| Index: Source/modules/websockets/WebSocketHandshake.cpp
|
| diff --git a/Source/modules/websockets/WebSocketHandshake.cpp b/Source/modules/websockets/WebSocketHandshake.cpp
|
| deleted file mode 100644
|
| index dff022bae5673f6f95da436e173e6fc05ed55352..0000000000000000000000000000000000000000
|
| --- a/Source/modules/websockets/WebSocketHandshake.cpp
|
| +++ /dev/null
|
| @@ -1,556 +0,0 @@
|
| -/*
|
| - * Copyright (C) 2011 Google Inc. All rights reserved.
|
| - * Copyright (C) Research In Motion Limited 2011. All rights reserved.
|
| - *
|
| - * Redistribution and use in source and binary forms, with or without
|
| - * modification, are permitted provided that the following conditions are
|
| - * met:
|
| - *
|
| - * * Redistributions of source code must retain the above copyright
|
| - * notice, this list of conditions and the following disclaimer.
|
| - * * Redistributions in binary form must reproduce the above
|
| - * copyright notice, this list of conditions and the following disclaimer
|
| - * in the documentation and/or other materials provided with the
|
| - * distribution.
|
| - * * Neither the name of Google Inc. nor the names of its
|
| - * contributors may be used to endorse or promote products derived from
|
| - * this software without specific prior written permission.
|
| - *
|
| - * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
| - * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
| - * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
| - * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
| - * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
| - * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
| - * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
| - * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
| - * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
| - * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
| - * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
| - */
|
| -
|
| -#include "config.h"
|
| -
|
| -#include "modules/websockets/WebSocketHandshake.h"
|
| -
|
| -#include "core/dom/Document.h"
|
| -#include "core/inspector/ScriptCallStack.h"
|
| -#include "core/loader/CookieJar.h"
|
| -#include "modules/websockets/DOMWebSocket.h"
|
| -#include "platform/Cookie.h"
|
| -#include "platform/Crypto.h"
|
| -#include "platform/Logging.h"
|
| -#include "platform/network/HTTPHeaderMap.h"
|
| -#include "platform/network/HTTPParsers.h"
|
| -#include "platform/weborigin/SecurityOrigin.h"
|
| -#include "public/platform/Platform.h"
|
| -#include "wtf/CryptographicallyRandomNumber.h"
|
| -#include "wtf/StdLibExtras.h"
|
| -#include "wtf/StringExtras.h"
|
| -#include "wtf/Vector.h"
|
| -#include "wtf/text/Base64.h"
|
| -#include "wtf/text/CString.h"
|
| -#include "wtf/text/StringBuilder.h"
|
| -#include "wtf/unicode/CharacterNames.h"
|
| -
|
| -namespace blink {
|
| -
|
| -String formatHandshakeFailureReason(const String& detail)
|
| -{
|
| - return "Error during WebSocket handshake: " + detail;
|
| -}
|
| -
|
| -static String resourceName(const KURL& url)
|
| -{
|
| - StringBuilder name;
|
| - name.append(url.path());
|
| - if (name.isEmpty())
|
| - name.append('/');
|
| - if (!url.query().isNull()) {
|
| - name.append('?');
|
| - name.append(url.query());
|
| - }
|
| - String result = name.toString();
|
| - ASSERT(!result.isEmpty());
|
| - ASSERT(!result.contains(' '));
|
| - return result;
|
| -}
|
| -
|
| -static String hostName(const KURL& url, bool secure)
|
| -{
|
| - ASSERT(url.protocolIs("wss") == secure);
|
| - StringBuilder builder;
|
| - builder.append(url.host().lower());
|
| - if (url.port() && ((!secure && url.port() != 80) || (secure && url.port() != 443))) {
|
| - builder.append(':');
|
| - builder.appendNumber(url.port());
|
| - }
|
| - return builder.toString();
|
| -}
|
| -
|
| -static const size_t maxInputSampleSize = 128;
|
| -static String trimInputSample(const char* p, size_t len)
|
| -{
|
| - if (len > maxInputSampleSize)
|
| - return String(p, maxInputSampleSize) + horizontalEllipsis;
|
| - return String(p, len);
|
| -}
|
| -
|
| -static String generateSecWebSocketKey()
|
| -{
|
| - static const size_t nonceSize = 16;
|
| - unsigned char key[nonceSize];
|
| - cryptographicallyRandomValues(key, nonceSize);
|
| - return base64Encode(reinterpret_cast<char*>(key), nonceSize);
|
| -}
|
| -
|
| -String WebSocketHandshake::getExpectedWebSocketAccept(const String& secWebSocketKey)
|
| -{
|
| - static const char webSocketKeyGUID[] = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11";
|
| - CString keyData = secWebSocketKey.ascii();
|
| -
|
| - StringBuilder digestable;
|
| - digestable.append(secWebSocketKey);
|
| - digestable.append(webSocketKeyGUID, strlen(webSocketKeyGUID));
|
| - CString digestableCString = digestable.toString().utf8();
|
| - DigestValue digest;
|
| - bool digestSuccess = computeDigest(HashAlgorithmSha1, digestableCString.data(), digestableCString.length(), digest);
|
| - RELEASE_ASSERT(digestSuccess);
|
| -
|
| - return base64Encode(reinterpret_cast<const char*>(digest.data()), sha1HashSize);
|
| -}
|
| -
|
| -WebSocketHandshake::WebSocketHandshake(const KURL& url, const String& protocol, Document* document)
|
| - : m_url(url)
|
| - , m_clientProtocol(protocol)
|
| - , m_secure(m_url.protocolIs("wss"))
|
| - , m_document(document)
|
| - , m_mode(Incomplete)
|
| -{
|
| - m_secWebSocketKey = generateSecWebSocketKey();
|
| - m_expectedAccept = getExpectedWebSocketAccept(m_secWebSocketKey);
|
| -}
|
| -
|
| -WebSocketHandshake::~WebSocketHandshake()
|
| -{
|
| - Platform::current()->histogramEnumeration("WebCore.WebSocket.HandshakeResult", m_mode, WebSocketHandshake::ModeMax);
|
| -}
|
| -
|
| -const KURL& WebSocketHandshake::url() const
|
| -{
|
| - return m_url;
|
| -}
|
| -
|
| -void WebSocketHandshake::setURL(const KURL& url)
|
| -{
|
| - m_url = url.copy();
|
| -}
|
| -
|
| -const String WebSocketHandshake::host() const
|
| -{
|
| - return m_url.host().lower();
|
| -}
|
| -
|
| -const String& WebSocketHandshake::clientProtocol() const
|
| -{
|
| - return m_clientProtocol;
|
| -}
|
| -
|
| -void WebSocketHandshake::setClientProtocol(const String& protocol)
|
| -{
|
| - m_clientProtocol = protocol;
|
| -}
|
| -
|
| -bool WebSocketHandshake::secure() const
|
| -{
|
| - return m_secure;
|
| -}
|
| -
|
| -String WebSocketHandshake::clientOrigin() const
|
| -{
|
| - return m_document->securityOrigin()->toString();
|
| -}
|
| -
|
| -String WebSocketHandshake::clientLocation() const
|
| -{
|
| - StringBuilder builder;
|
| - if (m_secure)
|
| - builder.appendLiteral("wss");
|
| - else
|
| - builder.appendLiteral("ws");
|
| - builder.appendLiteral("://");
|
| - builder.append(hostName(m_url, m_secure));
|
| - builder.append(resourceName(m_url));
|
| - return builder.toString();
|
| -}
|
| -
|
| -CString WebSocketHandshake::clientHandshakeMessage() const
|
| -{
|
| - ASSERT(m_document);
|
| -
|
| - // Keep the following consistent with clientHandshakeRequest().
|
| - StringBuilder builder;
|
| -
|
| - builder.appendLiteral("GET ");
|
| - builder.append(resourceName(m_url));
|
| - builder.appendLiteral(" HTTP/1.1\r\n");
|
| -
|
| - Vector<String> fields;
|
| - fields.append("Upgrade: websocket");
|
| - fields.append("Connection: Upgrade");
|
| - fields.append("Host: " + hostName(m_url, m_secure));
|
| - fields.append("Origin: " + clientOrigin());
|
| - if (!m_clientProtocol.isEmpty())
|
| - fields.append("Sec-WebSocket-Protocol: " + m_clientProtocol);
|
| -
|
| - // Add no-cache headers to avoid compatibility issue.
|
| - // There are some proxies that rewrite "Connection: upgrade"
|
| - // to "Connection: close" in the response if a request doesn't contain
|
| - // these headers.
|
| - fields.append("Pragma: no-cache");
|
| - fields.append("Cache-Control: no-cache");
|
| -
|
| - fields.append("Sec-WebSocket-Key: " + m_secWebSocketKey);
|
| - fields.append("Sec-WebSocket-Version: 13");
|
| - const String extensionValue = m_extensionDispatcher.createHeaderValue();
|
| - if (extensionValue.length())
|
| - fields.append("Sec-WebSocket-Extensions: " + extensionValue);
|
| -
|
| - fields.append("User-Agent: " + m_document->userAgent(m_document->url()));
|
| -
|
| - // Fields in the handshake are sent by the client in a random order; the
|
| - // order is not meaningful. Thus, it's ok to send the order we constructed
|
| - // the fields.
|
| -
|
| - for (size_t i = 0; i < fields.size(); i++) {
|
| - builder.append(fields[i]);
|
| - builder.appendLiteral("\r\n");
|
| - }
|
| -
|
| - builder.appendLiteral("\r\n");
|
| -
|
| - return builder.toString().utf8();
|
| -}
|
| -
|
| -PassRefPtr<WebSocketHandshakeRequest> WebSocketHandshake::clientHandshakeRequest() const
|
| -{
|
| - ASSERT(m_document);
|
| -
|
| - // Keep the following consistent with clientHandshakeMessage().
|
| - // FIXME: do we need to store m_secWebSocketKey1, m_secWebSocketKey2 and
|
| - // m_key3 in WebSocketHandshakeRequest?
|
| - RefPtr<WebSocketHandshakeRequest> request = WebSocketHandshakeRequest::create(m_url);
|
| - request->addHeaderField("Upgrade", "websocket");
|
| - request->addHeaderField("Connection", "Upgrade");
|
| - request->addHeaderField("Host", AtomicString(hostName(m_url, m_secure)));
|
| - request->addHeaderField("Origin", AtomicString(clientOrigin()));
|
| - if (!m_clientProtocol.isEmpty())
|
| - request->addHeaderField("Sec-WebSocket-Protocol", AtomicString(m_clientProtocol));
|
| -
|
| - KURL url = httpURLForAuthenticationAndCookies();
|
| -
|
| - String cookie = cookieRequestHeaderFieldValue(m_document, url);
|
| - if (!cookie.isEmpty())
|
| - request->addHeaderField("Cookie", AtomicString(cookie));
|
| - // Set "Cookie2: <cookie>" if cookies 2 exists for url?
|
| -
|
| - request->addHeaderField("Pragma", "no-cache");
|
| - request->addHeaderField("Cache-Control", "no-cache");
|
| -
|
| - request->addHeaderField("Sec-WebSocket-Key", AtomicString(m_secWebSocketKey));
|
| - request->addHeaderField("Sec-WebSocket-Version", "13");
|
| - const String extensionValue = m_extensionDispatcher.createHeaderValue();
|
| - if (extensionValue.length())
|
| - request->addHeaderField("Sec-WebSocket-Extensions", AtomicString(extensionValue));
|
| -
|
| - request->addHeaderField("User-Agent", AtomicString(m_document->userAgent(m_document->url())));
|
| -
|
| - return request.release();
|
| -}
|
| -
|
| -void WebSocketHandshake::reset()
|
| -{
|
| - m_mode = Incomplete;
|
| - m_extensionDispatcher.reset();
|
| -}
|
| -
|
| -void WebSocketHandshake::clearDocument()
|
| -{
|
| - m_document = nullptr;
|
| -}
|
| -
|
| -int WebSocketHandshake::readServerHandshake(const char* header, size_t len)
|
| -{
|
| - m_mode = Incomplete;
|
| - int statusCode;
|
| - String statusText;
|
| - int lineLength = readStatusLine(header, len, statusCode, statusText);
|
| - if (lineLength == -1)
|
| - return -1;
|
| - if (statusCode == -1) {
|
| - m_mode = Failed; // m_failureReason is set inside readStatusLine().
|
| - return len;
|
| - }
|
| - WTF_LOG(Network, "WebSocketHandshake %p readServerHandshake() Status code is %d", this, statusCode);
|
| - m_response.setStatusCode(statusCode);
|
| - m_response.setStatusText(statusText);
|
| - if (statusCode != 101) {
|
| - m_mode = Failed;
|
| - m_failureReason = formatHandshakeFailureReason("Unexpected response code: " + String::number(statusCode));
|
| - return len;
|
| - }
|
| - m_mode = Normal;
|
| - if (!strnstr(header, "\r\n\r\n", len)) {
|
| - // Just hasn't been received fully yet.
|
| - m_mode = Incomplete;
|
| - return -1;
|
| - }
|
| - const char* p = readHTTPHeaders(header + lineLength, header + len);
|
| - if (!p) {
|
| - WTF_LOG(Network, "WebSocketHandshake %p readServerHandshake() readHTTPHeaders() failed", this);
|
| - m_mode = Failed; // m_failureReason is set inside readHTTPHeaders().
|
| - return len;
|
| - }
|
| - if (!checkResponseHeaders()) {
|
| - WTF_LOG(Network, "WebSocketHandshake %p readServerHandshake() checkResponseHeaders() failed", this);
|
| - m_mode = Failed;
|
| - return p - header;
|
| - }
|
| -
|
| - m_mode = Connected;
|
| - return p - header;
|
| -}
|
| -
|
| -WebSocketHandshake::Mode WebSocketHandshake::mode() const
|
| -{
|
| - return m_mode;
|
| -}
|
| -
|
| -String WebSocketHandshake::failureReason() const
|
| -{
|
| - return m_failureReason;
|
| -}
|
| -
|
| -const AtomicString& WebSocketHandshake::serverWebSocketProtocol() const
|
| -{
|
| - return m_response.headerFields().get("sec-websocket-protocol");
|
| -}
|
| -
|
| -const AtomicString& WebSocketHandshake::serverUpgrade() const
|
| -{
|
| - return m_response.headerFields().get("upgrade");
|
| -}
|
| -
|
| -const AtomicString& WebSocketHandshake::serverConnection() const
|
| -{
|
| - return m_response.headerFields().get("connection");
|
| -}
|
| -
|
| -const AtomicString& WebSocketHandshake::serverWebSocketAccept() const
|
| -{
|
| - return m_response.headerFields().get("sec-websocket-accept");
|
| -}
|
| -
|
| -String WebSocketHandshake::acceptedExtensions() const
|
| -{
|
| - return m_extensionDispatcher.acceptedExtensions();
|
| -}
|
| -
|
| -const WebSocketHandshakeResponse& WebSocketHandshake::serverHandshakeResponse() const
|
| -{
|
| - return m_response;
|
| -}
|
| -
|
| -void WebSocketHandshake::addExtensionProcessor(PassOwnPtr<WebSocketExtensionProcessor> processor)
|
| -{
|
| - m_extensionDispatcher.addProcessor(processor);
|
| -}
|
| -
|
| -KURL WebSocketHandshake::httpURLForAuthenticationAndCookies() const
|
| -{
|
| - KURL url = m_url.copy();
|
| - bool couldSetProtocol = url.setProtocol(m_secure ? "https" : "http");
|
| - ASSERT_UNUSED(couldSetProtocol, couldSetProtocol);
|
| - return url;
|
| -}
|
| -
|
| -// Returns the header length (including "\r\n"), or -1 if we have not received enough data yet.
|
| -// If the line is malformed or the status code is not a 3-digit number,
|
| -// statusCode and statusText will be set to -1 and a null string, respectively.
|
| -int WebSocketHandshake::readStatusLine(const char* header, size_t headerLength, int& statusCode, String& statusText)
|
| -{
|
| - // Arbitrary size limit to prevent the server from sending an unbounded
|
| - // amount of data with no newlines and forcing us to buffer it all.
|
| - static const int maximumLength = 1024;
|
| -
|
| - statusCode = -1;
|
| - statusText = String();
|
| -
|
| - const char* space1 = 0;
|
| - const char* space2 = 0;
|
| - const char* p;
|
| - size_t consumedLength;
|
| -
|
| - for (p = header, consumedLength = 0; consumedLength < headerLength; p++, consumedLength++) {
|
| - if (*p == ' ') {
|
| - if (!space1)
|
| - space1 = p;
|
| - else if (!space2)
|
| - space2 = p;
|
| - } else if (*p == '\0') {
|
| - // The caller isn't prepared to deal with null bytes in status
|
| - // line. WebSockets specification doesn't prohibit this, but HTTP
|
| - // does, so we'll just treat this as an error.
|
| - m_failureReason = formatHandshakeFailureReason("Status line contains embedded null");
|
| - return p + 1 - header;
|
| - } else if (*p == '\n') {
|
| - break;
|
| - }
|
| - }
|
| - if (consumedLength == headerLength)
|
| - return -1; // We have not received '\n' yet.
|
| -
|
| - const char* end = p + 1;
|
| - int lineLength = end - header;
|
| - if (lineLength > maximumLength) {
|
| - m_failureReason = formatHandshakeFailureReason("Status line is too long");
|
| - return maximumLength;
|
| - }
|
| -
|
| - // The line must end with "\r\n".
|
| - if (lineLength < 2 || *(end - 2) != '\r') {
|
| - m_failureReason = formatHandshakeFailureReason("Status line does not end with CRLF");
|
| - return lineLength;
|
| - }
|
| -
|
| - if (!space1 || !space2) {
|
| - m_failureReason = formatHandshakeFailureReason("No response code found in status line: " + trimInputSample(header, lineLength - 2));
|
| - return lineLength;
|
| - }
|
| -
|
| - String statusCodeString(space1 + 1, space2 - space1 - 1);
|
| - if (statusCodeString.length() != 3) // Status code must consist of three digits.
|
| - return lineLength;
|
| - for (int i = 0; i < 3; ++i) {
|
| - if (statusCodeString[i] < '0' || statusCodeString[i] > '9') {
|
| - m_failureReason = formatHandshakeFailureReason("Invalid status code: " + statusCodeString);
|
| - return lineLength;
|
| - }
|
| - }
|
| -
|
| - bool ok = false;
|
| - statusCode = statusCodeString.toInt(&ok);
|
| - ASSERT(ok);
|
| -
|
| - statusText = String(space2 + 1, end - space2 - 3); // Exclude "\r\n".
|
| - return lineLength;
|
| -}
|
| -
|
| -const char* WebSocketHandshake::readHTTPHeaders(const char* start, const char* end)
|
| -{
|
| - m_response.clearHeaderFields();
|
| -
|
| - AtomicString name;
|
| - AtomicString value;
|
| - bool sawSecWebSocketAcceptHeaderField = false;
|
| - bool sawSecWebSocketProtocolHeaderField = false;
|
| - const char* p = start;
|
| - while (p < end) {
|
| - size_t consumedLength = parseHTTPHeader(p, end - p, m_failureReason, name, value);
|
| - if (!consumedLength)
|
| - return 0;
|
| - p += consumedLength;
|
| -
|
| - // Stop once we consumed an empty line.
|
| - if (name.isEmpty())
|
| - break;
|
| -
|
| - // Sec-WebSocket-Extensions may be split. We parse and check the
|
| - // header value every time the header appears.
|
| - if (equalIgnoringCase("Sec-WebSocket-Extensions", name)) {
|
| - if (!m_extensionDispatcher.processHeaderValue(value)) {
|
| - m_failureReason = formatHandshakeFailureReason(m_extensionDispatcher.failureReason());
|
| - return 0;
|
| - }
|
| - } else if (equalIgnoringCase("Sec-WebSocket-Accept", name)) {
|
| - if (sawSecWebSocketAcceptHeaderField) {
|
| - m_failureReason = formatHandshakeFailureReason("'Sec-WebSocket-Accept' header must not appear more than once in a response");
|
| - return 0;
|
| - }
|
| - m_response.addHeaderField(name, value);
|
| - sawSecWebSocketAcceptHeaderField = true;
|
| - } else if (equalIgnoringCase("Sec-WebSocket-Protocol", name)) {
|
| - if (sawSecWebSocketProtocolHeaderField) {
|
| - m_failureReason = formatHandshakeFailureReason("'Sec-WebSocket-Protocol' header must not appear more than once in a response");
|
| - return 0;
|
| - }
|
| - m_response.addHeaderField(name, value);
|
| - sawSecWebSocketProtocolHeaderField = true;
|
| - } else {
|
| - m_response.addHeaderField(name, value);
|
| - }
|
| - }
|
| -
|
| - String extensions = m_extensionDispatcher.acceptedExtensions();
|
| - if (!extensions.isEmpty())
|
| - m_response.addHeaderField("Sec-WebSocket-Extensions", AtomicString(extensions));
|
| - return p;
|
| -}
|
| -
|
| -bool WebSocketHandshake::checkResponseHeaders()
|
| -{
|
| - const AtomicString& serverWebSocketProtocol = this->serverWebSocketProtocol();
|
| - const AtomicString& serverUpgrade = this->serverUpgrade();
|
| - const AtomicString& serverConnection = this->serverConnection();
|
| - const AtomicString& serverWebSocketAccept = this->serverWebSocketAccept();
|
| -
|
| - if (serverUpgrade.isNull()) {
|
| - m_failureReason = formatHandshakeFailureReason("'Upgrade' header is missing");
|
| - return false;
|
| - }
|
| - if (serverConnection.isNull()) {
|
| - m_failureReason = formatHandshakeFailureReason("'Connection' header is missing");
|
| - return false;
|
| - }
|
| - if (serverWebSocketAccept.isNull()) {
|
| - m_failureReason = formatHandshakeFailureReason("'Sec-WebSocket-Accept' header is missing");
|
| - return false;
|
| - }
|
| -
|
| - if (!equalIgnoringCase(serverUpgrade, "websocket")) {
|
| - m_failureReason = formatHandshakeFailureReason("'Upgrade' header value is not 'WebSocket': " + serverUpgrade);
|
| - return false;
|
| - }
|
| - if (!equalIgnoringCase(serverConnection, "upgrade")) {
|
| - m_failureReason = formatHandshakeFailureReason("'Connection' header value is not 'Upgrade': " + serverConnection);
|
| - return false;
|
| - }
|
| -
|
| - if (serverWebSocketAccept != m_expectedAccept) {
|
| - m_failureReason = formatHandshakeFailureReason("Incorrect 'Sec-WebSocket-Accept' header value");
|
| - return false;
|
| - }
|
| - if (!serverWebSocketProtocol.isNull()) {
|
| - if (m_clientProtocol.isEmpty()) {
|
| - m_failureReason = formatHandshakeFailureReason("Response must not include 'Sec-WebSocket-Protocol' header if not present in request: " + serverWebSocketProtocol);
|
| - return false;
|
| - }
|
| - Vector<String> result;
|
| - m_clientProtocol.split(String(DOMWebSocket::subprotocolSeperator()), result);
|
| - if (!result.contains(serverWebSocketProtocol)) {
|
| - m_failureReason = formatHandshakeFailureReason("'Sec-WebSocket-Protocol' header value '" + serverWebSocketProtocol + "' in response does not match any of sent values");
|
| - return false;
|
| - }
|
| - } else if (!m_clientProtocol.isEmpty()) {
|
| - m_failureReason = formatHandshakeFailureReason("Sent non-empty 'Sec-WebSocket-Protocol' header but no response was received");
|
| - return false;
|
| - }
|
| - return true;
|
| -}
|
| -
|
| -void WebSocketHandshake::trace(Visitor* visitor)
|
| -{
|
| - visitor->trace(m_document);
|
| -}
|
| -
|
| -} // namespace blink
|
|
|