dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 1 | // Copyright 2014 The Chromium Authors. All rights reserved. |
| 2 | // Use of this source code is governed by a BSD-style license that can be |
| 3 | // found in the LICENSE file. |
| 4 | |
| 5 | #include "net/server/web_socket_encoder.h" |
| 6 | |
dcheng | c7eeda42 | 2015-12-26 03:56:48 | [diff] [blame] | 7 | #include <utility> |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 8 | #include <vector> |
| 9 | |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 10 | #include "base/logging.h" |
| 11 | #include "base/strings/string_number_conversions.h" |
| 12 | #include "base/strings/stringprintf.h" |
| 13 | #include "net/base/io_buffer.h" |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 14 | #include "net/websockets/websocket_deflate_parameters.h" |
| 15 | #include "net/websockets/websocket_extension.h" |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 16 | #include "net/websockets/websocket_extension_parser.h" |
| 17 | |
| 18 | namespace net { |
| 19 | |
| 20 | const char WebSocketEncoder::kClientExtensions[] = |
| 21 | "Sec-WebSocket-Extensions: permessage-deflate; client_max_window_bits"; |
| 22 | |
| 23 | namespace { |
| 24 | |
| 25 | const int kInflaterChunkSize = 16 * 1024; |
| 26 | |
| 27 | // Constants for hybi-10 frame format. |
| 28 | |
| 29 | typedef int OpCode; |
| 30 | |
| 31 | const OpCode kOpCodeContinuation = 0x0; |
| 32 | const OpCode kOpCodeText = 0x1; |
| 33 | const OpCode kOpCodeBinary = 0x2; |
| 34 | const OpCode kOpCodeClose = 0x8; |
| 35 | const OpCode kOpCodePing = 0x9; |
| 36 | const OpCode kOpCodePong = 0xA; |
| 37 | |
| 38 | const unsigned char kFinalBit = 0x80; |
| 39 | const unsigned char kReserved1Bit = 0x40; |
| 40 | const unsigned char kReserved2Bit = 0x20; |
| 41 | const unsigned char kReserved3Bit = 0x10; |
| 42 | const unsigned char kOpCodeMask = 0xF; |
| 43 | const unsigned char kMaskBit = 0x80; |
| 44 | const unsigned char kPayloadLengthMask = 0x7F; |
| 45 | |
| 46 | const size_t kMaxSingleBytePayloadLength = 125; |
| 47 | const size_t kTwoBytePayloadLengthField = 126; |
| 48 | const size_t kEightBytePayloadLengthField = 127; |
| 49 | const size_t kMaskingKeyWidthInBytes = 4; |
| 50 | |
| 51 | WebSocket::ParseResult DecodeFrameHybi17(const base::StringPiece& frame, |
| 52 | bool client_frame, |
| 53 | int* bytes_consumed, |
| 54 | std::string* output, |
| 55 | bool* compressed) { |
| 56 | size_t data_length = frame.length(); |
| 57 | if (data_length < 2) |
| 58 | return WebSocket::FRAME_INCOMPLETE; |
| 59 | |
| 60 | const char* buffer_begin = const_cast<char*>(frame.data()); |
| 61 | const char* p = buffer_begin; |
| 62 | const char* buffer_end = p + data_length; |
| 63 | |
| 64 | unsigned char first_byte = *p++; |
| 65 | unsigned char second_byte = *p++; |
| 66 | |
| 67 | bool final = (first_byte & kFinalBit) != 0; |
| 68 | bool reserved1 = (first_byte & kReserved1Bit) != 0; |
| 69 | bool reserved2 = (first_byte & kReserved2Bit) != 0; |
| 70 | bool reserved3 = (first_byte & kReserved3Bit) != 0; |
| 71 | int op_code = first_byte & kOpCodeMask; |
| 72 | bool masked = (second_byte & kMaskBit) != 0; |
| 73 | *compressed = reserved1; |
| 74 | if (!final || reserved2 || reserved3) |
| 75 | return WebSocket::FRAME_ERROR; // Only compression extension is supported. |
| 76 | |
| 77 | bool closed = false; |
| 78 | switch (op_code) { |
| 79 | case kOpCodeClose: |
| 80 | closed = true; |
| 81 | break; |
| 82 | case kOpCodeText: |
| 83 | break; |
| 84 | case kOpCodeBinary: // We don't support binary frames yet. |
| 85 | case kOpCodeContinuation: // We don't support binary frames yet. |
| 86 | case kOpCodePing: // We don't support binary frames yet. |
| 87 | case kOpCodePong: // We don't support binary frames yet. |
| 88 | default: |
| 89 | return WebSocket::FRAME_ERROR; |
| 90 | } |
| 91 | |
ellyjones | c7a5c50 | 2015-06-26 18:55:20 | [diff] [blame] | 92 | if (client_frame && !masked) // In Hybi-17 spec client MUST mask its frame. |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 93 | return WebSocket::FRAME_ERROR; |
| 94 | |
Avi Drissman | 13fc893 | 2015-12-20 04:40:46 | [diff] [blame] | 95 | uint64_t payload_length64 = second_byte & kPayloadLengthMask; |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 96 | if (payload_length64 > kMaxSingleBytePayloadLength) { |
| 97 | int extended_payload_length_size; |
| 98 | if (payload_length64 == kTwoBytePayloadLengthField) |
| 99 | extended_payload_length_size = 2; |
| 100 | else { |
| 101 | DCHECK(payload_length64 == kEightBytePayloadLengthField); |
| 102 | extended_payload_length_size = 8; |
| 103 | } |
| 104 | if (buffer_end - p < extended_payload_length_size) |
| 105 | return WebSocket::FRAME_INCOMPLETE; |
| 106 | payload_length64 = 0; |
| 107 | for (int i = 0; i < extended_payload_length_size; ++i) { |
| 108 | payload_length64 <<= 8; |
| 109 | payload_length64 |= static_cast<unsigned char>(*p++); |
| 110 | } |
| 111 | } |
| 112 | |
| 113 | size_t actual_masking_key_length = masked ? kMaskingKeyWidthInBytes : 0; |
Avi Drissman | 13fc893 | 2015-12-20 04:40:46 | [diff] [blame] | 114 | static const uint64_t max_payload_length = 0x7FFFFFFFFFFFFFFFull; |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 115 | static size_t max_length = std::numeric_limits<size_t>::max(); |
| 116 | if (payload_length64 > max_payload_length || |
| 117 | payload_length64 + actual_masking_key_length > max_length) { |
| 118 | // WebSocket frame length too large. |
| 119 | return WebSocket::FRAME_ERROR; |
| 120 | } |
| 121 | size_t payload_length = static_cast<size_t>(payload_length64); |
| 122 | |
| 123 | size_t total_length = actual_masking_key_length + payload_length; |
| 124 | if (static_cast<size_t>(buffer_end - p) < total_length) |
| 125 | return WebSocket::FRAME_INCOMPLETE; |
| 126 | |
| 127 | if (masked) { |
| 128 | output->resize(payload_length); |
| 129 | const char* masking_key = p; |
| 130 | char* payload = const_cast<char*>(p + kMaskingKeyWidthInBytes); |
| 131 | for (size_t i = 0; i < payload_length; ++i) // Unmask the payload. |
| 132 | (*output)[i] = payload[i] ^ masking_key[i % kMaskingKeyWidthInBytes]; |
| 133 | } else { |
| 134 | output->assign(p, p + payload_length); |
| 135 | } |
| 136 | |
| 137 | size_t pos = p + actual_masking_key_length + payload_length - buffer_begin; |
| 138 | *bytes_consumed = pos; |
| 139 | return closed ? WebSocket::FRAME_CLOSE : WebSocket::FRAME_OK; |
| 140 | } |
| 141 | |
| 142 | void EncodeFrameHybi17(const std::string& message, |
| 143 | int masking_key, |
| 144 | bool compressed, |
| 145 | std::string* output) { |
| 146 | std::vector<char> frame; |
| 147 | OpCode op_code = kOpCodeText; |
| 148 | size_t data_length = message.length(); |
| 149 | |
| 150 | int reserved1 = compressed ? kReserved1Bit : 0; |
| 151 | frame.push_back(kFinalBit | op_code | reserved1); |
| 152 | char mask_key_bit = masking_key != 0 ? kMaskBit : 0; |
brucedawson | ef12824 | 2015-12-01 04:26:36 | [diff] [blame] | 153 | if (data_length <= kMaxSingleBytePayloadLength) { |
| 154 | frame.push_back(static_cast<char>(data_length) | mask_key_bit); |
| 155 | } else if (data_length <= 0xFFFF) { |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 156 | frame.push_back(kTwoBytePayloadLengthField | mask_key_bit); |
| 157 | frame.push_back((data_length & 0xFF00) >> 8); |
| 158 | frame.push_back(data_length & 0xFF); |
| 159 | } else { |
| 160 | frame.push_back(kEightBytePayloadLengthField | mask_key_bit); |
| 161 | char extended_payload_length[8]; |
| 162 | size_t remaining = data_length; |
| 163 | // Fill the length into extended_payload_length in the network byte order. |
| 164 | for (int i = 0; i < 8; ++i) { |
| 165 | extended_payload_length[7 - i] = remaining & 0xFF; |
| 166 | remaining >>= 8; |
| 167 | } |
| 168 | frame.insert(frame.end(), extended_payload_length, |
| 169 | extended_payload_length + 8); |
| 170 | DCHECK(!remaining); |
| 171 | } |
| 172 | |
| 173 | const char* data = const_cast<char*>(message.data()); |
| 174 | if (masking_key != 0) { |
| 175 | const char* mask_bytes = reinterpret_cast<char*>(&masking_key); |
| 176 | frame.insert(frame.end(), mask_bytes, mask_bytes + 4); |
| 177 | for (size_t i = 0; i < data_length; ++i) // Mask the payload. |
| 178 | frame.push_back(data[i] ^ mask_bytes[i % kMaskingKeyWidthInBytes]); |
| 179 | } else { |
| 180 | frame.insert(frame.end(), data, data + data_length); |
| 181 | } |
| 182 | *output = std::string(&frame[0], frame.size()); |
| 183 | } |
| 184 | |
| 185 | } // anonymous namespace |
| 186 | |
| 187 | // static |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 188 | scoped_ptr<WebSocketEncoder> WebSocketEncoder::CreateServer() { |
| 189 | return make_scoped_ptr(new WebSocketEncoder(FOR_SERVER, nullptr, nullptr)); |
| 190 | } |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 191 | |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 192 | // static |
| 193 | scoped_ptr<WebSocketEncoder> WebSocketEncoder::CreateServer( |
| 194 | const std::string& extensions, |
| 195 | WebSocketDeflateParameters* deflate_parameters) { |
| 196 | WebSocketExtensionParser parser; |
| 197 | if (!parser.Parse(extensions)) { |
| 198 | // Failed to parse Sec-WebSocket-Extensions header. We MUST fail the |
| 199 | // connection. |
| 200 | return nullptr; |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 201 | } |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 202 | |
| 203 | for (const auto& extension : parser.extensions()) { |
| 204 | std::string failure_message; |
| 205 | WebSocketDeflateParameters offer; |
| 206 | if (!offer.Initialize(extension, &failure_message) || |
| 207 | !offer.IsValidAsRequest(&failure_message)) { |
| 208 | // We decline unknown / malformed extensions. |
| 209 | continue; |
| 210 | } |
| 211 | |
| 212 | WebSocketDeflateParameters response = offer; |
| 213 | if (offer.is_client_max_window_bits_specified() && |
| 214 | !offer.has_client_max_window_bits_value()) { |
| 215 | // We need to choose one value for the response. |
| 216 | response.SetClientMaxWindowBits(15); |
| 217 | } |
| 218 | DCHECK(response.IsValidAsResponse()); |
| 219 | DCHECK(offer.IsCompatibleWith(response)); |
| 220 | auto deflater = make_scoped_ptr( |
| 221 | new WebSocketDeflater(response.server_context_take_over_mode())); |
| 222 | auto inflater = make_scoped_ptr( |
| 223 | new WebSocketInflater(kInflaterChunkSize, kInflaterChunkSize)); |
| 224 | if (!deflater->Initialize(response.PermissiveServerMaxWindowBits()) || |
| 225 | !inflater->Initialize(response.PermissiveClientMaxWindowBits())) { |
| 226 | // For some reason we cannot accept the parameters. |
| 227 | continue; |
| 228 | } |
| 229 | *deflate_parameters = response; |
dcheng | c7eeda42 | 2015-12-26 03:56:48 | [diff] [blame] | 230 | return make_scoped_ptr(new WebSocketEncoder(FOR_SERVER, std::move(deflater), |
| 231 | std::move(inflater))); |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 232 | } |
| 233 | |
| 234 | // We cannot find an acceptable offer. |
| 235 | return make_scoped_ptr(new WebSocketEncoder(FOR_SERVER, nullptr, nullptr)); |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 236 | } |
| 237 | |
| 238 | // static |
olli.raula | 46a1acf | 2015-11-04 08:45:52 | [diff] [blame] | 239 | scoped_ptr<WebSocketEncoder> WebSocketEncoder::CreateClient( |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 240 | const std::string& response_extensions) { |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 241 | // TODO(yhirano): Add a way to return an error. |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 242 | |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 243 | WebSocketExtensionParser parser; |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 244 | if (!parser.Parse(response_extensions)) { |
| 245 | // Parse error. Note that there are two cases here. |
| 246 | // 1) There is no Sec-WebSocket-Extensions header. |
| 247 | // 2) There is a malformed Sec-WebSocketExtensions header. |
| 248 | // We should return a deflate-disabled encoder for the former case and |
| 249 | // fail the connection for the latter case. |
olli.raula | 46a1acf | 2015-11-04 08:45:52 | [diff] [blame] | 250 | return make_scoped_ptr(new WebSocketEncoder(FOR_CLIENT, nullptr, nullptr)); |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 251 | } |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 252 | if (parser.extensions().size() != 1) { |
| 253 | // Only permessage-deflate extension is supported. |
| 254 | // TODO (yhirano): Fail the connection. |
olli.raula | 46a1acf | 2015-11-04 08:45:52 | [diff] [blame] | 255 | return make_scoped_ptr(new WebSocketEncoder(FOR_CLIENT, nullptr, nullptr)); |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 256 | } |
| 257 | const auto& extension = parser.extensions()[0]; |
| 258 | WebSocketDeflateParameters params; |
| 259 | std::string failure_message; |
| 260 | if (!params.Initialize(extension, &failure_message) || |
| 261 | !params.IsValidAsResponse(&failure_message)) { |
| 262 | // TODO (yhirano): Fail the connection. |
olli.raula | 46a1acf | 2015-11-04 08:45:52 | [diff] [blame] | 263 | return make_scoped_ptr(new WebSocketEncoder(FOR_CLIENT, nullptr, nullptr)); |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 264 | } |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 265 | |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 266 | auto deflater = make_scoped_ptr( |
| 267 | new WebSocketDeflater(params.client_context_take_over_mode())); |
| 268 | auto inflater = make_scoped_ptr( |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 269 | new WebSocketInflater(kInflaterChunkSize, kInflaterChunkSize)); |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 270 | if (!deflater->Initialize(params.PermissiveClientMaxWindowBits()) || |
| 271 | !inflater->Initialize(params.PermissiveServerMaxWindowBits())) { |
| 272 | // TODO (yhirano): Fail the connection. |
olli.raula | 46a1acf | 2015-11-04 08:45:52 | [diff] [blame] | 273 | return make_scoped_ptr(new WebSocketEncoder(FOR_CLIENT, nullptr, nullptr)); |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 274 | } |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 275 | |
dcheng | c7eeda42 | 2015-12-26 03:56:48 | [diff] [blame] | 276 | return make_scoped_ptr(new WebSocketEncoder(FOR_CLIENT, std::move(deflater), |
| 277 | std::move(inflater))); |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 278 | } |
| 279 | |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 280 | WebSocketEncoder::WebSocketEncoder(Type type, |
| 281 | scoped_ptr<WebSocketDeflater> deflater, |
| 282 | scoped_ptr<WebSocketInflater> inflater) |
dcheng | c7eeda42 | 2015-12-26 03:56:48 | [diff] [blame] | 283 | : type_(type), |
| 284 | deflater_(std::move(deflater)), |
| 285 | inflater_(std::move(inflater)) {} |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 286 | |
| 287 | WebSocketEncoder::~WebSocketEncoder() {} |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 288 | |
| 289 | WebSocket::ParseResult WebSocketEncoder::DecodeFrame( |
| 290 | const base::StringPiece& frame, |
| 291 | int* bytes_consumed, |
| 292 | std::string* output) { |
| 293 | bool compressed; |
yhirano | a10dd4e | 2015-09-28 09:06:34 | [diff] [blame] | 294 | WebSocket::ParseResult result = DecodeFrameHybi17( |
| 295 | frame, type_ == FOR_SERVER, bytes_consumed, output, &compressed); |
dgozman | a6e7009 | 2014-12-12 14:46:21 | [diff] [blame] | 296 | if (result == WebSocket::FRAME_OK && compressed) { |
| 297 | if (!Inflate(output)) |
| 298 | result = WebSocket::FRAME_ERROR; |
| 299 | } |
| 300 | return result; |
| 301 | } |
| 302 | |
| 303 | void WebSocketEncoder::EncodeFrame(const std::string& frame, |
| 304 | int masking_key, |
| 305 | std::string* output) { |
| 306 | std::string compressed; |
| 307 | if (Deflate(frame, &compressed)) |
| 308 | EncodeFrameHybi17(compressed, masking_key, true, output); |
| 309 | else |
| 310 | EncodeFrameHybi17(frame, masking_key, false, output); |
| 311 | } |
| 312 | |
| 313 | bool WebSocketEncoder::Inflate(std::string* message) { |
| 314 | if (!inflater_) |
| 315 | return false; |
| 316 | if (!inflater_->AddBytes(message->data(), message->length())) |
| 317 | return false; |
| 318 | if (!inflater_->Finish()) |
| 319 | return false; |
| 320 | |
| 321 | std::vector<char> output; |
| 322 | while (inflater_->CurrentOutputSize() > 0) { |
| 323 | scoped_refptr<IOBufferWithSize> chunk = |
| 324 | inflater_->GetOutput(inflater_->CurrentOutputSize()); |
| 325 | if (!chunk.get()) |
| 326 | return false; |
| 327 | output.insert(output.end(), chunk->data(), chunk->data() + chunk->size()); |
| 328 | } |
| 329 | |
| 330 | *message = |
| 331 | output.size() ? std::string(&output[0], output.size()) : std::string(); |
| 332 | return true; |
| 333 | } |
| 334 | |
| 335 | bool WebSocketEncoder::Deflate(const std::string& message, |
| 336 | std::string* output) { |
| 337 | if (!deflater_) |
| 338 | return false; |
| 339 | if (!deflater_->AddBytes(message.data(), message.length())) { |
| 340 | deflater_->Finish(); |
| 341 | return false; |
| 342 | } |
| 343 | if (!deflater_->Finish()) |
| 344 | return false; |
| 345 | scoped_refptr<IOBufferWithSize> buffer = |
| 346 | deflater_->GetOutput(deflater_->CurrentOutputSize()); |
| 347 | if (!buffer.get()) |
| 348 | return false; |
| 349 | *output = std::string(buffer->data(), buffer->size()); |
| 350 | return true; |
| 351 | } |
| 352 | |
| 353 | } // namespace net |