/* * libwebsockets - small server side websockets and web server implementation * * Copyright (C) 2010 - 2019 Andy Green * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to * deal in the Software without restriction, including without limitation the * rights to use, copy, modify, merge, publish, distribute, sublicense, and/or * sell copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING * FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS * IN THE SOFTWARE. */ #include "private-lib-core.h" /* * Official static header table for HPACK * +-------+-----------------------------+---------------+ | 1 | :authority | | | 2 | :method | GET | | 3 | :method | POST | | 4 | :path | / | | 5 | :path | /index.html | | 6 | :scheme | http | | 7 | :scheme | https | | 8 | :status | 200 | | 9 | :status | 204 | | 10 | :status | 206 | | 11 | :status | 304 | | 12 | :status | 400 | | 13 | :status | 404 | | 14 | :status | 500 | | 15 | accept-charset | | | 16 | accept-encoding | gzip, deflate | | 17 | accept-language | | | 18 | accept-ranges | | | 19 | accept | | | 20 | access-control-allow-origin | | | 21 | age | | | 22 | allow | | | 23 | authorization | | | 24 | cache-control | | | 25 | content-disposition | | | 26 | content-encoding | | | 27 | content-language | | | 28 | content-length | | | 29 | content-location | | | 30 | content-range | | | 31 | content-type | | | 32 | cookie | | | 33 | date | | | 34 | etag | | | 35 | expect | | | 36 | expires | | | 37 | from | | | 38 | host | | | 39 | if-match | | | 40 | if-modified-since | | | 41 | if-none-match | | | 42 | if-range | | | 43 | if-unmodified-since | | | 44 | last-modified | | | 45 | link | | | 46 | location | | | 47 | max-forwards | | | 48 | proxy-authenticate | | | 49 | proxy-authorization | | | 50 | range | | | 51 | referer | | | 52 | refresh | | | 53 | retry-after | | | 54 | server | | | 55 | set-cookie | | | 56 | strict-transport-security | | | 57 | transfer-encoding | | | 58 | user-agent | | | 59 | vary | | | 60 | via | | | 61 | www-authenticate | | +-------+-----------------------------+---------------+ */ static const uint8_t static_hdr_len[62] = { 0, /* starts at 1 */ 10, 7, 7, 5, 5, 7, 7, 7, 7, 7, 7, 7, 7, 7, 14, 15, 15, 13, 6, 27, 3, 5, 13, 13, 19, 16, 16, 14, 16, 13, 12, 6, 4, 4, 6, 7, 4, 4, 8, 17, 13, 8, 19, 13, 4, 8, 12, 18, 19, 5, 7, 7, 11, 6, 10, 25, 17, 10, 4, 3, 16 }; static const unsigned char static_token[] = { 0, WSI_TOKEN_HTTP_COLON_AUTHORITY, WSI_TOKEN_HTTP_COLON_METHOD, WSI_TOKEN_HTTP_COLON_METHOD, WSI_TOKEN_HTTP_COLON_PATH, WSI_TOKEN_HTTP_COLON_PATH, WSI_TOKEN_HTTP_COLON_SCHEME, WSI_TOKEN_HTTP_COLON_SCHEME, WSI_TOKEN_HTTP_COLON_STATUS, WSI_TOKEN_HTTP_COLON_STATUS, WSI_TOKEN_HTTP_COLON_STATUS, WSI_TOKEN_HTTP_COLON_STATUS, WSI_TOKEN_HTTP_COLON_STATUS, WSI_TOKEN_HTTP_COLON_STATUS, WSI_TOKEN_HTTP_COLON_STATUS, WSI_TOKEN_HTTP_ACCEPT_CHARSET, WSI_TOKEN_HTTP_ACCEPT_ENCODING, WSI_TOKEN_HTTP_ACCEPT_LANGUAGE, WSI_TOKEN_HTTP_ACCEPT_RANGES, WSI_TOKEN_HTTP_ACCEPT, WSI_TOKEN_HTTP_ACCESS_CONTROL_ALLOW_ORIGIN, WSI_TOKEN_HTTP_AGE, WSI_TOKEN_HTTP_ALLOW, WSI_TOKEN_HTTP_AUTHORIZATION, WSI_TOKEN_HTTP_CACHE_CONTROL, WSI_TOKEN_HTTP_CONTENT_DISPOSITION, WSI_TOKEN_HTTP_CONTENT_ENCODING, WSI_TOKEN_HTTP_CONTENT_LANGUAGE, WSI_TOKEN_HTTP_CONTENT_LENGTH, WSI_TOKEN_HTTP_CONTENT_LOCATION, WSI_TOKEN_HTTP_CONTENT_RANGE, WSI_TOKEN_HTTP_CONTENT_TYPE, WSI_TOKEN_HTTP_COOKIE, WSI_TOKEN_HTTP_DATE, WSI_TOKEN_HTTP_ETAG, WSI_TOKEN_HTTP_EXPECT, WSI_TOKEN_HTTP_EXPIRES, WSI_TOKEN_HTTP_FROM, WSI_TOKEN_HOST, WSI_TOKEN_HTTP_IF_MATCH, WSI_TOKEN_HTTP_IF_MODIFIED_SINCE, WSI_TOKEN_HTTP_IF_NONE_MATCH, WSI_TOKEN_HTTP_IF_RANGE, WSI_TOKEN_HTTP_IF_UNMODIFIED_SINCE, WSI_TOKEN_HTTP_LAST_MODIFIED, WSI_TOKEN_HTTP_LINK, WSI_TOKEN_HTTP_LOCATION, WSI_TOKEN_HTTP_MAX_FORWARDS, WSI_TOKEN_HTTP_PROXY_AUTHENTICATE, WSI_TOKEN_HTTP_PROXY_AUTHORIZATION, WSI_TOKEN_HTTP_RANGE, WSI_TOKEN_HTTP_REFERER, WSI_TOKEN_HTTP_REFRESH, WSI_TOKEN_HTTP_RETRY_AFTER, WSI_TOKEN_HTTP_SERVER, WSI_TOKEN_HTTP_SET_COOKIE, WSI_TOKEN_HTTP_STRICT_TRANSPORT_SECURITY, WSI_TOKEN_HTTP_TRANSFER_ENCODING, WSI_TOKEN_HTTP_USER_AGENT, WSI_TOKEN_HTTP_VARY, WSI_TOKEN_HTTP_VIA, WSI_TOKEN_HTTP_WWW_AUTHENTICATE, }; /* some of the entries imply values as well as header names */ static const char * const http2_canned[] = { "", "", "GET", "POST", "/", "/index.html", "http", "https", "200", "204", "206", "304", "400", "404", "500", "", "gzip, deflate" }; /* see minihuf.c */ #include "huftable.h" static int huftable_decode(int pos, char c) { int q = pos + !!c; if (lextable_terms[q >> 3] & (1 << (q & 7))) /* terminal */ return lextable[q] | 0x8000; return pos + (lextable[q] << 1); } static int lws_frag_start(struct lws *wsi, int hdr_token_idx) { struct allocated_headers *ah = wsi->http.ah; if (!ah) { lwsl_notice("%s: no ah\n", __func__); return 1; } ah->hdr_token_idx = -1; lwsl_header("%s: token %d ah->pos = %d, ah->nfrag = %d\n", __func__, hdr_token_idx, ah->pos, ah->nfrag); if (!hdr_token_idx) { lwsl_err("%s: zero hdr_token_idx\n", __func__); return 1; } if (ah->nfrag >= LWS_ARRAY_SIZE(ah->frag_index)) { lwsl_err("%s: frag index %d too big\n", __func__, ah->nfrag); return 1; } if ((hdr_token_idx == WSI_TOKEN_HTTP_COLON_AUTHORITY || hdr_token_idx == WSI_TOKEN_HTTP_COLON_METHOD || hdr_token_idx == WSI_TOKEN_HTTP_COLON_PATH || hdr_token_idx == WSI_TOKEN_COLON_PROTOCOL || hdr_token_idx == WSI_TOKEN_HTTP_COLON_SCHEME) && ah->frag_index[hdr_token_idx]) { if (!(ah->frags[ah->frag_index[hdr_token_idx]].flags & 1)) { lws_h2_goaway(lws_get_network_wsi(wsi), H2_ERR_PROTOCOL_ERROR, "Duplicated pseudoheader"); return 1; } } if (ah->nfrag == 0) ah->nfrag = 1; ah->frags[ah->nfrag].offset = ah->pos; ah->frags[ah->nfrag].len = 0; ah->frags[ah->nfrag].nfrag = 0; ah->frags[ah->nfrag].flags = 2; /* we had reason to set it */ ah->hdr_token_idx = hdr_token_idx; /* * Okay, but we could be, eg, the second or subsequent cookie: header */ if (ah->frag_index[hdr_token_idx]) { int n; /* find the last fragment for this header... */ n = ah->frag_index[hdr_token_idx]; while (ah->frags[n].nfrag) n = ah->frags[n].nfrag; /* and point it to continue in our continuation fragment */ ah->frags[n].nfrag = ah->nfrag; /* cookie continuations need a separator token of ';' */ if (hdr_token_idx == WSI_TOKEN_HTTP_COOKIE) { ah->data[ah->pos++] = ';'; ah->frags[ah->nfrag].len++; } } else ah->frag_index[hdr_token_idx] = ah->nfrag; return 0; } static int lws_frag_append(struct lws *wsi, unsigned char c) { struct allocated_headers *ah = wsi->http.ah; ah->data[ah->pos++] = c; ah->frags[ah->nfrag].len++; return (int)ah->pos >= wsi->context->max_http_header_data; } static int lws_frag_end(struct lws *wsi) { lwsl_header("%s\n", __func__); if (lws_frag_append(wsi, 0)) return 1; /* don't account for the terminating NUL in the logical length */ wsi->http.ah->frags[wsi->http.ah->nfrag].len--; wsi->http.ah->nfrag++; return 0; } int lws_hdr_extant(struct lws *wsi, enum lws_token_indexes h) { struct allocated_headers *ah = wsi->http.ah; int n; if (!ah) return 0; n = ah->frag_index[h]; if (!n) return 0; return !!(ah->frags[n].flags & 2); } static void lws_dump_header(struct lws *wsi, int hdr) { char s[200]; const unsigned char *p; int len; if (hdr == LWS_HPACK_IGNORE_ENTRY) { lwsl_notice("hdr tok ignored\n"); return; } (void)p; len = lws_hdr_copy(wsi, s, sizeof(s) - 1, hdr); if (len < 0) strcpy(s, "(too big to show)"); else s[len] = '\0'; p = lws_token_to_string(hdr); lwsl_header(" hdr tok %d (%s) = '%s' (len %d)\n", hdr, p ? (char *)p : (char *)"null", s, len); } /* * dynamic table * * [ 0 .... num_entries - 1] * * Starts filling at 0+ * * #62 is *most recently entered* * * Number of entries is not restricted, but aggregated size of the entry * payloads is. Unfortunately the way HPACK does this is specific to an * imagined implementation, and lws implementation is much more efficient * (ignoring unknown headers and using the lws token index for the header * name part). */ /* * returns 0 if dynamic entry (arg and len are filled) * returns -1 if failure * returns nonzero token index if actually static token */ static int lws_token_from_index(struct lws *wsi, int index, const char **arg, int *len, uint32_t *hdr_len) { struct hpack_dynamic_table *dyn; if (index == LWS_HPACK_IGNORE_ENTRY) return LWS_HPACK_IGNORE_ENTRY; /* dynamic table only belongs to network wsi */ wsi = lws_get_network_wsi(wsi); if (!wsi->h2.h2n) return -1; dyn = &wsi->h2.h2n->hpack_dyn_table; if (index < 0) return -1; if (index < (int)LWS_ARRAY_SIZE(static_token)) { if (arg && index < (int)LWS_ARRAY_SIZE(http2_canned)) { *arg = http2_canned[index]; *len = (int)strlen(http2_canned[index]); } if (hdr_len) *hdr_len = static_hdr_len[index]; return static_token[index]; } if (!dyn) { lwsl_notice("no dynamic table\n"); return -1; } if (index >= (int)LWS_ARRAY_SIZE(static_token) + dyn->used_entries) { lwsl_info(" %s: adjusted index %d >= %d\n", __func__, index, (int)LWS_ARRAY_SIZE(static_token) + dyn->used_entries); lws_h2_goaway(wsi, H2_ERR_COMPRESSION_ERROR, "index out of range"); return -1; } index -= (int)LWS_ARRAY_SIZE(static_token); index = (dyn->pos - 1 - index) % dyn->num_entries; if (index < 0) index += dyn->num_entries; lwsl_header("%s: dyn index %d, tok %d\n", __func__, index, dyn->entries[index].lws_hdr_idx); if (arg && len) { *arg = dyn->entries[index].value; *len = dyn->entries[index].value_len; } if (hdr_len) *hdr_len = dyn->entries[index].hdr_len; return dyn->entries[index].lws_hdr_idx; } static int lws_h2_dynamic_table_dump(struct lws *wsi) { #if 0 struct lws *nwsi = lws_get_network_wsi(wsi); struct hpack_dynamic_table *dyn; int n, m; const char *p; if (!nwsi->h2.h2n) return 1; dyn = &nwsi->h2.h2n->hpack_dyn_table; lwsl_header("Dump dyn table for nwsi %p (%d / %d members, pos = %d, " "start index %d, virt used %d / %d)\n", nwsi, dyn->used_entries, dyn->num_entries, dyn->pos, (uint32_t)LWS_ARRAY_SIZE(static_token), dyn->virtual_payload_usage, dyn->virtual_payload_max); for (n = 0; n < dyn->used_entries; n++) { m = (dyn->pos - 1 - n) % dyn->num_entries; if (m < 0) m += dyn->num_entries; if (dyn->entries[m].lws_hdr_idx != LWS_HPACK_IGNORE_ENTRY) p = (const char *)lws_token_to_string( dyn->entries[m].lws_hdr_idx); else p = "(ignored)"; lwsl_header(" %3d: tok %s: (len %d) val '%s'\n", (int)(n + LWS_ARRAY_SIZE(static_token)), p, dyn->entries[m].hdr_len, dyn->entries[m].value ? dyn->entries[m].value : "null"); } #endif return 0; } static void lws_dynamic_free(struct hpack_dynamic_table *dyn, int idx) { lwsl_header("freeing %d for reuse\n", idx); dyn->virtual_payload_usage -= dyn->entries[idx].value_len + dyn->entries[idx].hdr_len; lws_free_set_NULL(dyn->entries[idx].value); dyn->entries[idx].value = NULL; dyn->entries[idx].value_len = 0; dyn->entries[idx].hdr_len = 0; dyn->entries[idx].lws_hdr_idx = LWS_HPACK_IGNORE_ENTRY; dyn->used_entries--; } /* * There are two address spaces, 1) internal ringbuffer and 2) HPACK indexes. * * Internal ringbuffer: * * The internal ringbuffer wraps as we keep filling it, dyn->pos points to * the next index to be written. * * HPACK indexes: * * The last-written entry becomes entry 0, the previously-last-written entry * becomes entry 1 etc. */ static int lws_dynamic_token_insert(struct lws *wsi, int hdr_len, int lws_hdr_index, char *arg, int len) { struct hpack_dynamic_table *dyn; int new_index; /* dynamic table only belongs to network wsi */ wsi = lws_get_network_wsi(wsi); if (!wsi->h2.h2n) return 1; dyn = &wsi->h2.h2n->hpack_dyn_table; if (!dyn->entries) { lwsl_err("%s: unsized dyn table\n", __func__); return 1; } lws_h2_dynamic_table_dump(wsi); new_index = (dyn->pos) % dyn->num_entries; if (dyn->num_entries && dyn->used_entries == dyn->num_entries) { if (dyn->virtual_payload_usage < dyn->virtual_payload_max) lwsl_err("Dropping header content before limit!\n"); /* we have to drop the oldest to make space */ lws_dynamic_free(dyn, new_index); } /* * evict guys to make room, allowing for some overage. We have to * take care about getting a single huge header, and evicting * everything */ while (dyn->virtual_payload_usage && dyn->used_entries && dyn->virtual_payload_usage + hdr_len + len > dyn->virtual_payload_max + 1024) { int n = (dyn->pos - dyn->used_entries) % dyn->num_entries; if (n < 0) n += dyn->num_entries; lws_dynamic_free(dyn, n); } if (dyn->used_entries < dyn->num_entries) dyn->used_entries++; dyn->entries[new_index].value_len = 0; if (lws_hdr_index != LWS_HPACK_IGNORE_ENTRY) { if (dyn->entries[new_index].value) lws_free_set_NULL(dyn->entries[new_index].value); dyn->entries[new_index].value = lws_malloc(len + 1, "hpack dyn"); if (!dyn->entries[new_index].value) return 1; memcpy(dyn->entries[new_index].value, arg, len); dyn->entries[new_index].value[len] = '\0'; dyn->entries[new_index].value_len = len; } else dyn->entries[new_index].value = NULL; dyn->entries[new_index].lws_hdr_idx = lws_hdr_index; dyn->entries[new_index].hdr_len = hdr_len; dyn->virtual_payload_usage += hdr_len + len; lwsl_info("%s: index %ld: lws_hdr_index 0x%x, hdr len %d, '%s' len %d\n", __func__, (long)LWS_ARRAY_SIZE(static_token), lws_hdr_index, hdr_len, dyn->entries[new_index].value ? dyn->entries[new_index].value : "null", len); dyn->pos = (dyn->pos + 1) % dyn->num_entries; lws_h2_dynamic_table_dump(wsi); return 0; } int lws_hpack_dynamic_size(struct lws *wsi, int size) { struct hpack_dynamic_table *dyn; struct hpack_dt_entry *dte; struct lws *nwsi; int min, n = 0, m; /* * "size" here is coming from the http/2 SETTING * SETTINGS_HEADER_TABLE_SIZE. This is a (virtual, in our case) * linear buffer containing dynamic header names and values... when it * is full, old entries are evicted. * * We encode the header as an lws_hdr_idx, which is all the rest of * lws cares about; if there is no matching header we store an empty * entry in the dyn table as a placeholder. * * So to make the two systems work together we keep an accounting of * what we are using to decide when to evict... we must only evict * things when the remote peer's accounting also makes him feel he * should evict something. */ nwsi = lws_get_network_wsi(wsi); if (!nwsi->h2.h2n) goto bail; dyn = &nwsi->h2.h2n->hpack_dyn_table; lwsl_info("%s: from %d to %d, lim %u\n", __func__, (int)dyn->num_entries, size, (unsigned int)nwsi->vhost->h2.set.s[H2SET_HEADER_TABLE_SIZE]); if (!size) { size = dyn->num_entries * 8; lws_hpack_destroy_dynamic_header(wsi); } if (size > (int)nwsi->vhost->h2.set.s[H2SET_HEADER_TABLE_SIZE]) { lwsl_info("rejecting hpack dyn size %u vs %u\n", size, (unsigned int)nwsi->vhost->h2.set.s[H2SET_HEADER_TABLE_SIZE]); // this seems necessary to work with some browsers if (nwsi->vhost->h2.set.s[H2SET_HEADER_TABLE_SIZE] == 65536 && size == 65537) { /* h2spec */ lws_h2_goaway(nwsi, H2_ERR_COMPRESSION_ERROR, "Asked for header table bigger than we told"); goto bail; } size = nwsi->vhost->h2.set.s[H2SET_HEADER_TABLE_SIZE]; } dyn->virtual_payload_max = size; size = size / 8; min = size; if (min > dyn->used_entries) min = dyn->used_entries; if (size == dyn->num_entries) return 0; if (dyn->num_entries < min) min = dyn->num_entries; // lwsl_notice("dte requested size %d\n", size); dte = lws_zalloc(sizeof(*dte) * (size + 1), "dynamic table entries"); if (!dte) goto bail; while (dyn->virtual_payload_usage && dyn->used_entries && dyn->virtual_payload_usage > dyn->virtual_payload_max) { n = (dyn->pos - dyn->used_entries) % dyn->num_entries; if (n < 0) n += dyn->num_entries; lws_dynamic_free(dyn, n); } if (min > dyn->used_entries) min = dyn->used_entries; if (dyn->entries) { for (n = 0; n < min; n++) { m = (dyn->pos - dyn->used_entries + n) % dyn->num_entries; if (m < 0) m += dyn->num_entries; dte[n] = dyn->entries[m]; } lws_free(dyn->entries); } dyn->entries = dte; dyn->num_entries = size; dyn->used_entries = min; if (size) dyn->pos = min % size; else dyn->pos = 0; lws_h2_dynamic_table_dump(wsi); return 0; bail: lwsl_info("%s: failed to resize to %d\n", __func__, size); return 1; } void lws_hpack_destroy_dynamic_header(struct lws *wsi) { struct hpack_dynamic_table *dyn; int n; if (!wsi->h2.h2n) return; dyn = &wsi->h2.h2n->hpack_dyn_table; if (!dyn->entries) return; for (n = 0; n < dyn->num_entries; n++) if (dyn->entries[n].value) lws_free_set_NULL(dyn->entries[n].value); lws_free_set_NULL(dyn->entries); } static int lws_hpack_use_idx_hdr(struct lws *wsi, int idx, int known_token) { const char *arg = NULL; int len = 0; const char *p = NULL; int tok = lws_token_from_index(wsi, idx, &arg, &len, NULL); if (tok == LWS_HPACK_IGNORE_ENTRY) { lwsl_header("%s: lws_token says ignore, returning\n", __func__); return 0; } if (tok == -1) { lwsl_info("%s: idx %d mapped to tok %d\n", __func__, idx, tok); return 1; } if (arg) { /* dynamic result */ if (known_token > 0) tok = known_token; lwsl_header("%s: dyn: idx %d '%s' tok %d\n", __func__, idx, arg, tok); } else lwsl_header("writing indexed hdr %d (tok %d '%s')\n", idx, tok, lws_token_to_string(tok)); if (tok == LWS_HPACK_IGNORE_ENTRY) return 0; if (arg) p = arg; if (idx < (int)LWS_ARRAY_SIZE(http2_canned)) p = http2_canned[idx]; if (lws_frag_start(wsi, tok)) return 1; if (p) while (*p && len--) if (lws_frag_append(wsi, *p++)) return 1; if (lws_frag_end(wsi)) return 1; lws_dump_header(wsi, tok); return 0; } #if !defined(LWS_WITH_HTTP_UNCOMMON_HEADERS) && !defined(LWS_ROLE_WS) && !defined(LWS_ROLE_H2) static uint8_t lws_header_implies_psuedoheader_map[] = { 0x03,0x00,0x00,0x00,0x00,0x00,0x01,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, }; #endif #if defined(LWS_WITH_HTTP_UNCOMMON_HEADERS) && !defined(LWS_ROLE_WS) && !defined(LWS_ROLE_H2) static uint8_t lws_header_implies_psuedoheader_map[] = { 0x07,0x00,0x00,0x00,0x00,0x00,0x00,0x0e,0x04,0x00,0x00,0x00,0x00,0x00,0x00,0x00, }; #endif #if !defined(LWS_WITH_HTTP_UNCOMMON_HEADERS) && defined(LWS_ROLE_WS) && !defined(LWS_ROLE_H2) static uint8_t lws_header_implies_psuedoheader_map[] = { 0x03,0x00,0x00,0x00,0x00,0x00,0x00,0x04,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x00, }; #endif #if defined(LWS_WITH_HTTP_UNCOMMON_HEADERS) && defined(LWS_ROLE_WS) && !defined(LWS_ROLE_H2) static uint8_t lws_header_implies_psuedoheader_map[] = { 0x07,0x00,0x00,0x00,0x00,0x00,0x00,0x00,0x38,0x10,0x00,0x00,0x00,0x00,0x00,0x00, }; #endif #if !defined(LWS_WITH_HTTP_UNCOMMON_HEADERS) && !defined(LWS_ROLE_WS) && defined(LWS_ROLE_H2) static uint8_t lws_header_implies_psuedoheader_map[] = { 0x03,0x00,0x80,0x0f,0x00,0x00,0x00,0x00,0x02,0x00,0x00,0x00,0x00,0x00,0x00,0x00, }; #endif #if defined(LWS_WITH_HTTP_UNCOMMON_HEADERS) && !defined(LWS_ROLE_WS) && defined(LWS_ROLE_H2) static uint8_t lws_header_implies_psuedoheader_map[] = { 0x07,0x00,0x00,0x3e,0x00,0x00,0x00,0x80,0x03,0x01,0x00,0x00,0x00,0x00,0x00,0x00, }; #endif #if !defined(LWS_WITH_HTTP_UNCOMMON_HEADERS) && defined(LWS_ROLE_WS) && defined(LWS_ROLE_H2) static uint8_t lws_header_implies_psuedoheader_map[] = { 0x03,0x00,0x00,0x00,0x3e,0x00,0x00,0x00,0x00,0x08,0x00,0x00,0x00,0x00,0x00,0x00, }; #endif #if defined(LWS_WITH_HTTP_UNCOMMON_HEADERS) && defined(LWS_ROLE_WS) && defined(LWS_ROLE_H2) static uint8_t lws_header_implies_psuedoheader_map[] = { 0x07,0x00,0x00,0x00,0xf8,0x00,0x00,0x00,0x00,0x0e,0x04,0x00,0x00,0x00,0x00,0x00, }; #endif static int lws_hpack_handle_pseudo_rules(struct lws *nwsi, struct lws *wsi, int m) { if (m == LWS_HPACK_IGNORE_ENTRY || m == -1) return 0; if (wsi->seen_nonpseudoheader && (lws_header_implies_psuedoheader_map[m >> 3] & (1 << (m & 7)))) { lwsl_info("lws tok %d seems to be a pseudoheader\n", m); /* * it's not legal to see a * pseudoheader after normal * headers */ lws_h2_goaway(nwsi, H2_ERR_PROTOCOL_ERROR, "Pseudoheader after normal hdrs"); return 1; } if (!(lws_header_implies_psuedoheader_map[m >> 3] & (1 << (m & 7)))) wsi->seen_nonpseudoheader = 1; return 0; } int lws_hpack_interpret(struct lws *wsi, unsigned char c) { struct lws *nwsi = lws_get_network_wsi(wsi); struct lws_h2_netconn *h2n = nwsi->h2.h2n; struct allocated_headers *ah = wsi->http.ah; unsigned int prev; unsigned char c1; int n, m, plen; if (!h2n) return -1; /* * HPKT_INDEXED_HDR_7 1xxxxxxx: just "header field" * HPKT_INDEXED_HDR_6_VALUE_INCR 01xxxxxx: NEW indexed hdr + val * HPKT_LITERAL_HDR_VALUE_INCR 01000000: NEW literal hdr + val * HPKT_INDEXED_HDR_4_VALUE 0000xxxx: indexed hdr + val * HPKT_INDEXED_HDR_4_VALUE_NEVER 0001xxxx: NEVER NEW indexed hdr + val * HPKT_LITERAL_HDR_VALUE 00000000: literal hdr + val * HPKT_LITERAL_HDR_VALUE_NEVER 00010000: NEVER NEW literal hdr + val */ switch (h2n->hpack) { case HPKS_TYPE: h2n->is_first_header_char = 1; h2n->huff_pad = 0; h2n->zero_huff_padding = 0; h2n->last_action_dyntable_resize = 0; h2n->ext_count = 0; h2n->hpack_hdr_len = 0; h2n->unknown_header = 0; ah->parser_state = 255; if (c & 0x80) { /* 1.... indexed header field only */ /* just a possibly-extended integer */ h2n->hpack_type = HPKT_INDEXED_HDR_7; lwsl_header("HPKT_INDEXED_HDR_7 hdr %d\n", c & 0x7f); lws_h2_dynamic_table_dump(wsi); h2n->hdr_idx = c & 0x7f; if ((c & 0x7f) == 0x7f) { h2n->hpack_len = 0; h2n->hpack_m = 0x7f; h2n->hpack = HPKS_IDX_EXT; break; } if (!h2n->hdr_idx) { lws_h2_goaway(nwsi, H2_ERR_COMPRESSION_ERROR, "hdr index 0 seen"); return 1; } m = lws_token_from_index(wsi, h2n->hdr_idx, NULL, NULL, NULL); if (lws_hpack_handle_pseudo_rules(nwsi, wsi, m)) return 1; lwsl_header("HPKT_INDEXED_HDR_7: hdr %d\n", c & 0x7f); if (lws_hpack_use_idx_hdr(wsi, c & 0x7f, -1)) { lwsl_header("%s: idx hdr wr fail\n", __func__); return 1; } /* stay at same state */ break; } if (c & 0x40) { /* 01.... indexed or literal header incr idx */ /* * [possibly-ext hdr idx (6) | new literal hdr name] * H + possibly-ext value length * literal value */ h2n->hdr_idx = 0; if (c == 0x40) { /* literal header */ lwsl_header(" HPKT_LITERAL_HDR_VALUE_INCR\n"); h2n->hpack_type = HPKT_LITERAL_HDR_VALUE_INCR; h2n->value = 0; h2n->hpack_len = 0; h2n->hpack = HPKS_HLEN; break; } /* indexed header */ h2n->hpack_type = HPKT_INDEXED_HDR_6_VALUE_INCR; lwsl_header(" HPKT_INDEXED_HDR_6_VALUE_INCR (hdr %d)\n", c & 0x3f); h2n->hdr_idx = c & 0x3f; if ((c & 0x3f) == 0x3f) { h2n->hpack_m = 0x3f; h2n->hpack_len = 0; h2n->hpack = HPKS_IDX_EXT; break; } h2n->value = 1; h2n->hpack = HPKS_HLEN; if (!h2n->hdr_idx) { lws_h2_goaway(nwsi, H2_ERR_COMPRESSION_ERROR, "hdr index 0 seen"); return 1; } break; } switch(c & 0xf0) { case 0x10: /* literal header never index */ case 0: /* literal header without indexing */ /* * follows 0x40 except 4-bit hdr idx * and don't add to index */ if (c == 0) { /* literal name */ h2n->hpack_type = HPKT_LITERAL_HDR_VALUE; lwsl_header(" HPKT_LITERAL_HDR_VALUE\n"); h2n->hpack = HPKS_HLEN; h2n->value = 0; break; } if (c == 0x10) { /* literal name NEVER */ h2n->hpack_type = HPKT_LITERAL_HDR_VALUE_NEVER; lwsl_header(" HPKT_LITERAL_HDR_VALUE_NEVER\n"); h2n->hpack = HPKS_HLEN; h2n->value = 0; break; } lwsl_header("indexed\n"); /* indexed name */ if (c & 0x10) { h2n->hpack_type = HPKT_INDEXED_HDR_4_VALUE_NEVER; lwsl_header("HPKT_LITERAL_HDR_4_VALUE_NEVER\n"); } else { h2n->hpack_type = HPKT_INDEXED_HDR_4_VALUE; lwsl_header(" HPKT_INDEXED_HDR_4_VALUE\n"); } h2n->hdr_idx = 0; if ((c & 0xf) == 0xf) { h2n->hpack_len = c & 0xf; h2n->hpack_m = 0xf; h2n->hpack_len = 0; h2n->hpack = HPKS_IDX_EXT; break; } h2n->hdr_idx = c & 0xf; h2n->value = 1; h2n->hpack = HPKS_HLEN; break; case 0x20: case 0x30: /* header table size update */ /* possibly-extended size value (5) */ lwsl_header("HPKT_SIZE_5 %x\n", c &0x1f); h2n->hpack_type = HPKT_SIZE_5; h2n->hpack_len = c & 0x1f; if (h2n->hpack_len == 0x1f) { h2n->hpack_m = 0x1f; h2n->hpack_len = 0; h2n->hpack = HPKS_IDX_EXT; break; } h2n->last_action_dyntable_resize = 1; if (lws_hpack_dynamic_size(wsi, h2n->hpack_len)) return 1; break; } break; case HPKS_IDX_EXT: h2n->hpack_len = h2n->hpack_len | ((c & 0x7f) << h2n->ext_count); h2n->ext_count += 7; if (c & 0x80) /* extended int not complete yet */ break; /* extended integer done */ h2n->hpack_len += h2n->hpack_m; lwsl_header("HPKS_IDX_EXT: hpack_len %u\n", (unsigned int)h2n->hpack_len); switch (h2n->hpack_type) { case HPKT_INDEXED_HDR_7: if (lws_hpack_use_idx_hdr(wsi, h2n->hpack_len, h2n->hdr_idx)) { lwsl_notice("%s: hd7 use fail\n", __func__); return 1; } h2n->hpack = HPKS_TYPE; break; case HPKT_SIZE_5: h2n->last_action_dyntable_resize = 1; if (lws_hpack_dynamic_size(wsi, h2n->hpack_len)) return 1; h2n->hpack = HPKS_TYPE; break; default: h2n->hdr_idx = h2n->hpack_len; if (!h2n->hdr_idx) { lws_h2_goaway(nwsi, H2_ERR_COMPRESSION_ERROR, "extended header index was 0"); return 1; } h2n->value = 1; h2n->hpack = HPKS_HLEN; break; } break; case HPKS_HLEN: /* [ H | 7+ ] */ h2n->huff = !!(c & 0x80); h2n->hpack_pos = 0; h2n->hpack_len = c & 0x7f; if (h2n->hpack_len == 0x7f) { h2n->hpack_m = 0x7f; h2n->hpack_len = 0; h2n->ext_count = 0; h2n->hpack = HPKS_HLEN_EXT; break; } if (h2n->value && !h2n->hpack_len) { lwsl_debug("%s: zero-length header data\n", __func__); h2n->hpack = HPKS_TYPE; goto fin; } pre_data: h2n->hpack = HPKS_DATA; if (!h2n->value || !h2n->hdr_idx) { ah->parser_state = WSI_TOKEN_NAME_PART; ah->lextable_pos = 0; h2n->unknown_header = 0; break; } if (h2n->hpack_type == HPKT_LITERAL_HDR_VALUE || h2n->hpack_type == HPKT_LITERAL_HDR_VALUE_INCR || h2n->hpack_type == HPKT_LITERAL_HDR_VALUE_NEVER) { n = ah->parser_state; if (n == 255) { n = -1; h2n->hdr_idx = -1; } else h2n->hdr_idx = 1; } else { n = lws_token_from_index(wsi, h2n->hdr_idx, NULL, NULL, NULL); lwsl_header(" lws_tok_from_idx(%u) says %d\n", (unsigned int)h2n->hdr_idx, n); } if (n == LWS_HPACK_IGNORE_ENTRY || n == -1) h2n->hdr_idx = LWS_HPACK_IGNORE_ENTRY; switch (h2n->hpack_type) { /* * hpack types with literal headers were parsed by the lws * header SM... on recognition of a known lws header, it does * the correct lws_frag_start() for us already. Other types * (ie, indexed header) need us to do it here. */ case HPKT_LITERAL_HDR_VALUE_INCR: case HPKT_LITERAL_HDR_VALUE: case HPKT_LITERAL_HDR_VALUE_NEVER: break; default: if (n != -1 && n != LWS_HPACK_IGNORE_ENTRY && lws_frag_start(wsi, n)) { lwsl_header("%s: frag start failed\n", __func__); return 1; } break; } break; case HPKS_HLEN_EXT: h2n->hpack_len = h2n->hpack_len | ((c & 0x7f) << h2n->ext_count); h2n->ext_count += 7; if (c & 0x80) /* extended integer not complete yet */ break; h2n->hpack_len += h2n->hpack_m; goto pre_data; case HPKS_DATA: //lwsl_header(" 0x%02X huff %d\n", c, h2n->huff); c1 = c; for (n = 0; n < 8; n++) { if (h2n->huff) { char b = (c >> 7) & 1; prev = h2n->hpack_pos; h2n->hpack_pos = huftable_decode( h2n->hpack_pos, b); c <<= 1; if (h2n->hpack_pos == 0xffff) { lwsl_notice("Huffman err\n"); return 1; } if (!(h2n->hpack_pos & 0x8000)) { if (!b) h2n->zero_huff_padding = 1; h2n->huff_pad++; continue; } c1 = h2n->hpack_pos & 0x7fff; h2n->hpack_pos = 0; h2n->huff_pad = 0; h2n->zero_huff_padding = 0; /* EOS |11111111|11111111|11111111|111111 */ if (!c1 && prev == HUFTABLE_0x100_PREV) { lws_h2_goaway(nwsi, H2_ERR_COMPRESSION_ERROR, "Huffman EOT seen"); return 1; } } else n = 8; if (h2n->value) { /* value */ if (h2n->hdr_idx && h2n->hdr_idx != LWS_HPACK_IGNORE_ENTRY) { if (ah->hdr_token_idx == WSI_TOKEN_HTTP_COLON_PATH) { switch (lws_parse_urldecode( wsi, &c1)) { case LPUR_CONTINUE: break; case LPUR_SWALLOW: goto swallow; case LPUR_EXCESSIVE: case LPUR_FORBID: lws_h2_goaway(nwsi, H2_ERR_PROTOCOL_ERROR, "Evil URI"); return 1; default: return -1; } } if (lws_frag_append(wsi, c1)) { lwsl_notice( "%s: frag app fail\n", __func__); return 1; } } //else //lwsl_header("ignoring %c\n", c1); } else { /* * Convert name using existing parser, * If h2n->unknown_header == 0, result is * in wsi->parser_state * using WSI_TOKEN_GET_URI. * * If unknown header h2n->unknown_header * will be set. */ h2n->hpack_hdr_len++; if (h2n->is_first_header_char) { h2n->is_first_header_char = 0; h2n->first_hdr_char = c1; } lwsl_header("parser: %c\n", c1); /* uppercase header names illegal */ if (c1 >= 'A' && c1 <= 'Z') { lws_h2_goaway(nwsi, H2_ERR_COMPRESSION_ERROR, "Uppercase literal hpack hdr"); return 1; } plen = 1; if (!h2n->unknown_header && lws_parse(wsi, &c1, &plen)) h2n->unknown_header = 1; } swallow: (void)n; } // for n if (--h2n->hpack_len) break; /* * The header (h2n->value = 0) or the payload (h2n->value = 1) * is complete. */ if (h2n->huff && (h2n->huff_pad > 7 || (h2n->zero_huff_padding && h2n->huff_pad))) { lwsl_info("zero_huff_padding: %d huff_pad: %d\n", h2n->zero_huff_padding, h2n->huff_pad); lws_h2_goaway(nwsi, H2_ERR_COMPRESSION_ERROR, "Huffman padding excessive or wrong"); return 1; } fin: if (!h2n->value && ( h2n->hpack_type == HPKT_LITERAL_HDR_VALUE || h2n->hpack_type == HPKT_LITERAL_HDR_VALUE_INCR || h2n->hpack_type == HPKT_LITERAL_HDR_VALUE_NEVER)) { h2n->hdr_idx = LWS_HPACK_IGNORE_ENTRY; lwsl_header("wsi->parser_state: %d\n", ah->parser_state); if (ah->parser_state == WSI_TOKEN_NAME_PART) { /* h2 headers come without the colon */ c1 = ':'; plen = 1; n = lws_parse(wsi, &c1, &plen); (void)n; } if (ah->parser_state == WSI_TOKEN_NAME_PART || #if defined(LWS_WITH_CUSTOM_HEADERS) ah->parser_state == WSI_TOKEN_UNKNOWN_VALUE_PART || #endif ah->parser_state == WSI_TOKEN_SKIPPING) { h2n->unknown_header = 1; ah->parser_state = -1; wsi->seen_nonpseudoheader = 1; } } n = 8; /* we have the header */ if (!h2n->value) { h2n->value = 1; h2n->hpack = HPKS_HLEN; h2n->huff_pad = 0; h2n->zero_huff_padding = 0; h2n->ext_count = 0; break; } /* * we have got both the header and value */ m = -1; switch (h2n->hpack_type) { /* * These are the only two that insert to the dyntable */ /* NEW indexed hdr with value */ case HPKT_INDEXED_HDR_6_VALUE_INCR: /* header length is determined by known index */ m = lws_token_from_index(wsi, h2n->hdr_idx, NULL, NULL, &h2n->hpack_hdr_len); goto add_it; /* NEW literal hdr with value */ case HPKT_LITERAL_HDR_VALUE_INCR: /* * hdr is a new literal, so length is already in * h2n->hpack_hdr_len */ m = ah->parser_state; if (h2n->unknown_header || ah->parser_state == WSI_TOKEN_NAME_PART || ah->parser_state == WSI_TOKEN_SKIPPING) { if (h2n->first_hdr_char == ':') { lwsl_info("HPKT_LITERAL_HDR_VALUE_INCR:" " end state %d unk hdr %d\n", ah->parser_state, h2n->unknown_header); /* unknown pseudoheaders are illegal */ lws_h2_goaway(nwsi, H2_ERR_PROTOCOL_ERROR, "Unknown pseudoheader"); return 1; } m = LWS_HPACK_IGNORE_ENTRY; } add_it: /* * mark us as having been set at the time of dynamic * token insertion. */ ah->frags[ah->nfrag].flags |= 1; if (lws_dynamic_token_insert(wsi, h2n->hpack_hdr_len, m, &ah->data[ah->frags[ah->nfrag].offset], ah->frags[ah->nfrag].len)) { lwsl_notice("%s: tok_insert fail\n", __func__); return 1; } break; default: break; } if (h2n->hdr_idx != LWS_HPACK_IGNORE_ENTRY && lws_frag_end(wsi)) return 1; if (h2n->hpack_type != HPKT_INDEXED_HDR_6_VALUE_INCR) { if (h2n->hpack_type == HPKT_LITERAL_HDR_VALUE || h2n->hpack_type == HPKT_LITERAL_HDR_VALUE_INCR || h2n->hpack_type == HPKT_LITERAL_HDR_VALUE_NEVER) { m = ah->parser_state; if (m == 255) m = -1; } else m = lws_token_from_index(wsi, h2n->hdr_idx, NULL, NULL, NULL); } if (m != -1 && m != LWS_HPACK_IGNORE_ENTRY) lws_dump_header(wsi, m); if (lws_hpack_handle_pseudo_rules(nwsi, wsi, m)) return 1; h2n->is_first_header_char = 1; h2n->hpack = HPKS_TYPE; break; } return 0; } static int lws_h2_num_start(int starting_bits, unsigned long num) { unsigned int mask = (1 << starting_bits) - 1; if (num < mask) return (int)num; return mask; } static int lws_h2_num(int starting_bits, unsigned long num, unsigned char **p, unsigned char *end) { unsigned int mask = (1 << starting_bits) - 1; if (num < mask) return 0; num -= mask; do { if (num > 127) *((*p)++) = 0x80 | (num & 0x7f); else *((*p)++) = 0x00 | (num & 0x7f); if (*p >= end) return 1; num >>= 7; } while (num); return 0; } int lws_add_http2_header_by_name(struct lws *wsi, const unsigned char *name, const unsigned char *value, int length, unsigned char **p, unsigned char *end) { int len; lwsl_header("%s: %p %s:%s (len %d)\n", __func__, *p, name, value, length); len = (int)strlen((char *)name); if (len) if (name[len - 1] == ':') len--; if (wsi->mux_substream && !strncmp((const char *)name, "transfer-encoding", len)) { lwsl_header("rejecting %s\n", name); return 0; } if (end - *p < len + length + 8) return 1; *((*p)++) = 0; /* literal hdr, literal name, */ *((*p)++) = 0 | lws_h2_num_start(7, len); /* non-HUF */ if (lws_h2_num(7, len, p, end)) return 1; /* upper-case header names are verboten in h2, but OK on h1, so * they're not illegal per se. Silently convert them for h2... */ while(len--) *((*p)++) = tolower((int)*name++); *((*p)++) = 0 | lws_h2_num_start(7, length); /* non-HUF */ if (lws_h2_num(7, length, p, end)) return 1; memcpy(*p, value, length); *p += length; return 0; } int lws_add_http2_header_by_token(struct lws *wsi, enum lws_token_indexes token, const unsigned char *value, int length, unsigned char **p, unsigned char *end) { const unsigned char *name; name = lws_token_to_string(token); if (!name) return 1; return lws_add_http2_header_by_name(wsi, name, value, length, p, end); } int lws_add_http2_header_status(struct lws *wsi, unsigned int code, unsigned char **p, unsigned char *end) { unsigned char status[10]; int n; wsi->h2.send_END_STREAM = 0; // !!(code >= 400); n = sprintf((char *)status, "%u", code); if (lws_add_http2_header_by_token(wsi, WSI_TOKEN_HTTP_COLON_STATUS, status, n, p, end)) return 1; return 0; }