| OLD | NEW |
| 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 1 // Copyright (c) 2012 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "net/server/web_socket.h" | 5 #include "net/server/web_socket.h" |
| 6 | 6 |
| 7 #include <limits> | |
| 8 | |
| 9 #include "base/base64.h" | 7 #include "base/base64.h" |
| 10 #include "base/rand_util.h" | |
| 11 #include "base/logging.h" | 8 #include "base/logging.h" |
| 12 #include "base/md5.h" | 9 #include "base/md5.h" |
| 13 #include "base/sha1.h" | 10 #include "base/sha1.h" |
| 14 #include "base/strings/string_number_conversions.h" | 11 #include "base/strings/string_number_conversions.h" |
| 15 #include "base/strings/stringprintf.h" | 12 #include "base/strings/stringprintf.h" |
| 16 #include "base/sys_byteorder.h" | 13 #include "base/sys_byteorder.h" |
| 17 #include "net/server/http_connection.h" | 14 #include "net/server/http_connection.h" |
| 18 #include "net/server/http_server.h" | 15 #include "net/server/http_server.h" |
| 19 #include "net/server/http_server_request_info.h" | 16 #include "net/server/http_server_request_info.h" |
| 20 #include "net/server/http_server_response_info.h" | 17 #include "net/server/http_server_response_info.h" |
| 18 #include "net/server/web_socket_encoder.h" |
| 21 | 19 |
| 22 namespace net { | 20 namespace net { |
| 23 | 21 |
| 24 namespace { | 22 namespace { |
| 25 | 23 |
| 26 static uint32 WebSocketKeyFingerprint(const std::string& str) { | 24 static uint32 WebSocketKeyFingerprint(const std::string& str) { |
| 27 std::string result; | 25 std::string result; |
| 28 const char* p_char = str.c_str(); | 26 const char* p_char = str.c_str(); |
| 29 int length = str.length(); | 27 int length = str.length(); |
| 30 int spaces = 0; | 28 int spaces = 0; |
| (...skipping 114 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 145 *pos += kWebSocketHandshakeBodyLen; | 143 *pos += kWebSocketHandshakeBodyLen; |
| 146 } | 144 } |
| 147 | 145 |
| 148 std::string key3_; | 146 std::string key3_; |
| 149 | 147 |
| 150 DISALLOW_COPY_AND_ASSIGN(WebSocketHixie76); | 148 DISALLOW_COPY_AND_ASSIGN(WebSocketHixie76); |
| 151 }; | 149 }; |
| 152 | 150 |
| 153 const int WebSocketHixie76::kWebSocketHandshakeBodyLen = 8; | 151 const int WebSocketHixie76::kWebSocketHandshakeBodyLen = 8; |
| 154 | 152 |
| 155 | |
| 156 // Constants for hybi-10 frame format. | |
| 157 | |
| 158 typedef int OpCode; | |
| 159 | |
| 160 const OpCode kOpCodeContinuation = 0x0; | |
| 161 const OpCode kOpCodeText = 0x1; | |
| 162 const OpCode kOpCodeBinary = 0x2; | |
| 163 const OpCode kOpCodeClose = 0x8; | |
| 164 const OpCode kOpCodePing = 0x9; | |
| 165 const OpCode kOpCodePong = 0xA; | |
| 166 | |
| 167 const unsigned char kFinalBit = 0x80; | |
| 168 const unsigned char kReserved1Bit = 0x40; | |
| 169 const unsigned char kReserved2Bit = 0x20; | |
| 170 const unsigned char kReserved3Bit = 0x10; | |
| 171 const unsigned char kOpCodeMask = 0xF; | |
| 172 const unsigned char kMaskBit = 0x80; | |
| 173 const unsigned char kPayloadLengthMask = 0x7F; | |
| 174 | |
| 175 const size_t kMaxSingleBytePayloadLength = 125; | |
| 176 const size_t kTwoBytePayloadLengthField = 126; | |
| 177 const size_t kEightBytePayloadLengthField = 127; | |
| 178 const size_t kMaskingKeyWidthInBytes = 4; | |
| 179 | |
| 180 class WebSocketHybi17 : public WebSocket { | 153 class WebSocketHybi17 : public WebSocket { |
| 181 public: | 154 public: |
| 182 static WebSocket* Create(HttpServer* server, | 155 static WebSocket* Create(HttpServer* server, |
| 183 HttpConnection* connection, | 156 HttpConnection* connection, |
| 184 const HttpServerRequestInfo& request, | 157 const HttpServerRequestInfo& request, |
| 185 size_t* pos) { | 158 size_t* pos) { |
| 186 std::string version = request.GetHeaderValue("sec-websocket-version"); | 159 std::string version = request.GetHeaderValue("sec-websocket-version"); |
| 187 if (version != "8" && version != "13") | 160 if (version != "8" && version != "13") |
| 188 return NULL; | 161 return NULL; |
| 189 | 162 |
| (...skipping 10 matching lines...) Expand all Loading... |
| 200 } | 173 } |
| 201 | 174 |
| 202 void Accept(const HttpServerRequestInfo& request) override { | 175 void Accept(const HttpServerRequestInfo& request) override { |
| 203 static const char* const kWebSocketGuid = | 176 static const char* const kWebSocketGuid = |
| 204 "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; | 177 "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"; |
| 205 std::string key = request.GetHeaderValue("sec-websocket-key"); | 178 std::string key = request.GetHeaderValue("sec-websocket-key"); |
| 206 std::string data = base::StringPrintf("%s%s", key.c_str(), kWebSocketGuid); | 179 std::string data = base::StringPrintf("%s%s", key.c_str(), kWebSocketGuid); |
| 207 std::string encoded_hash; | 180 std::string encoded_hash; |
| 208 base::Base64Encode(base::SHA1HashString(data), &encoded_hash); | 181 base::Base64Encode(base::SHA1HashString(data), &encoded_hash); |
| 209 | 182 |
| 210 server_->SendRaw( | 183 server_->SendRaw(connection_->id(), |
| 211 connection_->id(), | 184 base::StringPrintf( |
| 212 base::StringPrintf("HTTP/1.1 101 WebSocket Protocol Handshake\r\n" | 185 "HTTP/1.1 101 WebSocket Protocol Handshake\r\n" |
| 213 "Upgrade: WebSocket\r\n" | 186 "Upgrade: WebSocket\r\n" |
| 214 "Connection: Upgrade\r\n" | 187 "Connection: Upgrade\r\n" |
| 215 "Sec-WebSocket-Accept: %s\r\n" | 188 "Sec-WebSocket-Accept: %s\r\n" |
| 216 "\r\n", | 189 "%s" |
| 217 encoded_hash.c_str())); | 190 "\r\n", |
| 191 encoded_hash.c_str(), response_extensions_.c_str())); |
| 218 } | 192 } |
| 219 | 193 |
| 220 ParseResult Read(std::string* message) override { | 194 ParseResult Read(std::string* message) override { |
| 221 HttpConnection::ReadIOBuffer* read_buf = connection_->read_buf(); | 195 HttpConnection::ReadIOBuffer* read_buf = connection_->read_buf(); |
| 222 base::StringPiece frame(read_buf->StartOfBuffer(), read_buf->GetSize()); | 196 base::StringPiece frame(read_buf->StartOfBuffer(), read_buf->GetSize()); |
| 223 int bytes_consumed = 0; | 197 int bytes_consumed = 0; |
| 224 ParseResult result = | 198 ParseResult result = encoder_->DecodeFrame(frame, &bytes_consumed, message); |
| 225 WebSocket::DecodeFrameHybi17(frame, true, &bytes_consumed, message); | |
| 226 if (result == FRAME_OK) | 199 if (result == FRAME_OK) |
| 227 read_buf->DidConsume(bytes_consumed); | 200 read_buf->DidConsume(bytes_consumed); |
| 228 if (result == FRAME_CLOSE) | 201 if (result == FRAME_CLOSE) |
| 229 closed_ = true; | 202 closed_ = true; |
| 230 return result; | 203 return result; |
| 231 } | 204 } |
| 232 | 205 |
| 233 void Send(const std::string& message) override { | 206 void Send(const std::string& message) override { |
| 234 if (closed_) | 207 if (closed_) |
| 235 return; | 208 return; |
| 236 server_->SendRaw(connection_->id(), | 209 std::string encoded; |
| 237 WebSocket::EncodeFrameHybi17(message, 0)); | 210 encoder_->EncodeFrame(message, 0, &encoded); |
| 211 server_->SendRaw(connection_->id(), encoded); |
| 238 } | 212 } |
| 239 | 213 |
| 240 private: | 214 private: |
| 241 WebSocketHybi17(HttpServer* server, | 215 WebSocketHybi17(HttpServer* server, |
| 242 HttpConnection* connection, | 216 HttpConnection* connection, |
| 243 const HttpServerRequestInfo& request, | 217 const HttpServerRequestInfo& request, |
| 244 size_t* pos) | 218 size_t* pos) |
| 245 : WebSocket(server, connection), | 219 : WebSocket(server, connection), |
| 246 op_code_(0), | |
| 247 final_(false), | |
| 248 reserved1_(false), | |
| 249 reserved2_(false), | |
| 250 reserved3_(false), | |
| 251 masked_(false), | |
| 252 payload_(0), | |
| 253 payload_length_(0), | |
| 254 frame_end_(0), | |
| 255 closed_(false) { | 220 closed_(false) { |
| 221 std::string request_extensions = |
| 222 request.GetHeaderValue("sec-websocket-extensions"); |
| 223 encoder_.reset(WebSocketEncoder::CreateServer(request_extensions, |
| 224 &response_extensions_)); |
| 225 if (!response_extensions_.empty()) { |
| 226 response_extensions_ = |
| 227 "Sec-WebSocket-Extensions: " + response_extensions_ + "\r\n"; |
| 228 } |
| 256 } | 229 } |
| 257 | 230 |
| 258 OpCode op_code_; | 231 scoped_ptr<WebSocketEncoder> encoder_; |
| 259 bool final_; | 232 std::string response_extensions_; |
| 260 bool reserved1_; | |
| 261 bool reserved2_; | |
| 262 bool reserved3_; | |
| 263 bool masked_; | |
| 264 const char* payload_; | |
| 265 size_t payload_length_; | |
| 266 const char* frame_end_; | |
| 267 bool closed_; | 233 bool closed_; |
| 268 | 234 |
| 269 DISALLOW_COPY_AND_ASSIGN(WebSocketHybi17); | 235 DISALLOW_COPY_AND_ASSIGN(WebSocketHybi17); |
| 270 }; | 236 }; |
| 271 | 237 |
| 272 } // anonymous namespace | 238 } // anonymous namespace |
| 273 | 239 |
| 274 WebSocket* WebSocket::CreateWebSocket(HttpServer* server, | 240 WebSocket* WebSocket::CreateWebSocket(HttpServer* server, |
| 275 HttpConnection* connection, | 241 HttpConnection* connection, |
| 276 const HttpServerRequestInfo& request, | 242 const HttpServerRequestInfo& request, |
| 277 size_t* pos) { | 243 size_t* pos) { |
| 278 WebSocket* socket = WebSocketHybi17::Create(server, connection, request, pos); | 244 WebSocket* socket = WebSocketHybi17::Create(server, connection, request, pos); |
| 279 if (socket) | 245 if (socket) |
| 280 return socket; | 246 return socket; |
| 281 | 247 |
| 282 return WebSocketHixie76::Create(server, connection, request, pos); | 248 return WebSocketHixie76::Create(server, connection, request, pos); |
| 283 } | 249 } |
| 284 | 250 |
| 285 // static | |
| 286 WebSocket::ParseResult WebSocket::DecodeFrameHybi17( | |
| 287 const base::StringPiece& frame, | |
| 288 bool client_frame, | |
| 289 int* bytes_consumed, | |
| 290 std::string* output) { | |
| 291 size_t data_length = frame.length(); | |
| 292 if (data_length < 2) | |
| 293 return FRAME_INCOMPLETE; | |
| 294 | |
| 295 const char* buffer_begin = const_cast<char*>(frame.data()); | |
| 296 const char* p = buffer_begin; | |
| 297 const char* buffer_end = p + data_length; | |
| 298 | |
| 299 unsigned char first_byte = *p++; | |
| 300 unsigned char second_byte = *p++; | |
| 301 | |
| 302 bool final = (first_byte & kFinalBit) != 0; | |
| 303 bool reserved1 = (first_byte & kReserved1Bit) != 0; | |
| 304 bool reserved2 = (first_byte & kReserved2Bit) != 0; | |
| 305 bool reserved3 = (first_byte & kReserved3Bit) != 0; | |
| 306 int op_code = first_byte & kOpCodeMask; | |
| 307 bool masked = (second_byte & kMaskBit) != 0; | |
| 308 if (!final || reserved1 || reserved2 || reserved3) | |
| 309 return FRAME_ERROR; // Extensions and not supported. | |
| 310 | |
| 311 bool closed = false; | |
| 312 switch (op_code) { | |
| 313 case kOpCodeClose: | |
| 314 closed = true; | |
| 315 break; | |
| 316 case kOpCodeText: | |
| 317 break; | |
| 318 case kOpCodeBinary: // We don't support binary frames yet. | |
| 319 case kOpCodeContinuation: // We don't support binary frames yet. | |
| 320 case kOpCodePing: // We don't support binary frames yet. | |
| 321 case kOpCodePong: // We don't support binary frames yet. | |
| 322 default: | |
| 323 return FRAME_ERROR; | |
| 324 } | |
| 325 | |
| 326 if (client_frame && !masked) // In Hybi-17 spec client MUST mask his frame. | |
| 327 return FRAME_ERROR; | |
| 328 | |
| 329 uint64 payload_length64 = second_byte & kPayloadLengthMask; | |
| 330 if (payload_length64 > kMaxSingleBytePayloadLength) { | |
| 331 int extended_payload_length_size; | |
| 332 if (payload_length64 == kTwoBytePayloadLengthField) | |
| 333 extended_payload_length_size = 2; | |
| 334 else { | |
| 335 DCHECK(payload_length64 == kEightBytePayloadLengthField); | |
| 336 extended_payload_length_size = 8; | |
| 337 } | |
| 338 if (buffer_end - p < extended_payload_length_size) | |
| 339 return FRAME_INCOMPLETE; | |
| 340 payload_length64 = 0; | |
| 341 for (int i = 0; i < extended_payload_length_size; ++i) { | |
| 342 payload_length64 <<= 8; | |
| 343 payload_length64 |= static_cast<unsigned char>(*p++); | |
| 344 } | |
| 345 } | |
| 346 | |
| 347 size_t actual_masking_key_length = masked ? kMaskingKeyWidthInBytes : 0; | |
| 348 static const uint64 max_payload_length = 0x7FFFFFFFFFFFFFFFull; | |
| 349 static size_t max_length = std::numeric_limits<size_t>::max(); | |
| 350 if (payload_length64 > max_payload_length || | |
| 351 payload_length64 + actual_masking_key_length > max_length) { | |
| 352 // WebSocket frame length too large. | |
| 353 return FRAME_ERROR; | |
| 354 } | |
| 355 size_t payload_length = static_cast<size_t>(payload_length64); | |
| 356 | |
| 357 size_t total_length = actual_masking_key_length + payload_length; | |
| 358 if (static_cast<size_t>(buffer_end - p) < total_length) | |
| 359 return FRAME_INCOMPLETE; | |
| 360 | |
| 361 if (masked) { | |
| 362 output->resize(payload_length); | |
| 363 const char* masking_key = p; | |
| 364 char* payload = const_cast<char*>(p + kMaskingKeyWidthInBytes); | |
| 365 for (size_t i = 0; i < payload_length; ++i) // Unmask the payload. | |
| 366 (*output)[i] = payload[i] ^ masking_key[i % kMaskingKeyWidthInBytes]; | |
| 367 } else { | |
| 368 output->assign(p, p + payload_length); | |
| 369 } | |
| 370 | |
| 371 size_t pos = p + actual_masking_key_length + payload_length - buffer_begin; | |
| 372 *bytes_consumed = pos; | |
| 373 return closed ? FRAME_CLOSE : FRAME_OK; | |
| 374 } | |
| 375 | |
| 376 // static | |
| 377 std::string WebSocket::EncodeFrameHybi17(const std::string& message, | |
| 378 int masking_key) { | |
| 379 std::vector<char> frame; | |
| 380 OpCode op_code = kOpCodeText; | |
| 381 size_t data_length = message.length(); | |
| 382 | |
| 383 frame.push_back(kFinalBit | op_code); | |
| 384 char mask_key_bit = masking_key != 0 ? kMaskBit : 0; | |
| 385 if (data_length <= kMaxSingleBytePayloadLength) | |
| 386 frame.push_back(data_length | mask_key_bit); | |
| 387 else if (data_length <= 0xFFFF) { | |
| 388 frame.push_back(kTwoBytePayloadLengthField | mask_key_bit); | |
| 389 frame.push_back((data_length & 0xFF00) >> 8); | |
| 390 frame.push_back(data_length & 0xFF); | |
| 391 } else { | |
| 392 frame.push_back(kEightBytePayloadLengthField | mask_key_bit); | |
| 393 char extended_payload_length[8]; | |
| 394 size_t remaining = data_length; | |
| 395 // Fill the length into extended_payload_length in the network byte order. | |
| 396 for (int i = 0; i < 8; ++i) { | |
| 397 extended_payload_length[7 - i] = remaining & 0xFF; | |
| 398 remaining >>= 8; | |
| 399 } | |
| 400 frame.insert(frame.end(), | |
| 401 extended_payload_length, | |
| 402 extended_payload_length + 8); | |
| 403 DCHECK(!remaining); | |
| 404 } | |
| 405 | |
| 406 const char* data = const_cast<char*>(message.data()); | |
| 407 if (masking_key != 0) { | |
| 408 const char* mask_bytes = reinterpret_cast<char*>(&masking_key); | |
| 409 frame.insert(frame.end(), mask_bytes, mask_bytes + 4); | |
| 410 for (size_t i = 0; i < data_length; ++i) // Mask the payload. | |
| 411 frame.push_back(data[i] ^ mask_bytes[i % kMaskingKeyWidthInBytes]); | |
| 412 } else { | |
| 413 frame.insert(frame.end(), data, data + data_length); | |
| 414 } | |
| 415 return std::string(&frame[0], frame.size()); | |
| 416 } | |
| 417 | |
| 418 WebSocket::WebSocket(HttpServer* server, HttpConnection* connection) | 251 WebSocket::WebSocket(HttpServer* server, HttpConnection* connection) |
| 419 : server_(server), | 252 : server_(server), |
| 420 connection_(connection) { | 253 connection_(connection) { |
| 421 } | 254 } |
| 422 | 255 |
| 256 WebSocket::~WebSocket() { |
| 257 } |
| 258 |
| 423 } // namespace net | 259 } // namespace net |
| OLD | NEW |