#include "ws.h" #include #ifndef _MSC_VER #include #endif #ifndef _MSC_VER #define ms_sleep(x) usleep( x * 1000); #else #define ms_sleep(x) Sleep( x ); #endif #ifdef _MSC_VER /* warning C4706: assignment within conditional expression*/ #pragma warning(disable: 4706) #endif #define WS_BLOCK 1 #define WS_NOBLOCK 0 #define SHA1_HASH_SIZE 20 struct ws_globals_s ws_globals; #ifndef WSS_STANDALONE void init_ssl(void) { SSL_library_init(); } void deinit_ssl(void) { return; } #else static unsigned long pthreads_thread_id(void); static void pthreads_locking_callback(int mode, int type, const char *file, int line); static pthread_mutex_t *lock_cs; static long *lock_count; static void thread_setup(void) { int i; lock_cs = OPENSSL_malloc(CRYPTO_num_locks() * sizeof(pthread_mutex_t)); lock_count = OPENSSL_malloc(CRYPTO_num_locks() * sizeof(long)); for (i = 0; i < CRYPTO_num_locks(); i++) { lock_count[i] = 0; pthread_mutex_init(&(lock_cs[i]), NULL); } CRYPTO_set_id_callback(pthreads_thread_id); CRYPTO_set_locking_callback(pthreads_locking_callback); } static void thread_cleanup(void) { int i; CRYPTO_set_locking_callback(NULL); for (i=0; i buflen - 1) { cplen = buflen -1; } else { cplen = len; } strncpy(buf, v, cplen); *(buf+cplen) = '\0'; return 1; } } } return 0; } static int b64encode(unsigned char *in, size_t ilen, unsigned char *out, size_t olen) { int y=0,bytes=0; size_t x=0; unsigned int b=0,l=0; if(olen) { } for(x=0;x= 6) { out[bytes++] = c64[(b>>(l-=6))%64]; if(++y!=72) { continue; } //out[bytes++] = '\n'; y=0; } } if (l > 0) { out[bytes++] = c64[((b%16)<<(6-l))%64]; } if (l != 0) while (l < 6) { out[bytes++] = '=', l += 2; } return 0; } #ifdef NO_OPENSSL static void sha1_digest(char *digest, unsigned char *in) { SHA1Context sha; char *p; int x; SHA1Init(&sha); SHA1Update(&sha, in, strlen(in)); SHA1Final(&sha, digest); } #else static void sha1_digest(unsigned char *digest, char *in) { SHA_CTX sha; SHA1_Init(&sha); SHA1_Update(&sha, in, strlen(in)); SHA1_Final(digest, &sha); } #endif int ws_handshake(wsh_t *wsh) { char key[256] = ""; char version[5] = ""; char proto[256] = ""; char proto_buf[384] = ""; char input[256] = ""; unsigned char output[SHA1_HASH_SIZE] = ""; char b64[256] = ""; char respond[512] = ""; ssize_t bytes; char *p, *e = 0; if (wsh->sock == ws_sock_invalid) { return -3; } while((bytes = ws_raw_read(wsh, wsh->buffer + wsh->datalen, wsh->buflen - wsh->datalen, WS_BLOCK)) > 0) { wsh->datalen += bytes; if (strstr(wsh->buffer, "\r\n\r\n") || strstr(wsh->buffer, "\n\n")) { break; } } if (bytes > sizeof(wsh->buffer) -1) { goto err; } *(wsh->buffer + wsh->datalen) = '\0'; if (strncasecmp(wsh->buffer, "GET ", 4)) { goto err; } p = wsh->buffer + 4; e = strchr(p, ' '); if (!e) { goto err; } wsh->uri = malloc((e-p) + 1); strncpy(wsh->uri, p, e-p); *(wsh->uri + (e-p)) = '\0'; cheezy_get_var(wsh->buffer, "Sec-WebSocket-Key", key, sizeof(key)); cheezy_get_var(wsh->buffer, "Sec-WebSocket-Version", version, sizeof(version)); cheezy_get_var(wsh->buffer, "Sec-WebSocket-Protocol", proto, sizeof(proto)); if (!*key) { goto err; } snprintf(input, sizeof(input), "%s%s", key, WEBSOCKET_GUID); sha1_digest(output, input); b64encode((unsigned char *)output, SHA1_HASH_SIZE, (unsigned char *)b64, sizeof(b64)); if (*proto) { snprintf(proto_buf, sizeof(proto_buf), "Sec-WebSocket-Protocol: %s\r\n", proto); } snprintf(respond, sizeof(respond), "HTTP/1.1 101 Switching Protocols\r\n" "Upgrade: websocket\r\n" "Connection: Upgrade\r\n" "Sec-WebSocket-Accept: %s\r\n" "%s\r\n", b64, proto_buf); respond[511] = 0; if (ws_raw_write(wsh, respond, strlen(respond)) != (ssize_t)strlen(respond)) { goto err; } wsh->handshake = 1; return 0; err: if (!wsh->stay_open) { snprintf(respond, sizeof(respond), "HTTP/1.1 400 Bad Request\r\n" "Sec-WebSocket-Version: 13\r\n\r\n"); respond[511] = 0; ws_raw_write(wsh, respond, strlen(respond)); ws_close(wsh, WS_NONE); } return -1; } ssize_t ws_raw_read(wsh_t *wsh, void *data, size_t bytes, int block) { ssize_t r; int err = 0; wsh->x++; if (wsh->x > 250) ms_sleep(1); if (wsh->ssl) { do { r = SSL_read(wsh->ssl, data, bytes); if (r == -1) { err = SSL_get_error(wsh->ssl, r); if (!block && err == SSL_ERROR_WANT_READ) { r = -2; goto end; } if (block) { wsh->x++; ms_sleep(10); } } } while (r == -1 && err == SSL_ERROR_WANT_READ && wsh->x < 100); goto end; } do { r = recv(wsh->sock, data, bytes, 0); if (r == -1) { if (!block && xp_is_blocking(xp_errno())) { r = -2; goto end; } if (block) { wsh->x++; ms_sleep(10); } } } while (r == -1 && xp_is_blocking(xp_errno()) && wsh->x < 100); if (wsh->x >= 1000 || (block && wsh->x >= 100)) { r = -1; } end: if (r > 0) { *((char *)data + r) = '\0'; } if (r >= 0) { wsh->x = 0; } return r; } ssize_t ws_raw_write(wsh_t *wsh, void *data, size_t bytes) { ssize_t r; int sanity = 2000; int ssl_err = 0; size_t wrote = 0; if (wsh->ssl) { do { r = SSL_write(wsh->ssl, (void *)((unsigned char *)data + wrote), bytes - wrote); if (r > 0) { wrote += r; } if (sanity < 2000) { ms_sleep(1); } if (r == -1) { ssl_err = SSL_get_error(wsh->ssl, r); } } while (--sanity > 0 && ((r == -1 && ssl_err == SSL_ERROR_WANT_WRITE) || (wsh->block && wrote < bytes))); if (ssl_err) { r = ssl_err * -1; } return r; } do { r = send(wsh->sock, (void *)((unsigned char *)data + wrote), bytes - wrote, 0); if (r > 0) { wrote += r; } if (sanity < 2000) { ms_sleep(1); } } while (--sanity > 0 && ((r == -1 && xp_is_blocking(xp_errno())) || (wsh->block && wrote < bytes))); //if (r<0) { //printf("wRITE FAIL: %s\n", strerror(errno)); //} return r; } #ifdef _MSC_VER static int setup_socket(ws_socket_t sock) { unsigned long v = 1; if (ioctlsocket(sock, FIONBIO, &v) == SOCKET_ERROR) { return -1; } return 0; } static int restore_socket(ws_socket_t sock) { unsigned long v = 0; if (ioctlsocket(sock, FIONBIO, &v) == SOCKET_ERROR) { return -1; } return 0; } #else static int setup_socket(ws_socket_t sock) { int flags = fcntl(sock, F_GETFL, 0); return fcntl(sock, F_SETFL, flags | O_NONBLOCK); } static int restore_socket(ws_socket_t sock) { int flags = fcntl(sock, F_GETFL, 0); flags &= ~O_NONBLOCK; return fcntl(sock, F_SETFL, flags); } #endif static int establish_logical_layer(wsh_t *wsh) { if (!wsh->sanity) { return -1; } if (wsh->logical_established) { return 0; } if (wsh->secure && !wsh->secure_established) { int code; if (!wsh->ssl) { wsh->ssl = SSL_new(wsh->ssl_ctx); assert(wsh->ssl); SSL_set_fd(wsh->ssl, wsh->sock); } do { code = SSL_accept(wsh->ssl); if (code == 1) { wsh->secure_established = 1; break; } if (code == 0) { return -1; } if (code < 0) { if (code == -1 && SSL_get_error(wsh->ssl, code) != SSL_ERROR_WANT_READ) { return -1; } } if (wsh->block) { ms_sleep(10); } else { ms_sleep(1); } wsh->sanity--; if (!wsh->block) { return -2; } } while (wsh->sanity > 0); if (!wsh->sanity) { return -1; } } while (!wsh->down && !wsh->handshake) { int r = ws_handshake(wsh); if (r < 0) { wsh->down = 1; return -1; } if (!wsh->handshake && !wsh->block) { return -2; } } wsh->logical_established = 1; return 0; } int ws_init(wsh_t *wsh, ws_socket_t sock, SSL_CTX *ssl_ctx, int close_sock, int block, int stay_open) { memset(wsh, 0, sizeof(*wsh)); wsh->sock = sock; wsh->block = block; wsh->sanity = 5000; wsh->ssl_ctx = ssl_ctx; wsh->stay_open = stay_open; if (!ssl_ctx) { ssl_ctx = ws_globals.ssl_ctx; } if (close_sock) { wsh->close_sock = 1; } wsh->buflen = sizeof(wsh->buffer); wsh->secure = ssl_ctx ? 1 : 0; setup_socket(sock); if (establish_logical_layer(wsh) == -1) { return -1; } if (wsh->down) { return -1; } return 0; } void ws_destroy(wsh_t *wsh) { if (!wsh) { return; } if (!wsh->down) { ws_close(wsh, WS_NONE); } if (wsh->down > 1) { return; } wsh->down = 2; if (wsh->write_buffer) { free(wsh->write_buffer); wsh->write_buffer = NULL; wsh->write_buffer_len = 0; } if (wsh->ssl) { int code; do { code = SSL_shutdown(wsh->ssl); } while (code == -1 && SSL_get_error(wsh->ssl, code) == SSL_ERROR_WANT_READ); SSL_free(wsh->ssl); wsh->ssl = NULL; } } ssize_t ws_close(wsh_t *wsh, int16_t reason) { if (wsh->down) { return -1; } wsh->down = 1; if (wsh->uri) { free(wsh->uri); wsh->uri = NULL; } if (reason && wsh->sock != ws_sock_invalid) { uint16_t *u16; uint8_t fr[4] = {WSOC_CLOSE | 0x80, 2, 0}; u16 = (uint16_t *) &fr[2]; *u16 = htons((int16_t)reason); ws_raw_write(wsh, fr, 4); } restore_socket(wsh->sock); if (wsh->close_sock && wsh->sock != ws_sock_invalid) { #ifndef WIN32 close(wsh->sock); #else closesocket(wsh->sock); #endif } wsh->sock = ws_sock_invalid; return reason * -1; } ssize_t ws_read_frame(wsh_t *wsh, ws_opcode_t *oc, uint8_t **data) { ssize_t need = 2; char *maskp; int ll = 0; int frag = 0; again: need = 2; maskp = NULL; *data = NULL; ll = establish_logical_layer(wsh); if (ll < 0) { return ll; } if (wsh->down) { return -1; } if (!wsh->handshake) { return ws_close(wsh, WS_PROTO_ERR); } if ((wsh->datalen = ws_raw_read(wsh, wsh->buffer, 9, wsh->block)) < 0) { if (wsh->datalen == -2) { return -2; } return ws_close(wsh, WS_PROTO_ERR); } if (wsh->datalen < need) { if ((wsh->datalen += ws_raw_read(wsh, wsh->buffer + wsh->datalen, 9 - wsh->datalen, WS_BLOCK)) < need) { /* too small - protocol err */ return ws_close(wsh, WS_PROTO_ERR); } } *oc = *wsh->buffer & 0xf; switch(*oc) { case WSOC_CLOSE: { wsh->plen = wsh->buffer[1] & 0x7f; *data = (uint8_t *) &wsh->buffer[2]; return ws_close(wsh, 1000); } break; case WSOC_CONTINUATION: case WSOC_TEXT: case WSOC_BINARY: case WSOC_PING: case WSOC_PONG: { int fin = (wsh->buffer[0] >> 7) & 1; int mask = (wsh->buffer[1] >> 7) & 1; if (fin) { if (*oc == WSOC_CONTINUATION) { frag = 1; } else { frag = 0; } } if (mask) { need += 4; if (need > wsh->datalen) { /* too small - protocol err */ *oc = WSOC_CLOSE; return ws_close(wsh, WS_PROTO_ERR); } } wsh->plen = wsh->buffer[1] & 0x7f; wsh->payload = &wsh->buffer[2]; if (wsh->plen == 127) { uint64_t *u64; need += 8; if (need > wsh->datalen) { /* too small - protocol err */ *oc = WSOC_CLOSE; return ws_close(wsh, WS_PROTO_ERR); } u64 = (uint64_t *) wsh->payload; wsh->payload += 8; wsh->plen = ntohl((u_long)*u64); } else if (wsh->plen == 126) { uint16_t *u16; need += 2; if (need > wsh->datalen) { /* too small - protocol err */ *oc = WSOC_CLOSE; return ws_close(wsh, WS_PROTO_ERR); } u16 = (uint16_t *) wsh->payload; wsh->payload += 2; wsh->plen = ntohs(*u16); } if (mask) { maskp = (char *)wsh->payload; wsh->payload += 4; } need = (wsh->plen - (wsh->datalen - need)); if (need < 0) { /* invalid read - protocol err .. */ *oc = WSOC_CLOSE; return ws_close(wsh, WS_PROTO_ERR); } if ((need + wsh->datalen) > (ssize_t)wsh->buflen) { /* too big - Ain't nobody got time fo' dat */ *oc = WSOC_CLOSE; return ws_close(wsh, WS_DATA_TOO_BIG); } wsh->rplen = wsh->plen - need; while(need) { ssize_t r = ws_raw_read(wsh, wsh->payload + wsh->rplen, need, WS_BLOCK); if (r < 1) { /* invalid read - protocol err .. */ *oc = WSOC_CLOSE; return ws_close(wsh, WS_PROTO_ERR); } wsh->datalen += r; wsh->rplen += r; need -= r; } if (mask && maskp) { ssize_t i; for (i = 0; i < wsh->datalen; i++) { wsh->payload[i] ^= maskp[i % 4]; } } if (*oc == WSOC_PING) { ws_write_frame(wsh, WSOC_PONG, wsh->payload, wsh->rplen); goto again; } if (frag) { goto again; } *(wsh->payload+wsh->rplen) = '\0'; *data = (uint8_t *)wsh->payload; //printf("READ[%ld][%d]-----------------------------:\n[%s]\n-------------------------------\n", wsh->rplen, *oc, (char *)*data); return wsh->rplen; } break; default: { /* invalid op code - protocol err .. */ *oc = WSOC_CLOSE; return ws_close(wsh, WS_PROTO_ERR); } break; } } ssize_t ws_feed_buf(wsh_t *wsh, void *data, size_t bytes) { if (bytes + wsh->wdatalen > wsh->buflen) { return -1; } memcpy(wsh->wbuffer + wsh->wdatalen, data, bytes); wsh->wdatalen += bytes; return bytes; } ssize_t ws_send_buf(wsh_t *wsh, ws_opcode_t oc) { ssize_t r = 0; if (!wsh->wdatalen) { return -1; } r = ws_write_frame(wsh, oc, wsh->wbuffer, wsh->wdatalen); wsh->wdatalen = 0; return r; } ssize_t ws_write_frame(wsh_t *wsh, ws_opcode_t oc, void *data, size_t bytes) { uint8_t hdr[14] = { 0 }; size_t hlen = 2; uint8_t *bp; ssize_t raw_ret = 0; if (wsh->down) { return -1; } //printf("WRITE[%ld]-----------------------------:\n[%s]\n-----------------------------------\n", bytes, (char *) data); hdr[0] = (uint8_t)(oc | 0x80); if (bytes < 126) { hdr[1] = (uint8_t)bytes; } else if (bytes < 0x10000) { uint16_t *u16; hdr[1] = 126; hlen += 2; u16 = (uint16_t *) &hdr[2]; *u16 = htons((uint16_t) bytes); } else { uint64_t *u64; hdr[1] = 127; hlen += 8; u64 = (uint64_t *) &hdr[2]; *u64 = htonl(bytes); } if (wsh->write_buffer_len < (hlen + bytes + 1)) { void *tmp; wsh->write_buffer_len = hlen + bytes + 1; if ((tmp = realloc(wsh->write_buffer, wsh->write_buffer_len))) { wsh->write_buffer = tmp; } else { abort(); } } bp = (uint8_t *) wsh->write_buffer; memcpy(bp, (void *) &hdr[0], hlen); memcpy(bp + hlen, data, bytes); raw_ret = ws_raw_write(wsh, bp, (hlen + bytes)); if (raw_ret != (ssize_t) (hlen + bytes)) { return raw_ret; } return bytes; } #ifdef _MSC_VER int xp_errno(void) { return WSAGetLastError(); } int xp_is_blocking(int errcode) { return errcode == WSAEWOULDBLOCK || errcode == WSAEINPROGRESS; } #else int xp_errno(void) { return errno; } int xp_is_blocking(int errcode) { return errcode == EAGAIN || errcode == EWOULDBLOCK || errcode == EINPROGRESS || errcode == EINTR || errcode == ETIMEDOUT; } #endif