| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396 |
- /*
- * libwebsockets - small server side websockets and web server implementation
- *
- * Copyright (C) 2010 - 2020 Andy Green <[email protected]>
- *
- * Permission is hereby granted, free of charge, to any person obtaining a copy
- * of this software and associated documentation files (the "Software"), to
- * deal in the Software without restriction, including without limitation the
- * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or
- * sell copies of the Software, and to permit persons to whom the Software is
- * furnished to do so, subject to the following conditions:
- *
- * The above copyright notice and this permission notice shall be included in
- * all copies or substantial portions of the Software.
- *
- * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
- * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
- * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
- * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
- * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
- * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS
- * IN THE SOFTWARE.
- */
- /*
- * You can leave buf NULL, if so it will be allocated on the heap once the
- * actual length is known. nf should be 0, it will be set at allocation time.
- *
- * Or you can ensure no allocation and use an external buffer by setting buf
- * and lim. But buf must be in the ep context somehow, since it may have to
- * survive returns to the event loop unchanged. Set nf to 0 in this case.
- *
- * Or you can set buf to an externally allocated buffer, in which case you may
- * set nf so it will be freed when the string is "freed".
- */
- #include "private-lib-core.h"
- /* #include "lws-mqtt.h" */
- /* 3.1.3.1-5: MUST allow... that contain only the characters... */
- static const uint8_t *code = (const uint8_t *)
- "0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ";
- static int
- lws_mqtt_generate_id(struct lws* wsi, lws_mqtt_str_t **ms, const char *client_id)
- {
- struct lws_context *context = wsi->a.context;
- uint16_t ran[24]; /* 16-bit so wrap bias from %62 diluted by ~1000 */
- size_t n, len;
- uint8_t *buf;
- if (client_id)
- len = strlen(client_id);
- else
- len = 23;
- if (len > 23) /* 3.1.3.1-5: Server MUST... between 1 and 23 chars... */
- return 1;
- *ms = lws_mqtt_str_create((uint16_t)(len + 1));
- if (!*ms)
- return 1;
- buf = lws_mqtt_str_next(*ms, NULL);
- if (client_id) {
- lws_strnncpy((char *)buf, client_id, len, len + 1);
- lwsl_notice("%s: User space provided a client ID '%s'\n",
- __func__, (const char *)buf);
- } else {
- lwsl_notice("%s: generating random client id\n", __func__);
- n = len * sizeof(ran[0]);
- if (lws_get_random(context, ran, n) != n) {
- lws_mqtt_str_free(ms);
- return 1;
- }
- for (n = 0; n < len; n++)
- buf[n] = code[ran[n] % 62];
- buf[len] = '\0';
- }
- if (lws_mqtt_str_advance(*ms, (uint16_t)len)) {
- lws_mqtt_str_free(ms);
- return 1;
- }
- return 0;
- }
- int
- lws_read_mqtt(struct lws *wsi, unsigned char *buf, lws_filepos_t len)
- {
- lws_mqttc_t *c = &wsi->mqtt->client;
- return _lws_mqtt_rx_parser(wsi, &c->par, buf, len);
- }
- int
- lws_create_client_mqtt_object(const struct lws_client_connect_info *i,
- struct lws *wsi)
- {
- lws_mqttc_t *c;
- const lws_mqtt_client_connect_param_t *cp = i->mqtt_cp;
- /* allocate the ws struct for the wsi */
- wsi->mqtt = lws_zalloc(sizeof(*wsi->mqtt), "client mqtt struct");
- if (!wsi->mqtt)
- goto oom;
- wsi->mqtt->wsi = wsi;
- c = &wsi->mqtt->client;
- if (lws_mqtt_generate_id(wsi, &c->id, cp->client_id)) {
- lwsl_err("%s: Error generating client ID\n", __func__);
- return 1;
- }
- lwsl_info("%s: using client id '%.*s'\n", __func__, c->id->len,
- (const char *)c->id->buf);
- if (cp->clean_start || !cp->client_id[0])
- c->conn_flags = LMQCFT_CLEAN_START;
- c->keep_alive_secs = cp->keep_alive;
- if (cp->will_param.topic &&
- *cp->will_param.topic) {
- c->will.topic = lws_mqtt_str_create_cstr_dup(
- cp->will_param.topic, 0);
- if (!c->will.topic)
- goto oom1;
- c->conn_flags |= LMQCFT_WILL_FLAG;
- if (cp->will_param.message) {
- c->will.message = lws_mqtt_str_create_cstr_dup(
- cp->will_param.message, 0);
- if (!c->will.message)
- goto oom2;
- }
- c->conn_flags |= (cp->will_param.qos << 3) & LMQCFT_WILL_QOS_MASK;
- c->conn_flags |= (!!cp->will_param.retain) * LMQCFT_WILL_RETAIN;
- }
- if (cp->username &&
- *cp->username) {
- c->username = lws_mqtt_str_create_cstr_dup(cp->username, 0);
- if (!c->username)
- goto oom3;
- c->conn_flags |= LMQCFT_USERNAME;
- if (cp->password) {
- c->password =
- lws_mqtt_str_create_cstr_dup(cp->password, 0);
- if (!c->password)
- goto oom4;
- c->conn_flags |= LMQCFT_PASSWORD;
- }
- }
- return 0;
- oom4:
- lws_mqtt_str_free(&c->username);
- oom3:
- lws_mqtt_str_free(&c->will.message);
- oom2:
- lws_mqtt_str_free(&c->will.topic);
- oom1:
- lws_mqtt_str_free(&c->id);
- oom:
- lwsl_err("%s: OOM!\n", __func__);
- return 1;
- }
- int
- lws_mqtt_client_socket_service(struct lws *wsi, struct lws_pollfd *pollfd,
- struct lws *wsi_conn)
- {
- struct lws_context *context = wsi->a.context;
- struct lws_context_per_thread *pt = &context->pt[(int)wsi->tsi];
- int n = 0, m = 0;
- struct lws_tokens ebuf;
- int buffered = 0;
- char pending = 0;
- #if defined(LWS_WITH_TLS)
- char erbuf[128];
- #endif
- const char *cce = NULL;
- switch (lwsi_state(wsi)) {
- #if defined(LWS_WITH_SOCKS5)
- /* SOCKS Greeting Reply */
- case LRS_WAITING_SOCKS_GREETING_REPLY:
- case LRS_WAITING_SOCKS_AUTH_REPLY:
- case LRS_WAITING_SOCKS_CONNECT_REPLY:
- switch (lws_socks5c_handle_state(wsi, pollfd, &cce)) {
- case LW5CHS_RET_RET0:
- return 0;
- case LW5CHS_RET_BAIL3:
- goto bail3;
- case LW5CHS_RET_STARTHS:
- /*
- * Now we got the socks5 connection, we need to go down
- * the tls path on it if that's what we want
- */
- if (!(wsi->tls.use_ssl & LCCSCF_USE_SSL))
- goto start_ws_handshake;
- switch (lws_client_create_tls(wsi, &cce, 0)) {
- case 0:
- break;
- case 1:
- return 0;
- default:
- goto bail3;
- }
- break;
- default:
- break;
- }
- break;
- #endif
- case LRS_WAITING_DNS:
- /*
- * we are under PENDING_TIMEOUT_SENT_CLIENT_HANDSHAKE
- * timeout protection set in client-handshake.c
- */
- if (!lws_client_connect_2_dnsreq(wsi)) {
- /* closed */
- lwsl_client("closed\n");
- return -1;
- }
- /* either still pending connection, or changed mode */
- return 0;
- case LRS_WAITING_CONNECT:
- /*
- * we are under PENDING_TIMEOUT_SENT_CLIENT_HANDSHAKE
- * timeout protection set in client-handshake.c
- */
- if (pollfd->revents & LWS_POLLOUT)
- lws_client_connect_3_connect(wsi, NULL, NULL, 0, NULL);
- break;
- #if defined(LWS_WITH_TLS)
- case LRS_WAITING_SSL:
- if (wsi->tls.use_ssl & LCCSCF_USE_SSL) {
- n = lws_ssl_client_connect2(wsi, erbuf, sizeof(erbuf));
- if (!n)
- return 0;
- if (n < 0) {
- cce = erbuf;
- goto bail3;
- }
- } else
- wsi->tls.ssl = NULL;
- #endif /* LWS_WITH_TLS */
- #if defined(LWS_WITH_DETAILED_LATENCY)
- if (context->detailed_latency_cb) {
- wsi->detlat.type = LDLT_TLS_NEG_CLIENT;
- wsi->detlat.latencies[LAT_DUR_PROXY_CLIENT_REQ_TO_WRITE] =
- lws_now_usecs() -
- wsi->detlat.earliest_write_req_pre_write;
- wsi->detlat.latencies[LAT_DUR_USERCB] = 0;
- lws_det_lat_cb(wsi->a.context, &wsi->detlat);
- }
- #endif
- #if 0
- if (wsi->client_h2_alpn) {
- /*
- * We connected to the server and set up tls, and
- * negotiated "h2".
- *
- * So this is it, we are an h2 master client connection
- * now, not an h1 client connection.
- */
- #if defined(LWS_WITH_TLS)
- lws_tls_server_conn_alpn(wsi);
- #endif
- /* send the H2 preface to legitimize the connection */
- if (lws_h2_issue_preface(wsi)) {
- cce = "error sending h2 preface";
- goto bail3;
- }
- break;
- }
- #endif
- /* fallthru */
- #if defined(LWS_WITH_SOCKS5)
- start_ws_handshake:
- #endif
- lwsi_set_state(wsi, LRS_MQTTC_IDLE);
- lws_set_timeout(wsi, PENDING_TIMEOUT_AWAITING_CLIENT_HS_SEND,
- context->timeout_secs);
- /* fallthru */
- case LRS_MQTTC_IDLE:
- /*
- * we should be ready to send out MQTT CONNECT
- */
- lwsl_info("%s: wsi %p: Transport established, send out CONNECT\n",
- __func__, wsi);
- if (lws_change_pollfd(wsi, LWS_POLLOUT, 0))
- return -1;
- if (!lws_mqtt_client_send_connect(wsi)) {
- lwsl_err("%s: Unable to send MQTT CONNECT\n", __func__);
- return -1;
- }
- if (lws_change_pollfd(wsi, 0, LWS_POLLIN))
- return -1;
- lwsi_set_state(wsi, LRS_MQTTC_AWAIT_CONNACK);
- return 0;
- case LRS_ESTABLISHED:
- case LRS_MQTTC_AWAIT_CONNACK:
- buffered = 0;
- ebuf.token = pt->serv_buf;
- ebuf.len = wsi->a.context->pt_serv_buf_size;
- if ((unsigned int)ebuf.len > wsi->a.context->pt_serv_buf_size)
- ebuf.len = wsi->a.context->pt_serv_buf_size;
- if ((int)pending > ebuf.len)
- pending = ebuf.len;
- ebuf.len = lws_ssl_capable_read(wsi, ebuf.token,
- pending ? (int)pending :
- ebuf.len);
- switch (ebuf.len) {
- case 0:
- lwsl_info("%s: zero length read\n",
- __func__);
- goto fail;
- case LWS_SSL_CAPABLE_MORE_SERVICE:
- lwsl_info("SSL Capable more service\n");
- return 0;
- case LWS_SSL_CAPABLE_ERROR:
- lwsl_info("%s: LWS_SSL_CAPABLE_ERROR\n",
- __func__);
- goto fail;
- }
- if (ebuf.len < 0)
- n = -1;
- else
- n = lws_read_mqtt(wsi, ebuf.token, ebuf.len);
- if (n < 0) {
- lwsl_err("%s: Parsing packet failed\n", __func__);
- goto fail;
- }
- m = ebuf.len - n;
- // lws_buflist_describe(&wsi->buflist, wsi, __func__);
- lwsl_debug("%s: consuming %d / %d\n", __func__, n, ebuf.len);
- if (lws_buflist_aware_finished_consuming(wsi, &ebuf, m,
- buffered,
- __func__))
- return -1;
- return 0;
- #if defined(LWS_WITH_TLS) || defined(LWS_WITH_SOCKS5)
- bail3:
- #endif
- lwsl_info("closing conn at LWS_CONNMODE...SERVER_REPLY\n");
- if (cce)
- lwsl_info("reason: %s\n", cce);
- lws_inform_client_conn_fail(wsi, (void *)cce, strlen(cce));
- lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS, "cbail3");
- return -1;
- default:
- break;
- }
- return 0;
- fail:
- lws_close_free_wsi(wsi, LWS_CLOSE_STATUS_NOSTATUS, "mqtt svc fail");
- return LWS_HPI_RET_WSI_ALREADY_DIED;
- }
|