| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426 | /* * Wslay - The WebSocket Library * * Copyright (c) 2011, 2012 Tatsuhiro Tsujikawa * * Permission is hereby granted, free of charge, to any person obtaining * a copy of this software and associated documentation files (the * "Software"), to deal in the Software without restriction, including * without limitation the rights to use, copy, modify, merge, publish, * distribute, sublicense, and/or sell copies of the Software, and to * permit persons to whom the Software is furnished to do so, subject to * the following conditions: * * The above copyright notice and this permission notice shall be * included in all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE * LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION * OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION * WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. *//* * WebSocket Echo Server * This is suitable for Autobahn server test. * * Dependency: nettle-dev * * To compile: * $ gcc -Wall -O2 -g -o fork-echoserv fork-echoserv.c -L../lib/.libs -I../lib/includes -lwslay -lnettle * * To run: * $ export LD_LIBRARY_PATH=../lib/.libs * $ ./a.out 9000 */#include <sys/types.h>#include <sys/socket.h>#include <netdb.h>#include <unistd.h>#include <fcntl.h>#include <poll.h>#include <netinet/in.h>#include <netinet/tcp.h>#include <signal.h>#include <assert.h>#include <stdio.h>#include <errno.h>#include <stdlib.h>#include <string.h>#include <nettle/base64.h>#include <nettle/sha.h>#include <wslay/wslay.h>/* * Create server socket, listen on *service*.  This function returns * file descriptor of server socket if it succeeds, or returns -1. */int create_listen_socket(const char *service){  struct addrinfo hints, *res, *rp;  int sfd = -1;  int r;  memset(&hints, 0, sizeof(struct addrinfo));  hints.ai_family = AF_UNSPEC;  hints.ai_socktype = SOCK_STREAM;  hints.ai_flags = AI_PASSIVE | AI_ADDRCONFIG;  r = getaddrinfo(0, service, &hints, &res);  if(r != 0) {    fprintf(stderr, "getaddrinfo: %s", gai_strerror(r));    return -1;  }  for(rp = res; rp; rp = rp->ai_next) {    int val = 1;    sfd = socket(rp->ai_family, rp->ai_socktype, rp->ai_protocol);    if(sfd == -1) {      continue;    }    if(setsockopt(sfd, SOL_SOCKET, SO_REUSEADDR, &val,                  (socklen_t)sizeof(val)) == -1) {      continue;    }    if(bind(sfd, rp->ai_addr, rp->ai_addrlen) == 0) {      break;    }    close(sfd);  }  freeaddrinfo(res);  if(listen(sfd, 16) == -1) {    perror("listen");    close(sfd);    return -1;  }  return sfd;}/* * Makes file descriptor *fd* non-blocking mode. * This function returns 0, or returns -1. */int make_non_block(int fd){  int flags, r;  while((flags = fcntl(fd, F_GETFL, 0)) == -1 && errno == EINTR);  if(flags == -1) {    perror("fcntl");    return -1;  }  while((r = fcntl(fd, F_SETFL, flags | O_NONBLOCK)) == -1 && errno == EINTR);  if(r == -1) {    perror("fcntl");    return -1;  }  return 0;}/* * Calculates SHA-1 hash of *src*. The size of *src* is *src_length* bytes. * *dst* must be at least SHA1_DIGEST_SIZE. */void sha1(uint8_t *dst, const uint8_t *src, size_t src_length){  struct sha1_ctx ctx;  sha1_init(&ctx);  sha1_update(&ctx, src_length, src);  sha1_digest(&ctx, SHA1_DIGEST_SIZE, dst);}/* * Base64-encode *src* and stores it in *dst*. * The size of *src* is *src_length*. * *dst* must be at least BASE64_ENCODE_RAW_LENGTH(src_length). */void base64(uint8_t *dst, const uint8_t *src, size_t src_length){  struct base64_encode_ctx ctx;  base64_encode_init(&ctx);  base64_encode_raw(dst, src_length, src);}#define WS_GUID "258EAFA5-E914-47DA-95CA-C5AB0DC85B11"/* * Create Server's accept key in *dst*. * *client_key* is the value of |Sec-WebSocket-Key| header field in * client's handshake and it must be length of 24. * *dst* must be at least BASE64_ENCODE_RAW_LENGTH(20)+1. */void create_accept_key(char *dst, const char *client_key){  uint8_t sha1buf[20], key_src[60];  memcpy(key_src, client_key, 24);  memcpy(key_src+24, WS_GUID, 36);  sha1(sha1buf, key_src, sizeof(key_src));  base64((uint8_t*)dst, sha1buf, 20);  dst[BASE64_ENCODE_RAW_LENGTH(20)] = '\0';}/* * Performs HTTP handshake. *fd* is the file descriptor of the * connection to the client. This function returns 0 if it succeeds, * or returns -1. */int http_handshake(int fd){  /*   * Note: The implementation of HTTP handshake in this function is   * written for just a example of how to use of wslay library and is   * not meant to be used in production code.  In practice, you need   * to do more strict verification of the client's handshake.   */  char header[16384], accept_key[29], *keyhdstart, *keyhdend, res_header[256];  size_t header_length = 0, res_header_sent = 0, res_header_length;  ssize_t r;  while(1) {    while((r = read(fd, header+header_length,                    sizeof(header)-header_length)) == -1 && errno == EINTR);    if(r == -1) {      perror("read");      return -1;    } else if(r == 0) {      fprintf(stderr, "HTTP Handshake: Got EOF");      return -1;    } else {      header_length += r;      if(header_length >= 4 &&         memcmp(header+header_length-4, "\r\n\r\n", 4) == 0) {        break;      } else if(header_length == sizeof(header)) {        fprintf(stderr, "HTTP Handshake: Too large HTTP headers");        return -1;      }    }  }  if(strstr(header, "\r\nUpgrade: websocket\r\n") == NULL ||     strstr(header, "\r\nConnection: Upgrade\r\n") == NULL ||     (keyhdstart = strstr(header, "\r\nSec-WebSocket-Key:")) == NULL) {    fprintf(stderr, "HTTP Handshake: Missing required header fields");    return -1;  }  keyhdstart += 20;  for(; *keyhdstart == ' '; ++keyhdstart);  keyhdend = keyhdstart;  for(; *keyhdend != '\r' && *keyhdend != ' '; ++keyhdend);  if(keyhdend-keyhdstart != 24) {    printf("%s\n", keyhdstart);    fprintf(stderr, "HTTP Handshake: Invalid value in Sec-WebSocket-Key");    return -1;  }  create_accept_key(accept_key, keyhdstart);  snprintf(res_header, sizeof(res_header),           "HTTP/1.1 101 Switching Protocols\r\n"           "Upgrade: websocket\r\n"           "Connection: Upgrade\r\n"           "Sec-WebSocket-Accept: %s\r\n"           "\r\n", accept_key);  res_header_length = strlen(res_header);  while(res_header_sent < res_header_length) {    while((r = write(fd, res_header+res_header_sent,                     res_header_length-res_header_sent)) == -1 &&          errno == EINTR);    if(r == -1) {      perror("write");      return -1;    } else {      res_header_sent += r;    }  }  return 0;}/* * This struct is passed as *user_data* in callback function.  The * *fd* member is the file descriptor of the connection to the client. */struct Session {  int fd;};ssize_t send_callback(wslay_event_context_ptr ctx,                      const uint8_t *data, size_t len, int flags,                      void *user_data){  struct Session *session = (struct Session*)user_data;  ssize_t r;  int sflags = 0;#ifdef MSG_MORE  if(flags & WSLAY_MSG_MORE) {    sflags |= MSG_MORE;  }#endif // MSG_MORE  while((r = send(session->fd, data, len, sflags)) == -1 && errno == EINTR);  if(r == -1) {    if(errno == EAGAIN || errno == EWOULDBLOCK) {      wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);    } else {      wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);    }  }  return r;}ssize_t recv_callback(wslay_event_context_ptr ctx, uint8_t *buf, size_t len,                      int flags, void *user_data){  struct Session *session = (struct Session*)user_data;  ssize_t r;  while((r = recv(session->fd, buf, len, 0)) == -1 && errno == EINTR);  if(r == -1) {    if(errno == EAGAIN || errno == EWOULDBLOCK) {      wslay_event_set_error(ctx, WSLAY_ERR_WOULDBLOCK);    } else {      wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);    }  } else if(r == 0) {    /* Unexpected EOF is also treated as an error */    wslay_event_set_error(ctx, WSLAY_ERR_CALLBACK_FAILURE);    r = -1;  }  return r;}    void on_msg_recv_callback(wslay_event_context_ptr ctx,                          const struct wslay_event_on_msg_recv_arg *arg,                          void *user_data){  /* Echo back non-control message */  if(!wslay_is_ctrl_frame(arg->opcode)) {    struct wslay_event_msg msgarg = {      arg->opcode, arg->msg, arg->msg_length    };    wslay_event_queue_msg(ctx, &msgarg);  }}/* * Communicate with the client. This function performs HTTP handshake * and WebSocket data transfer until close handshake is done or an * error occurs. *fd* is the file descriptor of the connection to the * client. This function returns 0 if it succeeds, or returns 0. */int communicate(int fd){  wslay_event_context_ptr ctx;  struct wslay_event_callbacks callbacks = {    recv_callback,    send_callback,    NULL,    NULL,    NULL,    NULL,    on_msg_recv_callback  };  struct Session session = { fd };  int val = 1;  struct pollfd event;  int res = 0;  if(http_handshake(fd) == -1) {    return -1;  }  if(make_non_block(fd) == -1) {    return -1;  }  if(setsockopt(fd, IPPROTO_TCP, TCP_NODELAY, &val, (socklen_t)sizeof(val))     == -1) {    perror("setsockopt: TCP_NODELAY");    return -1;  }  memset(&event, 0, sizeof(struct pollfd));  event.fd = fd;  event.events = POLLIN;  wslay_event_context_server_init(&ctx, &callbacks, &session);  /*   * Event loop: basically loop until both wslay_event_want_read(ctx)   * and wslay_event_want_write(ctx) return 0.   */  while(wslay_event_want_read(ctx) || wslay_event_want_write(ctx)) {    int r;    while((r = poll(&event, 1, -1)) == -1 && errno == EINTR);    if(r == -1) {      perror("poll");      res = -1;      break;    }    if(((event.revents & POLLIN) && wslay_event_recv(ctx) != 0) ||       ((event.revents & POLLOUT) && wslay_event_send(ctx) != 0) ||       (event.revents & (POLLERR | POLLHUP | POLLNVAL))) {      /*       * If either wslay_event_recv() or wslay_event_send() return       * non-zero value, it means serious error which prevents wslay       * library from processing further data, so WebSocket connection       * must be closed.       */      res = -1;      break;    }    event.events = 0;    if(wslay_event_want_read(ctx)) {      event.events |= POLLIN;    }    if(wslay_event_want_write(ctx)) {      event.events |= POLLOUT;    }  }  return res;}/* * Serves echo back service forever.  *sfd* is the file descriptor of * the server socket.  when the incoming connection from the client is * accepted, this function forks another process and the forked * process communicates with client. The parent process goes back to * the loop and can accept another client. */void serve(int sfd){  while(1) {    int fd;    while((fd = accept(sfd, NULL, NULL)) == -1 && errno == EINTR);    if(fd == -1) {      perror("accept");    } else {      int r = fork();      if(r == -1) {        perror("fork");        close(fd);      } else if(r == 0) {        int r = communicate(fd);        shutdown(fd, SHUT_WR);        close(fd);        if(r == 0) {          exit(EXIT_SUCCESS);        } else {          exit(EXIT_FAILURE);        }      }    }  }}int main(int argc, char **argv){  struct sigaction act;  int sfd;  if(argc < 2) {    fprintf(stderr, "Usage: %s PORT\n", argv[0]);    exit(EXIT_FAILURE);  }  memset(&act, 0, sizeof(struct sigaction));  act.sa_handler = SIG_IGN;  sigaction(SIGPIPE, &act, NULL);  sigaction(SIGCHLD, &act, NULL);  sfd = create_listen_socket(argv[1]);  if(sfd == -1) {    fprintf(stderr, "Failed to create server socket\n");    exit(EXIT_FAILURE);  }  printf("WebSocket echo server, listening on %s\n", argv[1]);  serve(sfd);  return EXIT_SUCCESS;}
 |