123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710 |
- /*
- * libwebsockets-test-client - libwebsockets test implementation
- *
- * Copyright (C) 2011-2016 Andy Green <andy@warmcat.com>
- *
- * This file is made available under the Creative Commons CC0 1.0
- * Universal Public Domain Dedication.
- *
- * The person who associated a work with this deed has dedicated
- * the work to the public domain by waiving all of his or her rights
- * to the work worldwide under copyright law, including all related
- * and neighboring rights, to the extent allowed by law. You can copy,
- * modify, distribute and perform the work, even for commercial purposes,
- * all without asking permission.
- *
- * The test apps are intended to be adapted for use in your code, which
- * may be proprietary. So unlike the library itself, they are licensed
- * Public Domain.
- */
- #include "lws_config.h"
- #include <stdio.h>
- #include <stdlib.h>
- #include <getopt.h>
- #include <string.h>
- #include <signal.h>
- #ifdef _WIN32
- #define random rand
- #include "gettimeofday.h"
- #else
- #include <syslog.h>
- #include <sys/time.h>
- #include <unistd.h>
- #endif
- #include "../lib/libwebsockets.h"
- static int deny_deflate, longlived, mirror_lifetime, test_post;
- static struct lws *wsi_dumb, *wsi_mirror;
- static struct lws *wsi_multi[3];
- static volatile int force_exit;
- static unsigned int opts, rl_multi[3];
- static int flag_no_mirror_traffic;
- #if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
- char crl_path[1024] = "";
- #endif
- /*
- * This demo shows how to connect multiple websockets simultaneously to a
- * websocket server (there is no restriction on their having to be the same
- * server just it simplifies the demo).
- *
- * dumb-increment-protocol: we connect to the server and print the number
- * we are given
- *
- * lws-mirror-protocol: draws random circles, which are mirrored on to every
- * client (see them being drawn in every browser
- * session also using the test server)
- */
- enum demo_protocols {
- PROTOCOL_DUMB_INCREMENT,
- PROTOCOL_LWS_MIRROR,
- /* always last */
- DEMO_PROTOCOL_COUNT
- };
- static void show_http_content(const char *p, size_t l)
- {
- if (lwsl_visible(LLL_INFO)) {
- while (l--)
- if (*p < 0x7f)
- putchar(*p++);
- else
- putchar('.');
- }
- }
- /*
- * dumb_increment protocol
- *
- * since this also happens to be protocols[0], some callbacks that are not
- * bound to a specific protocol also turn up here.
- */
- static int
- callback_dumb_increment(struct lws *wsi, enum lws_callback_reasons reason,
- void *user, void *in, size_t len)
- {
- const char *which = "http";
- char which_wsi[10], buf[50 + LWS_PRE];
- int n;
- switch (reason) {
- case LWS_CALLBACK_CLIENT_ESTABLISHED:
- lwsl_info("dumb: LWS_CALLBACK_CLIENT_ESTABLISHED\n");
- break;
- case LWS_CALLBACK_CLOSED:
- lwsl_notice("dumb: LWS_CALLBACK_CLOSED\n");
- wsi_dumb = NULL;
- break;
- case LWS_CALLBACK_CLIENT_RECEIVE:
- ((char *)in)[len] = '\0';
- lwsl_info("rx %d '%s'\n", (int)len, (char *)in);
- break;
- /* because we are protocols[0] ... */
- case LWS_CALLBACK_CLIENT_CONNECTION_ERROR:
- if (wsi == wsi_dumb) {
- which = "dumb";
- wsi_dumb = NULL;
- }
- if (wsi == wsi_mirror) {
- which = "mirror";
- wsi_mirror = NULL;
- }
- for (n = 0; n < ARRAY_SIZE(wsi_multi); n++)
- if (wsi == wsi_multi[n]) {
- sprintf(which_wsi, "multi %d", n);
- which = which_wsi;
- wsi_multi[n] = NULL;
- }
- lwsl_err("CLIENT_CONNECTION_ERROR: %s: %s\n", which,
- in ? (char *)in : "(null)");
- break;
- case LWS_CALLBACK_CLIENT_CONFIRM_EXTENSION_SUPPORTED:
- if ((strcmp((const char *)in, "deflate-stream") == 0) && deny_deflate) {
- lwsl_notice("denied deflate-stream extension\n");
- return 1;
- }
- if ((strcmp((const char *)in, "x-webkit-deflate-frame") == 0))
- return 1;
- if ((strcmp((const char *)in, "deflate-frame") == 0))
- return 1;
- break;
- case LWS_CALLBACK_ESTABLISHED_CLIENT_HTTP:
- lwsl_notice("lws_http_client_http_response %d\n",
- lws_http_client_http_response(wsi));
- break;
- /* chunked content */
- case LWS_CALLBACK_RECEIVE_CLIENT_HTTP_READ:
- lwsl_notice("LWS_CALLBACK_RECEIVE_CLIENT_HTTP_READ: %ld\n",
- (long)len);
- show_http_content(in, len);
- break;
- /* unchunked content */
- case LWS_CALLBACK_RECEIVE_CLIENT_HTTP:
- {
- char buffer[1024 + LWS_PRE];
- char *px = buffer + LWS_PRE;
- int lenx = sizeof(buffer) - LWS_PRE;
- /*
- * Often you need to flow control this by something
- * else being writable. In that case call the api
- * to get a callback when writable here, and do the
- * pending client read in the writeable callback of
- * the output.
- *
- * In the case of chunked content, this will call back
- * LWS_CALLBACK_RECEIVE_CLIENT_HTTP_READ once per
- * chunk or partial chunk in the buffer, and report
- * zero length back here.
- */
- if (lws_http_client_read(wsi, &px, &lenx) < 0)
- return -1;
- }
- break;
- case LWS_CALLBACK_CLIENT_WRITEABLE:
- lwsl_info("Client wsi %p writable\n", wsi);
- break;
- case LWS_CALLBACK_CLIENT_APPEND_HANDSHAKE_HEADER:
- if (test_post) {
- unsigned char **p = (unsigned char **)in, *end = (*p) + len;
- if (lws_add_http_header_by_token(wsi,
- WSI_TOKEN_HTTP_CONTENT_LENGTH,
- (unsigned char *)"29", 2, p, end))
- return -1;
- if (lws_add_http_header_by_token(wsi,
- WSI_TOKEN_HTTP_CONTENT_TYPE,
- (unsigned char *)"application/x-www-form-urlencoded", 33, p, end))
- return -1;
- /* inform lws we have http body to send */
- lws_client_http_body_pending(wsi, 1);
- lws_callback_on_writable(wsi);
- }
- break;
- case LWS_CALLBACK_CLIENT_HTTP_WRITEABLE:
- strcpy(buf + LWS_PRE, "text=hello&send=Send+the+form");
- n = lws_write(wsi, (unsigned char *)&buf[LWS_PRE], strlen(&buf[LWS_PRE]), LWS_WRITE_HTTP);
- if (n < 0)
- return -1;
- /* we only had one thing to send, so inform lws we are done
- * if we had more to send, call lws_callback_on_writable(wsi);
- * and just return 0 from callback. On having sent the last
- * part, call the below api instead.*/
- lws_client_http_body_pending(wsi, 0);
- break;
- case LWS_CALLBACK_COMPLETED_CLIENT_HTTP:
- wsi_dumb = NULL;
- force_exit = 1;
- break;
- #if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
- case LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS:
- if (crl_path[0]) {
- /* Enable CRL checking of the server certificate */
- X509_VERIFY_PARAM *param = X509_VERIFY_PARAM_new();
- X509_VERIFY_PARAM_set_flags(param, X509_V_FLAG_CRL_CHECK);
- SSL_CTX_set1_param((SSL_CTX*)user, param);
- X509_STORE *store = SSL_CTX_get_cert_store((SSL_CTX*)user);
- X509_LOOKUP *lookup = X509_STORE_add_lookup(store, X509_LOOKUP_file());
- int n = X509_load_cert_crl_file(lookup, crl_path, X509_FILETYPE_PEM);
- X509_VERIFY_PARAM_free(param);
- if (n != 1) {
- char errbuf[256];
- n = ERR_get_error();
- lwsl_err("LWS_CALLBACK_OPENSSL_LOAD_EXTRA_CLIENT_VERIFY_CERTS: SSL error: %s (%d)\n", ERR_error_string(n, errbuf), n);
- return 1;
- }
- }
- break;
- #endif
- default:
- break;
- }
- return 0;
- }
- /* lws-mirror_protocol */
- static int
- callback_lws_mirror(struct lws *wsi, enum lws_callback_reasons reason,
- void *user, void *in, size_t len)
- {
- unsigned char buf[LWS_PRE + 4096];
- unsigned int rands[4];
- int l = 0;
- int n;
- switch (reason) {
- case LWS_CALLBACK_CLIENT_ESTABLISHED:
- lwsl_notice("mirror: LWS_CALLBACK_CLIENT_ESTABLISHED\n");
- lws_get_random(lws_get_context(wsi), rands, sizeof(rands[0]));
- mirror_lifetime = 16384 + (rands[0] & 65535);
- /* useful to test single connection stability */
- if (longlived)
- mirror_lifetime += 500000;
- lwsl_info("opened mirror connection with "
- "%d lifetime\n", mirror_lifetime);
- /*
- * mirror_lifetime is decremented each send, when it reaches
- * zero the connection is closed in the send callback.
- * When the close callback comes, wsi_mirror is set to NULL
- * so a new connection will be opened
- *
- * start the ball rolling,
- * LWS_CALLBACK_CLIENT_WRITEABLE will come next service
- */
- if (!flag_no_mirror_traffic)
- lws_callback_on_writable(wsi);
- break;
- case LWS_CALLBACK_CLOSED:
- lwsl_notice("mirror: LWS_CALLBACK_CLOSED mirror_lifetime=%d\n", mirror_lifetime);
- wsi_mirror = NULL;
- break;
- case LWS_CALLBACK_CLIENT_WRITEABLE:
- if (flag_no_mirror_traffic)
- return 0;
- for (n = 0; n < 1; n++) {
- lws_get_random(lws_get_context(wsi), rands, sizeof(rands));
- l += sprintf((char *)&buf[LWS_PRE + l],
- "c #%06X %u %u %u;",
- rands[0] & 0xffffff, /* colour */
- rands[1] & 511, /* x */
- rands[2] & 255, /* y */
- (rands[3] & 31) + 1); /* radius */
- }
- n = lws_write(wsi, &buf[LWS_PRE], l,
- opts | LWS_WRITE_TEXT);
- if (n < 0)
- return -1;
- if (n < l) {
- lwsl_err("Partial write LWS_CALLBACK_CLIENT_WRITEABLE\n");
- return -1;
- }
- mirror_lifetime--;
- if (!mirror_lifetime) {
- lwsl_info("closing mirror session\n");
- return -1;
- }
- /* get notified as soon as we can write again */
- lws_callback_on_writable(wsi);
- break;
- default:
- break;
- }
- return 0;
- }
- static int
- callback_test_raw_client(struct lws *wsi, enum lws_callback_reasons reason,
- void *user, void *in, size_t len)
- {
- switch (reason) {
- case LWS_CALLBACK_RAW_ADOPT:
- lwsl_notice("LWS_CALLBACK_RAW_ADOPT\n");
- break;
- case LWS_CALLBACK_RAW_RX:
- lwsl_notice("LWS_CALLBACK_RAW_RX %ld\n", (long)len);
- puts(in);
- break;
- case LWS_CALLBACK_RAW_CLOSE:
- lwsl_notice("LWS_CALLBACK_RAW_CLOSE\n");
- break;
- case LWS_CALLBACK_RAW_WRITEABLE:
- lwsl_notice("LWS_CALLBACK_RAW_WRITEABLE\n");
- break;
- default:
- break;
- }
- return 0;
- }
- /* list of supported protocols and callbacks */
- static const struct lws_protocols protocols[] = {
- {
- "dumb-increment-protocol",
- callback_dumb_increment,
- 0,
- 20,
- },
- {
- "lws-mirror-protocol",
- callback_lws_mirror,
- 0,
- 128,
- }, {
- "lws-test-raw-client",
- callback_test_raw_client,
- 0,
- 128
- },
- { NULL, NULL, 0, 0 } /* end */
- };
- static const struct lws_extension exts[] = {
- {
- "permessage-deflate",
- lws_extension_callback_pm_deflate,
- "permessage-deflate; client_no_context_takeover"
- },
- {
- "deflate-frame",
- lws_extension_callback_pm_deflate,
- "deflate_frame"
- },
- { NULL, NULL, NULL /* terminator */ }
- };
- void sighandler(int sig)
- {
- force_exit = 1;
- }
- static struct option options[] = {
- { "help", no_argument, NULL, 'h' },
- { "debug", required_argument, NULL, 'd' },
- { "port", required_argument, NULL, 'p' },
- { "ssl", no_argument, NULL, 's' },
- { "strict-ssl", no_argument, NULL, 'S' },
- { "version", required_argument, NULL, 'v' },
- { "undeflated", no_argument, NULL, 'u' },
- { "multi-test", no_argument, NULL, 'm' },
- { "nomirror", no_argument, NULL, 'n' },
- { "longlived", no_argument, NULL, 'l' },
- { "post", no_argument, NULL, 'o' },
- { "pingpong-secs", required_argument, NULL, 'P' },
- { "ssl-cert", required_argument, NULL, 'C' },
- { "ssl-key", required_argument, NULL, 'K' },
- { "ssl-ca", required_argument, NULL, 'A' },
- #if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
- { "ssl-crl", required_argument, NULL, 'R' },
- #endif
- { NULL, 0, 0, 0 }
- };
- static int ratelimit_connects(unsigned int *last, unsigned int secs)
- {
- struct timeval tv;
- gettimeofday(&tv, NULL);
- if (tv.tv_sec - (*last) < secs)
- return 0;
- *last = tv.tv_sec;
- return 1;
- }
- int main(int argc, char **argv)
- {
- int n = 0, m, ret = 0, port = 7681, use_ssl = 0, ietf_version = -1;
- unsigned int rl_dumb = 0, rl_mirror = 0, do_ws = 1, pp_secs = 0, do_multi = 0;
- struct lws_context_creation_info info;
- struct lws_client_connect_info i;
- struct lws_context *context;
- const char *prot, *p;
- char path[300];
- char cert_path[1024] = "";
- char key_path[1024] = "";
- char ca_path[1024] = "";
- memset(&info, 0, sizeof info);
- lwsl_notice("libwebsockets test client - license LGPL2.1+SLE\n");
- lwsl_notice("(C) Copyright 2010-2016 Andy Green <andy@warmcat.com>\n");
- if (argc < 2)
- goto usage;
- while (n >= 0) {
- n = getopt_long(argc, argv, "Snuv:hsp:d:lC:K:A:P:mo", options, NULL);
- if (n < 0)
- continue;
- switch (n) {
- case 'd':
- lws_set_log_level(atoi(optarg), NULL);
- break;
- case 's': /* lax SSL, allow selfsigned, skip checking hostname */
- use_ssl = LCCSCF_USE_SSL |
- LCCSCF_ALLOW_SELFSIGNED |
- LCCSCF_SKIP_SERVER_CERT_HOSTNAME_CHECK;
- break;
- case 'S': /* Strict SSL, no selfsigned, check server hostname */
- use_ssl = LCCSCF_USE_SSL;
- break;
- case 'p':
- port = atoi(optarg);
- break;
- case 'P':
- pp_secs = atoi(optarg);
- lwsl_notice("Setting pingpong interval to %d\n", pp_secs);
- break;
- case 'l':
- longlived = 1;
- break;
- case 'v':
- ietf_version = atoi(optarg);
- break;
- case 'u':
- deny_deflate = 1;
- break;
- case 'm':
- do_multi = 1;
- break;
- case 'o':
- test_post = 1;
- break;
- case 'n':
- flag_no_mirror_traffic = 1;
- lwsl_notice("Disabled sending mirror data (for pingpong testing)\n");
- break;
- case 'C':
- strncpy(cert_path, optarg, sizeof(cert_path) - 1);
- cert_path[sizeof(cert_path) - 1] = '\0';
- break;
- case 'K':
- strncpy(key_path, optarg, sizeof(key_path) - 1);
- key_path[sizeof(key_path) - 1] = '\0';
- break;
- case 'A':
- strncpy(ca_path, optarg, sizeof(ca_path) - 1);
- ca_path[sizeof(ca_path) - 1] = '\0';
- break;
- #if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
- case 'R':
- strncpy(crl_path, optarg, sizeof(crl_path) - 1);
- crl_path[sizeof(crl_path) - 1] = '\0';
- break;
- #endif
- case 'h':
- goto usage;
- }
- }
- if (optind >= argc)
- goto usage;
- signal(SIGINT, sighandler);
- memset(&i, 0, sizeof(i));
- i.port = port;
- if (lws_parse_uri(argv[optind], &prot, &i.address, &i.port, &p))
- goto usage;
- /* add back the leading / on path */
- path[0] = '/';
- strncpy(path + 1, p, sizeof(path) - 2);
- path[sizeof(path) - 1] = '\0';
- i.path = path;
- if (!strcmp(prot, "http") || !strcmp(prot, "ws"))
- use_ssl = 0;
- if (!strcmp(prot, "https") || !strcmp(prot, "wss"))
- if (!use_ssl)
- use_ssl = LCCSCF_USE_SSL;
- /*
- * create the websockets context. This tracks open connections and
- * knows how to route any traffic and which protocol version to use,
- * and if each connection is client or server side.
- *
- * For this client-only demo, we tell it to not listen on any port.
- */
- info.port = CONTEXT_PORT_NO_LISTEN;
- info.protocols = protocols;
- info.gid = -1;
- info.uid = -1;
- info.ws_ping_pong_interval = pp_secs;
- info.extensions = exts;
- #if defined(LWS_OPENSSL_SUPPORT)
- info.options |= LWS_SERVER_OPTION_DO_SSL_GLOBAL_INIT;
- #endif
- if (use_ssl) {
- /*
- * If the server wants us to present a valid SSL client certificate
- * then we can set it up here.
- */
- if (cert_path[0])
- info.ssl_cert_filepath = cert_path;
- if (key_path[0])
- info.ssl_private_key_filepath = key_path;
- /*
- * A CA cert and CRL can be used to validate the cert send by the server
- */
- if (ca_path[0])
- info.ssl_ca_filepath = ca_path;
- #if defined(LWS_OPENSSL_SUPPORT) && defined(LWS_HAVE_SSL_CTX_set1_param)
- else if (crl_path[0])
- lwsl_notice("WARNING, providing a CRL requires a CA cert!\n");
- #endif
- }
- if (use_ssl & LCCSCF_USE_SSL)
- lwsl_notice(" Using SSL\n");
- else
- lwsl_notice(" SSL disabled\n");
- if (use_ssl & LCCSCF_ALLOW_SELFSIGNED)
- lwsl_notice(" Selfsigned certs allowed\n");
- else
- lwsl_notice(" Cert must validate correctly (use -s to allow selfsigned)\n");
- if (use_ssl & LCCSCF_SKIP_SERVER_CERT_HOSTNAME_CHECK)
- lwsl_notice(" Skipping peer cert hostname check\n");
- else
- lwsl_notice(" Requiring peer cert hostname matches\n");
- context = lws_create_context(&info);
- if (context == NULL) {
- fprintf(stderr, "Creating libwebsocket context failed\n");
- return 1;
- }
- i.context = context;
- i.ssl_connection = use_ssl;
- i.host = i.address;
- i.origin = i.address;
- i.ietf_version_or_minus_one = ietf_version;
- if (!strcmp(prot, "http") || !strcmp(prot, "https")) {
- lwsl_notice("using %s mode (non-ws)\n", prot);
- if (test_post) {
- i.method = "POST";
- lwsl_notice("POST mode\n");
- }
- else
- i.method = "GET";
- do_ws = 0;
- } else
- if (!strcmp(prot, "raw")) {
- i.method = "RAW";
- i.protocol = "lws-test-raw-client";
- lwsl_notice("using RAW mode connection\n");
- do_ws = 0;
- } else
- lwsl_notice("using %s mode (ws)\n", prot);
- /*
- * sit there servicing the websocket context to handle incoming
- * packets, and drawing random circles on the mirror protocol websocket
- *
- * nothing happens until the client websocket connection is
- * asynchronously established... calling lws_client_connect() only
- * instantiates the connection logically, lws_service() progresses it
- * asynchronously.
- */
- m = 0;
- while (!force_exit) {
- if (do_multi) {
- for (n = 0; n < ARRAY_SIZE(wsi_multi); n++) {
- if (!wsi_multi[n] && ratelimit_connects(&rl_multi[n], 2u)) {
- lwsl_notice("dumb %d: connecting\n", n);
- i.protocol = protocols[PROTOCOL_DUMB_INCREMENT].name;
- i.pwsi = &wsi_multi[n];
- lws_client_connect_via_info(&i);
- }
- }
- } else {
- if (do_ws) {
- if (!wsi_dumb && ratelimit_connects(&rl_dumb, 2u)) {
- lwsl_notice("dumb: connecting\n");
- i.protocol = protocols[PROTOCOL_DUMB_INCREMENT].name;
- i.pwsi = &wsi_dumb;
- lws_client_connect_via_info(&i);
- }
- if (!wsi_mirror && ratelimit_connects(&rl_mirror, 2u)) {
- lwsl_notice("mirror: connecting\n");
- i.protocol = protocols[PROTOCOL_LWS_MIRROR].name;
- i.pwsi = &wsi_mirror;
- wsi_mirror = lws_client_connect_via_info(&i);
- }
- } else
- if (!wsi_dumb && ratelimit_connects(&rl_dumb, 2u)) {
- lwsl_notice("http: connecting\n");
- i.pwsi = &wsi_dumb;
- lws_client_connect_via_info(&i);
- }
- }
- lws_service(context, 500);
- if (do_multi) {
- m++;
- if (m == 10) {
- m = 0;
- lwsl_notice("doing lws_callback_on_writable_all_protocol\n");
- lws_callback_on_writable_all_protocol(context, &protocols[PROTOCOL_DUMB_INCREMENT]);
- }
- }
- }
- lwsl_err("Exiting\n");
- lws_context_destroy(context);
- return ret;
- usage:
- fprintf(stderr, "Usage: libwebsockets-test-client "
- "<server address> [--port=<p>] "
- "[--ssl] [-k] [-v <ver>] "
- "[-d <log bitfield>] [-l]\n");
- return 1;
- }
|