v/vlib/net/websocket/handshake.v

80 lines
2.1 KiB
V
Raw Normal View History

module websocket
2020-05-26 12:50:37 +02:00
fn (mut ws Client) read_handshake(seckey string) {
ws.log.debug('reading handshake...')
mut bytes_read := 0
max_buffer := 1024
buffer_size := 1
mut buffer := malloc(max_buffer)
for bytes_read < max_buffer - 1 {
mut res := 0
unsafe {
res = ws.read_from_server(buffer + bytes_read, buffer_size)
}
2020-05-17 13:51:18 +02:00
if res == 0 || res == -1 {
ws.log.fatal('read_handshake: Failed to read handshake.')
}
if unsafe {buffer[bytes_read] == `\n` &&
buffer[bytes_read - 1] == `\r` && buffer[bytes_read - 2] == `\n` &&
buffer[bytes_read - 3] == `\r`} {
break
}
bytes_read += buffer_size
}
unsafe {
buffer[max_buffer - 1] = `\0`
}
2020-08-22 12:29:15 +02:00
ws.handshake_handler(unsafe{ byteptr(buffer).vstring_with_len(max_buffer-1) }, seckey)
}
2020-05-26 12:50:37 +02:00
fn (mut ws Client) handshake_handler(handshake_response, seckey string) {
ws.log.debug('handshake_handler:\r\n$handshake_response')
lines := handshake_response.split_into_lines()
header := lines[0]
2020-05-26 12:50:37 +02:00
if !header.starts_with('HTTP/1.1 101') && !header.starts_with('HTTP/1.0 101') {
ws.log.fatal('handshake_handler: invalid HTTP status response code')
}
2020-05-26 12:50:37 +02:00
for i in 1 .. lines.len {
if lines[i].len <= 0 || lines[i] == '\r\n' {
continue
}
2020-05-26 12:50:37 +02:00
keys := lines[i].split(':')
match keys[0] {
2020-05-26 12:50:37 +02:00
'Upgrade', 'upgrade' {
ws.flags << .has_upgrade
}
2020-05-26 12:50:37 +02:00
'Connection', 'connection' {
ws.flags << .has_connection
}
2020-05-26 12:50:37 +02:00
'Sec-WebSocket-Accept', 'sec-websocket-accept' {
ws.log.debug('comparing hashes')
ws.log.debug('seckey: $seckey')
challenge := create_key_challenge_response(seckey)
ws.log.debug('challenge: $challenge')
ws.log.debug('response: ${keys[1]}')
if keys[1].trim_space() != challenge {
ws.log.error('handshake_handler: Sec-WebSocket-Accept header does not match computed sha1/base64 response.')
}
ws.flags << .has_accept
unsafe {
challenge.free()
}
2020-05-26 12:50:37 +02:00
}
else {}
}
unsafe {
keys.free()
}
}
if ws.flags.len < 3 {
2020-05-26 12:50:37 +02:00
ws.close(1002, 'invalid websocket HTTP headers')
ws.log.error('invalid websocket HTTP headers')
}
ws.log.info('handshake successful!')
unsafe {
handshake_response.free()
lines.free()
header.free()
}
2020-05-26 12:50:37 +02:00
}