2 * Copyright 2016 IoT.bzh
3 * Author: José Bollo <jose.bollo@iot.bzh>
5 * Licensed under the Apache License, Version 2.0 (the "License");
6 * you may not use this file except in compliance with the License.
7 * You may obtain a copy of the License at
9 * http://www.apache.org/licenses/LICENSE-2.0
11 * Unless required by applicable law or agreed to in writing, software
12 * distributed under the License is distributed on an "AS IS" BASIS,
13 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 * See the License for the specific language governing permissions and
15 * limitations under the License.
25 #include <openssl/sha.h>
26 #include <microhttpd.h>
28 #include "afb-ws-json.h"
30 #include "afb-method.h"
32 #include "afb-websock.h"
34 /**************** WebSocket connection upgrade ****************************/
36 static const char websocket_s[] = "websocket";
37 static const char sec_websocket_key_s[] = "Sec-WebSocket-Key";
38 static const char sec_websocket_version_s[] = "Sec-WebSocket-Version";
39 static const char sec_websocket_accept_s[] = "Sec-WebSocket-Accept";
40 static const char sec_websocket_protocol_s[] = "Sec-WebSocket-Protocol";
41 static const char websocket_guid[] = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11";
43 static void enc64(unsigned char *in, char *out)
45 static const char tob64[] =
46 "ABCDEFGHIJKLMNOPQRSTUVWXYZ"
47 "abcdefghijklmnopqrstuvwxyz"
49 out[0] = tob64[in[0] >> 2];
50 out[1] = tob64[((in[0] & 0x03) << 4) | ((in[1] & 0xf0) >> 4)];
51 out[2] = tob64[((in[1] & 0x0f) << 2) | ((in[2] & 0xc0) >> 6)];
52 out[3] = tob64[in[2] & 0x3f];
55 static void make_accept_value(const char *key, char result[29])
57 unsigned char md[SHA_DIGEST_LENGTH+1];
58 size_t len = strlen(key);
59 char *buffer = alloca(len + sizeof websocket_guid - 1);
60 memcpy(buffer, key, len);
61 memcpy(buffer + len, websocket_guid, sizeof websocket_guid - 1);
62 SHA1((const unsigned char *)buffer, (unsigned long)(len + sizeof websocket_guid - 1), md);
63 assert(SHA_DIGEST_LENGTH == 20);
65 enc64(&md[0], &result[0]);
66 enc64(&md[3], &result[4]);
67 enc64(&md[6], &result[8]);
68 enc64(&md[9], &result[12]);
69 enc64(&md[12], &result[16]);
70 enc64(&md[15], &result[20]);
71 enc64(&md[18], &result[24]);
76 static const char vseparators[] = " \t,";
78 static int headerhas(const char *header, const char *needle)
84 header += strspn(header, vseparators);
87 len = strcspn(header, vseparators);
88 if (n == len && 0 == strncasecmp(needle, header, n))
97 void *(*create)(int fd, struct AFB_clientCtx *context, void (*cleanup)(void*), void *closure);
100 static const struct protodef protodefs[] = {
101 { "x-afb-ws-json1", (void*)afb_ws_json_create },
105 static const struct protodef *search_proto(const char *protocols)
111 protocols += strspn(protocols, vseparators);
114 len = strcspn(protocols, vseparators);
115 for (i = 0 ; protodefs[i].name != NULL ; i++)
116 if (!strncasecmp(protodefs[i].name, protocols, len)
117 && !protodefs[i].name[len])
118 return &protodefs[i];
123 int afb_websock_check_upgrade(struct afb_hreq *hreq)
125 const char *connection, *upgrade, *key, *version, *protocols;
128 const struct protodef *proto;
131 /* is an upgrade to websocket ? */
132 upgrade = afb_hreq_get_header(hreq, MHD_HTTP_HEADER_UPGRADE);
133 if (upgrade == NULL || strcasecmp(upgrade, websocket_s))
136 /* is a connection for upgrade ? */
137 connection = afb_hreq_get_header(hreq, MHD_HTTP_HEADER_CONNECTION);
138 if (connection == NULL
139 || !headerhas (connection, MHD_HTTP_HEADER_UPGRADE))
143 if (hreq->method != afb_method_get
144 || strcasecmp(hreq->version, MHD_HTTP_VERSION_1_1))
147 /* has a key and a version ? */
148 key = afb_hreq_get_header(hreq, sec_websocket_key_s);
149 version = afb_hreq_get_header(hreq, sec_websocket_version_s);
150 if (key == NULL || version == NULL)
153 /* is a supported version ? */
154 vernum = atoi(version);
156 afb_hreq_reply_empty(hreq, MHD_HTTP_UPGRADE_REQUIRED,
157 sec_websocket_version_s, "13", NULL);
161 /* is the protocol supported ? */
162 protocols = afb_hreq_get_header(hreq, sec_websocket_protocol_s);
163 proto = protocols == NULL ? NULL : search_proto(protocols);
165 afb_hreq_reply_error(hreq, MHD_HTTP_PRECONDITION_FAILED);
169 /* create the web socket */
170 /* TODO fullfil ondisconnection and records!!! */
171 ws = proto->create(dup(MHD_get_connection_info(hreq->connection,MHD_CONNECTION_INFO_CONNECTION_FD)->connect_fd),
172 afb_hreq_context(hreq),
173 (void*)MHD_resume_connection,
176 afb_hreq_reply_error(hreq, MHD_HTTP_INTERNAL_SERVER_ERROR);
180 /* send the accept connection */
181 make_accept_value(key, acceptval);
182 afb_hreq_reply_empty(hreq, MHD_HTTP_SWITCHING_PROTOCOLS,
183 sec_websocket_accept_s, acceptval,
184 sec_websocket_protocol_s, proto->name,
185 MHD_HTTP_HEADER_CONNECTION, MHD_HTTP_HEADER_UPGRADE,
186 MHD_HTTP_HEADER_UPGRADE, websocket_s,