2 * libwebsockets - small server side websockets and web server implementation
4 * Copyright (C) 2010-2013 Andy Green <andy@warmcat.com>
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation:
9 * version 2.1 of the License.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
22 #include "private-libwebsockets.h"
24 #define LWS_CPYAPP(ptr, str) { strcpy(ptr, str); ptr += strlen(str); }
27 * Perform the newer BASE64-encoded handshake scheme
31 handshake_0405(struct libwebsocket_context *context, struct libwebsocket *wsi)
33 unsigned char hash[20];
38 #ifndef LWS_NO_EXTENSIONS
41 struct libwebsocket_extension *ext;
46 if (!lws_hdr_total_length(wsi, WSI_TOKEN_HOST) ||
47 !lws_hdr_total_length(wsi, WSI_TOKEN_KEY)) {
48 lwsl_parser("handshake_04 missing pieces\n");
49 /* completed header processing, but missing some bits */
53 if (lws_hdr_total_length(wsi, WSI_TOKEN_KEY) >=
54 MAX_WEBSOCKET_04_KEY_LEN) {
55 lwsl_warn("Client key too long %d\n", MAX_WEBSOCKET_04_KEY_LEN);
60 * since key length is restricted above (currently 128), cannot
63 n = sprintf((char *)context->service_buffer,
64 "%s258EAFA5-E914-47DA-95CA-C5AB0DC85B11",
65 lws_hdr_simple_ptr(wsi, WSI_TOKEN_KEY));
67 SHA1(context->service_buffer, n, hash);
69 accept_len = lws_b64_encode_string((char *)hash, 20,
70 (char *)context->service_buffer,
71 sizeof(context->service_buffer));
73 lwsl_warn("Base64 encoded hash too long\n");
77 /* allocate the per-connection user memory (if any) */
78 if (libwebsocket_ensure_user_space(wsi))
81 /* create the response packet */
83 /* make a buffer big enough for everything */
85 response = (char *)context->service_buffer + MAX_WEBSOCKET_04_KEY_LEN;
87 LWS_CPYAPP(p, "HTTP/1.1 101 Switching Protocols\x0d\x0a"
88 "Upgrade: WebSocket\x0d\x0a"
89 "Connection: Upgrade\x0d\x0a"
90 "Sec-WebSocket-Accept: ");
91 strcpy(p, (char *)context->service_buffer);
94 if (lws_hdr_total_length(wsi, WSI_TOKEN_PROTOCOL)) {
95 LWS_CPYAPP(p, "\x0d\x0aSec-WebSocket-Protocol: ");
96 n = lws_hdr_copy(wsi, p, 128, WSI_TOKEN_PROTOCOL);
102 #ifndef LWS_NO_EXTENSIONS
104 * Figure out which extensions the client has that we want to
105 * enable on this connection, and give him back the list
108 if (lws_hdr_total_length(wsi, WSI_TOKEN_EXTENSIONS)) {
111 * break down the list of client extensions
112 * and go through them
115 if (lws_hdr_copy(wsi, (char *)context->service_buffer,
116 sizeof(context->service_buffer),
117 WSI_TOKEN_EXTENSIONS) < 0)
120 c = (char *)context->service_buffer;
121 lwsl_parser("WSI_TOKEN_EXTENSIONS = '%s'\n", c);
122 wsi->count_active_extensions = 0;
126 if (*c && (*c != ',' && *c != ' ' && *c != '\t')) {
128 if (n < sizeof(ext_name) - 1)
141 /* check a client's extension against our support */
143 ext = wsi->protocol->owning_server->extensions;
145 while (ext && ext->callback) {
147 if (strcmp(ext_name, ext->name)) {
153 * oh, we do support this one he
154 * asked for... but let's ask user
155 * code if it's OK to apply it on this
156 * particular connection + protocol
159 n = wsi->protocol->owning_server->
160 protocols[0].callback(
161 wsi->protocol->owning_server,
163 LWS_CALLBACK_CONFIRM_EXTENSION_OKAY,
164 wsi->user_space, ext_name, 0);
167 * zero return from callback means
168 * go ahead and allow the extension,
169 * it's what we get if the callback is
184 "\x0d\x0aSec-WebSocket-Extensions: ");
185 p += sprintf(p, "%s", ext_name);
188 /* instantiate the extension on this conn */
190 wsi->active_extensions_user[
191 wsi->count_active_extensions] =
192 malloc(ext->per_session_data_size);
193 if (wsi->active_extensions_user[
194 wsi->count_active_extensions] == NULL) {
195 lwsl_err("Out of mem\n");
199 memset(wsi->active_extensions_user[
200 wsi->count_active_extensions], 0,
201 ext->per_session_data_size);
203 wsi->active_extensions[
204 wsi->count_active_extensions] = ext;
206 /* allow him to construct his context */
208 ext->callback(wsi->protocol->owning_server,
210 LWS_EXT_CALLBACK_CONSTRUCT,
211 wsi->active_extensions_user[
212 wsi->count_active_extensions], NULL, 0);
214 wsi->count_active_extensions++;
215 lwsl_parser("count_active_extensions <- %d\n",
216 wsi->count_active_extensions);
225 /* end of response packet */
227 LWS_CPYAPP(p, "\x0d\x0a\x0d\x0a");
229 #ifndef LWS_NO_EXTENSIONS
230 if (!lws_any_extension_handled(context, wsi,
231 LWS_EXT_CALLBACK_HANDSHAKE_REPLY_TX,
232 response, p - response)) {
236 /* okay send the handshake response accepting the connection */
238 lwsl_parser("issuing resp pkt %d len\n", (int)(p - response));
240 fwrite(response, 1, p - response, stderr);
242 n = libwebsocket_write(wsi, (unsigned char *)response,
243 p - response, LWS_WRITE_HTTP);
244 if (n != (p - response)) {
245 lwsl_debug("handshake_0405: ERROR writing to socket\n");
251 /* alright clean up and set ourselves into established state */
253 wsi->state = WSI_STATE_ESTABLISHED;
254 wsi->lws_rx_parse_state = LWS_RXPS_NEW;
256 /* notify user code that we're ready to roll */
258 if (wsi->protocol->callback)
259 wsi->protocol->callback(wsi->protocol->owning_server,
260 wsi, LWS_CALLBACK_ESTABLISHED,
261 wsi->user_space, NULL, 0);
267 /* free up his parsing allocations */