2020-04-08 20:44:30 +03:00
|
|
|
module websocket
|
2020-04-08 15:22:31 +03:00
|
|
|
|
2020-05-26 13:50:37 +03:00
|
|
|
fn (mut ws Client) read_handshake(seckey string) {
|
|
|
|
l.d('reading handshake...')
|
2020-04-08 15:22:31 +03:00
|
|
|
mut bytes_read := 0
|
2020-04-24 08:32:51 +03:00
|
|
|
max_buffer := 1024
|
2020-04-08 15:22:31 +03:00
|
|
|
buffer_size := 1
|
|
|
|
mut buffer := malloc(max_buffer)
|
|
|
|
for bytes_read <= max_buffer {
|
|
|
|
res := ws.read_from_server(buffer + bytes_read, buffer_size)
|
2020-05-17 14:51:18 +03:00
|
|
|
if res == 0 || res == -1 {
|
2020-05-26 13:50:37 +03:00
|
|
|
l.f('read_handshake: Failed to read handshake.')
|
2020-04-08 15:22:31 +03:00
|
|
|
}
|
2020-05-26 13:50:37 +03:00
|
|
|
if buffer[bytes_read] == `\n` && buffer[bytes_read - 1] == `\r` && buffer[bytes_read -
|
|
|
|
2] == `\n` && buffer[bytes_read - 3] == `\r` {
|
2020-04-08 15:22:31 +03:00
|
|
|
break
|
|
|
|
}
|
|
|
|
bytes_read += buffer_size
|
|
|
|
}
|
2020-05-26 13:50:37 +03:00
|
|
|
buffer[max_buffer + 1] = `\0`
|
2020-04-08 15:22:31 +03:00
|
|
|
ws.handshake_handler(string(byteptr(buffer)), seckey)
|
|
|
|
}
|
|
|
|
|
2020-05-26 13:50:37 +03:00
|
|
|
fn (mut ws Client) handshake_handler(handshake_response, seckey string) {
|
|
|
|
l.d('handshake_handler:\r\n${handshake_response}')
|
2020-04-08 15:22:31 +03:00
|
|
|
lines := handshake_response.split_into_lines()
|
|
|
|
header := lines[0]
|
2020-05-26 13:50:37 +03:00
|
|
|
if !header.starts_with('HTTP/1.1 101') && !header.starts_with('HTTP/1.0 101') {
|
|
|
|
l.f('handshake_handler: invalid HTTP status response code')
|
2020-04-08 15:22:31 +03:00
|
|
|
}
|
2020-05-26 13:50:37 +03:00
|
|
|
for i in 1 .. lines.len {
|
|
|
|
if lines[i].len <= 0 || lines[i] == '\r\n' {
|
2020-04-08 15:22:31 +03:00
|
|
|
continue
|
|
|
|
}
|
2020-05-26 13:50:37 +03:00
|
|
|
keys := lines[i].split(':')
|
2020-04-08 15:22:31 +03:00
|
|
|
match keys[0] {
|
2020-05-26 13:50:37 +03:00
|
|
|
'Upgrade', 'upgrade' {
|
2020-04-24 08:32:51 +03:00
|
|
|
ws.flags << .has_upgrade
|
2020-04-08 15:22:31 +03:00
|
|
|
}
|
2020-05-26 13:50:37 +03:00
|
|
|
'Connection', 'connection' {
|
2020-04-24 08:32:51 +03:00
|
|
|
ws.flags << .has_connection
|
2020-04-08 15:22:31 +03:00
|
|
|
}
|
2020-05-26 13:50:37 +03:00
|
|
|
'Sec-WebSocket-Accept', 'sec-websocket-accept' {
|
|
|
|
l.d('comparing hashes')
|
|
|
|
l.d('seckey: ${seckey}')
|
2020-04-24 08:32:51 +03:00
|
|
|
challenge := create_key_challenge_response(seckey)
|
2020-05-26 13:50:37 +03:00
|
|
|
l.d('challenge: ${challenge}')
|
|
|
|
l.d('response: ${keys[1]}')
|
2020-04-24 08:32:51 +03:00
|
|
|
if keys[1].trim_space() != challenge {
|
2020-05-26 13:50:37 +03:00
|
|
|
l.e('handshake_handler: Sec-WebSocket-Accept header does not match computed sha1/base64 response.')
|
2020-04-08 15:22:31 +03:00
|
|
|
}
|
2020-04-24 08:32:51 +03:00
|
|
|
ws.flags << .has_accept
|
2020-04-08 15:22:31 +03:00
|
|
|
unsafe {
|
2020-04-24 08:32:51 +03:00
|
|
|
challenge.free()
|
2020-04-08 15:22:31 +03:00
|
|
|
}
|
2020-05-26 13:50:37 +03:00
|
|
|
}
|
|
|
|
else {}
|
2020-04-08 15:22:31 +03:00
|
|
|
}
|
|
|
|
unsafe {
|
|
|
|
keys.free()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ws.flags.len < 3 {
|
2020-05-26 13:50:37 +03:00
|
|
|
ws.close(1002, 'invalid websocket HTTP headers')
|
|
|
|
l.e('invalid websocket HTTP headers')
|
2020-04-08 15:22:31 +03:00
|
|
|
}
|
2020-05-26 13:50:37 +03:00
|
|
|
l.i('handshake successful!')
|
2020-04-08 15:22:31 +03:00
|
|
|
unsafe {
|
|
|
|
handshake_response.free()
|
|
|
|
lines.free()
|
|
|
|
header.free()
|
|
|
|
}
|
2020-05-26 13:50:37 +03:00
|
|
|
}
|