2 * Copyright (c) 2015, Peter Thorson. All rights reserved.
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that the following conditions are met:
6 * * Redistributions of source code must retain the above copyright
7 * notice, this list of conditions and the following disclaimer.
8 * * Redistributions in binary form must reproduce the above copyright
9 * notice, this list of conditions and the following disclaimer in the
10 * documentation and/or other materials provided with the distribution.
11 * * Neither the name of the WebSocket++ Project nor the
12 * names of its contributors may be used to endorse or promote products
13 * derived from this software without specific prior written permission.
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
16 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 * ARE DISCLAIMED. IN NO EVENT SHALL PETER THORSON BE LIABLE FOR ANY
19 * DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
20 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
21 * LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
22 * ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
23 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
24 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
28 #ifndef WEBSOCKETPP_PROCESSOR_HYBI13_HPP
29 #define WEBSOCKETPP_PROCESSOR_HYBI13_HPP
31 #include <websocketpp/processors/processor.hpp>
33 #include <websocketpp/frame.hpp>
34 #include <websocketpp/http/constants.hpp>
36 #include <websocketpp/utf8_validator.hpp>
37 #include <websocketpp/sha1/sha1.hpp>
38 #include <websocketpp/base64/base64.hpp>
40 #include <websocketpp/common/network.hpp>
41 #include <websocketpp/common/platforms.hpp>
49 namespace websocketpp {
52 /// Processor for Hybi version 13 (RFC6455)
53 template <typename config>
54 class hybi13 : public processor<config> {
56 typedef processor<config> base;
58 typedef typename config::request_type request_type;
59 typedef typename config::response_type response_type;
61 typedef typename config::message_type message_type;
62 typedef typename message_type::ptr message_ptr;
64 typedef typename config::con_msg_manager_type msg_manager_type;
65 typedef typename msg_manager_type::ptr msg_manager_ptr;
66 typedef typename config::rng_type rng_type;
68 typedef typename config::permessage_deflate_type permessage_deflate_type;
70 typedef std::pair<lib::error_code,std::string> err_str_pair;
72 explicit hybi13(bool secure, bool p_is_server, msg_manager_ptr manager, rng_type& rng)
73 : processor<config>(secure, p_is_server)
74 , m_msg_manager(manager)
80 int get_version() const {
84 bool has_permessage_deflate() const {
85 return m_permessage_deflate.is_implemented();
88 err_str_pair negotiate_extensions(request_type const & request) {
89 return negotiate_extensions_helper(request);
92 err_str_pair negotiate_extensions(response_type const & response) {
93 return negotiate_extensions_helper(response);
96 /// Extension negotiation helper function
98 * This exists mostly because the code for requests and responses is
99 * identical and I can't have virtual template methods.
101 template <typename header_type>
102 err_str_pair negotiate_extensions_helper(header_type const & header) {
105 // Respect blanket disabling of all extensions and don't even parse
106 // the extension header
107 if (!config::enable_extensions) {
108 ret.first = make_error_code(error::extensions_disabled);
112 http::parameter_list p;
114 bool error = header.get_header_as_plist("Sec-WebSocket-Extensions",p);
117 ret.first = make_error_code(error::extension_parse_error);
121 // If there are no extensions parsed then we are done!
126 http::parameter_list::const_iterator it;
128 if (m_permessage_deflate.is_implemented()) {
129 err_str_pair neg_ret;
130 for (it = p.begin(); it != p.end(); ++it) {
131 // look through each extension, if the key is permessage-deflate
132 if (it->first == "permessage-deflate") {
133 // if we have already successfully negotiated this extension
134 // then skip any other requests to negotiate the same one
135 // with different parameters
136 if (m_permessage_deflate.is_enabled()) {
141 neg_ret = m_permessage_deflate.negotiate(it->second);
144 // Figure out if this is an error that should halt all
145 // extension negotiations or simply cause negotiation of
146 // this specific extension to fail.
147 //std::cout << "permessage-compress negotiation failed: "
148 // << neg_ret.first.message() << std::endl;
150 // Note: this list will need commas if WebSocket++ ever
151 // supports more than one extension
152 ret.second += neg_ret.second;
153 m_permessage_deflate.init(base::m_server);
163 lib::error_code validate_handshake(request_type const & r) const {
164 if (r.get_method() != "GET") {
165 return make_error_code(error::invalid_http_method);
168 if (r.get_version() != "HTTP/1.1") {
169 return make_error_code(error::invalid_http_version);
173 // Host is required by HTTP/1.1
174 // Connection is required by is_websocket_handshake
175 // Upgrade is required by is_websocket_handshake
176 if (r.get_header("Sec-WebSocket-Key").empty()) {
177 return make_error_code(error::missing_required_header);
180 return lib::error_code();
183 /* TODO: the 'subprotocol' parameter may need to be expanded into a more
184 * generic struct if other user input parameters to the processed handshake
187 lib::error_code process_handshake(request_type const & request,
188 std::string const & subprotocol, response_type & response) const
190 std::string server_key = request.get_header("Sec-WebSocket-Key");
192 lib::error_code ec = process_handshake_key(server_key);
198 response.replace_header("Sec-WebSocket-Accept",server_key);
199 response.append_header("Upgrade",constants::upgrade_token);
200 response.append_header("Connection",constants::connection_token);
202 if (!subprotocol.empty()) {
203 response.replace_header("Sec-WebSocket-Protocol",subprotocol);
206 return lib::error_code();
209 /// Fill in a set of request headers for a client connection request
211 * @param [out] req Set of headers to fill in
212 * @param [in] uri The uri being connected to
213 * @param [in] subprotocols The list of subprotocols to request
215 lib::error_code client_handshake_request(request_type & req, uri_ptr
216 uri, std::vector<std::string> const & subprotocols) const
218 req.set_method("GET");
219 req.set_uri(uri->get_resource());
220 req.set_version("HTTP/1.1");
222 req.append_header("Upgrade","websocket");
223 req.append_header("Connection","Upgrade");
224 req.replace_header("Sec-WebSocket-Version","13");
225 req.replace_header("Host",uri->get_host_port());
227 if (!subprotocols.empty()) {
228 std::ostringstream result;
229 std::vector<std::string>::const_iterator it = subprotocols.begin();
231 while (it != subprotocols.end()) {
232 result << ", " << *it++;
235 req.replace_header("Sec-WebSocket-Protocol",result.str());
238 // Generate handshake key
239 frame::uint32_converter conv;
240 unsigned char raw_key[16];
242 for (int i = 0; i < 4; i++) {
244 std::copy(conv.c,conv.c+4,&raw_key[i*4]);
247 req.replace_header("Sec-WebSocket-Key",base64_encode(raw_key, 16));
249 if (m_permessage_deflate.is_implemented()) {
250 std::string offer = m_permessage_deflate.generate_offer();
251 if (!offer.empty()) {
252 req.replace_header("Sec-WebSocket-Extensions",offer);
256 return lib::error_code();
259 /// Validate the server's response to an outgoing handshake request
261 * @param req The original request sent
262 * @param res The reponse to generate
263 * @return An error code, 0 on success, non-zero for other errors
265 lib::error_code validate_server_handshake_response(request_type const & req,
266 response_type& res) const
268 // A valid response has an HTTP 101 switching protocols code
269 if (res.get_status_code() != http::status_code::switching_protocols) {
270 return error::make_error_code(error::invalid_http_status);
273 // And the upgrade token in an upgrade header
274 std::string const & upgrade_header = res.get_header("Upgrade");
275 if (utility::ci_find_substr(upgrade_header, constants::upgrade_token,
276 sizeof(constants::upgrade_token)-1) == upgrade_header.end())
278 return error::make_error_code(error::missing_required_header);
281 // And the websocket token in the connection header
282 std::string const & con_header = res.get_header("Connection");
283 if (utility::ci_find_substr(con_header, constants::connection_token,
284 sizeof(constants::connection_token)-1) == con_header.end())
286 return error::make_error_code(error::missing_required_header);
289 // And has a valid Sec-WebSocket-Accept value
290 std::string key = req.get_header("Sec-WebSocket-Key");
291 lib::error_code ec = process_handshake_key(key);
293 if (ec || key != res.get_header("Sec-WebSocket-Accept")) {
294 return error::make_error_code(error::missing_required_header);
299 return lib::error_code();
302 std::string get_raw(response_type const & res) const {
306 std::string const & get_origin(request_type const & r) const {
307 return r.get_header("Origin");
310 lib::error_code extract_subprotocols(request_type const & req,
311 std::vector<std::string> & subprotocol_list)
313 if (!req.get_header("Sec-WebSocket-Protocol").empty()) {
314 http::parameter_list p;
316 if (!req.get_header_as_plist("Sec-WebSocket-Protocol",p)) {
317 http::parameter_list::const_iterator it;
319 for (it = p.begin(); it != p.end(); ++it) {
320 subprotocol_list.push_back(it->first);
323 return error::make_error_code(error::subprotocol_parse_error);
326 return lib::error_code();
329 uri_ptr get_uri(request_type const & request) const {
330 return get_uri_from_host(request,(base::m_secure ? "wss" : "ws"));
333 /// Process new websocket connection bytes
336 * Hybi 13 data streams represent a series of variable length frames. Each
337 * frame is made up of a series of fixed length fields. The lengths of later
338 * fields are contained in earlier fields. The first field length is fixed
341 * This processor represents a state machine that keeps track of what field
342 * is presently being read and how many more bytes are needed to complete it
347 * Read two header bytes
348 * Extract full frame length.
349 * Read extra header bytes
350 * Validate frame header (including extension validate)
351 * Read extension data into extension message state object
352 * Read payload data into payload
354 * @param buf Input buffer
356 * @param len Length of input buffer
358 * @return Number of bytes processed or zero on error
360 size_t consume(uint8_t * buf, size_t len, lib::error_code & ec) {
363 ec = lib::error_code();
365 //std::cout << "consume: " << utility::to_hex(buf,len) << std::endl;
367 // Loop while we don't have a message ready and we still have bytes
369 while (m_state != READY && m_state != FATAL_ERROR &&
370 (p < len || m_bytes_needed == 0))
372 if (m_state == HEADER_BASIC) {
373 p += this->copy_basic_header_bytes(buf+p,len-p);
375 if (m_bytes_needed > 0) {
379 ec = this->validate_incoming_basic_header(
380 m_basic_header, base::m_server, !m_data_msg.msg_ptr
384 // extract full header size and adjust consume state accordingly
385 m_state = HEADER_EXTENDED;
387 m_bytes_needed = frame::get_header_len(m_basic_header) -
388 frame::BASIC_HEADER_LENGTH;
389 } else if (m_state == HEADER_EXTENDED) {
390 p += this->copy_extended_header_bytes(buf+p,len-p);
392 if (m_bytes_needed > 0) {
396 ec = validate_incoming_extended_header(m_basic_header,m_extended_header);
399 m_state = APPLICATION;
400 m_bytes_needed = static_cast<size_t>(get_payload_size(m_basic_header,m_extended_header));
402 // check if this frame is the start of a new message and set up
403 // the appropriate message metadata.
404 frame::opcode::value op = frame::get_opcode(m_basic_header);
406 // TODO: get_message failure conditions
408 if (frame::opcode::is_control(op)) {
409 m_control_msg = msg_metadata(
410 m_msg_manager->get_message(op,m_bytes_needed),
411 frame::get_masking_key(m_basic_header,m_extended_header)
414 m_current_msg = &m_control_msg;
416 if (!m_data_msg.msg_ptr) {
417 if (m_bytes_needed > base::m_max_message_size) {
418 ec = make_error_code(error::message_too_big);
422 m_data_msg = msg_metadata(
423 m_msg_manager->get_message(op,m_bytes_needed),
424 frame::get_masking_key(m_basic_header,m_extended_header)
427 if (m_permessage_deflate.is_enabled()) {
428 m_data_msg.msg_ptr->set_compressed(frame::get_rsv1(m_basic_header));
431 // Fetch the underlying payload buffer from the data message we
433 std::string & out = m_data_msg.msg_ptr->get_raw_payload();
435 if (out.size() + m_bytes_needed > base::m_max_message_size) {
436 ec = make_error_code(error::message_too_big);
440 // Each frame starts a new masking key. All other state
441 // remains between frames.
442 m_data_msg.prepared_key = prepare_masking_key(
443 frame::get_masking_key(
449 out.reserve(out.size() + m_bytes_needed);
451 m_current_msg = &m_data_msg;
453 } else if (m_state == EXTENSION) {
454 m_state = APPLICATION;
455 } else if (m_state == APPLICATION) {
456 size_t bytes_to_process = (std::min)(m_bytes_needed,len-p);
458 if (bytes_to_process > 0) {
459 p += this->process_payload_bytes(buf+p,bytes_to_process,ec);
464 if (m_bytes_needed > 0) {
468 // If this was the last frame in the message set the ready flag.
469 // Otherwise, reset processor state to read additional frames.
470 if (frame::get_fin(m_basic_header)) {
471 ec = finalize_message();
476 this->reset_headers();
480 ec = make_error_code(error::general);
488 /// Perform any finalization actions on an incoming message
490 * Called after the full message is received. Provides the opportunity for
491 * extensions to complete any data post processing as well as final UTF8
492 * validation checks for text messages.
494 * @return A code indicating errors, if any
496 lib::error_code finalize_message() {
497 std::string & out = m_current_msg->msg_ptr->get_raw_payload();
499 // if the frame is compressed, append the compression
500 // trailer and flush the compression buffer.
501 if (m_permessage_deflate.is_enabled()
502 && m_current_msg->msg_ptr->get_compressed())
504 uint8_t trailer[4] = {0x00, 0x00, 0xff, 0xff};
506 // Decompress current buffer into the message buffer
508 ec = m_permessage_deflate.decompress(trailer,4,out);
514 // ensure that text messages end on a valid UTF8 code point
515 if (frame::get_opcode(m_basic_header) == frame::opcode::TEXT) {
516 if (!m_current_msg->validator.complete()) {
517 return make_error_code(error::invalid_utf8);
523 return lib::error_code();
526 void reset_headers() {
527 m_state = HEADER_BASIC;
528 m_bytes_needed = frame::BASIC_HEADER_LENGTH;
530 m_basic_header.b0 = 0x00;
531 m_basic_header.b1 = 0x00;
534 m_extended_header.bytes,
535 frame::MAX_EXTENDED_HEADER_LENGTH,
540 /// Test whether or not the processor has a message ready
542 return (m_state == READY);
545 message_ptr get_message() {
547 return message_ptr();
549 message_ptr ret = m_current_msg->msg_ptr;
550 m_current_msg->msg_ptr.reset();
552 if (frame::opcode::is_control(ret->get_opcode())) {
553 m_control_msg.msg_ptr.reset();
555 m_data_msg.msg_ptr.reset();
558 this->reset_headers();
563 /// Test whether or not the processor is in a fatal error state.
564 bool get_error() const {
565 return m_state == FATAL_ERROR;
568 size_t get_bytes_needed() const {
569 return m_bytes_needed;
572 /// Prepare a user data message for writing
574 * Performs validation, masking, compression, etc. will return an error if
575 * there was an error, otherwise msg will be ready to be written
579 * @param in An unprepared message to prepare
580 * @param out A message to be overwritten with the prepared message
583 virtual lib::error_code prepare_data_frame(message_ptr in, message_ptr out)
586 return make_error_code(error::invalid_arguments);
589 frame::opcode::value op = in->get_opcode();
591 // validate opcode: only regular data frames
592 if (frame::opcode::is_control(op)) {
593 return make_error_code(error::invalid_opcode);
596 std::string& i = in->get_raw_payload();
597 std::string& o = out->get_raw_payload();
599 // validate payload utf8
600 if (op == frame::opcode::TEXT && !utf8_validator::validate(i)) {
601 return make_error_code(error::invalid_payload);
604 frame::masking_key_type key;
605 bool masked = !base::m_server;
606 bool compressed = m_permessage_deflate.is_enabled()
607 && in->get_compressed();
608 bool fin = in->get_fin();
611 // Generate masking key.
619 // compress and store in o after header.
620 m_permessage_deflate.compress(i,o);
623 return make_error_code(error::general);
626 // Strip trailing 4 0x00 0x00 0xff 0xff bytes before writing to the
628 o.resize(o.size()-4);
630 // mask in place if necessary
632 this->masked_copy(o,o,key);
635 // no compression, just copy data into the output buffer
638 // if we are masked, have the masking function write to the output
639 // buffer directly to avoid another copy. If not masked, copy
640 // directly without masking.
642 this->masked_copy(i,o,key);
644 std::copy(i.begin(),i.end(),o.begin());
649 frame::basic_header h(op,o.size(),fin,masked,compressed);
652 frame::extended_header e(o.size(),key.i);
653 out->set_header(frame::prepare_header(h,e));
655 frame::extended_header e(o.size());
656 out->set_header(frame::prepare_header(h,e));
659 out->set_prepared(true);
662 return lib::error_code();
666 lib::error_code prepare_ping(std::string const & in, message_ptr out) const {
667 return this->prepare_control(frame::opcode::PING,in,out);
670 lib::error_code prepare_pong(std::string const & in, message_ptr out) const {
671 return this->prepare_control(frame::opcode::PONG,in,out);
674 virtual lib::error_code prepare_close(close::status::value code,
675 std::string const & reason, message_ptr out) const
677 if (close::status::reserved(code)) {
678 return make_error_code(error::reserved_close_code);
681 if (close::status::invalid(code) && code != close::status::no_status) {
682 return make_error_code(error::invalid_close_code);
685 if (code == close::status::no_status && reason.size() > 0) {
686 return make_error_code(error::reason_requires_code);
689 if (reason.size() > frame:: limits::payload_size_basic-2) {
690 return make_error_code(error::control_too_big);
695 if (code != close::status::no_status) {
696 close::code_converter val;
699 payload.resize(reason.size()+2);
701 payload[0] = val.c[0];
702 payload[1] = val.c[1];
704 std::copy(reason.begin(),reason.end(),payload.begin()+2);
707 return this->prepare_control(frame::opcode::CLOSE,payload,out);
710 /// Convert a client handshake key into a server response key in place
711 lib::error_code process_handshake_key(std::string & key) const {
712 key.append(constants::handshake_guid);
714 unsigned char message_digest[20];
715 sha1::calc(key.c_str(),key.length(),message_digest);
716 key = base64_encode(message_digest,20);
718 return lib::error_code();
721 /// Reads bytes from buf into m_basic_header
722 size_t copy_basic_header_bytes(uint8_t const * buf, size_t len) {
723 if (len == 0 || m_bytes_needed == 0) {
728 // have at least two bytes
729 if (m_bytes_needed == 2) {
730 m_basic_header.b0 = buf[0];
731 m_basic_header.b1 = buf[1];
735 m_basic_header.b1 = buf[0];
740 // have exactly one byte
741 if (m_bytes_needed == 2) {
742 m_basic_header.b0 = buf[0];
746 m_basic_header.b1 = buf[0];
753 /// Reads bytes from buf into m_extended_header
754 size_t copy_extended_header_bytes(uint8_t const * buf, size_t len) {
755 size_t bytes_to_read = (std::min)(m_bytes_needed,len);
757 std::copy(buf,buf+bytes_to_read,m_extended_header.bytes+m_cursor);
758 m_cursor += bytes_to_read;
759 m_bytes_needed -= bytes_to_read;
761 return bytes_to_read;
764 /// Reads bytes from buf into message payload
766 * This function performs unmasking and uncompression, validates the
767 * decoded bytes, and writes them to the appropriate message buffer.
769 * This member function will use the input buffer as stratch space for its
770 * work. The raw input bytes will not be preserved. This applies only to the
771 * bytes actually needed. At most min(m_bytes_needed,len) will be processed.
773 * @param buf Input/working buffer
774 * @param len Length of buf
775 * @return Number of bytes processed or zero in case of an error
777 size_t process_payload_bytes(uint8_t * buf, size_t len, lib::error_code& ec)
780 if (frame::get_masked(m_basic_header)) {
781 m_current_msg->prepared_key = frame::byte_mask_circ(
782 buf, len, m_current_msg->prepared_key);
783 // TODO: SIMD masking
786 std::string & out = m_current_msg->msg_ptr->get_raw_payload();
787 size_t offset = out.size();
789 // decompress message if needed.
790 if (m_permessage_deflate.is_enabled()
791 && m_current_msg->msg_ptr->get_compressed())
793 // Decompress current buffer into the message buffer
794 ec = m_permessage_deflate.decompress(buf,len,out);
799 // No compression, straight copy
800 out.append(reinterpret_cast<char *>(buf),len);
803 // validate unmasked, decompressed values
804 if (m_current_msg->msg_ptr->get_opcode() == frame::opcode::TEXT) {
805 if (!m_current_msg->validator.decode(out.begin()+offset,out.end())) {
806 ec = make_error_code(error::invalid_utf8);
811 m_bytes_needed -= len;
816 /// Validate an incoming basic header
818 * Validates an incoming hybi13 basic header.
820 * @param h The basic header to validate
821 * @param is_server Whether or not the endpoint that received this frame
823 * @param new_msg Whether or not this is the first frame of the message
824 * @return 0 on success or a non-zero error code on failure
826 lib::error_code validate_incoming_basic_header(frame::basic_header const & h,
827 bool is_server, bool new_msg) const
829 frame::opcode::value op = frame::get_opcode(h);
831 // Check control frame size limit
832 if (frame::opcode::is_control(op) &&
833 frame::get_basic_size(h) > frame::limits::payload_size_basic)
835 return make_error_code(error::control_too_big);
838 // Check that RSV bits are clear
839 // The only RSV bits allowed are rsv1 if the permessage_compress
840 // extension is enabled for this connection and the message is not
841 // a control message.
843 // TODO: unit tests for this
844 if (frame::get_rsv1(h) && (!m_permessage_deflate.is_enabled()
845 || frame::opcode::is_control(op)))
847 return make_error_code(error::invalid_rsv_bit);
850 if (frame::get_rsv2(h) || frame::get_rsv3(h)) {
851 return make_error_code(error::invalid_rsv_bit);
854 // Check for reserved opcodes
855 if (frame::opcode::reserved(op)) {
856 return make_error_code(error::invalid_opcode);
859 // Check for invalid opcodes
860 // TODO: unit tests for this?
861 if (frame::opcode::invalid(op)) {
862 return make_error_code(error::invalid_opcode);
865 // Check for fragmented control message
866 if (frame::opcode::is_control(op) && !frame::get_fin(h)) {
867 return make_error_code(error::fragmented_control);
870 // Check for continuation without an active message
871 if (new_msg && op == frame::opcode::CONTINUATION) {
872 return make_error_code(error::invalid_continuation);
875 // Check for new data frame when expecting continuation
876 if (!new_msg && !frame::opcode::is_control(op) &&
877 op != frame::opcode::CONTINUATION)
879 return make_error_code(error::invalid_continuation);
882 // Servers should reject any unmasked frames from clients.
883 // Clients should reject any masked frames from servers.
884 if (is_server && !frame::get_masked(h)) {
885 return make_error_code(error::masking_required);
886 } else if (!is_server && frame::get_masked(h)) {
887 return make_error_code(error::masking_forbidden);
890 return lib::error_code();
893 /// Validate an incoming extended header
895 * Validates an incoming hybi13 full header.
897 * @todo unit test for the >32 bit frames on 32 bit systems case
899 * @param h The basic header to validate
900 * @param e The extended header to validate
901 * @return An error_code, non-zero values indicate why the validation
904 lib::error_code validate_incoming_extended_header(frame::basic_header h,
905 frame::extended_header e) const
907 uint8_t basic_size = frame::get_basic_size(h);
908 uint64_t payload_size = frame::get_payload_size(h,e);
910 // Check for non-minimally encoded payloads
911 if (basic_size == frame::payload_size_code_16bit &&
912 payload_size <= frame::limits::payload_size_basic)
914 return make_error_code(error::non_minimal_encoding);
917 if (basic_size == frame::payload_size_code_64bit &&
918 payload_size <= frame::limits::payload_size_extended)
920 return make_error_code(error::non_minimal_encoding);
923 // Check for >32bit frames on 32 bit systems
924 if (sizeof(size_t) == 4 && (payload_size >> 32)) {
925 return make_error_code(error::requires_64bit);
928 return lib::error_code();
931 /// Copy and mask/unmask in one operation
933 * Reads input from one string and writes unmasked output to another.
935 * @param [in] i The input string.
936 * @param [out] o The output string.
937 * @param [in] key The masking key to use for masking/unmasking
939 void masked_copy (std::string const & i, std::string & o,
940 frame::masking_key_type key) const
942 frame::byte_mask(i.begin(),i.end(),o.begin(),key);
943 // TODO: SIMD masking
946 /// Generic prepare control frame with opcode and payload.
948 * Internal control frame building method. Handles validation, masking, etc
950 * @param op The control opcode to use
951 * @param payload The payload to use
952 * @param out The message buffer to store the prepared frame in
953 * @return Status code, zero on success, non-zero on error
955 lib::error_code prepare_control(frame::opcode::value op,
956 std::string const & payload, message_ptr out) const
959 return make_error_code(error::invalid_arguments);
962 if (!frame::opcode::is_control(op)) {
963 return make_error_code(error::invalid_opcode);
966 if (payload.size() > frame::limits::payload_size_basic) {
967 return make_error_code(error::control_too_big);
970 frame::masking_key_type key;
971 bool masked = !base::m_server;
973 frame::basic_header h(op,payload.size(),true,masked);
975 std::string & o = out->get_raw_payload();
976 o.resize(payload.size());
979 // Generate masking key.
982 frame::extended_header e(payload.size(),key.i);
983 out->set_header(frame::prepare_header(h,e));
984 this->masked_copy(payload,o,key);
986 frame::extended_header e(payload.size());
987 out->set_header(frame::prepare_header(h,e));
988 std::copy(payload.begin(),payload.end(),o.begin());
992 out->set_prepared(true);
994 return lib::error_code();
1006 /// This data structure holds data related to processing a message, such as
1007 /// the buffer it is being written to, its masking key, its UTF8 validation
1008 /// state, and sometimes its compression state.
1009 struct msg_metadata {
1011 msg_metadata(message_ptr m, size_t p) : msg_ptr(m),prepared_key(p) {}
1012 msg_metadata(message_ptr m, frame::masking_key_type p)
1014 , prepared_key(prepare_masking_key(p)) {}
1016 message_ptr msg_ptr; // pointer to the message data buffer
1017 size_t prepared_key; // prepared masking key
1018 utf8_validator::validator validator; // utf8 validation state
1021 // Basic header of the frame being read
1022 frame::basic_header m_basic_header;
1024 // Pointer to a manager that can create message buffers for us.
1025 msg_manager_ptr m_msg_manager;
1027 // Number of bytes needed to complete the current operation
1028 size_t m_bytes_needed;
1030 // Number of extended header bytes read
1033 // Metadata for the current data msg
1034 msg_metadata m_data_msg;
1035 // Metadata for the current control msg
1036 msg_metadata m_control_msg;
1038 // Pointer to the metadata associated with the frame being read
1039 msg_metadata * m_current_msg;
1041 // Extended header of current frame
1042 frame::extended_header m_extended_header;
1046 // Overall state of the processor
1050 permessage_deflate_type m_permessage_deflate;
1053 } // namespace processor
1054 } // namespace websocketpp
1056 #endif //WEBSOCKETPP_PROCESSOR_HYBI13_HPP