mirror of
https://github.com/islehorse/HISP.git
synced 2025-04-06 05:05:40 +12:00
391 lines
14 KiB
C#
391 lines
14 KiB
C#
//#define WEBSOCKET_DEBUG
|
|
using HISP.Security;
|
|
using HISP.Util;
|
|
using System;
|
|
using System.Collections.Generic;
|
|
using System.Linq;
|
|
using System.Text;
|
|
|
|
namespace HISP.Server.Network
|
|
{
|
|
public class WebSocket : Transport
|
|
{
|
|
private const string WEBSOCKET_SEED = "258EAFA5-E914-47DA-95CA-C5AB0DC85B11";
|
|
|
|
private const byte WEBSOCKET_CONTINUE = 0x0;
|
|
private const byte WEBSOCKET_TEXT = 0x1;
|
|
private const byte WEBSOCKET_BINARY = 0x2;
|
|
private const byte WEBSOCKET_CLOSE = 0x8;
|
|
|
|
private const byte WEBSOCKET_PING = 0x9;
|
|
private const byte WEBSOCKET_PONG = 0xA;
|
|
|
|
private const byte WEBSOCKET_LENGTH_INT16 = 0x7E;
|
|
private const byte WEBSOCKET_LENGTH_INT64 = 0x7F;
|
|
|
|
private const int WEBSOCKET_EXPECTED_SIZE_SET = 0;
|
|
private const int WEBSOCKET_EXPECTED_SIZE_UNSET = -1;
|
|
|
|
private List<byte> currentMessage = new List<byte>();
|
|
|
|
|
|
private byte lastOpcode;
|
|
private Int64 expectedLength = -1;
|
|
private bool handshakeDone = false;
|
|
private void webSocketLog(string msg)
|
|
{
|
|
#if WEBSOCKET_DEBUG
|
|
foreach(string str in msg.Replace("\r", "").Split("\n"))
|
|
Logger.InfoPrint("[WEBSOCKET] " + str);
|
|
#endif
|
|
}
|
|
|
|
private Dictionary<string, string> parseHttpHeaders(string httpResponse)
|
|
{
|
|
Dictionary<string, string> httpHeaders = new Dictionary<string, string>();
|
|
string[] parts = httpResponse.Replace("\r", "").Split("\n");
|
|
foreach (string part in parts)
|
|
{
|
|
if (part.StartsWith("GET")) continue;
|
|
|
|
if (part.Contains(":"))
|
|
{
|
|
string[] keyValuePairs = part.Split(":");
|
|
if (keyValuePairs.Length >= 2)
|
|
httpHeaders.Add(keyValuePairs[0].Trim().ToLower(), keyValuePairs[1].Trim());
|
|
}
|
|
else
|
|
{
|
|
continue;
|
|
}
|
|
}
|
|
|
|
return httpHeaders;
|
|
}
|
|
|
|
private string deriveWebsocketSecKey(string webSocketKey)
|
|
{
|
|
byte[] derivedKey = Authentication.Sha1Digest(Encoding.UTF8.GetBytes(webSocketKey.Trim() + WEBSOCKET_SEED.Trim()));
|
|
return Convert.ToBase64String(derivedKey);
|
|
}
|
|
private byte[] createHandshakeResponse(string secWebsocketKey)
|
|
{
|
|
string msg = String.Join("\r\n", new string[] {
|
|
"HTTP/1.1 101 Switching Protocols",
|
|
"Connection: Upgrade",
|
|
"Upgrade: websocket",
|
|
"Sec-WebSocket-Accept: " + secWebsocketKey,
|
|
"",
|
|
""
|
|
});
|
|
webSocketLog(msg);
|
|
return Encoding.UTF8.GetBytes(msg);
|
|
}
|
|
|
|
private byte[] parseHandshake(string handshakeResponse)
|
|
{
|
|
webSocketLog(handshakeResponse);
|
|
Dictionary<string, string> headers = parseHttpHeaders(handshakeResponse);
|
|
|
|
string webSocketKey = null;
|
|
headers.TryGetValue("sec-websocket-key", out webSocketKey);
|
|
|
|
if (webSocketKey != null)
|
|
{
|
|
string secWebsocketKey = deriveWebsocketSecKey(webSocketKey);
|
|
return createHandshakeResponse(secWebsocketKey);
|
|
}
|
|
|
|
return createHandshakeResponse("");
|
|
}
|
|
|
|
public static bool IsStartOfHandshake(byte[] data)
|
|
{
|
|
return Helper.ByteArrayStartsWith(data, Encoding.UTF8.GetBytes("GET"));
|
|
}
|
|
|
|
public static bool IsEndOfHandshake(byte[] data)
|
|
{
|
|
return Helper.ByteArrayEndsWith(data, Encoding.UTF8.GetBytes("\r\n\r\n"));
|
|
}
|
|
|
|
private bool isExpectedSizeSet()
|
|
{
|
|
return (this.expectedLength > WEBSOCKET_EXPECTED_SIZE_SET);
|
|
}
|
|
private void setUnknownExpectedLength()
|
|
{
|
|
this.expectedLength = WEBSOCKET_EXPECTED_SIZE_UNSET;
|
|
}
|
|
|
|
private bool isCurrentPacketLengthLessThanExpectedLength()
|
|
{
|
|
if (!isExpectedSizeSet()) return false;
|
|
return (currentPacket.LongCount() < this.expectedLength);
|
|
}
|
|
|
|
public override void ProcessReceivedPackets(int available, byte[] buffer)
|
|
{
|
|
Int64 received = 0;
|
|
// add to current packet
|
|
// if current packet is less than size of an expected incoming message
|
|
// then keep receiving until full message received.
|
|
|
|
for (received = 0; received < available; received++)
|
|
currentPacket.Add(buffer[received]);
|
|
|
|
if (isCurrentPacketLengthLessThanExpectedLength())
|
|
return;
|
|
else
|
|
setUnknownExpectedLength();
|
|
|
|
byte[] webSocketMsg = currentPacket.ToArray();
|
|
|
|
if (!handshakeDone)
|
|
{
|
|
|
|
if (IsStartOfHandshake(webSocketMsg) && IsEndOfHandshake(webSocketMsg))
|
|
{
|
|
string httpHandshake = Encoding.UTF8.GetString(webSocketMsg);
|
|
byte[] handshakeResponse = parseHandshake(httpHandshake);
|
|
base.Send(handshakeResponse);
|
|
|
|
currentPacket.Clear();
|
|
handshakeDone = true;
|
|
}
|
|
}
|
|
else if(currentPacket.Count > 2) // else, begin parsing websocket message
|
|
{
|
|
|
|
byte[] unmaskKey = new byte[4];
|
|
|
|
bool finished = (webSocketMsg[0] & 0b10000000) != 0;
|
|
|
|
bool rsv1 = (webSocketMsg[0] & 0b01000000) != 0;
|
|
bool rsv2 = (webSocketMsg[0] & 0b00100000) != 0;
|
|
bool rsv3 = (webSocketMsg[0] & 0b00010000) != 0;
|
|
|
|
byte opcode = Convert.ToByte(webSocketMsg[0] & 0b00001111);
|
|
|
|
bool mask = (webSocketMsg[1] & 0b10000000) != 0;
|
|
Int64 messageLength = Convert.ToInt64(webSocketMsg[1] & 0b01111111);
|
|
|
|
int offset = 2;
|
|
|
|
|
|
if (messageLength == WEBSOCKET_LENGTH_INT16)
|
|
{
|
|
if (webSocketMsg.LongLength >= offset + 2)
|
|
{
|
|
byte[] uint16Bytes = new byte[2];
|
|
Array.ConstrainedCopy(webSocketMsg, offset, uint16Bytes, 0, uint16Bytes.Length);
|
|
uint16Bytes = uint16Bytes.Reverse().ToArray();
|
|
messageLength = BitConverter.ToUInt16(uint16Bytes);
|
|
|
|
offset += uint16Bytes.Length;
|
|
}
|
|
}
|
|
else if (messageLength == WEBSOCKET_LENGTH_INT64)
|
|
{
|
|
if (webSocketMsg.LongLength >= offset + 8)
|
|
{
|
|
byte[] int64Bytes = new byte[8];
|
|
Array.ConstrainedCopy(webSocketMsg, offset, int64Bytes, 0, int64Bytes.Length);
|
|
int64Bytes = int64Bytes.Reverse().ToArray();
|
|
messageLength = BitConverter.ToInt64(int64Bytes);
|
|
|
|
offset += int64Bytes.Length;
|
|
}
|
|
}
|
|
|
|
if (mask)
|
|
{
|
|
Array.ConstrainedCopy(webSocketMsg, offset, unmaskKey, 0, unmaskKey.Length);
|
|
offset += unmaskKey.Length;
|
|
}
|
|
|
|
// Handle tcp fragmentation
|
|
|
|
Int64 actualLength = (webSocketMsg.LongLength - offset);
|
|
|
|
// check if full message received, if not then set expected length
|
|
// and return, thus entering the loop at the beginning
|
|
if (actualLength < messageLength)
|
|
{
|
|
expectedLength = messageLength + offset; // set expected length and return
|
|
webSocketLog("Partial websocket frame received, expected size: " + messageLength + " got size: " + actualLength);
|
|
return;
|
|
}
|
|
else
|
|
{
|
|
setUnknownExpectedLength();
|
|
currentPacket.Clear();
|
|
}
|
|
|
|
// dont care about extensions
|
|
if (rsv1 || rsv2 || rsv3) return;
|
|
|
|
webSocketLog("Finished: " + finished + "\nRsv1: " + rsv1 + "\nRsv2: " + rsv2 + "\nRsv3: " + rsv3 + "\nOpcode: " + opcode + "\nMask: " + mask + "\nMesssageLength: " + messageLength);
|
|
|
|
if (opcode != WEBSOCKET_CONTINUE)
|
|
lastOpcode = opcode;
|
|
|
|
// do the thing the websocket frame says to do
|
|
switch (opcode)
|
|
{
|
|
case WEBSOCKET_CONTINUE:
|
|
case WEBSOCKET_BINARY:
|
|
case WEBSOCKET_TEXT:
|
|
case WEBSOCKET_PING:
|
|
for (Int64 i = 0; i < messageLength; i++)
|
|
currentMessage.Add(mask ? Convert.ToByte(webSocketMsg[offset + i] ^ unmaskKey[i % unmaskKey.Length]) : Convert.ToByte(webSocketMsg[offset + i]));
|
|
break;
|
|
case WEBSOCKET_CLOSE:
|
|
this.Disconnect();
|
|
return;
|
|
}
|
|
|
|
// handle end of websocket message.
|
|
if (finished)
|
|
{
|
|
|
|
byte[] message = currentMessage.ToArray();
|
|
|
|
if (lastOpcode != WEBSOCKET_PING && message.LongLength > 0)
|
|
onReceiveCallback(message);
|
|
else
|
|
Send(message);
|
|
|
|
currentMessage.Clear();
|
|
}
|
|
|
|
|
|
// is there another frame after this one?
|
|
// buffer remaining data back to ProcessReceivedPackets
|
|
if(actualLength > messageLength)
|
|
{
|
|
Int64 left = (actualLength - messageLength);
|
|
|
|
Int64 loc = messageLength + offset;
|
|
int total = buffer.Length;
|
|
|
|
for (Int64 totalSent = left; totalSent > 0; totalSent -= total)
|
|
{
|
|
if (totalSent <= total)
|
|
total = Convert.ToInt32(totalSent);
|
|
|
|
for (int i = 0; i < total; i++)
|
|
buffer[i] = webSocketMsg[loc + i];
|
|
|
|
webSocketLog("Found another frame at the end of this one, processing!");
|
|
ProcessReceivedPackets(total, buffer);
|
|
|
|
loc += total;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
public override string Name
|
|
{
|
|
get
|
|
{
|
|
return "WebSocket";
|
|
}
|
|
}
|
|
|
|
|
|
|
|
// encode data into websocket frames and send over network
|
|
public override void Send(byte[] data)
|
|
{
|
|
if(this.Disconnected) return;
|
|
if (data == null) return;
|
|
|
|
// apparently you cant mask responses? chrome gets mad when i do it,
|
|
// so dont set this to true.
|
|
bool mask = false;
|
|
|
|
int maxLength = this.workBuffer.Length;
|
|
int toSend = maxLength;
|
|
|
|
byte opcode = ((lastOpcode == WEBSOCKET_PING) ? WEBSOCKET_PONG : WEBSOCKET_BINARY);
|
|
|
|
Int64 totalData = data.LongLength;
|
|
|
|
bool finish = false;
|
|
|
|
// despite its name, this has nothing to do with graphics
|
|
// rather this is for WebSocket frames
|
|
List<byte> frameBuffer = new List<byte>();
|
|
|
|
for (Int64 remain = totalData; remain > 0; remain -= toSend)
|
|
{
|
|
// Is this the first frame?
|
|
// if so; send opcode binary
|
|
// otherwise, were continuing out last one
|
|
if (remain != totalData)
|
|
opcode = WEBSOCKET_CONTINUE;
|
|
|
|
if(remain <= maxLength)
|
|
{
|
|
toSend = Convert.ToInt32(remain);
|
|
finish = true;
|
|
}
|
|
|
|
frameBuffer.Add(Convert.ToByte((0x00) | (finish ? 0b10000000 : 0b00000000) | opcode));
|
|
|
|
// do special length encoding
|
|
byte maskAndLength = Convert.ToByte((0x00) | (mask ? 0b10000000 : 0b00000000));
|
|
byte[] additionalLengthData = new byte[0];
|
|
if (toSend >= WEBSOCKET_LENGTH_INT16)
|
|
{
|
|
if(toSend < UInt16.MaxValue)
|
|
{
|
|
maskAndLength |= WEBSOCKET_LENGTH_INT16;
|
|
additionalLengthData = BitConverter.GetBytes(Convert.ToUInt16(toSend)).Reverse().ToArray();
|
|
|
|
}
|
|
else if(Convert.ToInt64(toSend) < Int64.MaxValue)
|
|
{
|
|
maskAndLength |= WEBSOCKET_LENGTH_INT64;
|
|
additionalLengthData = BitConverter.GetBytes(Convert.ToInt64(toSend)).Reverse().ToArray();
|
|
}
|
|
|
|
}
|
|
else
|
|
{
|
|
maskAndLength |= Convert.ToByte(toSend);
|
|
}
|
|
|
|
// Add to buffer
|
|
frameBuffer.Add(maskAndLength);
|
|
Helper.ByteArrayToByteList(additionalLengthData, frameBuffer);
|
|
|
|
// Generate masking key;
|
|
byte[] maskingKey = new byte[4];
|
|
GameServer.RandomNumberGenerator.NextBytes(maskingKey);
|
|
|
|
if (mask)
|
|
Helper.ByteArrayToByteList(maskingKey, frameBuffer);
|
|
|
|
// Mask data using key.
|
|
Int64 totalSent = (totalData - remain);
|
|
for (int i = 0; i < toSend; i++)
|
|
frameBuffer.Add(mask ? Convert.ToByte(data[i + totalSent] ^ maskingKey[i % maskingKey.Length]) : Convert.ToByte(data[i + totalSent]));
|
|
|
|
// Finally send it over the network
|
|
base.Send(frameBuffer.ToArray());
|
|
if (this.Disconnected) return; // are we still here?
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
}
|