You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1363 lines
51 KiB
1363 lines
51 KiB
/*
|
|
Copyright (c) 2013 250bpm s.r.o. All rights reserved.
|
|
Copyright (c) 2014 Wirebird Labs LLC. All rights reserved.
|
|
Copyright 2015 Garrett D'Amore <garrett@damore.org>
|
|
|
|
Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
of this software and associated documentation files (the "Software"),
|
|
to deal in the Software without restriction, including without limitation
|
|
the rights to use, copy, modify, merge, publish, distribute, sublicense,
|
|
and/or sell copies of the Software, and to permit persons to whom
|
|
the Software is furnished to do so, subject to the following conditions:
|
|
|
|
The above copyright notice and this permission notice shall be included
|
|
in all copies or substantial portions of the Software.
|
|
|
|
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
|
|
THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
|
|
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
|
|
IN THE SOFTWARE.
|
|
*/
|
|
|
|
#include "ws_handshake.h"
|
|
#include "sha1.h"
|
|
|
|
#include "../../aio/timer.h"
|
|
|
|
#include "../../core/sock.h"
|
|
|
|
#include "../utils/base64.h"
|
|
|
|
#include "../../utils/alloc.h"
|
|
#include "../../utils/err.h"
|
|
#include "../../utils/cont.h"
|
|
#include "../../utils/fast.h"
|
|
#include "../../utils/wire.h"
|
|
#include "../../utils/attr.h"
|
|
#include "../../utils/random.h"
|
|
|
|
#include <stddef.h>
|
|
#include <string.h>
|
|
#include <ctype.h>
|
|
|
|
/*****************************************************************************/
|
|
/*** BEGIN undesirable dependency *******************************************/
|
|
/*****************************************************************************/
|
|
/* TODO: A transport should be SP agnostic; alas, these includes are */
|
|
/* required for the map. Ideally, this map would live in another */
|
|
/* abstraction layer; perhaps a "registry" of Scalability Protocols? */
|
|
/*****************************************************************************/
|
|
#include "../../pair.h"
|
|
#include "../../reqrep.h"
|
|
#include "../../pubsub.h"
|
|
#include "../../survey.h"
|
|
#include "../../pipeline.h"
|
|
#include "../../bus.h"
|
|
|
|
static const struct nn_ws_sp_map NN_WS_HANDSHAKE_SP_MAP[] = {
|
|
{ NN_PAIR, NN_PAIR, "pair.sp.nanomsg.org" },
|
|
{ NN_REQ, NN_REP, "req.sp.nanomsg.org" },
|
|
{ NN_REP, NN_REQ, "rep.sp.nanomsg.org" },
|
|
{ NN_PUB, NN_SUB, "pub.sp.nanomsg.org" },
|
|
{ NN_SUB, NN_PUB, "sub.sp.nanomsg.org" },
|
|
{ NN_SURVEYOR, NN_RESPONDENT, "surveyor.sp.nanomsg.org" },
|
|
{ NN_RESPONDENT, NN_SURVEYOR, "respondent.sp.nanomsg.org" },
|
|
{ NN_PUSH, NN_PULL, "push.sp.nanomsg.org" },
|
|
{ NN_PULL, NN_PUSH, "pull.sp.nanomsg.org" },
|
|
{ NN_BUS, NN_BUS, "bus.sp.nanomsg.org" }
|
|
};
|
|
|
|
const size_t NN_WS_HANDSHAKE_SP_MAP_LEN = sizeof (NN_WS_HANDSHAKE_SP_MAP) /
|
|
sizeof (NN_WS_HANDSHAKE_SP_MAP [0]);
|
|
/*****************************************************************************/
|
|
/*** END undesirable dependency *********************************************/
|
|
/*****************************************************************************/
|
|
|
|
/* State machine finite states. */
|
|
#define NN_WS_HANDSHAKE_STATE_IDLE 1
|
|
#define NN_WS_HANDSHAKE_STATE_SERVER_RECV 2
|
|
#define NN_WS_HANDSHAKE_STATE_SERVER_REPLY 3
|
|
#define NN_WS_HANDSHAKE_STATE_CLIENT_SEND 4
|
|
#define NN_WS_HANDSHAKE_STATE_CLIENT_RECV 5
|
|
#define NN_WS_HANDSHAKE_STATE_HANDSHAKE_SENT 6
|
|
#define NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR 7
|
|
#define NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_DONE 8
|
|
#define NN_WS_HANDSHAKE_STATE_DONE 9
|
|
#define NN_WS_HANDSHAKE_STATE_STOPPING 10
|
|
|
|
/* Subordinate srcptr objects. */
|
|
#define NN_WS_HANDSHAKE_SRC_USOCK 1
|
|
#define NN_WS_HANDSHAKE_SRC_TIMER 2
|
|
|
|
/* Time allowed to complete handshake. */
|
|
#define NN_WS_HANDSHAKE_TIMEOUT 5000
|
|
|
|
/* Possible return codes internal to the parsing operations. */
|
|
#define NN_WS_HANDSHAKE_NOMATCH 0
|
|
#define NN_WS_HANDSHAKE_MATCH 1
|
|
|
|
/* Possible return codes from parsing opening handshake from peer. */
|
|
#define NN_WS_HANDSHAKE_VALID 0
|
|
#define NN_WS_HANDSHAKE_RECV_MORE 1
|
|
#define NN_WS_HANDSHAKE_INVALID -1
|
|
|
|
/* Possible handshake responses to send to client when acting as server. */
|
|
#define NN_WS_HANDSHAKE_RESPONSE_NULL -1
|
|
#define NN_WS_HANDSHAKE_RESPONSE_OK 0
|
|
#define NN_WS_HANDSHAKE_RESPONSE_TOO_BIG 1
|
|
#define NN_WS_HANDSHAKE_RESPONSE_UNUSED2 2
|
|
#define NN_WS_HANDSHAKE_RESPONSE_WSPROTO 3
|
|
#define NN_WS_HANDSHAKE_RESPONSE_WSVERSION 4
|
|
#define NN_WS_HANDSHAKE_RESPONSE_NNPROTO 5
|
|
#define NN_WS_HANDSHAKE_RESPONSE_NOTPEER 6
|
|
#define NN_WS_HANDSHAKE_RESPONSE_UNKNOWNTYPE 7
|
|
|
|
/* Private functions. */
|
|
static void nn_ws_handshake_handler (struct nn_fsm *self, int src, int type,
|
|
void *srcptr);
|
|
static void nn_ws_handshake_shutdown (struct nn_fsm *self, int src, int type,
|
|
void *srcptr);
|
|
static void nn_ws_handshake_leave (struct nn_ws_handshake *self, int rc);
|
|
|
|
/* WebSocket protocol support functions. */
|
|
static int nn_ws_handshake_parse_client_opening (struct nn_ws_handshake *self);
|
|
static void nn_ws_handshake_server_reply (struct nn_ws_handshake *self);
|
|
static void nn_ws_handshake_client_request (struct nn_ws_handshake *self);
|
|
static int nn_ws_handshake_parse_server_response (struct nn_ws_handshake *self);
|
|
static int nn_ws_handshake_hash_key (const char *key, size_t key_len,
|
|
char *hashed, size_t hashed_len);
|
|
|
|
/* String parsing support functions. */
|
|
|
|
/* Scans for reference token against subject string, optionally ignoring
|
|
case sensitivity and/or leading spaces in subject. On match, advances
|
|
the subject pointer to the next non-ignored character past match. Both
|
|
strings must be NULL terminated to avoid undefined behavior. Returns
|
|
NN_WS_HANDSHAKE_MATCH on match; else, NN_WS_HANDSHAKE_NOMATCH. */
|
|
static int nn_ws_match_token (const char* token, const char **subj,
|
|
int case_insensitive, int ignore_leading_sp);
|
|
|
|
/* Scans subject string for termination sequence, optionally ignoring
|
|
leading and/or trailing spaces in subject. On match, advances
|
|
the subject pointer to the next character past match. Both
|
|
strings must be NULL terminated to avoid undefined behavior. If the
|
|
match succeeds, values are stored into *addr and *len. */
|
|
static int nn_ws_match_value (const char* termseq, const char **subj,
|
|
int ignore_leading_sp, int ignore_trailing_sp, const char **addr,
|
|
size_t* const len);
|
|
|
|
/* Compares subject octet stream to expected value, optionally ignoring
|
|
case sensitivity. Returns non-zero on success, zero on failure. */
|
|
static int nn_ws_validate_value (const char* expected, const char *subj,
|
|
size_t subj_len, int case_insensitive);
|
|
|
|
void nn_ws_handshake_init (struct nn_ws_handshake *self, int src,
|
|
struct nn_fsm *owner)
|
|
{
|
|
nn_fsm_init (&self->fsm, nn_ws_handshake_handler, nn_ws_handshake_shutdown,
|
|
src, self, owner);
|
|
self->state = NN_WS_HANDSHAKE_STATE_IDLE;
|
|
nn_timer_init (&self->timer, NN_WS_HANDSHAKE_SRC_TIMER, &self->fsm);
|
|
nn_fsm_event_init (&self->done);
|
|
self->timeout = NN_WS_HANDSHAKE_TIMEOUT;
|
|
self->usock = NULL;
|
|
self->usock_owner.src = -1;
|
|
self->usock_owner.fsm = NULL;
|
|
self->pipebase = NULL;
|
|
}
|
|
|
|
void nn_ws_handshake_term (struct nn_ws_handshake *self)
|
|
{
|
|
nn_assert_state (self, NN_WS_HANDSHAKE_STATE_IDLE);
|
|
|
|
nn_fsm_event_term (&self->done);
|
|
nn_timer_term (&self->timer);
|
|
nn_fsm_term (&self->fsm);
|
|
}
|
|
|
|
int nn_ws_handshake_isidle (struct nn_ws_handshake *self)
|
|
{
|
|
return nn_fsm_isidle (&self->fsm);
|
|
}
|
|
|
|
void nn_ws_handshake_start (struct nn_ws_handshake *self,
|
|
struct nn_usock *usock, struct nn_pipebase *pipebase,
|
|
int mode, const char *resource, const char *host)
|
|
{
|
|
/* It's expected this resource has been allocated during intial connect. */
|
|
if (mode == NN_WS_CLIENT)
|
|
nn_assert (strlen (resource) >= 1);
|
|
|
|
/* Take ownership of the underlying socket. */
|
|
nn_assert (self->usock == NULL && self->usock_owner.fsm == NULL);
|
|
self->usock_owner.src = NN_WS_HANDSHAKE_SRC_USOCK;
|
|
self->usock_owner.fsm = &self->fsm;
|
|
nn_usock_swap_owner (usock, &self->usock_owner);
|
|
self->usock = usock;
|
|
self->pipebase = pipebase;
|
|
self->mode = mode;
|
|
self->resource = resource;
|
|
self->remote_host = host;
|
|
|
|
memset (self->opening_hs, 0, sizeof (self->opening_hs));
|
|
memset (self->response, 0, sizeof (self->response));
|
|
|
|
self->recv_pos = 0;
|
|
self->retries = 0;
|
|
|
|
/* Calculate the absolute minimum length possible for a valid opening
|
|
handshake. This is an optimization since we must poll for the
|
|
remainder of the opening handshake in small byte chunks. */
|
|
switch (self->mode) {
|
|
case NN_WS_SERVER:
|
|
self->recv_len = strlen (
|
|
"GET x HTTP/1.1\r\n"
|
|
"Upgrade: websocket\r\n"
|
|
"Connection: Upgrade\r\n"
|
|
"Host: x\r\n"
|
|
"Origin: x\r\n"
|
|
"Sec-WebSocket-Key: xxxxxxxxxxxxxxxxxxxxxxxx\r\n"
|
|
"Sec-WebSocket-Version: xx\r\n\r\n");
|
|
break;
|
|
case NN_WS_CLIENT:
|
|
/* Shortest conceiveable response from server is a terse status. */
|
|
self->recv_len = strlen ("HTTP/1.1 xxx\r\n\r\n");
|
|
break;
|
|
default:
|
|
/* Developer error; unexpected mode. */
|
|
nn_assert (0);
|
|
break;
|
|
}
|
|
|
|
/* Launch the state machine. */
|
|
nn_fsm_start (&self->fsm);
|
|
}
|
|
|
|
void nn_ws_handshake_stop (struct nn_ws_handshake *self)
|
|
{
|
|
nn_fsm_stop (&self->fsm);
|
|
}
|
|
|
|
static void nn_ws_handshake_shutdown (struct nn_fsm *self, int src, int type,
|
|
NN_UNUSED void *srcptr)
|
|
{
|
|
struct nn_ws_handshake *handshaker;
|
|
|
|
handshaker = nn_cont (self, struct nn_ws_handshake, fsm);
|
|
|
|
if (nn_slow (src == NN_FSM_ACTION && type == NN_FSM_STOP)) {
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING;
|
|
}
|
|
if (nn_slow (handshaker->state == NN_WS_HANDSHAKE_STATE_STOPPING)) {
|
|
if (!nn_timer_isidle (&handshaker->timer))
|
|
return;
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_IDLE;
|
|
nn_fsm_stopped (&handshaker->fsm, NN_WS_HANDSHAKE_STOPPED);
|
|
return;
|
|
}
|
|
|
|
nn_fsm_bad_state (handshaker->state, src, type);
|
|
}
|
|
|
|
static int nn_ws_match_token (const char* token, const char **subj,
|
|
int case_insensitive, int ignore_leading_sp)
|
|
{
|
|
const char *pos;
|
|
|
|
nn_assert (token && *subj);
|
|
|
|
pos = *subj;
|
|
|
|
if (ignore_leading_sp) {
|
|
while (*pos == '\x20' && *pos) {
|
|
pos++;
|
|
}
|
|
}
|
|
|
|
if (case_insensitive) {
|
|
while (*token && *pos) {
|
|
if (tolower ((uint32_t)*token) != tolower ((uint32_t)*pos))
|
|
return NN_WS_HANDSHAKE_NOMATCH;
|
|
token++;
|
|
pos++;
|
|
}
|
|
}
|
|
else {
|
|
while (*token && *pos) {
|
|
if (*token != *pos)
|
|
return NN_WS_HANDSHAKE_NOMATCH;
|
|
token++;
|
|
pos++;
|
|
}
|
|
}
|
|
|
|
/* Encountered end of subject before matching completed. */
|
|
if (!*pos && *token)
|
|
return NN_WS_HANDSHAKE_NOMATCH;
|
|
|
|
/* Entire token has been matched. */
|
|
nn_assert (!*token);
|
|
|
|
/* On success, advance subject position. */
|
|
*subj = pos;
|
|
|
|
return NN_WS_HANDSHAKE_MATCH;
|
|
}
|
|
|
|
static int nn_ws_match_value (const char* termseq, const char **subj,
|
|
int ignore_leading_sp, int ignore_trailing_sp, const char **addr,
|
|
size_t* const len)
|
|
{
|
|
const char *start;
|
|
const char *end;
|
|
|
|
nn_assert (termseq && *subj);
|
|
|
|
start = *subj;
|
|
if (addr)
|
|
*addr = NULL;
|
|
if (len)
|
|
*len = 0;
|
|
|
|
/* Find first occurence of termination sequence. */
|
|
end = strstr (start, termseq);
|
|
|
|
/* Was a termination sequence found? */
|
|
if (end) {
|
|
*subj = end + strlen (termseq);
|
|
}
|
|
else {
|
|
return NN_WS_HANDSHAKE_NOMATCH;
|
|
}
|
|
|
|
if (ignore_leading_sp) {
|
|
while (*start == '\x20' && start < end) {
|
|
start++;
|
|
}
|
|
}
|
|
|
|
if (addr)
|
|
*addr = start;
|
|
|
|
/* In this special case, the value was "found", but is just empty or
|
|
ignored space. */
|
|
if (start == end)
|
|
return NN_WS_HANDSHAKE_MATCH;
|
|
|
|
if (ignore_trailing_sp) {
|
|
while (*(end - 1) == '\x20' && start < end) {
|
|
end--;
|
|
}
|
|
}
|
|
|
|
if (len)
|
|
*len = end - start;
|
|
|
|
return NN_WS_HANDSHAKE_MATCH;
|
|
}
|
|
|
|
static int nn_ws_validate_value (const char* expected, const char *subj,
|
|
size_t subj_len, int case_insensitive)
|
|
{
|
|
if (strlen (expected) != subj_len)
|
|
return NN_WS_HANDSHAKE_NOMATCH;
|
|
|
|
if (case_insensitive) {
|
|
while (*expected && *subj) {
|
|
if (tolower ((uint32_t)*expected) != tolower ((uint32_t)*subj))
|
|
return NN_WS_HANDSHAKE_NOMATCH;
|
|
expected++;
|
|
subj++;
|
|
}
|
|
}
|
|
else {
|
|
while (*expected && *subj) {
|
|
if (*expected != *subj)
|
|
return NN_WS_HANDSHAKE_NOMATCH;
|
|
expected++;
|
|
subj++;
|
|
}
|
|
}
|
|
|
|
return NN_WS_HANDSHAKE_MATCH;
|
|
}
|
|
|
|
static void nn_ws_handshake_handler (struct nn_fsm *self, int src, int type,
|
|
NN_UNUSED void *srcptr)
|
|
{
|
|
struct nn_ws_handshake *handshaker;
|
|
|
|
unsigned i;
|
|
|
|
handshaker = nn_cont (self, struct nn_ws_handshake, fsm);
|
|
|
|
switch (handshaker->state) {
|
|
|
|
/******************************************************************************/
|
|
/* IDLE state. */
|
|
/******************************************************************************/
|
|
case NN_WS_HANDSHAKE_STATE_IDLE:
|
|
switch (src) {
|
|
|
|
case NN_FSM_ACTION:
|
|
switch (type) {
|
|
case NN_FSM_START:
|
|
nn_assert (handshaker->recv_pos == 0);
|
|
nn_assert (handshaker->recv_len >= NN_WS_HANDSHAKE_TERMSEQ_LEN);
|
|
|
|
nn_timer_start (&handshaker->timer, handshaker->timeout);
|
|
|
|
switch (handshaker->mode) {
|
|
case NN_WS_CLIENT:
|
|
/* Send opening handshake to server. */
|
|
nn_assert (handshaker->recv_len <=
|
|
sizeof (handshaker->response));
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_CLIENT_SEND;
|
|
nn_ws_handshake_client_request (handshaker);
|
|
return;
|
|
case NN_WS_SERVER:
|
|
/* Begin receiving opening handshake from client. */
|
|
nn_assert (handshaker->recv_len <=
|
|
sizeof (handshaker->opening_hs));
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_SERVER_RECV;
|
|
nn_usock_recv (handshaker->usock, handshaker->opening_hs,
|
|
handshaker->recv_len, NULL);
|
|
return;
|
|
default:
|
|
/* Unexpected mode. */
|
|
nn_assert (0);
|
|
return;
|
|
}
|
|
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
default:
|
|
nn_fsm_bad_source (handshaker->state, src, type);
|
|
}
|
|
|
|
/******************************************************************************/
|
|
/* SERVER_RECV state. */
|
|
/******************************************************************************/
|
|
case NN_WS_HANDSHAKE_STATE_SERVER_RECV:
|
|
switch (src) {
|
|
|
|
case NN_WS_HANDSHAKE_SRC_USOCK:
|
|
switch (type) {
|
|
case NN_USOCK_RECEIVED:
|
|
/* Parse bytes received thus far. */
|
|
switch (nn_ws_handshake_parse_client_opening (handshaker)) {
|
|
case NN_WS_HANDSHAKE_INVALID:
|
|
/* Opening handshake parsed successfully but does not
|
|
contain valid values. Respond failure to client. */
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_SERVER_REPLY;
|
|
nn_ws_handshake_server_reply (handshaker);
|
|
return;
|
|
case NN_WS_HANDSHAKE_VALID:
|
|
/* Opening handshake parsed successfully, and is valid.
|
|
Respond success to client. */
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_SERVER_REPLY;
|
|
nn_ws_handshake_server_reply (handshaker);
|
|
return;
|
|
case NN_WS_HANDSHAKE_RECV_MORE:
|
|
/* Not enough bytes have been received to determine
|
|
validity; remain in the receive state, and retrieve
|
|
more bytes from client. */
|
|
handshaker->recv_pos += handshaker->recv_len;
|
|
|
|
/* Validate the previous recv operation. */
|
|
nn_assert (handshaker->recv_pos <
|
|
sizeof (handshaker->opening_hs));
|
|
|
|
/* Ensure we can back-track at least the length of the
|
|
termination sequence to determine how many bytes to
|
|
receive on the next retry. This is an assertion, not
|
|
a conditional, since under no condition is it
|
|
necessary to initially receive so few bytes. */
|
|
nn_assert (handshaker->recv_pos >=
|
|
(int) NN_WS_HANDSHAKE_TERMSEQ_LEN);
|
|
|
|
/* We only compare if we have at least one byte to
|
|
compare against. When i drops to zero, it means
|
|
we don't have any bytes to match against, and it is
|
|
automatically true. */
|
|
for (i = NN_WS_HANDSHAKE_TERMSEQ_LEN; i > 0; i--) {
|
|
if (memcmp (NN_WS_HANDSHAKE_TERMSEQ,
|
|
handshaker->opening_hs + handshaker->recv_pos - i,
|
|
i) == 0) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
nn_assert (i < NN_WS_HANDSHAKE_TERMSEQ_LEN);
|
|
|
|
handshaker->recv_len = NN_WS_HANDSHAKE_TERMSEQ_LEN - i;
|
|
|
|
/* In the unlikely case the client would overflow what we
|
|
assumed was a sufficiently-large buffer to receive the
|
|
handshake, we fail the client. */
|
|
if (handshaker->recv_len + handshaker->recv_pos >
|
|
sizeof (handshaker->opening_hs)) {
|
|
handshaker->response_code =
|
|
NN_WS_HANDSHAKE_RESPONSE_TOO_BIG;
|
|
handshaker->state =
|
|
NN_WS_HANDSHAKE_STATE_SERVER_REPLY;
|
|
nn_ws_handshake_server_reply (handshaker);
|
|
}
|
|
else {
|
|
handshaker->retries++;
|
|
nn_usock_recv (handshaker->usock,
|
|
handshaker->opening_hs + handshaker->recv_pos,
|
|
handshaker->recv_len, NULL);
|
|
}
|
|
return;
|
|
default:
|
|
nn_fsm_error ("Unexpected handshake result",
|
|
handshaker->state, src, type);
|
|
}
|
|
return;
|
|
case NN_USOCK_SHUTDOWN:
|
|
/* Ignore it and wait for ERROR event. */
|
|
return;
|
|
case NN_USOCK_ERROR:
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR;
|
|
return;
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
case NN_WS_HANDSHAKE_SRC_TIMER:
|
|
switch (type) {
|
|
case NN_TIMER_TIMEOUT:
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR;
|
|
return;
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
default:
|
|
nn_fsm_bad_source (handshaker->state, src, type);
|
|
}
|
|
|
|
/******************************************************************************/
|
|
/* SERVER_REPLY state. */
|
|
/******************************************************************************/
|
|
case NN_WS_HANDSHAKE_STATE_SERVER_REPLY:
|
|
switch (src) {
|
|
|
|
case NN_WS_HANDSHAKE_SRC_USOCK:
|
|
switch (type) {
|
|
case NN_USOCK_SENT:
|
|
/* As per RFC 6455 4.2.2, the handshake is now complete
|
|
and the connection is immediately ready for send/recv. */
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_DONE;
|
|
case NN_USOCK_SHUTDOWN:
|
|
/* Ignore it and wait for ERROR event. */
|
|
return;
|
|
case NN_USOCK_ERROR:
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR;
|
|
return;
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
case NN_WS_HANDSHAKE_SRC_TIMER:
|
|
switch (type) {
|
|
case NN_TIMER_TIMEOUT:
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR;
|
|
return;
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
default:
|
|
nn_fsm_bad_source (handshaker->state, src, type);
|
|
}
|
|
|
|
/******************************************************************************/
|
|
/* CLIENT_SEND state. */
|
|
/******************************************************************************/
|
|
case NN_WS_HANDSHAKE_STATE_CLIENT_SEND:
|
|
switch (src) {
|
|
|
|
case NN_WS_HANDSHAKE_SRC_USOCK:
|
|
switch (type) {
|
|
case NN_USOCK_SENT:
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_CLIENT_RECV;
|
|
nn_usock_recv (handshaker->usock, handshaker->response,
|
|
handshaker->recv_len, NULL);
|
|
return;
|
|
case NN_USOCK_SHUTDOWN:
|
|
/* Ignore it and wait for ERROR event. */
|
|
return;
|
|
case NN_USOCK_ERROR:
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR;
|
|
return;
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
case NN_WS_HANDSHAKE_SRC_TIMER:
|
|
switch (type) {
|
|
case NN_TIMER_TIMEOUT:
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR;
|
|
return;
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
default:
|
|
nn_fsm_bad_source (handshaker->state, src, type);
|
|
}
|
|
|
|
/******************************************************************************/
|
|
/* CLIENT_RECV state. */
|
|
/******************************************************************************/
|
|
case NN_WS_HANDSHAKE_STATE_CLIENT_RECV:
|
|
switch (src) {
|
|
|
|
case NN_WS_HANDSHAKE_SRC_USOCK:
|
|
switch (type) {
|
|
case NN_USOCK_RECEIVED:
|
|
/* Parse bytes received thus far. */
|
|
switch (nn_ws_handshake_parse_server_response (handshaker)) {
|
|
case NN_WS_HANDSHAKE_INVALID:
|
|
/* Opening handshake parsed successfully but does not
|
|
contain valid values. Fail connection. */
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state =
|
|
NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR;
|
|
return;
|
|
case NN_WS_HANDSHAKE_VALID:
|
|
/* As per RFC 6455 4.2.2, the handshake is now complete
|
|
and the connection is immediately ready for send/recv. */
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_DONE;
|
|
return;
|
|
case NN_WS_HANDSHAKE_RECV_MORE:
|
|
/* Not enough bytes have been received to determine
|
|
validity; remain in the receive state, and retrieve
|
|
more bytes from client. */
|
|
handshaker->recv_pos += handshaker->recv_len;
|
|
|
|
/* Validate the previous recv operation. */
|
|
nn_assert (handshaker->recv_pos <
|
|
sizeof (handshaker->response));
|
|
|
|
/* Ensure we can back-track at least the length of the
|
|
termination sequence to determine how many bytes to
|
|
receive on the next retry. This is an assertion, not
|
|
a conditional, since under no condition is it
|
|
necessary to initially receive so few bytes. */
|
|
nn_assert (handshaker->recv_pos >=
|
|
(int) NN_WS_HANDSHAKE_TERMSEQ_LEN);
|
|
|
|
/* If i goes to 0, it no need to compare. */
|
|
for (i = NN_WS_HANDSHAKE_TERMSEQ_LEN; i > 0; i--) {
|
|
if (memcmp (NN_WS_HANDSHAKE_TERMSEQ,
|
|
handshaker->response + handshaker->recv_pos - i,
|
|
i) == 0) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
nn_assert (i < NN_WS_HANDSHAKE_TERMSEQ_LEN);
|
|
|
|
handshaker->recv_len = NN_WS_HANDSHAKE_TERMSEQ_LEN - i;
|
|
|
|
/* In the unlikely case the client would overflow what we
|
|
assumed was a sufficiently-large buffer to receive the
|
|
handshake, we fail the connection. */
|
|
if (handshaker->recv_len + handshaker->recv_pos >
|
|
sizeof (handshaker->response)) {
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state =
|
|
NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR;
|
|
}
|
|
else {
|
|
handshaker->retries++;
|
|
nn_usock_recv (handshaker->usock,
|
|
handshaker->response + handshaker->recv_pos,
|
|
handshaker->recv_len, NULL);
|
|
}
|
|
return;
|
|
default:
|
|
nn_fsm_error ("Unexpected handshake result",
|
|
handshaker->state, src, type);
|
|
}
|
|
return;
|
|
case NN_USOCK_SHUTDOWN:
|
|
/* Ignore it and wait for ERROR event. */
|
|
return;
|
|
case NN_USOCK_ERROR:
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR;
|
|
return;
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
case NN_WS_HANDSHAKE_SRC_TIMER:
|
|
switch (type) {
|
|
case NN_TIMER_TIMEOUT:
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR;
|
|
return;
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
default:
|
|
nn_fsm_bad_source (handshaker->state, src, type);
|
|
}
|
|
|
|
/******************************************************************************/
|
|
/* HANDSHAKE_SENT state. */
|
|
/******************************************************************************/
|
|
case NN_WS_HANDSHAKE_STATE_HANDSHAKE_SENT:
|
|
switch (src) {
|
|
|
|
case NN_WS_HANDSHAKE_SRC_USOCK:
|
|
switch (type) {
|
|
case NN_USOCK_SENT:
|
|
/* As per RFC 6455 4.2.2, the handshake is now complete
|
|
and the connection is immediately ready for send/recv. */
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_DONE;
|
|
return;
|
|
case NN_USOCK_SHUTDOWN:
|
|
/* Ignore it and wait for ERROR event. */
|
|
return;
|
|
case NN_USOCK_ERROR:
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR;
|
|
return;
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
case NN_WS_HANDSHAKE_SRC_TIMER:
|
|
switch (type) {
|
|
case NN_TIMER_TIMEOUT:
|
|
nn_timer_stop (&handshaker->timer);
|
|
handshaker->state = NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR;
|
|
return;
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
default:
|
|
nn_fsm_bad_source (handshaker->state, src, type);
|
|
}
|
|
|
|
/******************************************************************************/
|
|
/* STOPPING_TIMER_ERROR state. */
|
|
/******************************************************************************/
|
|
case NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_ERROR:
|
|
switch (src) {
|
|
|
|
case NN_WS_HANDSHAKE_SRC_USOCK:
|
|
/* Ignore. The only circumstance the client would send bytes is
|
|
to notify the server it is closing the connection. Wait for the
|
|
socket to eventually error. */
|
|
return;
|
|
|
|
case NN_WS_HANDSHAKE_SRC_TIMER:
|
|
switch (type) {
|
|
case NN_TIMER_STOPPED:
|
|
nn_ws_handshake_leave (handshaker, NN_WS_HANDSHAKE_ERROR);
|
|
return;
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
default:
|
|
nn_fsm_bad_source (handshaker->state, src, type);
|
|
}
|
|
|
|
/******************************************************************************/
|
|
/* STOPPING_TIMER_DONE state. */
|
|
/******************************************************************************/
|
|
case NN_WS_HANDSHAKE_STATE_STOPPING_TIMER_DONE:
|
|
switch (src) {
|
|
|
|
case NN_WS_HANDSHAKE_SRC_USOCK:
|
|
/* Ignore. The only circumstance the client would send bytes is
|
|
to notify the server it is closing the connection. Wait for the
|
|
socket to eventually error. */
|
|
return;
|
|
|
|
case NN_WS_HANDSHAKE_SRC_TIMER:
|
|
switch (type) {
|
|
case NN_TIMER_STOPPED:
|
|
nn_ws_handshake_leave (handshaker, NN_WS_HANDSHAKE_OK);
|
|
return;
|
|
default:
|
|
nn_fsm_bad_action (handshaker->state, src, type);
|
|
}
|
|
|
|
default:
|
|
nn_fsm_bad_source (handshaker->state, src, type);
|
|
}
|
|
|
|
/******************************************************************************/
|
|
/* DONE state. */
|
|
/* The header exchange was either done successfully of failed. There's */
|
|
/* nothing that can be done in this state except stopping the object. */
|
|
/******************************************************************************/
|
|
case NN_WS_HANDSHAKE_STATE_DONE:
|
|
nn_fsm_bad_source (handshaker->state, src, type);
|
|
|
|
/******************************************************************************/
|
|
/* Invalid state. */
|
|
/******************************************************************************/
|
|
default:
|
|
nn_fsm_bad_state (handshaker->state, src, type);
|
|
}
|
|
}
|
|
|
|
/******************************************************************************/
|
|
/* State machine actions. */
|
|
/******************************************************************************/
|
|
|
|
static void nn_ws_handshake_leave (struct nn_ws_handshake *self, int rc)
|
|
{
|
|
nn_usock_swap_owner (self->usock, &self->usock_owner);
|
|
self->usock = NULL;
|
|
self->usock_owner.src = -1;
|
|
self->usock_owner.fsm = NULL;
|
|
self->state = NN_WS_HANDSHAKE_STATE_DONE;
|
|
nn_fsm_raise (&self->fsm, &self->done, rc);
|
|
}
|
|
|
|
static int nn_ws_handshake_parse_client_opening (struct nn_ws_handshake *self)
|
|
{
|
|
/* As per RFC 6455 section 1.7, this parser is not intended to be a
|
|
general-purpose parser for arbitrary HTTP headers. As with the design
|
|
philosophy of nanomsg, application-specific exchanges are better
|
|
reserved for accepted connections, not as fields within these
|
|
headers. */
|
|
|
|
int rc;
|
|
const char *pos;
|
|
unsigned i;
|
|
|
|
/* Guarantee that a NULL terminator exists to enable treating this
|
|
recv buffer like a string. */
|
|
nn_assert (memchr (self->opening_hs, '\0', sizeof (self->opening_hs)));
|
|
|
|
/* Having found the NULL terminator, from this point forward string
|
|
functions may be used. */
|
|
nn_assert (strlen (self->opening_hs) < sizeof (self->opening_hs));
|
|
|
|
pos = self->opening_hs;
|
|
|
|
/* Is the opening handshake from the client fully received? */
|
|
if (!strstr (pos, NN_WS_HANDSHAKE_TERMSEQ))
|
|
return NN_WS_HANDSHAKE_RECV_MORE;
|
|
|
|
self->host = NULL;
|
|
self->origin = NULL;
|
|
self->key = NULL;
|
|
self->upgrade = NULL;
|
|
self->conn = NULL;
|
|
self->version = NULL;
|
|
self->protocol = NULL;
|
|
self->uri = NULL;
|
|
|
|
self->host_len = 0;
|
|
self->origin_len = 0;
|
|
self->key_len = 0;
|
|
self->upgrade_len = 0;
|
|
self->conn_len = 0;
|
|
self->version_len = 0;
|
|
self->protocol_len = 0;
|
|
self->uri_len = 0;
|
|
|
|
/* This function, if generating a return value that triggers
|
|
a response to the client, should replace this sentinel value
|
|
with a proper response code. */
|
|
self->response_code = NN_WS_HANDSHAKE_RESPONSE_NULL;
|
|
|
|
/* RFC 7230 3.1.1 Request Line: HTTP Method
|
|
Note requirement of one space and case sensitivity. */
|
|
if (!nn_ws_match_token ("GET\x20", &pos, 0, 0))
|
|
return NN_WS_HANDSHAKE_RECV_MORE;
|
|
|
|
/* RFC 7230 3.1.1 Request Line: Requested Resource. */
|
|
if (!nn_ws_match_value ("\x20", &pos, 0, 0, &self->uri, &self->uri_len))
|
|
return NN_WS_HANDSHAKE_RECV_MORE;
|
|
|
|
/* RFC 7230 3.1.1 Request Line: HTTP version. Note case sensitivity. */
|
|
if (!nn_ws_match_token ("HTTP/1.1", &pos, 0, 0))
|
|
return NN_WS_HANDSHAKE_RECV_MORE;
|
|
if (!nn_ws_match_token (NN_WS_HANDSHAKE_CRLF, &pos, 0, 0))
|
|
return NN_WS_HANDSHAKE_RECV_MORE;
|
|
|
|
/* It's expected the current position is now at the first
|
|
header field. Match them one by one. */
|
|
while (strlen (pos))
|
|
{
|
|
if (nn_ws_match_token ("Host:", &pos, 1, 0)) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->host, &self->host_len);
|
|
}
|
|
else if (nn_ws_match_token ("Origin:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->origin, &self->origin_len);
|
|
}
|
|
else if (nn_ws_match_token ("Sec-WebSocket-Key:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->key, &self->key_len);
|
|
}
|
|
else if (nn_ws_match_token ("Upgrade:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->upgrade, &self->upgrade_len);
|
|
}
|
|
else if (nn_ws_match_token ("Connection:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->conn, &self->conn_len);
|
|
}
|
|
else if (nn_ws_match_token ("Sec-WebSocket-Version:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->version, &self->version_len);
|
|
}
|
|
else if (nn_ws_match_token ("Sec-WebSocket-Protocol:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->protocol, &self->protocol_len);
|
|
}
|
|
else if (nn_ws_match_token ("Sec-WebSocket-Extensions:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->extensions, &self->extensions_len);
|
|
}
|
|
else if (nn_ws_match_token (NN_WS_HANDSHAKE_CRLF,
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
/* Exit loop since all headers are parsed. */
|
|
break;
|
|
}
|
|
else {
|
|
/* Skip unknown headers. */
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
NULL, NULL);
|
|
}
|
|
|
|
if (rc != NN_WS_HANDSHAKE_MATCH)
|
|
return NN_WS_HANDSHAKE_RECV_MORE;
|
|
}
|
|
|
|
/* Validate the opening handshake is now fully parsed. Additionally,
|
|
as per RFC 6455 section 4.1, the client should not send additional data
|
|
after the opening handshake, so this assertion validates upstream recv
|
|
logic prevented this case. */
|
|
nn_assert (strlen (pos) == 0);
|
|
|
|
/* TODO: protocol expectations below this point are hard-coded here as
|
|
an initial design decision. Perhaps in the future these values should
|
|
be settable via compile time (or run-time socket) options? */
|
|
|
|
/* These header fields are required as per RFC 6455 section 4.1. */
|
|
if (!self->host || !self->upgrade || !self->conn ||
|
|
!self->key || !self->version) {
|
|
self->response_code = NN_WS_HANDSHAKE_RESPONSE_WSPROTO;
|
|
return NN_WS_HANDSHAKE_INVALID;
|
|
}
|
|
|
|
/* RFC 6455 section 4.2.1.6 (version December 2011). */
|
|
if (nn_ws_validate_value ("13", self->version,
|
|
self->version_len, 1) != NN_WS_HANDSHAKE_MATCH) {
|
|
self->response_code = NN_WS_HANDSHAKE_RESPONSE_WSVERSION;
|
|
return NN_WS_HANDSHAKE_INVALID;
|
|
}
|
|
|
|
/* RFC 6455 section 4.2.1.3 (version December 2011). */
|
|
if (nn_ws_validate_value ("websocket", self->upgrade,
|
|
self->upgrade_len, 1) != NN_WS_HANDSHAKE_MATCH) {
|
|
self->response_code = NN_WS_HANDSHAKE_RESPONSE_WSPROTO;
|
|
return NN_WS_HANDSHAKE_INVALID;
|
|
}
|
|
|
|
/* RFC 6455 section 4.2.1.4 (version December 2011). */
|
|
if (nn_ws_validate_value ("Upgrade", self->conn,
|
|
self->conn_len, 1) != NN_WS_HANDSHAKE_MATCH) {
|
|
self->response_code = NN_WS_HANDSHAKE_RESPONSE_WSPROTO;
|
|
return NN_WS_HANDSHAKE_INVALID;
|
|
}
|
|
|
|
/* At this point, client meets RFC 6455 compliance for opening handshake.
|
|
Now it's time to check nanomsg-imposed required handshake values. */
|
|
if (self->protocol) {
|
|
/* Ensure the client SP is a compatible socket type. */
|
|
for (i = 0; i < NN_WS_HANDSHAKE_SP_MAP_LEN; i++) {
|
|
if (nn_ws_validate_value (NN_WS_HANDSHAKE_SP_MAP [i].ws_sp,
|
|
self->protocol, self->protocol_len, 1)) {
|
|
|
|
if (self->pipebase->sock->socktype->protocol ==
|
|
NN_WS_HANDSHAKE_SP_MAP [i].server) {
|
|
self->response_code = NN_WS_HANDSHAKE_RESPONSE_OK;
|
|
return NN_WS_HANDSHAKE_VALID;
|
|
}
|
|
else {
|
|
self->response_code = NN_WS_HANDSHAKE_RESPONSE_NOTPEER;
|
|
return NN_WS_HANDSHAKE_INVALID;
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
self->response_code = NN_WS_HANDSHAKE_RESPONSE_UNKNOWNTYPE;
|
|
return NN_WS_HANDSHAKE_INVALID;
|
|
}
|
|
else {
|
|
/* Be permissive and generous here, assuming that if a protocol is
|
|
not explicitly declared, PAIR is presumed. This enables
|
|
interoperability with non-nanomsg remote peers, nominally by
|
|
making the local socket PAIR type. For any other local
|
|
socket type, we expect connection to be rejected as
|
|
incompatible if the header is not specified. */
|
|
|
|
if (nn_pipebase_ispeer (self->pipebase, NN_PAIR)) {
|
|
self->response_code = NN_WS_HANDSHAKE_RESPONSE_OK;
|
|
return NN_WS_HANDSHAKE_VALID;
|
|
}
|
|
else {
|
|
self->response_code = NN_WS_HANDSHAKE_RESPONSE_NOTPEER;
|
|
return NN_WS_HANDSHAKE_INVALID;
|
|
}
|
|
}
|
|
}
|
|
|
|
static int nn_ws_handshake_parse_server_response (struct nn_ws_handshake *self)
|
|
{
|
|
/* As per RFC 6455 section 1.7, this parser is not intended to be a
|
|
general-purpose parser for arbitrary HTTP headers. As with the design
|
|
philosophy of nanomsg, application-specific exchanges are better
|
|
reserved for accepted connections, not as fields within these
|
|
headers. */
|
|
|
|
int rc;
|
|
const char *pos;
|
|
|
|
/* Guarantee that a NULL terminator exists to enable treating this
|
|
recv buffer like a string. The lack of such would indicate a failure
|
|
upstream to catch a buffer overflow. */
|
|
nn_assert (memchr (self->response, '\0', sizeof (self->response)));
|
|
|
|
/* Having found the NULL terminator, from this point forward string
|
|
functions may be used. */
|
|
nn_assert (strlen (self->response) < sizeof (self->response));
|
|
|
|
pos = self->response;
|
|
|
|
/* Is the response from the server fully received? */
|
|
if (!strstr (pos, NN_WS_HANDSHAKE_TERMSEQ))
|
|
return NN_WS_HANDSHAKE_RECV_MORE;
|
|
|
|
self->status_code = NULL;
|
|
self->reason_phrase = NULL;
|
|
self->server = NULL;
|
|
self->accept_key = NULL;
|
|
self->upgrade = NULL;
|
|
self->conn = NULL;
|
|
self->version = NULL;
|
|
self->protocol = NULL;
|
|
|
|
self->status_code_len = 0;
|
|
self->reason_phrase_len = 0;
|
|
self->server_len = 0;
|
|
self->accept_key_len = 0;
|
|
self->upgrade_len = 0;
|
|
self->conn_len = 0;
|
|
self->version_len = 0;
|
|
self->protocol_len = 0;
|
|
|
|
/* RFC 7230 3.1.2 Status Line: HTTP Version. */
|
|
if (!nn_ws_match_token ("HTTP/1.1\x20", &pos, 0, 0))
|
|
return NN_WS_HANDSHAKE_RECV_MORE;
|
|
|
|
/* RFC 7230 3.1.2 Status Line: Status Code. */
|
|
if (!nn_ws_match_value ("\x20", &pos, 0, 0, &self->status_code,
|
|
&self->status_code_len))
|
|
return NN_WS_HANDSHAKE_RECV_MORE;
|
|
|
|
/* RFC 7230 3.1.2 Status Line: Reason Phrase. */
|
|
if (!nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 0, 0,
|
|
&self->reason_phrase, &self->reason_phrase_len))
|
|
return NN_WS_HANDSHAKE_RECV_MORE;
|
|
|
|
/* It's expected the current position is now at the first
|
|
header field. Match them one by one. */
|
|
while (strlen (pos))
|
|
{
|
|
if (nn_ws_match_token ("Server:", &pos, 1, 0)) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->server, &self->server_len);
|
|
}
|
|
else if (nn_ws_match_token ("Sec-WebSocket-Accept:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->accept_key, &self->accept_key_len);
|
|
}
|
|
else if (nn_ws_match_token ("Upgrade:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->upgrade, &self->upgrade_len);
|
|
}
|
|
else if (nn_ws_match_token ("Connection:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->conn, &self->conn_len);
|
|
}
|
|
else if (nn_ws_match_token ("Sec-WebSocket-Version-Server:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->version, &self->version_len);
|
|
}
|
|
else if (nn_ws_match_token ("Sec-WebSocket-Protocol-Server:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->protocol, &self->protocol_len);
|
|
}
|
|
else if (nn_ws_match_token ("Sec-WebSocket-Extensions:",
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
&self->extensions, &self->extensions_len);
|
|
}
|
|
else if (nn_ws_match_token (NN_WS_HANDSHAKE_CRLF,
|
|
&pos, 1, 0) == NN_WS_HANDSHAKE_MATCH) {
|
|
/* Exit loop since all headers are parsed. */
|
|
break;
|
|
}
|
|
else {
|
|
/* Skip unknown headers. */
|
|
rc = nn_ws_match_value (NN_WS_HANDSHAKE_CRLF, &pos, 1, 1,
|
|
NULL, NULL);
|
|
}
|
|
|
|
if (rc != NN_WS_HANDSHAKE_MATCH)
|
|
return NN_WS_HANDSHAKE_RECV_MORE;
|
|
}
|
|
|
|
/* Validate the opening handshake is now fully parsed. Additionally,
|
|
as per RFC 6455 section 4.1, the client should not send additional data
|
|
after the opening handshake, so this assertion validates upstream recv
|
|
logic prevented this case. */
|
|
nn_assert (strlen (pos) == 0);
|
|
|
|
/* TODO: protocol expectations below this point are hard-coded here as
|
|
an initial design decision. Perhaps in the future these values should
|
|
be settable via compile time (or run-time socket) options? */
|
|
|
|
/* These header fields are required as per RFC 6455 4.2.2. */
|
|
if (!self->status_code || !self->upgrade || !self->conn ||
|
|
!self->accept_key)
|
|
return NN_WS_HANDSHAKE_INVALID;
|
|
|
|
/* TODO: Currently, we only handle a successful connection upgrade.
|
|
Anything else is treated as a failed connection.
|
|
Consider handling other scenarios like 3xx redirects. */
|
|
if (nn_ws_validate_value ("101", self->status_code,
|
|
self->status_code_len, 1) != NN_WS_HANDSHAKE_MATCH)
|
|
return NN_WS_HANDSHAKE_INVALID;
|
|
|
|
/* RFC 6455 section 4.2.2.5.2 (version December 2011). */
|
|
if (nn_ws_validate_value ("websocket", self->upgrade,
|
|
self->upgrade_len, 1) != NN_WS_HANDSHAKE_MATCH)
|
|
return NN_WS_HANDSHAKE_INVALID;
|
|
|
|
/* RFC 6455 section 4.2.2.5.3 (version December 2011). */
|
|
if (nn_ws_validate_value ("Upgrade", self->conn,
|
|
self->conn_len, 1) != NN_WS_HANDSHAKE_MATCH)
|
|
return NN_WS_HANDSHAKE_INVALID;
|
|
|
|
/* RFC 6455 section 4.2.2.5.4 (version December 2011). */
|
|
if (nn_ws_validate_value (self->expected_accept_key, self->accept_key,
|
|
self->accept_key_len, 1) != NN_WS_HANDSHAKE_MATCH)
|
|
return NN_WS_HANDSHAKE_INVALID;
|
|
|
|
/* Server response meets RFC 6455 compliance for opening handshake. */
|
|
return NN_WS_HANDSHAKE_VALID;
|
|
}
|
|
|
|
static void nn_ws_handshake_client_request (struct nn_ws_handshake *self)
|
|
{
|
|
struct nn_iovec open_request;
|
|
size_t encoded_key_len;
|
|
int rc;
|
|
unsigned i;
|
|
|
|
/* Generate random 16-byte key as per RFC 6455 4.1 */
|
|
uint8_t rand_key [16];
|
|
|
|
/* Known length required to base64 encode above random key plus
|
|
string NULL terminator. */
|
|
char encoded_key [24 + 1];
|
|
|
|
nn_random_generate (rand_key, sizeof (rand_key));
|
|
|
|
rc = nn_base64_encode (rand_key, sizeof (rand_key),
|
|
encoded_key, sizeof (encoded_key));
|
|
|
|
encoded_key_len = strlen (encoded_key);
|
|
|
|
nn_assert (encoded_key_len == sizeof (encoded_key) - 1);
|
|
|
|
/* Pre-calculated expected Accept Key value as per
|
|
RFC 6455 section 4.2.2.5.4 (version December 2011). */
|
|
rc = nn_ws_handshake_hash_key (encoded_key, encoded_key_len,
|
|
self->expected_accept_key, sizeof (self->expected_accept_key));
|
|
|
|
nn_assert (rc == NN_WS_HANDSHAKE_ACCEPT_KEY_LEN);
|
|
|
|
/* Lookup SP header value. */
|
|
for (i = 0; i < NN_WS_HANDSHAKE_SP_MAP_LEN; i++) {
|
|
if (NN_WS_HANDSHAKE_SP_MAP [i].client ==
|
|
self->pipebase->sock->socktype->protocol) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* Guarantee that the socket type was found in the map. */
|
|
nn_assert (i < NN_WS_HANDSHAKE_SP_MAP_LEN);
|
|
|
|
sprintf (self->opening_hs,
|
|
"GET %s HTTP/1.1\r\n"
|
|
"Host: %s\r\n"
|
|
"Upgrade: websocket\r\n"
|
|
"Connection: Upgrade\r\n"
|
|
"Sec-WebSocket-Key: %s\r\n"
|
|
"Sec-WebSocket-Version: 13\r\n"
|
|
"Sec-WebSocket-Protocol: %s\r\n\r\n",
|
|
self->resource, self->remote_host, encoded_key,
|
|
NN_WS_HANDSHAKE_SP_MAP[i].ws_sp);
|
|
|
|
open_request.iov_len = strlen (self->opening_hs);
|
|
open_request.iov_base = self->opening_hs;
|
|
|
|
nn_usock_send (self->usock, &open_request, 1);
|
|
}
|
|
|
|
static void nn_ws_handshake_server_reply (struct nn_ws_handshake *self)
|
|
{
|
|
struct nn_iovec response;
|
|
char *code;
|
|
char *version;
|
|
char *protocol;
|
|
int rc;
|
|
|
|
/* Allow room for NULL terminator. */
|
|
char accept_key [NN_WS_HANDSHAKE_ACCEPT_KEY_LEN + 1];
|
|
|
|
memset (self->response, 0, sizeof (self->response));
|
|
|
|
if (self->response_code == NN_WS_HANDSHAKE_RESPONSE_OK) {
|
|
/* Upgrade connection as per RFC 6455 section 4.2.2. */
|
|
|
|
rc = nn_ws_handshake_hash_key (self->key, self->key_len,
|
|
accept_key, sizeof (accept_key));
|
|
|
|
nn_assert (strlen (accept_key) == NN_WS_HANDSHAKE_ACCEPT_KEY_LEN);
|
|
|
|
protocol = nn_alloc (self->protocol_len + 1, "WebSocket protocol");
|
|
alloc_assert (protocol);
|
|
strncpy (protocol, self->protocol, self->protocol_len);
|
|
protocol [self->protocol_len] = '\0';
|
|
|
|
sprintf (self->response,
|
|
"HTTP/1.1 101 Switching Protocols\r\n"
|
|
"Upgrade: websocket\r\n"
|
|
"Connection: Upgrade\r\n"
|
|
"Sec-WebSocket-Accept: %s\r\n"
|
|
"Sec-WebSocket-Protocol: %s\r\n\r\n",
|
|
accept_key, protocol);
|
|
|
|
nn_free (protocol);
|
|
}
|
|
else {
|
|
/* Fail the connection with a helpful hint. */
|
|
switch (self->response_code) {
|
|
case NN_WS_HANDSHAKE_RESPONSE_TOO_BIG:
|
|
code = "400 Opening Handshake Too Long";
|
|
break;
|
|
case NN_WS_HANDSHAKE_RESPONSE_WSPROTO:
|
|
code = "400 Cannot Have Body";
|
|
break;
|
|
case NN_WS_HANDSHAKE_RESPONSE_WSVERSION:
|
|
code = "400 Unsupported WebSocket Version";
|
|
break;
|
|
case NN_WS_HANDSHAKE_RESPONSE_NNPROTO:
|
|
code = "400 Missing nanomsg Required Headers";
|
|
break;
|
|
case NN_WS_HANDSHAKE_RESPONSE_NOTPEER:
|
|
code = "400 Incompatible Socket Type";
|
|
break;
|
|
case NN_WS_HANDSHAKE_RESPONSE_UNKNOWNTYPE:
|
|
code = "400 Unrecognized Socket Type";
|
|
break;
|
|
default:
|
|
/* Unexpected failure response. */
|
|
nn_assert (0);
|
|
break;
|
|
}
|
|
|
|
version = nn_alloc (self->version_len + 1, "WebSocket version");
|
|
alloc_assert (version);
|
|
strncpy (version, self->version, self->version_len);
|
|
version [self->version_len] = '\0';
|
|
|
|
/* Fail connection as per RFC 6455 4.4. */
|
|
sprintf (self->response,
|
|
"HTTP/1.1 %s\r\n"
|
|
"Sec-WebSocket-Version: %s\r\n",
|
|
code, version);
|
|
|
|
nn_free (version);
|
|
}
|
|
|
|
response.iov_len = strlen (self->response);
|
|
response.iov_base = &self->response;
|
|
|
|
nn_usock_send (self->usock, &response, 1);
|
|
|
|
return;
|
|
}
|
|
|
|
static int nn_ws_handshake_hash_key (const char *key, size_t key_len,
|
|
char *hashed, size_t hashed_len)
|
|
{
|
|
int rc;
|
|
unsigned i;
|
|
struct nn_sha1 hash;
|
|
|
|
nn_sha1_init (&hash);
|
|
|
|
for (i = 0; i < key_len; i++)
|
|
nn_sha1_hashbyte (&hash, key [i]);
|
|
|
|
for (i = 0; i < strlen (NN_WS_HANDSHAKE_MAGIC_GUID); i++)
|
|
nn_sha1_hashbyte (&hash, NN_WS_HANDSHAKE_MAGIC_GUID [i]);
|
|
|
|
rc = nn_base64_encode (nn_sha1_result (&hash),
|
|
sizeof (hash.state), hashed, hashed_len);
|
|
|
|
return rc;
|
|
}
|
|
|
|
|