mirror of
https://github.com/lammertb/libhttp.git
synced 2025-07-31 08:24:23 +03:00
Initial version of websocket client. SSL tested working. websocket_client example included.
This commit is contained in:
36
examples/websocket_client/Makefile
Normal file
36
examples/websocket_client/Makefile
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
#
|
||||||
|
# Copyright (c) 2013 No Face Press, LLC
|
||||||
|
# License http://opensource.org/licenses/mit-license.php MIT License
|
||||||
|
#
|
||||||
|
|
||||||
|
#This makefile is used to test the other Makefiles
|
||||||
|
|
||||||
|
|
||||||
|
PROG = websocket_client
|
||||||
|
SRC = websocket_client.c
|
||||||
|
|
||||||
|
TOP = ../..
|
||||||
|
CIVETWEB_LIB = libcivetweb.a
|
||||||
|
|
||||||
|
CFLAGS = -I$(TOP)/include $(COPT)
|
||||||
|
LIBS = -lpthread
|
||||||
|
|
||||||
|
include $(TOP)/resources/Makefile.in-os
|
||||||
|
|
||||||
|
ifeq ($(TARGET_OS),LINUX)
|
||||||
|
LIBS += -ldl
|
||||||
|
endif
|
||||||
|
|
||||||
|
all: $(PROG)
|
||||||
|
|
||||||
|
$(PROG): $(CIVETWEB_LIB) $(SRC)
|
||||||
|
$(CC) -o $@ $(CFLAGS) $(LDFLAGS) $(SRC) $(CIVETWEB_LIB) $(LIBS)
|
||||||
|
|
||||||
|
$(CIVETWEB_LIB):
|
||||||
|
$(MAKE) -C $(TOP) clean lib
|
||||||
|
cp $(TOP)/$(CIVETWEB_LIB) .
|
||||||
|
|
||||||
|
clean:
|
||||||
|
rm -f $(CIVETWEB_LIB) $(PROG)
|
||||||
|
|
||||||
|
.PHONY: all clean
|
13
examples/websocket_client/ssl/server.crt
Normal file
13
examples/websocket_client/ssl/server.crt
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICATCCAWoCCQC2BCIqIvgSUTANBgkqhkiG9w0BAQUFADBFMQswCQYDVQQGEwJB
|
||||||
|
VTETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50ZXJuZXQgV2lkZ2l0
|
||||||
|
cyBQdHkgTHRkMB4XDTE0MDgyMTEyMzAwMVoXDTI0MDgxODEyMzAwMVowRTELMAkG
|
||||||
|
A1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoMGEludGVybmV0
|
||||||
|
IFdpZGdpdHMgUHR5IEx0ZDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA9k9s
|
||||||
|
gH22BCo9neTeB/YnilK7n0sMe0+pjS9KSWhU59Q4w8hqPrW0tuYikIDd0wVggkJF
|
||||||
|
BZNg4WPoulTdwXsgNBeG88q2wnNtUosXTS+KQTQBSiQof9Ay9GHQtgxnogI1zIXb
|
||||||
|
HOppyyG5zre8a/X6fzDOnFc4iJMBwxTAnjCqObkCAwEAATANBgkqhkiG9w0BAQUF
|
||||||
|
AAOBgQBX9V46VUVsB9P9fb8sFuMx2ezFE42ynEeJPrKRrof+dFYbjvR1OUZFSLCy
|
||||||
|
aZKwVH7iCnVBJiU12JxO7PR3L6ob3FYPyNHQWYq1/IFUvqBRagehldj5H8iFeEDz
|
||||||
|
Wtz2+p1rUyVxcSUqTjobaji0aC8lzPZio0nd1KKM6A92/adHyQ==
|
||||||
|
-----END CERTIFICATE-----
|
11
examples/websocket_client/ssl/server.csr
Normal file
11
examples/websocket_client/ssl/server.csr
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
-----BEGIN CERTIFICATE REQUEST-----
|
||||||
|
MIIBhDCB7gIBADBFMQswCQYDVQQGEwJBVTETMBEGA1UECAwKU29tZS1TdGF0ZTEh
|
||||||
|
MB8GA1UECgwYSW50ZXJuZXQgV2lkZ2l0cyBQdHkgTHRkMIGfMA0GCSqGSIb3DQEB
|
||||||
|
AQUAA4GNADCBiQKBgQD2T2yAfbYEKj2d5N4H9ieKUrufSwx7T6mNL0pJaFTn1DjD
|
||||||
|
yGo+tbS25iKQgN3TBWCCQkUFk2DhY+i6VN3BeyA0F4bzyrbCc21SixdNL4pBNAFK
|
||||||
|
JCh/0DL0YdC2DGeiAjXMhdsc6mnLIbnOt7xr9fp/MM6cVziIkwHDFMCeMKo5uQID
|
||||||
|
AQABoAAwDQYJKoZIhvcNAQEFBQADgYEA1EOFwyFJ2NAnRNktZCy5yVcLx9C78HoC
|
||||||
|
oHPPCOElu0VDIqe6ZecYdaqWbYlhGE0+isbOQn2CwHOeBGN8mIDsNUYzVEpsEfgg
|
||||||
|
9OK873LpE5pf4mdjSiRBXkk/h8BxuqkcKi+Qx+qEE7+dH2nK5aKeIHVvbLyfGOch
|
||||||
|
9I85q+msBNE=
|
||||||
|
-----END CERTIFICATE REQUEST-----
|
15
examples/websocket_client/ssl/server.key
Normal file
15
examples/websocket_client/ssl/server.key
Normal file
@ -0,0 +1,15 @@
|
|||||||
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
MIICXQIBAAKBgQD2T2yAfbYEKj2d5N4H9ieKUrufSwx7T6mNL0pJaFTn1DjDyGo+
|
||||||
|
tbS25iKQgN3TBWCCQkUFk2DhY+i6VN3BeyA0F4bzyrbCc21SixdNL4pBNAFKJCh/
|
||||||
|
0DL0YdC2DGeiAjXMhdsc6mnLIbnOt7xr9fp/MM6cVziIkwHDFMCeMKo5uQIDAQAB
|
||||||
|
AoGAYwospr3lomcZv5N3c9wWqhf6OWMD8dFma87IIBxDh7Rd3tuHXQ/TSnffDhvD
|
||||||
|
FkbjN31OI5/PJNH3knTtdg78MywPloE4jYsbt4+fEaW7Fzww2nU61N1p+mYk5d/b
|
||||||
|
SCTAHhGzF9g9ZMw25CCUFGjDU2z+Ty6my22Euxhk2Qq8tMECQQD9ZYIxWkPhywDW
|
||||||
|
pX3v70dqIv7411hEYpuL/ZJl26UCmQsj4HPtXQCraQksVPs74WY5aTtd6MAV9V3M
|
||||||
|
UnErHO5/AkEA+NdG2MmfBOBPusDB/WwQaUPiCWGITS9llGTR2JXbvDqmKgL1+UTG
|
||||||
|
o27sLNIFCrF1wejpyRGqwjcObFYR0yKrxwJBAOB2uPuK4DL1psp9Uq/mIDbOxVod
|
||||||
|
OF1rlCpP9w0vol5Iv+uJ+mc7SUqOAsg4h0yl/+2/YA1yDiXlcq96IDF2sXUCQGAv
|
||||||
|
Nh9Nr72+xpK1N0axopZNuu1NWdYb3/PAFKzXIBxdvyS2CEXVo8JAeeHJPFGpzo6p
|
||||||
|
bNRfk9WGWnjdu/4UhLkCQQCekR9zpIpzdJiPYCd6XMya+TPCDYlOQL1jlnJIRa2V
|
||||||
|
BEOz0rSpzXAGh0PyCB/kMneyVk87LWn8joE6179RoUfv
|
||||||
|
-----END RSA PRIVATE KEY-----
|
18
examples/websocket_client/ssl/server.key.orig
Normal file
18
examples/websocket_client/ssl/server.key.orig
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
Proc-Type: 4,ENCRYPTED
|
||||||
|
DEK-Info: DES-EDE3-CBC,89778A6427F05D4A
|
||||||
|
|
||||||
|
4aXqO/8oCHVfMLB+a1DfjbXyEddjbd7nB+YVFLPKy68Tam9PRTvC1zRHBet59ll0
|
||||||
|
1w7R8tXR6/xH7HRhBeqDHCcuvBhtw3xGxtXWv54WBFhzuq7TvKOAaCFl++cw/JHq
|
||||||
|
PCS0rAaYnqF2MAgMi7QBjZKmHFHL43Gy60VfOrB0mmOdxqqXA0NBFC2uEd7Z/MAx
|
||||||
|
S2A85bNJJKQaWEeDThP1u0OOlNCq99lkLJ31jiOH7ntdL0/vqcbZ+PUtdPLwAG4L
|
||||||
|
1GUHuiC2v5FvDlPiejMk2dvrxCNpcu2e3tQKHpg2KcsTVrpB7EVzRSazln4HywUZ
|
||||||
|
EJfBvxqqrS7plImZgj4LXSnln0JPuBb+aHnhKIFvisjYSwqDGJnnp/OaD7YdRhYh
|
||||||
|
UCcL011Ge+yUbRipeAmHdtJlSUSdB14KWq+WdIX/KgCRGx06QZm9s1PBLH+fww+I
|
||||||
|
EL3A/LFX0a5KUHkCp29akYYv9bUYaQ79Nt7BlaEON+/SW3pJMbGr+nx8aqogr0Yo
|
||||||
|
SJ/Zz5TSDBhecRjbCDGkT6DizVZ8cbm2xl8QLBd0H+ZA6uYMgfpAOJGrJx3Nm4Lv
|
||||||
|
prEApgFtjSrsQDGYHAcmDMW1UWOVHuNp7BSvwUze9Ftnzr/jlpdzES2rhgMyGhg1
|
||||||
|
0Szbsfs3vgw4iM83LFJXza07GQJzF8gRF79dY5JiQX/sOKUprA6Lofk631jE0G8r
|
||||||
|
3z59cxblaq9y7EgFsE944Gk7/HIEimBRiqIZzGVJVukD0itynQ+XmYTdbyH1lpvi
|
||||||
|
c0ZheZPUoGwUW9RYy+nle5gEDFyZWXcCAuJasQvDBXt//r/bso3ZpA==
|
||||||
|
-----END RSA PRIVATE KEY-----
|
28
examples/websocket_client/ssl/server.pem
Normal file
28
examples/websocket_client/ssl/server.pem
Normal file
@ -0,0 +1,28 @@
|
|||||||
|
-----BEGIN CERTIFICATE-----
|
||||||
|
MIICATCCAWoCCQC2BCIqIvgSUTANBgkqhkiG9w0BAQUFADBFMQswCQYDVQQGEwJB
|
||||||
|
VTETMBEGA1UECAwKU29tZS1TdGF0ZTEhMB8GA1UECgwYSW50ZXJuZXQgV2lkZ2l0
|
||||||
|
cyBQdHkgTHRkMB4XDTE0MDgyMTEyMzAwMVoXDTI0MDgxODEyMzAwMVowRTELMAkG
|
||||||
|
A1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoMGEludGVybmV0
|
||||||
|
IFdpZGdpdHMgUHR5IEx0ZDCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEA9k9s
|
||||||
|
gH22BCo9neTeB/YnilK7n0sMe0+pjS9KSWhU59Q4w8hqPrW0tuYikIDd0wVggkJF
|
||||||
|
BZNg4WPoulTdwXsgNBeG88q2wnNtUosXTS+KQTQBSiQof9Ay9GHQtgxnogI1zIXb
|
||||||
|
HOppyyG5zre8a/X6fzDOnFc4iJMBwxTAnjCqObkCAwEAATANBgkqhkiG9w0BAQUF
|
||||||
|
AAOBgQBX9V46VUVsB9P9fb8sFuMx2ezFE42ynEeJPrKRrof+dFYbjvR1OUZFSLCy
|
||||||
|
aZKwVH7iCnVBJiU12JxO7PR3L6ob3FYPyNHQWYq1/IFUvqBRagehldj5H8iFeEDz
|
||||||
|
Wtz2+p1rUyVxcSUqTjobaji0aC8lzPZio0nd1KKM6A92/adHyQ==
|
||||||
|
-----END CERTIFICATE-----
|
||||||
|
-----BEGIN RSA PRIVATE KEY-----
|
||||||
|
MIICXQIBAAKBgQD2T2yAfbYEKj2d5N4H9ieKUrufSwx7T6mNL0pJaFTn1DjDyGo+
|
||||||
|
tbS25iKQgN3TBWCCQkUFk2DhY+i6VN3BeyA0F4bzyrbCc21SixdNL4pBNAFKJCh/
|
||||||
|
0DL0YdC2DGeiAjXMhdsc6mnLIbnOt7xr9fp/MM6cVziIkwHDFMCeMKo5uQIDAQAB
|
||||||
|
AoGAYwospr3lomcZv5N3c9wWqhf6OWMD8dFma87IIBxDh7Rd3tuHXQ/TSnffDhvD
|
||||||
|
FkbjN31OI5/PJNH3knTtdg78MywPloE4jYsbt4+fEaW7Fzww2nU61N1p+mYk5d/b
|
||||||
|
SCTAHhGzF9g9ZMw25CCUFGjDU2z+Ty6my22Euxhk2Qq8tMECQQD9ZYIxWkPhywDW
|
||||||
|
pX3v70dqIv7411hEYpuL/ZJl26UCmQsj4HPtXQCraQksVPs74WY5aTtd6MAV9V3M
|
||||||
|
UnErHO5/AkEA+NdG2MmfBOBPusDB/WwQaUPiCWGITS9llGTR2JXbvDqmKgL1+UTG
|
||||||
|
o27sLNIFCrF1wejpyRGqwjcObFYR0yKrxwJBAOB2uPuK4DL1psp9Uq/mIDbOxVod
|
||||||
|
OF1rlCpP9w0vol5Iv+uJ+mc7SUqOAsg4h0yl/+2/YA1yDiXlcq96IDF2sXUCQGAv
|
||||||
|
Nh9Nr72+xpK1N0axopZNuu1NWdYb3/PAFKzXIBxdvyS2CEXVo8JAeeHJPFGpzo6p
|
||||||
|
bNRfk9WGWnjdu/4UhLkCQQCekR9zpIpzdJiPYCd6XMya+TPCDYlOQL1jlnJIRa2V
|
||||||
|
BEOz0rSpzXAGh0PyCB/kMneyVk87LWn8joE6179RoUfv
|
||||||
|
-----END RSA PRIVATE KEY-----
|
BIN
examples/websocket_client/websocket_client
Executable file
BIN
examples/websocket_client/websocket_client
Executable file
Binary file not shown.
72
examples/websocket_client/websocket_client.c
Normal file
72
examples/websocket_client/websocket_client.c
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (c) 2013 No Face Press, LLC
|
||||||
|
* License http://opensource.org/licenses/mit-license.php MIT License
|
||||||
|
*/
|
||||||
|
|
||||||
|
// Simple example program on how to use Embedded C interface.
|
||||||
|
#ifdef _WIN32
|
||||||
|
#include <Windows.h>
|
||||||
|
#else
|
||||||
|
#include <unistd.h>
|
||||||
|
#endif
|
||||||
|
|
||||||
|
#include <string.h>
|
||||||
|
#include "civetweb.h"
|
||||||
|
|
||||||
|
#define DOCUMENT_ROOT "."
|
||||||
|
#define PORT "8888"
|
||||||
|
#define SSL_CERT "./ssl/server.pem"
|
||||||
|
|
||||||
|
int websocket_data_handler(struct mg_connection *conn, int flags, char *data, size_t data_len)
|
||||||
|
{
|
||||||
|
printf("From server: %s\r\n", data);
|
||||||
|
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
int main(int argc, char *argv[])
|
||||||
|
{
|
||||||
|
|
||||||
|
const char * options[] = { "document_root", DOCUMENT_ROOT,
|
||||||
|
"ssl_certificate", SSL_CERT,
|
||||||
|
"listening_ports", PORT, 0
|
||||||
|
};
|
||||||
|
struct mg_callbacks callbacks;
|
||||||
|
struct mg_context *ctx;
|
||||||
|
|
||||||
|
memset(&callbacks, 0, sizeof(callbacks));
|
||||||
|
ctx = mg_start(&callbacks, 0, options);
|
||||||
|
|
||||||
|
char ebuf[100];
|
||||||
|
struct mg_connection* newconn = mg_client_websocket_connect("echo.websocket.org", 443, 1,
|
||||||
|
ebuf, sizeof(ebuf),
|
||||||
|
"/", "http://websocket.org",websocket_data_handler);
|
||||||
|
|
||||||
|
if(newconn == NULL)
|
||||||
|
{
|
||||||
|
printf("Error: %s", ebuf);
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
mg_websocket_write(newconn, WEBSOCKET_OPCODE_TEXT, "data1", 5);
|
||||||
|
|
||||||
|
sleep(5);
|
||||||
|
|
||||||
|
mg_websocket_write(newconn, WEBSOCKET_OPCODE_TEXT, "data2", 5);
|
||||||
|
|
||||||
|
sleep(5);
|
||||||
|
|
||||||
|
mg_websocket_write(newconn, WEBSOCKET_OPCODE_TEXT, "data3", 5);
|
||||||
|
|
||||||
|
sleep(5);
|
||||||
|
|
||||||
|
mg_websocket_write(newconn, WEBSOCKET_OPCODE_TEXT, "data4", 5);
|
||||||
|
|
||||||
|
sleep(5);
|
||||||
|
|
||||||
|
mg_close_connection(newconn);
|
||||||
|
|
||||||
|
printf("Bye!\n");
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
@ -571,6 +571,12 @@ CIVETWEB_API void mg_cry(struct mg_connection *conn,
|
|||||||
/* utility method to compare two buffers, case incensitive. */
|
/* utility method to compare two buffers, case incensitive. */
|
||||||
CIVETWEB_API int mg_strncasecmp(const char *s1, const char *s2, size_t len);
|
CIVETWEB_API int mg_strncasecmp(const char *s1, const char *s2, size_t len);
|
||||||
|
|
||||||
|
/* Connect to a websocket as a client */
|
||||||
|
typedef int (*websocket_data_func)(struct mg_connection *, int bits,
|
||||||
|
char *data, size_t data_len);
|
||||||
|
CIVETWEB_API struct mg_connection *mg_client_websocket_connect(const char *host, int port, int use_ssl,
|
||||||
|
char *error_buffer, size_t error_buffer_size,
|
||||||
|
const char *path, const char *origin, websocket_data_func data_func);
|
||||||
|
|
||||||
#ifdef __cplusplus
|
#ifdef __cplusplus
|
||||||
}
|
}
|
||||||
|
198
src/civetweb.c
198
src/civetweb.c
@ -5255,6 +5255,152 @@ static void read_websocket(struct mg_connection *conn)
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void read_client_websocket(struct mg_connection *conn)
|
||||||
|
{
|
||||||
|
/* Pointer to the beginning of the portion of the incoming websocket
|
||||||
|
message queue.
|
||||||
|
The original websocket upgrade request is never removed, so the queue
|
||||||
|
begins after it. */
|
||||||
|
unsigned char *buf = (unsigned char *) conn->buf + conn->request_len;
|
||||||
|
int n, error;
|
||||||
|
|
||||||
|
/* body_len is the length of the entire queue in bytes
|
||||||
|
len is the length of the current message
|
||||||
|
data_len is the length of the current message's data payload
|
||||||
|
header_len is the length of the current message's header */
|
||||||
|
size_t i, len, mask_len, data_len, header_len, body_len;
|
||||||
|
|
||||||
|
/* "The masking key is a 32-bit value chosen at random by the client."
|
||||||
|
http://tools.ietf.org/html/draft-ietf-hybi-thewebsocketprotocol-17#section-5 */
|
||||||
|
unsigned char mask[4];
|
||||||
|
|
||||||
|
/* data points to the place where the message is stored when passed to the
|
||||||
|
websocket_data callback. This is either mem on the stack, or a
|
||||||
|
dynamically allocated buffer if it is too large. */
|
||||||
|
char mem[4096];
|
||||||
|
char *data = mem;
|
||||||
|
unsigned char mop; /* mask flag and opcode */
|
||||||
|
|
||||||
|
/* Loop continuously, reading messages from the socket, invoking the
|
||||||
|
callback, and waiting repeatedly until an error occurs. */
|
||||||
|
//assert(conn->content_len == 0);
|
||||||
|
for (;;) {
|
||||||
|
header_len = 0;
|
||||||
|
assert(conn->data_len >= conn->request_len);
|
||||||
|
if ((body_len = conn->data_len - conn->request_len) >= 2) {
|
||||||
|
len = buf[1] & 127;
|
||||||
|
mask_len = buf[1] & 128 ? 4 : 0;
|
||||||
|
if (len < 126 && body_len >= mask_len) {
|
||||||
|
data_len = len;
|
||||||
|
header_len = 2 + mask_len;
|
||||||
|
} else if (len == 126 && body_len >= 4 + mask_len) {
|
||||||
|
header_len = 4 + mask_len;
|
||||||
|
data_len = ((((int) buf[2]) << 8) + buf[3]);
|
||||||
|
} else if (body_len >= 10 + mask_len) {
|
||||||
|
header_len = 10 + mask_len;
|
||||||
|
data_len = (((uint64_t) ntohl(* (uint32_t *) &buf[2])) << 32) +
|
||||||
|
ntohl(* (uint32_t *) &buf[6]);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if (header_len > 0 && body_len >= header_len) {
|
||||||
|
/* Allocate space to hold websocket payload */
|
||||||
|
data = mem;
|
||||||
|
if (data_len > sizeof(mem)) {
|
||||||
|
data = (char *)mg_malloc(data_len);
|
||||||
|
if (data == NULL) {
|
||||||
|
/* Allocation failed, exit the loop and then close the
|
||||||
|
connection */
|
||||||
|
mg_cry(conn, "websocket out of memory; closing connection");
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Copy the mask before we shift the queue and destroy it */
|
||||||
|
if (mask_len > 0) {
|
||||||
|
memcpy(mask, buf + header_len - mask_len, sizeof(mask));
|
||||||
|
} else {
|
||||||
|
memset(mask, 0, sizeof(mask));
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Read frame payload from the first message in the queue into
|
||||||
|
data and advance the queue by moving the memory in place. */
|
||||||
|
assert(body_len >= header_len);
|
||||||
|
if (data_len + header_len > body_len) {
|
||||||
|
mop = buf[0]; /* current mask and opcode */
|
||||||
|
/* Overflow case */
|
||||||
|
len = body_len - header_len;
|
||||||
|
memcpy(data, buf + header_len, len);
|
||||||
|
error = 0;
|
||||||
|
while (len < data_len) {
|
||||||
|
int n = pull(NULL, conn, data + len, (int)(data_len - len));
|
||||||
|
if (n <= 0) {
|
||||||
|
error = 1;
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
len += n;
|
||||||
|
}
|
||||||
|
if (error) {
|
||||||
|
mg_cry(conn, "Websocket pull failed; closing connection");
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
conn->data_len = conn->request_len;
|
||||||
|
} else {
|
||||||
|
mop = buf[0]; /* current mask and opcode, overwritten by memmove() */
|
||||||
|
/* Length of the message being read at the front of the
|
||||||
|
queue */
|
||||||
|
len = data_len + header_len;
|
||||||
|
|
||||||
|
/* Copy the data payload into the data pointer for the
|
||||||
|
callback */
|
||||||
|
memcpy(data, buf + header_len, data_len);
|
||||||
|
|
||||||
|
/* Move the queue forward len bytes */
|
||||||
|
memmove(buf, buf + len, body_len - len);
|
||||||
|
|
||||||
|
/* Mark the queue as advanced */
|
||||||
|
conn->data_len -= (int)len;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Apply mask if necessary */
|
||||||
|
if (mask_len > 0) {
|
||||||
|
for (i = 0; i < data_len; ++i) {
|
||||||
|
data[i] ^= mask[i & 3];
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Exit the loop if callback signalled to exit,
|
||||||
|
or "connection close" opcode received. */
|
||||||
|
if ((conn->ctx->callbacks.websocket_data != NULL &&
|
||||||
|
#ifdef USE_LUA
|
||||||
|
(conn->lua_websocket_state == NULL) &&
|
||||||
|
#endif
|
||||||
|
!conn->ctx->callbacks.websocket_data(conn, mop, data, data_len)) ||
|
||||||
|
#ifdef USE_LUA
|
||||||
|
(conn->lua_websocket_state &&
|
||||||
|
!lua_websocket_data(conn, conn->lua_websocket_state, mop, data, data_len)) ||
|
||||||
|
#endif
|
||||||
|
(mop & 0xf) == WEBSOCKET_OPCODE_CONNECTION_CLOSE) { /* Opcode == 8, connection close */
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
if (data != mem) {
|
||||||
|
mg_free(data);
|
||||||
|
}
|
||||||
|
/* Not breaking the loop, process next websocket frame. */
|
||||||
|
} else {
|
||||||
|
/* Read from the socket into the next available location in the
|
||||||
|
message queue. */
|
||||||
|
if ((n = pull(NULL, conn, conn->buf + conn->data_len,
|
||||||
|
conn->buf_size - conn->data_len)) <= 0) {
|
||||||
|
/* Error, no bytes read */
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
conn->data_len += n;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
int mg_websocket_write(struct mg_connection* conn, int opcode, const char* data, size_t dataLen)
|
int mg_websocket_write(struct mg_connection* conn, int opcode, const char* data, size_t dataLen)
|
||||||
{
|
{
|
||||||
unsigned char header[10];
|
unsigned char header[10];
|
||||||
@ -6434,6 +6580,58 @@ struct mg_connection *mg_download(const char *host, int port, int use_ssl,
|
|||||||
return conn;
|
return conn;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
static void* websocket_client_thread(void *data)
|
||||||
|
{
|
||||||
|
struct mg_connection* conn = (struct mg_connection*)data;
|
||||||
|
read_client_websocket(conn);
|
||||||
|
|
||||||
|
DEBUG_TRACE("Websocket client thread exited\n");
|
||||||
|
|
||||||
|
return NULL;
|
||||||
|
}
|
||||||
|
|
||||||
|
struct mg_connection *mg_client_websocket_connect(const char *host, int port, int use_ssl,
|
||||||
|
char *error_buffer, size_t error_buffer_size,
|
||||||
|
const char *path, const char *origin, websocket_data_func data_func)
|
||||||
|
{
|
||||||
|
static const char *magic = "x3JJHMbDL1EzLkh9GBhXDw==";
|
||||||
|
|
||||||
|
//Establish the client connection and request upgrade
|
||||||
|
struct mg_connection* conn = mg_download(host, port, use_ssl,
|
||||||
|
error_buffer, error_buffer_size,
|
||||||
|
"GET %s HTTP/1.1\r\n"
|
||||||
|
"Host: %s\r\n"
|
||||||
|
"Upgrade: websocket\r\n"
|
||||||
|
"Connection: Upgrade\r\n"
|
||||||
|
"Sec-WebSocket-Key: %s\r\n"
|
||||||
|
"Sec-WebSocket-Version: 13\r\n"
|
||||||
|
"Origin: %s\r\n"
|
||||||
|
"\r\n", path, host, magic, origin);
|
||||||
|
|
||||||
|
//Connection object will be null if something goes wrong
|
||||||
|
if(conn == NULL)
|
||||||
|
{
|
||||||
|
DEBUG_TRACE("Websocket client connect error: %s\r\n", error_buffer);
|
||||||
|
return conn;
|
||||||
|
}
|
||||||
|
|
||||||
|
//For client connections, mg_context is fake. Set the callback for websocket
|
||||||
|
//data manually here so that read_client_websocket will automatically call it
|
||||||
|
conn->ctx->callbacks.websocket_data = data_func;
|
||||||
|
|
||||||
|
//Start a thread to read the websocket client connection
|
||||||
|
//This thread will automatically stop when mg_disconnect is
|
||||||
|
//called on the client connection
|
||||||
|
if(mg_start_thread(websocket_client_thread, (void*)conn) != 0)
|
||||||
|
{
|
||||||
|
mg_free((void*)conn);
|
||||||
|
conn = NULL;
|
||||||
|
DEBUG_TRACE("Websocket client connect thread could not be started\r\n");
|
||||||
|
}
|
||||||
|
|
||||||
|
return conn;
|
||||||
|
}
|
||||||
|
|
||||||
static void process_new_connection(struct mg_connection *conn)
|
static void process_new_connection(struct mg_connection *conn)
|
||||||
{
|
{
|
||||||
struct mg_request_info *ri = &conn->request_info;
|
struct mg_request_info *ri = &conn->request_info;
|
||||||
|
Reference in New Issue
Block a user