blob: 9c218e5434cf16138c8a532705cfec0ae938d5c4 [file] [log] [blame]
/*
* lib/hpack.c
*
* Copyright (C) 2014-2019 Andy Green <andy@warmcat.com>
*
* This library is free software; you can redistribute it and/or
* modify it under the terms of the GNU Lesser General Public
* License as published by the Free Software Foundation:
* version 2.1 of the License.
*
* This library is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this library; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston,
* MA 02110-1301 USA
*/
#include "core/private.h"
/*
* Official static header table for HPACK
* +-------+-----------------------------+---------------+
| 1 | :authority | |
| 2 | :method | GET |
| 3 | :method | POST |
| 4 | :path | / |
| 5 | :path | /index.html |
| 6 | :scheme | http |
| 7 | :scheme | https |
| 8 | :status | 200 |
| 9 | :status | 204 |
| 10 | :status | 206 |
| 11 | :status | 304 |
| 12 | :status | 400 |
| 13 | :status | 404 |
| 14 | :status | 500 |
| 15 | accept-charset | |
| 16 | accept-encoding | gzip, deflate |
| 17 | accept-language | |
| 18 | accept-ranges | |
| 19 | accept | |
| 20 | access-control-allow-origin | |
| 21 | age | |
| 22 | allow | |
| 23 | authorization | |
| 24 | cache-control | |
| 25 | content-disposition | |
| 26 | content-encoding | |
| 27 | content-language | |
| 28 | content-length | |
| 29 | content-location | |
| 30 | content-range | |
| 31 | content-type | |
| 32 | cookie | |
| 33 | date | |
| 34 | etag | |
| 35 | expect | |
| 36 | expires | |
| 37 | from | |
| 38 | host | |
| 39 | if-match | |
| 40 | if-modified-since | |
| 41 | if-none-match | |
| 42 | if-range | |
| 43 | if-unmodified-since | |
| 44 | last-modified | |
| 45 | link | |
| 46 | location | |
| 47 | max-forwards | |
| 48 | proxy-authenticate | |
| 49 | proxy-authorization | |
| 50 | range | |
| 51 | referer | |
| 52 | refresh | |
| 53 | retry-after | |
| 54 | server | |
| 55 | set-cookie | |
| 56 | strict-transport-security | |
| 57 | transfer-encoding | |
| 58 | user-agent | |
| 59 | vary | |
| 60 | via | |
| 61 | www-authenticate | |
+-------+-----------------------------+---------------+
*/
static const uint8_t static_hdr_len[62] = {
0, /* starts at 1 */
10, 7, 7, 5, 5, 7, 7, 7, 7, 7,
7, 7, 7, 7, 14, 15, 15, 13, 6, 27,
3, 5, 13, 13, 19, 16, 16, 14, 16, 13,
12, 6, 4, 4, 6, 7, 4, 4, 8, 17,
13, 8, 19, 13, 4, 8, 12, 18, 19, 5,
7, 7, 11, 6, 10, 25, 17, 10, 4, 3,
16
};
static const unsigned char static_token[] = {
0,
WSI_TOKEN_HTTP_COLON_AUTHORITY,
WSI_TOKEN_HTTP_COLON_METHOD,
WSI_TOKEN_HTTP_COLON_METHOD,
WSI_TOKEN_HTTP_COLON_PATH,
WSI_TOKEN_HTTP_COLON_PATH,
WSI_TOKEN_HTTP_COLON_SCHEME,
WSI_TOKEN_HTTP_COLON_SCHEME,
WSI_TOKEN_HTTP_COLON_STATUS,
WSI_TOKEN_HTTP_COLON_STATUS,
WSI_TOKEN_HTTP_COLON_STATUS,
WSI_TOKEN_HTTP_COLON_STATUS,
WSI_TOKEN_HTTP_COLON_STATUS,
WSI_TOKEN_HTTP_COLON_STATUS,
WSI_TOKEN_HTTP_COLON_STATUS,
WSI_TOKEN_HTTP_ACCEPT_CHARSET,
WSI_TOKEN_HTTP_ACCEPT_ENCODING,
WSI_TOKEN_HTTP_ACCEPT_LANGUAGE,
WSI_TOKEN_HTTP_ACCEPT_RANGES,
WSI_TOKEN_HTTP_ACCEPT,
WSI_TOKEN_HTTP_ACCESS_CONTROL_ALLOW_ORIGIN,
WSI_TOKEN_HTTP_AGE,
WSI_TOKEN_HTTP_ALLOW,
WSI_TOKEN_HTTP_AUTHORIZATION,
WSI_TOKEN_HTTP_CACHE_CONTROL,
WSI_TOKEN_HTTP_CONTENT_DISPOSITION,
WSI_TOKEN_HTTP_CONTENT_ENCODING,
WSI_TOKEN_HTTP_CONTENT_LANGUAGE,
WSI_TOKEN_HTTP_CONTENT_LENGTH,
WSI_TOKEN_HTTP_CONTENT_LOCATION,
WSI_TOKEN_HTTP_CONTENT_RANGE,
WSI_TOKEN_HTTP_CONTENT_TYPE,
WSI_TOKEN_HTTP_COOKIE,
WSI_TOKEN_HTTP_DATE,
WSI_TOKEN_HTTP_ETAG,
WSI_TOKEN_HTTP_EXPECT,
WSI_TOKEN_HTTP_EXPIRES,
WSI_TOKEN_HTTP_FROM,
WSI_TOKEN_HOST,
WSI_TOKEN_HTTP_IF_MATCH,
WSI_TOKEN_HTTP_IF_MODIFIED_SINCE,
WSI_TOKEN_HTTP_IF_NONE_MATCH,
WSI_TOKEN_HTTP_IF_RANGE,
WSI_TOKEN_HTTP_IF_UNMODIFIED_SINCE,
WSI_TOKEN_HTTP_LAST_MODIFIED,
WSI_TOKEN_HTTP_LINK,
WSI_TOKEN_HTTP_LOCATION,
WSI_TOKEN_HTTP_MAX_FORWARDS,
WSI_TOKEN_HTTP_PROXY_AUTHENTICATE,
WSI_TOKEN_HTTP_PROXY_AUTHORIZATION,
WSI_TOKEN_HTTP_RANGE,
WSI_TOKEN_HTTP_REFERER,
WSI_TOKEN_HTTP_REFRESH,
WSI_TOKEN_HTTP_RETRY_AFTER,
WSI_TOKEN_HTTP_SERVER,
WSI_TOKEN_HTTP_SET_COOKIE,
WSI_TOKEN_HTTP_STRICT_TRANSPORT_SECURITY,
WSI_TOKEN_HTTP_TRANSFER_ENCODING,
WSI_TOKEN_HTTP_USER_AGENT,
WSI_TOKEN_HTTP_VARY,
WSI_TOKEN_HTTP_VIA,
WSI_TOKEN_HTTP_WWW_AUTHENTICATE,
};
/* some of the entries imply values as well as header names */
static const char * const http2_canned[] = {
"",
"",
"GET",
"POST",
"/",
"/index.html",
"http",
"https",
"200",
"204",
"206",
"304",
"400",
"404",
"500",
"",
"gzip, deflate"
};
/* see minihuf.c */
#include "huftable.h"
static int huftable_decode(int pos, char c)
{
int q = pos + !!c;
if (lextable_terms[q >> 3] & (1 << (q & 7))) /* terminal */
return lextable[q] | 0x8000;
return pos + (lextable[q] << 1);
}
static int lws_frag_start(struct lws *wsi, int hdr_token_idx)
{
struct allocated_headers *ah = wsi->http.ah;
if (!ah) {
lwsl_notice("%s: no ah\n", __func__);
return 1;
}
ah->hdr_token_idx = -1;
lwsl_header("%s: token %d ah->pos = %d, ah->nfrag = %d\n",
__func__, hdr_token_idx, ah->pos, ah->nfrag);
if (!hdr_token_idx) {
lwsl_err("%s: zero hdr_token_idx\n", __func__);
return 1;
}
if (ah->nfrag >= LWS_ARRAY_SIZE(ah->frag_index)) {
lwsl_err("%s: frag index %d too big\n", __func__, ah->nfrag);
return 1;
}
if ((hdr_token_idx == WSI_TOKEN_HTTP_COLON_AUTHORITY ||
hdr_token_idx == WSI_TOKEN_HTTP_COLON_METHOD ||
hdr_token_idx == WSI_TOKEN_HTTP_COLON_PATH ||
hdr_token_idx == WSI_TOKEN_COLON_PROTOCOL ||
hdr_token_idx == WSI_TOKEN_HTTP_COLON_SCHEME) &&
ah->frag_index[hdr_token_idx]) {
if (!(ah->frags[ah->frag_index[hdr_token_idx]].flags & 1)) {
lws_h2_goaway(lws_get_network_wsi(wsi),
H2_ERR_PROTOCOL_ERROR,
"Duplicated pseudoheader");
return 1;
}
}
if (ah->nfrag == 0)
ah->nfrag = 1;
ah->frags[ah->nfrag].offset = ah->pos;
ah->frags[ah->nfrag].len = 0;
ah->frags[ah->nfrag].nfrag = 0;
ah->frags[ah->nfrag].flags = 2; /* we had reason to set it */
ah->hdr_token_idx = hdr_token_idx;
/*
* Okay, but we could be, eg, the second or subsequent cookie: header
*/
if (ah->frag_index[hdr_token_idx]) {
int n;
/* find the last fragment for this header... */
n = ah->frag_index[hdr_token_idx];
while (ah->frags[n].nfrag)
n = ah->frags[n].nfrag;
/* and point it to continue in our continuation fragment */
ah->frags[n].nfrag = ah->nfrag;
/* cookie continuations need a separator token of ';' */
if (hdr_token_idx == WSI_TOKEN_HTTP_COOKIE) {
ah->data[ah->pos++] = ';';
ah->frags[ah->nfrag].len++;
}
} else
ah->frag_index[hdr_token_idx] = ah->nfrag;
return 0;
}
static int lws_frag_append(struct lws *wsi, unsigned char c)
{
struct allocated_headers *ah = wsi->http.ah;
ah->data[ah->pos++] = c;
ah->frags[ah->nfrag].len++;
return (int)ah->pos >= wsi->context->max_http_header_data;
}
static int lws_frag_end(struct lws *wsi)
{
lwsl_header("%s\n", __func__);
if (lws_frag_append(wsi, 0))
return 1;
/* don't account for the terminating NUL in the logical length */
wsi->http.ah->frags[wsi->http.ah->nfrag].len--;
wsi->http.ah->nfrag++;
return 0;
}
int
lws_hdr_extant(struct lws *wsi, enum lws_token_indexes h)
{
struct allocated_headers *ah = wsi->http.ah;
int n;
if (!ah)
return 0;
n = ah->frag_index[h];
if (!n)
return 0;
return !!(ah->frags[n].flags & 2);
}
static void lws_dump_header(struct lws *wsi, int hdr)
{
char s[200];
const unsigned char *p;
int len;
if (hdr == LWS_HPACK_IGNORE_ENTRY) {
lwsl_notice("hdr tok ignored\n");
return;
}
(void)p;
len = lws_hdr_copy(wsi, s, sizeof(s) - 1, hdr);
if (len < 0)
strcpy(s, "(too big to show)");
else
s[len] = '\0';
p = lws_token_to_string(hdr);
lwsl_header(" hdr tok %d (%s) = '%s' (len %d)\n", hdr,
p ? (char *)p : (char *)"null", s, len);
}
/*
* dynamic table
*
* [ 0 .... num_entries - 1]
*
* Starts filling at 0+
*
* #62 is *most recently entered*
*
* Number of entries is not restricted, but aggregated size of the entry
* payloads is. Unfortunately the way HPACK does this is specific to an
* imagined implementation, and lws implementation is much more efficient
* (ignoring unknown headers and using the lws token index for the header
* name part).
*/
/*
* returns 0 if dynamic entry (arg and len are filled)
* returns -1 if failure
* returns nonzero token index if actually static token
*/
static int
lws_token_from_index(struct lws *wsi, int index, const char **arg, int *len,
uint32_t *hdr_len)
{
struct hpack_dynamic_table *dyn;
if (index == LWS_HPACK_IGNORE_ENTRY)
return LWS_HPACK_IGNORE_ENTRY;
/* dynamic table only belongs to network wsi */
wsi = lws_get_network_wsi(wsi);
if (!wsi->h2.h2n)
return -1;
dyn = &wsi->h2.h2n->hpack_dyn_table;
if (index < 0)
return -1;
if (index < (int)LWS_ARRAY_SIZE(static_token)) {
if (arg && index < (int)LWS_ARRAY_SIZE(http2_canned)) {
*arg = http2_canned[index];
*len = (int)strlen(http2_canned[index]);
}
if (hdr_len)
*hdr_len = static_hdr_len[index];
return static_token[index];
}
if (!dyn) {
lwsl_notice("no dynamic table\n");
return -1;
}
if (index < (int)LWS_ARRAY_SIZE(static_token) ||
index >= (int)LWS_ARRAY_SIZE(static_token) + dyn->used_entries) {
lwsl_info(" %s: adjusted index %d >= %d\n", __func__, index,
dyn->used_entries);
lws_h2_goaway(wsi, H2_ERR_COMPRESSION_ERROR,
"index out of range");
return -1;
}
index -= (int)LWS_ARRAY_SIZE(static_token);
index = (dyn->pos - 1 - index) % dyn->num_entries;
if (index < 0)
index += dyn->num_entries;
lwsl_header("%s: dyn index %d, tok %d\n", __func__, index,
dyn->entries[index].lws_hdr_idx);
if (arg && len) {
*arg = dyn->entries[index].value;
*len = dyn->entries[index].value_len;
}
if (hdr_len)
*hdr_len = dyn->entries[index].hdr_len;
return dyn->entries[index].lws_hdr_idx;
}
static int
lws_h2_dynamic_table_dump(struct lws *wsi)
{
#if 0
struct lws *nwsi = lws_get_network_wsi(wsi);
struct hpack_dynamic_table *dyn;
int n, m;
const char *p;
if (!nwsi->h2.h2n)
return 1;
dyn = &nwsi->h2.h2n->hpack_dyn_table;
lwsl_header("Dump dyn table for nwsi %p (%d / %d members, pos = %d, "
"start index %d, virt used %d / %d)\n", nwsi,
dyn->used_entries, dyn->num_entries, dyn->pos,
(uint32_t)LWS_ARRAY_SIZE(static_token),
dyn->virtual_payload_usage, dyn->virtual_payload_max);
for (n = 0; n < dyn->used_entries; n++) {
m = (dyn->pos - 1 - n) % dyn->num_entries;
if (m < 0)
m += dyn->num_entries;
if (dyn->entries[m].lws_hdr_idx != LWS_HPACK_IGNORE_ENTRY)
p = (const char *)lws_token_to_string(
dyn->entries[m].lws_hdr_idx);
else
p = "(ignored)";
lwsl_header(" %3d: tok %s: (len %d) val '%s'\n",
(int)(n + LWS_ARRAY_SIZE(static_token)), p,
dyn->entries[m].hdr_len, dyn->entries[m].value ?
dyn->entries[m].value : "null");
}
#endif
return 0;
}
static void
lws_dynamic_free(struct hpack_dynamic_table *dyn, int idx)
{
lwsl_header("freeing %d for reuse\n", idx);
dyn->virtual_payload_usage -= dyn->entries[idx].value_len +
dyn->entries[idx].hdr_len;
lws_free_set_NULL(dyn->entries[idx].value);
dyn->entries[idx].value = NULL;
dyn->entries[idx].value_len = 0;
dyn->entries[idx].hdr_len = 0;
dyn->entries[idx].lws_hdr_idx = LWS_HPACK_IGNORE_ENTRY;
dyn->used_entries--;
}
/*
* There are two address spaces, 1) internal ringbuffer and 2) HPACK indexes.
*
* Internal ringbuffer:
*
* The internal ringbuffer wraps as we keep filling it, dyn->pos points to
* the next index to be written.
*
* HPACK indexes:
*
* The last-written entry becomes entry 0, the previously-last-written entry
* becomes entry 1 etc.
*/
static int
lws_dynamic_token_insert(struct lws *wsi, int hdr_len,
int lws_hdr_index, char *arg, int len)
{
struct hpack_dynamic_table *dyn;
int new_index;
/* dynamic table only belongs to network wsi */
wsi = lws_get_network_wsi(wsi);
if (!wsi->h2.h2n)
return 1;
dyn = &wsi->h2.h2n->hpack_dyn_table;
if (!dyn->entries) {
lwsl_err("%s: unsized dyn table\n", __func__);
return 1;
}
lws_h2_dynamic_table_dump(wsi);
new_index = (dyn->pos) % dyn->num_entries;
if (dyn->num_entries && dyn->used_entries == dyn->num_entries) {
if (dyn->virtual_payload_usage < dyn->virtual_payload_max)
lwsl_err("Dropping header content before limit!\n");
/* we have to drop the oldest to make space */
lws_dynamic_free(dyn, new_index);
}
/*
* evict guys to make room, allowing for some overage. We have to
* take care about getting a single huge header, and evicting
* everything
*/
while (dyn->virtual_payload_usage &&
dyn->used_entries &&
dyn->virtual_payload_usage + hdr_len + len >
dyn->virtual_payload_max + 1024) {
int n = (dyn->pos - dyn->used_entries) % dyn->num_entries;
if (n < 0)
n += dyn->num_entries;
lws_dynamic_free(dyn, n);
}
if (dyn->used_entries < dyn->num_entries)
dyn->used_entries++;
dyn->entries[new_index].value_len = 0;
if (lws_hdr_index != LWS_HPACK_IGNORE_ENTRY) {
if (dyn->entries[new_index].value)
lws_free_set_NULL(dyn->entries[new_index].value);
dyn->entries[new_index].value =
lws_malloc(len + 1, "hpack dyn");
if (!dyn->entries[new_index].value)
return 1;
memcpy(dyn->entries[new_index].value, arg, len);
dyn->entries[new_index].value[len] = '\0';
dyn->entries[new_index].value_len = len;
} else
dyn->entries[new_index].value = NULL;
dyn->entries[new_index].lws_hdr_idx = lws_hdr_index;
dyn->entries[new_index].hdr_len = hdr_len;
dyn->virtual_payload_usage += hdr_len + len;
lwsl_info("%s: index %ld: lws_hdr_index 0x%x, hdr len %d, '%s' len %d\n",
__func__, (long)LWS_ARRAY_SIZE(static_token),
lws_hdr_index, hdr_len, dyn->entries[new_index].value ?
dyn->entries[new_index].value : "null", len);
dyn->pos = (dyn->pos + 1) % dyn->num_entries;
lws_h2_dynamic_table_dump(wsi);
return 0;
}
int
lws_hpack_dynamic_size(struct lws *wsi, int size)
{
struct hpack_dynamic_table *dyn;
struct hpack_dt_entry *dte;
struct lws *nwsi;
int min, n = 0, m;
/*
* "size" here is coming from the http/2 SETTING
* SETTINGS_HEADER_TABLE_SIZE. This is a (virtual, in our case)
* linear buffer containing dynamic header names and values... when it
* is full, old entries are evicted.
*
* We encode the header as an lws_hdr_idx, which is all the rest of
* lws cares about; if there is no matching header we store an empty
* entry in the dyn table as a placeholder.
*
* So to make the two systems work together we keep an accounting of
* what we are using to decide when to evict... we must only evict
* things when the remote peer's accounting also makes him feel he
* should evict something.
*/
nwsi = lws_get_network_wsi(wsi);
if (!nwsi->h2.h2n)
goto bail;
dyn = &nwsi->h2.h2n->hpack_dyn_table;
lwsl_info("%s: from %d to %d, lim %d\n", __func__,
(int)dyn->num_entries, size,
nwsi->vhost->h2.set.s[H2SET_HEADER_TABLE_SIZE]);
if (size > (int)nwsi->vhost->h2.set.s[H2SET_HEADER_TABLE_SIZE]) {
lwsl_info("rejecting hpack dyn size %u vs %u\n", size,
nwsi->vhost->h2.set.s[H2SET_HEADER_TABLE_SIZE]);
// this seems necessary to work with some browsers
if (nwsi->vhost->h2.set.s[H2SET_HEADER_TABLE_SIZE] == 65536 &&
size == 65537) { /* h2spec */
lws_h2_goaway(nwsi, H2_ERR_COMPRESSION_ERROR,
"Asked for header table bigger than we told");
goto bail;
}
size = nwsi->vhost->h2.set.s[H2SET_HEADER_TABLE_SIZE];
}
dyn->virtual_payload_max = size;
size = size / 8;
min = size;
if (min > dyn->used_entries)
min = dyn->used_entries;
if (size == dyn->num_entries)
return 0;
if (dyn->num_entries < min)
min = dyn->num_entries;
// lwsl_notice("dte requested size %d\n", size);
dte = lws_zalloc(sizeof(*dte) * (size + 1), "dynamic table entries");
if (!dte)
goto bail;
while (dyn->virtual_payload_usage && dyn->used_entries &&
dyn->virtual_payload_usage > dyn->virtual_payload_max) {
n = (dyn->pos - dyn->used_entries) % dyn->num_entries;
if (n < 0)
n += dyn->num_entries;
lws_dynamic_free(dyn, n);
}
if (min > dyn->used_entries)
min = dyn->used_entries;
if (dyn->entries) {
for (n = 0; n < min; n++) {
m = (dyn->pos - dyn->used_entries + n) %
dyn->num_entries;
if (m < 0)
m += dyn->num_entries;
dte[n] = dyn->entries[m];
}
lws_free(dyn->entries);
}
dyn->entries = dte;
dyn->num_entries = size;
dyn->used_entries = min;
if (size)
dyn->pos = min % size;
else
dyn->pos = 0;
lws_h2_dynamic_table_dump(wsi);
return 0;
bail:
lwsl_info("%s: failed to resize to %d\n", __func__, size);
return 1;
}
void
lws_hpack_destroy_dynamic_header(struct lws *wsi)
{
struct hpack_dynamic_table *dyn;
int n;
if (!wsi->h2.h2n)
return;
dyn = &wsi->h2.h2n->hpack_dyn_table;
if (!dyn->entries)
return;
for (n = 0; n < dyn->num_entries; n++)
if (dyn->entries[n].value)
lws_free_set_NULL(dyn->entries[n].value);
lws_free_set_NULL(dyn->entries);
}
static int
lws_hpack_use_idx_hdr(struct lws *wsi, int idx, int known_token)
{
const char *arg = NULL;
int len = 0;
const char *p = NULL;
int tok = lws_token_from_index(wsi, idx, &arg, &len, NULL);
if (tok == LWS_HPACK_IGNORE_ENTRY) {
lwsl_header("%s: lws_token says ignore, returning\n", __func__);
return 0;
}
if (tok == -1) {
lwsl_info("%s: idx %d mapped to tok %d\n", __func__, idx, tok);
return 1;
}
if (arg) {
/* dynamic result */
if (known_token > 0)
tok = known_token;
lwsl_header("%s: dyn: idx %d '%s' tok %d\n", __func__, idx, arg,
tok);
} else
lwsl_header("writing indexed hdr %d (tok %d '%s')\n", idx, tok,
lws_token_to_string(tok));
if (tok == LWS_HPACK_IGNORE_ENTRY)
return 0;
if (arg)
p = arg;
if (idx < (int)LWS_ARRAY_SIZE(http2_canned))
p = http2_canned[idx];
if (lws_frag_start(wsi, tok))
return 1;
if (p)
while (*p && len--)
if (lws_frag_append(wsi, *p++))
return 1;
if (lws_frag_end(wsi))
return 1;
lws_dump_header(wsi, tok);
return 0;
}
static uint8_t lws_header_implies_psuedoheader_map[] = {
0x07, 0x00, 0x00, 0x00, 0xf8, 0x00, 0x00, 0x00, 0x00 /* <-64 */,
0x0e /* <- 72 */, 0x04 /* <- 80 */, 0, 0, 0, 0
};
static int
lws_hpack_handle_pseudo_rules(struct lws *nwsi, struct lws *wsi, int m)
{
if (m == LWS_HPACK_IGNORE_ENTRY || m == -1)
return 0;
if (wsi->seen_nonpseudoheader &&
(lws_header_implies_psuedoheader_map[m >> 3] & (1 << (m & 7)))) {
lwsl_info("lws tok %d seems to be a pseudoheader\n", m);
/*
* it's not legal to see a
* pseudoheader after normal
* headers
*/
lws_h2_goaway(nwsi, H2_ERR_PROTOCOL_ERROR,
"Pseudoheader after normal hdrs");
return 1;
}
if (!(lws_header_implies_psuedoheader_map[m >> 3] & (1 << (m & 7))))
wsi->seen_nonpseudoheader = 1;
return 0;
}
int lws_hpack_interpret(struct lws *wsi, unsigned char c)
{
struct lws *nwsi = lws_get_network_wsi(wsi);
struct lws_h2_netconn *h2n = nwsi->h2.h2n;
struct allocated_headers *ah = wsi->http.ah;
unsigned int prev;
unsigned char c1;
int n, m, plen;
if (!h2n)
return -1;
/*
* HPKT_INDEXED_HDR_7 1xxxxxxx: just "header field"
* HPKT_INDEXED_HDR_6_VALUE_INCR 01xxxxxx: NEW indexed hdr + val
* HPKT_LITERAL_HDR_VALUE_INCR 01000000: NEW literal hdr + val
* HPKT_INDEXED_HDR_4_VALUE 0000xxxx: indexed hdr + val
* HPKT_INDEXED_HDR_4_VALUE_NEVER 0001xxxx: NEVER NEW indexed hdr + val
* HPKT_LITERAL_HDR_VALUE 00000000: literal hdr + val
* HPKT_LITERAL_HDR_VALUE_NEVER 00010000: NEVER NEW literal hdr + val
*/
switch (h2n->hpack) {
case HPKS_TYPE:
h2n->is_first_header_char = 1;
h2n->huff_pad = 0;
h2n->zero_huff_padding = 0;
h2n->last_action_dyntable_resize = 0;
h2n->ext_count = 0;
h2n->hpack_hdr_len = 0;
h2n->unknown_header = 0;
ah->parser_state = 255;
if (c & 0x80) { /* 1.... indexed header field only */
/* just a possibly-extended integer */
h2n->hpack_type = HPKT_INDEXED_HDR_7;
lwsl_header("HPKT_INDEXED_HDR_7 hdr %d\n", c & 0x7f);
lws_h2_dynamic_table_dump(wsi);
h2n->hdr_idx = c & 0x7f;
if ((c & 0x7f) == 0x7f) {
h2n->hpack_len = 0;
h2n->hpack_m = 0x7f;
h2n->hpack = HPKS_IDX_EXT;
break;
}
if (!h2n->hdr_idx) {
lws_h2_goaway(nwsi, H2_ERR_COMPRESSION_ERROR,
"hdr index 0 seen");
return 1;
}
m = lws_token_from_index(wsi, h2n->hdr_idx,
NULL, NULL, NULL);
if (lws_hpack_handle_pseudo_rules(nwsi, wsi, m))
return 1;
lwsl_header("HPKT_INDEXED_HDR_7: hdr %d\n", c & 0x7f);
if (lws_hpack_use_idx_hdr(wsi, c & 0x7f, -1)) {
lwsl_header("%s: idx hdr wr fail\n", __func__);
return 1;
}
/* stay at same state */
break;
}
if (c & 0x40) { /* 01.... indexed or literal header incr idx */
/*
* [possibly-ext hdr idx (6) | new literal hdr name]
* H + possibly-ext value length
* literal value
*/
h2n->hdr_idx = 0;
if (c == 0x40) { /* literal header */
lwsl_header(" HPKT_LITERAL_HDR_VALUE_INCR\n");
h2n->hpack_type = HPKT_LITERAL_HDR_VALUE_INCR;
h2n->value = 0;
h2n->hpack_len = 0;
h2n->hpack = HPKS_HLEN;
break;
}
/* indexed header */
h2n->hpack_type = HPKT_INDEXED_HDR_6_VALUE_INCR;
lwsl_header(" HPKT_INDEXED_HDR_6_VALUE_INCR (hdr %d)\n",
c & 0x3f);
h2n->hdr_idx = c & 0x3f;
if ((c & 0x3f) == 0x3f) {
h2n->hpack_m = 0x3f;
h2n->hpack_len = 0;
h2n->hpack = HPKS_IDX_EXT;
break;
}
h2n->value = 1;
h2n->hpack = HPKS_HLEN;
if (!h2n->hdr_idx) {
lws_h2_goaway(nwsi, H2_ERR_COMPRESSION_ERROR,
"hdr index 0 seen");
return 1;
}
break;
}
switch(c & 0xf0) {
case 0x10: /* literal header never index */
case 0: /* literal header without indexing */
/*
* follows 0x40 except 4-bit hdr idx
* and don't add to index
*/
if (c == 0) { /* literal name */
h2n->hpack_type = HPKT_LITERAL_HDR_VALUE;
lwsl_header(" HPKT_LITERAL_HDR_VALUE\n");
h2n->hpack = HPKS_HLEN;
h2n->value = 0;
break;
}
if (c == 0x10) { /* literal name NEVER */
h2n->hpack_type = HPKT_LITERAL_HDR_VALUE_NEVER;
lwsl_header(" HPKT_LITERAL_HDR_VALUE_NEVER\n");
h2n->hpack = HPKS_HLEN;
h2n->value = 0;
break;
}
lwsl_header("indexed\n");
/* indexed name */
if (c & 0x10) {
h2n->hpack_type = HPKT_INDEXED_HDR_4_VALUE_NEVER;
lwsl_header("HPKT_LITERAL_HDR_4_VALUE_NEVER\n");
} else {
h2n->hpack_type = HPKT_INDEXED_HDR_4_VALUE;
lwsl_header(" HPKT_INDEXED_HDR_4_VALUE\n");
}
h2n->hdr_idx = 0;
if ((c & 0xf) == 0xf) {
h2n->hpack_len = c & 0xf;
h2n->hpack_m = 0xf;
h2n->hpack_len = 0;
h2n->hpack = HPKS_IDX_EXT;
break;
}
h2n->hdr_idx = c & 0xf;
h2n->value = 1;
h2n->hpack = HPKS_HLEN;
break;
case 0x20:
case 0x30: /* header table size update */
/* possibly-extended size value (5) */
lwsl_header("HPKT_SIZE_5 %x\n", c &0x1f);
h2n->hpack_type = HPKT_SIZE_5;
h2n->hpack_len = c & 0x1f;
if (h2n->hpack_len == 0x1f) {
h2n->hpack_m = 0x1f;
h2n->hpack_len = 0;
h2n->hpack = HPKS_IDX_EXT;
break;
}
h2n->last_action_dyntable_resize = 1;
if (lws_hpack_dynamic_size(wsi, h2n->hpack_len))
return 1;
break;
}
break;
case HPKS_IDX_EXT:
h2n->hpack_len = h2n->hpack_len |
((c & 0x7f) << h2n->ext_count);
h2n->ext_count += 7;
if (c & 0x80) /* extended int not complete yet */
break;
/* extended integer done */
h2n->hpack_len += h2n->hpack_m;
lwsl_header("HPKS_IDX_EXT: hpack_len %d\n", h2n->hpack_len);
switch (h2n->hpack_type) {
case HPKT_INDEXED_HDR_7:
if (lws_hpack_use_idx_hdr(wsi, h2n->hpack_len,
h2n->hdr_idx)) {
lwsl_notice("%s: hd7 use fail\n", __func__);
return 1;
}
h2n->hpack = HPKS_TYPE;
break;
case HPKT_SIZE_5:
h2n->last_action_dyntable_resize = 1;
if (lws_hpack_dynamic_size(wsi, h2n->hpack_len))
return 1;
h2n->hpack = HPKS_TYPE;
break;
default:
h2n->hdr_idx = h2n->hpack_len;
if (!h2n->hdr_idx) {
lws_h2_goaway(nwsi, H2_ERR_COMPRESSION_ERROR,
"extended header index was 0");
return 1;
}
h2n->value = 1;
h2n->hpack = HPKS_HLEN;
break;
}
break;
case HPKS_HLEN: /* [ H | 7+ ] */
h2n->huff = !!(c & 0x80);
h2n->hpack_pos = 0;
h2n->hpack_len = c & 0x7f;
if (h2n->hpack_len == 0x7f) {
h2n->hpack_m = 0x7f;
h2n->hpack_len = 0;
h2n->ext_count = 0;
h2n->hpack = HPKS_HLEN_EXT;
break;
}
pre_data:
h2n->hpack = HPKS_DATA;
if (!h2n->value || !h2n->hdr_idx) {
ah->parser_state = WSI_TOKEN_NAME_PART;
ah->lextable_pos = 0;
h2n->unknown_header = 0;
break;
}
if (h2n->hpack_type == HPKT_LITERAL_HDR_VALUE ||
h2n->hpack_type == HPKT_LITERAL_HDR_VALUE_INCR ||
h2n->hpack_type == HPKT_LITERAL_HDR_VALUE_NEVER) {
n = ah->parser_state;
if (n == 255) {
n = -1;
h2n->hdr_idx = -1;
} else
h2n->hdr_idx = 1;
} else {
n = lws_token_from_index(wsi, h2n->hdr_idx, NULL,
NULL, NULL);
lwsl_header(" lws_tok_from_idx(%d) says %d\n",
h2n->hdr_idx, n);
}
if (n == LWS_HPACK_IGNORE_ENTRY || n == -1)
h2n->hdr_idx = LWS_HPACK_IGNORE_ENTRY;
switch (h2n->hpack_type) {
/*
* hpack types with literal headers were parsed by the lws
* header SM... on recognition of a known lws header, it does
* the correct lws_frag_start() for us already. Other types
* (ie, indexed header) need us to do it here.
*/
case HPKT_LITERAL_HDR_VALUE_INCR:
case HPKT_LITERAL_HDR_VALUE:
case HPKT_LITERAL_HDR_VALUE_NEVER:
break;
default:
if (n != -1 && n != LWS_HPACK_IGNORE_ENTRY &&
lws_frag_start(wsi, n)) {
lwsl_header("%s: frag start failed\n",
__func__);
return 1;
}
break;
}
break;
case HPKS_HLEN_EXT:
h2n->hpack_len = h2n->hpack_len |
((c & 0x7f) << h2n->ext_count);
h2n->ext_count += 7;
if (c & 0x80) /* extended integer not complete yet */
break;
h2n->hpack_len += h2n->hpack_m;
goto pre_data;
case HPKS_DATA:
//lwsl_header(" 0x%02X huff %d\n", c, h2n->huff);
c1 = c;
for (n = 0; n < 8; n++) {
if (h2n->huff) {
char b = (c >> 7) & 1;
prev = h2n->hpack_pos;
h2n->hpack_pos = huftable_decode(
h2n->hpack_pos, b);
c <<= 1;
if (h2n->hpack_pos == 0xffff) {
lwsl_notice("Huffman err\n");
return 1;
}
if (!(h2n->hpack_pos & 0x8000)) {
if (!b)
h2n->zero_huff_padding = 1;
h2n->huff_pad++;
continue;
}
c1 = h2n->hpack_pos & 0x7fff;
h2n->hpack_pos = 0;
h2n->huff_pad = 0;
h2n->zero_huff_padding = 0;
/* EOS |11111111|11111111|11111111|111111 */
if (!c1 && prev == HUFTABLE_0x100_PREV) {
lws_h2_goaway(nwsi,
H2_ERR_COMPRESSION_ERROR,
"Huffman EOT seen");
return 1;
}
} else
n = 8;
if (h2n->value) { /* value */
if (h2n->hdr_idx &&
h2n->hdr_idx != LWS_HPACK_IGNORE_ENTRY) {
if (ah->hdr_token_idx ==
WSI_TOKEN_HTTP_COLON_PATH) {
switch (lws_parse_urldecode(
wsi, &c1)) {
case LPUR_CONTINUE:
break;
case LPUR_SWALLOW:
goto swallow;
case LPUR_EXCESSIVE:
case LPUR_FORBID:
lws_h2_goaway(nwsi,
H2_ERR_PROTOCOL_ERROR,
"Evil URI");
return 1;
default:
return -1;
}
}
if (lws_frag_append(wsi, c1)) {
lwsl_notice(
"%s: frag app fail\n",
__func__);
return 1;
}
} //else
//lwsl_header("ignoring %c\n", c1);
} else {
/*
* Convert name using existing parser,
* If h2n->unknown_header == 0, result is
* in wsi->parser_state
* using WSI_TOKEN_GET_URI.
*
* If unknown header h2n->unknown_header
* will be set.
*/
h2n->hpack_hdr_len++;
if (h2n->is_first_header_char) {
h2n->is_first_header_char = 0;
h2n->first_hdr_char = c1;
}
lwsl_header("parser: %c\n", c1);
/* uppercase header names illegal */
if (c1 >= 'A' && c1 <= 'Z') {
lws_h2_goaway(nwsi,
H2_ERR_COMPRESSION_ERROR,
"Uppercase literal hpack hdr");
return 1;
}
plen = 1;
if (!h2n->unknown_header &&
lws_parse(wsi, &c1, &plen))
h2n->unknown_header = 1;
}
swallow:
(void)n;
} // for n
if (--h2n->hpack_len)
break;
/*
* The header (h2n->value = 0) or the payload (h2n->value = 1)
* is complete.
*/
if (h2n->huff && (h2n->huff_pad > 7 ||
(h2n->zero_huff_padding && h2n->huff_pad))) {
lwsl_info("zero_huff_padding: %d huff_pad: %d\n",
h2n->zero_huff_padding, h2n->huff_pad);
lws_h2_goaway(nwsi, H2_ERR_COMPRESSION_ERROR,
"Huffman padding excessive or wrong");
return 1;
}
if (!h2n->value && (
h2n->hpack_type == HPKT_LITERAL_HDR_VALUE ||
h2n->hpack_type == HPKT_LITERAL_HDR_VALUE_INCR ||
h2n->hpack_type == HPKT_LITERAL_HDR_VALUE_NEVER)) {
h2n->hdr_idx = LWS_HPACK_IGNORE_ENTRY;
lwsl_header("wsi->parser_state: %d\n",
ah->parser_state);
if (ah->parser_state == WSI_TOKEN_NAME_PART) {
/* h2 headers come without the colon */
c1 = ':';
plen = 1;
n = lws_parse(wsi, &c1, &plen);
(void)n;
}
if (ah->parser_state == WSI_TOKEN_NAME_PART ||
#if defined(LWS_WITH_CUSTOM_HEADERS)
ah->parser_state == WSI_TOKEN_UNKNOWN_VALUE_PART ||
#endif
ah->parser_state == WSI_TOKEN_SKIPPING) {
h2n->unknown_header = 1;
ah->parser_state = -1;
wsi->seen_nonpseudoheader = 1;
}
}
n = 8;
/* we have the header */
if (!h2n->value) {
h2n->value = 1;
h2n->hpack = HPKS_HLEN;
h2n->huff_pad = 0;
h2n->zero_huff_padding = 0;
h2n->ext_count = 0;
break;
}
/*
* we have got both the header and value
*/
m = -1;
switch (h2n->hpack_type) {
/*
* These are the only two that insert to the dyntable
*/
/* NEW indexed hdr with value */
case HPKT_INDEXED_HDR_6_VALUE_INCR:
/* header length is determined by known index */
m = lws_token_from_index(wsi, h2n->hdr_idx, NULL, NULL,
&h2n->hpack_hdr_len);
goto add_it;
/* NEW literal hdr with value */
case HPKT_LITERAL_HDR_VALUE_INCR:
/*
* hdr is a new literal, so length is already in
* h2n->hpack_hdr_len
*/
m = ah->parser_state;
if (h2n->unknown_header ||
ah->parser_state == WSI_TOKEN_NAME_PART ||
ah->parser_state == WSI_TOKEN_SKIPPING) {
if (h2n->first_hdr_char == ':') {
lwsl_info("HPKT_LITERAL_HDR_VALUE_INCR:"
" end state %d unk hdr %d\n",
ah->parser_state,
h2n->unknown_header);
/* unknown pseudoheaders are illegal */
lws_h2_goaway(nwsi,
H2_ERR_PROTOCOL_ERROR,
"Unknown pseudoheader");
return 1;
}
m = LWS_HPACK_IGNORE_ENTRY;
}
add_it:
/*
* mark us as having been set at the time of dynamic
* token insertion.
*/
ah->frags[ah->nfrag].flags |= 1;
if (lws_dynamic_token_insert(wsi, h2n->hpack_hdr_len, m,
&ah->data[ah->frags[ah->nfrag].offset],
ah->frags[ah->nfrag].len)) {
lwsl_notice("%s: tok_insert fail\n", __func__);
return 1;
}
break;
default:
break;
}
if (h2n->hdr_idx != LWS_HPACK_IGNORE_ENTRY && lws_frag_end(wsi))
return 1;
if (h2n->hpack_type != HPKT_INDEXED_HDR_6_VALUE_INCR) {
if (h2n->hpack_type == HPKT_LITERAL_HDR_VALUE ||
h2n->hpack_type == HPKT_LITERAL_HDR_VALUE_INCR ||
h2n->hpack_type == HPKT_LITERAL_HDR_VALUE_NEVER) {
m = ah->parser_state;
if (m == 255)
m = -1;
} else
m = lws_token_from_index(wsi, h2n->hdr_idx,
NULL, NULL, NULL);
}
if (m != -1 && m != LWS_HPACK_IGNORE_ENTRY)
lws_dump_header(wsi, m);
if (lws_hpack_handle_pseudo_rules(nwsi, wsi, m))
return 1;
h2n->is_first_header_char = 1;
h2n->hpack = HPKS_TYPE;
break;
}
return 0;
}
static int
lws_h2_num_start(int starting_bits, unsigned long num)
{
unsigned int mask = (1 << starting_bits) - 1;
if (num < mask)
return (int)num;
return mask;
}
static int
lws_h2_num(int starting_bits, unsigned long num,
unsigned char **p, unsigned char *end)
{
unsigned int mask = (1 << starting_bits) - 1;
if (num < mask)
return 0;
num -= mask;
do {
if (num > 127)
*((*p)++) = 0x80 | (num & 0x7f);
else
*((*p)++) = 0x00 | (num & 0x7f);
if (*p >= end)
return 1;
num >>= 7;
} while (num);
return 0;
}
int lws_add_http2_header_by_name(struct lws *wsi, const unsigned char *name,
const unsigned char *value, int length,
unsigned char **p, unsigned char *end)
{
int len;
lwsl_header("%s: %p %s:%s\n", __func__, *p, name, value);
len = (int)strlen((char *)name);
if (len)
if (name[len - 1] == ':')
len--;
if (wsi->http2_substream && !strncmp((const char *)name,
"transfer-encoding", len)) {
lwsl_header("rejecting %s\n", name);
return 0;
}
if (end - *p < len + length + 8)
return 1;
*((*p)++) = 0; /* literal hdr, literal name, */
*((*p)++) = 0 | lws_h2_num_start(7, len); /* non-HUF */
if (lws_h2_num(7, len, p, end))
return 1;
/* upper-case header names are verboten in h2, but OK on h1, so
* they're not illegal per se. Silently convert them for h2... */
while(len--)
*((*p)++) = tolower((int)*name++);
*((*p)++) = 0 | lws_h2_num_start(7, length); /* non-HUF */
if (lws_h2_num(7, length, p, end))
return 1;
memcpy(*p, value, length);
*p += length;
return 0;
}
int lws_add_http2_header_by_token(struct lws *wsi, enum lws_token_indexes token,
const unsigned char *value, int length,
unsigned char **p, unsigned char *end)
{
const unsigned char *name;
name = lws_token_to_string(token);
if (!name)
return 1;
return lws_add_http2_header_by_name(wsi, name, value, length, p, end);
}
int lws_add_http2_header_status(struct lws *wsi, unsigned int code,
unsigned char **p, unsigned char *end)
{
unsigned char status[10];
int n;
wsi->h2.send_END_STREAM = 0; // !!(code >= 400);
n = sprintf((char *)status, "%u", code);
if (lws_add_http2_header_by_token(wsi, WSI_TOKEN_HTTP_COLON_STATUS,
status, n, p, end))
return 1;
return 0;
}