bail1:
  583. lws_free_set_NULL(wsi->u.hdr.stash);
  584. return NULL;
  585. }
  586. LWS_VISIBLE struct lws *
  587. lws_client_connect_extended(struct lws_context *context, const char *address,
  588. int port, int ssl_connection, const char *path,
  589. const char *host, const char *origin,
  590. const char *protocol, int ietf_version_or_minus_one,
  591. void *userdata)
  592. {
  593. struct lws_client_connect_info i;
  594. memset(&i, 0, sizeof(i));
  595. i.context = context;
  596. i.address = address;
  597. i.port = port;
  598. i.ssl_connection = ssl_connection;
  599. i.path = path;
  600. i.host = host;
  601. i.origin = origin;
  602. i.protocol = protocol;
  603. i.ietf_version_or_minus_one = ietf_version_or_minus_one;
  604. i.userdata = userdata;
  605. return lws_client_connect_via_info(&i);
  606. }
  607. LWS_VISIBLE struct lws *
  608. lws_client_connect(struct lws_context *context, const char *address,
  609. int port, int ssl_connection, const char *path,
  610. const char *host, const char *origin,
  611. const char *protocol, int ietf_version_or_minus_one)
  612. {
  613. struct lws_client_connect_info i;
  614. memset(&i, 0, sizeof(i));
  615. i.context = context;
  616. i.address = address;
  617. i.port = port;
  618. i.ssl_connection = ssl_connection;
  619. i.path = path;
  620. i.host = host;
  621. i.origin = origin;
  622. i.protocol = protocol;
  623. i.ietf_version_or_minus_one = ietf_version_or_minus_one;
  624. i.userdata = NULL;
  625. return lws_client_connect_via_info(&i);
  626. }